Final Project Part One Guidelines and Rubric
.html
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
692
Subject
Accounting
Date
Feb 20, 2024
Type
html
Pages
6
Uploaded by BailiffKnowledgeKingfisher27
ACC 692 Final Project Part One Guidelines and Rubric
Overview
The final project for this course is the creation of a case analysis. The final project represents an authentic demonstration of competency because you will analyze the case in terms of fraud theory and discuss social, legal, and ethical aspects of a fraud investigation. Specifically, you will need to explain what fraud was committed, who perpetrated the fraud and why, how the fraud was able to occur, and the time span of the fraud.
The project is divided into two milestones
, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two and Three
. Final Project Part I will be submitted in Module Five
.
In this assignment, you will demonstrate your mastery of the following course outcomes:
•
Analyze legal and social developments relating to the identification, investigation, and prosecution of fraud in a corporate setting for its impact on stakeholders •
Apply theoretical models of fraudulent behavior for determining why organizational fraud occurs •
Develop a personal ethical framework for setting appropriate standards of conduct for fraud investigations •
Assess the ethical responsibilities of fraud investigators to internal and external stakeholders in communicating and reporting results of investigations •
Evaluate the use of various types of interview and interrogation questions and techniques related to fraud for selecting the best approach •
Synthesize a sequence of interview and interrogation techniques to gather information needed for completing a fraud investigation Prompt
The first part of the final project is a case analysis in which you will analyze the HealthSouth
case in terms of
fraud theory and discuss social, legal, and ethical aspects of a fraud investigation. Specifically, you will need to explain what fraud was committed, who perpetrated the fraud and why, how the fraud was able to occur, and the time span of the fraud.
Specifically, the following critical elements
must be addressed:
I.
Theoretical Model of Fraud
A. What theoretical model of fraud best applies
to this fraud scheme? Defend your response. B. Discuss the fraud scheme
using the theoretical model. Be sure to provide examples illustrating the scheme in terms of the fraud model. C. Based on the theoretical model you selected, what motivations
existed to commit the fraud? Provide specific examples of behavior or situations to illustrate these motivations. II.
Social Framework
A. Discuss the culture
of the organization in which the fraud occurred. B. How was the company’s management impacted
by the fraud and the investigation? C. How were the employees
of the company impacted
by the fraud and the investigation?
D. How was the public impacted
by this fraud scheme? III.
Ethical Framework
A. The Certified Fraud Examiner designation is a global designation
; therefore, in a general nature, discuss the importance of the fraud investigator’s adherence to the components of the Association of Certified Fraud Examiners (ACFE) code of ethics. B. Discuss the importance of the fraud investigator’s adherence to the components of the ACFE code of ethics, specifically in this case, including: 1.
Client confidentiality
2.
Integrity
3.
Objectivity
C. How could deception
have been used in the interviewing? Ethically speaking, is this an appropriate way to obtain information? D. Based on your responses, explain what your ethical framework
would look like in relation to appropriate standards of conduct in conducting investigations. IV.
Legal Framework
A. Analyze the impact court rulings
have on the manner in which the interviews were conducted. Include the following in your response: 1. Miranda 2. Daubert 3. Weingarten 4.
Fourth Amendment B. Discuss the fraud case in terms of adjudicating
the case civilly
. What is the role of the fraud investigator? C. Discuss the fraud case in terms of criminal prosecution
. What is the role of the fraud investigator? Milestones
Part I Milestone One
: Social and Legal Frameworks (Sections II and IV)
In Module Two
, you will submit an analysis of the social and legal frameworks as related to HealthSouth fraud case. You will discuss the social impact of the case as well as provide an analysis of court rulings impacting the manner in which interviews are conducted. This milestone will be graded with the Part I Milestone One Rubric.
Part I Milestone Two
: Theoretical Model of Fraud and Ethical Framework (Sections I and III)
In Module Three
, you will discuss what theoretical model best applies to the HealthSouth fraud scheme. In addition, you will analyze the ethical framework related to the case, such as the importance of the investigator’s adherence to the ACFE Code of Professional Ethics. This milestone will be graded with the Part I Milestone Two Rubric.
Part I Final Submission
: Case Analysis
In Module Five
, you will submit your final HealthSouth case analysis. It should be a complete, polished artifact containing all
of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Part I Rubric.
What to Submit
Your case analysis should be 5–7 pages, double-spaced, with one-inch margins, and use 12-point Times New
Roman font and APA 6th edition format.
Final Project Part One Rubric
Criteria
Exemplary
(100%)
Proficient (90%)
Needs Improvement
(70%)
Not Evident (0%)
Value
Theoretical
Model of Fraud:
Best Applies
Meets “Proficient” criteria and demonstrates a nuanced understanding of the theoretical models of fraud
Determines the theoretical model of
fraud that best applies to this fraud
scheme and defends
response
Determines the theoretical model of fraud that best applies
to this fraud scheme, but defense is cursory
or contains inaccuracies
Does not determine the theoretical model of fraud that best applies to this fraud scheme
6
Theoretical
Model of Fraud:
Fraud Scheme
Meets “Proficient” criteria, and discussion is exceptionally clear
and contextualized
Discusses the fraud scheme using the theoretical model and provides examples illustrating the scheme in terms of the fraud model
Discusses the fraud scheme using the theoretical model, but
does not provide examples, or discussion is cursory or contains inaccuracies
Does not discuss the fraud scheme using the theoretical model
6
Theoretical
Model of Fraud:
Motivations
Meets “Proficient” criteria and offers a nuanced insight into the relationship between behaviors and motivations behind fraud
Determines the motivations that existed to commit the fraud based on the theoretical model and provides
specific examples of behavior or situation to illustrate the motivations
Determines the motivations that existed to commit the
fraud but does not base determination on
the theoretical model or does not provide examples, or determination contains inaccuracies
Does not determine the motivations that existed to commit the fraud
6
Social
Framework:
Culture
Meets “Proficient” criteria, and discussion is exceptionally clear
and contextualized
Discusses the culture of the organization in which the fraud occurred
Discusses the culture of the organization in which the fraud occurred, but discussion is cursory or contains inaccuracies
Does not discuss the culture of the organization in which the fraud occurred
6
Social
Framework:
Company’s
Management
Impacted
Meets “Proficient” criteria and cites specific, relevant examples to illustrate claims
Explains how the company’s management was impacted by the fraud and investigation
Explains how the company’s management was impacted by the fraud
and investigation, but
explanation is cursory
or contains inaccuracies
Does not explain how the company’s management was impacted by the fraud and investigation
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
QUESTION 10
In recent vears. organizations have implemented a number of initiatives to more proactively detect fraud. The first andmost common
proactive fraud detection approach has been to:
a. install reporting hotlines.
Ob.conduct undercover operations.
Oc. install surveillance cameras,
Od. collect physical evidence.
QUESTION 11
Which of the following is the foundation for all other components of internal control, providing discipline and structure?
a. Open-door policy
Control environment
b.
Whistle-blowing system
Oc.
Surveillance
d.
arrow_forward
Discussion Question 37: Explain why Benford's Law is useful to auditors in the detection of fraud. (write a one page response for each question):
arrow_forward
Question attached
appreicated the help
1l3p13lgp13lp13tl1pt140130591490914091
arrow_forward
3. Analyse the measures that are taken in the detection of a fraud.4. How do you design a fraud prevention programme?
arrow_forward
Understanding what constitutes fraud and understanding the framework are a part of developing an internal control program. The fraud triangle is a framework that is used to understand and explain what the motivation could be when a person decides to commit fraud.
Thinking about the fraud cases that you are aware of, how would the fraud triangle explain fraudulent behavior?
arrow_forward
6
Who has the responsibility to carry out the Fraud Risk Assessment (FRA)? And what skills should an individual/team have in conducting FRA?
arrow_forward
Fraud Detection and Prevention in Civil Engineering - Brief Information
Step 1: Risk Assessment and Identification
Effective fraud detection and prevention begin with a comprehensive risk assessment. Civil engineering projects involve financial transactions, procurement processes, and contractual agreements, all of which are susceptible to fraud. Identifying potential risk areas, such as billing irregularities, fake invoicing, or unauthorized changes in project scope, is crucial.
Step 2: Implementation of Internal Controls
To prevent and detect fraud, civil engineering firms should establish robust internal controls. This includes segregation of duties, where no single individual has control over an entire process, and implementing stringent approval processes for financial transactions. Regular audits and monitoring mechanisms further enhance the effectiveness of internal controls.
Step 3: Employee Training and Whistleblower Programs
Educating employees on…
arrow_forward
Explain the role of the Risk Manager in fraud detection Explain the role of the Risk Manager in fraud detection
arrow_forward
Assignment 1: Individual research/essay
You are a newly hired fraud examiner. You have been asked to write a preliminary report on the Paving Company Case scenario based on the information presented in Units 1 to 4 and findings from your additional research. Your report should not exceed 2,000 words. The word limit is not inclusive of the bibliography and cover page.
In your response, the following points must be addressed fully:
a) Determine the type of fraud committed and describe the symptoms of fraud that might be evident to an investigator.
b) As discussed in units 1 to 4, all frauds involve key elements. Identify and describe using examples the elements of the Sharp's fraud.
c) In the scenario, Sharp’s employer has been putting more emphasis on controlling costs for the various businesses. With the slowing of overall spending in the construction sector, Travolta had ordered managers to closely monitor expenses. He had sold several companies and has given vice…
arrow_forward
AC.
1. What kind of big data-based fraud prevention product can be used in fraud monitoring?
2. What kind of big data-based fraud prevention product can be used in fraud risk management?
Please explain with examples
arrow_forward
What is the importance of Forensic Accounting and Fraud Detection? Please give as much information as possible. Thanks!
arrow_forward
Discussion Questions on Fraud Prevention from Chapter 4 Fraud Examination 4th Edition
1. How do organizations create a culture of honesty, openness, and assistance?
2. What are different ways in which companies can eliminate opportunities for fraud?
3. What is the purpose of adopting a code of ethics throughout a company?
arrow_forward
Y2
Please help with Development of an Anti-Fraud Program
The potential for fraud occurs in all organizations, regardless of the industry in which it operates, financial structure, or size. Every organization is vulnerable to fraud. The risk of fraud should be reduced as much as possible to improve the longevity of the organization. Hence, preventing, deterring, and detecting fraud are crucial to the success of organizations. Deterring and preventing fraud can be more economical than detecting, investigating, and recovering from fraud after the fact. These anti-fraud measures must start at the top and must be communicated throughout the organization. They must go beyond internal controls yet consider the cost-benefit. Please explain ho to develop an anti-fraud program, or model, that can be implemented in any organization. In other words, don't apply the model to a specific organization. The model, if applied correctly, must be efficient in preventing, detecting and deterring fraud.…
arrow_forward
Explains these controls and tell why they are important in any fraud situation:
a. Preventive controls
b. Detective controls
c. Leveraging technologd. Identifying the red flags
NB: Answer questions a-d
arrow_forward
{Auditing}
27. Who among the following are secondarily responsible for prevention and detection of frauds?
a.
Management is secondarily responsible for prevention and detection of fraud
b.
Auditor is secondarily responsible for prevention and detection of fraud
c.
All the options
d.
Nomination committee is secondarily responsible for prevention and detection of fraud
arrow_forward
6
Discuss deterrence, prevention, and detection in governmental fraud. What do you think is the best aapproach and why?
arrow_forward
AU-C 240 points to three conditions that enable fraud to occur. Briefly describe each condition. How does one’s propensity to act ethically, as described by Rest’s model of morality, influence each of the three elements of the Fraud Triangle?
arrow_forward
answer quickly
arrow_forward
__________are the systems used by an organization to manage risk and diminish the occurrence of fraud.
Internal Controls
assessments
Operational activities
informational programs
arrow_forward
Answer the following from Chapter 7 of the textbook (write a one page response for each question):
Discussion Question 37: Explain why Benford's Law is useful to auditors in the detection of fraud.
arrow_forward
Question 9
Fraud risk factors are events or conditions that indicate which of the following?
An opportunity to carry out fraud
An attitude or rationalization that justifies a fraudulent action.
An incentive or pressure to perpetrate fraud.
All of the answers provided.
arrow_forward
Answer the following based on the image of the scenario
A-Help management understand the issue from Jack’s perspective. Describe the ethical dilemma that Jack faces. What is the issue? Who are the parties involved? If you were Jack, what would you consider when making a decision?
B-Help management understand the elements of the fraud triangle in this situation which increase the chances of fraud. Why is this fraud? What are the opportunities, motivations and rationalizations that you see? How does this affect the business financially?
C-Help management come up with a plan to minimize the likelihood of this happening in the future. Be sure to mention specific components of the COSO framework.
arrow_forward
Forensic Accounting: Assurance Engagement 2: Net Worth Analysis. You can use the computer-based Electronic Workpapers on the textbook website to prepare the net worth analysis required in this problem.Net worth analysis is performed when fraud has been discovered or is strongly suspected and the information to calculate a suspect’s net worth can be obtained (e.g., asset and liability records, bank accounts). The procedure used is to calculate the person’s change in net worth (excluding changes in market values of assets) and to identify the known sourcesof funds to finance the changes. Any difference between the change in net worth and the known sources of funds is called funds from unknown sources, which might include illgotten gains.Nero has worked for Bonne Consulting Group (BCG) as the executive secretary for administration for nearly 10 years. Her dedication has earned her a reputation as an outstanding employee and has resulted in increasing responsibilities. Nero is also a…
arrow_forward
41
Who among the following are secondarily responsible for prevention and detection of frauds?
a.
Auditor is secondarily responsible for prevention and detection of fraud
b.
Management is secondarily responsible for prevention and detection of fraud
c.
All the options
d.
Nomination committee is secondarily responsible for prevention and detection of fraud
arrow_forward
1. How do you understand Fraud in your own words? Please provide explanation.
2. How do you understand the Fraud Triangle? Please provide explanation.
3. Favorite topic in Forensic Accounting?
4. What recommendations will you give to prevent fraud?
5. Will you consider becoming a Fraud investigator in the Future? Why or why not.
arrow_forward
Discussion Topic: What is Fraud? Forensic accountants and fraud examiners provide support for accusations of fraud. To be effective, they must understand the difference between fraud and abuse, and must understand the legal concept of fraud, as well as elements of fraud. How does fraud differ from abuse? Give an example of each. What are the legal elements of fraud? (Hint: there are four!); explain each element.
arrow_forward
Please help ASAP. Clearly define the answers for the following questions. (use at least 10 sentences for each , thanks)
Question 1: Explain and give examples of the use of a fraud theory.
Question 2: Outline the Fraud Triangle and give two examples of each element
arrow_forward
Research fraud cases that involved agency conflicts. Provide the following:
Overview of the organization
Who was involved?
How was the fraud committed?
What was the outcome?
What recommendations do you have to stop such a fraud relating to this conflict of interest?
arrow_forward
A
1
Do research and write a detailed report on the following points:
2
3
- Give the complete definition of fraud.
4
5
5
16
- After doing some research, choose an industry where fraud is regularly committed. Indicate who the parties that could
be involved are, and specify the type of fraud they are likely to be involved in.
-
Choose a popular case where a person is known for having committed fraud. State what would be included in a
portfolio of evidence of fraud against this person.
- Search for a section in the Prevention of Organised Crime Act 121 of 1998, that governs fraud and state how it would
be applicable in a selected business sector of your choice.
- What legal recourse is available to employers when an employee has committed fraud?
7
8
- What are the most common economic crimes reported?
9
- Which industries are most affected by economic crime?
10
- What are the major trends in economic crime?
11
12
23
13
What control measure(s) can the following parties of an organisation…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Related Questions
- QUESTION 10 In recent vears. organizations have implemented a number of initiatives to more proactively detect fraud. The first andmost common proactive fraud detection approach has been to: a. install reporting hotlines. Ob.conduct undercover operations. Oc. install surveillance cameras, Od. collect physical evidence. QUESTION 11 Which of the following is the foundation for all other components of internal control, providing discipline and structure? a. Open-door policy Control environment b. Whistle-blowing system Oc. Surveillance d.arrow_forwardDiscussion Question 37: Explain why Benford's Law is useful to auditors in the detection of fraud. (write a one page response for each question):arrow_forwardQuestion attached appreicated the help 1l3p13lgp13lp13tl1pt140130591490914091arrow_forward
- 3. Analyse the measures that are taken in the detection of a fraud.4. How do you design a fraud prevention programme?arrow_forwardUnderstanding what constitutes fraud and understanding the framework are a part of developing an internal control program. The fraud triangle is a framework that is used to understand and explain what the motivation could be when a person decides to commit fraud. Thinking about the fraud cases that you are aware of, how would the fraud triangle explain fraudulent behavior?arrow_forward6 Who has the responsibility to carry out the Fraud Risk Assessment (FRA)? And what skills should an individual/team have in conducting FRA?arrow_forward
- Fraud Detection and Prevention in Civil Engineering - Brief Information Step 1: Risk Assessment and Identification Effective fraud detection and prevention begin with a comprehensive risk assessment. Civil engineering projects involve financial transactions, procurement processes, and contractual agreements, all of which are susceptible to fraud. Identifying potential risk areas, such as billing irregularities, fake invoicing, or unauthorized changes in project scope, is crucial. Step 2: Implementation of Internal Controls To prevent and detect fraud, civil engineering firms should establish robust internal controls. This includes segregation of duties, where no single individual has control over an entire process, and implementing stringent approval processes for financial transactions. Regular audits and monitoring mechanisms further enhance the effectiveness of internal controls. Step 3: Employee Training and Whistleblower Programs Educating employees on…arrow_forwardExplain the role of the Risk Manager in fraud detection Explain the role of the Risk Manager in fraud detectionarrow_forwardAssignment 1: Individual research/essay You are a newly hired fraud examiner. You have been asked to write a preliminary report on the Paving Company Case scenario based on the information presented in Units 1 to 4 and findings from your additional research. Your report should not exceed 2,000 words. The word limit is not inclusive of the bibliography and cover page. In your response, the following points must be addressed fully: a) Determine the type of fraud committed and describe the symptoms of fraud that might be evident to an investigator. b) As discussed in units 1 to 4, all frauds involve key elements. Identify and describe using examples the elements of the Sharp's fraud. c) In the scenario, Sharp’s employer has been putting more emphasis on controlling costs for the various businesses. With the slowing of overall spending in the construction sector, Travolta had ordered managers to closely monitor expenses. He had sold several companies and has given vice…arrow_forward
- AC. 1. What kind of big data-based fraud prevention product can be used in fraud monitoring? 2. What kind of big data-based fraud prevention product can be used in fraud risk management? Please explain with examplesarrow_forwardWhat is the importance of Forensic Accounting and Fraud Detection? Please give as much information as possible. Thanks!arrow_forwardDiscussion Questions on Fraud Prevention from Chapter 4 Fraud Examination 4th Edition 1. How do organizations create a culture of honesty, openness, and assistance? 2. What are different ways in which companies can eliminate opportunities for fraud? 3. What is the purpose of adopting a code of ethics throughout a company?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub