EBK FRAUD EXAMINATION
5th Edition
ISBN: 9781305840485
Author: Albrecht
Publisher: CENGAGE LEARNING - CONSIGNMENT
expand_more
expand_more
format_list_bulleted
Question
Chapter 1, Problem 1.3CS
To determine
The basis for identifying a possible suspect through personal information
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
An assistant on the Carter Company audit has been working in the revenue cycle and has compiled a list of possible errors and fraud that may result in the misstatement of Carter Company’s financial statements and a corresponding list of controls that, if properly designed and implemented, could assist in preventing or detecting the errors and fraud.
For each possible error and fraud numbered a through o, select one internal control from the following answer list that, if properly designed and implemented, most likely could assist management in preventing or detecting the errors and fraud. Each response in the list of controls may be selected once, more than once, or not at all.
A. Shipping clerks compare goods received from the warehouse with the details on the shipping documents.
B. Approved sales orders are required for goods to be released from the warehouse.
C. Monthly statements are mailed to all customers with outstanding balances.
D. Shipping clerks compare…
Read the given cases. Then, identify the most applicable technique of gathering evidence in each case. 1. Anna Santos audited the information system of Flores Corporation. Upon her evidence collection, she wanted to verify if the management assumes full responsibility for formulating, developing, documenting, promulgating, and controlling policies covering general aims and directives. 2. Veronica is the information systems (IS) auditor of Puno Corporation. In the execution of the audit, Veronica wants to know how the controls are established in the departments within the organization. Specifically, she wants to know how responsibilities are segregated in each department. 3. Brylle is one of the auditors of Alejandria Corporation (AC). He was assigned to test the controls over the cash of Alejandria. The accountant of AC prepares monthly bank reconciliation through the use of Microsoft Excel. Brylle wanted to know if the final amounts in the bank reconciliation are correct…
Anna Santos audited the information system of Flores Corporation. Upon her evidence collection, she wanted to verify if the management assumes full responsibility for formulating, developing, documenting, promulgating, and controlling policies covering general aims and directives
Chapter 1 Solutions
EBK FRAUD EXAMINATION
Ch. 1 - Prob. 1DQCh. 1 - Prob. 2DQCh. 1 - Prob. 3DQCh. 1 - Prob. 4DQCh. 1 - Prob. 5DQCh. 1 - Prob. 6DQCh. 1 - Prob. 7DQCh. 1 - Prob. 8DQCh. 1 - Prob. 9DQCh. 1 - Prob. 10DQ
Ch. 1 - Prob. 11DQCh. 1 - Prob. 12DQCh. 1 - Prob. 13DQCh. 1 - Prob. 14DQCh. 1 - Prob. 15DQCh. 1 - Prob. 1TFCh. 1 - Prob. 2TFCh. 1 - Prob. 3TFCh. 1 - 4. Manufacturing companies with a profit margin of...Ch. 1 - Prob. 5TFCh. 1 - Prob. 6TFCh. 1 - 7. When perpetrators are criminally convicted of...Ch. 1 - Prob. 8TFCh. 1 - 9. A Ponzi scheme is considered to be a type of...Ch. 1 - Prob. 10TFCh. 1 - Prob. 11TFCh. 1 - Prob. 12TFCh. 1 - Prob. 14TFCh. 1 - Prob. 15TFCh. 1 - Prob. 16TFCh. 1 - Prob. 17TFCh. 1 - Prob. 18TFCh. 1 - Prob. 19TFCh. 1 - Prob. 20TFCh. 1 - Prob. 21TFCh. 1 - 22. In vendor fraud, customers don’t pay for goods...Ch. 1 - Prob. 23TFCh. 1 - Prob. 24TFCh. 1 - Prob. 25TFCh. 1 - Prob. 26TFCh. 1 - Prob. 27TFCh. 1 - Prob. 28TFCh. 1 - Prob. 29TFCh. 1 - Prob. 30TFCh. 1 - Prob. 1MCQCh. 1 - Prob. 2MCQCh. 1 - Prob. 3MCQCh. 1 - Prob. 4MCQCh. 1 - Prob. 5MCQCh. 1 - Prob. 6MCQCh. 1 - Prob. 7MCQCh. 1 - Prob. 8MCQCh. 1 - Prob. 9MCQCh. 1 - Prob. 10MCQCh. 1 - Prob. 11MCQCh. 1 - Prob. 13MCQCh. 1 - Prob. 14MCQCh. 1 - Prob. 15MCQCh. 1 - Prob. 16MCQCh. 1 - Prob. 17MCQCh. 1 - Prob. 18MCQCh. 1 - Prob. 19MCQCh. 1 - Prob. 20MCQCh. 1 - Which of the following is not an example of...Ch. 1 - Prob. 22MCQCh. 1 - Prob. 23MCQCh. 1 - Prob. 24MCQCh. 1 - Prob. 25MCQCh. 1 - Prob. 1SCCh. 1 - Prob. 2SCCh. 1 - Prob. 3SCCh. 1 - Prob. 4SCCh. 1 - Prob. 5SCCh. 1 - Prob. 6SCCh. 1 - Prob. 7SCCh. 1 - Prob. 8SCCh. 1 - Prob. 9SCCh. 1 - Prob. 10SCCh. 1 - Prob. 11SCCh. 1 - Prob. 13SCCh. 1 - Prob. 14SCCh. 1 - Prob. 15SCCh. 1 - Prob. 16SCCh. 1 - Prob. 1.1CSCh. 1 - Prob. 1.2CSCh. 1 - Prob. 1.3CSCh. 1 - Prob. 2.1CSCh. 1 - Prob. 2.2CSCh. 1 - Prob. 3.1CSCh. 1 - Prob. 3.2CSCh. 1 - Prob. 4.1CSCh. 1 - Prob. 4.2CS
Knowledge Booster
Similar questions
- In reviewing the process procedures and internal controls of one of your audit clients, Steeplechase Enterprises, you notice the following practices in place.Steeplechase has recently installed a new computer system that affects the accounts receivable, billing, and shipping records. A specifically identified computer operator has been permanently assigned to each of the functions of accounts receivable, billing, and shipping.Each of these computer operators is assigned the responsibility of running the program for transaction processing, making program changes, and reconciling the computer log. To prevent any single operator from having exclusive access to the tapes and documentation, these three computer operators randomly rotate the custody and control tasks every 2 weeks over the magnetic tapes and the system documentation. Access controls to the computer room consist of magnetic cards and a digital code for each operator. Access to the computer room is not allowed to either the…arrow_forwardAn IT auditor is performing a test of the company's user access administration process, and has selected a random sample of 25 user access requests to evaluate. The IT audit test procedures revealed that 1 of the 25 sampled user access requests has not been properly authorized according to company policy. As a key next step in the IT audit process, the IT auditor should (select the BEST response): a) Communicate this concern to the Chief Executive Officer as soon as possible. b) Communicate this concern to the Audit Committee as soon as possible. c) Disregard the finding entirely. d) Perform additional audit procedures to better understand the risks related to the issue, as well as the root cause of the problem.arrow_forwardDefine and explain the differences among several kinds of employee frauds that might occur at an audit client.arrow_forward
- In reviewing the processes, procedures, and internal controls of one of your audit clients, VeronicaCorporation, you notice the following practices in place. Veronica has recently installed a new electronicdata processing (EDP) system that affects the accounts receivable, billing, and shipping records. Thecompany identified a computer operator who is permanently assigned to each of the functions ofaccounts receivable, billing, and shipping. Each of these computer operators is given the responsibilityof running the program for transaction processing, making program changes, and reconciling thecomputer log. To prevent an operator from having exclusive access to the tapes and documentation,the computer operators randomly rotate the custody and control tasks every two (2) weeks over themagnetic tapes and the system documentation. Access controls to the computer room consist ofmagnetic cards and a digital code for each operator. Moreover, the system analyst and the computeroperation…arrow_forwardWhich of the following audit approaches is most likely to provide an auditor the most confidence in an internal control procedure's effectiveness? *performing analytical proceduresinspection of supporting documentsinquiry of the client's management and personnelconducting a tour on client's premisesarrow_forwardChoose the one correct answer. Which of the following audit approaches is most likely to provide an auditor the most confidence in an internal control procedure's effectiveness? *performing analytical proceduresinspection of supporting documentsinquiry of the client's management and personnelconducting a tour on client's premisesarrow_forward
- The IT auditor can MOST (select one) effectively help a company deal with increasing IT-related risk by: a) Alerting management and the Audit Committee of the risks related to IT, and making audit recommendations that are focused on the root cause. b) Performing a weekly review of system-based audit logs to determine if the company has been breached. c) Ensuring that the company has a log-in banner that warns unauthorized users that they may be subject to criminal prosecution and penalties. d) Conducting an audit of the company's network security and pointing out weak firewall configuration settings in the audit report.arrow_forwardWhat are the goals of a fraud audit for internal auditors? Explain briefly.arrow_forwardEmployee Embezzlement via Cash Receipts and Payment of Personal Expenses.Assume you have received a message from an informant regarding the following case. Your assignment is to write the “audit approach” portion of the case.a. Write a brief explanation of desirable controls, missing controls, and especially the kinds of “deviations” that might arise from the situation described in the case.b. Develop some procedures for obtaining evidence about existing controls, especially procedures that could discover deviations from controls. If there are no controls to test, then there are no procedures to perform. Then just move on to part (c). An audit “procedure” should instruct someone about the source(s) of evidence to obtain and the work to perform.c. Write some procedures for gathering evidence in this case.d. Write a short statement about the discovery you expect to accomplish with your procedures.The Extra Bank AccountThe Ourtown Independent School District, like all others, had formal,…arrow_forward
- When a fraud has occurred within an organization, management must decide what follow-up action (s) to take. Briefly describe the three follow-up alternatives available to organizations?arrow_forwardYou are an audit supervisor assigned to a new client which is listed on a Stock Exchange. You visited the corporate headquarters to become acquainted with key personnel and to conduct a preliminary review of the company’s accounting policies, controls, and systems. During this visit, (i) After a careful review of the budget for data security enhancement projects, you feel the budget appears to be adequate. Identify the problems and explain them in relation to the internal environment.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Business/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:CengageCollege Accounting (Book Only): A Career ApproachAccountingISBN:9781305084087Author:Cathy J. ScottPublisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781305084087
Author:Cathy J. Scott
Publisher:Cengage Learning