Computer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s accounting information system was illegally hacked. Vandals changedmany students’ first name to Susan, student telephone numbers were changed to the number of the university president, grade point averages were modified, and some academicfiles were completely deleted.d. A computer operator at a state-run horse race betting agency set the computer clock backthree minutes. After the race was completed, he quickly telephoned bets to his girlfriend, aninput clerk at the agency, gave her the winning horse and the bet amount, and won every time!

Auditing: A Risk Based-Approach (MindTap Course List)
11th Edition
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Chapter3: Internal Control Over Financial Reporting: Responsibilities Of Management And The External Auditor
Section: Chapter Questions
Problem 39RQSC
icon
Related questions
Question

Computer Frauds and Missing Control Procedures. The following are brief stories of
actual employee thefts and embezzlements perpetrated in an IT environment.
Required:
What type of control procedure that might have prevented or detected the fraud was missing
or inoperative?
a. An accounts payable terminal operator at a subsidiary entity fabricated false invoices
from a fictitious vendor and entered them in the parent entity’s central accounts payable/
cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”
b. A bank provided custodial and record-keeping services for several mutual funds. A
proof-and-control department employee substituted his own name and account number
for those of the actual purchasers of some shares. He used the accounting information
system
to conceal and shift balances from his name and account to names and accounts
of the actual investors when he needed to avoid detection because of missing amounts in
the investors’ accounts.
c. The university’s accounting information system was illegally hacked. Vandals changed
many students’ first name to Susan, student telephone numbers were changed to the number of the university president, grade point averages were modified, and some academic
files were completely deleted.
d. A computer operator at a state-run horse race betting agency set the computer clock back
three minutes. After the race was completed, he quickly telephoned bets to his girlfriend, an
input clerk at the agency, gave her the winning horse and the bet amount, and won every time!

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Expenditure Process- Purchases and fixed assets
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L…
Auditing: A Risk Based-Approach (MindTap Course L…
Accounting
ISBN:
9781337619455
Author:
Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:
Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:
9781133935940
Author:
Ulric J. Gelinas
Publisher:
CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q…
Auditing: A Risk Based-Approach to Conducting a Q…
Accounting
ISBN:
9781305080577
Author:
Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:
South-Western College Pub
College Accounting, Chapters 1-27
College Accounting, Chapters 1-27
Accounting
ISBN:
9781337794756
Author:
HEINTZ, James A.
Publisher:
Cengage Learning,
Financial And Managerial Accounting
Financial And Managerial Accounting
Accounting
ISBN:
9781337902663
Author:
WARREN, Carl S.
Publisher:
Cengage Learning,
Accounting Information Systems
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,