Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 8P
To determine
Explain the techniques which are used to prevent or detect the fraud.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
In a financial fraud case, city employees in Brooklyn, New York, accessed digital databases to defraud the city of $20 million. Several employees, in collusion with the former deputy tax collector, completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills.
Required
Discuss the control techniques that could prevent or detect this fraud.
In a recent financial fraud case, city employees in Brooklyn, New York, accessed electronic databases to defraud the city of $20 million. Several employees in collusion with the former deputy tax collector completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills. Required Discuss the control techniques that could prevent or detect this fraud.
8. DIGITAL FRAUD In a financial fraud case, city employees in Brooklyn, New York, accessed digital databases to defraud the city of $20 million. Several employees, in collusion with the former deputy tax collector, completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills.
Required Discuss the control techniques that could prevent or detect this fraud.
Chapter 12 Solutions
Accounting Information Systems
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 21RQCh. 12 - Prob. 22RQCh. 12 - Prob. 23RQCh. 12 - Prob. 1DQCh. 12 - Prob. 2DQCh. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 8DQCh. 12 - Prob. 9DQCh. 12 - Prob. 10DQCh. 12 - Prob. 11DQCh. 12 - What is a digital envelope?Ch. 12 - Prob. 13DQCh. 12 - Prob. 14DQCh. 12 - Prob. 15DQCh. 12 - Prob. 16DQCh. 12 - Prob. 17DQCh. 12 - Prob. 18DQCh. 12 - Prob. 19DQCh. 12 - Prob. 1MCQCh. 12 - Prob. 2MCQCh. 12 - Prob. 3MCQCh. 12 - Prob. 4MCQCh. 12 - Prob. 5MCQCh. 12 - Prob. 6MCQCh. 12 - Prob. 7MCQCh. 12 - A system of computers that connects the internal...Ch. 12 - Prob. 9MCQCh. 12 - Prob. 10MCQCh. 12 - Prob. 1PCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6PCh. 12 - VIRTUALIZATION Virtualization technology is...Ch. 12 - Prob. 8P
Knowledge Booster
Similar questions
- Assume that Brooke Miles, accounts payable clerk for West Coast Design Inc., stole $48,350 by paying fictitious invoices for goods that were never received. The clerk set up accounts in the names of the fictitious companies and cashed the checks at a local bank. Please use at least 150 words to describe a control procedure that would have prevented or detected the fraud.arrow_forwardAssume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardAssume that Brooke Miles, accounts payable clerk for West Coast Design Inc., stole $48,350 by paying fictitious invoices for goods that were neverreceived. The clerk set up accounts in the names of the fictitious companies and cashed the checks at a local bank. Describe a control procedure thatwould have prevented or detected the fraud.arrow_forward
- In the Why It Matters feature “Examples of Theft and FinancialReporting Frauds” at the beginning of the chapter, we introduced youto the Koss Corporation fraud. In this problem, we provide you withfurther details about that fraud. During the fall of 2009, Koss Corporation,a Wisconsin-based manufacturer of stereo headphone equipment,revealed that its vice president of finance (Sujata “Sue” Sachdeva) haddefrauded the company of approximately $31 million over a periodof at least five years. Grant Thornton LLP was the company’s auditor,and the firm issued unqualified audit opinions for the entire period in which they worked for Koss. According to reports, Sachdeva’s theftaccelerated over a period of years as follows:FY 2005 $2,195,477FY 2006 $2,227,669FY 2007 $3,160,310FY 2008 $5,040,968FY 2009 $8,485,937Q1 FY 2010 $5,326,305Q2 FY 2010 $4,917,005To give you a sense of the magnitude of the fraud, annual revenuesfor Koss Corporation are in the range of $40 to $45 million…arrow_forwardConsider the scenario in which Brooke Miles, an accounts payable clerk for West Coast Design Inc., misappropriated $48,350 by paying false bills for commodities that were never delivered to the company. It was the clerk's responsibility to open accounts in the names of the phony corporations and pay the cheques at a nearby bank. Describe a fraud-prevention or detection method that may have been used to avoid or identify the scam.arrow_forwardMatch each situation with the fraud triangle factor (opportunity, financial pressure, or rationalization) that best describes it. (a). An employee has check-writing and -signing responsibilities for a small company, and is also responsible for reconciling the bank account. (b) An employee earns minimum wage at a firm that has reported record earnings for each of the last five years. (c) An employee has an expensive gambling habit. (d) An employee's monthly credit card payments are nearly 75% of her monthly earningsarrow_forward
- Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in lectures network risks and auditing could you use to help detect this type of fraud?arrow_forwardPls explain first how you solve it. Thank you. F COMPANY, organized on March 1, 2021, has a very poor internal control system. Thecompany's cashier is also its accountant. After 9 months of operations, the company's managersuspects that the cashier-accountant has been misappropriating company collections. You havebeen engaged to audit the company's accounts to determine the extent of fraud, if any. You started the audit on November 15. On that date, the cash on hand per your surprise countwas P5,140. Also on that date, the bank confirmed that the balance of the company's currentaccount was P26,328. Your examination of the records reveals that a check for P1,852 wasoutstanding on November 15. The company's markup is 40% of sales. Further examination of the company's records reveals the following balances at November 15,2021:arrow_forwardInvestigating a Fraud. Suppose you are auditing cash disbursements and discover severalpayments to a company you are unfamiliar with and cannot find information about this company on the Internet or in the local telephone directory. The invoices from this company have numbers very close to each other in the sequence, there is no phone number on the invoice, and each bill is for a dollar amount just under the amount that would require additional approvals before payment. Based on this information, you now suspect this may be a fraud.Required:Based on your suspicions, how would you change the audit procedures you would perform, and how might you change the evidence you gather?arrow_forward
- The Laundry Money Skim The case below tells the actual story of a cash embezzlement scheme. The case has two major parts: (1) problem and (2) audit approach. For the case, please consider how the auditor may have discovered the cash embezzlement scheme.ProblemAlbert owned and operated 40 coin laundries around town. As the business grew, he could no longer visit each one, empty the cash boxes, and deposit the receipts. Each location grossed about $140 to $160 per day, operating 365 days per year—gross receipts of about $2 million per year. Each of four part-time employees visited 10 locations, collecting the cash boxes and delivering them to Albert’s office where he would count the coins and currency (from the change machine) and prepare a bank deposit. One of the employees skimmed $5 to $10 from each location visited each day.The daily theft does not seem like much, but at an average of $7.50 per day from each of 10 locations, totaled about $27,000 per year. If all four of the…arrow_forwardAll-Around Sound Co. discovered a fraud whereby one of its front office administrative employees used company funds to purchase goods such as computers, digital cameras, and other electronic items for her own use. The fraud was discovered when employees noticed an increase in the frequency of deliveries from vendors and the use of unusual vendors. After some investigation, it was discovered that the employee would alter thedescription or change the quantity on an invoice in order to explain the cost on the bill.What general internal control weaknesses contributed to this fraud?arrow_forwardSummarize the alleged fraud List which management assertions were violated In your opinion, what component(s) of the COSO framework were weak/missing? If you were to audit FTX’s cash, name 1-2 procedure(s) that you could have done to detect this fraudFOR Defendant concealed his diversion of FTX customers’ funds to crypto trading firm Alameda Research while raising more than $1.8 billion from investors The Securities and Exchange Commission today charged Samuel Bankman-Fried with orchestrating a scheme to defraud equity investors in FTX Trading Ltd. (FTX), the crypto trading platform of which he was the CEO and co-founder. Investigations as to other securities law violations and into other entities and persons relating to the alleged misconduct are ongoing. According to the SEC’s complaint, since at least May 2019, FTX, based in The Bahamas, raised more than $1.8 billion from equity investors, including approximately $1.1 billion from approximately 90 U.S.-based investors. In his…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub