001438833 000__ 04105cam\a2200505\i\4500 001438833 001__ 1438833 001438833 003__ OCoLC 001438833 005__ 20230309004356.0 001438833 006__ m\\\\\o\\d\\\\\\\\ 001438833 007__ cr\un\nnnunnun 001438833 008__ 210812s2021\\\\sz\a\\\\ob\\\\001\0\eng\d 001438833 019__ $$a1263875418 001438833 020__ $$a9783030744397$$q(electronic bk.) 001438833 020__ $$a3030744396$$q(electronic bk.) 001438833 020__ $$z9783030744380 001438833 020__ $$z3030744388 001438833 0247_ $$a10.1007/978-3-030-74439-7$$2doi 001438833 035__ $$aSP(OCoLC)1263663574 001438833 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCO$$dUKMGB$$dUKAHL$$dN$T$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCQ 001438833 049__ $$aISEA 001438833 050_4 $$aHV6675$$b.C87 2021 001438833 08204 $$a364.16/24$$223 001438833 1001_ $$aCurnow, David H.,$$eauthor. 001438833 24514 $$aThe psychology of embezzlement :$$bthe art of control and intervention /$$cDavid Curnow. 001438833 264_1 $$aCham :$$bPalgrave Macmillan,$$c[2021] 001438833 264_4 $$c©2021 001438833 300__ $$a1 online resource :$$billustrations 001438833 336__ $$atext$$btxt$$2rdacontent 001438833 337__ $$acomputer$$bc$$2rdamedia 001438833 338__ $$aonline resource$$bcr$$2rdacarrier 001438833 504__ $$aIncludes bibliographical references and index. 001438833 5050_ $$aChapter 1: The Cost of Inaction -- Chapter 2: The Offender Mindset -- Chapter 3: Pre-Existing Vulnerabilities -- Chapter 4: Why do I need the funds? -- Chapter 5: How could I steal from the organisation? -- Chapter 6: What are the risks if I do steal from the organisation? -- Chapter 7: Am I really going to do this? -- Chapter 8: What will the organisation do now that I have offended?.-Chapter 9: Do I have the same reason to steal as before? -- Chapter 10: How do I continue to steal? -- Chapter 11: Why is this feeling more difficult than before? -- Chapter 12: How many near misses can I survive? -- Chapter 13: Do I keep going, stop or admit my crime? -- Chapter 14: How much do they know? -- Chapter 15: How can I reduce the consequences for myself and others.-Chapter 16: How does an organisation block, deter, and detect offenders. 001438833 506__ $$aAccess limited to authorized users. 001438833 520__ $$aUsing recent research and case studies, this book offers an evidence-based insight into the embezzlers mindset as they commit crimes that are costing nations, organisations and individuals increasingly more each year. This mindset is described in detail as the embezzler develops their motivation to steal from their employer, finds a method of stealing, assesses the risks, executes the theft, and then determines whether to continue to steal. The organisational landscape of security capabilities, culture and financial circumstances provide the environment that this mindset operates within. The embezzlers approach to the crime is broken down into four stages: Pre-Existing Vulnerabilities, Induction to First Theft, Ongoing Theft and Detection to Resolution. The author recommends strategies based on the embezzlers mindset for organisations to enhance their ability to protect themselves from such inside threats that attack their reputation, productivity, morale and, in the worst cases, financial viability. David Curnow, PhD., is affiliated with the Centre for Forensic Behavioural Science at Swinburne University, Australia. He has worked as a Forensic Psychologist for over 20 years in prisons, private practice and consultancy. He was appointed to the state Parole Board in 2014 and has also served on the Standards Australia review of Fraud Control Standards. He gained his doctorate in 2011. 001438833 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 16, 2021). 001438833 650_0 $$aEmbezzlement$$xPsychological aspects. 001438833 650_6 $$aAbus de confiance$$xAspect psychologique. 001438833 655_0 $$aElectronic books. 001438833 77608 $$iPrint version:$$aCurnow, David H.$$tPsychology of embezzlement.$$dBasingstoke : Palgrave Macmillan, 2021$$z9783030744380$$w(OCoLC)1255799767 001438833 852__ $$bebk 001438833 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-74439-7$$zOnline Access$$91397441.1 001438833 909CO $$ooai:library.usi.edu:1438833$$pGLOBAL_SET 001438833 980__ $$aBIB 001438833 980__ $$aEBOOK 001438833 982__ $$aEbook 001438833 983__ $$aOnline 001438833 994__ $$a92$$bISE