Fraud Examination
6th Edition
ISBN: 9781337619677
Author: Albrecht, W. Steve, Chad O., Conan C., Zimbelman, Mark F.
Publisher: Cengage,
expand_more
expand_more
format_list_bulleted
Question
thumb_up100%
Chapter 7, Problem 2SC
To determine
The investigation procedure to be conducted to scrutinize the abnormal loss of inventory.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
You are a fraud examiner and have been hired by Blackman Company to carry out an investigation. Blackman is a beverage company that has experienced increased shipments of beverages but no increase in revenue. Management suspects that inventory is being shipped to unknown places or is being stolen.How would you use invigilation to help you determine whether inventory is being stolen or shipped to unknown locations? Briefly explain how you would carry out this investigative procedure.
As the lead accountant for a small company, you notice that inventory purchases from a certain vendor have increased dramatically over the past few months, whereas purchases from all other vendors have decreased. You suspect that something may not be right and that there may be a fraudulent relationship between someone in your company and the vendor that is getting increased business.
question:
Which theft act investigative method would you use to investigate your suspicions? state evidences that you to support suspicions.
2. FRAUD SCHEME - PURCHASING AGENT A purchasing agent for a large hardware retailer has sole discretion in selecting vendors for the parts and supplies sold by the company. The agent directs a disproportionate number of purchase orders to a supply company owned by the agent’s brother- in-law, which charges above-market prices for its products. The agent’s relationship with the supplier is unknown to his employer.
Required
What type of fraud is this, and what controls can be implemented to prevent or detect the fraud?
Chapter 7 Solutions
Fraud Examination
Knowledge Booster
Similar questions
- ZYNGA (LO Z 3, 4, 5, 6, 8) Refer to the Why It Matters feature “How to Account for Virtual Sales at Zynga.” a. What are the inherent risks associated with the revenue transactions at Zynga? b. What are management’s incentives to fraudulently misstate revenue transactions? c. What controls should Zynga management have in place to mitigate the risks associated with revenue transactions? d. How might auditors use planning analytical procedures to identify any potential concerns with Zynga’s revenue? e. What might be considered sufficient appropriate evidence when auditing Zynga’s revenue transactions?arrow_forwardYou are the auditor for Konerko’s Office Supply Store, which is opening for business next week. The store owner has established all the controls you have recommended for ensuring that sales are recorded properly and cash is accounted for. The owner has heard from other small business owners that employees often used returned goods as means of skimming money from the register.Required:a. How might an employee use returned goods to skim money from the register?b. What controls would you recommend to prevent or detect fraudulent returns?c. What audit procedures might you perform to detect fraudulent returns?arrow_forwardYou are the auditor for Konerko’s Office Supply Store, which is opening for business next week. The store owner has established all the controls you have recommended for ensuring that sales are recorded properly and cash is accounted for. The owner has heard from other small business owners that employees often used returned goods as means of skimming money from the register. a. How might an employee use returned goods to skim money from the register? b. What controls would you recommend to prevent or detect fraudulent returns? c. What audit procedures might you perform to detect fraudulent returns?arrow_forward
- 1. As an accountant, why you need to study the revenue cycle? 2. If you are going to audit the cash receipts cycle, what are the things you need to prepare? 3. Some large businesses have adopted Invoiceless pricing for business-to-business transactions. What do you think are the barriers, if any, to its use in sales to consumers? 4. How could an employee embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of duties and authorization controls were not in place?arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardFraud refers to any intentional act to achieve gain, usually monetary. Committing a fraud isunethical and resulting in bad consequences, not just to the perpetrator, but also others (e.g.shareholders, workers etc.). Several example of fraud scenario are listed as follows:i). Store manager misused company’s car for personal purpose because he is the onlyperson that monitor the movement and usage of the car.ii). The accountant and the store keeper of AAA Enterprise co-operate in stealing thecompany’s inventory and they gain a lot of money from it.iii). The Chief Financial officer (CFO) of ABC Sdn Bhd had reported over $700,000 fakeearnings because he wants to achieve sales target.iv). XYZ Sdn Bhd booked revenues earlier than it should have because it was at risk ofmissing analyst estimates.Required;a. Identify the type of fraud committed in the scenario i). to iv). b. Based on the fraud triangle (i.e. pressure, opportunity and rationalization), identify thecause of fraud happen in the…arrow_forward
- Some of the largest business frauds ever perpetrated have involved the misstatement of inventory. Two classics were at Leslie Fay and McKesson Corporation. Feel free to check them out to get a feel for the impact that it has. There is considerable information regarding inventory frauds available on the Internet. Search for information about another instance of inventory fraud at any other company, and prepare an explanation of the nature of the inventory fraud.arrow_forward1. A threat in the expenditure cycle that involves unauthorized individuals making purchases is known as: A. Unauthorized access B. Fraudulent disbursements C. Data breaches D. Inventory theft 2. What is the first step in the expenditure cycle? A. Placing the purchase order B. Recording the transaction C. Authorizing the purchase D. Receiving goods or services 3. Which of the following is not a step in the expenditure cycle? A. Approving the purchase requisition B. Collecting cash from customers C. Receiving goods or services D. Recording the transaction in the general ledgerarrow_forward18.During an audit of a retail company, Lily, newly hired internal auditor, found a scheme in which the warehouse manager and a purchasing staff diverted approximately Php2 million worth of goods to an outside warehouse, the sold the goods to third parties. The fraud was not found earlier by the internal audit team since the warehouse manager updated the perpetual inventory records and then forwarded receiving reports to the accounts payable department for processing. Which of the following procedures did Lily perform which would have most likely led to the discovery of the missing materials and the fraud? Group of answer choices Random sampling of receiving reports and tracing to the recording in the perpetual inventory records. Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department. Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory records. Random…arrow_forward
- What internal control procedure(s) would provide protection against the following threats? a. Theft of goods by the shipping dock workers, who claim that the inventory shortages reflect errors in the inventory records.b. Posting the sales amount to the wrong customer account because a customer account number was incorrectly keyed into the system .c. Making a credit sale to a customer who is already four months behind in making payments on his account. d. Authorizing a credit memo for a sales return when the goods were never actually returned. e. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. f. Billing customers for the quantity ordered when the quantity shipped was actually less due to back ordering of some items .g. Lost sales because of stockouts of several products for which the computer records indicated there was adequate quantity on hand. h. A sales clerk sold a $7,000 wide-screen TV…arrow_forwardBaker, an employee of ABC Corporation, had complete control of the purchasing function for his department. Baker authorized the purchase of several thousand dollars’ worth of supplies which were unnecessary to ABC. Baker used these supplies to make improvements to his home. This is an example of what kind of fraud? a. Check tampering b. Theft of inventory c. Personal purchases with company funds d. Misuse of company assetsarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubFinancial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,