Psychology of fraud - today’s issues

Wednesday, 21 February 2007, 2:30 PM EST

On almost any given day, you can find a news story about an employee who has gone bad and has committed some type of fraud. This is a timeless problem known as the insider threat. It’s always been there and it always will be there. Why? Because businesses need to trust their employees in order to stay in business.

The best and most widely accepted model for explaining why “good people” commit fraud is the fraud triangle. This is a model developed in the early 1950’s by Dr. Donald Cressey, a criminologist whose research focused on embezzlers, people he called “trust violators.” According to Cressey, there are three factors that must be present in order for an ordinary person to commit fraud. All three of these factors must be present at the same time in order for fraud to occur.

At the Security Catalyst.

[ Read more ]




Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //