Introduction:
The internal
Control Procedures is an important element within internal control which helps to achieve organizational objectives laid down by the management including prevention of fraud. It includes segregation of duties, rotation of responsibilities, mandatory vacations, authorizations, verifications and monitoring activities within organization.
To discuss:
The weaknesses of internal control system that led to thepresence and size of losses.
Want to see the full answer?
Check out a sample textbook solutionChapter 5 Solutions
Survey of Accounting (Accounting I)
- Summarize the alleged fraud List which management assertions were violated In your opinion, what component(s) of the COSO framework were weak/missing? If you were to audit FTX’s cash, name 1-2 procedure(s) that you could have done to detect this fraudFOR Defendant concealed his diversion of FTX customers’ funds to crypto trading firm Alameda Research while raising more than $1.8 billion from investors The Securities and Exchange Commission today charged Samuel Bankman-Fried with orchestrating a scheme to defraud equity investors in FTX Trading Ltd. (FTX), the crypto trading platform of which he was the CEO and co-founder. Investigations as to other securities law violations and into other entities and persons relating to the alleged misconduct are ongoing. According to the SEC’s complaint, since at least May 2019, FTX, based in The Bahamas, raised more than $1.8 billion from equity investors, including approximately $1.1 billion from approximately 90 U.S.-based investors. In his…arrow_forwardWorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s management used to carry out the fraud?arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forward
- When in an examination of a retail firm, Lily, a recently recruited internal auditor, discovered a plan in which the warehouse manager and a buying staff moved around Php2 million worth of products to an outside warehouse, where they were sold to third parties. Because the warehouse manager changed the perpetual inventory records and subsequently transmitted receiving reports to the accounts payable department for processing, the fraud was not discovered earlier by the internal audit team. Which one of the following steps did Lily follow that resulted in the discovery of the missing materials and the fraud? Group of answer choicesRandom sampling of receiving reports and tracing to the recording in the perpetual inventory records.Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department.Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory…arrow_forwardAssume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardThe Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…arrow_forward
- 18.During an audit of a retail company, Lily, newly hired internal auditor, found a scheme in which the warehouse manager and a purchasing staff diverted approximately Php2 million worth of goods to an outside warehouse, the sold the goods to third parties. The fraud was not found earlier by the internal audit team since the warehouse manager updated the perpetual inventory records and then forwarded receiving reports to the accounts payable department for processing. Which of the following procedures did Lily perform which would have most likely led to the discovery of the missing materials and the fraud? Group of answer choices Random sampling of receiving reports and tracing to the recording in the perpetual inventory records. Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department. Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory records. Random…arrow_forwardSome of the largest business frauds ever perpetrated have involved the misstatement of inventory. Two classics were at Leslie Fay and McKesson Corporation. Feel free to check them out to get a feel for the impact that it has. There is considerable information regarding inventory frauds available on the Internet. Search for information about another instance of inventory fraud at any other company, and prepare an explanation of the nature of the inventory fraud.arrow_forwardCharles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in lectures network risks and auditing could you use to help detect this type of fraud?arrow_forward
- Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. The number of incidents and the total dollar losses from computer fraud are increasing rapidly for several reasons: a. Many instances of computer fraud go undetected and many frauds are not reported. b. Many companies are moving to cloud services where there are few data security controls. c. Internet sites offer step-by-step instructions on how to perpetrate computer fraud and abuse. d. Law enforcement is not interested in preventing or prosecuting computer fraud. e. There are no laws against computer fraud so prosecution is difficultarrow_forwardInnovative Marketing, Inc. (IMI), sold “scareware”—computer security software. IMI’s Internet ads redirected consumers to sites where they were told that a scan of their computers had detected dangerous files—viruses, spyware, and “illegal” pornography. In fact, no scans were conducted. Kristy Ross, an IMI co-founder and vice president, reviewed and edited the ads, and was aware of the many com- plaints that consumers had made about them. An individual can be held liable under the Federal Trade Commission Act’s prohibition of deceptive acts or practices if the person (1) participated directly in the deceptive practices or had the authority to control them and (2) had or should have had knowledge of them. Were IMI’s ads deceptive? If so, can Ross be held liable? Explain..arrow_forwardThe estimates of losses annually resulting from computer fraud vary widely. Why do you think obtaining a good estimate of this figure is difficult?arrow_forward
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub