![FINANCIAL ACCOUNTING UDEL W/ACCESS >IB](https://www.bartleby.com/isbn_cover_images/9781119268444/9781119268444_largeCoverImage.gif)
FINANCIAL ACCOUNTING UDEL W/ACCESS >IB
8th Edition
ISBN: 9781119268444
Author: Kimmel
Publisher: WILEY C
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 7.4EYCT
(a)
To determine
Fraud: Fraud is a deliberate and deceptive action of an employee to obtain unlawful gain from the employer.
To find: The percentage of companies in the world which experienced fraud during the survey period, and find the country which has the highest percentage
(b)
To determine
To find: The percentage of survey respondents participated in anti-bribery/anti-corruption (ABAC), to assess the emerging risk during the last two years of survey period
(c)
To determine
To find: The percentage of C-suite executives have not participated in anti-bribery/anti-corruption (ABAC) training
(d)
To determine
To find: The source of cybercrime that concerns the respondents significantly
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Leonard Moses is planning to grow its customer base and is in the process of creating an
online web-based sales ordering system for customers to purchase products using personal
credit cards for payment. At a recent meeting with the internal auditors, it was highlighted that
there are risk associated with this system. Identify three risks related to an online sales system
that management should consider. For each risk, identify an internal control that could be
implemented to reduce that risk.
You are working for a new company that is primarily an Internet-based seller
of goods whose business model is similar to eBay's. The company was founded
on principles similar to eBay's and is an online auction business, but has the
added benefit of having one common site that deals with customers world-
wide. The CEO knows that privacy is very important in the online business
and has requested that the internal audit function draft a best practices privacy
policy for customers because the motto for the new company is "Your Pri-
vacy is Our Policy." The company neither has, nor plans to hire, a privacy or
compliance officer. The CEO expects the CAE to lead this effort and ensure
the campaign delivers on the company's motto. With the advertising campaign
slated to launch in one month, the CEO wants the privacy documentation
finalized as soon as possible.
A. Identify key sources on privacy that are available for you to reference as
you define best practices.
B. Determine the consulting…
Some of the largest business frauds ever perpetrated have involved the misstatement of inventory. Two classics were at Leslie Fay and McKesson Corporation. Feel free to check them out to get a feel for the impact that it has. There is considerable information regarding inventory frauds available on the Internet. Search for information about another instance of inventory fraud at any other company, and prepare an explanation of the nature of the inventory fraud.
Chapter 7 Solutions
FINANCIAL ACCOUNTING UDEL W/ACCESS >IB
Ch. 7 - A local hank reported that it lost 150,000 as the...Ch. 7 - Prob. 2QCh. 7 - Prob. 3QCh. 7 - Prob. 4QCh. 7 - Prob. 5QCh. 7 - Prob. 6QCh. 7 - Prob. 7QCh. 7 - Prob. 8QCh. 7 - Prob. 9QCh. 7 - Prob. 10Q
Ch. 7 - Prob. 11QCh. 7 - Prob. 12QCh. 7 - Prob. 13QCh. 7 - Prob. 14QCh. 7 - Prob. 15QCh. 7 - Prob. 16QCh. 7 - Prob. 17QCh. 7 - Prob. 18QCh. 7 - Prob. 19QCh. 7 - Prob. 20QCh. 7 - Prob. 21QCh. 7 - Prob. 22QCh. 7 - Prob. 23QCh. 7 - Prob. 24QCh. 7 - Prob. 25QCh. 7 - Prob. 26QCh. 7 - Prob. 27QCh. 7 - Prob. 28QCh. 7 - Match each situation with the fraud triangle...Ch. 7 - Prob. 7.2BECh. 7 - Prob. 7.3BECh. 7 - Prob. 7.4BECh. 7 - While examining cash receipts information, the...Ch. 7 - Prob. 7.6BECh. 7 - Luke Rove is uncertain about the control features...Ch. 7 - Prob. 7.8BECh. 7 - Prob. 7.9BECh. 7 - Prob. 7.10BECh. 7 - Prob. 7.11BECh. 7 - Prob. 7.12BECh. 7 - Prob. 7.13BECh. 7 - Prob. 7.14BECh. 7 - Prob. 7.1DIECh. 7 - Prob. 7.2DIECh. 7 - Prob. 7.3DIECh. 7 - Prob. 7.4ADIECh. 7 - Prob. 7.4BDIECh. 7 - Prob. 7.1ECh. 7 - Prob. 7.2ECh. 7 - Prob. 7.3ECh. 7 - Prob. 7.4ECh. 7 - Prob. 7.5ECh. 7 - Prob. 7.6ECh. 7 - Prob. 7.7ECh. 7 - Prob. 7.8ECh. 7 - Prob. 7.9ECh. 7 - Prob. 7.10ECh. 7 - Prob. 7.11ECh. 7 - Prob. 7.12ECh. 7 - Prob. 7.13ECh. 7 - Prob. 7.14ECh. 7 - Prob. 7.15ECh. 7 - Prob. 7.16ECh. 7 - Prob. 7.1APCh. 7 - Prob. 7.2APCh. 7 - Prob. 7.3APCh. 7 - Prob. 7.4APCh. 7 - Prob. 7.5APCh. 7 - Prob. 7.6APCh. 7 - Prob. 7.7APCh. 7 - Prob. 7.8APCh. 7 - Prob. 7CCCPCh. 7 - Prob. 7.1EYCTCh. 7 - Prob. 7.2EYCTCh. 7 - Prob. 7.3EYCTCh. 7 - Prob. 7.4EYCTCh. 7 - Prob. 7.5EYCTCh. 7 - Prob. 7.6EYCTCh. 7 - Prob. 7.7EYCTCh. 7 - Prob. 7.8EYCTCh. 7 - Prob. 7.9EYCTCh. 7 - Prob. 7.10EYCTCh. 7 - Prob. 7.1IFRSCh. 7 - Prob. 7.2IFRS
Knowledge Booster
Similar questions
- Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will customer orders be received via the Internet? Are all collections from customers received in the form of checks? Are product quantities monitored regularly?arrow_forwardA multimediacourse graduate used design software to create paychecks that lookedidentical to those of a company in his town.The paychecks were deposited electronically into ofhis friends’ accounts. What type of fraud did hecommit? Select one: a. output fraud. b. input fraud. c. computer instruction fraud. d. processor fraud.arrow_forwardMa4. What do you think are the top cyber threats targeting accounting firms? List two ways in which a company can protect its data What is the biggest challenges facing the accounting profession? What barriers might prevent you from conducting a good audit? Why is the leader important in accounting? How does new technology affect the accounting profession> What are the new technology being used in the accounting system?arrow_forward
- Accounting The internal audit group at Freshfield Inc., a produce wholesaler, has tested the company’s IT controls and found security weaknesses in its e-commerce system. This is an example of which type of enterprise risk? a) Strategic risk b) Compliance risk c) Operational risk d) Reporting risk.arrow_forwardYou are auditing Hawthorne Industries. The preliminary risk assessment resulted in a high potential for fraud given the number of offices it has across Canada and the high volume of travel-related expenses, as well as the weak controls around expense management. The travel expense account has been assigned to you for substantive testing and you would like to design an ADA to perform the testing. The data you have available include:• The general ledger• Corporate credit card data (in aggregate, as well as employee daily totals, location of charges, and vendor category, e.g., restaurant, fuel, hotel)• Payroll records that include start/end date, vacation and absenteeism data, and roleWhat are the main assertions related to the travel expense account? (Several choices may be correct.) Completeness Cut-off Classification Accuracy Occurrence Existencearrow_forwardou are an investment banker performing due diligence on a potential acquisition for a financial buyer. For this particular transaction, the ability of the acquisition target to continue operations in severe weather is critical for profitability and the transaction’s success. As part of your due diligence you would most likely review which of the following reports? 1. SOC 1 2. PCI Compliance 3. SOC 2 4. SOC for cybersecurityarrow_forward
- Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?arrow_forwardRead the following information and then answer questions a & b below: Assume you are an internal auditor for a large, multinational, manufacturing organization with a division in Mexico. One of your responsibilities is to investigate allegations made on the company’s fraud hotline. When you arrive at work one morning you learn an anonymous tip was left on the hotline that alleges fraud involving the division manager. “Pat’s significant other is a fraudulent vendor,” was the anonymous tip left on your company’s fraud hotline. Pat is a division manager at your company. “Wow. I can’t believe this guy is so blatant,” you are thinking as you review some accounts payable invoices while following up on this anonymous tip. A quick search of the AP file reveals a total of three invoices like the one, all for identical amounts but on different dates. The division manager, Pat, has the authority to approve payment of invoices for less than $10,000. It is obvious to you that the manager has…arrow_forwardyou have been engaged as a consultant for Zenith Bank Ghana LTD. Draw up a comprehensive fraud risk assessement that would incorporate a formal process of accountability and reponsibility going forward for Zenith Ghana Ltd.arrow_forward
- 1. Access the International Federation of Accountants Web site (www.ifac.org) and briefly describe the following two International Auditing Standards: ISA 500 and ISA 505. 2. Access the U.S department of justice website, and briefly explain the characteristics of identity theft. Give two examples of ways to commit identity theft. 3. Locate SEC Accounting and Auditing Enforecement Release No. 3029. What did that SEC release discuss?arrow_forwardRisk assessment is carried out by the organization to identify, analyze and manage relevant risks. Following are circumstances that can cause or change the risk, except: a. New personal who have a different or inadequate understanding of internal control.b. The board of directors establish a code of ethical standards.c. Significant and rapid growth that strains existing internal controls.d. Entering into foreign markets that may impact operations. Explain the answer in 100-150 wordsarrow_forwardAccording to the Report to the Nations, the anti-fraud measure with the greatest impact on median losses is: a. Internal audits Fraud training Hotlines O b. c. d. Code of conductarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College PubAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningCentury 21 Accounting Multicolumn JournalAccountingISBN:9781337679503Author:GilbertsonPublisher:Cengage
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337280570/9781337280570_smallCoverImage.gif)
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619455/9781337619455_smallCoverImage.gif)
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage