Fraud Examination
5th Edition
ISBN: 9781305079144
Author: W. Steve Albrecht, Chad O. Albrecht, Conan C. Albrecht, Mark F. Zimbelman
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 14MCQ
To determine
The most common symptom of a fraudulent letter is.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Curtis, a maintenance supervisor, submitted maintenance invoices from a phony repair company and received the checks at a post office box. This should have been prevented bya. Comparison of the company name to the approved vendor list by the check signer.b. Recognition of the excess maintenance costs by Curtis’s supervisor.c. Refusal by the purchasing department to approve the vendor.d. All of the above.
Two very common ways that employees commit fraud against their employers is the misstatement of reimbursable expense accounts and the misuse of office supplies for personal purposes. Although these schemes are usually not individually significant, their magnitude can be damaging if these practices are widespread. Please comment on these types of fraud (and other examples of employee fraud) and what internal controls they would put in place in an organization to curb this activity.
John Doe, a fraud examiner, has been hired by ABC Corporation to investigate a shortage of cash, which management thinks is being caused by fraudulent behavior. John Doe could spend his time and money pursuing witnesses to the crime or collecting documents that would confirm fraudulent activities. As with most fraud examiners, he chooses to collect supporting documents instead of pursuing witnesses. Explain why John and most other fraud examiners prefer documents over witnesses; then describe elements of good document care.
Chapter 5 Solutions
Fraud Examination
Ch. 5 - Prob. 1DQCh. 5 - Prob. 2DQCh. 5 - 3. What are accounting symptoms
Ch. 5 - Prob. 4DQCh. 5 - Prob. 5DQCh. 5 - Prob. 6DQCh. 5 - Prob. 7DQCh. 5 - Prob. 8DQCh. 5 - Prob. 9DQCh. 5 - Prob. 10DQ
Ch. 5 - Prob. 11DQCh. 5 - Prob. 1TFCh. 5 - Prob. 2TFCh. 5 - Prob. 3TFCh. 5 - Prob. 4TFCh. 5 - Prob. 5TFCh. 5 - Prob. 6TFCh. 5 - Prob. 7TFCh. 5 - Prob. 8TFCh. 5 - Prob. 9TFCh. 5 - Prob. 10TFCh. 5 - Prob. 11TFCh. 5 - Prob. 12TFCh. 5 - Prob. 13TFCh. 5 - Prob. 14TFCh. 5 - Prob. 15TFCh. 5 - Prob. 16TFCh. 5 - Prob. 17TFCh. 5 - Prob. 18TFCh. 5 - Prob. 19TFCh. 5 - Prob. 20TFCh. 5 - Prob. 21TFCh. 5 - Prob. 22TFCh. 5 - Prob. 23TFCh. 5 - Prob. 24TFCh. 5 - Prob. 1MCQCh. 5 - Prob. 2MCQCh. 5 - Prob. 3MCQCh. 5 - Prob. 4MCQCh. 5 - Prob. 5MCQCh. 5 - Prob. 6MCQCh. 5 - Prob. 7MCQCh. 5 - Prob. 8MCQCh. 5 - Prob. 9MCQCh. 5 - Prob. 10MCQCh. 5 - Prob. 11MCQCh. 5 - Prob. 12MCQCh. 5 - Prob. 13MCQCh. 5 - Prob. 14MCQCh. 5 - Prob. 15MCQCh. 5 - 16. Which of the following is a common fraud...Ch. 5 - Prob. 17MCQCh. 5 - Cal Smith Jr. is the night manager at a local...
Knowledge Booster
Similar questions
- What internal control or procedure(s) would provide protection against the following threats? A company is late in paying a particular invoice. Consequently, a second invoice is sent, which crosses the first invoice’s payment in the mail. The second invoice is submitted for processing and also paid. A clerical employee obtains a blank check and writes a large amount payable to a fictitious company. The employee then cashes the check A fictitious invoice is received and a check is issued to pay for goods that were never ordered or delivered A purchasing agent adds a new record to the supplier master file. The company does not exist. Subsequently, the purchasing agent submits invoices from the fake company for various cleaning services. The invoices are paid. Cash disbursement department updates account payable once payment is due.arrow_forwardWhich of the following is NOT an example of an opportunity to commit fraud in the accounting information system? a. The need to sell confidential information from the database for cash to pay for his medical bills b. User names and passwords of most employees are stored in a shared Google document file c. The employee's discovery that passwords are not required to enter any modules in the accounting information system d. Supervisors are not required to approve transactions entered into by their staff in the accounting systemarrow_forwardProvide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?arrow_forward
- 1. How may an employee embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of functions and authorization controls were not in place? Please asnwer this. thank youuuarrow_forwardAllison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.arrow_forwardA purchasing agent for a home improvement center is also part owner in a wholesale lumber company. The agent has sole discretion in selecting vendors for the lumber sold through the center. The agent directs a disproportionate number of purchase orders to his company, which charges above-market prices for its products. The agent’s financial interest in the supplier is unknown to his employer.What type of fraud is this and what controls can be implemented to prevent or detect the fraud?arrow_forward
- A procurement agent for a large metropolitan building authority threatens to blacklist a building contractor if he does not make a financial payment to the agent. If the contractor does not cooperate, the contractor will be denied future work. Faced with a threat of economic loss, the contractor makes the payment.Required;Explain what type of fraud is this and what controls can be implemented to prevent or detect the fraud?arrow_forwardWhich of the following is true in the case of forgery? Forgery does not include anything done by typing or word-processing. If a person signs his own check for $100 cash, knowing that there is only $50 in the account, and manages to cash it, the check is a forgery. The "forged instrument" must in some way be false, as in a false signature, a backdating of an existing instrument, or falsely modifying a corporate name. Forgery can be committed only by forging signatures. Alteration of an already existing document does not constitute forgery.arrow_forwardAll-Around Sound Co. discovered a fraud whereby one of its front office administrative employees used company funds to purchase goods such as computers, digital cameras, and other electronic items for her own use. The fraud was discovered when employees noticed an increase in the frequency of deliveries from vendors and the use of unusual vendors. After some investigation, it was discovered that the employee would alter thedescription or change the quantity on an invoice in order to explain the cost on the bill.What general internal control weaknesses contributed to this fraud?arrow_forward
- Is the following a potential control weakness? In employing new staff, while Marco checks references for any prospective employee, they do not check criminal records or perform other forms of background checks. Briefly explain the potential mistatement and recommended correction.arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardAuthorization of transactions is a key control in most organizations. Authorizations should not be made by individuals who have incompatible functions. For each transaction (listed as A through I), indicate the individual or function (e.g., the head of a particular department) that should have the ability to authorize that transaction. Briefly provide a rationale for your answer. a. Writing off old accounts receivable. B. Committing the organization to acquire another company that is half the size of the existing company. C. Paying an employee for overtime. D. Shipping goods on account to a new customer. E. Purchasing goods from a new vendor. F. Temporarily investing funds in common stock investments instead of money market funds. G. Purchasing a new line of manufacturing equipment to remodel a production line at one of the company’s major divisions (the purchase represents a major new investment for the organization). H. Replacing an older machine at one of the company’s major divisions. I. Rewriting the company’s major computer program for processing purchase orders and accounts payable (the cost of rewriting the program will represent one quarter of the organization’s computer development budget for the year).arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningFinancial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,