ACC425_Project Two_Parnham
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
425
Subject
Accounting
Date
Apr 3, 2024
Type
docx
Pages
13
Uploaded by LieutenantNeutron13679
ACC 425 Project Two Template
Phases
1.
Apply each of the phases of interview planning to a fraud case. A.
Phase One: 50
The information about the alleged fraud offers a primary overview but lacks specific details and concrete evidence of fraud. The lack of specifics, such as dates, amounts, or instances, makes assessing the claim's validity challenging. The absence of documentation for donations, merchandise on the store floor, sales, and a notable decrease in bank deposits raises suspicion but
requires further investigation. The involvement of the four-floor employees and three sorting room employees suggests multiple perspectives on the organization's operations.
B.
Phase Two: 1.
The actionable information in this fraud case includes the allegation that the director purchases items from the organization’s store at a significantly reduced rate and then resells them privately. We know there is a lack of documentation of merchandise movements, donations, and employee procedures. We know multiple employees are on the floor and in the sorting room. 2.
Several gaps and uncertainties surround the alleged fraud. We do not know the nature and extent of the director's involvement in purchasing items at a discounted rate and reselling them. We do not know the frequency of transactions, the monetary value of the sales, or the identities of the purchases, either for fraud or legitimate business. We do not know the specific reason for the $100,000 decrease in bank deposits. A primary factor is that we do not
know if donations have even been stolen from the organization.
3.
We do not know that we do not any potential motivations behind the alleged fraud, if there are co-conspirators, or whether there is a history of fraud at the organization. We do not know that we do not know if there is a more significant issue, another type of fraud causing the bank deposits to fall short. We do not know that we do not know if there are any internal controls or organization structures outside of employee designation. 4.
If the director purchases items from the organization at a significantly reduced rate and then resells them privately, then
the store items would be decreasing faster than previously. Therefore,
have you noticed that the rate of items leaving the store is faster than the number of customers shopping?
If the director purchases items from the organization at a significantly reduced rate and resells them privately, then
the director would have shown signs of a lifestyle change. Therefore,
have you been aware of any significant changes in the director's life recently?
If the director purchases items from the organization at a significantly reduced rate and resells them privately, then
there has to be an individual to sell to. Therefore
, have any individuals been coming by after hours to see the director?
If the director purchases items from the organization at a significantly reduced rate and then resells them privately, then there would be missing inventory from the stocking room. Therefore, were you aware of any inventory that has gone missing or been put to the side by the director? If there is a lack of documentation of merchandise movements, donations, and employee procedures, then
there would be no price or amount sold restrictions. Therefore, are you aware of instances where an employee did not charge for items or did not charge the total ticket amount?
If there is a lack of documentation of merchandise movements, donations, and employee procedures, then there would be no records of the types of merchandise or the value of the merchandise on the store floor. Therefore, how do you keep records of what was sold? Furthermore, how is the price of merchandise determined? If there is a lack of documentation of merchandise movements, donations, and employee procedures, then there would be no knowledge of consumer theft or false donations. Therefore, how does the company account for inventory in its financial documents? How does the organization confirm donations?
C.
Phase Three: If the director purchases items from the organization at a significantly reduced rate and then resells them privately. Then
, the director had to take the items from the organization. Therefore,
who saw the direct take items from the organization? To whom did the director sell the items? Who transported the items from the organization to the buyers?
Where did the director take the items after removing them from the organization? Where did the sales happen? Where did the director put items in the store to be taken out of the store later? What made it easy for the director to take items from the organization? What was stopping the director from taking the items from the organization? When did the director take the items from the organization? When did the director buy the items initially? When did the director sell those items at a higher price?
If there is a lack of documentation of merchandise movements, donations, and employee procedures.
Then, the director would have open access to take items from the organization. Therefore,
who controlled the inventory from the storage room to the store floor? Who had access to the items while in the store? Who stopped customers from stealing while in the store? Who watched the employees as they sorted or worked on the floor?
Where did the daily sales reports go at the end of the day? Where were the employees allowed access to the items? Where did deliveries or purchases come into the store? What stopped the employees from taking items from the organization? What processes did the employees follow when starting and ending their shifts? What kept the merchandise inside the store and not outside the store? What was the difference between sorting room merchandise and store floor merchandise?
When did the employees have time to move merchandise around the store? When were there reasons for merchandise to be held in the sorting room? When did the employees have to stock the store floor?
D.
Phase Four: Start by interviewing the most peripheral members, moving into the most possible candidates for
fraud. Third-party witnesses should be interviewed first, moving to the more knowledgeable members. It would be wise to begin with the customers and donors of the store, move to the higher management of the organization and the board members. The store employees on both the
floor and sorting room, and finally interview the director. To initiate the interview, it is prudent to begin with an introductory question that sets a positive tone and facilitates the establishment of rapport. It would be essential to ask about the interviewee’s role within the organization and their key responsibilities (Wells, 2003). This allows the interviewee to provide a comfortable and familiar introduction but also provides
valuable insights into their perception of their role and responsibilities. It serves as an opportunity to observe non-verbal cues, such as body language and tone, which can provide early
indicators of the interviewee’s comfort level and potential emotional state (Wells, 2003). This initial rapport-building question helps create a collaborative atmosphere, laying the foundation for a more open and productive discussion as the interview progresses (Wells, 2003). As the interview progresses, transitioning into informal questions is a strategic approach to encourage the interviewee to share relevant facts and information more freely (Well, 2003). Utilizing a mix of open, closed, and leading questions can yield a comprehensive understanding of the situation. Open questions, like “Can you describe the typical process for handling donations within the organization?’ invite the interviewee to provide detailed and unprompted information (Well, 2003). Closed questions, like “Did you personally handle any of the transactions in question?” can elicit specific, focused responses (Wells, 2003). Introducing carefully framed leading questions, such as “Were there any instances where you felt pressure to engage in these activities?” can gently guide the interviewee toward disclosing motivations or external influences (Well, 2003). The blend of questioning allows for more conversational and informative exchange and provides opportunities to validate information through different responses, contributing to a thorough exploration of the alleged fraud. This also allows you to decide if the interviewee is a suspect in the fraud (Wells, 2003). When the interviewee is considered a suspect in a fraud case, it becomes essential to transition the interview into assessment questions designed to gauge their attitude towards honesty and truthfulness (Wells, 2003). Employing a subtle approach, pose innocuous-sounding questions that indirectly assess the interviewee’s credibility. For instance, questions like “Can you share an
instance where honestly played on maintaining a positive work environment?” or “How do you
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Which of the following is designed specifically to detect fraud?
1. A surprise visit to the client's warehouse.
2. Looking at little-used or miscellaneous accounts.
3. Testing internal controls for operating deficiencies.
4.1 and 2 only.
5.1 and 3 only.
O 1
O 2
0 3
0 4
0 5
arrow_forward
Assignment 1: Individual research/essay
You are a newly hired fraud examiner. You have been asked to write a preliminary report on the Paving Company Case scenario based on the information presented in Units 1 to 4 and findings from your additional research. Your report should not exceed 2,000 words. The word limit is not inclusive of the bibliography and cover page.
In your response, the following points must be addressed fully:
a) Determine the type of fraud committed and describe the symptoms of fraud that might be evident to an investigator.
b) As discussed in units 1 to 4, all frauds involve key elements. Identify and describe using examples the elements of the Sharp's fraud.
c) In the scenario, Sharp’s employer has been putting more emphasis on controlling costs for the various businesses. With the slowing of overall spending in the construction sector, Travolta had ordered managers to closely monitor expenses. He had sold several companies and has given vice…
arrow_forward
Explain with correct explanation
arrow_forward
Forensic Accounting: Assurance Engagement 1: Expenditure Analysis. Expenditureanalysis is used when fraud has been discovered or strongly suspected and the informationto calculate a suspect’s income and expenditures can be obtained (e.g., asset and liabilityrecords, bank accounts). Expenditure analysis consists of establishing the suspect’s knownexpenditures for all purposes for the relevant period, subtracting all known sources of funds(e.g., wages, gifts, inheritances, bank balances), and identifying the difference as “expenditures financed by unknown sources of income.”The law firm of Gleckel and Morris has hired you. The lawyers have been retained byBlade Manufacturing Company in a case involving a suspected kickback by a purchasingemployee, E. J. Cunningham. Cunningham is suspected of taking kickbacks from MasonVarner, a salesman for Tanco Metals. Cunningham has denied the charges, but LanierGleckel, the lawyer in charge of the case, is convinced the kickbacks have…
arrow_forward
Discussion Question 37: Explain why Benford's Law is useful to auditors in the detection of fraud. (write a one page response for each question):
arrow_forward
The fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. No one matches the cash in the register to receipts when shifts end.
arrow_forward
Question 9
Fraud risk factors are events or conditions that indicate which of the following?
An opportunity to carry out fraud
An attitude or rationalization that justifies a fraudulent action.
An incentive or pressure to perpetrate fraud.
All of the answers provided.
arrow_forward
please answer with reason
arrow_forward
FBI and Financial Fraud
This assignment aligns with Outcome 4: Model techniques used to collect and analyze data.
Adapted from Question 24 on pages 14-40 & 14-41 of the textbook.
Go to the FBI websiteLinks to an external site. and use the search box in the top right corner to conduct a search on financial fraud. The FBI site provides numerous descriptions of financial fraud cases that they have prosecuted. Choose a case and select one of the convicted defendants named in the case. Use the profiling methods described in the chapter to perform a due diligence search and collect all the internet information that you can about this individual. The information that you collect can include news reports, addresses either physical or virtual, education background, etc. Document where you found the information by including the name of the website and its URL.
arrow_forward
“Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.”
Required:
Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?
arrow_forward
Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer.
Which of the following statements is (are) true?
a. To prevent detection when an asset is stolen, the perpetrator must inflate liabilities or decrease assets.
b. Committing a fraud almost always takes more effort and time than concealing it.
c. Perpetrators can hide an asset theft by charging the stolen item to an expense account.
d. A lapping scheme is used to commit fraud but not to conceal it.
e. An individual can hide the theft of cash using a check-kiting scheme.
arrow_forward
Forensic Accounting: Assurance Engagement 2: Net Worth Analysis. You can use the computer-based Electronic Workpapers on the textbook website to prepare the net worth analysis required in this problem.Net worth analysis is performed when fraud has been discovered or is strongly suspected and the information to calculate a suspect’s net worth can be obtained (e.g., asset and liability records, bank accounts). The procedure used is to calculate the person’s change in net worth (excluding changes in market values of assets) and to identify the known sourcesof funds to finance the changes. Any difference between the change in net worth and the known sources of funds is called funds from unknown sources, which might include illgotten gains.Nero has worked for Bonne Consulting Group (BCG) as the executive secretary for administration for nearly 10 years. Her dedication has earned her a reputation as an outstanding employee and has resulted in increasing responsibilities. Nero is also a…
arrow_forward
The fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. The business has no cameras or security devices at its warehouse.
arrow_forward
QUESTION 35 From the article And Nothing But the Truth which of the following is true? Most fraudulent disclosures involve purposeful omissions. Management fraud is rarely detected through tips and complaints. Material accounting changes need not be disclosed. Management fraud for small amounts is not considered significant.
arrow_forward
1. Which audit technique would be a step in uncovering
accounts receivble fraud? (Points : 2)
A review of customer complaints
A surprise cash audit
A bank reconciliation review
An analysis of gross profit
Question 2.2. Which is a type of cash receipts fraud
scheme? (Points : 2)
Ghost employees
Lapping
Fictitious receivables
Shell companies
arrow_forward
1. What does it mean to say that internal control has limitations and what are these limitations?
2. Provide an appropriate response based on the following scenarios.
Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented?
Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?
3. What is petty cash and what purpose(s) does it serve?
4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash?
5. Prepare the necessary journal entries for each of the following:
(a) On March 1, issued a check to establish a petty cash fund of $1,410
(b)…
arrow_forward
3. Analyse the measures that are taken in the detection of a fraud.4. How do you design a fraud prevention programme?
arrow_forward
Question No. 1. What are fraud audits and why have they become more common?
arrow_forward
Accounts payable fraud is an issue that may arise. Find an Accounts payable fraud story on the internet
Discuss the following:
What was the purpose of the fraud?
What were the actions and consequences?
Who benefitted from the fraud?
How did the fraud get discovered?
What controls should have been in place to prevent fraud?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Related Questions
- Which of the following is designed specifically to detect fraud? 1. A surprise visit to the client's warehouse. 2. Looking at little-used or miscellaneous accounts. 3. Testing internal controls for operating deficiencies. 4.1 and 2 only. 5.1 and 3 only. O 1 O 2 0 3 0 4 0 5arrow_forwardAssignment 1: Individual research/essay You are a newly hired fraud examiner. You have been asked to write a preliminary report on the Paving Company Case scenario based on the information presented in Units 1 to 4 and findings from your additional research. Your report should not exceed 2,000 words. The word limit is not inclusive of the bibliography and cover page. In your response, the following points must be addressed fully: a) Determine the type of fraud committed and describe the symptoms of fraud that might be evident to an investigator. b) As discussed in units 1 to 4, all frauds involve key elements. Identify and describe using examples the elements of the Sharp's fraud. c) In the scenario, Sharp’s employer has been putting more emphasis on controlling costs for the various businesses. With the slowing of overall spending in the construction sector, Travolta had ordered managers to closely monitor expenses. He had sold several companies and has given vice…arrow_forwardExplain with correct explanationarrow_forward
- Forensic Accounting: Assurance Engagement 1: Expenditure Analysis. Expenditureanalysis is used when fraud has been discovered or strongly suspected and the informationto calculate a suspect’s income and expenditures can be obtained (e.g., asset and liabilityrecords, bank accounts). Expenditure analysis consists of establishing the suspect’s knownexpenditures for all purposes for the relevant period, subtracting all known sources of funds(e.g., wages, gifts, inheritances, bank balances), and identifying the difference as “expenditures financed by unknown sources of income.”The law firm of Gleckel and Morris has hired you. The lawyers have been retained byBlade Manufacturing Company in a case involving a suspected kickback by a purchasingemployee, E. J. Cunningham. Cunningham is suspected of taking kickbacks from MasonVarner, a salesman for Tanco Metals. Cunningham has denied the charges, but LanierGleckel, the lawyer in charge of the case, is convinced the kickbacks have…arrow_forwardDiscussion Question 37: Explain why Benford's Law is useful to auditors in the detection of fraud. (write a one page response for each question):arrow_forwardThe fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. No one matches the cash in the register to receipts when shifts end.arrow_forward
- Question 9 Fraud risk factors are events or conditions that indicate which of the following? An opportunity to carry out fraud An attitude or rationalization that justifies a fraudulent action. An incentive or pressure to perpetrate fraud. All of the answers provided.arrow_forwardplease answer with reasonarrow_forwardFBI and Financial Fraud This assignment aligns with Outcome 4: Model techniques used to collect and analyze data. Adapted from Question 24 on pages 14-40 & 14-41 of the textbook. Go to the FBI websiteLinks to an external site. and use the search box in the top right corner to conduct a search on financial fraud. The FBI site provides numerous descriptions of financial fraud cases that they have prosecuted. Choose a case and select one of the convicted defendants named in the case. Use the profiling methods described in the chapter to perform a due diligence search and collect all the internet information that you can about this individual. The information that you collect can include news reports, addresses either physical or virtual, education background, etc. Document where you found the information by including the name of the website and its URL.arrow_forward
- “Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?arrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true? a. To prevent detection when an asset is stolen, the perpetrator must inflate liabilities or decrease assets. b. Committing a fraud almost always takes more effort and time than concealing it. c. Perpetrators can hide an asset theft by charging the stolen item to an expense account. d. A lapping scheme is used to commit fraud but not to conceal it. e. An individual can hide the theft of cash using a check-kiting scheme.arrow_forwardForensic Accounting: Assurance Engagement 2: Net Worth Analysis. You can use the computer-based Electronic Workpapers on the textbook website to prepare the net worth analysis required in this problem.Net worth analysis is performed when fraud has been discovered or is strongly suspected and the information to calculate a suspect’s net worth can be obtained (e.g., asset and liability records, bank accounts). The procedure used is to calculate the person’s change in net worth (excluding changes in market values of assets) and to identify the known sourcesof funds to finance the changes. Any difference between the change in net worth and the known sources of funds is called funds from unknown sources, which might include illgotten gains.Nero has worked for Bonne Consulting Group (BCG) as the executive secretary for administration for nearly 10 years. Her dedication has earned her a reputation as an outstanding employee and has resulted in increasing responsibilities. Nero is also a…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,