Survey of Accounting (Accounting I)
8th Edition
ISBN: 9781305961883
Author: Carl Warren
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 5.6E
To determine
Introduction:
Control Procedures within internal control provides reasonable assurance that the objectives laid down by the management will be achieved including prevention of fraud. It includes segregation of duties, rotation of responsibilities, authorizations, verifications and monitoring activities within organization.
To explain:
The reasons for determining the fraud in the trucking company after two years.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Internal Controls
An employee of JHT Co., a private trucking company, was responsible for resolving roadway accident claims under $25,000. The employee created fake accident claims and wrote settlement checks between $5,000 and $25,000 to friends or acquaintances acting as phony “victims.” One friend recruited subordinates at his place of business to cash some of the checks. In addition, the JHT employee also recruited lawyers, who he paid to represent both the trucking company and the fake victims in the bogus accident settlements. When the lawyers cashed the checks, they allegedly split the money with the corrupt JHT employee. This fraud went undetected for two years.
Please answer the following questions:
What weaknesses in internal control contributed to this fraud?
Why would it take so long to discover such a fraud?
What control procedures should be changed to prevent such fraud?
Internal Controls
An employee of JHT Co., a private trucking company, was responsible for resolving roadway accident claims under $25,000. The employee created fake accident claims and wrote settlement checks between $5,000 and $25,000 to friends or acquaintances acting as phony “victims.” One friend recruited subordinates at his place of business to cash some of the checks. In addition, the JHT employee also recruited lawyers, who he paid to represent both the trucking company and the fake victims in the bogus accident settlements. When the lawyers cashed the checks, they allegedly split the money with the corrupt JHT employee. This fraud went undetected for two years.
Please answer the following question:
What control procedures should be changed to prevent such fraud?
An employee of JHT Holdings, Inc., a trucking company, was responsible for resolving roadway accident claims under $25,000. The employee created fake accident claims and wrote settlement checks of between $5,000 and $25,000 to friends or acquaintances acting as phony “victims.” One friend recruited subordinates at his place of work to cash some of the checks. Beyond this, the JHT employee also recruited lawyers, whom hepaid to represent both the trucking company and the fake victims in the bogus accident settlements. When the lawyers cashed the checks, they allegedly split the money with the corrupt JHT employee. This fraud went undetected for two years.Why would it take so long to discover such a fraud?
Chapter 5 Solutions
Survey of Accounting (Accounting I)
Ch. 5 - Prob. 1SEQCh. 5 - Prob. 2SEQCh. 5 - Prob. 3SEQCh. 5 - Adjustments to the company’s records based on the...Ch. 5 - Prob. 5SEQCh. 5 - Prob. 1CDQCh. 5 - Prob. 2CDQCh. 5 - Prob. 3CDQCh. 5 - Prob. 4CDQCh. 5 - Prob. 5CDQ
Ch. 5 - Prob. 6CDQCh. 5 - Prob. 7CDQCh. 5 - Prob. 8CDQCh. 5 - Prob. 9CDQCh. 5 - Assume that Leslie Hunter, accounts payable clerk...Ch. 5 - Prob. 11CDQCh. 5 - The accounting clerk pays all obligations by...Ch. 5 - Prob. 13CDQCh. 5 - Prob. 14CDQCh. 5 - Do items reported as a credit memorandum on the...Ch. 5 - Prob. 16CDQCh. 5 - Prob. 17CDQCh. 5 - Prob. 5.1ECh. 5 - Prob. 5.2ECh. 5 - Prob. 5.3ECh. 5 - Prob. 5.4ECh. 5 - Prob. 5.5ECh. 5 - Prob. 5.6ECh. 5 - Prob. 5.7ECh. 5 - Prob. 5.8ECh. 5 - Prob. 5.9ECh. 5 - Prob. 5.10ECh. 5 - Prob. 5.11ECh. 5 - Prob. 5.12ECh. 5 - Prob. 5.13ECh. 5 - Prob. 5.14ECh. 5 - Prob. 5.15ECh. 5 - Prob. 5.16ECh. 5 - Prob. 5.17ECh. 5 - Prob. 5.18ECh. 5 - Prob. 5.19ECh. 5 - Entries for note collected by bank Accompanying a...Ch. 5 - Prob. 5.21ECh. 5 - Prob. 5.22ECh. 5 - Prob. 5.23ECh. 5 - Prob. 5.24ECh. 5 - Prob. 5.25ECh. 5 - Prob. 5.1PCh. 5 - Prob. 5.2.1PCh. 5 - Prob. 5.2.2PCh. 5 - Prob. 5.3.1PCh. 5 - Prob. 5.3.2PCh. 5 - Prob. 5.4.1PCh. 5 - Prob. 5.4.2PCh. 5 - Prob. 5.4.3PCh. 5 - Prob. 5.4.4PCh. 5 - Prob. 5.1.1MBACh. 5 - Prob. 5.1.2MBACh. 5 - Prob. 5.1.3MBACh. 5 - Prob. 5.1.4MBACh. 5 - Ratio of cash to monthly cash expenses AcelRx...Ch. 5 - Prob. 5.2.1MBACh. 5 - Prob. 5.2.2MBACh. 5 - Ratio of cash to monthly cash expenses Pacira...Ch. 5 - Ratio of cash to monthly cash expenses Pacira...Ch. 5 - Prob. 5.2.5MBACh. 5 - Prob. 5.3.1MBACh. 5 - Prob. 5.3.2MBACh. 5 - Prob. 5.3.3MBACh. 5 - Prob. 5.3.4MBACh. 5 - Prob. 5.3.5MBACh. 5 - Prob. 5.4.1MBACh. 5 - Prob. 5.4.2MBACh. 5 - Prob. 5.1CCh. 5 - Prob. 5.2CCh. 5 - Prob. 5.3CCh. 5 - Prob. 5.4CCh. 5 - Prob. 5.5.1CCh. 5 - Prob. 5.5.2CCh. 5 - Prob. 5.5.3CCh. 5 - Prob. 5.6C
Knowledge Booster
Similar questions
- An employee of JHT Holdings, Inc., a trucking company, was responsible for resolving roadway accident claims under $25,000. the employee created fake accident claims and wrote settlement checks of between $5,000 and $25,000 to friends or acquaintances acting as phony victims. One friend recruited subordinates at his place of work to cash some of the checks. Beyond this, the JHT employee also recruited lawyers, whom he paid to represent both the trucking company and the fake victims in the bogus accidents. When the lawyers cash the checks they allegedly split the money with the corporate JHT employee. This fraud went undetected for two years Answer the following true or false questions concerning the fraud. Frauds that are perpetrated with multiple parties in different positions of control make detecting fraud more difficult. Claims should be authorized and verified before payment is made. The employee made sure each claim had a phony victim. Corrupt lawyers were bought into the fraud…arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardMAIL ROOM FRAUD AND INTERNAL CONTROLSarat Sethi, a professional criminal, took a job as a mail room clerk at Benson &Abernathy and Company, a large department store. The mail room was an extremelyhectic work environment consisting of a supervisor and 45 clerks. The clerks wereresponsible for handling promotional mailings, catalogs, and interoffice mail, as wellas receiving and distributing a wide range of outside correspondence to variousinternal departments. One of Sethi’s jobs was to open cash receipts envelopes fromcustomers making payments on their credit card balances. He separated theremittance advices (the bills) and the checks into two piles. He then sent remittanceadvices to the AR department, where the customer accounts were updated to reflectthe payment. He sent the checks to the cash receipts department, where they wererecorded in the cash journal and then deposited in the bank. Batch totals of cashreceived and accounts receivable updated were reconciled each night to…arrow_forward
- The U.S. General Accounting Office (GAO) Office of Special Investigations was responsible for investigating a potential purchase fraud case. The man who allegedly committed the fraud was Mark J. Krenik, a former civilian employee of the U.S. Air Force. Mr. Krenik was the Air Force's technical representative on contracts with Hughes STX. Hughes STX provided hardware, software maintenance, technical support, and training to the Air Force. Part of Mr. Krenik's alleged fraud included opening accounts under his control at banks in Maryland. The accounts were opened under the names Hughes STX and ST Systems Corporation. A section of the GAO report on this fraud investigation reads as follows: On December 15, 1992, Mr. Krenik opened post office box 215 in Vienna, Virginia, in his own name. On December 24, 1992, Mr. Krenik delivered to the Air Force Finance Office 11 bogus invoices totaling $504,941.19. Accompanying the invoices were the respective DD‐250s, on which Mr. Krenik had falsely…arrow_forwardCharles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in lectures network risks and auditing could you use to help detect this type of fraud?arrow_forwardb) You are the audit senior in charge of the audit of Malaika Company and have been informed by your audit manager that during the year a fraud occurred at the client. A payroll clerk set up fictitious employees and the wages were paid into the clerk’s own bank account. This clerk has subsequently left the company, but the audit manager is concerned that additional frauds have taken place in the wages department. Required: i) Describe six procedures which should be undertaken during the audit of wages as a result of the manager’s assessment of the increased risk of fraud.arrow_forward
- Identify the internal control principle that was violated in each of the following separate situations. a. The recordkeeper left town after the owner discovered a large sum of money had disappeared. An audit found that the recordkeeper had written and signed several checks made payable to his fiancée and recorded the checks as salaries expense. b. An employee was put in charge of handling cash. That employee later stole cash from the business. The company incurred an uninsured loss of $184,000. c. There is $500 in cash missing from a cash register drawer. Three salesclerks shared the cash register drawer, so the owner cannot determine who is at fault.arrow_forwardPls explain first how you solve it. Thank you. F COMPANY, organized on March 1, 2021, has a very poor internal control system. Thecompany's cashier is also its accountant. After 9 months of operations, the company's managersuspects that the cashier-accountant has been misappropriating company collections. You havebeen engaged to audit the company's accounts to determine the extent of fraud, if any. You started the audit on November 15. On that date, the cash on hand per your surprise countwas P5,140. Also on that date, the bank confirmed that the balance of the company's currentaccount was P26,328. Your examination of the records reveals that a check for P1,852 wasoutstanding on November 15. The company's markup is 40% of sales. Further examination of the company's records reveals the following balances at November 15,2021:arrow_forward18.During an audit of a retail company, Lily, newly hired internal auditor, found a scheme in which the warehouse manager and a purchasing staff diverted approximately Php2 million worth of goods to an outside warehouse, the sold the goods to third parties. The fraud was not found earlier by the internal audit team since the warehouse manager updated the perpetual inventory records and then forwarded receiving reports to the accounts payable department for processing. Which of the following procedures did Lily perform which would have most likely led to the discovery of the missing materials and the fraud? Group of answer choices Random sampling of receiving reports and tracing to the recording in the perpetual inventory records. Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department. Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory records. Random…arrow_forward
- An IT auditor is conducting data analysis procedures on an employee expense report file and notices several expenses for $24.99 from the same individual. The company’s policy requires that any expenses that are under $25.00 do not require a receipt. The IT auditor should: [SELECT ALL THAT APPLY a) Maintain professional skepticism and investigate these transactions further b) Pass on investigating these items further, focusing on higher dollar amounts c) Evaluate the business process approval controls, and related procedures d) Discuss fraud awareness and detection programs with management to gain an understanding of management’s commitment to fraud prevention and related entity-level anti-fraud controls.arrow_forwardThe internal control procedures in Philips Company make the following provisions. Identify the principles of internal control that are being followed in each case. Employees who have physical custody of assets do not have access to the accounting records. Each month the assets on hand are compared to the accounting records by an internal auditor. A prenumbered shipping document is prepared for each shipment of goods to customers. All over-the-counter receipts are registered on cash registers. All cashier are bonded. Daily cash counts are made by Cashier department supervisors. The Duties of receiving cash, recording cash, and having custody of cash are assigned to different individuals. Only Cashier may operate cash registers. Company checks are prenumbered. The bank statement is reconciled monthly by an internal auditor. Blank checks are stored in a safe in the treasurer’s office. Only the treasurer or assistant treasurer may sign checks. Checks signers are not allowed to record cash…arrow_forwardtrue or false. In response to the public outrage over accounting frauds, Congress passed the Sarbanes-Oxley Law______________________. In a movie theatre, the person selling the ticket should also collect the ticket for admission____________. all monies should be deposited in a safe for overnight security________________. the checkbook should be reconciled to the bank statement monthly____________. Only authorized personnel should have passwords to conduct electronic business transactions___________. All cash payments should be made by check, credit card or debit card_________________. Authorization controls set spending limits on employees using company credit cards and/ or set limits on major purchases on behalf of the company____________________.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Financial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning