Concept explainers
Ethical Decision Making: A Real-Life Example
When some people think about inventory theft, they imagine a shoplifter running out of a store with goods stuffed inside a jacket or bag. But that’s not what the managers thought at the Famous Footwear store on Chicago’s Madison Street. No, they suspected their own employees were the main cause of their unusually high inventory theft. One scam involved dishonest cashiers who would let their friends take a pair of Skechers without paying for them. To make it look like the shoes had been bought, cashiers would ring up a sale, but instead of charging $50 for shoes, they would charge only $2 for a bottle of shoe polish. That’s when the company's managers decided to put its register-monitoring system to work. In just two years, the company cut its Madison Street inventory losses in half. Here’s how a newspaper described the store’s improvements:
Retailers Crack Down on Employee Theft SouthCoast Today, Chicago By Calmetta Coleman, Wall Street Journal Staff Writer
… Famous Footwear installed a chainwide register-monitoring system to sniff out suspicious transactions, such as unusually large numbers of refunds or voids, or repeated sales of cheap goods.
… [B]efore an employee can issue a cash refund, a second worker must be present to see the customer and inspect the merchandise.
… [T]he chain has set up a toll-free hotline for employees to use to report suspicions about co-workers. Required:
- 1. To which of the three types of employee fraud does this article relate?
- 2. Explain how the register-monitoring system would allow Famous Footwear to cut down on employee theft.
- 3. What is the name of the control principle that is addressed by Famous Footwear’s new cash refund procedure?
- 4. Think of and describe at least four different parties that are harmed by the type of inventory theft described in this case.
Want to see the full answer?
Check out a sample textbook solutionChapter 5 Solutions
Fundamentals of Financial Accounting
- You are a sales associate with a large department store chain. You have noticed that a fellow sales associate has been taking high-ticket items home with her. You have checked the sales records and she has not been paying for the items. You should: Ignore the conduct because it is not your business. O Ignore the conduct because she will be caught eventually. O Confront her with your knowledge. Report her conduct to the policearrow_forwardFraud refers to any intentional act to achieve gain, usually monetary. Committing a fraud isunethical and resulting in bad consequences, not just to the perpetrator, but also others (e.g.shareholders, workers etc.). Several example of fraud scenario are listed as follows:i). Store manager misused company’s car for personal purpose because he is the onlyperson that monitor the movement and usage of the car.ii). The accountant and the store keeper of AAA Enterprise co-operate in stealing thecompany’s inventory and they gain a lot of money from it.iii). The Chief Financial officer (CFO) of ABC Sdn Bhd had reported over $700,000 fakeearnings because he wants to achieve sales target.iv). XYZ Sdn Bhd booked revenues earlier than it should have because it was at risk ofmissing analyst estimates.Required;a. Identify the type of fraud committed in the scenario i). to iv). b. Based on the fraud triangle (i.e. pressure, opportunity and rationalization), identify thecause of fraud happen in the…arrow_forwardIdentify the fraud triangle risk factor (Opportunity, Pressure, or Rationalization) in each situation. 1. The business has no cameras or security devices at its warehouse. 2. A worker sees other employees regularly take inventory for personal use. 3. Payroll manager feels she is greatly underpaid. 4. No one matches the cash in the register to receipts when shifts end. 5. Managers are expected to grow business or be fired. 6. Managers are told to make extreme cuts in expenses. Opportunity Rationalization Pressure Opportunity Pressure Pressurearrow_forward
- The fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. A worker sees other employees regularly take inventory for personal use.arrow_forwardYou are a fraud examiner and have been hired by Blackman Company to carry out an investigation. Blackman is a beverage company that has experienced increased shipments of beverages but no increase in revenue. Management suspects that inventory is being shipped to unknown places or is being stolen.How would you use invigilation to help you determine whether inventory is being stolen or shipped to unknown locations? Briefly explain how you would carry out this investigative procedure.arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forward
- The fraud triangle asserts that the following three factors must exist for a person to commit fraud. A. Opportunity B. Pressure C. Rationalization. Identify the fraud risk factor (A, B, or C) in each of the following situations.arrow_forwardCan you write a reply for detect only, thank youarrow_forwardThe case: In this case, a medium-sized, family-owned business suffered a significant loss of inventory due to theft by several long-time employees. Overall: Several factors played into the inventory theft, including poor internal controls, a lack of timely accounting records, and difficulty in measuring and tracking inventory items. Inventory was not reconciled or monitored for the company-owned retail outlets which enabled the misappropriated inventory to be removed from inventory records without detection. Identify and describe the followings: 1. a measure that could have prevented the theft 2. a measure that could have detected the theft 3. a step to take once fraud is suspected. My work: Internal controls are protocols and procedures used by a business to protect its assets and maintain the accuracy of its financial records. Employee theft is a common problem that can have serious consequences for businesses, with 75% of businesses being affected by it and 33% going bankrupt due to…arrow_forward
- Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?arrow_forwardWhat internal control procedure(s) would provide protection against the following threats? a. Theft of goods by the shipping dock workers, who claim that the inventory shortages reflect errors in the inventory records.b. Posting the sales amount to the wrong customer account because a customer account number was incorrectly keyed into the system .c. Making a credit sale to a customer who is already four months behind in making payments on his account. d. Authorizing a credit memo for a sales return when the goods were never actually returned. e. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. f. Billing customers for the quantity ordered when the quantity shipped was actually less due to back ordering of some items .g. Lost sales because of stockouts of several products for which the computer records indicated there was adequate quantity on hand. h. A sales clerk sold a $7,000 wide-screen TV…arrow_forwardDetermine whether each procedure described below is an internal control strength or weakness; then identify the internal control violated or followed for each procedure. 1. The owner does not use ID scanners to limit access to expensive merchandise. Instead, the owner argues they hire honest employees. 2. Several salesclerks share the same cash drawer. 3. The company devotes resources towards keeping accurate accounting records for machinery. 4. The company does not allow employees with access to cash to modify accounting records. 5. Employees that handle easily transferable assets such as cash are bonded. Weakness or Strength 1. Weakness 2. Weakness 3. Strength 4. Strength 5. Strength Internal Control Principle Apply technological controls Establish responsibilities Maintain adequate records Separate recordkeeping from custody of assets Insure assets and bond key employeesarrow_forward
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeBusiness Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:CengageAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning