Describe a control procedure that would have prevented or detected the fraud?
Q: John Doe, a fraud examiner, has been hired by ABC Corporation to investigate a shortage of cash,…
A: Introduction: Documents, according to John and most other fraud investigators, are preferable to…
Q: Nino Moscardi, president of Greater Providence Deposit & Trust (GPD&T), received an anonymous note…
A: “Since you have posted a question with multiple sub-parts, we will solve the first three sub-parts…
Q: Baker is an auditor for ABC Company. As part of a proactive fraud audit, Baker runs the following…
A: Auditor is the person who is responsible for checking and verifying financial statements and…
Q: The fraud triangle asserts that the following three factors must exist for a person to commit…
A: Given information is: The fraud triangle asserts that the following three factors must exist for a…
Q: a. Identify the type of fraud that took place. (e.g. misappropriation of assets o fraudulent…
A: a. The type of fraud that took place, in this case, is Misappropriation of assets. In this Case,…
Q: 8.During an audit of a retail company, Lily, newly hired internal auditor, found a scheme in which…
A: solution in the given case there was a fraud scheme in which the warehouse manager and a purchasing…
Q: Which of the following would be the best protection for a company that wishes to prevent the…
A: Lapping: Fraud done by an employee of the organization to hide the payments to be received is…
Q: Which of the following is NOT a method UCI's former executive VP and CFO used to embezzle 2.97…
A: A transaction is said to be false if it is not supported by supporting evidence and proof. There is…
Q: oufian, a senior account executive is spending more money than he can afford. He is the authorized…
A: In the given situation, there can be seen complete lack of internal control.
Q: Suppose that someone stole your ATM card and withdrew $1,000 from your checking account. How much…
A: FIRST WE KNOW WHAT IS FEDERAL LAW:A body of law at the highest or national level of a Federal…
Q: Identify each of the following statements as elther true or false. a. It is good internal control…
A: the correct answer with proper explanation of above statement are as follows.
Q: Investigating a Fraud. Suppose you are auditing cash disbursements and discover severalpayments to a…
A: Audit Procedures: The particular and specific procedures undertaken by auditors to procure evidence…
Q: WorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s…
A: Fraud: It is an intentional misappropriation of the assets or the financial records of an…
Q: The most common types of check fraud include: forgery of your company's checks checks written on…
A: The question is multiple choice question. Required Choose the Correct Option.
Q: 1. A local bank reported that it lost $150,000 as the result of employee fraud. Ray Fairburn is not…
A: Internal control: Internal control can be defined as a process to ensure achievement of the…
Q: Which of the following is NOT an example of an opportunity to commit fraud in the accounting…
A: So an opportunity to commit any fraud in an organization is a chance provided by the environment to…
Q: Soufian, a senior account executive is spending more money than he can afford. He is the authorized…
A: An organization needs certain manual and automated steps in the smooth functioning of the business…
Q: What does it mean to say that internal control has limitations and what are these limitations?
A: Note: “Since you have asked multiple question, we will solve the first question for you. If you want…
Q: Why would a financial institution’s PEP customers be required to provide documentation to evidence…
A: Given, Political Exposed Persons (PEPs) are characterized as high-risk clients who have better…
Q: What internal control or procedure(s) would provide protection against the following threats? A…
A: "Since you have posted a question with multiple sub-parts, we will solve first three sub-parts for…
Q: The Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious…
A: Embezzlement: Embezzlement is a type of fraud, which is classified under employee fraud. It…
Q: One of the typical characteristics of management fraud isa. Falsification of documents in order to…
A: Management Fraud: Management fraud is a kind of fraud that is committed intentionally by the…
Q: e following misstatements are included in the accounting records of the Dillon Manufacturing…
A:
Q: What internal control or procedure(s) would provide protection against the following threats?
A: For the given cases, Internal control measure and prevention measures should be determine.
Q: Types of Cyber Crimes. The following situations are similar, but each represents a variation of a…
A: a) The act is phishing. It is a cyber crime in which the targets are contacted through either…
Q: In the Why It Matters feature “Examples of Theft and FinancialReporting Frauds” at the beginning of…
A: Comment- Since we only answer up to 3 sub-parts, we’ll answer the first 3. Please resubmit the…
Q: Sergio Flores works at the drive-through window of Big & Bad Burgers. Occasionally, when a…
A:
Q: The following are a list of possible errors or fraud (1 through 5) involving cash receipts and…
A: Internal Control: Internal controls are a set of procedures, mechanisms, and rules that ensure that…
Q: Black is a Certified Fraud Examiner for the ABC Company. Green, an employee in the accounting…
A: There are different ways of charging the employees for doing crimes as per crime done if they are…
Q: XYZ Company has considerable cash collections on a regular basis. The cashier receives the cash,…
A:
Q: The fraud scheme that is similar to the ‘‘borrowing from Peter to pay Paul’’ scheme is a. expense…
A:
Q: What are the most common approaches that perpetrators use to commit fraudulent financial reporting?…
A: A fraud in an audit is an activity performed with the intent of deceiving the users of the financial…
Q: In the case of The Canny Cashier, name one control that could have revealed signs of the…
A: Cash embezzlement is a fraud in the business organisation in which some employee steals or…
Q: 1. As an accountant, why you need to study the revenue cycle? 2. If you are going to audit the cash…
A: We’ll answer the first question since the exact one wasn’t specified. Please submit a new question…
Q: What documentation should an auditor inspect when a client has paid off a bank note? How could an…
A: Definition: Bank statement: This is a periodic or monthly statement issued by the bank reporting the…
Q: An accounting manager, who has full access to a Company’s accounting system also has access to the…
A: Internal control helps management to maintain and control the business operations so that business…
Q: Which one of the following would the auditor consider to be an incompatible operation if the cashier…
A: Incompatible Operation in Cash Receipts: The mailroom is using for receiving the checks and after…
Q: Provide an appropriate response based on the following scenarios. Assume that the accounting…
A:
Q: Sarah is the payroll assistant at Samtech Ltd with over four years of experience. One Sunday…
A: Fraud Triangle has three components, they are: Opportunity Pressure, and Rationalization The fraud…
Q: Which of the following is true in the case of forgery? Forgery does not include anything done…
A: Forgery is act of making false copies of documents or making alteration in documents with an…
Q: Some strategies in management can use to implement controls to ensure the integrity and existence of…
A: Lapping fraud involves an employee who adjusts accounts receivable accounts and thereby hides the…
Q: Fraud refers to any intentional act to achieve gain, usually monetary. Committing a fraud is…
A: Auditing refers to the art of inspecting and investigating financial accounts of a company. It is…
Q: Match each situation with the fraud triangle factor-opportunity, financial pressure, or…
A: •Financial pressure is the motivation or reason to commit the fraud. For example Drug or gambling…
Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?
Step by step
Solved in 2 steps
- Assume that Brooke Miles, accounts payable clerk for West Coast Design Inc., stole $48,350 by paying fictitious invoices for goods that were neverreceived. The clerk set up accounts in the names of the fictitious companies and cashed the checks at a local bank. Describe a control procedure thatwould have prevented or detected the fraud.Allison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.Consider the scenario in which Brooke Miles, an accounts payable clerk for West Coast Design Inc., misappropriated $48,350 by paying false bills for commodities that were never delivered to the company. It was the clerk's responsibility to open accounts in the names of the phony corporations and pay the cheques at a nearby bank. Describe a fraud-prevention or detection method that may have been used to avoid or identify the scam.
- Assume that Brooke Miles, accounts payable clerk for West Coast Design Inc., stole $48,350 by paying fictitious invoices for goods that were never received. The clerk set up accounts in the names of the fictitious companies and cashed the checks at a local bank. Please use at least 150 words to describe a control procedure that would have prevented or detected the fraud.The Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…Investigating a Fraud. Suppose you are auditing cash disbursements and discover severalpayments to a company you are unfamiliar with and cannot find information about this company on the Internet or in the local telephone directory. The invoices from this company have numbers very close to each other in the sequence, there is no phone number on the invoice, and each bill is for a dollar amount just under the amount that would require additional approvals before payment. Based on this information, you now suspect this may be a fraud.Required:Based on your suspicions, how would you change the audit procedures you would perform, and how might you change the evidence you gather?
- “Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?What internal control or procedure(s) would provide protection against the following threats? Customers are billed for the quantity ordered, but the quantity shipped is actually less because some items have been back ordered. The mailroom clerk steals checks and then endorses them for deposit into the clerk’s personal bank account Goods are shipped to a customer, but that customer is not billed.An auditor suspects that certain client employees are ordering merchandise for themselves over the Internet without recording the purchase or receipt of the merchandise. When vendors' invoices arrive, one of the employees approves the invoices for payment. After the invoices are paid, the employee destroys the invoices and the related vouchers. In gathering evidence regarding the fraud, the auditor most likely would select items for testing from the file of all: Multiple Choice Cash disbursements. Approved vouchers. Receiving reports. Vendors' invoices.
- 1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…Answer the following questions and give an example for each case: What category does inventory related fraud fall into? What documents does a perpetrator use to commit billing fraud? What are the three categories in payroll fraud? How is skimming scheme fraud carried out? In which areas can the embezzlement scheme be identified? What can cause fraud to be committed in the presentation of financial statements?What internal control procedure ( s ) would provide protection against the following threats ? An employee writes off a customer's accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer .