|
|
|
ix | |
|
|
|
xi | |
| Using this Book |
|
xiii | |
|
Characteristics of Fraud and Corruption |
|
|
1 | (22) |
|
|
|
1 | (1) |
|
Basic conditions surrounding fraud and corruption |
|
|
1 | (1) |
|
|
|
2 | (1) |
|
|
|
3 | (1) |
|
|
|
3 | (1) |
|
The extent of fraud and corruption |
|
|
4 | (1) |
|
Corruption and the funding of public bodies |
|
|
5 | (1) |
|
|
|
6 | (1) |
|
Professional accounting guidelines |
|
|
7 | (1) |
|
|
|
8 | (3) |
|
`Desk' instructions and other specialized regulations |
|
|
11 | (1) |
|
Managing and controlling investigations |
|
|
12 | (3) |
|
|
|
15 | (1) |
|
Case study 1.1 Toxins Research and Storage Centre (TRSC) |
|
|
16 | (5) |
|
|
|
21 | (2) |
|
|
|
23 | (16) |
|
|
|
23 | (1) |
|
The public service sector -- its special nature |
|
|
23 | (1) |
|
|
|
24 | (1) |
|
|
|
25 | (10) |
|
The rise of corporate governance |
|
|
35 | (2) |
|
Public services reaction to corporate governance |
|
|
37 | (1) |
|
|
|
37 | (2) |
|
Using Risk and Systems-based Auditing |
|
|
39 | (40) |
|
|
|
39 | (1) |
|
Background and developments |
|
|
39 | (2) |
|
|
|
41 | (4) |
|
A summary of the systems-based approach to audit |
|
|
45 | (13) |
|
An adapted counter-fraud systems-based approach to audit |
|
|
58 | (1) |
|
Using the ORC relationship |
|
|
58 | (1) |
|
A more detailed look at counter-fraud SBA |
|
|
59 | (4) |
|
|
|
63 | (1) |
|
Case study 3.1 Checking for ghosts |
|
|
64 | (7) |
|
Case study 3.2 Riscashire County Council |
|
|
71 | (7) |
|
|
|
78 | (1) |
|
Capital Projects and Major Contracts |
|
|
79 | (20) |
|
|
|
79 | (1) |
|
Major capital works contracts |
|
|
79 | (10) |
|
Revenue and other contracts |
|
|
89 | (3) |
|
|
|
92 | (1) |
|
Case study 4.1 Burnum City Council crematorium |
|
|
93 | (3) |
|
Case study 4.2 Ministry for legal aid |
|
|
96 | (2) |
|
|
|
98 | (1) |
|
Information Technology and Management |
|
|
99 | (26) |
|
|
|
99 | (1) |
|
Why should computers demand special attention? |
|
|
99 | (1) |
|
|
|
100 | (1) |
|
Following transactions around the computer |
|
|
100 | (1) |
|
|
|
101 | (1) |
|
Data updating and processing |
|
|
102 | (1) |
|
|
|
103 | (2) |
|
|
|
105 | (1) |
|
|
|
105 | (1) |
|
Systems development, operation and maintenance |
|
|
106 | (4) |
|
Computer--related reviews |
|
|
110 | (4) |
|
Using computers to directly combat fraud |
|
|
114 | (2) |
|
|
|
116 | (2) |
|
Corporate policy for IT security and data protection |
|
|
118 | (1) |
|
|
|
119 | (1) |
|
Case study 5.1 The Gallery Sports Club |
|
|
119 | (2) |
|
Case study 5.2 Central Strategic Health Authority mainframe installation |
|
|
121 | (2) |
|
|
|
123 | (2) |
|
|
|
125 | (16) |
|
|
|
125 | (1) |
|
A trail of responsibility |
|
|
125 | (7) |
|
Key expenditure risks and controls |
|
|
132 | (2) |
|
|
|
134 | (1) |
|
Case study 6.1 The Public Organizations Directory Exchange (PODE) |
|
|
135 | (2) |
|
Case study 6.2 Greater Harmborough Council |
|
|
137 | (3) |
|
|
|
140 | (1) |
|
|
|
141 | (16) |
|
|
|
141 | (1) |
|
National and local taxation |
|
|
141 | (1) |
|
|
|
142 | (3) |
|
|
|
145 | (1) |
|
Key income risks and controls |
|
|
145 | (6) |
|
|
|
151 | (1) |
|
Case study 7.1 Oldtown Heritage Centre |
|
|
151 | (3) |
|
Case study 7.2 The creche grant scheme |
|
|
154 | (2) |
|
|
|
156 | (1) |
|
Transfer Payments -- Benefits, Claims, Grants and Rebates |
|
|
157 | (12) |
|
|
|
157 | (1) |
|
|
|
157 | (2) |
|
Key risks and controls -- transfer payments |
|
|
159 | (5) |
|
Causes taken from various real cases of means-tested fraud |
|
|
164 | (1) |
|
|
|
165 | (1) |
|
Case Study 8.1 Grants for irrigation projects |
|
|
166 | (2) |
|
|
|
168 | (1) |
|
The Main Accounting and Reporting Function |
|
|
169 | (12) |
|
|
|
169 | (1) |
|
The purpose and objectives of the main accounting and reporting function |
|
|
169 | (1) |
|
Key risks and controls -- main accounting function |
|
|
170 | (5) |
|
Value for money, management performance, fraud and corruption |
|
|
175 | (1) |
|
|
|
176 | (1) |
|
Case study 9.1 The training and rehabilitation organization |
|
|
176 | (3) |
|
|
|
179 | (2) |
|
|
|
181 | (80) |
|
Appendix 1 Selected Statutes, Regulations and Key Extracts |
|
|
183 | (3) |
|
Appendix 2 Regulation of Investigatory Powers Act 2000 (RIPA) |
|
|
186 | (2) |
|
Appendix 3 General (non-surveillance) Considerations in Fraud Investigations |
|
|
188 | (3) |
|
Appendix 4 WACI -- A Documented Audit |
|
|
191 | (22) |
|
Appendix 5 Objectives and Controls Grids |
|
|
213 | (15) |
|
Appendix 6 Capital Works Contract Checklist |
|
|
228 | (3) |
|
Appendix 7 Final Contractor's Account Audit -- Arithmetical Checks |
|
|
231 | (1) |
|
Appendix 8 Key Contract Counter-fraud and System Evaluation Issues |
|
|
232 | (1) |
|
Appendix 9 Extracts from the Data Protection Act 1998 |
|
|
233 | (1) |
|
Appendix 10 Outline Structure for a Corporate IT Security and Data Protection Policy |
|
|
234 | (1) |
|
Appendix 11 Checklist of Key Case Papers and Control Features for Means-tested Benefits and Grants |
|
|
235 | (2) |
|
Appendix 12 Some Basic Comparisons Between Private and Public Sector Accounts |
|
|
237 | (2) |
|
Appendix 13 Financial and Accounting Glossary |
|
|
239 | (7) |
|
Appendix 14 Selected Cases by Theme of Perpetration |
|
|
246 | (15) |
| Bibliography |
|
261 | (6) |
| Index |
|
267 | |