Professional Documents
Culture Documents
Submitted in partial fulfilment of the requirement for the Bachelors of Science on Food
Service Management, Bachelors of Science in Finance and Banking and BSc. Accounting
Group Members
Research Question
What is put in place to achieve fraud prevention for hotels in the Montego Bay?
Background
According to Donlea 2017 one of the main international issues to implement fraud protection
that causes great difficulties is that fraud tactics are constantly evolving each day. It is quoted
that “As one loopholes closes they inevitably find and exploit another”. With the upcoming
vision 2030 that states making Jamaica a better safer place to live, work and do business,
schaming has a become a major issues nationally for Jamaicans an example of an illegal
activity under fraud. The national security team is damping down and trying to find means
and ways ro implement protection. This is important because tourism is a major contribution
factor to foreign exchange in the world and Jamaica. With all the different fraudulent
activities occurring it places a stop pn the amount of tourists affecting profit, jobs and the
The purpose of this study was to analyse fraud prevention in selected hotels in Montego Bay
Jamaica. Specifically, this research seeks to investigate the following sub topics: i) What are
the fraud prevention control policies implemented, ii) What are the fraud prevention
monitoring practices and, iii) What are the fraud prevention training put in place.
institutions, hotels, trade unions etc. It is the researchers hope that it will benefit readers as
the time to complete this project was time consuming. This study will benefit the hospitality
industries, hospitality and business students. This study will not benefit all scientific research.
Assumption
The assumption can be made that fraud within the hotel industry is an ongoing event which
needs proper monitoring, training of individuals on how best to pick up on or notice when a
Limitation
The information was not easily assessable has the hotels has strict policies when it comes to
fraud and giving out information on the topics and anything related to it.
Delimitations
The study will not be conducted on all the hotels in Montego bay, it was only conducted on
three hotels in the Montego Bay being Sandals, Round Hill Villas and Resort and Iberostar
Grand Hotel Rose Hall All Inclusive Montego Bay with each catering to a different set of
Definition of terms
Fraud can be defined as an intentionally deceptive action designed to provide the perpetrator
with an unlawful gain or to deny a right to a victim. Fraud control policies are systematic
measures such as reviews, checks and balances, methods and procedures instituted by an
organization to conduct its business in an orderly and efficient manner, deter and detect
errors, fraud, and theft and ensure adherence to its policies and plans
Fraud monitoring practices is the act of conducting a systematic and repeated sequence of
around the code of conduct, the risk of fraud, the employees' role in preventing fraud, and the
Introduction
The purpose of this study was to analyse fraud prevention in selected hotels in
Montego Bay Jamaica. Investopedia (2018) states that “fraud is an intentionally deceptive
action designed to provide the perpetrator with an unlawful gain or to deny a right to a
victim”. In addition “fraud is an act to induce another to part with some valuable item or
surrender a legal right” (business dictionary, 2018). It further defines prevention as activities
and practices aimed at anticipating, avoiding, and removing possible causes to preclude a
hazardous event from happening. This literature review was done using several global data
bases and the criteria for its inclusion in this chapter are that they are peer- reviewed and
published within 10 years of writing of this research report. The literature was reviewed
under the following headings, what are the fraud prevention control policies implemented,
what are the fraud prevention monitoring practices and what are the fraud prevention training
put in place.
Running Header: Business Research Proposal
ID: 1601833
According to the business dictionary (2018) fraud control policies are “Systematic
measures such as reviews, checks and balances, methods and procedures instituted by an
organization to conduct its business in an orderly and efficient manner, deter and detect
errors, fraud, and theft and ensure adherence to its policies and plans”. Fraud policies are
administrators and their clients (academic researchers) to analyse the relevance and
Africa. A quantitative approach was used with closed-ended and open-ended questions in a
questionnaire. In the study, the results indicated that both research grants administrators 71.4
%, and their clients 73% did not know if UoTx had a fraud control policy. They later agreed,
both research grants administrators and their clients (93% and 95% respectively) concurred
that a fraud prevention policy was necessary for UoTx. On the other hand, a study was done
to analysed fraud detection and prevention techniques and if there was a relationship between
the techniques and the detection of fraud. Through analysing 109 non-profits organisation
surveyed in South Carolina, the results indicated that 59 reported fraud occurrences and 86%
were using fraud detection and prevention techniques. This study showed statistical
significance in the relationships between fraud prevention and detection techniques used in
PricewaterhouseCoopers’ Economic Crime Survey (2007) for fraud control and prevention
techniques implemented for Australian organisations identified that 71.4% of Australian fraud
was committed by internal perpetrators of organisations. The survey also indicated that 75%
use staff selection test, 43.3 % uses vender monitoring and 87.5% uses Ethical
guidelines/codes of conduct as polices for the prevention of fraud. According to the survey,
the vast majority of organisations in Australia and around the world have at least some
specific fraud prevention measures in place. In a study by the accounting research institute to
find out the perception of bankers towards the effectiveness of fraud prevention and detection
local and foreign Islamic banks that operate in Malaysia. From the analysis, protection
software or application (mean = 3.1667) was perceived as the most effective components in
fraud mitigation strategies as compared to the other six groups of variables. This is followed
monitoring (mean = 2.9018), communication towards staff (mean = 2.8539), integrated fraud
control (mean = 2.8128) and the least effective one was inspection tools (mean = 2.5382),
ID: 1207712
control parameters to assess whether a critical point is under control. What drives individuals
to commit fraud within the organization with respect to how it can be monitored is a question
which should be analyzed and studied by financial personals. The study of fraud not only
helps to understand the past but even predict the future and how best to monitor it,
(Investiopedia, 2018).
The main aim of this research is to identify the different types of monitoring practices that
hotels can use to reduce the fraudulent activities within their organization. Fraud has a
detrimental impact on most businesses and the hospitality industry is not immune to it.
According to (Shah, 2018), a study by the Association of Certified Fraud Examiners, the
typical organization loses 5% of revenues in a given year as a result of fraud. For hotels,
industry statistics indicate that organizations lose 5% to 6% of annual revenue from fraud
perpetrated by employees and guests. For example, a hotel operator earning annual room
revenue of approximately $10 million may experience losses ranging between $500,000 and
$600,000. Losses from fraud would be amplified for organizations owning a chain of hotels.
Restaurants have a similar problem. He further went on to say that restaurants lose roughly
4% of revenue due to fraud as well, posing a significant obstacle for restaurants with thinner
net margins. Some controls to help prevent these types of frauds include maintaining a log for
complimentary and voided sales, requiring a reason for the comp or void to be documented,
requiring manager approval on all complimentary and voided transactions, and attaching a
comp or void slip to a guest check or invoice. If a particular front-desk clerk, server, or
Running Header: Business Research Proposal
take place. POS software can be used to compare data of an individual employee with the
of complimentary and voided checks or coupons applied to cash checks, etc. This data can
help management identify questionable situations and take timely and proper action.
Monitoring fraud levels and using analytics to determine how and where fraud is
occurring allows you to make changes to your processes and tools to prevent additional fraud,
(American Bankers, 2018). With the growing internet diffusion and broadband availability
hotels have expanded their offerings to meet the demands of a digital and mobile world; there
has been an increase in card-not-present fraud, (Carlino, 2018). Fraudsters will always use the
path of least resistance, and with card-present fraud being more easily detected, fraud has
shifted to the online space. And this makes it difficult for hotel managers to contend with.
Hotel managers are in a difficult position when it comes to preventing fraud; they are
then forced to deal with the increased fraud and reputational risk when their best customers’
loyalty accounts are taken over by a fraudster. As this attack scheme continues to grow, hotels
must implement solutions to ensure their customers are protected. With the rapid increase of
different ways to check in/out hotels are implementing new and effective ways to protect
their clients information from fraudulent persons. Hotels should upgrade to EMV-enabled,
point-of sale terminals to reduce risk of card present charge backs. Partner with solution
providers that can offer enhanced online fraud detection with little-to-no customer impact or
friction; utilize device intelligence, site navigation metrics and IP geolocation tools that
provide valuable insights on the risk of a transaction; incorporate machine learning/big data
insights from a community of hotels. To provide a more nuanced view of the risk of a
transaction; create work flows to dynamically route higher risk transactions for additional
scrutiny, such as requiring front desk check-in; ensure that your hotel’s loyalty accounts are
Running Header: Business Research Proposal
subject to the same fraud screening measures as other online transactions; and understand
typical and out of pattern behaviours for a customer and layer in this customer insight to
Hotel data breaches have become epidemic since the fall of 2015, prominent hotel
names such as Hyatt, Hilton, Trump, Starwood Hotels & Resorts and Omni Hotels & Resorts
have announced data breaches affecting hundreds of properties around the world. In July
2016, Kimpton Hotels announced its investigation of a possible data breach. Hotels became
the latest when it announced Aug. 12 that travellers visiting at least 20 hotels, including
Marriotts and Westins, may have had their credit card information swiped. Cardholder names,
card numbers, card expiration dates and security codes were thought to have been stolen.
Hackers “go where there’s minimum effort and maximum reward,” says Brian Hussey, global
director of incident response & readiness at Trust wave, an information security company.
“Attackers get pretty good at finding holes.” If they find a weakness in one industry, they’ll
focus attention there. Thieves see hotels as a weak spot. The 2016 Trust wave Global Security
Report, which examined hundreds of data breaches across 17 countries in 2015, found the
hospitality industry accounted for 14 percent of the breaches. The industry had the second-
highest number of breaches, up from third place a year earlier. The retail industry continues to
suffer the most breaches. While many hotel chains have been silent about breach details,
Omni revealed credit card and debit card information for more than 50,000 customers had
been swiped, and Hyatt said about 250 of its locations around the world had been hit. Several
hotel chains said crooks targeted point-of-sale systems in restaurants, bars and gift shops.
Trust wave found two-thirds of the hospitality industry attacks were at these payment
terminals. Thieves look for the equivalent of a master key to data accounts, says Gary Davis,
Shantel Burgher
Running Header: Business Research Proposal
1600106
What are the fraud prevention training that are in place?
According to the Business Doctor (2018) fraud training can be defined as a training an
employee undergoes that is factored around the code of conduct, the risk of fraud, the
employees' role in preventing fraud, and the company's strong commitment to being a good
corporate citizen. It is broken up into four main parts allowing for effective awareness and
detailed information. These include: Giving a simple definition of fraud: fraud is lying,
cheating, and stealing, discussing how fraud negatively impacts a company's bottom line and
reputation, giving examples of various fraud schemes employees might discover, such as an
offer for kickbacks or the illegal use of customers' credit card numbers by other employee
and lastly telling employees what they are supposed to do if they suspect fraud. Reed (2014)
article based on a numerous by the Association of Certified Fraud Examiners, Inc, stated
that according to the 2014 Report to the Nation on Occupational Fraud and Abuse research
shows that the typical organization loses 5% of its annual revenue each year due to employee
fraud. Prevention and detection are crucial to reducing this loss. Every organization should
have a plan in place as preventing fraud is much easier than recovering your losses after a
Barrier (2001) article interviewed different managers and auditors of top hotels in the Las
Vegas areas to find out the different types of fraud accouring and the preventative measures
on how to prevent them, they discussed that too often they do not educate employees on why
they are doing these things because of high turnover and segregation. However they need to
understand the purpose of identifying exceptions, and know what to do when they identify
them it showed how other managers of different hotels explained that the customers are who
really show identify the errors and by bring it to their knowledge actions can therefore take
Running Header: Business Research Proposal
place word spoken by Ron Reigle, director of corporate compliance for Peppermill Casinos
Inc.
Gino 2018 was a magazine article on observing staff members within an organization
behaviour to explain the sector typically has high staff turnover and cash takings, the risk of
fraud is increased. It’s reported that losses in the hospitality sector can be as high as 8% of
turnover.
Wasserman (2010) article’s highlight was on small business surveys by 3,000 exexcutives of
businesses that could relate to small hotels catering bed and breakfast and inn where it
showed how fraud affected 54 countries and further showed how they scope out employees
in preventing fraud by countrolling employee tipping, doing surprise and inteanal audits.
stake within the hotel sector daily, it stated that Increasingly, attacks are being made to disrupt
and gain hacking ‘bragging rights’, therefore the focus has to be on not just financial data, but
all angles. One area under increasing attack is loyalty schemes: 92% of UK adults belong to
one or more loyalty schemes (worth around £5.7bn) and it is easy to convert these into cash
yet, all too often, these are overlooked from a security point of view. To control this
The hospitality industry faces problems daily, one of these problems that has taken the
industry by storm and has become a major concern recently is fraud and what the industry is
doing to mitigate this problem and protect the customers of the hotel. This research shows the
different actions and steps that the hotels use to control such problems. This is a qualitative
research that uses case studies and content analysis with samples from the population and
their nature to answer the following sub- topics: What are the fraud prevention training in
place, what are the fraud prevention sanctions in place and what are the fraud prevention
monitoring practices.
This study is a qualitative research project that uses words to measure and analyze the data.
It uses narrative and direct quotes from the source in relaying information on what are the
polices in place to achieve fraud prevention for hotels in the Montego Bay area. The
qualitative method allows methods allow for in-depth and further probing and questioning of
understand their motivation and feelings (Bhat 2018). This is a systematic method that
answers questions on not only “what” people think but also “why” they think so. For
observation concludes that the number of men visiting this store are more. One good method
to determine why women were not visiting the store is to conduct an in-depth interview of
Running Header: Business Research Proposal
potential customers in the category (Bhat 2018). The qualitative research methods are case
studies, interviews, focus groups, keeping records and observing. In the research we use case
studies and content analysis of the hotels data to understand the implementations and actions
This is a qualitative research so it does not have a representative sample because this research
seeks to observe the hotels and tourists for the nature of the research.
Instrument Design
Based on the type of research being undertaken the type of research method we will be using
will be qualitative and as such, we will be conducting a case study for our proposal. In order
for us to gather the most useful information we will be making trips to the selected hotels in
Montego Bay where we will be gathering information through obtrusive observations and
carrying out interviews from different personnel to gain a better understanding of the topic.
Interviews are used to gather information from individuals on a 1 on 1 basic to get a feel of
their responses and reaction, using a series of predetermined questions or a set of interest
areas. Interviews are often recorded and transcribed. The questions will be distributed at least
10 days preceding the interview to give the interviewees sufficient time to condition their
minds for the interview. Interview questions will be structured following a tightly written
script that mimics a survey. A structured interview is one in which a particular set of
predetermined questions are prepared by the interviewer in advance. Data collected are easy
With respect to qualitative studies it would reside mostly with interviewing subjects and or observing
behaviours or processes as the case may be. You should provide information about the nature of
your site visits, the duration of the data collection of the completed instruments or the documents
Treatment of Data
Analyzing any qualitative data should be an ongoing process throughout the time of
collecting the data, as well as after the collection of data. Qualitative data analysis consists of
three procedures including data reduction, data display and conclusion drawing/verification
Running Header: Business Research Proposal
(Miles and Huberman, 1994). Data reduction takes place through the process of coding.
Coding involves assigning units of meaning to data chunks, and can be open, axial or
selective. These codes can then be displayed or organized to allow the drawing of
conclusions.
Data reduction refers to the process whereby the mass of qualitative data you may
obtain is reduced and organized, for example coding, writing summaries and discarding
irrelevant data. At this stage, please disregard all irrelevant and unnecessary information that
do not deem important to the research, but do ensure that you have access to it later if
required, as unexpected findings may need you to re-examine some data previously
considered unnecessary. Data that has been displayed is used to draw conclusions from the
mass of data, Miles and Huberman suggest that a good display of data, in the form of tables,
charts, networks and other graphical formats is essential. The conclusion drawing/verification
begins where analysis allows you to draw conclusions regarding your study. Feedback from
participants regarding emerging themes; tentative propositions and conclusions will be sought
Ethical Issues
Ethics are broadly the set of rules, written and unwritten, that governs our expectations of our
own and others’ behaviour. It is crucial that the researchers must conduct themselves ethically
ensure that the responses gained from the respondents are kept private and only in the
Running Header: Business Research Proposal
eyes of the researchers, well secured and protected. We do so by keeping the data on a
Objectivity - we aim to avoid bias in any aspect of the research, including design, data
analysis, interpretation, and review. Also we will ensure that no groups are
inadvertently excluded from the research and disclose any personal or financial
Human Subjects Protection – this research involves people, we will make sure to
reduce any possible harm to the minimum, and maximize the benefits both to
freely do it or don’t. However, there is no consequence that the persons will face if
they choose not to participate in the survey because it is their choice and we fairly
Research Budget
With any major project to be carried out a budget needs to be established in order for the
project to be executed properly. The cost associated with the proposal for this semester can be
seen below.
Total cost=$600
Running Header: Business Research Proposal
Research Timeline
Based on discussions with my group members it was deemed important for the execution of
this research be carried out as soon as possible. To ensure that the project was done
successfully certain duties were needed to be carried out. This information was displayed by
using a chart.
DURATION
START END TEAM
TASK NAME (WORK
DATE DATE MEMBER
DAYS)
The chart above gives an indication of the task we carried to complete the proposal.