Stephanie Baskill, an unemployed accounting clerk, lives one block from Cleaver Manufacturing Company. While walking her dog last year, she noticed some ERP manuals in the dumpsters. Curious, she took the manuals home with her. She found that the documentation in the manual was dated 2 months previous, so she thought that the information must be fairly current. Over the next month,Stephanie continued to collect all types of manuals from the dumpster during her dog-walking excursions. Cleaver Manufacturing Company was apparently updating all of its documentation manuals and placing them online.Eventually, Stephanie found manuals about critical inventory reorder formulas, the billing system, the sales order system, the payables system, and the operating system. Stephanie went to the local library and read as much as she could about this particular operating system.To gain access to the organization, she took a low profile position as a cleaning woman, giving her access to all areas in the building. While working, Stephanie snooped through offices, watched people who were working late type in their passwords, and guessed passwords. She ultimately printed out lists of user IDs and passwords using a Trojan horse virus, thus obtaining all the necessary passwords to set herself up as a supplier, customer, systems operator, and systems librarian. As a customer, she ordered enough goods to trigger the automatic inventory procurement system to purchase more raw materials. Then, as a supplier, Stephanie would deliver the goods at the specified price. She then adjusted the transaction logs once the bills were paid to cover her tracks. Stephanie was able to embezzle, on average, $125,000 a month. About 16 months after she began working at Cleaver, the controller saw her at a very expensive French restaurant one evening, driving a Jaguar. He told the internal auditors to keep a close watch on her, and they were able to catch her in the act.Required a. What weaknesses in the organization’s control structure must have existed to permit this type of embezzlement? b. What specific control techniques and procedures could have helped prevent or detect this fraud?

Principles of Accounting Volume 2
19th Edition
ISBN:9781947172609
Author:OpenStax
Publisher:OpenStax
Chapter11: Capital Budgeting Decisions
Section: Chapter Questions
Problem 6Q: Ekon owns a small tow-truck business that responds to state patrol requests to tow cars involved in...
icon
Related questions
Question

Stephanie Baskill, an unemployed accounting clerk, lives one block from Cleaver Manufacturing Company. While walking her dog last year, she noticed some ERP manuals in the dumpsters. Curious, she took the manuals home with her. She found that the documentation in the manual was dated 2 months previous, so she thought that the information must be fairly current. Over the next month,
Stephanie continued to collect all types of manuals from the dumpster during her dog-walking excursions. Cleaver Manufacturing Company was apparently updating all of its documentation manuals and placing them online.
Eventually, Stephanie found manuals about critical inventory reorder formulas, the billing system, the sales order system, the payables system, and the operating system. Stephanie went to the local library and read as much as she could about this particular operating system.
To gain access to the organization, she took a low profile position as a cleaning woman, giving her access to all areas in the building. While working, Stephanie snooped through offices, watched people who were working late type in their passwords, and guessed passwords. She ultimately printed out lists of user IDs and passwords using a Trojan horse virus, thus obtaining all the necessary passwords to set herself up as a supplier, customer, systems operator, and systems librarian. As a customer, she ordered enough goods to trigger the automatic inventory procurement system to purchase more raw materials. Then, as a supplier, Stephanie would deliver the goods at the specified price. She then adjusted the transaction logs once the bills were paid to cover her tracks. Stephanie was able to embezzle, on average, $125,000 a month. About 16 months after she began working at Cleaver, the controller saw her at a very expensive French restaurant one evening, driving a Jaguar. He told the internal auditors to keep a close watch on her, and they were able to catch her in the act.
Required
a. What weaknesses in the organization’s control structure must have existed to permit this type of embezzlement?
b. What specific control techniques and procedures could have helped prevent or detect this fraud?

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 2 images

Blurred answer
Knowledge Booster
Information system controls
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Accounting Volume 2
Principles of Accounting Volume 2
Accounting
ISBN:
9781947172609
Author:
OpenStax
Publisher:
OpenStax College
Cornerstones of Cost Management (Cornerstones Ser…
Cornerstones of Cost Management (Cornerstones Ser…
Accounting
ISBN:
9781305970663
Author:
Don R. Hansen, Maryanne M. Mowen
Publisher:
Cengage Learning
Business Its Legal Ethical & Global Environment
Business Its Legal Ethical & Global Environment
Accounting
ISBN:
9781305224414
Author:
JENNINGS
Publisher:
Cengage
CONCEPTS IN FED.TAX., 2020-W/ACCESS
CONCEPTS IN FED.TAX., 2020-W/ACCESS
Accounting
ISBN:
9780357110362
Author:
Murphy
Publisher:
CENGAGE L