Concept explainers
Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations.
The following are the some of the internal control procedures:
- Competent personnel, rotating duties, and mandatory vacations
- Separating responsibilities for related operations
- Separating operations, custody of assets, and accounting
- Proofs and security measures
To describe: The internal control procedure that will prevent or detect fraud.
Want to see the full answer?
Check out a sample textbook solutionChapter 8 Solutions
Working Papers, Chapters 1-17 for Warren/Reeve/Duchac's Accounting, 26th and Financial Accounting, 14th
- An auditor suspects that certain client employees are ordering merchandise for themselves over the Internet without recording the purchase or receipt of the merchandise. When vendors' invoices arrive, one of the employees approves the invoices for payment. After the invoices are paid, the employee destroys the invoices and the related vouchers. In gathering evidence regarding the fraud, the auditor most likely would select items for testing from the file of all: Multiple Choice Cash disbursements. Approved vouchers. Receiving reports. Vendors' invoices.arrow_forwardInvestigating a Fraud. Suppose you are auditing cash disbursements and discover severalpayments to a company you are unfamiliar with and cannot find information about this company on the Internet or in the local telephone directory. The invoices from this company have numbers very close to each other in the sequence, there is no phone number on the invoice, and each bill is for a dollar amount just under the amount that would require additional approvals before payment. Based on this information, you now suspect this may be a fraud.Required:Based on your suspicions, how would you change the audit procedures you would perform, and how might you change the evidence you gather?arrow_forward“Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?arrow_forward
- Types of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forwardAn auditor suspects that a client's cashier is misappropriating cash receipts for personal use by lapping customer checks received in the mail. In attempting to uncover this embezzlement scheme, the auditor most likely would compare the Group of answer choices Daily cash summaries with the sums of the cash receipts journal entries. Individual bank deposit slips with the details of the monthly bank statements. Dates checks are deposited per bank statements with the dates remittance credits are recorded. Dates uncollectible accounts are authorized to be written off with the dates the write-offs are actually recorded.arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forward
- Which of the following is true in the case of forgery? Forgery does not include anything done by typing or word-processing. If a person signs his own check for $100 cash, knowing that there is only $50 in the account, and manages to cash it, the check is a forgery. The "forged instrument" must in some way be false, as in a false signature, a backdating of an existing instrument, or falsely modifying a corporate name. Forgery can be committed only by forging signatures. Alteration of an already existing document does not constitute forgery.arrow_forwardThe fraud triangle asserts that the following three factors must exist for a person to commit fraud. A. Opportunity B. Pressure C. Rationalization. Identify the fraud risk factor (A, B, or C) in each of the following situations.arrow_forwardJim Block, CFE, is investigating Randy Smith for his role in a potential kickback scheme. Gathering evidence about Randy's financial activity has been difficult. While on a stakeout at Randy's home, Jim sees Randy's wife take out the garbage and place it on the curb. Jim takes the trash bag, sorts through its contents, and discovers multiple bank statements that provide details about some of Randy's illicit financial transactions. Is jim's acquirement of the bank statements legal even though there was no search warrant? Fully explain!arrow_forward
- Sergio Flores works at the drive-through window of Big & Bad Burgers. Occasionally, when a drive-through customer orders, Sergio fills the order and pockets the customer’s money. He does not ring up the order on the cash register.Identify the internal control weaknesses that exist at Big & Bad Burgers anddiscuss what can be done to prevent this theft.arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardThe fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. No one matches the cash in the register to receipts when shifts end.arrow_forward
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning