2.99 See Answer

Question: Jenny Lanstrom regularly visits her grandfather,


Jenny Lanstrom regularly visits her grandfather, Mike Lanstrom, every Thursday night. Jenny's grandfather has been a widower for the past six years. Jenny's grandfather is very intelligent. He is a decorated veteran of World War II, and over the years, he has been active in community service. Because Mike Lanstrom practiced as a family doctor for 46 years, he is a respected member of the community. For the last several months, Jenny has noticed something different about her grandfather. Lately, he has been agitated and upset. One Thursday night, Mike told Jenny about products he had been buying over the phone. As Jenny investigated further, she realized that her grandfather had bought several products from a vendor by the name of Products for Life. Although the transactions were not large, the total amount had already added up to several hundred dollars. The nex1 day, Jenny decided to research the company on the Internet. Surprisingly, she was unable to find any information about the company. She became extremely worried that someone was taking advantage of her grandfather.
1. What should Jenny do? Should she confront her grandfather about the possibility of fraud? If so, how should she approach him?
2. Jenny realizes that certain words and phrases should be avoided when talking to the elderly about fraud. What are these words and phrases?
3. Why are the elderly so susceptible to fraud? 4. In what ways do fraudsters manipulate elderly victims' emotions?


> Below are several examples of hydroboration-oxidation. In each case, consider the expected regioselectivity and then draw the product:

> In the first step of oxymercuration-demercuration, nucleophiles other than water may be used. Predict the product for each of the following cases, in which a nucleophile other than water is used.

> Predict the product for each reaction, and predict the products if an acid-catalyzed hydration had been performed rather than an oxymercuration-demercuration:

> If an alkene is protonated and the solvent is an alcohol rather than water, a reaction takes place that is very similar to acid-catalyzed hydration, but in the second step of the mechanism the alcohol functions as a nucleophile instead of water. Draw a m

> Draw a mechanism for each of the following transformations:

> Identify whether you would use dilute sulfuric acid or concentrated sulfuric acid to achieve each of the following transformations. In each case, explain your choice.

> In each of the following cases, identify the alkene that is expected to be more reactive toward acid-catalyzed hydration.

> Carbocation rearrangements during hydrohalogenation reactions can involve shifts of carbon atoms other than a methyl group. For example, the addition of HBr to compound 1 leads to carbocation 2, which rearranges to carbocation 3, before being converted i

> A compound with the molecular formula C5H10O2 has the following 1 H NMR spectrum. Determine the number of protons giving rise to each signal.

> Draw a mechanism for each of the following transformations:

> Predict the products for each of the following reactions. Note: in some cases, the reaction produces a new chiral center, while in other cases, no new chiral center is formed.

> The bicyclo[3.1.0]hexane ring system, highlighted in compound 3, is found in several natural products, including sabinene, a compound partially responsible for the flavor of ground black pepper. One method for preparing this ring system involves the conv

> Draw a mechanism for each of the following transformations:

> Identify the reagents that you would use to achieve each of the following transformations:

> Draw the expected major product for each of the following reactions:

> Reserpine can be isolated from the extracts of the Indian snakeroot Rauwolfia serpentina and has been used in the effective treatment of mental disorders. R. B. Woodward employed the following reaction sequence in his classic 1958 synthesis of reserpine.

> Propose a plausible mechanism for the following transformation, which was used as the key step in the formation of the natural product heliol.

> 9-Borabicyclo[3.3.1]nonane (9-BBN) is a reagent commonly used in the hydroboration of alkynes (Section 10.7), but it can also be employed in reactions with alkenes. The following table provides the relative rates of hydroboration (using 9-BBN) for a vari

> The following table provides relative rates of oxymercuration for a variety of alkenes with mercuric acetate. Provide structural explanations for the trend observed in the relative rates of reactivity. Alkenes…………………………Relative Reactivity CH2C(CH3)(CH2C

> For each of the following compounds, identify the expected chemical shift for each type of proton:

> For each of the following compounds, determine whether the two protons shown in red are homotopic, enantiotopic, or diastereotopic:

> John Dewey is the husband of Mary Dewey. He is also the CEO of a large public relations firm. Mary recently filed for divorce, alleging mental brutality, and is asking for half of John's and the couple's assets. In the six months prior to being

> Download and install a network sniffer application like Wireshark, tcpdurop. Sniff the traffic on your local network for 10 minutes and report on your experience. 1. What did you find? 2. Why do these applications exist? 3. How does their existence

> In the fall of 2001, Enron, the eighth largest corporation in the United States, declared bankruptcy unexpectedly, and investors lost approximately $60 billion. From your reading about this famous case, did Enron's bankruptcy involve fraud? If so, what t

> As the new intern for the summer, you have been asked to investigate two methods of e-mail encryption: S/MIME and Pretty Good Privacy (PGP). Compare and contrast the two systems. 1. Why do two standards exist? 2. Which do you think your employer should

> Your company, ABC Reading, writes unique OpenGLbased reading software for children in grade school. ABC employs about 30 sales representatives who interact with school districts around the nation to sell and support your software. ABC has given each sale

> Colleen Matthews had just turned 22 when her hard work finally started to pay off. Six months earlier, Colleen had graduated from a state university with a master's degree in accounting. Colleen graduated with honors and was one of the youngest in her cl

> Dan Jones is the new CIO of Ricochet Systems, an Internet securities broker. After assessing the e-commerce risks in his company, he determines that passwords are a weak link that needs additional protection. However, he is unsure as to what the requirem

> You have been asked by a small credit union to help investigate an alleged fraud in a bankruptcy case in which it is involved. It wants you to start right away because it is worried that the debtor will destroy evidence vital to the case. The credit unio

> John and Sally have recently been experiencing serious marital problems. They are seeing a counselor in order to "save their marriage." During the past several months, John has been selling their recreational assets including an expensive boat, snowmobil

> Bill and Sue were college students when they met each other in the library and began dating. After a few short months, they decided to get married. After a time of marital bliss, both Bill and Sue discovered the relationship was not what they had planned

> 1. Fraud auditors should be equally concerned with liabilities being overstated as well as understated. 2. Proactive searching for analytical symptoms means that we are looking for accounts that appear too high or too low or that are unusual in some ot

> Liz Clayton, supermodel and wife of Andrew Dyce, better known as Flash, lead guitarist and vocalist for the popular heavy metal band Flash Metal, is filing for divorce. Each cited that their careers kept them separated and that they have drifted apart ov

> BBB Company has been a successful manufacturer of quality electronics products for the past 20 years. It is a publicly traded company with I million shares outstanding. During the past three years, the company has fallen on hard times. Profit margins in

> After a jury trial, Charles H. and his parents, Charles M. and Helen J. of White Plains, New York, were found guilty on charges of theft of public funds, wire fraud, bankruptcy fraud, and money laundering conspiracy. The charges arose from the family's s

> One of the riskiest parts of an e-commerce transaction is the payment process. Several different companies, such as Authorize.net, Google, and Yahoo! checkouts, and others provide robust solutions for this risky process. Pick a provider that services the

> eBay has become one of the most popular auction sites in the world. Each day, millions of products and services are bought and sold on the site. Because of its popularity, eBay is also a home for many different types of scams. Your business wants to star

> Your company, ImSecure Inc., is a security investigation firm. You have been contacted by Darling Company, a producer of cardstock for greeting card companies like Hallmike and Birthday Wishes Company. Darling currently requires orders to be placed sever

> Your best friend Sue has always wanted to be an FBI agent for the U.S. government. However, because of the recent restructured changes in the FBI (due to the increased terrorism threat), Sue is uncertain whether she wants to pursue an FBI career. She fee

> You are trying to sell your car. You have been trying to sell it for a while and have it posted on an online classified ad. You receive the following e-mail: Hello. My name is David Meganimus, and I am an assistant to the Greek ambassador to the United S

> Trek, Inc., has experienced two bad financial years, resulting in too few assets remaining to pay creditors in full. Trek, Inc., wants to file for bankruptcy. What are its options, and which one would be best for Trek, Inc.?

> You have been hired as a fraud auditor to examine the assets of a company that recently filed for Chapter 11 bankruptcy. The company manufactures and sells circuit boards for children's computerized toys. You have access to its financial statements and w

> 1. Focusing on changes in financial statements from period to period can help identify analytical fraud symptoms. 2. Controls over inventory should be closely examined when searching for fraud symptoms. 3. The gross profit (margin) ratio is calculate

> Attorney Mark E. of Newport, Virginia, pleaded guilty to wire fraud in the Eastern District of Virginia, based on his actions of embezzling from a client in Chapter 13 bankruptcy. Mark embezzled more than $22,000 intended for payment to the client's mort

> Look up the U.S. Trustee Program's 2012 Annual Report at http://www.justice.gov/ust/eo/public_affairs/ annualreport/docs/ar2012.pdf. 1. How is a trustee defined? 2. What are the functions of the trustee program? 3. The program routinely hires bankrup

> Willy and Buck Forsythe are brothers who often engage in shady business deals and regularly swindle honest people out of their money. Willy and Buck have decided to take their business to a new level. There is a small hardware store in town with a good r

> Steve Stevenson had noticed that the contracts for custodial work for the schools in the district in which he worked had almost all been going to the same custodial company, Johnson Cleaning, and it seemed to just barely manage to be the lowest bidder on

> Hospital administrator Jake Rosen9 was recently convicted for fraud he committed against his employer, Cedar Hospital Systems. Over a period of six years, Jake allegedly made payments to a dummy company for maintenance charges while simultaneously runnin

> You have been searching for a job for some time. One day, while searching through some online want ads, you see the following advertisement: Wanted: Persons seeking high paying corporate jobs in the Cayman Islands. Live the life of your dreams as you wor

> On September 24, 2007, Miguel Carcamo was going through his mail. For some reason, Miguel had not yet received his bank statement, which he usually received at the beginning of each month. Although he was concerned, he took no action and decided not to w

> You work as the assistant to the controller of a small, privately owned company. Part of your job is to create weekly reports of the company's inventories. For the past several months, you have been excluding from your report a room full of damaged and/o

> The following paragraph from the FTC's pamphlet "When Bad Things Happen to Your Good Name" describes the headaches for identity theft victims trying to restore their credit. Unlike victims of other crimes, who generally are treated with respect and symp

> 1. Understated revenues and understated net income are among the most common types of financial statement fraud. 2. Two reasons revenue-related financial statement fraud is so prevalent are because revenue recognition can be highly subjective and becau

> Several years ago, a medical device company was charged with improperly recognizing approximately $1.5 million in revenue from bill-and-hold transactions. One distributor placed orders with the medical device company for a total of approximately 15,000 u

> Introduction Home Safety, Inc.'s management has been trying for months to acquire one of its largest competitors in the home security industry- LockIt-Up Company. Before agreeing to the acquisition, Home Safety's board of directors wanted Lock-It-Up's bo

> For many large, international companies that do business in less developed countries, corruption is a part of everyday life. Without bribing public officials, their companies could never build a factory, hire employees, get permission to build infrastruc

> John is a waiter at a local diner. The diner has a policy that tips are to be pooled between the waiters. Accordingly, each night the cash tips are collected, pooled, and divided up between the various waiters. Then, when employees are paid by the diner,

> Every year, Transparency International makes public its "Corruption Perceptions Index," a measure of how corrupt different countries are in relation to each other. Go to http://cpi.transparency.org/cpi2013/ and learn about the index. 1. Which are some o

> Match the following terms with their corresponding definitions: Billing scheme Asset misappropriation Check tampering Disbursement fraud Expense scheme Investment scam Illegal gratuities Lapping Payroll fraud scheme Skimming 1. Scheme in which

> Hank just loves his new job as a sales clerk at the local classy department store, Fashion's My Style•. It's a great way for him to earn a few dollars while attending high school Not only does his job pay quite well, but it allows him to receive discount

> Regina recently landed her dream job at a local clothes outlet. Within a few weeks of working in her new employment, however, Regina began to engage in fraud. Regina committed the fraud by doing the following: When people returned merchandise, Regina wou

> Jill has recently begun working at a local florist. In addition to creating floral arrangements, Jill spends a good deal of her time talking to customers and ringing up sales. Over time, she identifies a weakness in the procedures for ringing up voids. N

> Ken was the only accountant for a small-town land development company. He was terminated when the company fell on hard times. One year later, when the owner of the company was reviewing the payments received from a landowner for development cost, he disc

> 1. Recording fictitious revenues is one of the most common ways of perpetrating financial statement fraud. 2. Most often, the controller or chief financial officer (CFO) of a corporation is the perpetrator of financial statement fraud because of his or

> In its 2001 annual report, investors of Adelphia Communications were startled to find a footnote in its financial statements that reported the company had guaranteed as much as $2.7 billion in loans to a private entity owned by CEO John Rigas and his fam

> Ed Neilson is the purchasing agent for Style, a nationwide high-fashion women's online store. He joined the company after graduating from college five years ago. Over the years, Ed developed a close relationship with one of the company's vendor's owners-

> In a Las Vegas casino, an employee discovered a flaw in the accounting system. The accounts payable clerk discovered that he was able to change the names of vendors in the computer system to his name. As a result, the employee could create false invoices

> ABCDE Technologies, Inc., designs, manufactures, and markets an extensive line of PC cards. The company sells its PC cards primarily to original equipment manufacturers (OEMs) for industrial and commercial applications in a market with intense competitio

> During the audit of a manufacturing client, you are instructed to do vertical and horizontal financial statement analyses. In your analyses, you notice little increase in the client's overall long-term liabilities. However, you remember that a note was e

> The following two comparative balance sheets and statements of income are for XYZ Company for the years 2015-2017: Calculate all ratios needed to determine if XYZ is possibly underreporting accounts payable. If you detect possible fraud, explain why y

> The officers of an oil refiner, trader, and hedger based in New York were arrested by the FBI for committing massive financial statement fraud. The executives used many schemes to perpetuate the fraud, one of which was to hide a $30 million accounts paya

> Until its involvement as Enron's auditor, Arthur Andersen was recognized as one of the most respected CPA firms in the world. Arthur Andersen, as did other large CPA firms, operated as a limited liability corporation, or LLC. At the time that its involve

> Qwest is the dominant local telephone company in 14 states and the owner of an international fiber-optic network. In 2002, the company was investigated by the SEC for not including certain expense items related to its merger with U.S. West, among other i

> Enron is a large energy trading company that allegedly committed massive fraud. Enron's primary method of committing fraud was to record liabilities in related partnerships, then known as special purpose entities, which were not consolidated, or combined

> 1. Unlike other types of fraud, financial statement fraud is usually not concealed and is therefore relatively easy to spot. 2. Fraud indicators, or red flags, can be caused by fraud or by legitimate, non-fraud, factors. 3. Without a confession, forg

> In 2005, the SEC filed a civil action suit against Samuel Israel III and Daniel E. Marino, managers of a group of hedge funds known as the Bayou Funds. The SEC alleged that Israel and Marino defrauded millions of dollars in investor funds for their perso

> You keep looking over the financial statement to see where your analysis is going wrong, but you can't see any problems-it just looks like inventory is getting larger and larger, but you know that you haven't seen growth in the actual levels of inventory

> David Sutherland, a partner and fraud examiner in Rachin Cohen & Holtz LLP, was driving to a client when he heard a CNN announcement that LucidCom, a newly emerged provider of network infrastructure and connectivity products, reported strong fourthquarte

> In November 2017, Wehav Funds, a profitable engineering firm, signed a Joan guarantee as a third party for No Certainty Company, a newly formed organization focused on pharmaceutical research and development. Because Wehav Funds was a reputed and success

> On a beautiful spring morning in 2015, Stephen Lowber, chief financial officer of Cutter and Buck, Inc., slowly arose from his bed, walked across the bedroom floor, and gazed out the window. It was a surprisingly clear, sunny day in Seattle, Washington.

> John is the manager of a small computer sales and support chain. He has stores located throughout the state of California and is in strong competition with all of the major computer providers within that state. John's company is known for providing quick

> Your auditing firm has just landed a new client a large software company managed by two brothers who together own IS percent of the stock. You learn that the company fired its last auditor. You also notice that the company is involved in a lot of off-the

> Decide whether each situation is or is not a symptom of revenue fraud. Then explain 1. why the situation is or is not a symptom and 2. if it is a symptom, how it would be found using computer queries or traditional methods. Y/N Sales discounts appear

> Tool Co. is a medium-sized company that buys copper rod and plastic materials to produce insulated copper wiring. Tool Co. operates out of a single building of about 500,000 square feet that includes office space (3%), production area (57%), shipping and

> Fraud investigators found that 70 percent of the nearly $!60 million in sales booked by an Asian subsidiary of a European company between September 2006 and June 2007 were fictitious. In an effort to earn rich bonuses tied to sales targets, the Asian sub

> 1. Telling a significant lie and getting away with it during an interview is usually very difficult if the interviewer is well trained. 2. If a suspect continually repeats phrases, words, or your questions, it could be a verbal cue that he or she is lyi

> Perform vertical analysis of the data in the previous table to indicate any potential red flags regarding possible understatement of the COGS. FIVE-YEAR FINANCIAL DATA FOR COMPANY A YEAR I YEAR 2 YEAR 3 YEAR 4 YEAR 5 Sales $100,000.00 $105,000.00 $11

> Perform horizontal analysis of the data in the previous table to indicate any potential red flags regarding possible overstatement of sales. FIVE-YEAR FINANCIAL DATA FOR COMPANY A YEAR I YEAR 2 YEAR 3 YEAR 4 YEAR 5 Sales $100,000.00 $105,000.00 $110,

> The following information is provided for TechnoWorld, a company specializing in providing Internet technology assistance for clients: Perform a horizontal analysis of this balance sheet and identify any accounts that may be questionable. Take into acco

> Thomas is the CEO of a business that just went public. He is feeling intense pressure for the business to succeed because all of his relatives have invested heavily in his company. Since going public, sales have been flat, and Thomas is worried about not

> Although financial statement fraud can be committed in many different ways and by people in different positions, history shows that people in upper management who have added pressures as well as more opportunities to commit fraud commit the majority of f

> Financial statements are the end product of the accounting cycle and are used by investors to make informed decisions. They can be analyzed to help determine if there are any fraudulent activities in the company. As you know, the balance sheet, income st

> Pablo is studying financial statements to decide which companies would be wise investments. Pablo identifies Jawanna Corporation as having abnormally high financial ratios compared with other companies in its industry. Skeptical, he examines the footnote

> Your father-in-law owns a medium-sized air conditioning company in Meza, Arizona. Because of the heat in Arizona, the company has done rather well and the business is continually growing. Your father-in-law has received tips from other employees that one

> After graduating from college with your MBA, you decide to take your grandma's secret cinnamon roll recipe and open up a bakery. You grew up devouring your grandma's rolls. and you have convinced her to give you the secret. You are confident that your ba

> Paying for information is one type of extrinsic reward. Some professionals may require that you pay them for their interview time or information. What concerns does this raise? How might it jeopardize your case? When might it be appropriate or not approp

> During the audit of a major client, you notice that revenues have increased dramatically from the third to the fourth quarter and especially over the same periods of last year. You've received tips alleging that the company is overstating its revenues. W

> 1. Ghost employee schemes usually generate the largest losses among the payroll disbursement fraud schemes. 2. Corruption is divided into four fraud scheme types: (1) bribery, (2) conflict of interest, (3) economic extortion, and (4) illegal services.

> Most illegal transactions such as drug deals and terrorist activities are conducted in cash. Why is it important for criminals to get their cash deposited into financial institutions?

> Why do you think the hiding of assets is so common in bankruptcy and divorce fraud cases?

2.99

See Answer