ACC 423- 5-3 Assignment- Stealing Inventory vs Other Assets
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
423
Subject
Accounting
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by Barbara8289
1
Stealing Inventory vs Other Assets Harriet Creyer
5-3 Assignment: Stealing Inventory vs Other Assets
Southern New Hampshire University
ACC 423: Detection/Prevention Fraud Financial Statements
2
Stealing Inventory vs Other Assets Stealing Inventory
Stealing Other Assets
Controls
Establishing proper inventory and asset management procedures,
such as tracking and monitoring inventory levels, and implementing
security measures to prevent theft.
Establishing security measures to prevent physical access to inventory or assets, such as locks, fences, and motion sensors.
Performing regular inventory checks and audits to ensure accuracy
and detect any discrepancies.
Monitoring employee activities with CCTV or other security measures, such as access controls or logins.
(Wells, 2017)
Requiring employees to sign in and out when handling inventory or assets and documenting these transactions.
Segregating duties and assigning responsibility for inventory or asset management to specific individuals.
Instituting policies and procedures for investigating and reporting inventory or asset theft, such as whistleblower policies.
(Wells, 2017)
Differences
The physical removal of goods, while asset theft involves the theft of intangible assets such as intellectual property and confidential data.
Is usually done by employees or outsiders, while asset theft can also
be done by malicious insiders.
(Wells, 2017)
Falsifying documentation for time sheet, vacation, and property forms
when an employee requisitions materials to complete a work‐related project, then steals the materials instead.
Other assets can be a large variety of things such as: time, money, buildings, digital content, vehicles.
(Wells, 2017)
Red Flags
Unusually high levels of inventory shrinkage, which is when products or raw materials are removed from inventory without being counted or
recorded.
Unusual transactions or discrepancies in
Unusual activity around the storage areas for inventory or assets, such as people coming and going without authorization.
Lack of security measures for assets, such
as locks and security
3
Stealing Inventory vs Other Assets inventory records, such as discrepancies in quantity, value, or category.
(Wells, 2017)
cameras.
False Documentation
(Wells, 2017)
References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Stealing Inventory vs Other Assets Wells, J. T. (2017). Corporate Fraud Handbook: Prevention and Detection (5th ed.). Wiley
Professional Development (P&T). https://mbsdirect.vitalsource.com/books/9781119351955
Related Documents
Related Questions
Which of the following is not an example of safeguarding inventory?
a. physical devices such as two-way mirrors, cameras, and alarms
b. returning inventory that is defective or broken
OC. matching receiving documents, purchase orders, and vendor's invoice
Od. storing inventory in restricted areas
arrow_forward
1. Match the description on the left with the type of theft on the right using Excel
spreadsheet. See notes below.
1. Most common type of noncash theft
2. Goods shipped to an accomplice
3. Altering physical inventory counts to cover theft
4. Goods are stolen, then a receiving document is
created showing fewer goods received
a. Fraudulent write-off
b. Unconcealed larceny
c. Falsified shipping or
receiving report
d. Fraudulent shipment
arrow_forward
Unconcealed larceny includes:
stealing with no attempt to cover up the theft
falsified receiving reports that cover up a theft by recording a shortage or “defective goods”
altering inventory records to match the balance in the inventory account
all of the above
arrow_forward
Question 2
As the auditor of Sample Limited you note the following matters relating to the internal control
of its sales system.
i)
The sales department accepts order without first checking the inventory level with
the warehouse.
ii) Goods are dispatched to customers without recording customer's signatures as proof
of receipt of goods.
iii) Orders of goods placed by customers are properly recorded but they are not
forwarded timely to the dispatch department for fulfilling the order.
a) For each of the above deficiencies, identify the possible impact on the company's
operation and recommend a control to address it.
b) Explain why an auditor cannot perform only test of control in an audit.
arrow_forward
5
arrow_forward
Answer #2 only
arrow_forward
The case:
In this case, a medium-sized, family-owned business suffered a significant loss of inventory due to
theft by several long-time employees.
Overall: Several factors played into the inventory theft, including poor internal controls, a lack of
timely accounting records, and difficulty in measuring and tracking inventory items.
Inventory was not reconciled or monitored for the company-owned retail outlets which enabled the
misappropriated inventory to be removed from inventory records without detection.
Identify and describe the followings:
1. a measure that could have prevented the theft
2. a measure that could have detected the theft
3. a step to take once fraud is suspected.
My work:
Internal controls are protocols and procedures used by a business to protect its assets and maintain
the accuracy of its financial records. Employee theft is a common problem that can have serious
consequences for businesses, with 75% of businesses being affected by it and 33% going bankrupt
due to…
arrow_forward
Required information
Potential Misstatements in the Auditing of Inventory
Read the overview below and complete the activities that follow.
Because of its importance and typically high dollar value on the balance sheet of a manufacturing
entity, the audit of inventory is important and often high risk. As such, auditors must take additional
care when auditing this area due to the capacity for both errors and fraud.
CONCEPT REVIEW:
When identifying misstatements in testing inventory, it is important to consider the control environment
to determine if the misstatements found are indicators of client error or intentional fraud.
1. Inventories with a high risk of
2. Purchasing and cash disbursements can provide opportunity for
by employees
3.
considering information about the client and its environment, the auditors must assess the
risks of material misstatement related to assertions about inventory
may be warranted as a signficant risk
5.
4
Audit procedures for consignment inventory could…
arrow_forward
Question 2
What internal control or procedure(s) would provide protection against the following threats?
Workers on the shipping dock steal goods, claiming that the inventory shortages reflect errors in the inventory records.
An employee authorizes a credit memo for a sales return when the goods were never actually returned
A waiter steals cash by destroying the customer sales ticket for customers who paid cash.
A business loses all information about amounts owed by customers in Gaza City because the master database for that office was destroyed in a fire.
The cashier steals funds by cashing several checks from customers.
arrow_forward
Internal Control Principles
Pampillonia Fruits Market took the following actions to improve internal
controls. For each of the following actions, identify the internal control principle
the company followed.
a. The recordkeeper is prohibited from having control over cash.
b. An insurance (bonding) policy is purchased against losses from theft by a
cashier.
c. Each cashier is designated a specific cash drawer and is solely responsible
for cash in that drawer.
d. Detailed records of inventory are kept to ensure items lost or stolen do not
go unnoticed.
e. Digital time clocks are used to register which employees are at work at what
times.
f. External auditors are regularly hired to evaluated internal controls.
1
arrow_forward
The separation of operational responsibility from record keeping is meant to prevent different types of misstatements than the separation of the custody of assets from accounting. Explain the difference in the purposes of these two types of separation of duties.
For each of the following, give an example of a physical control the client can use to protect the asset or record:
a. Petty cash
b. Cash received by retail clerks
c. Accounts receivable records
d. Raw material inventory
e. Perishable tools
f. Manufacturing equipment
arrow_forward
Question 26
When an audit team selects a sample of shipping documents from the company's shipping logs and traces to copies of sales invoices the auditor is trying to find evidence that:
Shipments to customers were invoiced
Shipments to customers were recorded as sales in the sales journal
Recorded sales from the sales journal were shipped.
Inventory records were properly relieved.
arrow_forward
Which of the following are examples of the misappropriation of assets?
O A. An employee theft of inventory.
O B. A kickback scheme in the purchasing function.
OC. An employee overstates an expense reimbursement request after a company trip.
O D. all of the above
Click to select your answer.
11:59pm
99+
ch
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619455/9781337619455_smallCoverImage.gif)
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Related Questions
- Which of the following is not an example of safeguarding inventory? a. physical devices such as two-way mirrors, cameras, and alarms b. returning inventory that is defective or broken OC. matching receiving documents, purchase orders, and vendor's invoice Od. storing inventory in restricted areasarrow_forward1. Match the description on the left with the type of theft on the right using Excel spreadsheet. See notes below. 1. Most common type of noncash theft 2. Goods shipped to an accomplice 3. Altering physical inventory counts to cover theft 4. Goods are stolen, then a receiving document is created showing fewer goods received a. Fraudulent write-off b. Unconcealed larceny c. Falsified shipping or receiving report d. Fraudulent shipmentarrow_forwardUnconcealed larceny includes: stealing with no attempt to cover up the theft falsified receiving reports that cover up a theft by recording a shortage or “defective goods” altering inventory records to match the balance in the inventory account all of the abovearrow_forward
- Question 2 As the auditor of Sample Limited you note the following matters relating to the internal control of its sales system. i) The sales department accepts order without first checking the inventory level with the warehouse. ii) Goods are dispatched to customers without recording customer's signatures as proof of receipt of goods. iii) Orders of goods placed by customers are properly recorded but they are not forwarded timely to the dispatch department for fulfilling the order. a) For each of the above deficiencies, identify the possible impact on the company's operation and recommend a control to address it. b) Explain why an auditor cannot perform only test of control in an audit.arrow_forward5arrow_forwardAnswer #2 onlyarrow_forward
- The case: In this case, a medium-sized, family-owned business suffered a significant loss of inventory due to theft by several long-time employees. Overall: Several factors played into the inventory theft, including poor internal controls, a lack of timely accounting records, and difficulty in measuring and tracking inventory items. Inventory was not reconciled or monitored for the company-owned retail outlets which enabled the misappropriated inventory to be removed from inventory records without detection. Identify and describe the followings: 1. a measure that could have prevented the theft 2. a measure that could have detected the theft 3. a step to take once fraud is suspected. My work: Internal controls are protocols and procedures used by a business to protect its assets and maintain the accuracy of its financial records. Employee theft is a common problem that can have serious consequences for businesses, with 75% of businesses being affected by it and 33% going bankrupt due to…arrow_forwardRequired information Potential Misstatements in the Auditing of Inventory Read the overview below and complete the activities that follow. Because of its importance and typically high dollar value on the balance sheet of a manufacturing entity, the audit of inventory is important and often high risk. As such, auditors must take additional care when auditing this area due to the capacity for both errors and fraud. CONCEPT REVIEW: When identifying misstatements in testing inventory, it is important to consider the control environment to determine if the misstatements found are indicators of client error or intentional fraud. 1. Inventories with a high risk of 2. Purchasing and cash disbursements can provide opportunity for by employees 3. considering information about the client and its environment, the auditors must assess the risks of material misstatement related to assertions about inventory may be warranted as a signficant risk 5. 4 Audit procedures for consignment inventory could…arrow_forwardQuestion 2 What internal control or procedure(s) would provide protection against the following threats? Workers on the shipping dock steal goods, claiming that the inventory shortages reflect errors in the inventory records. An employee authorizes a credit memo for a sales return when the goods were never actually returned A waiter steals cash by destroying the customer sales ticket for customers who paid cash. A business loses all information about amounts owed by customers in Gaza City because the master database for that office was destroyed in a fire. The cashier steals funds by cashing several checks from customers.arrow_forward
- Internal Control Principles Pampillonia Fruits Market took the following actions to improve internal controls. For each of the following actions, identify the internal control principle the company followed. a. The recordkeeper is prohibited from having control over cash. b. An insurance (bonding) policy is purchased against losses from theft by a cashier. c. Each cashier is designated a specific cash drawer and is solely responsible for cash in that drawer. d. Detailed records of inventory are kept to ensure items lost or stolen do not go unnoticed. e. Digital time clocks are used to register which employees are at work at what times. f. External auditors are regularly hired to evaluated internal controls. 1arrow_forwardThe separation of operational responsibility from record keeping is meant to prevent different types of misstatements than the separation of the custody of assets from accounting. Explain the difference in the purposes of these two types of separation of duties. For each of the following, give an example of a physical control the client can use to protect the asset or record: a. Petty cash b. Cash received by retail clerks c. Accounts receivable records d. Raw material inventory e. Perishable tools f. Manufacturing equipmentarrow_forwardQuestion 26 When an audit team selects a sample of shipping documents from the company's shipping logs and traces to copies of sales invoices the auditor is trying to find evidence that: Shipments to customers were invoiced Shipments to customers were recorded as sales in the sales journal Recorded sales from the sales journal were shipped. Inventory records were properly relieved.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619455/9781337619455_smallCoverImage.gif)
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,