H Creyer - ACC 421 Midterm
doc
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
421
Subject
Accounting
Date
Nov 24, 2024
Type
doc
Pages
10
Uploaded by Barbara8289
Harriet Creyer
ACC 421: Mid Term
Sunday 25
th
September 2022
ACC 421 Midterm
1.
Explain in your own words how SOX has impacted financial statement fraud. The Sarbanes-Oxley Act (SOX) of 2002 is a federal law that ensure the correct record keeping and reporting for businesses and companies. It was implemented after some serious fraud cases back in the early 2000’s. Its impact on the financial statements us that it has created stricter financial reporting regulations and enforces punishments for those who do not comply with these regulations within the time frame required. With the tighter internal controls for the financial statements and setting new standards for independent auditors to review all reports and statements. With these controls, regulations, and punishments it created a harder environment to commit fraud within the financial statements. 2.
What is the difference between financial audit and fraud audit?
Financial Audit:
A Financial Audit is conducted on an annual basis by a CPA, who’s main role is to evaluate the financial statements. This helps to aid the business partners and shareholders in their understanding of the financial health of the business. It provides an overall general view of the business without going into specifics, errors and to ensure they are performing within the regulations set out by SOX. Fraud Audit:
A Fraud Audit is similar to a financial audit but one of the biggest differences is that the forensic/fraud audit is to obtain all the information and evidence to prepare to the courts. A fraud audit is performed by a CFE who can provide specific and transactional information from any departments pertaining to any activity within the firm. A fraud audit can be
conducted at any point when fraud is believed to being committed.
3.
Explain what the fraud triangle is. How can it help us prevent, detect, and respond to fraud?
Donald Cressey and encouraged by Edwin Sutherland to try to create a framework/model to better understand why fraudsters commit fraud. The fraud triangle is the idea of what can cause someone to commit fraud and what can be the underlying problems that send them down that path. The triangle consists of 3 parts Opportunity, Rationalisation and Financial Pressure.
How can it help us prevent, detect, and respond to fraud?
By removing 1 or more of the ‘must haves’ within the fraud triangle it will ensure that more precautions are being made. For example, extensive background and credit checks for someone who is working within the finance departments, this will ensure that if there are any financial pressures from outside the job could potentially be given to someone else or more controls are put in place. By having a basic understanding of what things can ensure all the correct controls are in place will help prevent and detect fraud if it does occur. Another example would be segregation of duties if possible, this would take away the opportunity to have full control over all the finances. 4.
Explain segregation of duties as it relates to fraud prevention. Why should we worry
about it? Segregation of duties is an important tool when it comes to fraud prevention. It ensures that 1
person is not essentially in control of all the financial statements. It is a separation of tasks between team members all there to be more checks in place to ensure all regulations are met and abide by. Segregation of duties can help eliminate the risk of fraud to the point where managements or additional team members need to review the information. Why should we worry about it?
Small business may struggle with segregation of duties as they may not have the manpower to do this so other procedures may need to be put into place. Segregation of duties can help prevent fraud from larceny-false refunds etc. One thing to worry about is how the tasks and duties are separated between the team members. Allowing regular audits and/or even a rotation of duties will also take the worry away.
5.
Elaborate and comment on two types of financial statement schemes. How do they work?
There are currently 6 types of financial statements schemes 1.
Asset/Revenue Over/Underestimate
2.
Timing Differences 3.
Fictitious Revenues
4.
Concealed Liabilities and Expenses
5.
Improper Disclosures
6.
Improper Asser Valuations
Fictitious Revenues:
Is created by the recording of sales that have never occurred. They can potentially involve both real and fake customers.
Concealed Liabilities:
Is the postponing of recording liabilities in the 12 months of the fiscal year so the current year looks like it has less expenses.
6.
Comment on two types of asset misappropriation schemes. How do they operate?
Cash Larceny:
Cash Larceny is very simple, it is the theft of cash from an employer, occurring after it was recorded within the books. For Example, a drop in the deposits at the banks, changes in banking information, reports or even a change in lifestyle.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Billing Schemes:
These schemes are the most common of asset misappropriation, a shell company would be set up and would ‘bill’ the current business, this would mean that any cheques or payments would be intercepted by the fraudster.
7.
What are the receivables lapping scheme? This is a form of robbing customers payments to pay another because the latter was stolen by
the fraudster. 8.
What are the common red flags associated with financial statement frauds? Some of the red flags associated with financial statement fraud are:
Accounting anomalies
Rapid growth
Unusual profits
Internal control weaknesses
9.
What are the red flags associated with corruption?
Some of the red flags associated with corruption are:
Relationships between key employees and authorized vendors
Secrecy surrounding this third-party relationship
A lack of review on management approvals for known third-party relationships that exist (over time, the fraudster may begin to steal using that relationship if the entity gets comfortable with it)
Anomalies in recording transactions (e.g., what is the debit for a bribe on the books?)
Anomalies in approving vendors
10. What are the red flags associated with fictitious revenues?
Some of the red flags associated with fictitious revenues are:
Unusual increase in assets (the other side of the entry to create fictitious revenues)
Customers with missing data (especially physical address and phone numbers)
Unexplained changes in certain relationships or ratio trends (e.g., revenues grow but accounts receivable does not)
11. Name five red flags associated with a shell company (billing scheme).
Five red flags associated with a Shell Company (Billing Scheme) are:
A vendor who only bills for services
Use of round numbers for amounts on an invoice
Use of unintelligible descriptions on invoices
Odd items being purchased (e.g., gravel for an attorney)
Lack of detail on invoice
12. What are the red flags associated with a ghost employee scheme?
The red flags associated with a ghost employee scheme are:
Never take a vacation
Never take sick leave
Have no taxes withheld
Have no deductions
Have no Social Security number (SSN) or an invalid one
Have a POB and no physical address
13. What are the red flags associated with skimming?
The red flags associated with skimming are:
Lower than expected revenues
Actual profits that are less than projections
Gross margins significantly less than projections
14. What are three internal factors that enhance the probability of fraud, theft, and embezzlement?
Three internal factors that enhance the probability of fraud, theft, and embezzlement are:
Failure to create an honest culture
Failure to articulate and communicate minimum standards of performance and personal conduct
Inadequate orientation and training on legal, ethical, fraud, and security issues
15. Risk assessment is a critical starting point for audits in general. How can it be used as a tool for an entity’s antifraud program, in which the entity is trying to minimize its fraud risk?
It is a tool to identify the risks and it address the most important ones. It is recommended that
any business, have a through risk assessment on a regular basis. This helps managements with their abilities with fraud prevention, detection, and investigation.
When fraud occurs and goes undetected it can have serious detrimental problems within a business. Being able to identify any ‘weak spots’ within an organisation can help but also having
procedures in place in order to detected it if it was to happen.
16. What are some of the characteristics of a weak corporate governance structure that would promote fraud?
Some of the characteristics of a weak corporate governance structure that would promote fraud:
Board members who were not independent
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Board dominated by insiders
Board members with significant equity holdings
Board members with little board experience
Boards and audit committees that did not meet
Audit committee members who knew little about finances or auditing
No audit committee
Audit committee did not meet
Top executives involved in the frauds
17. To have an effective antifraud culture, an entity should have policies and procedures that do what? (Include at least 5 items.)
Define frauds
Describe implementation of controls for antifraud
Describe training
Describe proactive fraud audit measures
Describe testing of antifraud controls
Describe actions taken in fraud audit
18. Antifraud professionals agree that perception of detection is at the top of the list of fraud prevention measures. What are some of the things you would recommend to the owners of a manufacturing firm trying to prevent fraud?
Some of the things I would recommend to the owners of a manufacturing company trying to prevent fraud would be:
Code of Conduct
– this would outline the expectations of the employees that are working for the company. Having strict Ethics and Fraud policies in place from the start with help prevent a fraudster from trying.
Segregation of Duties
– this would allow a tighter control within departments and also creating a better check and balances system within the business.
Audits
- having random audits within the company would allow prevent compilation within their job roles.
Anonymous tips
- if someone was to be a whistleblower after uncovering a fraud then there needs to be protections in place in order to protect that employee.
19. What are some methods used to detect a shell company (billing scheme)? List at least five.
Some methods used to detect a shell company (billing scheme) are:
Sorting payments by vendor, amount, and invoice number
Expense exceeds budget, especially if it is exactly double (i.e., possibly producing two checks, one for the legitimate vendor, and one for the fraudster)
Examining charges in largest expense account, as fraudsters often charge billing schemes to the largest account in an attempt to hide the crime
Horizontal analysis
Verifying service-only vendors’ invoices
Verifying that vendors are legitimate.
Reviewing cancelled checks
Not paying a suspicious invoice/vendor and seeing who follows up on payment
Printing the vendor list alphabetically and searching for two vendors with nearly identical
names and data
20. Who are some of the key people on the fraud response team, and what are their roles? Some of the key people on the fraud response team, and what are their roles are:
Legal/Litigation:
Prosecution, Knowledge of potential effectual prosecutors, Civil Litigation.
Legal/HR:
Legal termination of a fraudster, legal issues in investigating and employee.
Forensic Accounting/CFE:
Fraud investigation, fraud/legal evidence, proper interviews/
Digital Forensics:
Data mining for evidence.
Cyber Forensics:
Evidence embedded in IT, hidden in IT, potential cyber sources of evidence.
Internal audit:
Support the investigation, evidence gathering, controls remediation.
Public Relations:
avoid publicity, manage publicity, craft public response to fraud.
Executive Management:
Manage all key decisions of the process and follow up. All of these roles play an extremely important roles within the Fraud Response Team.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References
Singleton, T.W.S.A. J. (2010). Fraud Auditing and Forensic Accounting (4th ed.). Wiley Professional Development (P&T). https://mbsdirect.vitalsource.com/books/9780470877913
Related Documents
Related Questions
Ma3.
Please answer this I'll leave a review!! 24
1) The most damaging type of fraud, per event, is
A) corruption.
B) misappropriation of assets.
C) fraudulent financial reporting.
D) grand theft.
2) The most common type of fraud, in frequency, is
A) corruption.
B) misappropriation of assets.
C) fraudulent financial reporting.
D) Fortnite fraud.
3) Fraudulent financial reporting is ________ likely than corruption. The amounts involved in corruption are much ________ than fraudulent financial reporting.
A) less; more
B) less; less
C) more; less
D) more, more
arrow_forward
ESB. ACCOUNTING CONNECTION Careful scrutiny of accounting records and financial
statements can lead to the discovery of fraud or embezzlement. Each of the situations
that follow may indicate a breakdown in internal control. Indicate the nature of the pos-
sible fraud or embezzlement in each of these situations.
1. Wages expense for a branch office was 30 percent higher in 2014 than in 2013, even
though the office was authorized to employ only the same four employees and raises
were only 5 percent in 2014.
2. Sales returns and allowances increased from 5 percent to 20 percent of sales in the
first two months of 2014, after record sales in 2013 resulted in large bonuses for
the sales staff.
3. Gross margin decreased from 40 percent of net sales in 2013 to 20 percent in 2014,
even though there was no change in pricing. Ending inventory was 50 percent less
at the end of 2014 than it was at the beginning of the year. There is no immediate
explanation for the decrease in inventory.
4. A…
arrow_forward
Cash study
arrow_forward
Accounting
This is a business law principle for today's commercial environment by Twomey| Jennings |Greene 5th edition Question-what do you think of the increasing amount of reliance on electronic interactions? Some banks now charge to return the actual canceled check and some think that it is only a matter of time before there will be a charge for dealing with a "real" teller. What are the repercussions, good and bad, of this move toward electronic financial transactions?
arrow_forward
Refer to the Wall street journal article "Under Armor Faces U.S Inquiries" - from Novemver 4, 2019 - about the criminal investigation that the U.S Department of Justice is conducting, pertaining to accounting matters. identify the fraud exposures from the Fraud Exposure Rectagle that are present and explain your reasoning
arrow_forward
Match definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerl. An insurance policy that reimburses a company for any losses due to employee theft isa/an .__________________________
arrow_forward
Ababout introduction or overview,tell me which is correct option and with reason why ? tell me which are incorrect option and with reason why ?
arrow_forward
Discussion Questions on Fraud Prevention from Chapter 4 Fraud Examination 4th Edition
1. How do organizations create a culture of honesty, openness, and assistance?
2. What are different ways in which companies can eliminate opportunities for fraud?
3. What is the purpose of adopting a code of ethics throughout a company?
arrow_forward
Identify fraud triangle concepts.
BE7.1 (LO 1), C Match each situation with the fraud triangle factor-opportunity, financial pressure, or rationalization-that best describes it
a. An employee's monthly credit card payments are nearly 75% of his or her monthly earnings.
b. An employee earns minimum wage at a firm that has reported record earnings for each of the last five years.
c. An employee has an expensive gambling habit.
d. An employee has check-writing and check-signing responsibilities for a small company, as well as reconciling the bank account.
Identify internal control objectives.
arrow_forward
please answer all the following and give the complete solutions on how you come up with that .
arrow_forward
1. What would the bank have to prove to successfully bring a lawsuit against K and Lee?
arrow_forward
Which of the following is a provision of the Sarbanes-Oxley Act?
a. Lessens penalties for corporate fraud
b.Developed the Consumer Financial Protection Bureau
c. Recommends codes of ethics for financial reporting in corporations
d. Makes fraudulent financial reporting a civil offense
e.Requires greater transparency in financial reporting
arrow_forward
Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation:
Is the sales department separate from the credit office and the IT department?
Are all collections from customers received in the form of checks?
Is it appropriate to program the system for general authorization of certain sales, within given limits?
Are product quantities monitored regularly?
Required: In a two (2) page response, describe the control purpose for each point presented in the case.
arrow_forward
Match definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerb. ___________________occurs when management prepares misleading financial statements
arrow_forward
Case 8 Decide whether each situation is or is not a symptom of revenue fraud. Then explain (1) why the situation isor is not a symptom and (2) if it is a symptom, how itwould be found using computer queries or traditionalmethods. YIN Sales discounts appear too high. YIN Accounts receivable increases as a percentage of revenues. YIN Bad debt allowance increasesby the same percentageas accounts receivable. YIN Increase in sales returns. YIN Large percent of revenues recorded in thefourth quarter. YIN Unexplained reconciling items on the bankstatement.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage

Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Related Questions
- Ma3. Please answer this I'll leave a review!! 24 1) The most damaging type of fraud, per event, is A) corruption. B) misappropriation of assets. C) fraudulent financial reporting. D) grand theft. 2) The most common type of fraud, in frequency, is A) corruption. B) misappropriation of assets. C) fraudulent financial reporting. D) Fortnite fraud. 3) Fraudulent financial reporting is ________ likely than corruption. The amounts involved in corruption are much ________ than fraudulent financial reporting. A) less; more B) less; less C) more; less D) more, morearrow_forwardESB. ACCOUNTING CONNECTION Careful scrutiny of accounting records and financial statements can lead to the discovery of fraud or embezzlement. Each of the situations that follow may indicate a breakdown in internal control. Indicate the nature of the pos- sible fraud or embezzlement in each of these situations. 1. Wages expense for a branch office was 30 percent higher in 2014 than in 2013, even though the office was authorized to employ only the same four employees and raises were only 5 percent in 2014. 2. Sales returns and allowances increased from 5 percent to 20 percent of sales in the first two months of 2014, after record sales in 2013 resulted in large bonuses for the sales staff. 3. Gross margin decreased from 40 percent of net sales in 2013 to 20 percent in 2014, even though there was no change in pricing. Ending inventory was 50 percent less at the end of 2014 than it was at the beginning of the year. There is no immediate explanation for the decrease in inventory. 4. A…arrow_forwardCash studyarrow_forward
- Accounting This is a business law principle for today's commercial environment by Twomey| Jennings |Greene 5th edition Question-what do you think of the increasing amount of reliance on electronic interactions? Some banks now charge to return the actual canceled check and some think that it is only a matter of time before there will be a charge for dealing with a "real" teller. What are the repercussions, good and bad, of this move toward electronic financial transactions?arrow_forwardRefer to the Wall street journal article "Under Armor Faces U.S Inquiries" - from Novemver 4, 2019 - about the criminal investigation that the U.S Department of Justice is conducting, pertaining to accounting matters. identify the fraud exposures from the Fraud Exposure Rectagle that are present and explain your reasoningarrow_forwardMatch definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerl. An insurance policy that reimburses a company for any losses due to employee theft isa/an .__________________________arrow_forward
- Ababout introduction or overview,tell me which is correct option and with reason why ? tell me which are incorrect option and with reason why ?arrow_forwardDiscussion Questions on Fraud Prevention from Chapter 4 Fraud Examination 4th Edition 1. How do organizations create a culture of honesty, openness, and assistance? 2. What are different ways in which companies can eliminate opportunities for fraud? 3. What is the purpose of adopting a code of ethics throughout a company?arrow_forwardIdentify fraud triangle concepts. BE7.1 (LO 1), C Match each situation with the fraud triangle factor-opportunity, financial pressure, or rationalization-that best describes it a. An employee's monthly credit card payments are nearly 75% of his or her monthly earnings. b. An employee earns minimum wage at a firm that has reported record earnings for each of the last five years. c. An employee has an expensive gambling habit. d. An employee has check-writing and check-signing responsibilities for a small company, as well as reconciling the bank account. Identify internal control objectives.arrow_forward
- please answer all the following and give the complete solutions on how you come up with that .arrow_forward1. What would the bank have to prove to successfully bring a lawsuit against K and Lee?arrow_forwardWhich of the following is a provision of the Sarbanes-Oxley Act? a. Lessens penalties for corporate fraud b.Developed the Consumer Financial Protection Bureau c. Recommends codes of ethics for financial reporting in corporations d. Makes fraudulent financial reporting a civil offense e.Requires greater transparency in financial reportingarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningCentury 21 Accounting Multicolumn JournalAccountingISBN:9781337679503Author:GilbertsonPublisher:CengageAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Business/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage

Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage

Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage