EBK AUDITING AND ASSURANCE SERVICES
16th Edition
ISBN: 9780134067117
Author: Hogan
Publisher: VST
expand_more
expand_more
format_list_bulleted
Question
Chapter 18, Problem 22DQP
a.
To determine
Identify the nature of the internal controls over the purchasing function in the agency that provided the opportunity for fraud to occur and state the incentives of the purchasing department to commit fraud.
b.
To determine
Explain the manner in which the data analytics tools be used to detect fraud in the purchasing function.
c.
To determine
Explain the three analyses a fraud examiner can perform to detect fraud related to a particular vendor.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
You are a fraud examiner and have been hired by Blackman Company to carry out an investigation. Blackman is a beverage company that has experienced increased shipments of beverages but no increase in revenue. Management suspects that inventory is being shipped to unknown places or is being stolen.How would you use invigilation to help you determine whether inventory is being stolen or shipped to unknown locations? Briefly explain how you would carry out this investigative procedure.
Some of the largest business frauds ever perpetrated have involved the misstatement of inventory. Two classics were at Leslie Fay and McKesson Corporation. Feel free to check them out to get a feel for the impact that it has. There is considerable information regarding inventory frauds available on the Internet. Search for information about another instance of inventory fraud at any other company, and prepare an explanation of the nature of the inventory fraud.
a) Internal controls play an important role in reducing the risks of fraudulent activities in any
organization. Further, advanced technology helps accountants in reducing fraud. Explain
how an advanced technology transaction processing system reduces fraudulent activities
from any organizing.
b) Refer to the given system flowchart, and we have discussed the control weakness and the
risk associated with these control weaknesses. Based on these control weaknesses and
the associated risk, what types of frauds are possible in this business environment.
Sales Department
Accounting Department
Warehouse
Shipping Department
Slock
Release
Packing
Packing
Customer
Sales
Order
Release
Packing
Customer
Order
Reconcle
Packing sip and
Sales order, send
Camier
Record in Shipping
AR Sub
Ledge
Pick Goods
Update
Inventory
send goods
Shipping
Bi Customer
Approves
cred, prepare
Update
Accounts
Inventory
Sub ledger
Sales
documents
Shipping
Log
AR
Control
Sales
Order
Stock
Release
Packing
Sip
Sales
Stock…
Chapter 18 Solutions
EBK AUDITING AND ASSURANCE SERVICES
Ch. 18 - List five asset accounts, three liability...Ch. 18 - Prob. 2DQPCh. 18 - Prob. 3DQPCh. 18 - Prob. 4DQPCh. 18 - Prob. 5DQPCh. 18 - Prob. 6DQPCh. 18 - Prob. 7DQPCh. 18 - Prob. 8DQPCh. 18 - Prob. 9DQPCh. 18 - Prob. 10DQP
Ch. 18 - Prob. 11DQPCh. 18 - Prob. 13DQPCh. 18 - Prob. 14DQPCh. 18 - Prob. 15DQPCh. 18 - Prob. 16.1MCQCh. 18 - Prob. 16.2MCQCh. 18 - Prob. 16.3MCQCh. 18 - Prob. 17.1MCQCh. 18 - Prob. 17.2MCQCh. 18 - Prob. 17.3MCQCh. 18 - Prob. 17.4MCQCh. 18 - Prob. 18.3MCQCh. 18 - Prob. 18.1MCQCh. 18 - Prob. 18.2MCQCh. 18 - Prob. 19DQPCh. 18 - Prob. 20DQPCh. 18 - Prob. 21DQPCh. 18 - Prob. 22DQPCh. 18 - Prob. 23DQPCh. 18 - The following misstatements are included in the...Ch. 18 - Prob. 25DQPCh. 18 - Prob. 26DQPCh. 18 - Prob. 27DQPCh. 18 - Prob. 28DQPCh. 18 - Prob. 29DQPCh. 18 - Prob. 30C
Knowledge Booster
Similar questions
- Your boss knows that you are taking a fraud examina- tion course at a local university. He is interested in learning more about data-driven fraud detection and asks you to prepare a short memo briefly explaining data-driven fraud detection methods and techniques. 1. List three data analysis methods and techniques and briefly explain them.arrow_forwardThe impact of weak internal controls can affect an employee’s fraud behavior. The role of information technology (IT) controls facilitate and help detect fraud. Design a method from the accounting information system (AIS) readings to help eliminate such employee fraud activity. Chapter 3 in your textbook discusses the need for a code of ethics and internal controls.arrow_forwardThe following scenarios are taken from actual fraud cases. For each scenario, categorize as primarily indicating (A) An incentive to commit fraud (B) An opportunity to commit fraud or (C) a rationalization for committing fraud. State your reason for your answer in each scenario. 1. Top management of the company closely guards internal financial information, to the extent that even some employees on a "need to know basis" are denied full access.arrow_forward
- A multimediacourse graduate used design software to create paychecks that lookedidentical to those of a company in his town.The paychecks were deposited electronically into ofhis friends’ accounts. What type of fraud did hecommit? Select one: a. output fraud. b. input fraud. c. computer instruction fraud. d. processor fraud.arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardExplain one gap the company has in internal control procedures in which fraud or errors could occur? What can the company do to prevent or detect this fraud or error? In your own words, explain the importance of internal control procedures.arrow_forward
- The given system flowchart elaborates the business activities involved in different departments, including (1) Sales Department, (2) Accounting Department, (3) Warehouse, (4) Shipping Department, and (5) Billing Department. The bottom part of this Figure indicates that the Sales Department sends the sales invoice to the Billing Department. Here, it is assumed that this sales invoice only contains non-financial information. What types of frauds are possible in this business environment? (long answers)arrow_forwardWrite a one-page memo analyzing the relationship between fraud and internal controls. Explain the principles underlying these approaches. Include a note on the limitations of internal controls.arrow_forwardInternal controls are critical for any organization's risk of fraudulent activity. Additionally, new technology assists accountants in minimizing fraud. Demonstrate how an advanced technology transaction processing system may help any organization minimize fraudulent activity.arrow_forward
- The company XYZ suffers from numerous weaknesses in its internal control system. For each the below situations, you are required to identify the anomaly/risk related to this system and propose eventual solutions. The financial department issues one copy of the sales bill that is shipped to the customer with the company The inventory custodian is the person who deliver the merchandise to the The person who keep the checks (issued and received) is the same who have access to the company accounting system. A has now 9 years experience in the company. He is responsible to keep cash and checks. Since he joining XYZ , he has not claim any vacation. The financial manager prepares the checks for the company suppliers and receive the merchandises ordered by the The company XYZ has recently installed an ERP system to manage all its activities . Different staff have access to this system. Mr X is working…arrow_forwardImagine that you have been hired to audit the sales and collections of a medium-to-large merchandising company. Suggest at least two ways that management could manipulate earnings and make specific recommendations for the internal control procedure to prevent or detect the transaction.arrow_forwardAllison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub