Innovative Marketing, Inc. (IMI), sold “scareware”—computer security software. IMI’s Internet ads redirected consumers to sites where they were told that a scan of their computers had detected dangerous files—viruses, spyware, and “illegal” pornography. In fact, no scans were conducted. Kristy Ross, an IMI co-founder and vice president, reviewed and edited the ads, and was aware of the many com- plaints that consumers had made about them. An individual can be held liable under the Federal Trade Commission Act’s prohibition of deceptive acts or practices if the person (1) participated directly in the deceptive practices or had the authority to control them and (2) had or should have had knowledge of them.
- Were IMI’s ads deceptive? If so, can Ross be held liable? Explain..
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps
- The U.S. General Accounting Office (GAO) Office of Special Investigations was responsible for investigating a potential purchase fraud case. The man who allegedly committed the fraud was Mark J. Krenik, a former civilian employee of the U.S. Air Force. Mr. Krenik was the Air Force's technical representative on contracts with Hughes STX. Hughes STX provided hardware, software maintenance, technical support, and training to the Air Force. Part of Mr. Krenik's alleged fraud included opening accounts under his control at banks in Maryland. The accounts were opened under the names Hughes STX and ST Systems Corporation. A section of the GAO report on this fraud investigation reads as follows: On December 15, 1992, Mr. Krenik opened post office box 215 in Vienna, Virginia, in his own name. On December 24, 1992, Mr. Krenik delivered to the Air Force Finance Office 11 bogus invoices totaling $504,941.19. Accompanying the invoices were the respective DD‐250s, on which Mr. Krenik had falsely…arrow_forwardIs it an entity inherent risk for the information below? A computer network and personal computers support Marco Inc's accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. If it is an inherent risk, what is the feature of the firm that will possibly affect inherent risk and explain how and why; that is whether it increases or decreases inherent risk. Please address a specific risk to the accuracy of the financial statements with the "how" and whether…arrow_forwardPiracy, however, is the direct copy of a company’s product and is unethical. Piracy is most prevalent in the video, music, perfume, and designer clothing industries, and is not a replacement for new-product development. Think about and discuss: Does the AMA Statement of Ethics address this issue? Go to ama.org/codesofconduct and review the statement. Then write a paragraph on what the AMA Statement of Ethics contains that might relate to knock-off products.arrow_forward
- Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying a premium to the check’s value. He then scanned the check and used a variety of software packages to prepare fictitious paychecks from the employer. The group arrived on the next payday, cashed the checks at the local establishment, and moved to another town before the check was presented for payment at the local bank. This is an example of what type of fraud? a. Input fraud b. Processor fraud c. Computer instruction Fraud d. Data fraud e. Output fraudarrow_forwardAn online virus-scan service provider, Whispering, is expanding its offerings to include an optimizing service to users-it can scan the consumer's hard drive for duplicate files, suggest more efficient ways to save or archive photos and movies, and much more. The problem is that the company's own cost information has been lost-not due to a virus but due to human error. Charlee, the office manager, is trying to recreate some of the information to use in pricing Whispering's newest optimizing service. Here is what she was able to dig up: Known Information for Virus-ScanService Selling price $30 per scan Gross margin % 50 % Costs of Optimizing Service Labor cost $5 per scan MOH cost (includes software, utilities, etc.) $25 per scan (a) For Whispering's virus-scan service, calculate the current cost-plus markup percentage (based on service cost rather than full cost, since the selling and administrative expense information has been lost). (Round answer to O decimal places, e.g. 15%.)…arrow_forwardA group of IT experts disclosed the “internet cookies” vulnerability of your organisation in a recent online security test. Describe to your management the security concerns that “internet cookies” portend?arrow_forward
- Please read the following and identify any internal control principles that may be violated in the Jane Hardware store.(identify what could go wrong and what controls Jane Hardware should put in place to prevent it) Jerry Finch has worked for Jane Hardware for many years, Jerry has been a model employee. He has not taken a vacation in over three years, always stating that work was too important. One of Jerry's primary jobs at the store is to open mail and list the checks received. He also collects cash from customers at the store's outdoor nursery area. There are times that things are so hectic that Jerry does not bother to use the register, simply making change from cash he carries with him. When things slow down at the store Jerry often offers to help Cindy(the Accounting Clerk) post payments to the customer's accounts receivable ledger. Cindy is always happy to receive help since she is also quite busy and because Jerry is such a careful worker.arrow_forwardMunabhaiarrow_forward
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education