Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 8P
To determine
Explain the techniques which are used to prevent or detect the fraud.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
8. DIGITAL FRAUD In a financial fraud case, city employees in Brooklyn, New York, accessed digital databases to defraud the city of $20 million. Several employees, in collusion with the former deputy tax collector, completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills.
Required Discuss the control techniques that could prevent or detect this fraud.
In a financial fraud case, city employees in Brooklyn, New York, accessed digital databases to defraud the city of $20 million. Several employees, in collusion with the former deputy tax collector, completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills.
Required
Discuss the control techniques that could prevent or detect this fraud.
In a recent financial fraud case, city employees in Brooklyn, New York, accessed electronic databases to defraud the city of $20 million. Several employees in collusion with the former deputy tax collector completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills. Required Discuss the control techniques that could prevent or detect this fraud.
Chapter 12 Solutions
Accounting Information Systems
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 21RQCh. 12 - Prob. 22RQCh. 12 - Prob. 23RQCh. 12 - Prob. 1DQCh. 12 - Prob. 2DQCh. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 8DQCh. 12 - Prob. 9DQCh. 12 - Prob. 10DQCh. 12 - Prob. 11DQCh. 12 - What is a digital envelope?Ch. 12 - Prob. 13DQCh. 12 - Prob. 14DQCh. 12 - Prob. 15DQCh. 12 - Prob. 16DQCh. 12 - Prob. 17DQCh. 12 - Prob. 18DQCh. 12 - Prob. 19DQCh. 12 - Prob. 1MCQCh. 12 - Prob. 2MCQCh. 12 - Prob. 3MCQCh. 12 - Prob. 4MCQCh. 12 - Prob. 5MCQCh. 12 - Prob. 6MCQCh. 12 - Prob. 7MCQCh. 12 - A system of computers that connects the internal...Ch. 12 - Prob. 9MCQCh. 12 - Prob. 10MCQCh. 12 - Prob. 1PCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6PCh. 12 - VIRTUALIZATION Virtualization technology is...Ch. 12 - Prob. 8P
Knowledge Booster
Similar questions
- In the Why It Matters feature “Examples of Theft and FinancialReporting Frauds” at the beginning of the chapter, we introduced youto the Koss Corporation fraud. In this problem, we provide you withfurther details about that fraud. During the fall of 2009, Koss Corporation,a Wisconsin-based manufacturer of stereo headphone equipment,revealed that its vice president of finance (Sujata “Sue” Sachdeva) haddefrauded the company of approximately $31 million over a periodof at least five years. Grant Thornton LLP was the company’s auditor,and the firm issued unqualified audit opinions for the entire period in which they worked for Koss. According to reports, Sachdeva’s theftaccelerated over a period of years as follows:FY 2005 $2,195,477FY 2006 $2,227,669FY 2007 $3,160,310FY 2008 $5,040,968FY 2009 $8,485,937Q1 FY 2010 $5,326,305Q2 FY 2010 $4,917,005To give you a sense of the magnitude of the fraud, annual revenuesfor Koss Corporation are in the range of $40 to $45 million…arrow_forwardMatch each situation with the fraud triangle factor (opportunity, financial pressure, or rationalization) that best describes it. (a). An employee has check-writing and -signing responsibilities for a small company, and is also responsible for reconciling the bank account. (b) An employee earns minimum wage at a firm that has reported record earnings for each of the last five years. (c) An employee has an expensive gambling habit. (d) An employee's monthly credit card payments are nearly 75% of her monthly earningsarrow_forwardInvestigating Financial Statement fraud Becker Fischer (BF) is a medium-sized construction company operating out of the eastern suburbs of Melbourne. BF operates out of a single building of about 500,000 square feet and has recently secured a government contract to build and maintain local council infrastructure. BF accounts for these and other similar projects, using the percentage completion method. They have other work they bill using the completed contracts method. A recent tip-off to the council suggests that Becker Fischer may be engaging in fraudulent financial reporting, so the council have engaged your expert forensic accounting services to investigate on their behalf. T he following financial information is provided: Required: a. Perform horizontal analysis on the data in the table above, and identify five accounts that you consider to be particularly questionable. Show all workings. b. For each of the five accounts you identified in part 'a', explain with discussion…arrow_forward
- Internal Controls An employee of JHT Co., a private trucking company, was responsible for resolving roadway accident claims under $25,000. The employee created fake accident claims and wrote settlement checks between $5,000 and $25,000 to friends or acquaintances acting as phony “victims.” One friend recruited subordinates at his place of business to cash some of the checks. In addition, the JHT employee also recruited lawyers, who he paid to represent both the trucking company and the fake victims in the bogus accident settlements. When the lawyers cashed the checks, they allegedly split the money with the corrupt JHT employee. This fraud went undetected for two years. Please answer the following questions: What weaknesses in internal control contributed to this fraud? Why would it take so long to discover such a fraud? What control procedures should be changed to prevent such fraud?arrow_forwardInternal Controls An employee of JHT Co., a private trucking company, was responsible for resolving roadway accident claims under $25,000. The employee created fake accident claims and wrote settlement checks between $5,000 and $25,000 to friends or acquaintances acting as phony “victims.” One friend recruited subordinates at his place of business to cash some of the checks. In addition, the JHT employee also recruited lawyers, who he paid to represent both the trucking company and the fake victims in the bogus accident settlements. When the lawyers cashed the checks, they allegedly split the money with the corrupt JHT employee. This fraud went undetected for two years. Please answer the following question: What control procedures should be changed to prevent such fraud?arrow_forwardThe U.S. General Accounting Office (GAO) Office of Special Investigations was responsible for investigating a potential purchase fraud case. The man who allegedly committed the fraud was Mark J. Krenik, a former civilian employee of the U.S. Air Force. Mr. Krenik was the Air Force's technical representative on contracts with Hughes STX. Hughes STX provided hardware, software maintenance, technical support, and training to the Air Force. Part of Mr. Krenik's alleged fraud included opening accounts under his control at banks in Maryland. The accounts were opened under the names Hughes STX and ST Systems Corporation. A section of the GAO report on this fraud investigation reads as follows: On December 15, 1992, Mr. Krenik opened post office box 215 in Vienna, Virginia, in his own name. On December 24, 1992, Mr. Krenik delivered to the Air Force Finance Office 11 bogus invoices totaling $504,941.19. Accompanying the invoices were the respective DD‐250s, on which Mr. Krenik had falsely…arrow_forward
- All-Around Sound Co. discovered a fraud whereby one of its front office administrative employees used company funds to purchase goods such as computers, digital cameras, and other electronic items for her own use. The fraud was discovered when employees noticed an increase in the frequency of deliveries from vendors and the use of unusual vendors. After some investigation, it was discovered that the employee would alter thedescription or change the quantity on an invoice in order to explain the cost on the bill.What general internal control weaknesses contributed to this fraud?arrow_forwardNino Moscardi, president of Greater Providence Deposit & Trust (GPD&T), received an anonymous note in his mail stating that a bank employee was making bogus loans. Moscardi asked the bank’s internal auditors to investigate the transactions detailed in the note. The investigation led to James Guisti, manager of a North Providence branch office and a trusted 14-year employee who had once worked as one of the bank’s internal auditors. Guisti was charged with embezzling $1.83 million from the bank using 67 phony loans taken out over a three-year period. Court documents revealed that the bogus loans were 90-day notes requiring no collateral and ranging in amount from $10,000 to $63,500. Guisti originated the loans; when each one matured, he would take out a new loan, or rewrite the old one, to pay the principal and interest due. Some loans had been rewritten five or six times. The 67 loans were taken out by Guisti in five names, including his wife’s maiden name, his father’s name,…arrow_forwardHannaford is a national grocery chain whose electronic payment processing system was breached by hackers as early as December 7, 2007. The hackers stole up to 4.2 million credit and debit card numbers, expiration dates, and security codes, but did not steal customer names. On February 27, 2008, Visa Inc. notified Hannaford that Hannaford’s system had been breached. Hannaford discovered the means of access on March 8, 2008, and contained the breach on March 10, 2008. Hannaford gave notice to certain financial institutions on March 10, 2008. On March 17, 2008, “Hannaford publicly announced for the first time that between December 7, 2007 and March 10, 2008, the security of its information technology systems had been breached, leading to the theft of as many as 4.2 million debit card and credit card numbers belonging to individuals who had made purchases at more than 270 of its stores.” It also announced “that it had already received reports of approximately 1,800 cases of fraud resulting…arrow_forward
- May 13th, 1998, a Friday that will be remembered by a major Chicago bank. Embezzlers nearly escaped with $69 million! Arnand Moore, who was released after serving for years of his 11 years sentence for a $180,000 fraud, decided it was time to put his fingers and is something a little bigger and better. He instigated a $68.7 million fraud plan. Naming himself as “Chairman,” he assembled Herschel Bailey, Otis Wilson, Neal Jackson, Leonard Strickland, and Ronald Carson to complete the formation of his “board.” Most importantly, the “board” was able to convince an employee of the Chicago bank to provide their “in.” the caper required one month of planning in a small hotel in Chicago and took all of 64 minutes to complete. The bank employee had worked for the Chicago bank for eight years, and he was employed in the bank's wire transfer section, which dispatches multimillion dollar sums around the world via computers and phone lines. Some of the bank's largest customers send funds from…arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardInternal Controls One of the largest losses in history from unauthorized securities trading involved a securities trader for the French bank, Societe Generale. The trader was able to circumvent internal controls and create more than $7 billion in trading losses in six months. The trader apparently escaped detection by using knowledge of the bank's internal control systems learned from a previous back-office monitoring job. Much of this monitoring involved the use of software to monitor trades. In addition, traders were usually kept to tight trading limits. Apparently, these controls failed in this case. Answer the following True or False questions about Societe Generale's internal controls. These will assist you in determining the weaknesses. 1. The loss could have been avoided with a number of internal controls. 2. Required vacation time may have alerted managers to the hidden losses. 3. If traders have access to the monitoring software, then the separation of duties control is…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning