Financial Accounting: Tools for Business Decision Making, 8th Edition
8th Edition
ISBN: 9781118953808
Author: Paul D. Kimmel, Jerry J. Weygandt, Donald E. Kieso
Publisher: WILEY
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 6, Problem 6.11EYCT
To determine
Inventory fraud: It refers to an illegal practice committed by the company or its employees that involves the manipulation of reported inventories and its related accounts such as sales and sales returns and allowances to mislead the users of financial information.
To prepare: a short explanation of the nature of the inventory fraud by Corporation LF and Corporation MK.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Some of the largest business frauds ever perpetrated have involved the misstatement of inventory. Two classics were at Leslie Fay and McKesson Corporation. Feel free to check them out to get a feel for the impact that it has. There is considerable information regarding inventory frauds available on the Internet. Search for information about another instance of inventory fraud at any other company, and prepare an explanation of the nature of the inventory fraud.
You are a fraud examiner and have been hired by Blackman Company to carry out an investigation. Blackman is a beverage company that has experienced increased shipments of beverages but no increase in revenue. Management suspects that inventory is being shipped to unknown places or is being stolen.How would you use invigilation to help you determine whether inventory is being stolen or shipped to unknown locations? Briefly explain how you would carry out this investigative procedure.
Solve pleaser it
Chapter 6 Solutions
Financial Accounting: Tools for Business Decision Making, 8th Edition
Ch. 6 - The key to successful business operations is...Ch. 6 - Prob. 2QCh. 6 - What is just-in-time inventory management? What...Ch. 6 - Prob. 4QCh. 6 - Prob. 5QCh. 6 - Prob. 6QCh. 6 - Prob. 7QCh. 6 - Prob. 8QCh. 6 - What is the major advantage and major disadvantage...Ch. 6 - The selection of an inventory cost flow method is...
Ch. 6 - Which assumed inventory cost flow method: (a)...Ch. 6 - Prob. 12QCh. 6 - Prob. 13QCh. 6 - Prob. 14QCh. 6 - Prob. 15QCh. 6 - Prob. 16QCh. 6 - Prob. 17QCh. 6 - Prob. 18QCh. 6 - Why is it inappropriate for a company to include...Ch. 6 - Prob. 20QCh. 6 - Prob. 21QCh. 6 - Prob. 22QCh. 6 - When perpetual inventory records are kept, the...Ch. 6 - How does the average-cost method of inventory...Ch. 6 - Prob. 25QCh. 6 - Prob. 6.1BECh. 6 - Prob. 6.2BECh. 6 - Prob. 6.3BECh. 6 - Prob. 6.4BECh. 6 - Prob. 6.5BECh. 6 - Prob. 6.6BECh. 6 - Prob. 6.7BECh. 6 - Prob. 6.8BECh. 6 - Prob. 6.9BECh. 6 - Prob. 6.10BECh. 6 - Prob. 6.11BECh. 6 - Prob. 6.1DIECh. 6 - Prob. 6.2DIECh. 6 - Prob. 6.3ADIECh. 6 - Prob. 6.3BDIECh. 6 - Prob. 6.1ECh. 6 - Prob. 6.2ECh. 6 - Prob. 6.3ECh. 6 - Prob. 6.4ECh. 6 - Prob. 6.5ECh. 6 - Prob. 6.6ECh. 6 - Prob. 6.7ECh. 6 - Prob. 6.8ECh. 6 - Prob. 6.9ECh. 6 - Prob. 6.10ECh. 6 - Prob. 6.11ECh. 6 - Prob. 6.12ECh. 6 - Prob. 6.13ECh. 6 - Inventory data for Jeters Company are presented in...Ch. 6 - Prob. 6.15ECh. 6 - Prob. 6.16ECh. 6 - Prob. 6.17ECh. 6 - Prob. 6.1APCh. 6 - Prob. 6.2APCh. 6 - Prob. 6.3APCh. 6 - Prob. 6.4APCh. 6 - Prob. 6.5APCh. 6 - Prob. 6.6APCh. 6 - Prob. 6.7APCh. 6 - Prob. 6.8APCh. 6 - Prob. 6.9APCh. 6 - Prob. 6.1CACRCh. 6 - Prob. 6.1EYCTCh. 6 - Prob. 6.2EYCTCh. 6 - Prob. 6.3EYCTCh. 6 - Prob. 6.4EYCTCh. 6 - The July 15, 2010, edition of CFO.com contains an...Ch. 6 - Prob. 6.7EYCTCh. 6 - Prob. 6.8EYCTCh. 6 - Prob. 6.9EYCTCh. 6 - Prob. 6.10EYCTCh. 6 - Prob. 6.11EYCTCh. 6 - Prob. 6.1IFRSCh. 6 - Prob. 6.2IFRSCh. 6 - Prob. 6.3IFRS
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- The following paragraphs describe fraudulent accounting committed by the company Gateway. After reading the paragraphs, list the journal entries you think would have used to do what is described here. You will have to make an educated guess as to what journal entries the company would use to cover up the fraud. On September 21, 2000, Gateway's sales representative sent an e-mail to the consumer leasing company confirming that the consumer leasing company would issue a purchase order for $16.5 million of PCs, for which it would receive a 5% discount, that the consumer leasing company would be billed by September 30, 2000 and would take the PCs by October 31, 2000.arrow_forward1. Match the description on the left with the type of theft on the right using Excel spreadsheet. See notes below. 1. Most common type of noncash theft 2. Goods shipped to an accomplice 3. Altering physical inventory counts to cover theft 4. Goods are stolen, then a receiving document is created showing fewer goods received a. Fraudulent write-off b. Unconcealed larceny c. Falsified shipping or receiving report d. Fraudulent shipmentarrow_forwardWhich of the following procedures would best prevent or detect the theft of valuable items from an inventory that consists of hundreds of different items selling for $1 to $10 and a few items selling for hundreds of dollars?a. Maintain a perpetual inventory of only the more valuable items with frequent periodic verification of the accuracy of the perpetual inventory record.b. Have an independent accounting firm prepare an internal control report on the effectiveness of the controls over inventory.c. Have separate warehouse space for the more valuable items with frequent periodic physical counts and comparison to perpetual inventory records.d. Require a manager’s signature for the removal of any inventory item with a value of morethan $50.arrow_forward
- The company XYZ suffers from numerous weaknesses in its internal control system. For each the below situations, you are required to identify the anomaly/risk related to this system and propose eventual solutions. The financial department issues one copy of the sales bill that is shipped to the customer with the company The inventory custodian is the person who deliver the merchandise to the The person who keep the checks (issued and received) is the same who have access to the company accounting system. A has now 9 years experience in the company. He is responsible to keep cash and checks. Since he joining XYZ , he has not claim any vacation. The financial manager prepares the checks for the company suppliers and receive the merchandises ordered by the The company XYZ has recently installed an ERP system to manage all its activities . Different staff have access to this system. Mr X is working…arrow_forwardAs the lead accountant for a small company, you notice that inventory purchases from a certain vendor have increased dramatically over the past few months, whereas purchases from all other vendors have decreased. You suspect that something may not be right and that there may be a fraudulent relationship between someone in your company and the vendor that is getting increased business. question: Which theft act investigative method would you use to investigate your suspicions? state evidences that you to support suspicions.arrow_forward2. FRAUD SCHEME PURCHASING AGENT A purchasing agent for a large hardware retailer has sole discretion in selecting vendors for the parts and supplies sold by the company. The agent directs a disproportionate number of purchase orders to a supply company owned by the agent's brother- in-law, which charges above-market prices for its products. The agent's relationship with the supplier is unknown to his employer. C ta th di Required What type of fraud is this, and what controls can be implemented to prevent or detect the fraud? Re a.arrow_forward
- Accounting You are auditing the financial statements of Holly’s Happenin’ Hula Hoops Club (4H Club). Unbeknownst to you as the auditor, there is a fraud being committed related to the inventory account. For the fraud described below, specifically list a) the assertion about the inventory account that is violated, b) a control procedure the client should have had in place that could have potentially prevented the fraud, and c) an audit procedure that you would likely perform during the audit of inventory that would detect the fraud. Each month, an employee in the receiving department submits a fictitious receiving report to accounting. A few days later, he sends the 4H Club an invoice for the quantity of goods ordered from a small company he owns and operates. The invoice is always paid when the accounts payable clerk matches the receiving report with the vendor’s invoicearrow_forwardCan you write a reply for detect only, thank youarrow_forwardThe fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. A worker sees other employees regularly take inventory for personal use.arrow_forward
- An auditor suspects that certain client employees are ordering merchandise for themselves over the Internet without recording the purchase or receipt of the merchandise. When vendors' invoices arrive, one of the employees approves the invoices for payment. After the invoices are paid, the employee destroys the invoices and the related vouchers. In gathering evidence regarding the fraud, the auditor most likely would select items for testing from the file of all: Multiple Choice Cash disbursements. Approved vouchers. Receiving reports. Vendors' invoices.arrow_forwardScenario: You are an assistant manager of a high-end retail store and, through routine end-of-day accounting procedures, you have discovered your long-time coworker, who is also an assistant manager and good friend, has been embezzling from the company. Use your knowledge related to the ways employees conduct fraud to build a case for how your coworker might have embezzled money. How would you utilize the store’s accounting software to access data and find the proper evidence to determine if it truly is fraud? To whom would you report your findings? Would you confront your coworker/friend?arrow_forwardFor each of the following three independent cases of employee fraud, recommend how to prevent similar problems in the future: Case A: Due to abnormal inventory shrinkage in the audiovisual department at a retail chain store, internal auditors conducted an in- depth audit of the department. They learned that a customer frequently bought large numbers of small electronic components from a certain cashier. The auditors discovered that they had colluded to steal electronic components by not recording the sale of items the customer took from the store. Case B: During an unannounced audit, auditors discovered a payroll fraud when they distributed paychecks instead of department supervisors. When the auditors investigated an unclaimed paycheck, they discovered that the employee quit four months previously after arguing with the supervisor. The supervisor continued to turn in a time card for the employee and pocketed his check. Case C: Auditors discovered an accounts payable clerk who made…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPrinciples of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub