• Skip to content
  • Skip to navigation
  • English
  • italiano
  • English
  • italiano
Global site
  • Insights
    • Advisory
      • Advisory
      • Transactional advisory services
      • Valuations
      • Mergers and acquisitions
      • Forensic and investigation services
      • Recovery & reorganisation
      • Business risk services
      • Business consulting
      • Capital market
    • Tax & Legal
      • Tax & Legal
      • Corporate and business tax
      • Direct international tax
      • Global mobility services
      • Indirect international tax
      • Transfer pricing
      • Litigation
      • Family business
      • Legal
    • Outsourcing
      • Outsourcing
      • Back office outsourcing
      • Business process outsourcing
      • Compilation of financial statements
      • Tax compliance
      • Electronic invoicing
      • Electronic storage
      • Revaluation of corporate assets
    • Payroll & Labor Consulting
      • Payroll & Labor Consulting
      • Payroll
      • Labor consultancy
      • HR & Payroll Advisory Services
      • Extended services
      • HR Infinity Portal
    • Technology & Innovation
      • Technology & Innovation
      • Cybersecurity
      • Agile and Programme Management
      • Robotic Process Automation
      • Data strategy and management
      • Enterprise Resource Planning
      • IT strategy
      • IT service management
      • DORA and NIS 2
  • Meet our people
  • Locations
  • About us
  • Careers
  • TopHic
Global site
  1. Home
  2. Forensic & Investigation
  3. Occupational frauds
  4. Occupational frauds: how they are detected

How to detect an occupational fraud

23 Jul 2018

Occupational frauds: how they are detected

How occupational fraud is detected

The survey ‘Report to the Nations 2018’ published by ACFE highlights that, since 2010 – the first year of publication of the series of reports by ACFE – in most cases (68%) frauds are detected by i) tips, ii) internal audit and iii) management review. Tips are the most popular detection method (40% of cases).

 Occupational frauds: detection methods

Mainly, tips were provided by employees of victim organizations (53%), followed by those coming from people outside the organization, such as suppliers and competitors (32%).

 Occupational frauds: whistleblowers

Moreover, 14% of tips came from an anonymous source, usually for fear of backlash.

During the years, the creation of dedicated hotlines has contributed to increase the number of tips. The survey also highlights that organizations with hotlines have suffered smaller fraud losses than those without this kind of reporting tools. 

Although dedicated hotlines are most popular (42%), tips are also provided through other channels: emails (26%), online forms (23%), mailed letters (16%), fax (1%) and other (9%). Additionally, when a specifically codified reporting method is not used, employees usually report to: direct supervisors (32%), executives (13%), fraud identification teams (13%), colleagues (2%) and internal audit teams (10%).

 Occupational frauds: tools

 

Corruption is particularly likely to be detected by tip (50%), followed by asset misappropriation and financial statements frauds (both at 38%).

 Occupational frauds: percentages

Detection methods are strictly connected to the median losses suffered and the duration of the fraud scheme. Indeed, the more an organization works proactively to identify potential red flag situations, the smaller the losses suffered and the shorter the period between the fraud inception and its detection.

The ACFE survey grouped detection methods into three categories: active, passive, potentially active or passive. Active detection methods include a deliberate search of potential illicit or unlawful conducts within the organization or an internal control specifically designed to detect frauds.

Passive detection methods include cases in which the organization discovers the fraud by accident, confession or notification by law enforcement. The cases in which frauds are detected by external audit or tips are classified as potentially active or passive detection methods because those mechanisms might or might not involve a proactive effort to identify fraud, depending on the circumstances.

The takeaway message of this analysis is that organizations have to implement tools, instruments and procedures to identify quickly potential risky conducts that might turn into frauds, thus reducing the impact in term of losses.

To this extent, an organization can prevent or at least limit the impact of frauds by implementing the following actions:

Dissemination of clear corporate rules as a deterrent

Fighting the risk of frauds requires a twofold approach: communicating to all the people in the organization that specific controls are in place to detect potential fraudulent conducts and clarifying to all the people in the organization which conducts are accepted or prohibited as well as the sanctions the company will apply in case of illicit conducts.

Identification of weaknesses and loopholes in the system

Weaknesses can be detected when the internal controls designed to prevent the improper or non-authorised use of corporate assets do not work properly.

Understanding key internal controls efficiently is possible when corporate processes are well-known and there is a deep awareness of the different types of frauds and perpetrators. Consequently, the management has to identify the key internal controls capable of preventing frauds in every business areas and understand the level of efficacy of those controls.

Understanding the company business and the relevant procedures

It is key for the management to have a deep and full understanding of the company business and the relevant procedures, foreign entities and subsidiaries, supply procedures and non-core business activities.  A scarce understanding of the business, of the procedures and of the existing controls might expose the company to the risk that a fraud occurs.

In most companies, data and information are generally processed and transmitted electronically. It is vital that a company knows where these data and information are stored, how they are treated or processed and the risks that might arise from their losses or dissemination to third unauthorised parties. Moreover, an organization shall ascertain that the existing procedures and controls are actually implemented to protect the use and treatment of those data and information.  

Occupational frauds

Occupational frauds: the ACFE report

Read article
Occupational frauds

How occupational fraud is committed

Read article
Occupational frauds:

Who are the victims of occupational frauds?

Read article
Occupational frauds

How the lack of internal control can contribute to frauds

Read article
Occupational frauds

Who are the perpetrators of occupational frauds

Read articles
Share this page
  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp
  • Email

CONNECT CONNECT

  • Contact us
  • Meet our people
  • Global reach
  • Bernoni Grant Thortnon - LinkedIn

ABOUT ABOUT

LEGAL LEGAL

  • Disclaimer
  • Privacy & Cookie policy
  • Site map
  • Cookie Preferences

Follow usFollow us

© 2025 Bernoni & Partners. Tax code and VAT n. IT 01692980152 - All rights reserved. "Grant Thornton” refers to the brand under which the Grant Thornton member firms provide assurance, tax and advisory services to their clients and/or refers to one or more member firms, as the context requires. Bernoni Grant Thornton (Bernoni & Partners) is a member firm of Grant Thornton International Ltd (GTIL). GTIL and the member firms are not a worldwide partnership. GTIL and each member firm is a separate legal entity. Services are delivered by the member firms. GTIL does not provide services to clients. GTIL and its member firms are not agents of, and do not obligate, one another and are not liable for one another’s acts or omissions.