The New Robber Barons: stealing profits and damaging our economy Martin S. Bressler Professor of Marketing & Entrepreneurship Houston Baptist Universi

Similar documents
security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Personal Cybersecurity

Small Business FRAUD PREVENTION Manual

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

THE SMALL BUSINESS FRAUD PREVENTION MANUAL

Cybersecurity and Hospitals: A Board Perspective

Cyber Crime Update. Mark Brett Programme Director February 2016

U.S. State of Cybercrime

Thailand Initiatives and Challenges in Cyber Terrorism

Cyber Security. Activities of an national insurance association based on the example of VVO

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

Panda Security 2010 Page 1

The Evolving Threat. Today s cyber security challenges and solutions

THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR

2017 retail crime survey. summary

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

716 West Ave Austin, TX USA

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI)

The Cyber War on Small Business

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Smart Policing and Technology Applications

Fraud Mobility: Exploitation Patterns and Insights

ESET CYBERSECURITY BAROMETER

Small Business Is Big Business in Cybercrime A TrendLabs Primer

Perspectives on Threat

2005 E-Crime Watch Survey Survey Results Conducted by CSO magazine in cooperation with the U.S. Secret Service and CERT Coordination Center

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Why you MUST protect your customer data

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

SEACEN Cyber Security Summit 2014 Demystifying Cyber Risks: Evolving Regulatory Expectations

National Policy and Guiding Principles

FOREWORD DR PHILIP SMITH MBE CHAIRMAN MILTON KEYNES BUSINESS LEADERS PARTNERSHIP

2018 HISCOX Small Business Cyber Risk Report

Introduction to Ethical Hacking. Chapter 1

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

Cyber Fraud What can you do about it?

Building a Threat Intelligence Program

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Cybercrime against Businesses, 2005

Digital Crime and Cybersecurity. Scott D. Ramsey, Managing Director May 2017

Second International Barometer of Security in SMBs

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cybersecurity 2016 Survey Summary Report of Survey Results

THE CYBERSECURITY LITERACY CONFIDENCE GAP

IS Today: Managing in a Digital World 9/17/12

Keys to a more secure data environment

Chapter 10: Security and Ethical Challenges of E-Business

2012 Cost of Cyber Crime Study: United States

ISACA West Florida Chapter - Cybersecurity Event

Employee Security Awareness Training

2014 TRANSIT CEOs SEMINAR. Cybersecurity What Every CEO Should Know to Help Secure the System

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

UK Perspectives on Cyber Crime: victims, offences and offenders

Scans everything Finds everything Blocks... Everything.

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy

Cybercrime Criminal Law Definitions and Concepts

Police & Crime Commissioner Performance Monitoring Group. 18th December 2015 OPEN AGENDA

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Gold finger: Fingerprints lead biometric authentication

Identity Theft and Account Takeover Prevention

Defense in Depth Security in the Enterprise

Experian Fraud Prevention Solutions

Chapter 1 Ethical Hacking Overview. Revised

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

INTO THE WEB OF PROFIT: TRACKING THE PROCEEDS OF CYBERCRIME

RUSSELL BOHSE.

DIRECT TESTIMONY OF RICHARD P. NUZZO (SECURITY INFRASTRUCTURE)

Radix Acceptable Use and Anti-Abuse Policy

ELECTRONIC BANKING & ONLINE AUTHENTICATION

WHO PROTECTS YOUR MAIL? MAILERS TECHNICAL ADVISORY COMMITTEE Guy Cottrell, Chief Postal Inspector

Legal Foundation and Enforcement: Promoting Cybersecurity

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Media Kit. California Cybersecurity Institute

A General Review of Key Security Strategies

The Data Breach: How to Stay Defensible Before, During & After the Incident

Vulnerability Assessment. Detection. Aspects of Assessment. 1. Asset Identification. 1. Asset Identification. How Much Danger Am I In?

Securing Information Systems

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects

Cyber and data security How prepared is your charity?

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Retail/Consumer Client Internet Banking Awareness and Education Program

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Retail Security in a World of Digital Touchpoint Complexity

Phishing Activity Trends Report October, 2004

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

The Global Cybercrime Industry

Chapter 6 Network and Internet Security and Privacy

Transcription:

Research in Progress ASBE 35th: Proceedings Page -481-

The New Robber Barons: stealing profits and damaging our economy Martin S. Bressler Professor of Marketing & Entrepreneurship Houston Baptist University ASBE 35th: Proceedings Page -483-

The New Robber Barons: stealing profits and damaging our economy Abstract Business news is often filled with stories of executives or other employees caught embezzling or committing fraud. These robber barons not only cost companies profits, but also harm our economy. Crimes committed against businesses, whether by employees or outsiders, may even cause some businesses to fail. This paper examines the various crimes committed against businesses and offers some measures to help prevent and reduce the impact of business crime. Introduction Businesses are susceptible to a wide variety of crimes ranging from fraud and embezzlement, to computer hacking and vandalism. Because of this, businesses need to be vigilant in protecting company assets and preventing criminal activity from causing the business to fail. In addition to the crimes noted above, other crimes may include shoplifting, piracy and counterfeiting. Sometimes crimes may be committed by outsiders although in some cases, executives and employees commit crimes against the business. In other cases, businesses unknowingly become party to money-laundering crimes. Business crime is not a new phenomenon. A review of the literature details numerous examples recorded throughout history. The 1995 SBCI survey indicated that 35% of retailers reported customer theft, similar to percentages reported by the manufacturing and wholesaling industries. Overall, 75% of businesses surveyed reported an average 3.5 incidents of crime (Burrows and Hopkins, 2005). The U.S. Chamber of Commerce reports 30% of businesses fail due to costs associated criminal activity (U.S. Chamber of Commerce, 1995). preventive measures should be taken to reduce the incidence and severity of crimes committed against your business The economy may be a factor in the rate of crime committed against business. The National White Collar Crime Center reports the two most recent recessions recorded increased arrests for embezzlement and fraud (Business Week Online, January 12). While larger businesses get the most headlines, smaller businesses may be especially vulnerable to crime because smaller businesses may not have the necessary safeguards to help prevent criminal activity. With the development of the commercial Internet, the number and types of crimes against business has changed. In 1996, (just as the commercial Internet was being developed) the U.S. Small Business Administration conducted a survey of 400 firms and found approximately 13% of businesses surveyed were crime victims. In addition, less than half (48%) of surveyed businesses reported utilizing security measures. Businesses also reported that in ASBE 35th: Proceedings Page -484-

many cases crime, particularly employee theft went unreported to the police (Small Business Research Summary, 1997). The total cost of crime to business may be difficult to measure, however, the 2007 report Crime in the United States, reports the value of stolen office equipment alone to be an estimated $656,982,032. Burglaries on average cost businesses $1,989 and each incident of shoplifting costs $205. The difficulty in determining accurate data may be due to the fact that many business crimes go unreported. Small businesses are less likely to report criminal activity in part because many are afraid of negative publicity or loss of investor confidence. Literature Review Types of criminal activity With the commercial development of the Internet, cybercrime activity began to increase. The National Computer Crime Survey reported in 1995 that 67 percent of businesses surveyed suffered at least one cyber attack (Bureau of Justice Statistics, 2008). More than half (60%) the cyber attacks were theft-related; the other incidents involved uploaded viruses to the company computer system. In many cases, (68%) cyber attacks cost the business $10,000 or more (Bureau of Justice Statistics, 2008). Not surprising, computer attacks are on the rise. According to Yueh (2004), businesses reported an increase of 40% in the number of computer attacks from the previous year, resulting in $42 billion in additional costs to business. Accordingly, by 2004, companies spent an estimated $30 billion on information technology security systems to protect corporate websites. That figure represents more than double the amount spent in 2001, just three years previous (Gantz, 2001). Table 1. Crimes committed against businesses External Internal Robbery Theft (money/equipment) Burglary Embezzlement Shoplifting Intellectual property theft Counterfeiting Customer identity theft Piracy Sabotage Money laundering Money laundering Vandalism Fraudulent invoicing Ponzi schemes Computer hacking Falsifying expense reports Payroll fraud ASBE 35th: Proceedings Page -485-

Dennis (2008), reporting in a National Federation of Independent Business study, found that within the previous three years 52 percent of businesses became crime victims. In addition, the report cited vandalism the most common crime overall, with shoplifting the most common crime reported by the retail industry. Vandalism is more serious a crime than many business owners realize. According to the U.S. Small Business Administration, the typical incident of vandalism costs $3,370 (http:www.nfib.com/object/io_31210.html). This means that the average small business with $500,000 revenue per year and a 5% net margin would result in a 13.5% lower net profit. Smaller Businesses more prone to crime Despite fewer employees and smaller revenues, small businesses may be more susceptible to business crime. As most businesses are small businesses, nearly half of the U.S. workforce is employed in small businesses. The Association for Certified Fraud Examiners indicates 39% of reported instances of fraud occur in companies with 99 or fewer employees (Bank Technology News). The U.S. Small Business Administration reports 13% of small businesses become crime victims, yet less than half (48%) instituted any preventive measures (Small Business Research Summary). This could be a major reason why crime is a major factor in up to 30% of small business failures (U.S. Chamber of Commerce). In addition, small business ventures with less than $5 million in annual revenues may be up to thirty-five times more likely to become a crime victim than their larger counterparts (U.S. Chamber of Commerce). Unfortunately, small business owners prosecute less than 30% of fraud cases (Larimer, 2006). Many crimes committed against small business go unreported to police for a variety of reasons. In some cases, crimes committed by employees or local persons known to the business owner go unreported as the business owner might not want to press charges for fear of negative publicity or loss of confidence in the business. In other instances, such as vandalism, small business owners might assume that police would be unable to apprehend and charge the vandals. ASBE 35th: Proceedings Page -486-

Preventive measures cost significantly less than the cost to remedy crime committed against the business. Even small businesses can reduce the likelihood of becoming a crime victim and the severity of criminal activity with some fairly low-cost actions. Larimer (2006) reported that small businesses suffered greater losses from fraud than larger businesses, $190,000 per incident versus $159,000 for larger businesses. In a study of small businesses Kuratko (2000) found small business owners on average spent $7,805 on security. Stated another way, small business losses amount to approximately twenty-five times the amount spent for preventive security measures. Additional investment for security measures might result in fewer and smaller losses. Discussion Crime Prevention Welsh & Farrington (1995) provide several crime prevention strategies. The first, situational strategy relies upon surveillance techniques including alarms, video monitors or employees. Developmental Strategy examines root causes of crime ranging from juvenile delinquency to poverty and even economic cycles. Community strategies employ social experiments as well as neighborhood watch programs. Criminal Justice programs build partnerships between law enforcement agencies and local communities. Perhaps the best means to prevent business crime would be to focus on crime prevention. In some instances, simply installing security lighting and requiring employees to wear or carry identification badges may help reduce crime. Preventive actions may include external measures such as locks and key control as well as surveillance cameras and security lighting. Policies centering around hiring and employment should include background checks, drug testing, employee identification, and separation of duties; computer defenses that include secure websites, access authorizations through secure passwords, computer firewalls, and secure Internet payments (Bressler, 2007). Conclusion Crime prevention costs considerably less than the actual costs associated with crime. Businesses, therefore, should focus greater effort on crime detection. Unfortunately, crime prevention requires funding which business of all sizes lack in the current economy. Crime prevention training processes and devices are necessary to reduce the economic losses businesses experience each year. Trends indicate crime will not decrease, nor will the cost of crime diminish. Until businesses begin to address crime with better detection systems, many businesses may become unprofitable or fail. ASBE 35th: Proceedings Page -487-

Figure 1 A Three-Stage Model for Prevention and Detection of Business Criminal Activity Prevention Lighting Minimal cash on hand Key control Check identification Employee identification Background checks Authorization procedures Locks Pay everything by check and no use of manual checks Do not delegate check signing Outsource payroll Computer firewalls Secure passwords Secure websites Employee training Burglar alarms Surveillance cameras Secure Internet payment Separation of duties Drug testing Alarm systems Equipment tagging Ground-flopor location Security guards or guard dogs Management setting an ethical example and ethics statements Policy and Procedures manuals Detection Unscheduled audits Internal auditors External auditiors AIS software Police Monitoring employees Lifestyle changes Behavior indicators Customer complaints Financial statement analysis Frequently check bank statements Alarm systems Scanning EBay and want ads Reporting hotlines Look for exceptions, such as manual checks Remedies Insurance Prosecution Expert witnesses Employee dismissal Punitive damages Settlements/negotiations Source: Bressler, 2007 ASBE 35th: Proceedings Page -488-

References Bressler, L. & Bressler, M. (2007). A Model for Prevention and Detection of Criminal Activity Impacting Small Business. Entrepreneur Executive, Volume 12, 23-36. Bureau of Justice Statistics, 2008. Sixty-seven percent of responding businesses detected cybercrime in 2005. U.S. Department of Justice, Office of Justice Programs. September 17, 2008. Burrows, J. & Hopkins, M. (2005) Business and crime in Tilley, N. (2005) (Ed.) Handbook of crime prevention and community safety. Devon, Willan Publishing. Crime in the United States 2007. http://www.fbi.gov/ucr/cius2007/data/table/23.html Dennis, W. (2008). 411 Small Business Facts, Volume 8, Issue 5. ISSN-1534-8326. Gantz, J. (2001). Take a Bite Out of Crime on the Web. Computerworld, February 19, Volume 35, Issue 8, 29. Keeping Tricksters Away 10/31/2006 http:www.nfib.com/object/io_31210.html Kuratko, D., Hornsby, J., Naffziger, D., & Hodgetts, R. (2000). Crime and Small Business: An Exploratory Study of Cost and Prevention Issues in U.S. Firms. Journal of Small Business Management; July, 2000; 38, 3; ABI/Inform Global pg. 1. Larimer, R. (2006, October 13). American Businesses Lose Nearly $652 billion to Fraud and Embezzlement Each Year. Colorado Springs Business Journal. Levisohn, B. (2009). Experts Say Fraud Likely to Rise. Business Week Online [serial online]. January 12, 2009: 14-14. Available from: Business Source Complete, Ipswich, MA. Accessed February 18. Small Business Research Summary, 1997, Office of Advocacy, U.S. Small Business Administration, No. 176, March. Welsh, B. & Farrington, D. (2000). Monetary Costs and Benefits of Crime Prevention Programs. Crime and Justice, 27, 305-361. Yueh, T. (2004). Worms and Viruses-Are You Under a Constant Security Siege? Get Smart about Network Security. 08/01/2004 http:www.nfib.com/object/io_17267.html ASBE 35th: Proceedings Page -489-