It consists of numeric facts called measures that are categorized by dimensions. The measures are placed at the intersections of the hypercube, which is spanned by the dimensions as a vector space. The usual interface to manipulate an OLAP cube is a matrix interface, like Pivot tables in a spreadsheet program, which performs projection operations along the dimensions, such as aggregation or averaging. The cube metadata is typically created from a star schema or snowflake schema or fact constellation of tables in a relational database.
Small business fraud and the trusted employee Protecting against unique vulnerabilities By G. Here are some viable prevention options.
The place to shop for software, hardware and services from IBM and our providers. Browse by technologies, business needs and services. Shred cancelled cheques and old statements, or store under the same security as your un-issued cheques. Reconcile your bank statement daily or through online banking. Employee fraud is a significant problem faced by organizations of all types, sizes, locations and industries. While we would all like to believe our employees are loyal and working for the benefit of the organization (and most of them probably are), there are still many reasons why your employees may commit fraud and several ways in which they might do it.
Bob and his brother, Bill, owners and operators of Acme Tractor for 30 years, were close to retirement. A local bank had continually financed Acme, which had an inventory of farm tractors worth millions of dollars. Jane would approve invoices. Julie would prepare the checks and either Bill or Bob would sign them.
The receipt and payment cycle included a series of checks and balances with no one employee responsible for the entire cycle.
James, 30, had been working in various jobs at the business since high school. Now the brothers entrusted him with all aspects of bookkeeping for the business: They gave him check-signing ability and a business credit card.
Soon after becoming the bookkeeper, James married and began a family. As his personal monthly bills increased, he found it difficult to maintain the lifestyle he had known when he was single and living with his parents.
The fraud scheme began simply. At first, James began illegally using his business p-card or purchasing card for small personal expenses, such as gas for his personal vehicle and fast food meals. After several months, his charges for personal expenses increased in number and dollar amount, including charges for taking out his wife and children to fine restaurants, clothing for himself and his family, and even high-end electronic products.
No one at Acme noticed the continual increase in charges for personal items because James controlled all payment checks to the credit card company.
He began embezzling from the payroll system. He would give himself paychecks in lieu of not taking vacation time, even though he took all his vacation days.
Acme management was still oblivious. When the bank statements came each month, James would alter the images of the checks on the statements to match the vendors on the check stubs and in the system. Then he would hide evidence of the fraudulent checks he had cashed by photocopying the altered pages of the bank statements and shredding the original statements.
If anyone reviewed the check stubs, it would only appear that one credit card invoice had been paid each month. He used company funds to pay off both cards. Some fraudsters rationalize their thefts as "temporary" loans they will repay later. James executed his frauds without any intention of returning the money.
Family members confronted James. He confessed and explained how he had stolen the money.Employee fraud is a significant problem faced by organizations of all types, sizes, locations and industries.
While we would all like to believe our employees are loyal and working for the benefit of the organization (and most of them probably are), there are still many reasons why your employees may commit fraud and several ways in which they might do it.
Life insurance fraud may involve faking death to claim life insurance. Fraudsters may sometimes turn up a few years after disappearing, claiming a loss of memory.
An example of life insurance fraud is the John Darwin disappearance case, which was an investigation into the act of pseudocide committed by the British former teacher and prison officer John Darwin, who turned up alive in December.
Resources: Public service announcement about the business e-mail compromise scam - More about the IC3 - For more information about reporting or responding to business cyber attacks, read the U.S.
The amount of fraud being perpetrated against businesses is getting worse, both in terms of the number of instances and the amount of money that is being lost, and some of that can be attributed.
Adding 'augmented intelligence' and 'data visualization' to the mix. Augmented intelligence and data visualization are two technologies fraud examiners can use to make the analysis phase of a fraud examination more efficient.
Small businesses have it rough.
They're particularly vulnerable to fraud because they lack the resources to implement complete systems of internal controls and properly segregate accounting duties among their limited staffs.
However, small businesses don't have to be rife with fraud. Here are.