Survey of Accounting (Accounting I)
8th Edition
ISBN: 9781305961883
Author: Carl Warren
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 5.8E
To determine
(a)
Concept introduction:
Internal control:
It is to manage the performances, to take decisions, evaluation and regulation of the policies and the procedures of the company in relation to internal working environment of the company to prevent internal frauds.
To discuss:
The inefficiency of the control procedures that prevent the top management fraud.
To determine
(b)
Concept introduction:
Internal control
Internal control is to manage the performances, to take decisions, evaluation and regulation of the policiesand theprocedures of the company in relation to internal working environment of the company to prevent internal frauds.
To discuss:
The way to stop such fraud.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
FRAUD SCHEME – PURCHASING AGENT
A purchasing agent for a large hardware retailer has sole discretion in selecting vendors for the parts and supplies sold by the company. The agent directs a disproportionate number of purchase orders to a supply company owned by the agent’s brother-in-law, which charges above-market prices for its products. The agent’s relationship with the supplier is unknown to his employer.
Required
What type of fraud is this, and what controls can be implemented to prevent or detect a fraud?
2. MAIL ROOM FRAUD AND INTERNAL CONTROL
Sarah Sethi, a professional criminal, took a job as a mail room clerk at Benson & Abernathy Company, a large department store. The mail room was an extremely hectic work environment consisting of a supervisor and 45 clerks. The clerks were responsible for handling promotional mailings, catalogs, and inter office mails, as well as receiving and distributing wide range of outside correspondence to various internal departments. One…
The fraud triangle asserts that the following three factors must exist for a person to commit fraud. A. Opportunity B. Pressure C. Rationalization. Identify the fraud risk factor (A, B, or C) in each of the following situations.
Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?
Chapter 5 Solutions
Survey of Accounting (Accounting I)
Ch. 5 - Prob. 1SEQCh. 5 - Prob. 2SEQCh. 5 - Prob. 3SEQCh. 5 - Adjustments to the company’s records based on the...Ch. 5 - Prob. 5SEQCh. 5 - Prob. 1CDQCh. 5 - Prob. 2CDQCh. 5 - Prob. 3CDQCh. 5 - Prob. 4CDQCh. 5 - Prob. 5CDQ
Ch. 5 - Prob. 6CDQCh. 5 - Prob. 7CDQCh. 5 - Prob. 8CDQCh. 5 - Prob. 9CDQCh. 5 - Assume that Leslie Hunter, accounts payable clerk...Ch. 5 - Prob. 11CDQCh. 5 - The accounting clerk pays all obligations by...Ch. 5 - Prob. 13CDQCh. 5 - Prob. 14CDQCh. 5 - Do items reported as a credit memorandum on the...Ch. 5 - Prob. 16CDQCh. 5 - Prob. 17CDQCh. 5 - Prob. 5.1ECh. 5 - Prob. 5.2ECh. 5 - Prob. 5.3ECh. 5 - Prob. 5.4ECh. 5 - Prob. 5.5ECh. 5 - Prob. 5.6ECh. 5 - Prob. 5.7ECh. 5 - Prob. 5.8ECh. 5 - Prob. 5.9ECh. 5 - Prob. 5.10ECh. 5 - Prob. 5.11ECh. 5 - Prob. 5.12ECh. 5 - Prob. 5.13ECh. 5 - Prob. 5.14ECh. 5 - Prob. 5.15ECh. 5 - Prob. 5.16ECh. 5 - Prob. 5.17ECh. 5 - Prob. 5.18ECh. 5 - Prob. 5.19ECh. 5 - Entries for note collected by bank Accompanying a...Ch. 5 - Prob. 5.21ECh. 5 - Prob. 5.22ECh. 5 - Prob. 5.23ECh. 5 - Prob. 5.24ECh. 5 - Prob. 5.25ECh. 5 - Prob. 5.1PCh. 5 - Prob. 5.2.1PCh. 5 - Prob. 5.2.2PCh. 5 - Prob. 5.3.1PCh. 5 - Prob. 5.3.2PCh. 5 - Prob. 5.4.1PCh. 5 - Prob. 5.4.2PCh. 5 - Prob. 5.4.3PCh. 5 - Prob. 5.4.4PCh. 5 - Prob. 5.1.1MBACh. 5 - Prob. 5.1.2MBACh. 5 - Prob. 5.1.3MBACh. 5 - Prob. 5.1.4MBACh. 5 - Ratio of cash to monthly cash expenses AcelRx...Ch. 5 - Prob. 5.2.1MBACh. 5 - Prob. 5.2.2MBACh. 5 - Ratio of cash to monthly cash expenses Pacira...Ch. 5 - Ratio of cash to monthly cash expenses Pacira...Ch. 5 - Prob. 5.2.5MBACh. 5 - Prob. 5.3.1MBACh. 5 - Prob. 5.3.2MBACh. 5 - Prob. 5.3.3MBACh. 5 - Prob. 5.3.4MBACh. 5 - Prob. 5.3.5MBACh. 5 - Prob. 5.4.1MBACh. 5 - Prob. 5.4.2MBACh. 5 - Prob. 5.1CCh. 5 - Prob. 5.2CCh. 5 - Prob. 5.3CCh. 5 - Prob. 5.4CCh. 5 - Prob. 5.5.1CCh. 5 - Prob. 5.5.2CCh. 5 - Prob. 5.5.3CCh. 5 - Prob. 5.6C
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Computer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardWhat is a good response to.... Embezzlement is a type of fraud that happens when someone within an organization misuses their position of trust to steal money. This breach of trust is an intentional form of deceit to misappropriately utilize these funds for their own gain. Reviewing sales, refunds, returns, cash deposits, and voided transactions would help identify any form of fraud as an assistant manager. If there are any discrepancies identified, it would help to review logs of who accessed software at specific times to help identify the culprit. If there was something identified the next step would be to reports the findings to higher management depending on company protocol and be a confidant during the investigation process. It is not advisable to have direct confrontation as it could lead to further deceitful actions with the intent to cover up their actions.arrow_forwardFraud refers to any intentional act to achieve gain, usually monetary. Committing a fraud isunethical and resulting in bad consequences, not just to the perpetrator, but also others (e.g.shareholders, workers etc.). Several example of fraud scenario are listed as follows:i). Store manager misused company’s car for personal purpose because he is the onlyperson that monitor the movement and usage of the car.ii). The accountant and the store keeper of AAA Enterprise co-operate in stealing thecompany’s inventory and they gain a lot of money from it.iii). The Chief Financial officer (CFO) of ABC Sdn Bhd had reported over $700,000 fakeearnings because he wants to achieve sales target.iv). XYZ Sdn Bhd booked revenues earlier than it should have because it was at risk ofmissing analyst estimates.Required;a. Identify the type of fraud committed in the scenario i). to iv). b. Based on the fraud triangle (i.e. pressure, opportunity and rationalization), identify thecause of fraud happen in the…arrow_forward
- 1. How may an employee embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of functions and authorization controls were not in place? Please asnwer this. thank youuuarrow_forward34.Which of the following would be a red flag that internal auditors should look at for the possibility of inventory fraud?I. The controller has assumed responsibility for approving all payments to certain vendors.II. The controller has continuously delayed installation of a new accounts payable system, despite a corporate directive to implement it.III. Sales commissions are not consistent with the organization's increased levels of sales.IV. Payments to vendors are supported by copies of receiving memos, rather than originals. Group of answer choices I, II, and IV only I, II, III, and IV I, III, and IV only II and III only I and II onlyarrow_forwardA former chairman, CFO, and controller of Donnkenny, Inc., an appeal company that makes sportswear for Pierre Cardin and Victoria Jones, please get guilty to financial statement fraud. These manager used false journal entries to record fictitious sales, head inventory and public warehouses so that it could be recorded as sold and required sales orders to be backdated so that the sale could be moved to an earlier period.the combined effect of these actions caused 25 million out of 40 million and quarterly sales to be phony. A. Why might control procedures listed in this chapter be insufficient in stopping this type of fraud? B.Would an audit committee made up of representatives from Senior Management be effective in stopping this type of fraud?arrow_forward
- 1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardBelow are several statements about occupational fraud.1. For most large companies, occupational fraud is minimal and internal control procedures are unnecessary.2. Managers have a variety of reasons for manipulating the numbers in financial statements, such as maximizing their compensation, increasing the company’s stock price, and preserving their jobs.3. Internal control procedures include formal policies and procedures related to (1) safeguarding the company’s assets and (2) improving the accuracy and reliability of accounting information.4. “Cooking the books” is a phrase used by accountants to indicate the preparation of financial statements that are free of manipulation.5. Most occupational fraud cases involve misuse of the company’s resources.6. Common types of financial statement fraud include creating fictitious revenues from a fake customer, improperly valuing assets, hiding liabilities, and mismatching revenues and expenses.Required:State whether the answer to each of the…arrow_forwardSadaf Oman Co. is using internal control procedures to mitigate the risks to which it is exposed. Listed below are some internal control procedures applicable to Sadaf Oman Co's revenues and receivable system. Match the most appropriate one of the following risks mitigated to the correct internal control procedure stated below. Risks mitigated: (A) Sales staff misappropriate sales receipts then write off bad debts in the general ledger (B) Sales are made to customers who cannot pay (C) Sales are not made to existing customers (D) Sales staff do not communicate with the accounts staff regularly, so the debt uncollected at the end of the period are written off in the ledger by the accounts staff (E) Customer refuses to pay for goods allegedly not received (F) Customer orders are not being fulfilled. (G) Revenues on books are overstated and exceed actual revenues in bank (H) Posting a sale that is beyond the credit limit of the customers ) Company employees steal collections (U) Without…arrow_forward
- Solve pleaser itarrow_forwardNonearrow_forwardTwo very common ways that employees commit fraud against their employers is the misstatement of reimbursable expense accounts and the misuse of office supplies for personal purposes. Although these schemes are usually not individually significant, their magnitude can be damaging if these practices are widespread. Please comment on these types of fraud (and other examples of employee fraud) and what internal controls they would put in place in an organization to curb this activity.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubFinancial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License