Fraud Examination
5th Edition
ISBN: 9781305079144
Author: W. Steve Albrecht, Chad O. Albrecht, Conan C. Albrecht, Mark F. Zimbelman
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 1, Problem 14SC
To determine
The scope of fraud detection as a professional under advancement in technology
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
27. An audit firm has been asked by a client to attend a meeting between the client and its bank where a new bank loan application is to be discussed. According to the Code of Professional Ethics for Accountants, what type of threat to objectivity will be created if the auditor attends this meeting?
a.
Self interest threat
b.
Intimidation threat
c.
None of the options
d.
Self review threat
An IT auditor is conducting data analysis procedures on an employee expense report file and notices several expenses for $24.99 from the same individual. The company’s policy requires that any expenses that are under $25.00 do not require a receipt. The IT auditor should: [SELECT ALL THAT APPLY
a) Maintain professional skepticism and investigate these transactions further
b) Pass on investigating these items further, focusing on higher dollar amounts
c) Evaluate the business process approval controls, and related procedures
d) Discuss fraud awareness and detection programs with management to gain an understanding of management’s commitment to fraud prevention and related entity-level anti-fraud controls.
Chapter 10: Assessing and Responding to Fraud Risks
Assessing the risk of fraud in a financial statement audit is a difficult audit judgment. Auditing standards require the auditor to perform several audit procedures to accumulate information to assess the risk of fraud. You are the in-charge auditor responsible for planning the financial statement audit of Spencer, Inc. Two new staff auditors are assisting you with the initial audit planning and have asked you the questions below. Please summarize your responses to these staff auditor questions:
a. What is the purpose of the audit team's brainstorming session?
b. Who should attend the brainstorming session and when should the session be held?
c. What is the role of the two staff auditors in the brainstorming session?
d. What is the auditor's responsibility under auditing standards for detecting fraud?
e. What must the auditor document in the working papers related to the brainstorming session?
Chapter 1 Solutions
Fraud Examination
Ch. 1 - Prob. 1DQCh. 1 - Prob. 2DQCh. 1 - Prob. 3DQCh. 1 - Prob. 4DQCh. 1 - Prob. 5DQCh. 1 - Prob. 6DQCh. 1 - Prob. 7DQCh. 1 - Prob. 8DQCh. 1 - Prob. 9DQCh. 1 - Prob. 10DQ
Ch. 1 - Prob. 11DQCh. 1 - Prob. 12DQCh. 1 - Prob. 13DQCh. 1 - Prob. 14DQCh. 1 - Prob. 15DQCh. 1 - Prob. 1TFCh. 1 - Prob. 2TFCh. 1 - Prob. 3TFCh. 1 - 4. Manufacturing companies with a profit margin of...Ch. 1 - Prob. 5TFCh. 1 - Prob. 6TFCh. 1 - 7. When perpetrators are criminally convicted of...Ch. 1 - Prob. 8TFCh. 1 - 9. A Ponzi scheme is considered to be a type of...Ch. 1 - Prob. 10TFCh. 1 - Prob. 11TFCh. 1 - Prob. 12TFCh. 1 - Prob. 14TFCh. 1 - Prob. 15TFCh. 1 - Prob. 16TFCh. 1 - Prob. 17TFCh. 1 - Prob. 18TFCh. 1 - Prob. 19TFCh. 1 - Prob. 20TFCh. 1 - Prob. 21TFCh. 1 - 22. In vendor fraud, customers don’t pay for goods...Ch. 1 - Prob. 23TFCh. 1 - Prob. 24TFCh. 1 - Prob. 25TFCh. 1 - Prob. 26TFCh. 1 - Prob. 27TFCh. 1 - Prob. 28TFCh. 1 - Prob. 29TFCh. 1 - Prob. 30TFCh. 1 - Prob. 1MCQCh. 1 - Prob. 2MCQCh. 1 - Prob. 3MCQCh. 1 - Prob. 4MCQCh. 1 - Prob. 5MCQCh. 1 - Prob. 6MCQCh. 1 - Prob. 7MCQCh. 1 - Prob. 8MCQCh. 1 - Prob. 9MCQCh. 1 - Prob. 10MCQCh. 1 - Prob. 11MCQCh. 1 - Prob. 13MCQCh. 1 - Prob. 14MCQCh. 1 - Prob. 15MCQCh. 1 - Prob. 16MCQCh. 1 - Prob. 17MCQCh. 1 - Prob. 18MCQCh. 1 - Prob. 19MCQCh. 1 - Prob. 20MCQCh. 1 - Which of the following is not an example of...Ch. 1 - Prob. 22MCQCh. 1 - Prob. 23MCQCh. 1 - Prob. 24MCQCh. 1 - Prob. 25MCQCh. 1 - Prob. 1SCCh. 1 - Prob. 2SCCh. 1 - Prob. 3SCCh. 1 - Prob. 4SCCh. 1 - Prob. 5SCCh. 1 - Prob. 6SCCh. 1 - Prob. 7SCCh. 1 - Prob. 8SCCh. 1 - Prob. 9SCCh. 1 - Prob. 10SCCh. 1 - Prob. 11SCCh. 1 - Prob. 13SCCh. 1 - Prob. 14SCCh. 1 - Prob. 15SCCh. 1 - Prob. 16SCCh. 1 - Prob. 1.1CSCh. 1 - Prob. 1.2CSCh. 1 - Prob. 1.3CSCh. 1 - Prob. 2.1CSCh. 1 - Prob. 2.2CSCh. 1 - Prob. 3.1CSCh. 1 - Prob. 3.2CSCh. 1 - Prob. 4.1CSCh. 1 - Prob. 4.2CS
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- (This is about Accounting Information System.) 1. Distinguish between ethical issues and legal issues. 2. When a company has a strong internal control structure, stockholders can expect the elimination of fraud. Comment on the soundness of this statement. 3. Distinguish between employee fraud and management fraud. 4. Discuss the Sarbanes-Oxley Act. Please provide me a correct answer and PLEASE ANSWER ALL THE QUESTIONS NOT JUST ONE QUESTION. Thank you!arrow_forward(This is about Accounting Information System.) 1. Distinguish between ethical issues and legal issues. 2. When a company has a strong internal control structure, stockholders can expect the elimination of fraud. Comment on the soundness of this statement. 3. Distinguish between employee fraud and management fraud. 4. Discuss the Sarbanes-Oxley Act. Please provide me a correct answer. Thank you!arrow_forwardAnswer the following from Chapter 7 of the textbook (write a one page response for each question): Discussion Question 37: Explain why Benford's Law is useful to auditors in the detection of fraud.arrow_forward
- 25. An audit firm has been asked by a client to attend a meeting between the client and its prospective investors in order to discuss the company’s financial performance in the last year. According to the Code of Professional Ethics for Accountants, what type of threat to objectivity will be created if the auditor attends this meeting? a. Advocacy threat b. Self review threat c. Self-interest threat d. Intimidation threatarrow_forward(This subject is about Accounting Information System.) 1. Because all fraud involves some form of financial misstatement, how is fraudulent statement fraud different? 2. Explain the problems associated with lack of auditor independence. 3. Why is an independent audit committee important to a company? 4. In this age of high technology and computer-based information systems, why are accountants concerned about physical (human) controls? Please provide me a correct answer and PLEASE NO PLAGIARISM. Thank you!!arrow_forward(a): Critically discuss the statement that, when a company has a strong internal control structure, shareholders can expect elimination of fraud. (b): In this age of high technology and computer-based information systems, why are accountants concerned about physical (human) controls? topic is belong to AIS, book editor Hall, ch 3, hope to hear your reply with expert answer, thank you!arrow_forward
- Accounting You are auditing the financial statements of Holly’s Happenin’ Hula Hoops Club (4H Club). Unbeknownst to you as the auditor, there is a fraud being committed related to the inventory account. For the fraud described below, specifically list a) the assertion about the inventory account that is violated, b) a control procedure the client should have had in place that could have potentially prevented the fraud, and c) an audit procedure that you would likely perform during the audit of inventory that would detect the fraud. Each month, an employee in the receiving department submits a fictitious receiving report to accounting. A few days later, he sends the 4H Club an invoice for the quantity of goods ordered from a small company he owns and operates. The invoice is always paid when the accounts payable clerk matches the receiving report with the vendor’s invoicearrow_forwardQuestion 3 Which of the following IT events would create the most serious risk to financial reporting? A. Employees writing down passwords on sticky notes B. Using software on the company network that has been downloaded from a warez website C. Finding an employee running a personal business on company computers D. Unauthorized access to the corporate networkarrow_forward1. Distinguish between exposure and risk. 2. Explain the characteristics of management fraud. 3. Why are the computer ethics issues of privacy, security, and property ownership of interest to accountants? 4. Explain why collusion between employees and management in the commission of a fraud is difficult to both prevent and detect. Please provide me a correct answer and PLEASE NO PLAGIARSIM. Thank you.arrow_forward
- Discussion Question 37: Explain why Benford's Law is useful to auditors in the detection of fraud. (write a one page response for each question):arrow_forwardDiscussion Questions on Fraud Prevention from Chapter 4 Fraud Examination 4th Edition 1. How do organizations create a culture of honesty, openness, and assistance? 2. What are different ways in which companies can eliminate opportunities for fraud? 3. What is the purpose of adopting a code of ethics throughout a company?arrow_forward3. Mini Case 3 XYZ Restaurants Corp. has recently completed its annual external audit of financial records. The outside auditing firm employed to conduct this audit has presented the results to the company president and asked for her approval and signature on the document. However, the president is unsure of the results and is unwilling to attest to the results of the audit. In last month’s corporate board meeting, members openly demanded the resignation of the president on the grounds that she is holding up company progress through her actions. The board has also determined that, in its opinion, her signature is not needed on these documents Question How should the president respond?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning