Sarah is the payroll assistant at Samtech Ltd with over four years of experience. One Sunday evening, she logged onto the system, created a fake employee ID, entered some fictitious timesheets, and sent the payment to the bank account of her partner. This represents which dimension or dimensions of the fraud triangle? O Means and Opportunity. O Means only. O Opportunity only. O Motive only.
Q: Ennis Locatelli is a new payroll accountant at Avata Electronics. In his review of previous manual…
A: Payroll Accounting: The process of payroll accounting includes the computation and payment of…
Q: An employee of JHT Holdings, Inc., a trucking company, was responsible for resolving roadway…
A:
Q: A multimediacourse graduate used design software to create paychecks that lookedidentical to those…
A: The question is related to computer instruction fraud. It inculdes tampering with the software that…
Q: 8.During an audit of a retail company, Lily, newly hired internal auditor, found a scheme in which…
A: solution in the given case there was a fraud scheme in which the warehouse manager and a purchasing…
Q: A former chairman, CFO, and controller of Donnkenny, Inc., an appeal company that makes sportswear…
A:
Q: Collecting Evidence in a Fraud Examination. A fraud examiner was called into a businessbecause of a…
A: Hello, since your question has multiple parts we will solve the first question for you. If you want…
Q: All-Around Sound Co. discovered a fraud whereby one of its front office administrative employees…
A: In an effective control for purchases there is segreggation of duties of employees who prepares the…
Q: John Smith worked in the stockyard of a large building supply company. One day he unexpectedly left…
A: Internal control helps to an organization to detect early fraud and avoid big destruction in the…
Q: oufian, a senior account executive is spending more money than he can afford. He is the authorized…
A: In the given situation, there can be seen complete lack of internal control.
Q: Leon Jones worked in the warehouse of a large building supply company. One day he unexpected left…
A: Payroll Fraud: A payroll fund is an amount which is utilized to pay the salary of workers. Numerous…
Q: WorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s…
A: Fraud: It is an intentional misappropriation of the assets or the financial records of an…
Q: Which of the following scenarios reduces the risk of an employee fraud? Group of answer choices An…
A: Accountant was in charge and knowledge of vendor balances. Hence, chances for fraud in the form of…
Q: Matthew Corp. has changed from a system of recording time worked on clock cards to a computerized…
A: Payroll: Payroll refers to the list of employees in a company and the amount paid to them in the…
Q: Which of the following is NOT an example of an opportunity to commit fraud in the accounting…
A: So an opportunity to commit any fraud in an organization is a chance provided by the environment to…
Q: Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 PM…
A: Given situation is: Charles Hart, an accounts payable clerk, is an hourly employee. He never works…
Q: Many authorities believe that the employer does not prosecute 90 percent of all computer fraud acts.…
A:
Q: What internal control or procedure(s) would provide protection against the following threats? A…
A: "Since you have posted a question with multiple sub-parts, we will solve first three sub-parts for…
Q: The Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious…
A: Embezzlement: Embezzlement is a type of fraud, which is classified under employee fraud. It…
Q: Leon Jones worked in the warehouse of a large building supply company. One day he unexpected left…
A: Payroll Fraud: It is simply defined as employees cheating or defrauding the company by either…
Q: At most movie theaters, one employee sells tickets and another employee collects them. Onenight,…
A: 1. Internal control procedures are used to avoid or minimize fraud or mistakes by employees. In the…
Q: What internal control or procedure(s) would provide protection against the following threats? An…
A: Since you have posted a question with multiple sub-parts, we will solve first three subparts for…
Q: The given system flowchart elaborates the business activities involved in different departments,…
A: TYPES OF FRAUD IN BUSINESS ENVIRONMENT 1. Identify theft = In identify theft fraudster could…
Q: In an automated payroll processing environment, a department manager substituted the time card for a…
A: Internal Controls: Internal controls are the controls established within an organization to check…
Q: Types of Cyber Crimes. The following situations are similar, but each represents a variation of a…
A: a) The act is phishing. It is a cyber crime in which the targets are contacted through either…
Q: The Dude Fraud Case Scenario In his own words, Daniel Jones was “The Dude.” With his waist-long…
A: Answer to (A) The symptoms of fraud that might be evident to a fellow employee A. Sudden Changes in…
Q: In the Why It Matters feature “Examples of Theft and FinancialReporting Frauds” at the beginning of…
A: Comment- Since we only answer up to 3 sub-parts, we’ll answer the first 3. Please resubmit the…
Q: Read the following information and then answer questions a & b below: Assume you are an internal…
A: 1a. On getting an anonymous hint on the company hotline about the division manager creating a shell…
Q: Consider each of the following situations. Is there a potential problem? Which part of the fraud…
A: A. Yes, it can be a potential problem. Incentive – Potential Incentives B. No, there is no…
Q: Sarat Sethi, a professional criminal, took a job as a mail room clerk at Benson & Abernathy and…
A: a. Ethics can be defined as a conduct adopted by an individual in making the selection between right…
Q: A large retail enterprise has established a policy that requires the paymaster to deliver all…
A: Unclaimed Payroll Checks: When the employees do not encash their paychecks they become the property…
Q: ou are a newly hired fraud examiner. You have been asked to write a preliminary report on the…
A: Disclaimer: “Since you have posted a question with multiple sub-parts, we will solve first three…
Q: Susan Small, CPA has Medium Corporation as an audit client. Medium has asked Small to create and…
A: Auditing refers to the evaluation of a companys' books of accounts and financial statements by the…
Q: Jim Block, CFE, is investigating Randy Smith for his role in a potential kickback scheme. Gathering…
A: Search warrants are required when the investigator knows the location of an important piece of…
Q: Identify which control activity is violated in each of the following situations, and explain how the…
A: Activity Violated An Opportunity for Fraud 1. Documentation Procedures Recording sales…
Q: An employee of JHT Holdings, Inc., a trucking company, was responsible for resolving roadway…
A: State the reason for which it takes so long to discover such a fraud:This is an illustration of a…
Q: Helen was a very forgetful person, so she had placed her bank code (PIN number) on the back of her…
A: Case Summary: The Person H wrote the pin number of the debit card at the back of the card as she was…
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: The preventive controls made the management follow up procedures that protect the control system…
Q: Didrikson Rubin, the auditor of Red Barn Farm Equipment, was verifying cash payments to vendors for…
A: Fraud: In an organization, a fraud is an intentional misrepresentation of facts in the accounting…
Q: Provide an appropriate response based on the following scenarios. Assume that the accounting…
A:
Q: department store. The mail room was an extremely hectic work environment consisting of a supervisor…
A: Internal control- It is a process of assuring to achieve organizational's objectives by doing…
Q: Select the correct answer(s) for the following multiple-choice questions. Note that there may be…
A: Fraud is an intentional mistake to gain financial advantage. Input fraud is done by altering…
Q: Hannaford is a national grocery chain whose electronic payment processing system was breached by…
A:
Q: MAIL ROOM FRAUD AND INTERNAL CONTROLSarat Sethi, a professional criminal, took a job as a mail room…
A: Mail room Fraud and internal control : Sarat Sethi restricted himself to just one month of…
Q: Please read the following and identify any internal control principles that may be violated in the…
A: Internal controls are the rules framed by a company to ensure the smooth running of the business, to…
Answer multi choice question in photo please
Step by step
Solved in 2 steps
- Allison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.Assume that Brooke Miles, accounts payable clerk for West Coast Design Inc., stole $48,350 by paying fictitious invoices for goods that were never received. The clerk set up accounts in the names of the fictitious companies and cashed the checks at a local bank. Please use at least 150 words to describe a control procedure that would have prevented or detected the fraud.Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?
- Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying a premium to the check’s value. He then scanned the check and used a variety of software packages to prepare fictitious paychecks from the employer. The group arrived on the next payday, cashed the checks at the local establishment, and moved to another town before the check was presented for payment at the local bank. This is an example of what type of fraud? a. Input fraud b. Processor fraud c. Computer instruction Fraud d. Data fraud e. Output fraudCharles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in lectures network risks and auditing could you use to help detect this type of fraud?The Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…
- Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 PM unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in this chapter could you use to help detect this type of fraud?Types of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…Consider the scenario in which Brooke Miles, an accounts payable clerk for West Coast Design Inc., misappropriated $48,350 by paying false bills for commodities that were never delivered to the company. It was the clerk's responsibility to open accounts in the names of the phony corporations and pay the cheques at a nearby bank. Describe a fraud-prevention or detection method that may have been used to avoid or identify the scam.
- Consider each of the following situations. Is there a potential problem? Which part of the fraud triangle is involved, if any? A. Susan is an accounts payable clerk. She sets up creditors in a financial database and pays invoices as they come in. Last year, she won employee of the year and is a valued employee. Through the grapevine, Susan's boss just learned that Susan's brother has a gambling problem. B. Now suppose that Susan from situation A is now secretary for the head of the marketing department. She keeps track of the vice president of marketing's schedule and handles the correspondence. C. Keith has been employed for 6 months as a teller at a community bank. All is going well, and his cash drawer has had shortages only twice (of less than P500). The shortages were traced and the problems corrected. D. At the company Memorial Day picnic and golf outing last week, Nancy noticed that June moved her ball to a better lie when she thought no one was looking. There…Eric Wilson works at Lime Inc. He used Lime Inc.'s Sam's Club card to make personal purchases. Immediately before the company paid the bill for the Sam's Club charges each month, Eric placed his receipt in with the legitimate work-related receipts for Sam's Club. The accounts payable clerk rarely verified that the receipts were signed by authorized employees or that the purchases were actually for work-related items. What type of fraud is this? Forged maker Pay and return Personal purchases Pass-through 4Rohini works as an accountant with PQR Ltd. She embezzled $20,000 from the company bank account. She was caught in the annual audit of the company. She justified her action saying that her employer has not given any pay rise, so she had to take $20,000 from the account. Explain in your own words the internal control that may have failed in the above situation. Also explain which element of the fraud triangle Rohini is referring to justify her action.