Making sense of a scam: MMM Mutual Fund participants in Kagiso negotiate dissenting mainstream new coverage on social media
- Authors: Boqo, Bella Makhulu
- Date: 2020
- Subjects: Ponzi schemes -- South Africa , Fraud -- South Africa , Social media -- Influence -- South Africa , Mavrodi Mondial Moneybox -- In mass media
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/145771 , vital:38465
- Description: Pyramid, Ponzi and various fraudulent investment schemes are common feature in post-apartheid South Africa. The record levels of participation have generated much discussion in public discourse. Newspapers often abound with reports of participants who’ve lost large sums of money – in many instances their life savings. While on social media, thousands debate the merits and threats of new ventures as they emerge, in some instances using these platforms as the newest recruitment platforms. The sheer size and frequency of their appearance especially in post-revolutionary societies – those which experienced dramatic structural transformation following the end of the Cold War and growth of a neoliberal market economy – has drawn substantive scholarly attention. Much like media reports, however, this research often points to the morality of such practices, asking questions like what factors lead people to make the apparently irrational decision to participate in a scam? This study, however, contributes to a different body of emerging literature concerned with the larger structural contexts in which such forms of economic practice and organisation exist, and the meanings participants make of their involvement. Looking at the recently high profile of case of Mavrodi Mondial Moneybox (MMM), it employs a qualitative research methodology rooted in cultural studies to examine how participants based in the Johannesburg township of Kagiso used social media, specifically WhatsApp, to make sense of and contest the dissenting mainstream news coverage about MMM. Ultimately, it is a question of how their participation in particularly illegal pyramid or Ponzi type schemes and opposition to traditional news reports are rooted in their lived experiences, and what opportunities social media offer as alternate platforms for meaning-making, deliberation and public contestation.
- Full Text:
- Date Issued: 2020
- Authors: Boqo, Bella Makhulu
- Date: 2020
- Subjects: Ponzi schemes -- South Africa , Fraud -- South Africa , Social media -- Influence -- South Africa , Mavrodi Mondial Moneybox -- In mass media
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/145771 , vital:38465
- Description: Pyramid, Ponzi and various fraudulent investment schemes are common feature in post-apartheid South Africa. The record levels of participation have generated much discussion in public discourse. Newspapers often abound with reports of participants who’ve lost large sums of money – in many instances their life savings. While on social media, thousands debate the merits and threats of new ventures as they emerge, in some instances using these platforms as the newest recruitment platforms. The sheer size and frequency of their appearance especially in post-revolutionary societies – those which experienced dramatic structural transformation following the end of the Cold War and growth of a neoliberal market economy – has drawn substantive scholarly attention. Much like media reports, however, this research often points to the morality of such practices, asking questions like what factors lead people to make the apparently irrational decision to participate in a scam? This study, however, contributes to a different body of emerging literature concerned with the larger structural contexts in which such forms of economic practice and organisation exist, and the meanings participants make of their involvement. Looking at the recently high profile of case of Mavrodi Mondial Moneybox (MMM), it employs a qualitative research methodology rooted in cultural studies to examine how participants based in the Johannesburg township of Kagiso used social media, specifically WhatsApp, to make sense of and contest the dissenting mainstream news coverage about MMM. Ultimately, it is a question of how their participation in particularly illegal pyramid or Ponzi type schemes and opposition to traditional news reports are rooted in their lived experiences, and what opportunities social media offer as alternate platforms for meaning-making, deliberation and public contestation.
- Full Text:
- Date Issued: 2020
Managing Information Confidentiality Using the Chinese Wall Model to Reduce Fraud in Government Tenders
- Authors: Rama, Sobhana
- Date: 2013
- Subjects: Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11136 , http://hdl.handle.net/10353/d1006956 , Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Description: Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
- Full Text:
- Date Issued: 2013
- Authors: Rama, Sobhana
- Date: 2013
- Subjects: Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11136 , http://hdl.handle.net/10353/d1006956 , Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Description: Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
- Full Text:
- Date Issued: 2013
Ethics, cultures, fraud and corruption: the unanswered questions
- Authors: Fourie, Houdini
- Subjects: Fraud -- Moral and ethical aspects , Fraud -- South Africa , f-sa
- Language: English
- Type: text , Lectures
- Identifier: http://hdl.handle.net/10948/31797 , vital:31846
- Description: idea for the paper emanated from my concern regarding the absolute flood of unethical behaviour in recent times. Fraud and corruption in South Africa is rife and it seems that the average person has no control over what comes next. Considering the impacts of peoples’ background, social standing and culture, the paper considered the psychological processes through which learning of habits and mannerisms take place; and how it influences ethical behaviour. Valuable lessons are learnt, namely that culture, whether it being ethnical, organisational, family or religious, have a direct impact on a person’s ethical value system and subsequently on whether a person is inclined to partake in fraud and corrupt activities. Fraud and corruption can cripple and destroy organisations and its auditors. Fraud and corruption are costly. The paper reports that it is ultimately the responsibility of executive management to manage fraud and associated risks – management must set the “Tone at the Top”. Managing ethics is costly, but ignoring it is fatal. Although it is not the primary responsibility of auditors to detect and investigate fraud and corruption, the accounting profession needs to do introspection to determine what society expects of them. A mere audit opinion on annual financial statements does not satisfy the demands of society any more. The question is apparently not whether fraud will occur in organisations, but rather when and that everybody must insist on doing the right thing – for the greater good.
- Full Text:
- Authors: Fourie, Houdini
- Subjects: Fraud -- Moral and ethical aspects , Fraud -- South Africa , f-sa
- Language: English
- Type: text , Lectures
- Identifier: http://hdl.handle.net/10948/31797 , vital:31846
- Description: idea for the paper emanated from my concern regarding the absolute flood of unethical behaviour in recent times. Fraud and corruption in South Africa is rife and it seems that the average person has no control over what comes next. Considering the impacts of peoples’ background, social standing and culture, the paper considered the psychological processes through which learning of habits and mannerisms take place; and how it influences ethical behaviour. Valuable lessons are learnt, namely that culture, whether it being ethnical, organisational, family or religious, have a direct impact on a person’s ethical value system and subsequently on whether a person is inclined to partake in fraud and corrupt activities. Fraud and corruption can cripple and destroy organisations and its auditors. Fraud and corruption are costly. The paper reports that it is ultimately the responsibility of executive management to manage fraud and associated risks – management must set the “Tone at the Top”. Managing ethics is costly, but ignoring it is fatal. Although it is not the primary responsibility of auditors to detect and investigate fraud and corruption, the accounting profession needs to do introspection to determine what society expects of them. A mere audit opinion on annual financial statements does not satisfy the demands of society any more. The question is apparently not whether fraud will occur in organisations, but rather when and that everybody must insist on doing the right thing – for the greater good.
- Full Text:
- «
- ‹
- 1
- ›
- »