Fraud Intelligence
Hard graft – IT builds resilience to corruption
Human contact is a primary corruption vulnerability but innovations in computing offer potential both to design out or at
least constrain the risk and make detection easier.
Sarah Gibbons reports.