Discussion 4-1
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
693
Subject
Accounting
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by MagistrateTurtleMaster890
Recall the discussion about the Peregrine Case
in Module Two. The fraud was discovered at Peregrine when electronic confirmations were introduced.
What are advantages to electronic confirmations?
What are risks associated with electronic confirmations?
In your responses to your peers, do you agree with their assessment of the risks associated with electronic confirmations? Can you suggest ways to mitigate the risks associated with electronic confirmations? Do you agree with the advantages? Why or why not?
“In July 2012, Peregrine Financial Group filed for bankruptcy following the discovery
that $215 million customer balances had been embezzled.” (Elder, et. at., 2013) The company
CEO had embezzled millions from the company over a 20-year timespan. He did so by utilizing
programs like photoshop and excel, while also ensuring any and all financial information
pertaining to the company be sent directly to him to open. In this particular case, paper
documents seemed to be the most utilized form Wasendorf used to commit fraud. As paper-based audits have been the norm since the beginning, it doesn’t always mean
they are the perfect way to detect fraud. McConnell states, “Confirmations can be an effective
tool for auditors working with accounts including payables and receivables, inventory,
investment securities, lines of credit, and other actual or contingent liabilities.” (McConnell, et.
al., 2008) Confirmations can be used to provide evidence about “key assertations related to
revenue and collections, in particular, existence and valuation.” (Casey, 2019) Electronic
confirmations assist in alleviating the issues that tend to arise when using paper ones. In terms of
time, electronic confirmations take less time and improve the response rate for auditors. While
electronic confirmations are efficient, it does not mean they are without risks. Some risks include
the cost to implement may be too great. Another risk could be low response rates, or the
respondent is unauthorized to respond. Lastly, another risk could be fraud due to forgeries or
collusion.
References
Elder, R. J., Janvrin, D. J., & Caster, P. (2014). Peregrine--Twenty Years of Fraudulent Cash
Balances. Issues in Accounting Education, 29(2), 337–348.
https://doi-
org.ezproxy.snhu.edu/10.2308/iace-50690
Mcconnell And Charles H. Schweiger. (2008, April 1). Better Evidence Gathering
. Journal of Accountancy. https://www.journalofaccountancy.com/issues/2008/apr/betterevidencegathering.html Pcaobus. (n.d.). https://assets.pcaobus.org/pcaob-dev/docs/default-source/rulemaking/
docket_028/2023-008_confirmation-adopting-release.pdf?sfvrsn=e18cef74_2
Hi Kiley,
Great post! I think you did a great job touching upon the usefulness of electronic confirmations. I
agree with your statement that they are much more secure than paper. Given the case study,
where paper statements were altered, I think your statement holds value. I also agree with your
statement that electronic confirmations save time and money. Though the initial implementation
may be costly, the long-term costs outweigh that immensely. Though electronic confirmations
are efficient they aren’t perfect. You did a great job highlighting the risks that arise with them.
Do you think there will come a time where we can rely on the confirmations to be correct with
little verifications?
Thank you,
Janieva
Hi Ashley,
I agree with your statement that electronic confirmations are easy to ascertain. They make the
jobs of an auditor easier, while removing paper from the equation. I like that you pointed out that
there have been serval cases where the weaknesses of paper-based confirmations. It highlights
the need to lessen the use of paper-based confirmations going forward. Electronic confirmations
are flawed, and this case can highlight how they are. I believe the case focused more on the
altering of paper statements, rather than statement received by the auditor directly from the bank.
If Wasendorf had someone at the bank altering the statements on his behalf, the electronic
confirmations would be a risky endeavor.
Thank you,
Janieva
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Related Questions
Assume Ethan sets a meeting with Vick in two days to follow-up on his request. Vick has decided not to be part of the cover-up. Use the GVV framework to help Vick prepare for the meeting. Consider the following:
What should Vick say to counteract Ethan's request?
How might Vick's intended action affect the company and the external auditors?
Who can Vick go to for support?
arrow_forward
The story of FTX is another "open and shut" fraud case, this time taking place in the digital world. Completing this activity allows you to continue building your knowledge of how fraud is detected, how evidence is collected, how fraudsters are prosecuted, and how fraud affects those involved.
Review the video, The Trial Against Same Bankman-Friend: How Did We Get Here?
Read the following brief case overview:
A federal grand jury in Manhattan returned an indictment charging Samuel Bankman-Fried, aka SBF, 30, of Stanford, California, with wire fraud, conspiracy to commit wire fraud, conspiracy to commit commodities fraud, conspiracy to commit securities fraud, conspiracy to commit money laundering, and conspiracy to defraud the Federal Election Commission and commit campaign finance violations.
In March 2024, FTX co-founder and CEO Sam Bankman-Fried was convicted of 2 counts of wire fraud and five counts of conspiracy after his crypto empire collapsed, defrauding investors in his…
arrow_forward
If you had the opportunity to interview Rita Crundwell, what would you ask her and why? 2. Should the external auditors have been able to identify the false invoices? 3. What was the most shocking piece of evidence you learned about the Crundwell case?
arrow_forward
Select the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer.
Which of the following statements is (are) true about computer fraud perpetrators?
a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community.
b. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money.
c. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold.
d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.
arrow_forward
Overview
The story of FTX is another "open and shut" fraud case, this time taking place in the digital world. Completing this activity allows you to continue building your knowledge of how fraud is detected, how evidence is collected, how fraudsters are prosecuted, and how fraud affects those involved.
Prepare
Review the video, The Trial Against Same Bankman-Friend: How Did We Get Here?
Read the following brief case overview:
A federal grand jury in Manhattan returned an indictment charging Samuel Bankman-Fried, aka SBF, 30, of Stanford, California, with wire fraud, conspiracy to commit wire fraud, conspiracy to commit commodities fraud, conspiracy to commit securities fraud, conspiracy to commit money laundering, and conspiracy to defraud the Federal Election Commission and commit campaign finance violations.
In March 2024, FTX co-founder and CEO Sam Bankman-Fried was convicted of 2 counts of wire fraud and five counts of conspiracy after his crypto empire collapsed, defrauding…
arrow_forward
Answer the following based on the image of the scenario
A-Help management understand the issue from Jack’s perspective. Describe the ethical dilemma that Jack faces. What is the issue? Who are the parties involved? If you were Jack, what would you consider when making a decision?
B-Help management understand the elements of the fraud triangle in this situation which increase the chances of fraud. Why is this fraud? What are the opportunities, motivations and rationalizations that you see? How does this affect the business financially?
C-Help management come up with a plan to minimize the likelihood of this happening in the future. Be sure to mention specific components of the COSO framework.
arrow_forward
Fast answer please
arrow_forward
In the “Fraud and the Accounts Payable Function” section, we described a fraud committed by Stanley and Phoebe and another by Veronica. For each fraud, describe controls and technology that could be used to reduce the risk of those frauds occurring.
arrow_forward
As a fraud investigator, why you should be concerned about fraud trials as a result of resolving a fraud investigation case?
arrow_forward
One way of analyzing whether National Security Agency (NSA) whistleblower Edward Snowden’s actions were justified in leaking classified materials exposing the breadth of the U.S. government’s surveillance activities is by weighing personal morality against the morality that comes with one’s adopted professional role. Using this perspective, do you believe Snowden’s act was ethical?
arrow_forward
“Identity theft is often applied to a wide range of crimes, including checking account fraud, counterfeiting, forgery, auto theft using false documentation, trafficking in human beings, and terrorism, most policymakers, and researchers agree that identity theft includes the misuse of another individual’s personal information to commit fraud”.
Required:
Where does identity theft fraud happen often? Explain any five steps that victims should need to take once identity theft occurs.
arrow_forward
Whistle-blowers have played a key role in fraud detection. There are several types of whistle-blowers and safeguards for each type. Analyze the adversities that whistle-blowers face, including the safeguards intended to protect them. Compare the different types of whistle-blowers. What is the importance of each type?
arrow_forward
In writing your response, the following points must be addressed fully:a) Determine the type of fraud committed and describe with examples thesymptoms of fraud that are evident in the case study.b) As discussed in units 1 to 4, all frauds involve key elements. Identify anddescribe, using examples, the elements of the Purell’s magazine fraud.c) What role did trust play in allowing this fraudulent scheme to transpire?What elements contributed to this trust? Outline two positive and twonegative consequences that this might pose to the company in future fraudprevention.d) Describe Purell Magazine and Publishing House fraud preventionprogramme and identify any improvements that might be necessary toprevent this type of fraud or at least discover it sooner.
arrow_forward
View the Bloomberg video here: Tesla CEO Elon Musk Tried to Destroy a Whistleblower. Answer the following questions: Which factors would weigh negatively on your acceptance of Tesla as an audit client? Which factors would weigh positively on your acceptance of Tesla as an audit client?
arrow_forward
Explain why professional skepticism would be critical in assessing and responding to the risk of fraud.
arrow_forward
Research fraud cases that involved agency conflicts. Provide the following:
Overview of the organization
Who was involved?
How was the fraud committed?
What was the outcome?
What recommendations do you have to stop such a fraud relating to this conflict of interest?
arrow_forward
If one of the three elements of the fraud triangle is not present, can fraud still be perpetrated? Explain.
Identify factors (red flags) that would be strong indicators of opportunities to commit fraud.
Is the ability to rationalize the fraud an important aspect to consider when analyzing a potentially fraudulent situation? What are some of the common rationalizations used by fraud perpetrators?
Define and illustrate kiting. What controls should the client institute to prevent it?
arrow_forward
Computer-assisted audit techniques (CAATs) are becoming more popular in recent years.
Select two CAATs and explain how they are useful in auditing.
Suggest a method that someone with fraudulent intentions could use to work around the CAAT for personal gains.
Be sure to respond to at least one of your classmates' posts.
arrow_forward
Listed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a preventive control.a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. (The user subsequently codes this information ontoa magnetic coding device and places this strip on a piece of cardboard.)b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled.c. Because of occasional noise on a transmission line, data being transferred is lost or garbled.d. An intruder is temporarily delaying important strategic messages over the telecommunications lines.e. An intruder is altering electronic messages before the user receives them.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Related Questions
- Assume Ethan sets a meeting with Vick in two days to follow-up on his request. Vick has decided not to be part of the cover-up. Use the GVV framework to help Vick prepare for the meeting. Consider the following: What should Vick say to counteract Ethan's request? How might Vick's intended action affect the company and the external auditors? Who can Vick go to for support?arrow_forwardThe story of FTX is another "open and shut" fraud case, this time taking place in the digital world. Completing this activity allows you to continue building your knowledge of how fraud is detected, how evidence is collected, how fraudsters are prosecuted, and how fraud affects those involved. Review the video, The Trial Against Same Bankman-Friend: How Did We Get Here? Read the following brief case overview: A federal grand jury in Manhattan returned an indictment charging Samuel Bankman-Fried, aka SBF, 30, of Stanford, California, with wire fraud, conspiracy to commit wire fraud, conspiracy to commit commodities fraud, conspiracy to commit securities fraud, conspiracy to commit money laundering, and conspiracy to defraud the Federal Election Commission and commit campaign finance violations. In March 2024, FTX co-founder and CEO Sam Bankman-Fried was convicted of 2 counts of wire fraud and five counts of conspiracy after his crypto empire collapsed, defrauding investors in his…arrow_forwardIf you had the opportunity to interview Rita Crundwell, what would you ask her and why? 2. Should the external auditors have been able to identify the false invoices? 3. What was the most shocking piece of evidence you learned about the Crundwell case?arrow_forward
- Select the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true about computer fraud perpetrators? a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community. b. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money. c. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold. d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.arrow_forwardOverview The story of FTX is another "open and shut" fraud case, this time taking place in the digital world. Completing this activity allows you to continue building your knowledge of how fraud is detected, how evidence is collected, how fraudsters are prosecuted, and how fraud affects those involved. Prepare Review the video, The Trial Against Same Bankman-Friend: How Did We Get Here? Read the following brief case overview: A federal grand jury in Manhattan returned an indictment charging Samuel Bankman-Fried, aka SBF, 30, of Stanford, California, with wire fraud, conspiracy to commit wire fraud, conspiracy to commit commodities fraud, conspiracy to commit securities fraud, conspiracy to commit money laundering, and conspiracy to defraud the Federal Election Commission and commit campaign finance violations. In March 2024, FTX co-founder and CEO Sam Bankman-Fried was convicted of 2 counts of wire fraud and five counts of conspiracy after his crypto empire collapsed, defrauding…arrow_forwardAnswer the following based on the image of the scenario A-Help management understand the issue from Jack’s perspective. Describe the ethical dilemma that Jack faces. What is the issue? Who are the parties involved? If you were Jack, what would you consider when making a decision? B-Help management understand the elements of the fraud triangle in this situation which increase the chances of fraud. Why is this fraud? What are the opportunities, motivations and rationalizations that you see? How does this affect the business financially? C-Help management come up with a plan to minimize the likelihood of this happening in the future. Be sure to mention specific components of the COSO framework.arrow_forward
- Fast answer pleasearrow_forwardIn the “Fraud and the Accounts Payable Function” section, we described a fraud committed by Stanley and Phoebe and another by Veronica. For each fraud, describe controls and technology that could be used to reduce the risk of those frauds occurring.arrow_forwardAs a fraud investigator, why you should be concerned about fraud trials as a result of resolving a fraud investigation case?arrow_forward
- One way of analyzing whether National Security Agency (NSA) whistleblower Edward Snowden’s actions were justified in leaking classified materials exposing the breadth of the U.S. government’s surveillance activities is by weighing personal morality against the morality that comes with one’s adopted professional role. Using this perspective, do you believe Snowden’s act was ethical?arrow_forward“Identity theft is often applied to a wide range of crimes, including checking account fraud, counterfeiting, forgery, auto theft using false documentation, trafficking in human beings, and terrorism, most policymakers, and researchers agree that identity theft includes the misuse of another individual’s personal information to commit fraud”. Required: Where does identity theft fraud happen often? Explain any five steps that victims should need to take once identity theft occurs.arrow_forwardWhistle-blowers have played a key role in fraud detection. There are several types of whistle-blowers and safeguards for each type. Analyze the adversities that whistle-blowers face, including the safeguards intended to protect them. Compare the different types of whistle-blowers. What is the importance of each type?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning

Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning