
M18 - Cross-Border E-commerce Supplier Fraud and Governance Mechanisms
22/10/2025 | 18 mins.
The sources provide an overview of a study focusing on supplier financial fraud and strategic opportunism within cross-border e-commerce, particularly concerning smaller international buyers. This research, likely from Monash Business, examines proprietary data of over 1000 complaints from a non-profit website, SupplierBlacklist.com, to predict the likelihood of financial fraud versus other issues like poor quality or delivery problems, termed myopic opportunism. The core objective is to analyze whether and which procurement governance mechanisms, such as screening, auditing, and resolution practices, effectively limit this supplier opportunism, especially considering the limited experience and resources of Small and Medium Enterprises (SMEs). Furthermore, the study explores how factors like the buyer's country status (OECD vs. Non-OECD) and the stage of the buyer-supplier relationship (initial vs. repeat order) influence the effectiveness of these governance measures in preventing various types of scams.

M17 - E-Commerce Fraud Examination and Prevention
22/10/2025 | 13 mins.
The sources provide an extensive overview of fraud in e-commerce, focusing on its nature, prevention, and detection as part of a forensic accounting curriculum. They categorize various types of e-commerce fraud, including chargeback fraud, return fraud, payment fraud, identity theft, and supplier fraud, often illustrating them with specific case examples and estimated losses in Australia. The material also addresses the unique fraud risks presented by the e-business environment, emphasizing the importance of internal controls like the control environment and risk assessment for prevention. Furthermore, the texts discuss future trends, particularly the escalating role of generative AI and automation in increasing the sophistication and scale of fraudulent activities, requiring specialized technical knowledge for detection and investigation.

M15 - Consumer Fraud
05/10/2025 | 15 mins.
The sources provide an extensive overview of consumer fraud, scams, and identity theft, primarily focusing on the Australian context. They begin by setting learning objectives related to defining consumer fraud, understanding identity theft, and classifying various scam types. The documents distinguish between consumer fraud, consumer scams, and investment scams by detailing their differing regulatory frameworks, investigation techniques, and victim support strategies. A significant portion is dedicated to illustrating the seriousness and prevalence of scams in Australia, listing major historical cases of investment and consumer fraud such as Ponzi schemes and misleading financial practices. Finally, the text explores identity theft, outlining its cycle, common conversion methods used by fraudsters, and listing numerous Australian organizations and laws dedicated to prevention and victim assistance.

M14 - Occupational Fraud
05/10/2025 | 16 mins.
This academic source provides an overview of Forensic Accounting principles, with a specific focus on Fraud Against Organizations. The chapter materials define and categorize various forms of occupational fraud, including asset misappropriation, corruption, and financial statement fraud. Key concepts detailed include how assets are stolen through skimming, larceny, and various types of fraudulent disbursements like billing and payroll schemes. Additionally, the text explains different corruption schemes such as bribery, conflicts of interest, and economic extortion, supported by statistics from the ACFE Report to the Nations—2024 regarding median losses, detection methods, and prevention controls.

M13 - Liability Fraud
05/10/2025 | 19 mins.
The provided text, originating from a forensic accounting chapter, offers a detailed examination of three major categories of financial statement fraud: Liability Fraud, Asset Fraud, and Inadequate Disclosure Fraud. The material presents learning objectives for identifying, discussing, and explaining fraudulent schemes like the understatement of liabilities and the overstatement of assets. Crucially, the text includes extensive lists and tables detailing numerous historical cases, such as Enron and WorldCom, to illustrate various fraud schemes, the symptoms they exhibit, and the methods used to detect them, including specific analytical ratios and documentary evidence. The sources clearly explain different ways liabilities and assets are manipulated, such as improper capitalization of expenses or the fraudulent use of reserves, to misrepresent a company's true financial health.



Forensic Accounting