Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 3, Problem 23DQ
To determine
Explain about the finding of ACFE that says that adult males with advanced degrees commit a disproportionate amount of fraud.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
A profile fraud of perpetrators prepared by the Association of Certified Fraud Examiners revealed that adult males with advanced degrees commit a disproportionate amount of fraud. Explain this finding.
A profile fraud of perpetrators prepared by the Association of Certified Fraud Examiners revealed that adult males with advanced degrees commit a disproportionate amount of fraud. Briefly explain this finding.
Baker is an auditor for ABC Company. As part of a proactive fraud audit, Baker runs the following tests: (1) a review of the Sales Register for dormant customer accounts that posted a sale within the last two months; and (2) a comparison of the Sales Register and the Shipment Register for shipping documents that have no associated sales order. Taken together, what type of non-cash scheme is Baker most likely to find with these tests? Explain how each one might identify fraud.
Chapter 3 Solutions
Accounting Information Systems
Ch. 3 - What is ethics?Ch. 3 - Prob. 2RQCh. 3 - Prob. 3RQCh. 3 - Prob. 4RQCh. 3 - What are the three ethical principles that may...Ch. 3 - What is computer ethics?Ch. 3 - Prob. 7RQCh. 3 - Prob. 8RQCh. 3 - What are the computer ethical issues regarding...Ch. 3 - What are the computer ethical issues regarding...
Ch. 3 - What are the computer ethical issues regarding...Ch. 3 - Prob. 12RQCh. 3 - What are the computer ethical issues regarding the...Ch. 3 - Prob. 14RQCh. 3 - Prob. 15RQCh. 3 - What are the computer ethical issues regarding...Ch. 3 - Prob. 17RQCh. 3 - Prob. 18RQCh. 3 - Name the three fraud-motivating forces.Ch. 3 - Prob. 20RQCh. 3 - Prob. 21RQCh. 3 - Prob. 22RQCh. 3 - Prob. 23RQCh. 3 - What is lapping?Ch. 3 - Prob. 25RQCh. 3 - What is bribery?Ch. 3 - What is economic extortion?Ch. 3 - Prob. 28RQCh. 3 - Define check tampering.Ch. 3 - What is billing (or vendor) fraud?Ch. 3 - Prob. 31RQCh. 3 - Prob. 32RQCh. 3 - Prob. 33RQCh. 3 - Prob. 34RQCh. 3 - Prob. 35RQCh. 3 - Prob. 36RQCh. 3 - Prob. 37RQCh. 3 - Prob. 38RQCh. 3 - Prob. 39RQCh. 3 - Prob. 40RQCh. 3 - Prob. 41RQCh. 3 - Give one example of an error that a check digit...Ch. 3 - Prob. 43RQCh. 3 - Prob. 44RQCh. 3 - What is the objective of a transaction log?Ch. 3 - Prob. 46RQCh. 3 - Prob. 47RQCh. 3 - Prob. 48RQCh. 3 - Prob. 49RQCh. 3 - Prob. 50RQCh. 3 - Distinguish between ethical issues and legal...Ch. 3 - Prob. 2DQCh. 3 - Prob. 3DQCh. 3 - Prob. 4DQCh. 3 - Prob. 5DQCh. 3 - The estimates of losses annually resulting from...Ch. 3 - Prob. 7DQCh. 3 - Prob. 8DQCh. 3 - Prob. 9DQCh. 3 - Prob. 10DQCh. 3 - Prob. 11DQCh. 3 - Prob. 12DQCh. 3 - Prob. 13DQCh. 3 - Prob. 14DQCh. 3 - Distinguish between exposure and risk.Ch. 3 - Prob. 16DQCh. 3 - Prob. 17DQCh. 3 - Prob. 18DQCh. 3 - Prob. 19DQCh. 3 - Prob. 20DQCh. 3 - Prob. 21DQCh. 3 - Prob. 22DQCh. 3 - Prob. 23DQCh. 3 - Prob. 24DQCh. 3 - Prob. 25DQCh. 3 - Prob. 26DQCh. 3 - Prob. 27DQCh. 3 - Prob. 28DQCh. 3 - Explain the problems associated with inappropriate...Ch. 3 - Prob. 30DQCh. 3 - Prob. 31DQCh. 3 - Prob. 32DQCh. 3 - Prob. 33DQCh. 3 - Prob. 34DQCh. 3 - Prob. 35DQCh. 3 - Prob. 36DQCh. 3 - Prob. 37DQCh. 3 - Prob. 1MCQCh. 3 - Prob. 2MCQCh. 3 - Prob. 3MCQCh. 3 - Prob. 4MCQCh. 3 - Prob. 5MCQCh. 3 - Prob. 6MCQCh. 3 - Prob. 7MCQCh. 3 - Prob. 8MCQCh. 3 - Prob. 10MCQCh. 3 - Prob. 12MCQCh. 3 - Which of the following controls would best prevent...Ch. 3 - Prob. 14MCQCh. 3 - Prob. 15MCQCh. 3 - Prob. 16MCQCh. 3 - The fraud scheme that is similar to the concept of...Ch. 3 - Prob. 18MCQCh. 3 - Prob. 19MCQCh. 3 - FRAUD SCHEME - HEALTH INSPECTOR A city health...Ch. 3 - FRAUD SCHEME PURCHASING AGENT A purchasing agent...Ch. 3 - Prob. 3PCh. 3 - Prob. 4PCh. 3 - EXPENSE ACCOUNT FRAUD While auditing the financial...Ch. 3 - Prob. 6PCh. 3 - Prob. 7PCh. 3 - Prob. 8PCh. 3 - Prob. 9PCh. 3 - Prob. 10PCh. 3 - Prob. 11PCh. 3 - Prob. 12PCh. 3 - Prob. 13PCh. 3 - Prob. 14PCh. 3 - Prob. 15PCh. 3 - Prob. 16PCh. 3 - Prob. 17PCh. 3 - Prob. 18PCh. 3 - Prob. 19PCh. 3 - Prob. 20P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- John Wells, CPA, is planning the audit of CVG Services Inc. As a result of his risk assessment procedures, Wells has identified several fraud risks. a. Explain in detail how Wells might respond to risks of material misstatement of the financial statements due to fraud. b. Describe the auditors’ communication responsibilities in situations in which the auditors believe fraud has occurred.arrow_forwardThe following scenarios are taken from actual fraud cases. For each scenario, categorize as primarily indicating (A) An incentive to commit fraud (B) An opportunity to commit fraud or (C) a rationalization for committing fraud. State your reason for your answer in each scenario. 1. Top management of the company closely guards internal financial information, to the extent that even some employees on a "need to know basis" are denied full access.arrow_forwardBased on "The Solitary Auditor" book: Identify specific errors in judgment made by Cason Kellis before, during, and following the fraud brainstorming session and identify the principal implications or consequences of those missteps. (see chapter 4 for more background information)arrow_forward
- John Doe, a fraud examiner, has been hired by ABC Corporation to investigate a shortage of cash, which management thinks is being caused by fraudulent behavior. John Doe could spend his time and money pursuing witnesses to the crime or collecting documents that would confirm fraudulent activities. As with most fraud examiners, he chooses to collect supporting documents instead of pursuing witnesses. Explain why John and most other fraud examiners prefer documents over witnesses; then describe elements of good document care.arrow_forwardSee the "Madoff Securities" case for this question. Professional auditing standards discuss the three key "conditions" that are typically present when a financial fraud occurs and identify a lengthy list of "fraud risk factors." Briefly explain the difference between a fraud "condition" and a "fraud risk factor" and provide examples of each. What fraud conditions and fraud risk factors were apparently present in the Madoff case?arrow_forwardWhat are the most common approaches that perpetrators use to commit fraudulent financial reporting? You are asked to be interviewed by a student newspaper regarding the nature of accounting fraud. The reporter says, “As I understand it, asset misappropriations are more likely to be found are more likely to be found in small organizations, but not in larger organizations. On the other hand, fraudulent financial reporting is more likely to be found in larger organizations.” How would you respond to the reporter’s observation? The fraud triangle identifies incentives, opportunities, and rationalizations as the three elements associated with most frauds. Describe how each of these elements is necessary for fraud to occur.arrow_forward
- The Peregrine financial group fraud Background on the company and type of fraud committed How the detection of the fraud was revealed Two methods of investigation that differs from the actual fraud casearrow_forwardWhich two of the following characterize the work of fraud examiners?a. Analysis of control weaknesses for determination of acceptable fraud risk.b. Analysis of control strengths as a basis for planning other audit procedures.c. Determination of a materiality amount that represents a significant misstatement of the financial statements.d. Consideration of a materiality amount in cumulative terms—that is, becoming large over a number of yearsarrow_forward“Identity theft is often applied to a wide range of crimes, including checking account fraud, counterfeiting, forgery, auto theft using false documentation, trafficking in human beings, and terrorism, most policymakers, and researchers agree that identity theft includes the misuse of another individual’s personal information to commit fraud”. Required: Where does identity theft fraud happen often? Explain any five steps that victims should need to take once identity theft occurs.arrow_forward
- In connection with the examination of financial statements by applying PSA 240 & 300, an independent auditor could be responsible for failure to detect a material fraud if Select one: a. statistical sampling techniques were not used on the audit engagement. b. accountants performing important parts of the work failed to discover a close relationship between the treasurer and the cashier. c. the auditor planned the work in a hasty and inefficient manner. d. the fraud was perpetrated by one client employee, who circumvented the existing internal controls.arrow_forwardWhich of the following is a way to prove that a fraud was intentional? A. Show that the suspect repeatedly engaged in activity of an apparent wrongful nature (pattern evidence). B. Show that the suspect did not personally gain anything from the fraudulent act. C. Show that the suspect had a legitimate motive for their actions at issue. D. Show that the suspects failed to conceal evidence of the fraud.arrow_forwardDiscuss the Enron Fraud Scandal. List and Explain at least 2 methods of investigation that differ from these of the actual fraud case. (assuming you are the investigator)arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning