|
|
1 | (14) |
|
|
8 | (7) |
|
2 Corporation Conformity and Compliance |
|
|
15 | (22) |
|
Research Perspectives on Compliance |
|
|
16 | (5) |
|
Legalistic and Formalistic Approaches |
|
|
21 | (2) |
|
Compliance Audits and Risk Assessment |
|
|
23 | (1) |
|
Fraud Examinations of Compliance Failures |
|
|
24 | (5) |
|
Maturity Model for Corporate Compliance |
|
|
29 | (3) |
|
|
32 | (5) |
|
3 The Theory of Convenience and Compliance |
|
|
37 | (18) |
|
Individual Convenience Orientations |
|
|
38 | (2) |
|
Financial Motive for Executive Deviance |
|
|
40 | (3) |
|
Organizational Opportunity for Deviance |
|
|
43 | (1) |
|
Personal Willingness for Deviant Behavior |
|
|
44 | (2) |
|
Disturbing Offender Crime Convenience |
|
|
46 | (2) |
|
Traditional Criminological Perspectives |
|
|
48 | (1) |
|
|
49 | (6) |
|
4 Lack of Compliance from Convenience |
|
|
55 | (20) |
|
Astellas Cultural and Compliance Failings |
|
|
56 | (1) |
|
Danske Bank Money Laundering in Estonia |
|
|
57 | (4) |
|
Fuji Xerox Customer Fraud in New Zealand |
|
|
61 | (3) |
|
Nordea Bank Tax Evasion in Luxembourg |
|
|
64 | (4) |
|
Swedbank Money Laundering in Lithuania |
|
|
68 | (3) |
|
Telenor in Vimpelcom Uzbekistan Corruption |
|
|
71 | (1) |
|
|
72 | (3) |
|
5 Barriers to Corporate Compliance |
|
|
75 | (28) |
|
The Complexity of Rules and Regulations |
|
|
76 | (1) |
|
Deficiencies in Compliance Functions |
|
|
77 | (3) |
|
Deterioration by Social Disorganization |
|
|
80 | (7) |
|
Heroic Status of the Chief Executive |
|
|
87 | (2) |
|
Inter-Bank Cooperation Challenges |
|
|
89 | (7) |
|
|
96 | (7) |
|
6 Roles of Compliance Officers |
|
|
103 | (10) |
|
Statements by Compliance Violators |
|
|
104 | (3) |
|
Survey of Officers in the United States |
|
|
107 | (1) |
|
The Yara Corruption Scandal in Libya |
|
|
108 | (2) |
|
|
110 | (3) |
|
7 Restoration of Compliance and Control |
|
|
113 | (14) |
|
The Trust Repair at Siemens in Germany |
|
|
115 | (5) |
|
Financial Crime Specialists in Compliance |
|
|
120 | (3) |
|
|
123 | (4) |
|
8 Crime Signal Detection Perspectives |
|
|
127 | (44) |
|
White-Collar Crime Characteristics |
|
|
129 | (2) |
|
Organizational Crime Detection Functions |
|
|
131 | (5) |
|
Crime Detection by Whistleblowing |
|
|
136 | (6) |
|
Empirical Crime Signal Detections |
|
|
142 | (6) |
|
Characteristics of Crime Signal Detection |
|
|
148 | (7) |
|
From Crime Convenience to Detection |
|
|
155 | (2) |
|
Case Study of Betanien Foundation |
|
|
157 | (6) |
|
|
163 | (8) |
|
9 Change Management for Corporate Recovery |
|
|
171 | (24) |
|
Organizational Reconstruction Approaches |
|
|
172 | (1) |
|
Recommendations by Fraud Examiners |
|
|
173 | (7) |
|
Preventive Measures in the Literature |
|
|
180 | (5) |
|
Detective Measures in the Literature |
|
|
185 | (2) |
|
Corporate Case Study of Siemens |
|
|
187 | (1) |
|
|
188 | (7) |
|
10 Change Measures for Corporate Control |
|
|
195 | (32) |
|
Recommendations in the Literature |
|
|
197 | (8) |
|
Investigations by Fraud Examiners |
|
|
205 | (3) |
|
Four Change Management Themes |
|
|
208 | (4) |
|
Reduction in Crime Convenience |
|
|
212 | (3) |
|
|
215 | (12) |
|
11 Strategies for Wrongdoing Investigation |
|
|
227 | (42) |
|
Investigative Fraud Examination |
|
|
228 | (4) |
|
Investigation Knowledge Strategy |
|
|
232 | (3) |
|
Information Sources Strategy |
|
|
235 | (5) |
|
Value Shop Configuration Strategy |
|
|
240 | (5) |
|
Computer Systems Strategy |
|
|
245 | (3) |
|
Crime Investigation Principles |
|
|
248 | (10) |
|
Investigation Maturity Levels |
|
|
258 | (3) |
|
Case Study of Gartnerhallen |
|
|
261 | (3) |
|
|
264 | (5) |
|
12 Profiling of Potential Offenders |
|
|
269 | (18) |
|
Structural Model of Convenience |
|
|
270 | (1) |
|
Profiling Offender Motive |
|
|
271 | (4) |
|
Profiling Offender Opportunity |
|
|
275 | (3) |
|
Profiling Personal Willingness |
|
|
278 | (3) |
|
|
281 | (6) |
Conclusion |
|
287 | (4) |
Appendices |
|
291 | (34) |
Bibliography |
|
325 | (38) |
Index |
|
363 | |