Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 11P
a.
To determine
Determine the controls weaknesses that allowed Mr. J to carry out the frauds.
b.
To determine
Determine the controls to reduce the risk fraud.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in lectures network risks and auditing could you use to help detect this type of fraud?
All-Around Sound Co. discovered a fraud whereby one of its front office administrative employees used company funds to purchase goods such as computers, digital cameras, and other electronic items for her own use. The fraud was discovered when employees noticed an increase in the frequency of deliveries from vendors and the use of unusual vendors. After some investigation, it was discovered that the employee would alter thedescription or change the quantity on an invoice in order to explain the cost on the bill.What general internal control weaknesses contributed to this fraud?
Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 PM unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in this chapter could you use to help detect this type of fraud?
Chapter 15 Solutions
Accounting Information Systems
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Explain discretionary access privileges.Ch. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - What is a vaccine, and what are its limitations?Ch. 15 - Prob. 10RQ
Ch. 15 - Prob. 11RQCh. 15 - What are the risks from equipment failure?Ch. 15 - Prob. 13RQCh. 15 - Prob. 14RQCh. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Prob. 12DQCh. 15 - Prob. 13DQCh. 15 - End-user computing has become extremely popular in...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Prob. 24DQCh. 15 - Prob. 25DQCh. 15 - Describe a digest within the context of a digital...Ch. 15 - What is a digital envelope?Ch. 15 - Prob. 28DQCh. 15 - Prob. 29DQCh. 15 - Prob. 30DQCh. 15 - Prob. 31DQCh. 15 - Discuss the unique control problems EDI creates.Ch. 15 - Prob. 33DQCh. 15 - Prob. 34DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 7PCh. 15 - Prob. 8PCh. 15 - Better Business Company (BBC) is in the process of...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- What internal control or procedure(s) would provide protection against the following threats? An employee makes a credit sale to a customer who is already four months behind in making payments on his account. An employee writes off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer Customers are billed for the quantity ordered, but the quantity shipped is actually less because some items have been back ordered. The mailroom clerk steals checks and then endorses them for deposit into the clerk’s personal bank account Goods are shipped to a customer, but that customer is not billed.arrow_forwardThe following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate customers who have a right to the data. An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password. An organization’s top salesman uses a consumer-grade instant messaging (IM) client (e.g., AOL Instant Messaging). Such clients bypass antivirus and spam software, don’t have auditing and logging capabilities, and allow users to choose their IM names. A financial analyst’s laptop was stolen from his car. The laptop contained the names and social security numbers of…arrow_forwardAt 12 o’clock, when the plant whistle sounded, George Jones, an assistant auditor, had been working on his laptop computer. Jones stopped work immediately, but not wanting to waste a lot of time, he simply closed his laptop. He then departed for lunch. The auditor-in-charge, who had been observing what was going on, was critical of the assistant’s actions. What do you think was the basis for criticism by the auditor-in-charge?arrow_forward
- Is the following a potential control weakness? In employing new staff, while Marco checks references for any prospective employee, they do not check criminal records or perform other forms of background checks. Briefly explain the potential mistatement and recommended correction.arrow_forwardGiven the information below, Marco only issues accounts and passwords to employees with jobs requiring computer data entry or access to file information and reports. Passwords are required to enter the system. Access is limited such that employees only have access to the information they need to perform their duties. Access is also limited in nature such that some employees who do not have the authority to enter data have read-only access while those whose jobs require data entry have both read and write access. Normal access to the files takes place via the software, which subjects any input to various logical and numerical tests. What is the: a) potential control strength and (b) potential mistatement detected or corrected.arrow_forwardIs it an entity inherent risk for the information below? A computer network and personal computers support Marco Inc's accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. If it is an inherent risk, what is the feature of the firm that will possibly affect inherent risk and explain how and why; that is whether it increases or decreases inherent risk. Please address a specific risk to the accuracy of the financial statements with the "how" and whether…arrow_forward
- Centurion Homes of Calgary, Alberta, builds houses and has four construction crews. The supervisors hire and terminate workers and keep their hourly records. Each Friday morning, the supervisors telephone their workers’ hours to the home office, where accountants prepare the weekly pay cheques. Around noon, the supervisors pick up the pay cheques. They return to the construction site and pay the workers at day’s end. What is the internal control weakness in this situation? Propose a way to improve the internal controls.arrow_forwardWhat internal control or procedure(s) would provide protection against the following threats? A company is late in paying a particular invoice. Consequently, a second invoice is sent, which crosses the first invoice’s payment in the mail. The second invoice is submitted for processing and also paid. A clerical employee obtains a blank check and writes a large amount payable to a fictitious company. The employee then cashes the check A fictitious invoice is received and a check is issued to pay for goods that were never ordered or delivered A purchasing agent adds a new record to the supplier master file. The company does not exist. Subsequently, the purchasing agent submits invoices from the fake company for various cleaning services. The invoices are paid. Cash disbursement department updates account payable once payment is due.arrow_forwardPlease read the following and identify any internal control principles that may be violated in the Jane Hardware store.(identify what could go wrong and what controls Jane Hardware should put in place to prevent it) Jerry Finch has worked for Jane Hardware for many years, Jerry has been a model employee. He has not taken a vacation in over three years, always stating that work was too important. One of Jerry's primary jobs at the store is to open mail and list the checks received. He also collects cash from customers at the store's outdoor nursery area. There are times that things are so hectic that Jerry does not bother to use the register, simply making change from cash he carries with him. When things slow down at the store Jerry often offers to help Cindy(the Accounting Clerk) post payments to the customer's accounts receivable ledger. Cindy is always happy to receive help since she is also quite busy and because Jerry is such a careful worker.arrow_forward
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (a) An employee’s laptop was stolen at the airport. The laptop contained personally identifying information about the company’s customers that could potentially be used to commit identity theft.arrow_forwardThe flowchart labeled Problem 14 depicts the responsibilities of an accounting clerk in a small company. Required Identify any control problems in the system. What sorts of fraud are possible in this system?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L