preview

Case Study 1 Fraud Essay

Better Essays

Case Study1: And the Fraud Continues

A business can not work out without an account system, which includes internal. Internal controls are used by companies to make sure financial information is accurate and valid. Strong internal controls are signs of a financially healthy company and protect the company’s integrity. Strong internal controls can also increase a company’s profitability. There are several types of internal controls that companies used to protect themselves such as: Segregation of duties, asset purchases, supervisor review, internal audits and adequate documents and records. This paper will discuss several topics from a case study about And the Fraud …show more content…

Placeholder credits this trick was used when customers were contacted regarding their overdue accounts receivable and MCI was informed that a payment would be sent in. MCI would then credit their receivables before receiving the cash; this trick was used by Pavlo was manipulation be he know what the system would all him to do in order to stall tactics, to recognize bad debt and uncollectible receivables that would have to be expensed on the income statement.
If I suspected fraudulent activity within n organization where I work, I would use a professional skepticism approach. This can be broken down into there attributes:
1. Recognition 2. Questioning min and a critical assessment of the evidence and 3. Commitment to persuasive evidence
Professional skepticism practices as neutral but discipline approach to detection and investigation. Per SAS No. 1 it suggests that an auditor neither assumers that management is dishonest or assumes unquestionable honesty. Professional skepticism requires fraud examiners to “pull on thread” in which means Red flags are warning signal or something that demands attention or provokes an irate reaction. Red Flag symptoms of fraud may be divided into at least six categories: unexplained accounting anomalies, exploited internal control weaknesses, identified analytical anomalies where non

Get Access