Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 13, Problem 6DQ
Summary Introduction
To determine: The controls and technology that would reduce the risk of fraudulent activities in Company S and Company V.
Introduction:
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Explain what a ‘fraud risk factor means’ and discuss thethree conditions generally present when fraud occurs. Illustrateyour answer with two examples of fraud.
Ay
In addition to the fraud triangle, what are a couple other tools used to indicate the potential for fraud. Explain them
Accounts payable fraud is an issue that may arise. Find an Accounts payable fraud story on the internet
Discuss the following:
What was the purpose of the fraud?
What were the actions and consequences?
Who benefitted from the fraud?
How did the fraud get discovered?
What controls should have been in place to prevent fraud?
Chapter 13 Solutions
Accounting Information Systems
Ch. 13 - Prob. 1RQCh. 13 - What primary functions does the AP/CD process...Ch. 13 - Prob. 3RQCh. 13 - What are the fundamental responsibilities of the...Ch. 13 - Prob. 5RQCh. 13 - Prob. 6RQCh. 13 - Prob. 7RQCh. 13 - Prob. 8RQCh. 13 - How does EDI improve the effectiveness and...Ch. 13 - What is EIPP? How does it improve the efficiency...
Ch. 13 - What are the two operations process...Ch. 13 - Prob. 12RQCh. 13 - Prob. 13RQCh. 13 - Prob. 14RQCh. 13 - Prob. 1DQCh. 13 - This chapter discusses both fraud and...Ch. 13 - Prob. 3DQCh. 13 - Prob. 4DQCh. 13 - Prob. 5DQCh. 13 - Prob. 6DQCh. 13 - Prob. 1SPCh. 13 - Prob. 2SPCh. 13 - Prob. 3SPCh. 13 - Prob. 4SPCh. 13 - Prob. 5SPCh. 13 - Prob. 6SPCh. 13 - Prob. 4PCh. 13 - Our narrative and DFDs are created assuming that...Ch. 13 - Prob. 6PCh. 13 - Prob. 7P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, finance and related others by exploring similar questions and additional content below.Similar questions
- Understanding what constitutes fraud and understanding the framework are a part of developing an internal control program. The fraud triangle is a framework that is used to understand and explain what the motivation could be when a person decides to commit fraud. Thinking about the fraud cases that you are aware of, how would the fraud triangle explain fraudulent behavior?arrow_forwardWhistle-blowers have played a key role in fraud detection. There are several types of whistle-blowers and safeguards for each type. Analyze the adversities that whistle-blowers face, including the safeguards intended to protect them. Compare the different types of whistle-blowers. What is the importance of each type?arrow_forwardIn writing your response, the following points must be addressed fully:a) Determine the type of fraud committed and describe with examples thesymptoms of fraud that are evident in the case study.b) As discussed in units 1 to 4, all frauds involve key elements. Identify anddescribe, using examples, the elements of the Purell’s magazine fraud.c) What role did trust play in allowing this fraudulent scheme to transpire?What elements contributed to this trust? Outline two positive and twonegative consequences that this might pose to the company in future fraudprevention.d) Describe Purell Magazine and Publishing House fraud preventionprogramme and identify any improvements that might be necessary toprevent this type of fraud or at least discover it sooner.arrow_forward
- “Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?arrow_forwardDescribe the fraud triangle andidentify conditions for fraud.arrow_forwardWrite a one-page memo analyzing the relationship between fraud and internal controls. Explain the principles underlying these approaches. Include a note on the limitations of internal controls.arrow_forward
- If one of the three elements of the fraud triangle is not present, can fraud still be perpetrated? Explain. Identify factors (red flags) that would be strong indicators of opportunities to commit fraud. Is the ability to rationalize the fraud an important aspect to consider when analyzing a potentially fraudulent situation? What are some of the common rationalizations used by fraud perpetrators? Define and illustrate kiting. What controls should the client institute to prevent it?arrow_forwardAll frauds involve key elements. Identify and describe using examples, the elements involve in an embezzlement fraud.arrow_forwardExplain the difference between computer fraud and general fraud. Explain both categories of fraud in relation to accounting information system.arrow_forward
- There are several steps involved in the fraud theory approach. What are they?arrow_forwardExplain the role of the Risk Manager in fraud detection Explain the role of the Risk Manager in fraud detectionarrow_forwardWhat characteristics should a fraud specialist possess? Please provide references with URL if any.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,