Case Studies

  • Harald Haelterman
Chapter
Part of the Crime Prevention and Security Management book series (CPSM)

Abstract

This chapter presents a number of case studies that illustrate the use of script analysis in a business environment. All cases are to some extent based on real-life examples reported upon in the press or shared by practitioners in the field. Where relevant and required, names of individuals and locations have been changed or removed to ensure strict confidentiality. The main purpose of this chapter is to demonstrate the potential of script analysis for preventive purposes. The crime types that were selected have deliberately been kept simple and straightforward as to allow the reader to gain sufficient understanding of the approach itself rather than to become distracted by the complexity of the incidents that are described. From gaining such initial understanding it will become evident that the value of script analysis becomes even more obvious when dealing with more complex crime types.

Keywords

Chief Executive Officer Bank Branch Sales Representative Control Improvement Crime Commission 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. ACFE – Association of Certified Fraud Examiners. (2012). Report to the Nations on Occupational Fraud and Abuse. Retrieved January 17, 2015, from https://www.acfe.com/uploadedFiles/ACFE_Website/Content/rttn/2012-report-to-nations.pdf
  2. ACFE – Association of Certified Fraud Examiners. (2014). Report to the Nations on Occupational Fraud and Abuse. Retrieved January 17, 2015, from http://www.acfe.com/rttn/docs/2014-report-to-nations.pdf
  3. Action Fraud. (n.d.). Bank Card and cheque fraud. Retrieved September 28, 2015, from http://www.actionfraud.police.uk/fraud-protection/bank-card-cheque-fraudGoogle Scholar
  4. Beauregard, E., Proulx, J., Rossmo, K., Leclerc, B., & Allaire, J. F. (2007). Script analysis of the hunting process of serial sex offenders. Criminal Justice and Behavior, 34, 1069–1084.CrossRefGoogle Scholar
  5. Breuer, M. (2014). 6 signs your employees are abusing expense reports. Retrieved January 17, 2015, from http://www.insperity.com/blog/6-signs-your-employees-are-abusing-expense-reports/
  6. Burges, D. (2012a). Cargo theft, loss prevention, and supply chain security (p. 392). Waltham: Butterworth-Heinemann.Google Scholar
  7. Burges, D. (2012b). Hidden costs. Cargo Security International, October/November, pp. 46–48.Google Scholar
  8. Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. V. Clarke (Ed.), Crime prevention studies, Volume 3 (pp. 151–196). Monsey, NY: Criminal Justice Press.Google Scholar
  9. Cougar Mountain (n.d.). Expense Reimbursement Fraud, signs to Watch for. Retrieved May 11, 2016, from https://www.caugarmtn.com/expense-reimbursement-fraud-signs-watch/Google Scholar
  10. CargoNet. (2012). 2011 United States Cargo Theft Report. Retrieved August 7, 2012, from http://www. cargonet.com/cargo_theft_reports/2011.pdf.Google Scholar
  11. CardWatch. (n.d.). About CardWatch. Retrieved September 28, 2015, from http://cardwatch.org.uk.Google Scholar
  12. Ekwall, D., & Lantz, B. (2015). Modi operandi for cargo theft in EMEA. A seasonality analysis. Journal of Transportation Security. doi: 10.1007/s12198-015-0160-z.Google Scholar
  13. Experian. (2013). The fraudster’s modus operandi. Understanding how fraudsters operate. Retrieved October 4, 2015, from http://www.experian.co.uk/assets/identity-and-fraud/experian-the-fraudsters-modus-operandi.pdf
  14. Fraudehelpdesk (2015). Nieuw Fenomeen: CEO-Fraude. Retrieved July 20, 2015, from https://www.fraudehelpdesk.nl/nieuws/nieuw-fenomeen-ceo-fraude/
  15. Gill, M. (1994). Introducing crime at work. In M. Gill (Ed.), Crime at work (pp. 1–10). Leicester: Perpetuity Press.Google Scholar
  16. Haelterman, H., Callens, M., & Vander Beken, T. (2012). Controlling access to pick-up and delivery vans: The cost of alternative measures. European Journal on Criminal Policy and Research, 18(2), 163–182.CrossRefGoogle Scholar
  17. Kahaian, M. N., & Roth, R. A. (2013). The impact of expense reimbursement fraud. SSR Global Financial Advisory Services. Retrieved January 17, 2015, from http://www.srr.com/article/impact-expense-reimbursement-fraud
  18. Kovacs, E. (2014). Tokenization: Benefits and challenges for securing transaction data. Retrieved October 22, 2015, from http://www.securityweek.com/tokenization-benefits-and-challenges-securing-transaction-data
  19. Marasco, J. (n.d.). Expense reimbursement fraud: Ten ways to protect your organization. Retrieved January 17, 2015, from http://www.stonebridgebp.com/library/fraud-forensics/expense-reimbursement-fraud-ten-ways-to-protect-your-organization
  20. Safe Internet Banking. (n.d.a). Money mules. Retrieved October 14, 2015, from https://www.safeinternetbanking.be/en/fraud-techniques/money-mules
  21. Safe Internet Banking. (n.d.b). Shoulder Surfing. Retrieved October 14, 2015, from https://www.safeinternetbanking.be/en/fraud-techniques/shoulder-surfing
  22. Sky News. (2013). ATM ‘Shoulder Surfing’ card fraud on rise. Retrieved September 28, 2015, from http://news.sky.com/story/1100203/atm-shoulder-surfing-card-fraud-on-rise
  23. TAPA EMEA. (2013). TAPA EMEA IIS Annual Report 2013. Retrieved August 27, 2015, from http://www.tapaemea.com/intelligence/iis-bulletins/iis-annual-reports.html
  24. TAPA EMEA. (2014). TAPA EMEA IIS Annual Report 2014. The cargo crime landscape in EMEA. Retrieved August 27, 2015, from http://www.tapaemea.com/intelligence/iis-bulletins/iis-annual-reports.html
  25. TAPA EMEA. (n.d.). Theft for a moving truck. A growing concern? Retrieved August 27, 2015, from http://www.tapaemea.com/intelligence/iis-bulletins/iis-special-reports.html

Copyright information

© The Editor(s) (if applicable) and The Author(s) 2016

Authors and Affiliations

  • Harald Haelterman
    • 1
  1. 1.Ghent UniversityGhentBelgium

Personalised recommendations