Fraud perpetrators who manipulate accounting records to conceal embezzlements often attempt to balance the accounting equation nation by recording expenses.
> What are analytical symptoms?
> What are accounting symptoms?
> Why do internal control weaknesses help detect fraud?
> In your own words describe a CFE.
> Fraud perpetrators often live beyond their means since their income does not support their lifestyle.
> In what ways is the Ponzi scam similar to other frauds?
> How does the Pygmalion effect relate to fraud prevention?
> How would you react in the following situations? a. You discover an internal control weakness in the company you are auditing. b. You notice your co-worker has recently been coming to work in a new car and wearing more expensive clothes and jewelry. c
> What is concealment?
> How do fraud symptoms help in detecting fraud?
> How does a response hotline for anonymous tips help to prevent fraud?
> In what ways can organizations conduct proactive fraud auditing?
> How can organizations monitor their employees?
> Why is it important to inform outside vendors of company policies concerning payments to buyers?
> In what ways can organizations discourage collusive fraud?
> Co-workers are usually in the best position to detect fraud.
> Why are good internal controls important?
> What is the purpose of adopting a code of ethics throughout a company?
> What are different ways in which companies can eliminate opportunities for fraud?
> What are some nonstandard ways of trying to detect dishonest employees in the employee hiring process?
> What is implied by the phrase "just about everyone can be dishonest"?
> How do organizations create a culture of honesty, openness, and assistance?
> What are some of the legal actions that can be taken after a fraud has occurred?
> For each of the following, identify whether the evidence would be classified as testimonial evidence, documentary evidence, physical evidence, or personal observation. a. Surveillance b. Tire marks c. Honesty test d. Interview e. A computer hard dri
> How is the evidence square useful in thinking about fraud investigation?
> Describe the evidence square.
> New whistle-blowing laws have helped make tips and complaints more effective.
> Why is it important to conduct a thorough fraud investigation when fraud is suspected?
> Why is it important to detect fraud early?
> How does a company assess and mitigate the risk of fraud within an organization?
> How does building a culture of honesty and high ethics help to reduce the possibility of fraud?
> How is power used to influence another person to participate in an already existing fraud scheme?
> Why might management avoid taking legal action against fraud perpetrators? What are the perceived benefits of inaction? What are the costs?
> Why might pursuing civil remedies be ineffective against employee fraud? When might civil actions be more useful?
> Why is fraud prevention so important?
> What were Jim Bakker's pressures, opportunities, and rationalizations to commit fraud?
> How does rationalization contribute to fraud?
> Employee transfers, audits, and mandatory vacations are all ways to provide independent checks on employees.
> One common investigation procedure determines how perpetrators convert or spend their time.
> What are some common factors that provide opportunities for fraud?
> What are some of the internal controls that prevent and/or detect fraudulent behavior?
> What are some different types of pressures?
> What is the fraud scale, and how does it relate to pressure, opportunity, and integrity?
> What is the fraud triangle, and why is it important?
> What motivates people to commit fraud?
> What is power?
> In what ways did Dr. Sam Waksal rationalize his illegal and unethical actions?
> What types of people commit fraud?
> Do you think the demand for careers in fraud prevention and detection is increasing or decreasing? Why?
> How do employee fraud and management fraud differ?
> What are some of the different types of fraud fighting careers?
> Why was Charles Ponzi so successful with his fraud scheme?
> For each of the following. indicate whether it is a characteristic of a civil or a criminal case: a. Jury may consist of fewer than 12 jurors. b. Verdict must be unanimous. c. Multiple claims may be joined in one action. d. "Beyond a reasonable doubt
> What is the difference between civil and criminal laws?
> List and describe the five different types of frauds.
> How does fraud affect individuals, consumers, and organizations?
> Why does it usually require trust for someone to be able to commit a fraud?
> Describe the relationship between fraud, net income, profit margin, and the revenue required to make up for fraud losses.
> Why are accurate fraud statistics hard to find?
> An increase in a person's net worth plus living expenses equals the person's total income.
> What is fraud?
> In your own words describe the purpose of the ACFE.
> Your best friend wants to know why "on earth" you are taking a fraud examination class. He is curious about what careers this class prepares you for. Go to the Internet and find information about two different careers that you could pursue in the field o
> Visit the Association of Certified Fraud Examiner's (ACFE's) Web site at www.acfe.com. Once you have logged on, explore the pages of the site and then answer the following questions: a. How many professionals make up the (ACFE)? b. What are the require
> Locate the Web site of the American Society of Questioned Document Examiners (ASQDE) at www .asqde.org. What is the ASQDE? What is its purpose?
> Today, many data analysis tools are available to provide assistance to fraud examiners when searching for possible fraudulent activities within a company. Visit the Association of Certified Fraud Examiners' Web site (www.acfe.com) and list some of the co
> Read the article entitled "Following Benford's Law, or Looking Out for No. 1" found at www.rexswain. com/benford.html. The article mentions that a statistics professor can easily discern if students nipped a coin 200 times or if they merely faked it. Of
> As long as a sample is selected randomly, it will always be representative of the population as a whole.
> Discovery sampling is probably the most difficult of all statistical sampling variations to understand.
> Concealment investigative methods sometimes involve the study of documents that have been manipulated.
> The net worth method cannot help in determining the extent of stolen funds.
> Evidence should be uniquely marked so it can be easily identified later.
> There is no difference between forensic document experts and graphologists.
> Photocopies are always preferable to original documents as evidence.
> Traditional chain of custody evidence procedures are not appropriate when used with electronic evidence.
> Checks are excellent sources of physical evidence.
> The SHA -1 checksum method is more advanced and is considered more robust than the MDS method.
> It is impossible to retrieve the data from a file that has been deleted on a computer.
> The best way to obtain documentary evidence in a computer database is to use discovery sampling to find the appropriate records.
> Programs like IBM's i2 Analyst's Notebook and Xanalys Link Explorer perform link analysis.
> Bates numbers are identifying numbers used by attorneys involved in litigation to track all documents.
> Private financial institutions can usually sell confidential customer information.
> Using a computer to access records (data mining) can be a very effective approach for determining if fraud exists because the auditor can look at entire populations.
> Random number tables are ineffective and should not be used when selecting random samples from a population.
> A canceled check typically shows the account number of the person who presented the check, the teller who processed the check, and the sequence number of the transaction.
> Even if photocopies of original documents are allowed to be introduced as evidence in a court of law, they are still considered secondary evidence.
> Concealment is the covering of tracks, obscuring of evidence, and removal of red nags to hide a perpetrator's fraud.
> Investigation should only take place when predication of fraud has first been established.
> Not only are undercover operations both legal and valid, but also inexpensive.
> Surveillance logs should always be prepared before an investigation begins.
> During invigilation, no controls are imposed on any activities.
> Mobile surveillance is usually much more risky than stationary surveillance.
> When people convert stolen cash by entering into financial transactions, such as buying assets, they usually leave tracks that investigators can follow.
> Surveillance is a theft investigation technique that relies on the examination of documents
> Electronic surveillance can be of limited value in the investigation of employee fraud because of concerns regarding employees' privacy rights.
> One advantage of using a vulnerability chart is that it forces investigators to consider all aspects of a fraud
> Now that many companies are storing their data "in the cloud" it is easier to access the electronic data of suspected perpetrators.
> Seizing and searching computers is illegal because it infringes on the rights guaranteed by the Fourth Amendment to the Constitution.
> In determining which investigative method to use, it is most important that investigators focus on the costs of each possible method.
> To get an accurate reading. it is generally agreed that the invigilation period should be at least four days in length.