Auditing: A Risk Based-Approach to Conducting a Quality Audit
10th Edition
ISBN: 9781305080577
Author: Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher: South-Western College Pub
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 2, Problem 18MCQ
To determine
Introduction:Committee of Sponsoring Organizations of the Tread way Commission (COSO) is an authorized provider for guiding companies on various matters like internal controls of management, threat management, and fraud anticipation.
To identify:The results drawn from the COSO studies.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Question: Which of the following statements accurately describes a fraud detection
technique in accounting? a) Fraud detection relies solely on analyzing financial
statements. b) Regular internal audits are unnecessary for fraud detection. c)
Segregation of duties is an effective fraud detection measure. d) Fraud detection
techniques do not require the use of technology.
Explain the three special characteristics of management fraud:
a. The fraud is perpetrated at levels of management above the one to which internal control structures generally relate.
b. The fraud frequently involves using the financial statements to create an illusion that an entity is healthier and more prosperous than, in fact, it is.
c. If the fraud involves misappropriation of assets, it frequently is shrouded in a maze of complex business transactions, often involving related third parties.
Please provide me a correct and clear explanations. Thank you!
Which of the following is NOT a trend in Corporate Fraud?
a) Anti-fraud controls have little impact on reduced fraud losses and shorter fraud duration
b) Tips are consistently the most common detection method
c) Banking, financial services, government/public administration and manufacturing have the greatest number of fraud cases reported
Chapter 2 Solutions
Auditing: A Risk Based-Approach to Conducting a Quality Audit
Ch. 2 - The Great Salad Oil Swindle of 1963 is an asset...Ch. 2 - Prob. 2TFQCh. 2 - The three elements of the fraud triangle include...Ch. 2 - Prob. 4TFQCh. 2 - Prob. 5TFQCh. 2 - Prob. 6TFQCh. 2 - Prob. 7TFQCh. 2 - Prob. 8TFQCh. 2 - Prob. 9TFQCh. 2 - Prob. 10TFQ
Ch. 2 - Prob. 11TFQCh. 2 - Prob. 12TFQCh. 2 - Prob. 13MCQCh. 2 - Prob. 14MCQCh. 2 - Prob. 15MCQCh. 2 - Prob. 16MCQCh. 2 - Prob. 17MCQCh. 2 - Prob. 18MCQCh. 2 - Prob. 19MCQCh. 2 - Prob. 20MCQCh. 2 - Prob. 21MCQCh. 2 - Prob. 22MCQCh. 2 - Prob. 23MCQCh. 2 - Prob. 24MCQCh. 2 - Prob. 25RSCQCh. 2 - Prob. 26RSCQCh. 2 - Prob. 27RSCQCh. 2 - Refer to Exhibit 2.1 a. What is a Ponzi scheme? b....Ch. 2 - Prob. 29RSCQCh. 2 - Prob. 30RSCQCh. 2 - Prob. 31RSCQCh. 2 - Prob. 32RSCQCh. 2 - Prob. 33RSCQCh. 2 - Prob. 34RSCQCh. 2 - Prob. 35RSCQCh. 2 - Prob. 36RSCQCh. 2 - Prob. 37RSCQCh. 2 - Prob. 38RSCQCh. 2 - Many consider the Enron fraud to be one of the...Ch. 2 - Prob. 40RSCQCh. 2 - Prob. 41RSCQCh. 2 - Refer to Exhibit 2.5 and answer the following...Ch. 2 - Prob. 43RSCQCh. 2 - Prob. 44RSCQCh. 2 - Prob. 45RSCQCh. 2 - Prob. 46RSCQCh. 2 - Prob. 47RSCQCh. 2 - Prob. 48RSCQCh. 2 - Prob. 49RSCQCh. 2 - Prob. 50FFCh. 2 - Prob. 51FFCh. 2 - Prob. 52FF
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Which is NOT a source of fraud risk (from the Fraud Triangle)? a) Fraud Tip Hotline b) Perceived Opportunity c) Rationalization d) Financial Pressurearrow_forwardThe following scenarios are taken from actual fraud cases. For each scenario, categorize as primarily indicating (A) An incentive to commit fraud (B) An opportunity to commit fraud or (C) a rationalization for committing fraud. State your reason for your answer in each scenario. 1. Top management of the company closely guards internal financial information, to the extent that even some employees on a "need to know basis" are denied full access.arrow_forwardThe Peregrine financial group fraud Background on the company and type of fraud committed How the detection of the fraud was revealed Two methods of investigation that differs from the actual fraud casearrow_forward
- Which of the following is not included in a vulnerability chart? a. Internal controls that a company plans to institute in the future. b. Breakdowns in key internal controls that may have created fraud opportunities. c. Theft investigation methods d. Explanations of the fraud triangle in relation to suspects of fraud.arrow_forwardExplain, what types of fraud scheme is Steinhoff likely to use to commit financial statement fraud?arrow_forwardThe fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. The business has no cameras or security devices at its warehouse.arrow_forward
- Fraud risk factors are events or conditions that indicateI. An incentive or pressure to perpetrate fraud.II. An opportunity to carry out the fraud.III. An attitude or rationalization that justifies the fraudulent action.Which of the following statements is true?a. I is a fraud risk factor.b. I and II are fraud risk factors.c. II and III are fraud risk factors.d. None of these is a fraud risk factor.e. I, II, and III are fraud risk factors.arrow_forwardWhich of the following factors creates an opportunity for fraud to be committed in an organization? a. Management demands financial success. b. Poor internal control. c. Commitments tied to debt covenants. d. Management is aggressive in its application of accounting rules.arrow_forwardResearch a company that had a fraud event happen due to inadequate accounting procedures. Review the fraud event that happened in the company in detail and identify at least two accounting control procedures that were deficient in this event. Propose an internal control system that would have eliminated the fraud, using the ERP system.arrow_forward
- 21) Which is not one of the fraud factors in the Fraud Pentagon? A. Incentive B. Pressure C. Opportunity D. Employee disenfranchisementarrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardWhat is a good response to.... Embezzlement is a type of fraud that happens when someone within an organization misuses their position of trust to steal money. This breach of trust is an intentional form of deceit to misappropriately utilize these funds for their own gain. Reviewing sales, refunds, returns, cash deposits, and voided transactions would help identify any form of fraud as an assistant manager. If there are any discrepancies identified, it would help to review logs of who accessed software at specific times to help identify the culprit. If there was something identified the next step would be to reports the findings to higher management depending on company protocol and be a confidant during the investigation process. It is not advisable to have direct confrontation as it could lead to further deceitful actions with the intent to cover up their actions.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,