ACP AUDITING - RISK BASED APPROACH
10th Edition
ISBN: 9780357195079
Author: JOHNSTONE
Publisher: CENGAGE C
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 2, Problem 1TFQ
The Great Salad Oil Swindle of 1963 is an asset misappropriation fraud. (T/F)
Expert Solution & Answer
To determine
Introduction: Asset misappropriation fraud refers to a fraud when any thrid-party or employees of the entity abuses there position for stealing or misusing the assets of the organization. It includes embezzlement of cash, assets stolen, and various other related losses.
To examine: Whether the given statement is true or false.
Answer to Problem 1TFQ
The given statement is “False.”
Explanation of Solution
The given case is an example of fraudulent financial reporting. Here, the organization has overstated its income by increasing the amount of inventory and understating the value of expenses. This also overstated the amount of assets.
Therefore, this statement is false.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
How do you think Raju could have used Maytas assets to cover up the fraud?
What are some red flags that may indicate a cover-up or concealment of a fraud?
the kickback is a form of fraud often associated
Chapter 2 Solutions
ACP AUDITING - RISK BASED APPROACH
Ch. 2 - The Great Salad Oil Swindle of 1963 is an asset...Ch. 2 - Prob. 2TFQCh. 2 - The three elements of the fraud triangle include...Ch. 2 - Prob. 4TFQCh. 2 - Prob. 5TFQCh. 2 - Prob. 6TFQCh. 2 - Prob. 7TFQCh. 2 - Prob. 8TFQCh. 2 - Prob. 9TFQCh. 2 - Prob. 10TFQ
Ch. 2 - Prob. 11TFQCh. 2 - Prob. 12TFQCh. 2 - Prob. 13MCQCh. 2 - Prob. 14MCQCh. 2 - Prob. 15MCQCh. 2 - Prob. 16MCQCh. 2 - Prob. 17MCQCh. 2 - Prob. 18MCQCh. 2 - Prob. 19MCQCh. 2 - Prob. 20MCQCh. 2 - Prob. 21MCQCh. 2 - Prob. 22MCQCh. 2 - Prob. 23MCQCh. 2 - Prob. 24MCQCh. 2 - Prob. 25RSCQCh. 2 - Prob. 26RSCQCh. 2 - Prob. 27RSCQCh. 2 - Refer to Exhibit 2.1 a. What is a Ponzi scheme? b....Ch. 2 - Prob. 29RSCQCh. 2 - Prob. 30RSCQCh. 2 - Prob. 31RSCQCh. 2 - Prob. 32RSCQCh. 2 - Prob. 33RSCQCh. 2 - Prob. 34RSCQCh. 2 - Prob. 35RSCQCh. 2 - Prob. 36RSCQCh. 2 - Prob. 37RSCQCh. 2 - Prob. 38RSCQCh. 2 - Many consider the Enron fraud to be one of the...Ch. 2 - Prob. 40RSCQCh. 2 - Prob. 41RSCQCh. 2 - Refer to Exhibit 2.5 and answer the following...Ch. 2 - Prob. 43RSCQCh. 2 - Prob. 44RSCQCh. 2 - Prob. 45RSCQCh. 2 - Prob. 46RSCQCh. 2 - Prob. 47RSCQCh. 2 - Prob. 48RSCQCh. 2 - Prob. 49RSCQCh. 2 - Prob. 50FFCh. 2 - Prob. 51FFCh. 2 - Prob. 52FF
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Which of the following items is not true about fraud?a. It can cause injury or damage to another party.b. It is an intentional misrepresentation of facts.c. Its damages must exceed a threshold of $150,000.d. It is designed to persuade another party to act in a way that causes injury or damage tothat party.arrow_forwardThe Foreign Corrupt Practices Act (FC PA) was implemented in 1977. Why was it enacted, and what are its major provisions?arrow_forwardWhich of the following is not fraud: a. False accounting b. Computer fraud c. Copywrite d. Theftarrow_forward
- If a company reported fi ctitious revenue, it could try to cover up its fraud by: C . creating a fi ctitious asset.arrow_forwardWhy are related-party frauds more difficult to detect than frauds with no related parties?arrow_forwardFraud consists of some deceitful practice or willful device, resorted to with intent to deprive another of his right. Fraud is generally categorized as follows: Asset Misappropriation a) May include employee theft – typically cash, physical assets (computers), or intellectual property. b) May encompass a variety of wrongful acts, such as, among others, bribes or kickbacks. c) Deliberate misrepresentation of the financial statements.arrow_forward
- Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true? a. To prevent detection when an asset is stolen, the perpetrator must inflate liabilities or decrease assets. b. Committing a fraud almost always takes more effort and time than concealing it. c. Perpetrators can hide an asset theft by charging the stolen item to an expense account. d. A lapping scheme is used to commit fraud but not to conceal it. e. An individual can hide the theft of cash using a check-kiting scheme.arrow_forwardIn most fraud cases, ____________ is the most difficult element to prove, yet it is also the most important element. A. Concealment. B. Deception. C. Intent. D. Materiality.arrow_forwardWorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s management used to carry out the fraud?arrow_forward
- 15. Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds.arrow_forwardRefer to Exhibit 2.1 a. What is a Ponzi scheme? b. Describe the key elements of the Bernie Madoff fraud. c. Is this fraud primarily a case of asset misappropriation or fraudulent financial reporting?arrow_forwardSelect the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer. In a typical misappropriation, the perpetrator: Gains the trust or confidence of the entity being defrauded. Uses trickery, cunning, or false or misleading information to commit fraud. Does not make an attempts to conceal the fraud. Terminates the fraud as soon as the desired amount of money is taken to avoid detection. Saves a large portion of the stolen money. Gets greedy and takes ever-larger amounts of money or grows careless or overconfident, leading to a mistake that leads to the fraud’s detection.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:CengageAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Principles of Accounting Volume 2AccountingISBN:9781947172609Author:OpenStaxPublisher:OpenStax College
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 2
Accounting
ISBN:9781947172609
Author:OpenStax
Publisher:OpenStax College
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License