If you were a company's loss prevention specialist, what procedures would you design or implement to detect or prevent employee embezzlement?
What will be an ideal response?
ANSWER: Answers may vary: Watch for the signs of an embezzling employee denoted by scholar Cressy: 1. do not take vacations, turn down promotions, and regularly work overtime; 2. prevent others from having access to records; 3. work on company records excessively because, in their words, the records have to be "checked," or re-written for neatness; 4. are defensive regarding questions about their routine work activities; 5. have creditors calling at work, explain a rapid increase in income by inheritance or winning the lottery; and 6. have a new and improved standard of living
You might also like to view...
Tittleās control balance theory states that deviance results when people are very _____ or very controlled
Fill in the blank(s) with the appropriate word(s).
The use of computer networks for criminal profits, copyright infringements, identity theft, and Internet securities are examples of cyber-crimes called ___________________.
Fill in the blank(s) with the appropriate word(s).
The General theory of crime attributes the tendency to commit crimes to social learning
Indicate whether the statement is true or false
______________ involve problem analysis, setting goals and objectives, program and policy design, developing an action plan, and monitoring and evaluation
a. Planned changes b. Planned outcomes c. Planned alternatives d. Planned contingencies