Survey of Accounting (Accounting I)
8th Edition
ISBN: 9781337517386
Author: WARREN
Publisher: Cengage
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 5.6E
To determine
Introduction:
Control Procedures within internal control provides reasonable assurance that the objectives laid down by the management will be achieved including prevention of fraud. It includes segregation of duties, rotation of responsibilities, authorizations, verifications and monitoring activities within organization.
To explain:
The reasons for determining the fraud in the trucking company after two years.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?
Read the following information and then answer questions a & b below:
Assume you are an internal auditor for a large, multinational, manufacturing organization with a division in Mexico. One of your responsibilities is to investigate allegations made on the company’s fraud hotline. When you arrive at work one morning you learn an anonymous tip was left on the hotline that alleges fraud involving the division manager. “Pat’s significant other is a fraudulent vendor,” was the anonymous tip left on your company’s fraud hotline. Pat is a division manager at your company.
“Wow. I can’t believe this guy is so blatant,” you are thinking as you review some accounts payable invoices while following up on this anonymous tip. A quick search of the AP file reveals a total of three invoices like the one, all for identical amounts but on different dates. The division manager, Pat, has the authority to approve payment of invoices for less than $10,000.
It is obvious to you that the manager has…
Subsequently Discovered Facts. On June 1, Sidney Faultless of A. J. Faultless & Co., CPAs, noticed some disturbing information about the firm’s client, Hopkirk Company. A story in the local paper mentioned the indictment of Tony Baker, whom Faultless knew as the assistant controller at Hopkirk. The charge was mail fraud. Faultless made discreet inquiries with the controller at Hopkirk’s headquarters and learned that Baker had been speculating in foreign currency futures. In fact, part of Baker’s work at Hopkirk involved managing the company’s foreign currency. Unfortunately, Baker had violated company policy, lost a small amount of money, and then decided to speculate some more, lost some more, and eventually lost $7 million of company funds. The mail fraud was involved in Baker’s attempt to cover his activity until he recovered the original losses. Most of the events were in process on March 1, when Faultless had signed and dated the unmodified opinion on Hopkirk’s financial…
Chapter 5 Solutions
Survey of Accounting (Accounting I)
Ch. 5 - Prob. 1SEQCh. 5 - Prob. 2SEQCh. 5 - Prob. 3SEQCh. 5 - Adjustments to the company’s records based on the...Ch. 5 - Prob. 5SEQCh. 5 - Prob. 1CDQCh. 5 - Prob. 2CDQCh. 5 - Prob. 3CDQCh. 5 - Prob. 4CDQCh. 5 - Prob. 5CDQ
Ch. 5 - Prob. 6CDQCh. 5 - Prob. 7CDQCh. 5 - Prob. 8CDQCh. 5 - Prob. 9CDQCh. 5 - Assume that Leslie Hunter, accounts payable clerk...Ch. 5 - Prob. 11CDQCh. 5 - The accounting clerk pays all obligations by...Ch. 5 - Prob. 13CDQCh. 5 - Prob. 14CDQCh. 5 - Do items reported as a credit memorandum on the...Ch. 5 - Prob. 16CDQCh. 5 - Prob. 17CDQCh. 5 - Prob. 5.1ECh. 5 - Prob. 5.2ECh. 5 - Prob. 5.3ECh. 5 - Prob. 5.4ECh. 5 - Prob. 5.5ECh. 5 - Prob. 5.6ECh. 5 - Prob. 5.7ECh. 5 - Prob. 5.8ECh. 5 - Prob. 5.9ECh. 5 - Prob. 5.10ECh. 5 - Prob. 5.11ECh. 5 - Prob. 5.12ECh. 5 - Prob. 5.13ECh. 5 - Prob. 5.14ECh. 5 - Prob. 5.15ECh. 5 - Prob. 5.16ECh. 5 - Prob. 5.17ECh. 5 - Prob. 5.18ECh. 5 - Prob. 5.19ECh. 5 - Entries for note collected by bank Accompanying a...Ch. 5 - Prob. 5.21ECh. 5 - Prob. 5.22ECh. 5 - Prob. 5.23ECh. 5 - Prob. 5.24ECh. 5 - Prob. 5.25ECh. 5 - Prob. 5.1PCh. 5 - Prob. 5.2.1PCh. 5 - Prob. 5.2.2PCh. 5 - Prob. 5.3.1PCh. 5 - Prob. 5.3.2PCh. 5 - Prob. 5.4.1PCh. 5 - Prob. 5.4.2PCh. 5 - Prob. 5.4.3PCh. 5 - Prob. 5.4.4PCh. 5 - Prob. 5.1.1MBACh. 5 - Prob. 5.1.2MBACh. 5 - Prob. 5.1.3MBACh. 5 - Prob. 5.1.4MBACh. 5 - Ratio of cash to monthly cash expenses AcelRx...Ch. 5 - Prob. 5.2.1MBACh. 5 - Prob. 5.2.2MBACh. 5 - Ratio of cash to monthly cash expenses Pacira...Ch. 5 - Ratio of cash to monthly cash expenses Pacira...Ch. 5 - Prob. 5.2.5MBACh. 5 - Prob. 5.3.1MBACh. 5 - Prob. 5.3.2MBACh. 5 - Prob. 5.3.3MBACh. 5 - Prob. 5.3.4MBACh. 5 - Prob. 5.3.5MBACh. 5 - Prob. 5.4.1MBACh. 5 - Prob. 5.4.2MBACh. 5 - Prob. 5.1CCh. 5 - Prob. 5.2CCh. 5 - Prob. 5.3CCh. 5 - Prob. 5.4CCh. 5 - Prob. 5.5.1CCh. 5 - Prob. 5.5.2CCh. 5 - Prob. 5.5.3CCh. 5 - Prob. 5.6C
Knowledge Booster
Similar questions
- Computer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardAllison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.arrow_forwardCharles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 PM unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in this chapter could you use to help detect this type of fraud?arrow_forward
- Match each situation with the fraud triangle factor (opportunity, financial pressure, or rationalization) that best describes it. (a). An employee has check-writing and -signing responsibilities for a small company, and is also responsible for reconciling the bank account. (b) An employee earns minimum wage at a firm that has reported record earnings for each of the last five years. (c) An employee has an expensive gambling habit. (d) An employee's monthly credit card payments are nearly 75% of her monthly earningsarrow_forwardAn IT auditor is conducting data analysis procedures on an employee expense report file and notices several expenses for $24.99 from the same individual. The company’s policy requires that any expenses that are under $25.00 do not require a receipt. The IT auditor should: [SELECT ALL THAT APPLY a) Maintain professional skepticism and investigate these transactions further b) Pass on investigating these items further, focusing on higher dollar amounts c) Evaluate the business process approval controls, and related procedures d) Discuss fraud awareness and detection programs with management to gain an understanding of management’s commitment to fraud prevention and related entity-level anti-fraud controls.arrow_forwardAnsarrow_forward
- The U.S. General Accounting Office (GAO) Office of Special Investigations was responsible for investigating a potential purchase fraud case. The man who allegedly committed the fraud was Mark J. Krenik, a former civilian employee of the U.S. Air Force. Mr. Krenik was the Air Force's technical representative on contracts with Hughes STX. Hughes STX provided hardware, software maintenance, technical support, and training to the Air Force. Part of Mr. Krenik's alleged fraud included opening accounts under his control at banks in Maryland. The accounts were opened under the names Hughes STX and ST Systems Corporation. A section of the GAO report on this fraud investigation reads as follows: On December 15, 1992, Mr. Krenik opened post office box 215 in Vienna, Virginia, in his own name. On December 24, 1992, Mr. Krenik delivered to the Air Force Finance Office 11 bogus invoices totaling $504,941.19. Accompanying the invoices were the respective DD‐250s, on which Mr. Krenik had falsely…arrow_forwardEmployee Embezzlement via Cash Receipts and Payment of Personal Expenses.Assume you have received a message from an informant regarding the following case. Your assignment is to write the “audit approach” portion of the case.a. Write a brief explanation of desirable controls, missing controls, and especially the kinds of “deviations” that might arise from the situation described in the case.b. Develop some procedures for obtaining evidence about existing controls, especially procedures that could discover deviations from controls. If there are no controls to test, then there are no procedures to perform. Then just move on to part (c). An audit “procedure” should instruct someone about the source(s) of evidence to obtain and the work to perform.c. Write some procedures for gathering evidence in this case.d. Write a short statement about the discovery you expect to accomplish with your procedures.The Extra Bank AccountThe Ourtown Independent School District, like all others, had formal,…arrow_forwardbelow presents the payroll procedures of XYZ Limited. We discussed various aspects of such payroll procedures. In the light of that discussion, identify the potential frauds possible in the payroll system of XYZLimited. Also, discuss the control techniques to avoid these fraudsarrow_forward
- Theft at a public library in Saugus, Massachusetts. The lead partner of the audit firm conducting the audit was a partner in the firm, could one have prevented this fraud and controls?arrow_forwardFraud refers to any intentional act to achieve gain, usually monetary. Committing a fraud isunethical and resulting in bad consequences, not just to the perpetrator, but also others (e.g.shareholders, workers etc.). Several example of fraud scenario are listed as follows:i). Store manager misused company’s car for personal purpose because he is the onlyperson that monitor the movement and usage of the car.ii). The accountant and the store keeper of AAA Enterprise co-operate in stealing thecompany’s inventory and they gain a lot of money from it.iii). The Chief Financial officer (CFO) of ABC Sdn Bhd had reported over $700,000 fakeearnings because he wants to achieve sales target.iv). XYZ Sdn Bhd booked revenues earlier than it should have because it was at risk ofmissing analyst estimates.Required;a. Identify the type of fraud committed in the scenario i). to iv). b. Based on the fraud triangle (i.e. pressure, opportunity and rationalization), identify thecause of fraud happen in the…arrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying a premium to the check’s value. He then scanned the check and used a variety of software packages to prepare fictitious paychecks from the employer. The group arrived on the next payday, cashed the checks at the local establishment, and moved to another town before the check was presented for payment at the local bank. This is an example of what type of fraud? a. Input fraud b. Processor fraud c. Computer instruction Fraud d. Data fraud e. Output fraudarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningFinancial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,
- Business Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:CengageAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage