DIGITAL FRAUD In a financial fraud case, city employees in Brooklyn, New York, accessed digital databases to defraud the city of $20 million. Several employees, in collusion with the former deputy tax collector, completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills. Required Discuss the control techniques that could present or detect this fraud.

BuyFind

Accounting Information Systems

10th Edition
Hall + 1 other
Publisher: Cengage Learning,
ISBN: 9781337619202
BuyFind

Accounting Information Systems

10th Edition
Hall + 1 other
Publisher: Cengage Learning,
ISBN: 9781337619202

Solutions

Chapter
Section
Chapter 12, Problem 8P
Textbook Problem

DIGITAL FRAUD

In a financial fraud case, city employees in Brooklyn, New York, accessed digital databases to defraud the city of $20 million. Several employees, in collusion with the former deputy tax collector, completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills.

Required

Discuss the control techniques that could present or detect this fraud.

Expert Solution

Want to see the full answer?

Check out a sample textbook solution.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times vary by subject and question complexity. Median response time is 34 minutes and may be longer for new subjects.

Chapter 12 Solutions

Accounting Information Systems
Ch. 12 - What is a cookie?Ch. 12 - What is network virtualization?Ch. 12 - Who are the three parties in a smurf attack?Ch. 12 - What is a ping, and how does it work?Ch. 12 - What is a seal of assurance?Ch. 12 - What is a VAN?Ch. 12 - What is a LAN?Ch. 12 - What is a WAN?Ch. 12 - What is a server?Ch. 12 - What are the three classes of cloud computing...Ch. 12 - What is Software-as-a-Service (SaaS)?Ch. 12 - Give two advantages of Infrastructure-as-a-Service...Ch. 12 - What is OSI?Ch. 12 - What purpose do protocols serve?Ch. 12 - Explain the purpose of the two elements of TCP/IP.Ch. 12 - Distinguish between the FTP and TELNET protocols.Ch. 12 - Discuss the three levels of Internet business...Ch. 12 - What is a dynamic virtual organization?Ch. 12 - Give two differences between ASP and SaaS.Ch. 12 - Why is cloud computing not the best option for all...Ch. 12 - What are cookies, and why are they used?Ch. 12 - What security concerns pertain to cookies?Ch. 12 - How does IP spoofing support Internet crime?Ch. 12 - Describe a distributed denial of service (DDoS)...Ch. 12 - What is a digital envelope?Ch. 12 - What is a digital signature?Ch. 12 - What is a digital certificate? How is it different...Ch. 12 - Distinguish between a network-level firewall and...Ch. 12 - What is a certification authority, and what are...Ch. 12 - Discuss the key aspects of the following five...Ch. 12 - Differentiate between a LAN and a WAN. Do you have...Ch. 12 - Explain the purpose of each of the layers in the...Ch. 12 - A DDoS attack a. is more intensive than a DoS...Ch. 12 - A digital signature a. is the encrypted...Ch. 12 - Which of the following statements is correct? a. A...Ch. 12 - Which of the following statements about cookies is...Ch. 12 - A message that is contrived to appear to be coming...Ch. 12 - Which of the following statements is correct? a....Ch. 12 - A Ping signal is a. used to perpetrate URL...Ch. 12 - A system of computers that connects the internal...Ch. 12 - The client-server model a. is most effective when...Ch. 12 - Which statement about Sniffer software is true? a....Ch. 12 - ENCRYPTION The coded message that follows is an...Ch. 12 - CERTIFICATION AUTHORITY LICENSING Research the...Ch. 12 - CLOUD COMPUTING Write an essay on the relative...Ch. 12 - The purchase order for one firm is the source...Ch. 12 - VIRTUALIZATION Virtualization technology is...Ch. 12 - DIGITAL FRAUD In a financial fraud case, city...

Additional Business Textbook Solutions

Find more solutions based on key concepts
List and explain the three kinds of pricing methods.

Foundations of Business (MindTap Course List)

What does the invisible hand of the marketplace do?

Principles of Microeconomics (MindTap Course List)

Post the following entry to the general ledger and subsidiary ledger.

College Accounting (Book Only): A Career Approach

What is the difference between contribution margin and segment margin?

Managerial Accounting: The Cornerstone of Business Decision-Making

NPV A project has annual cash flows of 7,500 for the next 10 years and then 10,000 each year for the following ...

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)