Analysis Of the Ongoing Theft at Marriot Fairfield Inn’s Front Desk

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
      1. QUESTION

       

      Analysis Of the Ongoing Theft at Marriot Fairfield Inn’s Front Desk

       

       

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Law and governance Pages 5 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

Thank you for having given us time to analyze the theft case that has been taking place at the Front Desk of our organization. I have to admit that there are several cases of lost items that have been reported to be taking place at Marriot Fairfield Inn’s front desk. Items such as purses, money and others have been missing at the front desk. As requested, I would like report of how we conducted the analysis and suggest some of the possible solutions that we came up with that we can employ to help prevent further occurrence of the vice.

 

Analysis of the Theft case

I have to admit that employee theft is a great challenge to Marriot Fairfield Inn. However simple a theft may be simple, I have noted that it can be very harmful to the reputation of our organization (Dimoff, 2017). Marriot Fairfield Inn has been experiencing loss of properties, like purses, money, and many other items, at their Front Desk. To help expose the theft within the facility, as the organization’s Front Desk manager, I will frequently conduct a check of all organizational assets, cash variance, missing equipment and tool. Additionally, I will carefully monitor the alterations in workers’ behaviour, inventory shortages, employees’ spending patterns, along with complaints from customers and other employees regarding missing items. According to Elliott (2007), by carrying out the analyses highlighted above, I will help Marriot Fairfield Inn to get a great deal of information about particular individuals (our employees) who are involved in the case along with data about the main items that go missing.

 

During the analysis, I will employ Marriot Fairfield Inn’s policies regarding such unethical misconducts practiced either by their employees or customers. Dimoff (2017) points out that how an organization addresses a theft case means a lot regarding the difference between a complex litigation and simple matter. For this reason, it is important that if an employee or a customer is found stealing, Marriot Fairfield Inn should ensure that they handle the issue very carefully so that the organization is not exposed to the dangers of litigation.

 

Similarly, regarding the analysis, I will ensure that use any single data that can imply/suggest theft. I very well understand that employee theft is not only about stealing physical money and assets. For this reason, I will ensure that I don’t take chances with data stealing since such data are extra dangerous to the organization’s reputation. According to Fichtman (2014), data theft can result into loss of business for a number of reasons, and can jeopardize Marriot’s operations.

 

Strategies to Prevent Future Theft at Marriot

It is important for Marriot Company to prevent or reduce the occurrence of theft owing to kind of losses that it will continue to suffer if the situation is allowed to continue. For that reason, there are three main strategies that I will employ to help curb thefts within Marriot in the future. Firstly, I will ensure that I know all Marriot’s employees. Heinke (2009) argues that ill-motived people often show certain behaviors that can help signify their intention to commit certain crime. By observing as well as listening to Marriot’s workers, I will be able to detect potential theft risks. I will often time than not take time with the employees as this will help learn them for the better since I will be able to learn of the employees’’ internal issues that may require address.  Any change in attitude should be sufficient to signify the intention of an employee. 

 

Secondly, I will install a reporting structure/keep employees informed. Federal Trade Commission (2012) points out that all organizational employees ought to be informed about an organization’s theft risk policy and the consequences of committing the fraud, such as termination of employees’ employments. For this reason, I will ensure that all Marriot’s employees are aware of the repercussion of stealing from the organization besides the fact I will inform them that the organization is on the watch to know those who are ill-behaved. Additionally, I will also make employees who are honest and are not easily tempted to steal to help me in the watching. However, since most workers are always unwilling to report cases of theft to their employers, I will set up an unidentified reporting system which will allow employees to report theft cases via a website while hiding their identity.

 

Lastly, I will implement Marriot’s internal controls. Fichtman (2014) defines internal controls as programs and/or plans that are implemented to protect an organization’s assets, the guarantee the organization’s integrity regarding its accounting records, alongside deterring as well as detecting theft and fraud. In this regard, I will segregate duties/responsibilities of the Marriot’s internal control so that I may reduce the chances of occurrence of theft and fraud. I will equally ensure that the check and cash register receipts are carefully tallied only by one employee whereas another will be preparing deposit slips, and yet a third person making deposits to the bank. This will help expose any single discrepancy when employees are at work. As a component of the internal control system, I will also employ documentation. However, Heinke (2009) notes that for effectiveness and efficiency, internal control structures must be revised and monitored frequently on consistent bases, as such, I will always monitor and evaluate the internal control system against technological as well as other advances.

 

 

Conclusion

Regardless of the sizes and types, organizations experience fraud in various forms, like theft. Employee theft cases can cause enormous financial losses, ruined reputations, and legal costs that can eventually lead to an organization’s downfall. However, having the proper programs and plans in place can meaningfully minimize theft cases within an organization and can, therefore, reduce losses. Making an organization’s policy known to the organization’s employees is one among the best strategies to put off fraudulent behaviors.

 

 

 

References

Dimoff T. (2017). Six action steps when confronting employees: A thorough investigation, properly documented, precedes any action. Retrieved from https://i-sight.com/resources/6-action-steps-when-confronting-employee-theft/ on March 22, 2017.

Elliott, S. M. (2007). The threat from within: trade secret theft by employees. Nature Biotechnology25(3), 293-295.

Federal Trade Commission. (2012, January 29). Identity theft. Retrieved March 22, 2017, from http://www.ftc.gov/be/v010001.htm.

Fichtman, P. (2014). Preventing credit card fraud and identity theft: a primer for online merchants. Information Systems Security, 10(5), 52-59.

Heinke, M. L. (2009). How to prevent theft, embezzlement: create controls within the practice to minimize your risk. DVM Newsmagazine, (1). 56.

 

 

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]