Why should an organization conduct a vendor audit?
Answer to relevant QuestionsWhy are computer fraud cases often more difficult to examine than traditional fraud cases? Why do companies resort to corporate espionage to get information about their competitors, when there is a wealth of information available in the public domain? What steps are involved in conducting a fraud risk assessment using the sample framework discussed in the chapter? What topics should be discussed in identifying fraud risks that could apply to the organization? What are three characteristics/objectives of a good investigation report?
Post your question