Welcome to next-gen Illumeo platform. All individual and corporate users are required to reset their account passwords before accessing the new platform. Click login and then 'Lost my Password' and follow the simple process. For any assistance, please email us at support@illumeo.com

Contact Info

  • 96 Queen Park, Los Vegas, USA
  • +1 800 555 44 00
  • mail@illumeo.com
  • Office Hrs: Today 9.00am to 6.00pm

The Fraud Triangle

$72.00

SKU: crs-1638243 Category:

Description

The fraud triangle is often referred to when studying aspects of white collar crime and fraudulent acts. There are several types of fraud, yet they all share the same fraud triangle. Two individuals who deserve the most credit for the fraud triangle theory are early criminology researchers Edwin Sutherland and Donald Cressey. Sutherland and Cressey, both criminologists, were professors and researchers teaching criminology in sociology departments.  

Sutherland developed the “differential association theory” of why people commit crimes. He believed criminal behavior is learned and not inherited.

The person most associated with developing the fraud triangle was Donald Cressey.  Cressey was a co-author with and student of Edwin Sutherland.   He defined the fraud problem as a “violation of a position of financial trust that the person originally took in good faith.”

Although Cressey and Sutherland were linked to the concepts embedded in the fraud triangle, neither referred to the term “fraud triangle” or the visual depiction.

Understanding fraud and why it occurs requires a deep understanding of the philosophy and concepts behind each leg of the fraud triangle: pressure, opportunity and rationalization. Organizations can take real, visible action to reduce the risk of opportunity by implementing better internal controls and processes. Individuals’ moral framework and corporate culture, included in realization and pressure, are far more difficult to affect explicitly and directly. By understanding these concepts and the profile of the typical white collar fraudster, individuals can begin taking proactive steps towards fraud mitigation.

Note: Information within this course comes from readily available public domain documents and is utilized by the trainer as a supplement for relaying the course content.

LOGIN