Fraud Examination
6th Edition
ISBN: 9781337619677
Author: Albrecht, W. Steve, Chad O., Conan C., Zimbelman, Mark F.
Publisher: Cengage,
expand_more
expand_more
format_list_bulleted
Question
Chapter 1, Problem 25MCQ
To determine
To identify which of the following is not true regarding ACFE
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
According to the 2020 Reports to the Nations published by the Association of Certified Fraud Examiners, approximately, what percentage of Occupational Fraud and Abuse cases are discovered through tips?
A.
41
B.
43
C.
45
D.
46
The U.S. General Accounting Office (GAO) Office of Special Investigations was responsible for investigating a potential purchase fraud case. The man who allegedly committed the fraud was Mark J. Krenik, a former civilian employee of the U.S. Air Force. Mr. Krenik was the Air Force's technical representative on contracts with Hughes STX. Hughes STX provided hardware, software maintenance, technical support, and training to the Air Force. Part of Mr. Krenik's alleged fraud included opening accounts under his control at banks in Maryland. The accounts were opened under the names Hughes STX and ST Systems Corporation. A section of the GAO report on this fraud investigation reads as follows:
On December 15, 1992, Mr. Krenik opened post office box 215 in Vienna, Virginia, in his own name. On December 24, 1992, Mr. Krenik delivered to the Air Force Finance Office 11 bogus invoices totaling $504,941.19. Accompanying the invoices were the respective DD‐250s, on which Mr. Krenik had falsely…
Many countries have now made money laundering a criminal offence. In some countries, such as the UK, Australia, Singapore and the USA, the criminal offences include those directed at accountants. In the UK, the basic requirements are for accountants to keep records of clients’ identity and to report suspicions of money laundering to the National Crime Agency (NCA). These obligations apply both to firms and to individuals. A firm must establish anti-money laundering programmes which help to reduce to the possible barest minimum, the impact of money laundering on the firm. There are specific regulatory obligations imposed on accountants and auditors in relation to detecting and reporting money laundering activities. As the audit manager of Queenstar Consults, you have been asked to provide a training session to the new audit juniors on auditors’ responsibilities in relation to money laundering. Required: (a) Prepare briefing notes to be used at your training session in which you: i.…
Chapter 1 Solutions
Fraud Examination
Ch. 1 - Prob. 1DQCh. 1 - Prob. 2DQCh. 1 - Prob. 3DQCh. 1 - Prob. 4DQCh. 1 - Prob. 5DQCh. 1 - Prob. 6DQCh. 1 - Prob. 7DQCh. 1 - Prob. 8DQCh. 1 - Prob. 9DQCh. 1 - Prob. 10DQ
Ch. 1 - Prob. 11DQCh. 1 - Prob. 12DQCh. 1 - Prob. 13DQCh. 1 - Prob. 14DQCh. 1 - Prob. 15DQCh. 1 - Prob. 1TFCh. 1 - Prob. 2TFCh. 1 - Prob. 3TFCh. 1 - 4. Manufacturing companies with a profit margin of...Ch. 1 - Prob. 5TFCh. 1 - Prob. 6TFCh. 1 - 7. When perpetrators are criminally convicted of...Ch. 1 - Prob. 8TFCh. 1 - 9. A Ponzi scheme is considered to be a type of...Ch. 1 - Prob. 10TFCh. 1 - Prob. 11TFCh. 1 - Prob. 12TFCh. 1 - Prob. 14TFCh. 1 - Prob. 15TFCh. 1 - Prob. 16TFCh. 1 - Prob. 17TFCh. 1 - Prob. 18TFCh. 1 - Prob. 19TFCh. 1 - Prob. 20TFCh. 1 - Prob. 21TFCh. 1 - 22. In vendor fraud, customers don’t pay for goods...Ch. 1 - Prob. 23TFCh. 1 - Prob. 24TFCh. 1 - Prob. 25TFCh. 1 - Prob. 26TFCh. 1 - Prob. 27TFCh. 1 - Prob. 28TFCh. 1 - Prob. 29TFCh. 1 - Prob. 30TFCh. 1 - Prob. 1MCQCh. 1 - Prob. 2MCQCh. 1 - Prob. 3MCQCh. 1 - Prob. 4MCQCh. 1 - Prob. 5MCQCh. 1 - Prob. 6MCQCh. 1 - Prob. 7MCQCh. 1 - Prob. 8MCQCh. 1 - Prob. 9MCQCh. 1 - Prob. 10MCQCh. 1 - Prob. 11MCQCh. 1 - Prob. 13MCQCh. 1 - Prob. 14MCQCh. 1 - Prob. 15MCQCh. 1 - Prob. 16MCQCh. 1 - Prob. 17MCQCh. 1 - Prob. 18MCQCh. 1 - Prob. 19MCQCh. 1 - Prob. 20MCQCh. 1 - Which of the following is not an example of...Ch. 1 - Prob. 22MCQCh. 1 - Prob. 23MCQCh. 1 - Prob. 24MCQCh. 1 - Prob. 25MCQCh. 1 - Prob. 1SCCh. 1 - Prob. 2SCCh. 1 - Prob. 3SCCh. 1 - Prob. 4SCCh. 1 - Prob. 5SCCh. 1 - Prob. 6SCCh. 1 - Prob. 7SCCh. 1 - Prob. 8SCCh. 1 - Prob. 9SCCh. 1 - Prob. 10SCCh. 1 - Prob. 11SCCh. 1 - Prob. 13SCCh. 1 - Prob. 14SCCh. 1 - Prob. 15SCCh. 1 - Prob. 16SCCh. 1 - Prob. 1.1CSCh. 1 - Prob. 1.2CSCh. 1 - Prob. 1.3CSCh. 1 - Prob. 2.1CSCh. 1 - Prob. 2.2CSCh. 1 - Prob. 3.1CSCh. 1 - Prob. 3.2CSCh. 1 - Prob. 4.1CSCh. 1 - Prob. 4.2CS
Knowledge Booster
Similar questions
- WorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s management used to carry out the fraud?arrow_forwardThe following scenarios are taken from actual fraud cases. For each scenario, categorize as primarily indicating (A) An incentive to commit fraud (B) An opportunity to commit fraud or (C) a rationalization for committing fraud. State your reason for your answer in each scenario. 1. Top management of the company closely guards internal financial information, to the extent that even some employees on a "need to know basis" are denied full access.arrow_forwardMany credit card fraud offenders are now becoming more organized than before, resulting in higher losses from their offenses. Countries such as the USA and the UK have been seen improving their fraud prevention strategies by enhancing coordination in combating fraud. The establishment of the President’s Identity Theft Task Force in the USA and the National Fraud Authority in the UK are evidence of the importance of coordinated efforts in addressing fraud problems. Author’s research suggests that the key areas of resource allocation in credit card fraud prevention within a payment system are: understanding of the real problems, fraud prevention policy, fraud awareness, technology-based protection, identity management and legal deterrence. These areas are mainly supported by four pillars: user, institution, network and government and industry. This is dubbed by the author as the “four pillared-house of payments fraud prevention practice” Referring to the fraud statistics from the…arrow_forward
- Many credit card fraud offenders are now becoming more organized than before, resulting in higher losses from their offenses. Countries such as the USA and the UK have been seen improving their fraud prevention strategies by enhancing coordination in combating fraud. The establishment of the President’s Identity Theft Task Force in the USA and the National Fraud Authority in the UK are evidence of the importance of coordinated efforts in addressing fraud problems. Author’s research suggests that the key areas of resource allocation in credit card fraud prevention within a payment system are: understanding of the real problems, fraud prevention policy, fraud awareness, technology-based protection, identity management and legal deterrence. These areas are mainly supported by four pillars: user, institution, network and government and industry. This is dubbed by the author as the “four pillared-house of payments fraud prevention practice” Referring to the fraud statistics from the…arrow_forwardCan anyone help? The Sarbanes-Oxley Act is a product of a series of scandals that took place around the turn of the millennium. A) Has Sarbanes-Oxley really done anything to curb fraud? B) How does the Sarbanes-Oxley Act affect U.S. companies as they compete globally?arrow_forwardThe best way to enact a broad fraud prevention program is toa. Install airtight control systems of checks and supervision.b. Name an “ethics officer” who is responsible for receiving and acting on fraud tips.c. Place dedicated hotline telephones on walls around the workplace with direct communication to the company ethics officer.d. Practice management “of the people and for the people” to help them share personal and professional problems.arrow_forward
- The following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate customers who have a right to the data. An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password. An organization’s top salesman uses a consumer-grade instant messaging (IM) client (e.g., AOL Instant Messaging). Such clients bypass antivirus and spam software, don’t have auditing and logging capabilities, and allow users to choose their IM names. A financial analyst’s laptop was stolen from his car. The laptop contained the names and social security numbers of…arrow_forwardWhich of the following is not a Sarbanes-Oxley Actrequirement intended to reduce fraud opportunities?a. Increase fines and jail sentences for fraud perpetrators.b. All public companies establish an audit committee ofindependent directors.c. Management of all public companies evaluates andreports on the effectiveness of internal control overfinancial reporting.d. External auditors of large public companies evaluateand report on the effectiveness of internal control overfinancial reporting.arrow_forwardThe Australian Institute of Criminology (AIC) asserts that three factors can explain fraud. Which of the following is not considered as one of the factors asserted by the AIC? Pressure, opportunity, and rationalization Absence of effective and efficient internal controls Availability of suitable targets Supply of motivated and willing offenders All the above None of the above West Coast Baseball Association, Inc.’s, (WCBA) baseball stadium was destroyed by a tornado. WCBA and its insurance company disagreed on the amount to recover for the damages. As a result, you have been engaged as a forensic accountant to compute the amount recoverable for the damages after trial as an Exhibit to be presented in a court of law. However, based on negotiations, the litigants (WCBA and the insurance company) have agreed on the following cost elements: Projected earnings after trial, had the harmful event not occurred was $4,300,500 million Project earnings after the trial were $500,000…arrow_forward
- You are a newly hired fraud examiner. You have been asked to write a preliminary report on thescenario below. The Dude Fraud CaseIn his own words, Daniel Jones was “The Dude.” With his waist-long dreadlocks, part-time rockband, and well-paid job managing a company’s online search directory—he seemed to have itall. Originally from Germany, Jones, now age 32, earned his doctorate and taught at theUniversity of Munich before coming to the United States, where he started his career incomputers. In 1996, Jones started working with the company as a director of operations for U.S.-Speech Engineering Service and Retrieval Technology—working on a new, closely guardedsearch engine tied to the company’s .net concept.The company allows employees to order an unlimited amount of software and hardware, at nocost, for business purposes. Between December 2001 and November 2002, Jones ordered or usedhis assistant and other employees (including a high school intern) to order nearly 1,700 pieces…arrow_forwardRead the following information and then answer questions a & b below: Assume you are an internal auditor for a large, multinational, manufacturing organization with a division in Mexico. One of your responsibilities is to investigate allegations made on the company’s fraud hotline. When you arrive at work one morning you learn an anonymous tip was left on the hotline that alleges fraud involving the division manager. “Pat’s significant other is a fraudulent vendor,” was the anonymous tip left on your company’s fraud hotline. Pat is a division manager at your company. “Wow. I can’t believe this guy is so blatant,” you are thinking as you review some accounts payable invoices while following up on this anonymous tip. A quick search of the AP file reveals a total of three invoices like the one, all for identical amounts but on different dates. The division manager, Pat, has the authority to approve payment of invoices for less than $10,000. It is obvious to you that the manager has…arrow_forwardWhat was evolutionary about laws such as GLBA and FACTA? What do organizations need to consider to be compliant with GLBA and FACTA? What is the impact of crimes such as identity theft? How do different jurisdictions (federal, state, or international) deal with financial crimes such as identity theft? Site at least one example.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubCollege Accounting (Book Only): A Career ApproachAccountingISBN:9781305084087Author:Cathy J. ScottPublisher:Cengage Learning
- College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781305084087
Author:Cathy J. Scott
Publisher:Cengage Learning
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub