2.99 See Answer

Question: Describe occupational fraud and abuse.


Describe occupational fraud and abuse.


> What is meant by demonstrative evidence? Give examples.

> How do pay-and-return schemes work?

> What are some non-verbal clues to deception?

> What are some of the verbal clues to deception?

> Why is it advisable to obtain a written confession from the subject of an investigation?

> What is the “expectations gap”?

> What constitutes “good cause” in the discharge of an employee?

> What are the various categories and calculations used in ratio analysis?

> Why are introductory questions so important to an interview’s success?

> What are the three types of evidence that may be offered at trial?

> What are the challenges associated with proving intent on the part of a fraudster?

> How is the threshold for predication determined?

> Where may fraud examiners and forensic accountants find data?

> When is it appropriate to use an indirect method for income reconstruction?

> What is a kickback scheme and how is it committed?

> What are some ways that may be used to hide assets?

> Generally, how is the problem of management override and collusion addressed?

> What are the primary responsibilities of management?

> How can conflicts of interest be prevented and detected?

> What are the main components of the fraud risk assessment process?

> How did the Sarbanes-Oxley Act address corporate governance and public accounting responsibilities?

> What are the three major types of negotiated remedies and how do they differ?

> What is the discovery process and how does it work?

> A scientist has an unlimited water supply and two buckets, one holds 4 gallons and the other holds 5 gallons. By using nothing but the buckets and water, how can he accurately measure 3 gallons of water?

> What is meant by “hacking?”

> What methods are used by insiders to commit computer fraud? What red flags might indicate that insider computer fraud is occurring?

> Which types of economic damages are related to computer crimes?

> What is included as an expert’s work product?

> What is the difference between computer fraud and computer crime?

> How are computers used in cyber-crime?

> Which federal law enforcement agencies investigate domestic Internet crimes?

> What is a shell company and how is it formed?

> Why is Internet fraud particularly difficult to police?

> What are some indicators that a computer has been infected?

> List and describe various types of computer viruses.

> How do computer viruses work?

> How might a hacker access and manipulate a computer for illegal purposes?

> There are 5 different color houses, occupied by people of 5 different nationalities, who smoke 5 different cigar brands, drink 5 different types of alcohol, and have 5 different pets. The houses are lined up in a row. 1. The Brit lives in the red house.

> How are the objectives of terrorists and organized criminals different?

> What types of damages may ensue as a result of personal injury, wrongful death and survival actions?

> Why is financial statement fraud often considered a complex fraud?

> How is the concept of an “organization” involved in mixing illegal activities with legitimate ones?

> How do fraudulent disbursements at the cash register differ from other register frauds?

> What is the difference between a predator and an “accidental fraudster?”

> How have some of the more common securities fraud schemes been perpetrated?

> What is a documentary letter of credit used for?

> What are the different types of banks in the U.S. banking system? How are they different?

> Discuss the essence of organizational crime.

> Compare and contrast Cressey and Albrecht’s theories of crime causation.

> Identify ethical issues, conflicts of interest, and non-compliance with corporate policies and procedures in the Enron case.

> What are the considerations related to forecasting income and cash flows?

> Analyze the role of corporate governance mechanisms in fraud prevention.

> What red flags are commonly associated with fictitious expense schemes?

> Give examples of behavioral indications of fraud.

> Discuss alternative courses of action in the Enron case within the framework of appropriate ethical conduct.

> Which professional organizations support fraud examination and financial forensics professionals? What certifications do they offer?

> What employment opportunities currently exist for fraud examiners and financial forensics specialists?

> What is the role of research in the fraud examination and financial forensics professions?

> According to this chapter, what employment trends are expected for professionals in the fields of fraud examination and financial forensics? Why?

> What international opportunities exist in fraud examination and financial forensics?

> Explain the differences between an audit, fraud examination, and forensic accounting engagement.

> Describe the services that a forensic accountant might provide related to a marital dispute.

> How may lost profits be calculated using typical benchmarks?

> What is a ghost employee and what are the four steps needed to make this scheme work?

> Differentiate between fraud and abuse.

> Define fraud and identify a potentially fraudulent situation.

> What two points must an injured party prove to recover money in a civil lawsuit?

> What is meant by remediation?

> What is meant by corporate governance and why is it important?

> What is a deposition and why is it used?

> When may an expert’s opinion be subject to challenge?

> What is the difference between fact witnesses and expert witnesses?

> What are some of the ways in which financial statement fraud is committed?

> Why might senior management overstate or understate business performance?

> How may theft and alteration of outgoing company checks be prevented and detected?

> How can understating liabilities and expenses make a company appear more profitable?

> How are fictitious revenue schemes committed?

> What is the conceptual framework for financial reporting?

> What is defined as “something of value?”

> What are the different types of corruption schemes?

> What is the difference between fraud prevention and fraud deterrence?

> How does the “perception of detection” impact fraud deterrence?

> What legal mechanisms may be used to recover assets in the civil or criminal justice systems?

> What are the differences between forged maker and forged endorsement schemes?

> Which is the most effective control to prevent receivables skimming?

> What steps should an organization take to prevent fraudulent shipments of merchandise?

> How may the larceny of noncash assets be prevented?

> What types of company assets are typically misused?

> How are noncash assets misappropriated?

> What is the difference between skimming and cash larceny?

> How do e-discovery rules impact the storage of email and other electronic files?

> Why is it problematic for an organization to set standards that are too high?

> What computer functions that can make recovering deleted files more difficult?

> What is computer forensics?

> What are the types of losses available for recovery?

> What are the two major approaches for testing IT system controls?

> How is case management software used in an investigation?

> What role do graphics play in an investigation?

> What functions are used by data extraction and analysis software to highlight red flags of fraud?

> What are the five types of interview and interrogation questions?

2.99

See Answer