Northampton Electronic Collection of Theses and Research

Procurement fraud: the insider threat to fraud and the ability to prevent with an intelligence led approach to big data and internet of things

Fassam, L. (2015) Procurement fraud: the insider threat to fraud and the ability to prevent with an intelligence led approach to big data and internet of things. Invited Presentation presented to: 14th European Conference on Cyber Warfare and Security (ECCWS 2015 UK), University of Hertfordshire, Hatfield, UK, 02-03 July 2015. (Unpublished)

Item Type: Conference or Workshop Item (Invited Presentation)
Abstract: Purpose of this paper UK public sector procurement fraud in 2013 was a staggering £2.3 billion for 2013, ranging from supplier selection bribery through to insider trading. Arguably, none of these instances would have been able to take place without someone within the organisations supply chain acting in a manner to benefit themselves or unwittingly taken advantage of for gain by a third party, thus creating the ‘procurement insider threat to fraud’. In response, a whole myriad of resource is deployed in an attempt to combat fraudulent activity, which is harnessed in a manner that is uncoordinated and disjointed, quite often having agencies whom do not share information, audits that are announced ahead of time, processes that are not clear to all supply chain parties and in extreme circumstances, Senior executives ‘sweeping under the carpet’ exposed fraudulent activities. A quick review of processes put into place to combat fraud amount to nothing more than reactionary and frequently the aforementioned lack of cohesion creates its own problems with lessons not being learnt from discovered fraudulent activity, and in some cases exposing a breach into organisations that can be exploited by criminals for many years undetected, with risk to brand, finance and in worst case human life. Therefore, this paper aims to tackle this gap in academic business research, firstly by fostering a debate around potential reactive solutions that leverage off of a collaborative intelligence led approach. It will then explore the degree of fit between the ‘4 pillars of procurement fraud’, big data predictive analysis coupled to the live use of ‘internet of things’ and licensure of procurement/supply chain professionals, all of which will permit stakeholders to identify and decision make weak links within their organisational supply chains. Design/Methodology/Approach The proposed research will undertake a triangulated approach. Initially for the round table discussions a systematic literature review of procurement fraud and crime was undertaken to evaluate the topics most frequently discussed, the date periods and regions, to deliver a set of research questions against gap in peer reviewed research. Secondly, a focus group of industry experts will review the outcomes of the conference round table outputs which will build a questionnaire for dissemination to industry experts in the procurement sphere. These three methods will then be triangulated against the hypothesis that procurement fraud can be prevented by taking an intelligence led view, coupled to use of big data and the internet of things. Findings The initial systematic literature review has found that intelligence is not being shared between organisations in a manner that can lead to a reduction of fraud in the supply chain. For example in the food sector, there are 12 databases of information, however the Serious fraud office only has access to four of them and in addition procurement professionals are unable to poll data contained within to make informed decisions on risk. Practical application The outputs of the research can be utilised by commercial and governmental organisations to assess suitability of utilising an intelligence led approach to detect insider threat within procurement departments.
Uncontrolled Keywords: Procurement fraud, supply chain risk, supply chain insider threat, internet of things, procurement crime, supply chain fraud
Subjects: T Technology > TK Electrical engineering. Electronics. Nuclear engineering > TK7800 Electronics > TK7885 Computer engineering. Computer hardware > TK7895.E43 Internet of Things
H Social Sciences > HD Industries. Land use. Labor > HD61 Risk Management
H Social Sciences > HV Social pathology. Social and public welfare. Criminology > HV6001 Criminology > HV6251 Crimes and offences > HV6691 Fraud
Creators: Fassam, Liam
Faculties, Divisions and Institutes: University Faculties, Divisions and Research Centres - OLD > Faculty of Business & Law > Business
University Faculties, Divisions and Research Centres - OLD > Research Centre > Institute for Logistics, Infrastructure, Supply, Travel and Transport
Research Institutes > Institute of Logistics, Infrastructure, Supply & Transport
Faculties > Faculty of Business & Law > International Strategy & Business
Date: 3 July 2015
Date Type: Presentation
Event Title: 14th European Conference on Cyber Warfare and Security (ECCWS 2015 UK)
Event Dates: 02-03 July 2015
Event Location: University of Hertfordshire, Hatfield, UK
Event Type: Conference
Language: English
Status: Unpublished
Related URLs:
URI: http://nectar.northampton.ac.uk/id/eprint/7688

Actions (login required)

Edit Item Edit Item