Fraud Resources

Fraud Schemes

Fraud can be devastating to organizations of all sizes — especially as financial transactions and fraud schemes become more complex and sophisticated with technological advancements. Recognizing the wide variety of internal and external fraud threats is essential to detecting and deterring fraud.

Explore Fraud Schemes Resources

View all items related to this topic below. Visit Fraud Resource Library
View articles, reports and resources below. Fraud Examiner Article
Earn CPE through self-study courses designed with your busy schedule in mind. View All CPE Courses
Attend an event on this topic to earn CPE in a format that works with your schedule. View our Calendar of Events

Filter by:

  • Field of Study
  • Course Level

Results (104)

Antwerp World Diamond Center</a> (AWDC), about 1,700 companies and 4,500 traders concentrated in an area of about one square kilometer trade <a href=https://www.acfe.com/"https://www.theguardian.com/world/2022/nov/20/belgium-trade-russian-diamonds-despite-moral-pressure/">84% of all rough diamonds worldwide</a>. </p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/acfe-insights/gettyimages-sb10065243i-001.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"74df4bb8-9124-43e2-a107-b1f4162a96aa","IsEthicsCpe":false,"ItemImageAlt":"Antwerp","ItemImageUrl":"/-/media/images/shared/acfe-insights/gettyimages-sb10065243i-001.jpg","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=antwerp-diamond-trade","SubCategory":"Article","Title":"Antwerp’s Diamond Trade: A Brilliant Tale of Risky Business Practices","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"74df4bb8-9124-43e2-a107-b1f4162a96aa","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=antwerp-diamond-trade","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p>As the modern fascination with true crime escalates, perhaps no documentarian today presents the stories of our past with more profundity than Joe Berlinger. The director&rsquo;s next endeavor figures to hit home for not just millions of Americans but anti-fraud professionals around the world, too.&nbsp;</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/madoff-netflix.png","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"f5df3341-22b9-4cf3-b8c8-98aec450b061","IsEthicsCpe":false,"ItemImageAlt":"Madoff-Netflix-Docuseries","ItemImageUrl":"/-/media/images/acfe/blog/madoff-netflix.png","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=madoff-the-monster-of-wall-street-netflix-series","SubCategory":"Article","Title":"\"Madoff: The Monster of Wall Street\": Netflix Releases Gripping New Series","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"f5df3341-22b9-4cf3-b8c8-98aec450b061","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=madoff-the-monster-of-wall-street-netflix-series","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p>Joseph Cox, an investigative reporter at VICE, enlisted the help of a friendly hacker to report on a service called Sakari, a company that streamlines mass SMS messaging for businesses. The hacker was able to use the service to reroute all of Cox&rsquo;s text messages to the hacker&rsquo;s device, and Cox didn&rsquo;t receive a single notification about the theft of his number. He just stopped receiving text messages.</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/Assets/Images/article_transparent.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"1c71c1d6-c409-42ef-aabe-443405477ca6","IsEthicsCpe":false,"ItemImageAlt":"Man uses phone to text","ItemImageUrl":"","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=a-stolen-text-messages-hack-that-only-costs-16-dollars","SubCategory":"Article","Title":"A Stolen Text Messages Hack That Only Costs $16","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"1c71c1d6-c409-42ef-aabe-443405477ca6","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=a-stolen-text-messages-hack-that-only-costs-16-dollars","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":false,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p class=\"\" style=\"white-space:pre-wrap;\">In the most recent episode of the ACFE’s podcast, Fraud Talk, Julia Johnson, CFE, Research Specialist at the ACFE, breaks down three recent case studies of frauds that were committed from behind bars. She explains how the schemes were perpetrated and what fraud examiners can learn from each case.</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/fraud-talk-julia-johnson-ep-88.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"917b7d72-76dd-4e39-a72c-8090f74f260a","IsEthicsCpe":false,"ItemImageAlt":"Julia Johnson Fraud Talk 2019","ItemImageUrl":"/-/media/images/acfe/blog/fraud-talk-julia-johnson-ep-88.jpg","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=frauds-perpetrated-from-prison-fraud-talk-podcast","SubCategory":"Article","Title":"Fraud Is the New Black: 3 Frauds Perpetrated From Prison","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"917b7d72-76dd-4e39-a72c-8090f74f260a","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=frauds-perpetrated-from-prison-fraud-talk-podcast","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p class=\"\">As experienced fraud examiners know, fraud comes in many varieties, including tales that are truly frightening. These fraudsters were willing to play any type of trick to take their ill-begotten treats. Read on to learn more about this year’s tales of terrifying fraud, but don’t say we didn’t warn you.</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/acfe-insights/gettyimages-1348611836.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"bb68be56-5c06-40e3-9f6a-09aaf29b628a","IsEthicsCpe":false,"ItemImageAlt":"Halloween fraud stories","ItemImageUrl":"/-/media/images/shared/acfe-insights/gettyimages-1348611836.jpg","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=scary-fraud-stories-to-keep-you-up-at-night","SubCategory":"Article","Title":"Terrifying Tales of Fraud to Keep You Up at Night","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"bb68be56-5c06-40e3-9f6a-09aaf29b628a","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=scary-fraud-stories-to-keep-you-up-at-night","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"After seven days of deliberations, a jury in California found Theranos founder Elizabeth Holmes guilty on four out of 11 federal fraud charges on January 3, 2022.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/elizabeth-holmes-blog.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"940cd185-11f9-43ec-931b-b35f8f4a25bf","IsEthicsCpe":false,"ItemImageAlt":"elizabeth holmes blog","ItemImageUrl":"/-/media/images/acfe/blog/elizabeth-holmes-blog.jpg","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=elizabeth-holmes-found-guilty-on-four-charges-of-fraud","SubCategory":"Article","Title":"Elizabeth Holmes Found Guilty on Four Charges of Fraud","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"940cd185-11f9-43ec-931b-b35f8f4a25bf","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=elizabeth-holmes-found-guilty-on-four-charges-of-fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"There are consistent factors in fraud, like social engineering tactics that exploit human behavioral tendencies or external financial pressures that lead fraudsters to commit their crimes, but there are also trends and themes that emerge and affect the anti-fraud profession on a more limited timeframe.&nbsp;","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/fraud-trends.png","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"526279d5-0f5c-4d41-8851-80bf794afed7","IsEthicsCpe":false,"ItemImageAlt":"upward-arrow-fraud-trends","ItemImageUrl":"/-/media/images/acfe/blog/fraud-trends.png","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=top-5-fraud-trends-of-2024","SubCategory":"Article","Title":"Top 5 Fraud Trends of 2024","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"526279d5-0f5c-4d41-8851-80bf794afed7","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=top-5-fraud-trends-of-2024","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"The SNPR&nbsp;<a href=https://www.acfe.com/"https://www.ftc.gov/system/files/ftc_gov/pdf/r207000_impersonation_snprm.pdf/">proposal&nbsp;seeks to &ldquo;add a prohibition on the impersonation of individuals and extend liability for violations of the Rule to parties who provide goods and services with knowledge or reason to know that those goods or services will be used in impersonations of the kind that are themselves unlawful under the Rule.&rdquo;&nbsp;&nbsp;","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/ftc-impersonation-rule.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"2a405082-881b-4b6e-ae61-1ba01984fa29","IsEthicsCpe":false,"ItemImageAlt":"FTC Impersonation Rule","ItemImageUrl":"/-/media/images/acfe/blog/ftc-impersonation-rule.jpg","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=ftc-impersonation-rule","SubCategory":"Article","Title":"The FTC's Battle Against Impersonation Fraud in the Digital Age","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"2a405082-881b-4b6e-ae61-1ba01984fa29","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=ftc-impersonation-rule","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"While the Internet offers a global marketplace for consumers and businesses, it also presents endless potential for crooks and scammers. The same scams found through the...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/acfe-books/ifcb/internet-fraud-casebook-copy.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"cc187317-a426-442c-adad-e094c6ed311a","IsEthicsCpe":false,"ItemImageAlt":"Image of Internet Fraud Casebook","ItemImageUrl":"/-/media/images/acfe/products/publication/books/acfe-books/ifcb/internet-fraud-casebook-copy.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Internet-Fraud-Casebook-The-World-Wide-Web-of-Deceit","SubCategory":"Publication","Title":"Internet Fraud Casebook: The World Wide Web of Deceit","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"cc187317-a426-442c-adad-e094c6ed311a","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Internet-Fraud-Casebook-The-World-Wide-Web-of-Deceit","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Like Victor Frankenstein, who gave life to the Creature in Mary Shelley's Frankenstein, the ten criminals profiled in this book produced heinous creations that came back...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/frankensteins-of-fraud.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"b13567cd-9091-4c95-a0c0-73837781a300","IsEthicsCpe":false,"ItemImageAlt":"frankensteins-of-fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/frankensteins-of-fraud.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Frankensteins-of-Fraud","SubCategory":"Publication","Title":"Frankensteins of Fraud","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b13567cd-9091-4c95-a0c0-73837781a300","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Frankensteins-of-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/insurance-fraud-casebook.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"5508bb6d-97be-442d-874b-aa2d12c5f1e9","IsEthicsCpe":false,"ItemImageAlt":"Insurance Fraud Casebook","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/insurance-fraud-casebook.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Insurance-Fraud-Casebook-Paying-a-Premium-for-Crime","SubCategory":"Publication","Title":"Insurance Fraud Casebook: Paying a Premium for Crime","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"5508bb6d-97be-442d-874b-aa2d12c5f1e9","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Insurance-Fraud-Casebook-Paying-a-Premium-for-Crime","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/acfe-books/fsf-casebook.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"e3072b47-f58a-4f56-9931-9f1799750f72","IsEthicsCpe":false,"ItemImageAlt":"Cover of the book Computer Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/books/acfe-books/fsf-casebook.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Financial-Statement-Fraud-Casebook-Baking-the-Ledgers-and-Cooking-the-Books","SubCategory":"Publication","Title":"Financial Statement Fraud Casebook: Baking the Ledgers and Cooking the Books","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"e3072b47-f58a-4f56-9931-9f1799750f72","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Financial-Statement-Fraud-Casebook-Baking-the-Ledgers-and-Cooking-the-Books","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"This is a story about an accidental activist. Bill Browder started out his adult life as the Wall Street maverick whose instincts led him to Russia just after the breakup&hellip;","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/book-red_notice-thumbnail.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"e16bbe88-4bff-4c32-8479-8ebe36ab8c41","IsEthicsCpe":false,"ItemImageAlt":"image of a shadowed figure facing an empty space between two sets of shadowed buildings","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/book-red_notice-thumbnail.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Red-Notice-A-True-Story-of-High-Finance-Murder-and-One-Mans-Fight-for-Justice","SubCategory":"Publication","Title":"Red Notice: A True Story of High Finance, Murder and One Man's Fight for Justice","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"e16bbe88-4bff-4c32-8479-8ebe36ab8c41","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Red-Notice-A-True-Story-of-High-Finance-Murder-and-One-Mans-Fight-for-Justice","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"\"Fraud In the Markets\"&nbsp;reveals the critical role fraud played in the global financial crisis-even as many of the perpetrators continue to go unpunished. Shedding light...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/fraud-and-the-markets.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"a2b1a363-606d-480b-a841-93afde2c1b0f","IsEthicsCpe":false,"ItemImageAlt":"Black book with red grahic and large white font","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/fraud-and-the-markets.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-the-Markets-Why-it-Happens-and-How-to-Fight-it","SubCategory":"Publication","Title":"Fraud in the Markets: Why it Happens and How to Fight it","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"a2b1a363-606d-480b-a841-93afde2c1b0f","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-the-Markets-Why-it-Happens-and-How-to-Fight-it","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"A hidden circulatory system flows beneath the surface of global finance, carrying trillions of dollars from drug trafficking, tax evasion, bribery and other illegal&hellip;","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/hardcover-secrecy-world.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"4f5dc299-2437-448f-80a1-d0378ad2432d","IsEthicsCpe":false,"ItemImageAlt":"Image of a pyramid with the tip being the eye of the pyramid from the dollar bill","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/hardcover-secrecy-world.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=secrecy-world","SubCategory":"Publication","Title":"Secrecy World: Inside the Panama Papers Investigation of Illicit Money Networks and the Global Elite","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"4f5dc299-2437-448f-80a1-d0378ad2432d","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=secrecy-world","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Business headlines today reflect an ongoing litany of \"misdirected\" assets, restated earnings, and out-and-out fraud. These cases, representing some of the biggest names...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/fraud-nonprofit.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"eb54f419-5b3e-49a0-875e-ecda6406ca68","IsEthicsCpe":false,"ItemImageAlt":"Book cover for Fraud and Abuse in Nonprofit Organizations","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/fraud-nonprofit.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-and-Abuse-in-Nonprofit-Organizations","SubCategory":"Publication","Title":"Fraud and Abuse in Nonprofit Organizations","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"eb54f419-5b3e-49a0-875e-ecda6406ca68","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-and-Abuse-in-Nonprofit-Organizations","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In United States v. Quintero-Lopez, 15 defendants were indicted on 70 counts in the Southern District of Florida for a mortgage fraud scheme involving 16 fraudulent loans...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/acfe-books/mortgage-fraud.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"0f05c416-c98e-4b03-96cc-ba2929277b12","IsEthicsCpe":false,"ItemImageAlt":"Cover of the book Mortgage Fraud and the Illegal Property Flipping Scheme","ItemImageUrl":"/-/media/images/acfe/products/publication/books/acfe-books/mortgage-fraud.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Mortgage-Fraud-and-the-Illegal-Property-Flipping-Scheme-A-Case-Study-of-United-States-v-Quintero-Lopez","SubCategory":"Publication","Title":"Mortgage Fraud and the Illegal Property Flipping Scheme: A Case Study of United States v. Quintero-Lopez","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"0f05c416-c98e-4b03-96cc-ba2929277b12","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Mortgage-Fraud-and-the-Illegal-Property-Flipping-Scheme-A-Case-Study-of-United-States-v-Quintero-Lopez","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"This book details the relationship between the rise of the Indian-American elite and the collapse of the Galleon Group, a hedge fund that managed more than $7 billion in...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/billionaire-apprentice.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"3113c1bf-42b9-4526-ba23-22f6e8174026","IsEthicsCpe":false,"ItemImageAlt":"Cover of the book The Billionaire's Apprentice","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/billionaire-apprentice.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Billionaires-Apprentice-The-Rise-of-The-Indian-American-Elite-and-The-Fall-of-The-Galleon-Hedge-Fund","SubCategory":"Publication","Title":"The Billionaire's Apprentice: The Rise of The Indian-American Elite and The Fall of The Galleon Hedge Fund","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"3113c1bf-42b9-4526-ba23-22f6e8174026","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Billionaires-Apprentice-The-Rise-of-The-Indian-American-Elite-and-The-Fall-of-The-Galleon-Hedge-Fund","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"This book shows you how to detect, deter and resolve financial fraud cases. It provides an understanding of the tools needed to detect issues, and action lists to recover...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/money-laundering-prevention.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"ed9dc86b-2313-4bec-abf6-4c5aecaa34ef","IsEthicsCpe":false,"ItemImageAlt":"money-laundering-prevention","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/money-laundering-prevention.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Money-Laundering-Prevention-Deterring-Detecting-and-Resolving-Financial-Fraud","SubCategory":"Publication","Title":"Money Laundering Prevention: Deterring, Detecting and Resolving Financial Fraud","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ed9dc86b-2313-4bec-abf6-4c5aecaa34ef","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Money-Laundering-Prevention-Deterring-Detecting-and-Resolving-Financial-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"\"Billion Dollar Whale\" is \"an epic tale of white-collar crime on a global scale\" (Publishers Weekly), revealing how a young social climber from Malaysia pulled off one of&hellip;","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/hardcover-billion-dollar-whale.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"c023390e-87f8-4533-b524-9f321668ccd1","IsEthicsCpe":false,"ItemImageAlt":"Image of the title Billion Dollar Whale infront of a background of falling dollar bills","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/hardcover-billion-dollar-whale.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=billion-dollar-whale-the-man-who-fooled-wall-street-hollywood-and-the-world","SubCategory":"Publication","Title":"Billion Dollar Whale: The Man Who Fooled Wall Street, Hollywood, and the World","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"c023390e-87f8-4533-b524-9f321668ccd1","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=billion-dollar-whale-the-man-who-fooled-wall-street-hollywood-and-the-world","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Fraud Casebook: Lessons from the Bad Side of Business is the most comprehensive book ever compiled on fraud case studies, presenting the collected insights of some of...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/fraud-casebook.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"e53de7a8-196e-455b-bd7a-9246beb119c4","IsEthicsCpe":false,"ItemImageAlt":"fraud-casebook","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/fraud-casebook.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-Casebook-Lessons-from-the-Bad-Side-of-Business","SubCategory":"Publication","Title":"Fraud Casebook: Lessons from the Bad Side of Business","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"e53de7a8-196e-455b-bd7a-9246beb119c4","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-Casebook-Lessons-from-the-Bad-Side-of-Business","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In 1995 Computer Fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/acfe-books/thumb_computer-fraud-casebook.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"cf1dc1ee-2c79-4f3d-97a8-fedb773ea6ef","IsEthicsCpe":false,"ItemImageAlt":"Computer Fraud Casebook","ItemImageUrl":"/-/media/images/acfe/products/publication/books/acfe-books/thumb_computer-fraud-casebook.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Computer-Fraud-Casebook-The-Bytes-that-Bite","SubCategory":"Publication","Title":"Computer Fraud Casebook: The Bytes that Bite","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"cf1dc1ee-2c79-4f3d-97a8-fedb773ea6ef","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Computer-Fraud-Casebook-The-Bytes-that-Bite","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"How did the most trusted financial system in the world become the breeding ground for the massive corruption uncovered in the Enron and WorldCom scandals? In this book...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/corporate-crooks.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"812205e9-07dd-48bf-b317-8efe727b4ba4","IsEthicsCpe":false,"ItemImageAlt":"Corporate Crooks: How Rogue Executives Ripped Off Americans...and Congress Helped Them Do It!","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/corporate-crooks.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Corporate-Crooks-How-Rogue-Executives-Ripped-Off-Americansand-Congress-Helped-Them-Do-It","SubCategory":"Publication","Title":"Corporate Crooks: How Rogue Executives Ripped Off Americans...and Congress Helped Them Do It!","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"812205e9-07dd-48bf-b317-8efe727b4ba4","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Corporate-Crooks-How-Rogue-Executives-Ripped-Off-Americansand-Congress-Helped-Them-Do-It","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"From implementing prudent hiring policies and practices through collecting receipts, making deposits, writing checks, and evaluating the adequacy of insurance coverage...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/preventing-employee-theft.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"c1added3-d0ff-47c2-9af6-2d308a94ccc2","IsEthicsCpe":false,"ItemImageAlt":"Book cover for Preventing Employee Theft","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/preventing-employee-theft.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Preventing-and-Detecting-Employee-Theft-and-Embezzlement","SubCategory":"Publication","Title":"Preventing and Detecting Employee Theft and Embezzlement","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"c1added3-d0ff-47c2-9af6-2d308a94ccc2","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Preventing-and-Detecting-Employee-Theft-and-Embezzlement","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/confessionsofaciaspy.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"397f8dc7-ed11-40c0-857b-53ff1d6dc435","IsEthicsCpe":false,"ItemImageAlt":"Cover of Confessions of a CIA Spy","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/confessionsofaciaspy.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=confessions-of-a-cia-spy","SubCategory":"Publication","Title":"Confessions of a CIA Spy: The Art of Human Hacking","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"397f8dc7-ed11-40c0-857b-53ff1d6dc435","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=confessions-of-a-cia-spy","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p class=\"p1\" style=\"color: #343434; background-color: #ffffff; margin-right: 0px; margin-left: 0px;\">11.5 million documents sent through encrypted channels. The secret records of 214,000 offshore companies. The largest data leak in history. In early 2015, an anonymous...</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/panama-papers/1620x1080-resized-only-panama-papers.png","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"d9af6d45-83d7-428e-beb5-ba5706014ca5","IsEthicsCpe":false,"ItemImageAlt":"Cover of The Panama Papers","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/panama-papers/1620x1080-resized-only-panama-papers.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Panama-Papers-Breaking-the-Story-of-How-the-Rich-and-Powerful-Hide-Their-Money","SubCategory":"Publication","Title":"The Panama Papers: Breaking the Story of How the Rich and Powerful Hide Their Money","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d9af6d45-83d7-428e-beb5-ba5706014ca5","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Panama-Papers-Breaking-the-Story-of-How-the-Rich-and-Powerful-Hide-Their-Money","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In this book, you will learn the history of fraud in America and the evolving efforts to combat it &ndash; from the age of P.T. Barnum through the eras of Charles Ponzi and Bernie Madoff.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/fraud-an-american-history.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"416cc2e4-8bd3-4cf8-8929-9361555abfba","IsEthicsCpe":false,"ItemImageAlt":"Fraud: An American History from Barnum to Madoff","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/fraud-an-american-history.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-An-American-History-from-Barnum-to-Madoff","SubCategory":"Publication","Title":"Fraud: An American History from Barnum to Madoff","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"416cc2e4-8bd3-4cf8-8929-9361555abfba","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-An-American-History-from-Barnum-to-Madoff","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"\"Madoff with the Money\" is a deeply disturbing portrait of Bernie Madoff based on dozens of exclusive, news-making interviews. From the values Madoff was taught growing...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/acfe-books/madoff-with-money.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"1a155d0f-70c8-49a3-9e29-813d5629299f","IsEthicsCpe":false,"ItemImageAlt":"Cover of the book Madoff with the Money","ItemImageUrl":"/-/media/images/acfe/products/publication/books/acfe-books/madoff-with-money.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Madoff-with-the-Money","SubCategory":"Publication","Title":"Madoff with the Money","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"1a155d0f-70c8-49a3-9e29-813d5629299f","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Madoff-with-the-Money","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Who is Bernie Madoff, and how did he pull off the biggest Ponzi scheme in history? This question has fascinated people ever since the news broke about the New York...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/wizard-of-lies.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"0e988119-94cf-446f-9231-7e879073a64b","IsEthicsCpe":false,"ItemImageAlt":"Book cover for The Wizard of Lies","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/wizard-of-lies.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Wizard-of-Lies-Bernie-Madoff-and-the-Death-of-Trust","SubCategory":"Publication","Title":"The Wizard of Lies: Bernie Madoff and the Death of Trust","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"0e988119-94cf-446f-9231-7e879073a64b","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Wizard-of-Lies-Bernie-Madoff-and-the-Death-of-Trust","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Identity theft is an evil with a life of its own. It has grown from just an American problem into a worldwide epidemic that shows no signs of ending. If you want to learn...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/id-theft-handbook.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"be554b04-0852-4641-9f1d-fdaf5b2a917d","IsEthicsCpe":false,"ItemImageAlt":"Hardcover book with the top three fourths having a black background adn yellow font, the bottom one fourth with a white background and black font and a black and white computer laptop image in the center.","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/id-theft-handbook.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Identity-Theft-Handbook-Detection-Prevention-and-Security","SubCategory":"Publication","Title":"Identity Theft Handbook: Detection, Prevention and Security","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"be554b04-0852-4641-9f1d-fdaf5b2a917d","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Identity-Theft-Handbook-Detection-Prevention-and-Security","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In this spellbinding true story, a pair of award-winning CNN investigative journalists track down the mysterious French psychic at the center of an international scam...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/deal-with-the-devil.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"386ea1cf-05ca-48a1-afbd-3c23986570c9","IsEthicsCpe":false,"ItemImageAlt":"Book Cover for A Deal with the Devil: The Dark and Twisted True Story of One of the Biggest Cons in History","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/deal-with-the-devil.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=A-Deal-with-the-Devil-The-Dark-and-Twisted-True-Story-of-One-of-the-Biggest-Cons-in-History","SubCategory":"Publication","Title":"A Deal with the Devil: The Dark and Twisted True Story of One of the Biggest Cons in History","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"386ea1cf-05ca-48a1-afbd-3c23986570c9","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=A-Deal-with-the-Devil-The-Dark-and-Twisted-True-Story-of-One-of-the-Biggest-Cons-in-History","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In this book, you will learn the gripping story of Elizabeth Holmes and Theranos &mdash; one of the biggest corporate frauds in history &mdash; a tale of ambition and hubris set amid the bold promises of Silicon Valley, rigorously reported by the author and prize-winning journalist John Carreyrou.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/badblood.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"0d7f0c21-efab-4d83-80d2-ab6204f94bcc","IsEthicsCpe":false,"ItemImageAlt":"Cover of Bad Blood","ItemImageUrl":"/-/media/images/acfe/products/publication/books/badblood.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Bad-Blood-Secrets-and-Lies-in-a-Silicon-Valley-Startup","SubCategory":"Publication","Title":"Bad Blood: Secrets and Lies in a Silicon Valley Strartup","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"0d7f0c21-efab-4d83-80d2-ab6204f94bcc","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Bad-Blood-Secrets-and-Lies-in-a-Silicon-Valley-Startup","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Financial statement fraud (FSF) continues to be a major challenge for organizations worldwide. \"Financial Statement Fraud: Prevention and Detection, Second Edition\" is...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/thumb_financial-statement-fraud.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"19125607-9740-42cb-86c2-7ff8b64ee6c0","IsEthicsCpe":false,"ItemImageAlt":"financial-statement-fraud-p-and-d","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/thumb_financial-statement-fraud.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Financial-Statement-Fraud-Prevention-and-Detection","SubCategory":"Publication","Title":"Financial Statement Fraud: Prevention and Detection","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"19125607-9740-42cb-86c2-7ff8b64ee6c0","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Financial-Statement-Fraud-Prevention-and-Detection","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Research shows that financial statement fraud is the least frequently encountered fraud, but by far the most costly, resulting in a median loss of $1 million per...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/financial-statement-fraud-strategies.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"722faf6a-dff9-4838-867d-faca61f77266","IsEthicsCpe":false,"ItemImageAlt":"financial-statement-fraud-strategies","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/financial-statement-fraud-strategies.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Financial-Statement-Fraud-Strategies-for-Detection-and-Investigation","SubCategory":"Publication","Title":"Financial Statement Fraud: Strategies for Detection and Investigation","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"722faf6a-dff9-4838-867d-faca61f77266","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Financial-Statement-Fraud-Strategies-for-Detection-and-Investigation","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In \"Tangled Webs\", Pulitzer Prize-winning author James B. Stewart applies his investigative reporting and storytelling skills to four dramatic cases all involving people...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/tangledwebs.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"caf33cd0-3f99-41de-810a-3573d0f31f57","IsEthicsCpe":false,"ItemImageAlt":"tangled-webs","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/tangledwebs.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Tangled-Webs-How-False-Statements-are-Undermining-America","SubCategory":"Publication","Title":"Tangled Webs: How False Statements are Undermining America","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"caf33cd0-3f99-41de-810a-3573d0f31f57","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Tangled-Webs-How-False-Statements-are-Undermining-America","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/technocrimes.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"ba94ec6c-292a-483a-b8e7-5a2ef9b1a00a","IsEthicsCpe":false,"ItemImageAlt":"Cover of Techno-Crimes","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/technocrimes.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=techno-crimes-and-the-evolution-of-investigations","SubCategory":"Publication","Title":"Techno-Crimes and the Evolution of Investigations: The Techno-Criminals Have Evolved. Most Investigators Haven't. It's Time to Catch Up!","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ba94ec6c-292a-483a-b8e7-5a2ef9b1a00a","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=techno-crimes-and-the-evolution-of-investigations","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"The recent crackdown on bribery and prosecution of cases under the Foreign Corruption Practices Act (FCPA) has made the prevention and mitigation of bribery...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/bribery-corruption-cb.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"0dd26e44-0380-45c5-873e-b8c35aa5606b","IsEthicsCpe":false,"ItemImageAlt":"bribery-corruption-cb","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/bribery-corruption-cb.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Bribery-and-Corruption-Casebook-The-View-from-Under-the-Table","SubCategory":"Publication","Title":"Bribery and Corruption Casebook: The View from Under the Table","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"0dd26e44-0380-45c5-873e-b8c35aa5606b","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Bribery-and-Corruption-Casebook-The-View-from-Under-the-Table","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/the-money-pit-tales-of-construction-fraud-and-how-to-prevent-it_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"cad25719-6b7e-4fd7-aa9a-2d6fa6906168","IsEthicsCpe":false,"ItemImageAlt":"The Money Pit Tales of Construction Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/the-money-pit-tales-of-construction-fraud-and-how-to-prevent-it_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Money-Pit-Tales-of-Construction-Fraud-and-How-to-Prevent-It","SubCategory":"Publication","Title":"The Money Pit: Tales of Construction Fraud and How to Prevent It (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"cad25719-6b7e-4fd7-aa9a-2d6fa6906168","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Money-Pit-Tales-of-Construction-Fraud-and-How-to-Prevent-It","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In this course, Karen Webber, CFE, CPA, will discuss elder financial exploitation, a fast-growing and underreported crime against older adults. You will learn about the...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/elder-financial-thumbnail/1620x1080_elder-financial.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"6d0155ad-b4af-4d5a-bc6c-a5c56cacefba","IsEthicsCpe":false,"ItemImageAlt":"Elder Financial Exploitation","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/elder-financial-thumbnail/1620x1080_elder-financial.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Elder-Financial-Exploitation-A-Primer-for-CFEs","SubCategory":"Publication","Title":"Elder Financial Exploitation: A Primer for CFEs (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"6d0155ad-b4af-4d5a-bc6c-a5c56cacefba","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Elder-Financial-Exploitation-A-Primer-for-CFEs","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Elder fraud abuse is at an all-time high and growing. Currently, there are 54 million elders in the United States alone, and that number is expected to increase to...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_combating-elder-fraud-abuse.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"7e48d772-f63a-4a36-a6ba-9db63e36f208","IsEthicsCpe":false,"ItemImageAlt":"Combating Elder Fraud Abuse","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_combating-elder-fraud-abuse.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Combating-Elder-Fraud-Abuse","SubCategory":"Publication","Title":"Combating Elder Fraud Abuse (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"7e48d772-f63a-4a36-a6ba-9db63e36f208","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Combating-Elder-Fraud-Abuse","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"28 years into her 40-year career with multi-national lumber company Weyerhaeuser, Susan Tranberg stole her colleagues&rsquo; computer credential...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_aforestfulloffraud_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"b4e4f9fd-b53a-45c9-b146-0a3284bba982","IsEthicsCpe":false,"ItemImageAlt":"A Forest Full of Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_aforestfulloffraud_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=A-Forest-Full-of-Fraud-Case-Study-of-a-4-5-Million-Fraud-On-Demand-Webinar","SubCategory":"Publication","Title":"A Forest Full of Fraud: Case Study of a $4.5 Million Fraud (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b4e4f9fd-b53a-45c9-b146-0a3284bba982","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=A-Forest-Full-of-Fraud-Case-Study-of-a-4-5-Million-Fraud-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"As the number of COVID-19 cases rose in 2020, countless businesses had to shut their doors or reduce operations to minimize the spread of the virus. Owners of many of the...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_protecting-the-paycheck-protection-program.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":1.0,"FieldOfStudy":"Auditing (Governmental)","Format":null,"Id":"452a210f-4e39-44cd-974a-1f08ae6c2d61","IsEthicsCpe":false,"ItemImageAlt":"Protecting the Paycheck Protection Program","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_protecting-the-paycheck-protection-program.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-the-Paycheck-Protection-Program","SubCategory":"Publication","Title":"Protecting the Paycheck Protection Program (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"452a210f-4e39-44cd-974a-1f08ae6c2d61","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-the-Paycheck-Protection-Program","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing (Governmental)","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"With workers' compensation fraud costing insurance companies millions each year, it's important to be able to identify when someone claiming benefits is lying.<br /> &nbsp;<br /> In this on-demand webinar, you will get an inside look...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_workers-compensation-the-truth-about-lying_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"d5f0e868-4aed-4e3c-a261-8616d329ea91","IsEthicsCpe":false,"ItemImageAlt":"Workers Compensation The Truth About Lying","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_workers-compensation-the-truth-about-lying_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=workers--compensation--the-truth-about-lying--on-demand-webinar","SubCategory":"Publication","Title":"Workers' Compensation: The Truth About Lying (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d5f0e868-4aed-4e3c-a261-8616d329ea91","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=workers--compensation--the-truth-about-lying--on-demand-webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p><span style=\"background: white; color: #505050;\">Fictitious or ghost employee schemes can cause significant losses that might go undetected for months or years. These losses not only include financial losses,</span> but also losses...</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/ghostbusters-thumb/1620x1080_ghostbusters-fighting-fictitious-employee-schemes.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"189f5931-721b-493c-b1d2-f04946b495f7","IsEthicsCpe":false,"ItemImageAlt":"Ghostbusters Fighting Fictitious Employee Schemes","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/ghostbusters-thumb/1620x1080_ghostbusters-fighting-fictitious-employee-schemes.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Ghostbusters-Fighting-Fictitious-Employee-Schemes","SubCategory":"Publication","Title":"Ghostbusters Fighting Fictitious Employee Schemes (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"189f5931-721b-493c-b1d2-f04946b495f7","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Ghostbusters-Fighting-Fictitious-Employee-Schemes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"This course examines the bankruptcy system and its actors (trustees, lawyers, accountants), discusses the different types of bankruptcy fraud, and provides you with...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/the-abcs-of-bankruptcy-fraud/1620x1080_the-abcs-of-bankruptcy-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"caee49be-99ca-4ae3-a898-0f0069e6db73","IsEthicsCpe":false,"ItemImageAlt":"The ABCs of bankruptcy fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/the-abcs-of-bankruptcy-fraud/1620x1080_the-abcs-of-bankruptcy-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-ABCs-of-Bankruptcy-Fraud-","SubCategory":"Publication","Title":"The ABCs of Bankruptcy Fraud (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"caee49be-99ca-4ae3-a898-0f0069e6db73","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-ABCs-of-Bankruptcy-Fraud-","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In this course, you will explore the familial identity theft case of the Betz family, in which three generations of family members had their identities stolen by a family...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/archive-webinar---mom-steals-identity/1620x1080_archive-webinar---mom-steals-identity.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Behavioral Ethics","Format":null,"Id":"35e36828-f3f4-4fc5-a843-06afb06d1edb","IsEthicsCpe":true,"ItemImageAlt":"When Your Mom Steals Your Identity","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/archive-webinar---mom-steals-identity/1620x1080_archive-webinar---mom-steals-identity.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=When-Your-Mom-Steals-Your-Identity","SubCategory":"Publication","Title":"When Your Mom Steals Your Identity (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"35e36828-f3f4-4fc5-a843-06afb06d1edb","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=When-Your-Mom-Steals-Your-Identity","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Behavioral Ethics","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_fraud-in-capital-projects-and-the-construction-process_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"ee90c166-631c-4f13-a275-623382de4941","IsEthicsCpe":false,"ItemImageAlt":"Fraud in Capital Projects and the Construction Process","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_fraud-in-capital-projects-and-the-construction-process_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-Capital-Projects-and-the-Construction-Process","SubCategory":"Publication","Title":"Fraud in Capital Projects and the Construction Process (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ee90c166-631c-4f13-a275-623382de4941","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-Capital-Projects-and-the-Construction-Process","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn to take a stand against mortgage fraud by exploring the history of the mortgage industry and its role in the global financial crisis.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/understanding-basic-mtg/understanding-the-basics-of-mortgage-fraud-thumb/understanding-the-basics-of-mortgage-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":12.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"d6502b4a-9ee6-4c38-b634-27559a43286e","IsEthicsCpe":false,"ItemImageAlt":"Understanding the Basics of Mortgage Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/understanding-basic-mtg/understanding-the-basics-of-mortgage-fraud-thumb/understanding-the-basics-of-mortgage-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Understanding-the-Basics-of-Mortgage-Fraud","SubCategory":"Publication","Title":"Understanding the Basics of Mortgage Fraud (Workbook Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d6502b4a-9ee6-4c38-b634-27559a43286e","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Understanding-the-Basics-of-Mortgage-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Bribery, corruption and money laundering are often regarded as acceptable costs of doing business, particularly in international exchanges. This course illustrates&hellip;","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/web_image_bribery-in-international-business-transactions_1620x1080.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":8.0,"FieldOfStudy":"Auditing","Format":null,"Id":"592af7b4-f68a-4d65-b494-d6a1f52232cc","IsEthicsCpe":false,"ItemImageAlt":"Cover of Bribery in International Business Transactions","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/web_image_bribery-in-international-business-transactions_1620x1080.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Bribery-in-International-Business-Transactions","SubCategory":"Publication","Title":"Bribery in International Business Transactions (Workbook Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"592af7b4-f68a-4d65-b494-d6a1f52232cc","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Bribery-in-International-Business-Transactions","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about common asset misappropriation schemes, the red flags of each scheme and the steps for preventing and detecting them.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/otherpeoplesmoney/other-peoples-money/other-peoples-money.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":16.0,"FieldOfStudy":"Auditing","Format":null,"Id":"54ae7b4b-ce11-400b-b686-dd6d2eff4a74","IsEthicsCpe":false,"ItemImageAlt":"Other Peoples Money","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/otherpeoplesmoney/other-peoples-money/other-peoples-money.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Other-Peoples-Money-The-Basics-of-Asset-Misappropriation","SubCategory":"Publication","Title":"Other People's Money: The Basics of Asset Misappropriation (Workbook/Online Video Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"54ae7b4b-ce11-400b-b686-dd6d2eff4a74","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Other-Peoples-Money-The-Basics-of-Asset-Misappropriation","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Examine the fundamental fraud schemes threatening financial institutions and learn how to detect and prevent them.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/financial-institution-fraud/financial-institution-fraud-thumb/web_image_financial-institutional-fraud_1620x1080.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":8.0,"FieldOfStudy":"Accounting","Format":null,"Id":"a34f676f-681e-4b90-8920-07e5c4ed0d1a","IsEthicsCpe":false,"ItemImageAlt":"Cover of Financial Institution Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/financial-institution-fraud/financial-institution-fraud-thumb/web_image_financial-institutional-fraud_1620x1080.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Financial-Institution-Fraud","SubCategory":"Publication","Title":"Financial Institution Fraud (PDF Workbook/Online Video Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"a34f676f-681e-4b90-8920-07e5c4ed0d1a","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Financial-Institution-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Accounting","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn how to identify common computer-related schemes, the methods used to carry them out and more.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/fundamentals-of-computer-fraud-thumb/1620x1080-resized-only-fundamentals-of-computer-and-internet-fraud.jpg","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":18.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"b6a52c20-8045-4a31-baea-0a5fdc2ef15c","IsEthicsCpe":false,"ItemImageAlt":"Cover of Fundamentals of Computer and Internet Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/fundamentals-of-computer-fraud-thumb/1620x1080-resized-only-fundamentals-of-computer-and-internet-fraud.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fundamentals-of-Computer-and-Internet-Fraud","SubCategory":"Publication","Title":"Fundamentals of Computer and Internet Fraud (PDF Workbook Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b6a52c20-8045-4a31-baea-0a5fdc2ef15c","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fundamentals-of-Computer-and-Internet-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn what constitutes insider trading and the ways that inside traders rationalize their criminal behavior from a feature-length documentary film.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-resized-only-collared-a-story-of-insider-trading-and-white-collar-crime.jpg","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":4.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"dd85ea3e-2e0a-4c8a-a61b-d102ec6a639d","IsEthicsCpe":false,"ItemImageAlt":"Collared Documentary Self Study","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-resized-only-collared-a-story-of-insider-trading-and-white-collar-crime.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Collared-A-Story-of-Insider-Trading-and-White-Collar-Crime","SubCategory":"Publication","Title":"Collared: A Story of Insider Trading and White-Collar Crime (Documentary Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"dd85ea3e-2e0a-4c8a-a61b-d102ec6a639d","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Collared-A-Story-of-Insider-Trading-and-White-Collar-Crime","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano_1620x1080_gift_card_fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"b49019a4-bb7a-4053-bb9d-21d6ca3c929f","IsEthicsCpe":false,"ItemImageAlt":"Image of various payment cards shown on a laptop screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano_1620x1080_gift_card_fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Gift-Card-Fraud","SubCategory":"Publication","Title":"Gift Card Fraud (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b49019a4-bb7a-4053-bb9d-21d6ca3c929f","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Gift-Card-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about phishing schemes related to COVID-19 and how to protect yourself and others from them.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-emerging-phishing-schemes/1620x1080_covid19-and-emerging-phishing-schemes.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"51d68dce-5f81-4a3c-b8ea-41634efc720e","IsEthicsCpe":false,"ItemImageAlt":"Covid19 and Emerging Phishing Schemes","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-emerging-phishing-schemes/1620x1080_covid19-and-emerging-phishing-schemes.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-and-Emerging-Phishing-Schemes","SubCategory":"Publication","Title":"COVID-19 and Emerging Phishing Schemes (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"51d68dce-5f81-4a3c-b8ea-41634efc720e","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-and-Emerging-Phishing-Schemes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano_1620x1080_red_flags_of_a_ponzi_scheme.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"6dc22f80-3171-40e8-a920-1065098aaab6","IsEthicsCpe":false,"ItemImageAlt":"Red Flag on a Laptop Screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano_1620x1080_red_flags_of_a_ponzi_scheme.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Red-Flags-of-a-Ponzi-Scheme","SubCategory":"Publication","Title":"Red Flags of a Ponzi Scheme (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"6dc22f80-3171-40e8-a920-1065098aaab6","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Red-Flags-of-a-Ponzi-Scheme","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about the F&eacute;d&eacute;ration Internationale de Football Association (FIFA) scandal, including its initial detection, key events and impact.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-fifa-scandal/1620x1080_nano-fifa-scandal.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"ab5d70a9-4084-4147-ad0c-52a9ec07f242","IsEthicsCpe":false,"ItemImageAlt":"FIFA Scandal","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-fifa-scandal/1620x1080_nano-fifa-scandal.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=FIFA-Scandal-Lessons-Learned","SubCategory":"Publication","Title":"FIFA Scandal: Lessons Learned (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ab5d70a9-4084-4147-ad0c-52a9ec07f242","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=FIFA-Scandal-Lessons-Learned","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn how to identify COVID-19 business email compromise schemes and methods to prevent them from succeeding.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-business-email-compromise/1620x1080_covid19-and-business-email-compromise.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"c9d54d91-0a51-424e-a14f-1667d2bd151d","IsEthicsCpe":false,"ItemImageAlt":"Covid19 and Business Email Compromise","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-business-email-compromise/1620x1080_covid19-and-business-email-compromise.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-and-Business-Email-Compromise","SubCategory":"Publication","Title":"COVID-19 and Business Email Compromise (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"c9d54d91-0a51-424e-a14f-1667d2bd151d","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-and-Business-Email-Compromise","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-esg-fraudpng.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"a0f6c38c-a065-44e5-a623-e40a2c7f67b2","IsEthicsCpe":false,"ItemImageAlt":"Image of Laptop Computer Hands Cupped Together Holding Soil with a Plant Coming Out on Screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-esg-fraudpng.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=ESG-Fraud","SubCategory":"Publication","Title":"ESG Fraud (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"a0f6c38c-a065-44e5-a623-e40a2c7f67b2","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=ESG-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano_1620x1080_trade-based_money_laundering.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"c94f9d83-3a1c-45e2-b313-9cc66d5ee106","IsEthicsCpe":false,"ItemImageAlt":"Image of an open case with bundles of one hundred dollar bills in and around it on a laptop screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano_1620x1080_trade-based_money_laundering.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Trade-Based-Money-Laundering","SubCategory":"Publication","Title":"Trade-Based Money Laundering (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"c94f9d83-3a1c-45e2-b313-9cc66d5ee106","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Trade-Based-Money-Laundering","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about COVID-19-related fake charities and crowdfunding schemes and how to avoid falling victim to them.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-fake-charities-crowdfunding-schemes/1620x1080_covid19-and-fake-charities-crowdfunding-schemes.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"5a71dc26-7f85-4398-92c7-dae8c8b57729","IsEthicsCpe":false,"ItemImageAlt":"Covid19 and Fake Charities Crowdfunding Schemes","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-fake-charities-crowdfunding-schemes/1620x1080_covid19-and-fake-charities-crowdfunding-schemes.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-Fake-Charities-and-Crowdfunding-Schemes","SubCategory":"Publication","Title":"COVID-19, Fake Charities and Crowdfunding Schemes (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"5a71dc26-7f85-4398-92c7-dae8c8b57729","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-Fake-Charities-and-Crowdfunding-Schemes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-consumer-fraud-schemes/nano_1620x1080_covid19-and-consumer-fraud-schemes.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"71702194-2a2e-40d5-a39d-d4a457542cff","IsEthicsCpe":false,"ItemImageAlt":"Image of a laptop displaying a zoomed in image of a keyboard and screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-consumer-fraud-schemes/nano_1620x1080_covid19-and-consumer-fraud-schemes.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-and-Consumer-Fraud-Schemes","SubCategory":"Publication","Title":"COVID-19 and Consumer Fraud Schemes (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"71702194-2a2e-40d5-a39d-d4a457542cff","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-and-Consumer-Fraud-Schemes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/acfe_preventing-identity-theft_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"718558a8-a3f7-4c92-ad6e-b217cf45e38b","IsEthicsCpe":false,"ItemImageAlt":"Preventing Identity Theft","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/acfe_preventing-identity-theft_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Preventing-Identity-Theft","SubCategory":"Publication","Title":"Preventing Identity Theft (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"718558a8-a3f7-4c92-ad6e-b217cf45e38b","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Preventing-Identity-Theft","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about common health care fraud schemes related to durable medical equipment (DME), such as wheelchairs, scooter and hospital beds.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-durable-medical-equipment-fraud/1620x1080_nano-durable-medical-equipment-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"67fd073a-7a44-4145-a812-df296a9a8c66","IsEthicsCpe":false,"ItemImageAlt":"Durable Medical Equipment Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-durable-medical-equipment-fraud/1620x1080_nano-durable-medical-equipment-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Durable-Medical-Equipment-Fraud","SubCategory":"Publication","Title":"Durable Medical Equipment Fraud (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"67fd073a-7a44-4145-a812-df296a9a8c66","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Durable-Medical-Equipment-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about common practices used by health care providers that cause unnecessary costs to health care programs or patients.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-health-care-provider-fraud/1620x1080_nano-health-care-provider-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"64b38f08-bbd7-4bce-9182-18599e9d6b02","IsEthicsCpe":false,"ItemImageAlt":"Healthcare Provider Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-health-care-provider-fraud/1620x1080_nano-health-care-provider-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Health-Care-Provider-Fraud","SubCategory":"Publication","Title":"Health Care Provider Fraud (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"64b38f08-bbd7-4bce-9182-18599e9d6b02","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Health-Care-Provider-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano_1620x1080_what_is_greenwashing.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"0d4fa596-4f47-43a6-8491-8487fef0d990","IsEthicsCpe":false,"ItemImageAlt":"Image of a hand holding a lightbulb on a laptop screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano_1620x1080_what_is_greenwashing.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=What-Is-Greenwashing","SubCategory":"Publication","Title":"What Is Greenwashing? (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"0d4fa596-4f47-43a6-8491-8487fef0d990","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=What-Is-Greenwashing","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about investment fraud schemes that fraudsters are likely pursue to exploit global concern, misinformation, product shortages and more for personal gain.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-investment-schemes/1620x1080_covid19-and-investment-schemes.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"03db9a82-9f9c-4fb6-87c9-7122903111ec","IsEthicsCpe":false,"ItemImageAlt":"Covid19 and Investment Schemes","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/covid19-and-investment-schemes/1620x1080_covid19-and-investment-schemes.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-and-Investment-Schemes","SubCategory":"Publication","Title":"COVID-19 and Investment Schemes (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"03db9a82-9f9c-4fb6-87c9-7122903111ec","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=COVID-19-and-Investment-Schemes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about common health care fraud schemes committed by patients including fictitious claims, medical identity theft, doctor shopping and more.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-health-care-fraud-committed-by-patients/1620x1080_nano-health-care-fraud-committed-by-patients.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Auditing","Format":null,"Id":"fb1d57d2-6267-4721-868b-70c42c279efd","IsEthicsCpe":false,"ItemImageAlt":"Healthcare Committed by Patients","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-health-care-fraud-committed-by-patients/1620x1080_nano-health-care-fraud-committed-by-patients.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Health-Care-Fraud-Committed-by-Patients","SubCategory":"Publication","Title":"Health Care Fraud Committed by Patients (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"fb1d57d2-6267-4721-868b-70c42c279efd","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Health-Care-Fraud-Committed-by-Patients","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Given that trillions of dollars&rsquo; worth of assets move through financial institutions on a daily basis, it is not surprising that these organizations are targets of fraud. The risk of fraud against financial...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/preventing-financial-institution-fraud/1620x1080_preventing-financial-institution-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":4.0,"FieldOfStudy":"Accounting","Format":null,"Id":"b559aadd-c2b6-4a05-bc05-057e2aeca758","IsEthicsCpe":false,"ItemImageAlt":"Preventing and Detecting Financial Institution Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/preventing-financial-institution-fraud/1620x1080_preventing-financial-institution-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Preventing-and-Detecting-Financial-Institution-Fraud","SubCategory":"Publication","Title":"Preventing and Detecting Financial Institution Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b559aadd-c2b6-4a05-bc05-057e2aeca758","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Preventing-and-Detecting-Financial-Institution-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Accounting","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn why governments are vulnerable to fraud and discover strategies to prevent, detect and investigate government fraud schemes.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-new-image-fighting-fraud-in-the-government/1620x1080-new-image-fighting-fraud-in-the-government-png/fighting-fraud-in-the-government.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":20.0,"FieldOfStudy":"Auditing (Governmental)","Format":null,"Id":"1fc088ba-72f3-4c93-915d-b75459737e21","IsEthicsCpe":true,"ItemImageAlt":"Fighting Fraud In The Government","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-new-image-fighting-fraud-in-the-government/1620x1080-new-image-fighting-fraud-in-the-government-png/fighting-fraud-in-the-government.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Fraud-in-the-Government","SubCategory":"Publication","Title":"Fighting Fraud in the Government","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"1fc088ba-72f3-4c93-915d-b75459737e21","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Fraud-in-the-Government","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing (Governmental)","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn from 10 infamous fraud cases to better protect your clients, employers and the general public from similar schemes.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-new-image-10-infamous-fraud-cases-of-the-21st-century-png-alpha.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":4.0,"FieldOfStudy":"Auditing","Format":null,"Id":"353d0880-9794-4b05-be13-3a92cc8c677f","IsEthicsCpe":false,"ItemImageAlt":"10 Infamous Fraud Cases of the 21st Century","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-new-image-10-infamous-fraud-cases-of-the-21st-century-png-alpha.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=10-Infamous-Fraud-Cases-of-the-21st-Century","SubCategory":"Publication","Title":"10 Infamous Fraud Cases of the 21st Century (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"353d0880-9794-4b05-be13-3a92cc8c677f","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=10-Infamous-Fraud-Cases-of-the-21st-Century","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about the types of identity fraud and receive guidance to help prevent you, your business or your community from becoming victims of identity theft.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/identity-theft/1620x1080_identity-theft.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"ac641b40-ddeb-4194-8119-62c5f3854649","IsEthicsCpe":false,"ItemImageAlt":"Image of a laptop displaying a hacker stealing data","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/identity-theft/1620x1080_identity-theft.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Identity-Theft","SubCategory":"Publication","Title":"Identity Theft (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ac641b40-ddeb-4194-8119-62c5f3854649","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Identity-Theft","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about some of the most common types of schemes that occur at the local level and the measures that can be taken to prevent them.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_fraud-in-government.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":4.0,"FieldOfStudy":"Auditing (Governmental)","Format":null,"Id":"d249bbc6-e8dc-47bb-8281-c8add8ddb3b1","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of a wave of cash in front of a government building","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_fraud-in-government.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-Local-Government","SubCategory":"Publication","Title":"Fraud in Local Government (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d249bbc6-e8dc-47bb-8281-c8add8ddb3b1","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-Local-Government","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing (Governmental)","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn how to identify, combat and investigate conflicts of interest that arise in businesses and government agencies.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/resizing-product-images-01/acfe_ondemand_detecting-and-deterring-conflicts-of-interest.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":6.0,"FieldOfStudy":"Auditing","Format":null,"Id":"21284cdb-3f68-40c1-9a49-02962b97357e","IsEthicsCpe":true,"ItemImageAlt":"Detecting and Deterring Conflicts of Interest","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/resizing-product-images-01/acfe_ondemand_detecting-and-deterring-conflicts-of-interest.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Detecting-and-Deterring-Conflicts-of-Interest","SubCategory":"Publication","Title":"Detecting and Deterring Conflicts of Interest (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"21284cdb-3f68-40c1-9a49-02962b97357e","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Detecting-and-Deterring-Conflicts-of-Interest","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about the aspects of the contract and procurement process important to anti-fraud professionals.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/contract-and-procurement-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":6.0,"FieldOfStudy":"Auditing","Format":null,"Id":"88cd4fc9-26db-4d79-8f54-362a4218a4e7","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of a hand holding a magnifying glass over a binder","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/contract-and-procurement-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=contract-and-procurement-fraud-ss","SubCategory":"Publication","Title":"Contract and Procurement Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"88cd4fc9-26db-4d79-8f54-362a4218a4e7","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=contract-and-procurement-fraud-ss","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn how and why social engineering scams work by examining the psychological aspects, methodologies and more.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/online-social-engineering-thumb/1620x1080_online-social-engineering.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"aa7eb764-0992-465c-bbb8-d8b5e14c82ef","IsEthicsCpe":false,"ItemImageAlt":"Social Engineering","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/online-social-engineering-thumb/1620x1080_online-social-engineering.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Social-Engineering","SubCategory":"Publication","Title":"Social Engineering (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"aa7eb764-0992-465c-bbb8-d8b5e14c82ef","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Social-Engineering","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn from a brief overview of the mortgage industry, its impact on the economy, individuals involved in the mortgage loan process and more.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_online-foundation-mortgage-thumb.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":4.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"0e5993b6-51bf-4c14-93ba-6bff4bb2eb1f","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of a dollar bill paper house in the palm of a hand","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_online-foundation-mortgage-thumb.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Foundations-of-Mortgage-Fraud-Identifying-the-Players-and-Investigating-Their-Schemes","SubCategory":"Publication","Title":"Foundations of Mortgage Fraud: Identifying the Players and Investigating Their Schemes (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"0e5993b6-51bf-4c14-93ba-6bff4bb2eb1f","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Foundations-of-Mortgage-Fraud-Identifying-the-Players-and-Investigating-Their-Schemes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about 10 of the most common health care fraud schemes and receive tips for preventing and detecting them.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/10-common-health-care-fraud-schemes-thumbnail/1620x1080-new-image-10-common-health-care-fraud-schemes.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"6eda3bfc-b485-4f36-bed3-f50e39e58075","IsEthicsCpe":false,"ItemImageAlt":"Image of a laptop displaying a pulse line","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/10-common-health-care-fraud-schemes-thumbnail/1620x1080-new-image-10-common-health-care-fraud-schemes.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=10-Common-Health-Care-Fraud-Schemes","SubCategory":"Publication","Title":"10 Common Health Care Fraud Schemes (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"6eda3bfc-b485-4f36-bed3-f50e39e58075","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=10-Common-Health-Care-Fraud-Schemes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about 10 common external threats to organizations, helping you to better protect your organization from becoming a victim.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/10-common-external-threats/1620x1080-resize-only-10-common-external-threats.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"52c42c0d-856f-41c6-b37b-81029b3acbb2","IsEthicsCpe":false,"ItemImageAlt":"Image of a laptop displaying a shadow of a hand over a keyboard","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/10-common-external-threats/1620x1080-resize-only-10-common-external-threats.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=10-Common-External-Threats-to-Your-Organization","SubCategory":"Publication","Title":"10 Common External Threats to Your Organization (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"52c42c0d-856f-41c6-b37b-81029b3acbb2","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=10-Common-External-Threats-to-Your-Organization","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/payment-fraud-image-in-laptop-1200x1080.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":4.0,"FieldOfStudy":"Accounting","Format":null,"Id":"a0756620-e7a5-413c-9d1e-03beccc99508","IsEthicsCpe":false,"ItemImageAlt":"Image of a hand with various payment related icons floating above it on a laptop screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/payment-fraud-image-in-laptop-1200x1080.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=payment-fraud","SubCategory":"Publication","Title":"Payment Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"a0756620-e7a5-413c-9d1e-03beccc99508","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=payment-fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Accounting","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about common consumer fraud schemes and discover resources and remedies to detect, deter, report and prevent these schemes.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/1620x1080-resized-only-consumer-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":10.0,"FieldOfStudy":"Auditing","Format":null,"Id":"95ca50d8-a9e6-4fb4-b08c-1861335f628f","IsEthicsCpe":false,"ItemImageAlt":"Consumer Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/1620x1080-resized-only-consumer-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Consumer-Fraud","SubCategory":"Publication","Title":"Consumer Fraud","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"95ca50d8-a9e6-4fb4-b08c-1861335f628f","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Consumer-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn how higher education institutions in the United States operate, how those specific operations can be manipulated by people to defraud those institutions and more.<br />","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_fraud-in-higher-education.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"635ffef8-d7c7-4c2a-a22e-228b6f8d04e8","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of a graduation cap on top of paper U.S. currency","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_fraud-in-higher-education.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-Higher-Education","SubCategory":"Publication","Title":"Fraud in Higher Education (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"635ffef8-d7c7-4c2a-a22e-228b6f8d04e8","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-Higher-Education","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about the claims process, how to identify potential red flags of various schemes and how technology can be implemented to better prevent and detect insurance fraud.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-new-image-insurance-fraud/1620x1080-new-image-insurance-fraud-cmyk.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"dccfdd8e-5ce9-404d-aef5-edb4b3dfbb4f","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying lines of numbers","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-new-image-insurance-fraud/1620x1080-new-image-insurance-fraud-cmyk.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Insurance-Fraud","SubCategory":"Publication","Title":"Insurance Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"dccfdd8e-5ce9-404d-aef5-edb4b3dfbb4f","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Insurance-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about schemes committed against the nonprofit by employees or insiders, those committed by external parties and fraud that can be attributed to the nonprofit itself.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_new-image-fraud-in-non-profit-organizations.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":4.0,"FieldOfStudy":"Auditing","Format":null,"Id":"bb5648b7-c205-4c94-b4e3-ddea0dc23a0b","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of a group of people holding each other arm in arm","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_new-image-fraud-in-non-profit-organizations.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-Nonprofit-Organizations","SubCategory":"Publication","Title":"Fraud in Nonprofit Organizations (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"bb5648b7-c205-4c94-b4e3-ddea0dc23a0b","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-in-Nonprofit-Organizations","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about the construction industry's most prevalent fraud schemes and strategies prevent and detect them.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/construction-fraud/1620x1080-resize-only-construction-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"58306240-3494-4175-9443-3f9105f97d54","IsEthicsCpe":false,"ItemImageAlt":"Image of a laptop displaying a yellow caution sign","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/construction-fraud/1620x1080-resize-only-construction-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Construction-Fraud","SubCategory":"Publication","Title":"Construction Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"58306240-3494-4175-9443-3f9105f97d54","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Construction-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about bribery and corruption through 10 lessons covering topics from illegal gratuities and economic extortion to conflicts of interest and red flags of corruption.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/acfe_introtobriberyandcorruption_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"e60a1d7c-d371-48eb-9aee-3e3f85359d66","IsEthicsCpe":false,"ItemImageAlt":"Introduction to Bribery and Corruption","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/acfe_introtobriberyandcorruption_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Introduction-to-Bribery-and-Corruption","SubCategory":"Publication","Title":"Introduction to Bribery and Corruption (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"e60a1d7c-d371-48eb-9aee-3e3f85359d66","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Introduction-to-Bribery-and-Corruption","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about asset misappropriation through 13 lessons covering topics from skimming and cash larceny to billing schemes and the misappropriation of intangible assets.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/asset-missapropriation/introduction-to-assett-misappropriation.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"db4e64fa-0768-4cec-bc23-a2e724101c33","IsEthicsCpe":false,"ItemImageAlt":"Image for Online Self Study Course, Introduction to Asset Misappropriation","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/asset-missapropriation/introduction-to-assett-misappropriation.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Introduction-to-Asset-Misappropriation","SubCategory":"Publication","Title":"Introduction to Asset Misappropriation (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"db4e64fa-0768-4cec-bc23-a2e724101c33","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Introduction-to-Asset-Misappropriation","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span>Health care is one of the largest and arguably the most complex of all industries in the U.S. The system consists of numerous types of organizations...</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_govt-health-care-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":4.0,"FieldOfStudy":"Auditing (Governmental)","Format":null,"Id":"d3b4cc2d-af85-4e26-ae3d-b29e0da01ada","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of stimulus checks","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080_govt-health-care-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-Against-Government-Health-Care-Programs","SubCategory":"Publication","Title":"Fraud Against Government Health Care Programs (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d3b4cc2d-af85-4e26-ae3d-b29e0da01ada","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-Against-Government-Health-Care-Programs","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing (Governmental)","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Explore fraud schemes against financial institutions and discover recommended controls and techniques designed to prevent and detect them.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/preventing-financial-institution-fraud/1620x1080_preventing-financial-institution-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":8.0,"FieldOfStudy":"Accounting","Format":null,"Id":"28dbd9e0-94b8-4b29-8b66-57c38436a88c","IsEthicsCpe":false,"ItemImageAlt":"Preventing and Detecting Financial Institution Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/preventing-financial-institution-fraud/1620x1080_preventing-financial-institution-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Preventing-and-Detecting-Financial-Institution-Fraud","SubCategory":"Publication","Title":"Financial Institution Fraud (PDF Workbook/Online Video Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"28dbd9e0-94b8-4b29-8b66-57c38436a88c","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Preventing-and-Detecting-Financial-Institution-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Accounting","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Discover information relating to government fraud generally as well as information specific to the U.S. federal government.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/online-government-fraud-thumb/1620x1080_government-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":4.0,"FieldOfStudy":"Auditing (Governmental)","Format":null,"Id":"15594884-1f1d-46d8-8438-4809924e72fe","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of shadowy figures shaking hands","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/online-government-fraud-thumb/1620x1080_government-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Government-Fraud-SS","SubCategory":"Publication","Title":"Government Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"15594884-1f1d-46d8-8438-4809924e72fe","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Government-Fraud-SS","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing (Governmental)","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about common schemes used to manipulate an organization's financial statements, how they are perpetrated and techniques to uncover financial statement manipulation.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-new-image-introduction-to-financial-statement-fraud/1620x1080-new-image-introduction-to-financial-statement-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Accounting","Format":null,"Id":"2c3b183a-2a49-4f85-8683-0082e15eb984","IsEthicsCpe":false,"ItemImageAlt":"mage of magnifying glass looking at reports","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/1620x1080-new-image-introduction-to-financial-statement-fraud/1620x1080-new-image-introduction-to-financial-statement-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Introduction-to-Financial-Statement-Fraud","SubCategory":"Publication","Title":"Introduction to Financial Statement Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"2c3b183a-2a49-4f85-8683-0082e15eb984","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Introduction-to-Financial-Statement-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Accounting","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Today&rsquo;s fraudsters have found new and innovative ways to embed themselves into legitimate businesses. Deep and dark web forums have allowed...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfewebinarfraud-incthe-big-business-of-modern-day-fraud1620x10802023ondemand.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"9ed2375d-4c1f-4e55-a5ba-bf5f2369707a","IsEthicsCpe":false,"ItemImageAlt":"Fraud, Inc.: The Big Business of Modern-Day Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfewebinarfraud-incthe-big-business-of-modern-day-fraud1620x10802023ondemand.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-Inc-The-Big-Business-of-Modern-Day-Fraud","SubCategory":"Publication","Title":"Fraud, Inc.: The Big Business of Modern-Day Fraud (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"9ed2375d-4c1f-4e55-a5ba-bf5f2369707a","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-Inc-The-Big-Business-of-Modern-Day-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Enron's fraud schemes led to their bankruptcy and the downfall of Arthur Anderson. This was a conspiracy of peers conspiring together to facilitate the fraud and corruption in their respective firms...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lega_webinar.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"7d76326e-76d4-4745-8293-4013de6a575b","IsEthicsCpe":false,"ItemImageAlt":"Law Enforcement and Government Alliance On-Demand Webinar","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lega_webinar.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Enron-Case-Study-of-Deception-and-Lessons-for-Tomorrow","SubCategory":"Publication","Title":"Enron: Case Study of Deception and Lessons for Tomorrow (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"7d76326e-76d4-4745-8293-4013de6a575b","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Enron-Case-Study-of-Deception-and-Lessons-for-Tomorrow","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Fraud risk management and awareness often live in distinct groups within an organization. This could be because fraud risk is perceived to be very specific...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinaranti-fraud-leadership_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Management Services","Format":null,"Id":"25a816bf-8eea-4c64-b7c3-2332e22d34a8","IsEthicsCpe":false,"ItemImageAlt":"Anti-Fraud Management: The Power of Perception of Detection","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinaranti-fraud-leadership_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Anti-Fraud-Management-The-Power-of-Perception-of-Detection-On-Demand-Webinar","SubCategory":"Publication","Title":"Anti-Fraud Management: The Power of Perception of Detection (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"25a816bf-8eea-4c64-b7c3-2332e22d34a8","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Anti-Fraud-Management-The-Power-of-Perception-of-Detection-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Management Services","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Today&rsquo;s fraudsters have found new and innovative ways to embed themselves into legitimate businesses. Deep and dark web forums have allowed...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/generic-cap-webinar-image.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"7366fdd5-ebed-49c9-b729-9404213952dd","IsEthicsCpe":false,"ItemImageAlt":"Corporate Alliance Webinar Image","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/generic-cap-webinar-image.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-Inc-The-Big-Business-of-Modern-Day-Fraud","SubCategory":"Publication","Title":"Fraud, Inc.: The Big Business of Modern-Day Fraud (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"7366fdd5-ebed-49c9-b729-9404213952dd","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fraud-Inc-The-Big-Business-of-Modern-Day-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In today's world, traditional&rdquo; street crimes&rdquo; are giving way to check fraud, identity theft and internet crimes. The youth and emerging technology play a pivotal role in the business of fraud and financial crime...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_gameoffrauds_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"35990efa-41ee-41bc-a630-5bf276907a7e","IsEthicsCpe":false,"ItemImageAlt":"Game of Frauds","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_gameoffrauds_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Game-of-Frauds-How-Youth-and-Tech-Are-Reshaping-Financial-Crime","SubCategory":"Publication","Title":"Game of Frauds: How Youth and Tech Are Reshaping Financial Crime (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"35990efa-41ee-41bc-a630-5bf276907a7e","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Game-of-Frauds-How-Youth-and-Tech-Are-Reshaping-Financial-Crime","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span style=\"background-color: #f9f8f8; color: #1e1f21;\">Money mules, as defined by the U.S. Department of Justice, are people who, at someone else&rsquo;s direction, receive and move money obtained from victims of fraud...</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/moneymulesdontbetheirunwittingpartner1620x1080.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"44e9f35d-5c14-4d6c-8f7d-a90d894c7950","IsEthicsCpe":false,"ItemImageAlt":"Image of laptop computer with man with mask handing woman money","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/moneymulesdontbetheirunwittingpartner1620x1080.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Money-Mules-Dont-be-Their-Unwitting-Partner","SubCategory":"Publication","Title":"Money Mules: Don't be Their Unwitting Partner","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"44e9f35d-5c14-4d6c-8f7d-a90d894c7950","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Money-Mules-Dont-be-Their-Unwitting-Partner","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In this on-demand webinar, Andrew Sigfrid, Fraud Analytics &amp; Strategy Lead at TransUnion Canada, explores the lifecycle of a fraudster&rsquo;s identity theft journey...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/how-fraudsters-benefit.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"b317f267-7b1e-4ae9-9bd5-1b874c16de66","IsEthicsCpe":false,"ItemImageAlt":"How Fraudsters Benefit","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/how-fraudsters-benefit.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Advantage-Undetected-How-Fraudsters-Benefit-From-Obscurity-On-Demand-Webinar","SubCategory":"Publication","Title":"Advantage Undetected: How Fraudsters Benefit From Obscurity (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b317f267-7b1e-4ae9-9bd5-1b874c16de66","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Advantage-Undetected-How-Fraudsters-Benefit-From-Obscurity-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Theft, fraud and money laundering of cryptocurrency assets threaten the integrity of blockchain technology as billions of dollars are estimated to be lost each year...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/pig-butchering-scams-and-nft-thefts-fraud-in-the-web-30-space1620x10802023.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Auditing","Format":null,"Id":"61a13c0b-af6b-4a31-9866-4ab52c102ff8","IsEthicsCpe":false,"ItemImageAlt":"Pig Butchering Scams and NFT Thefts Fraud in the Web 3.0 Space","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/pig-butchering-scams-and-nft-thefts-fraud-in-the-web-30-space1620x10802023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Pig-Butchering-Scams-and-NFT-Thefts-in-the-Web-3-0-Space","SubCategory":"Publication","Title":"Combating Crypto Crimes: Pig Butchering Scams and NFT Thefts in the Web 3.0 Space","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"61a13c0b-af6b-4a31-9866-4ab52c102ff8","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Pig-Butchering-Scams-and-NFT-Thefts-in-the-Web-3-0-Space","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Auditing","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Explore a historical perspective of financial markets and securities regulations and how they are relevant to investigating today's securities fraud schemes.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/securities-fraud/securities-fraud-thumb/securities-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":12.0,"FieldOfStudy":"Accounting","Format":null,"Id":"3659de15-1ecf-4f00-ac9f-b520561ac036","IsEthicsCpe":false,"ItemImageAlt":"Securities Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/workbook/securities-fraud/securities-fraud-thumb/securities-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Securities-Fraud","SubCategory":"Publication","Title":"Securities Fraud (Workbook Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"3659de15-1ecf-4f00-ac9f-b520561ac036","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Securities-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Accounting","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_enron-case-study_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"05bb1560-029f-4c6e-b589-8a2498647134","IsEthicsCpe":false,"ItemImageAlt":"Enron Case Study","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_enron-case-study_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Enron-Case-Study-of-Deception-and-Lessons-for-Tomorrow","SubCategory":"Publication","Title":"Enron: Case Study of Deception and Lessons for Tomorrow (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"05bb1560-029f-4c6e-b589-8a2498647134","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Enron-Case-Study-of-Deception-and-Lessons-for-Tomorrow","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true}]" />

Explore Resources by Topic

Learn two skills every interviewer needs