There are 5 different color houses, occupied by people of 5 different nationalities, who smoke 5 different cigar brands, drink 5 different types of alcohol, and have 5 different pets. The houses are lined up in a row. 1. The Brit lives in the red house. 2. The Swede keeps dogs as pets. 3. The Dane drinks tea. 4. The green house is on the left of the white house. 5. The green house’s owner drinks coffee. 6. The person who smokes Pall Mall rears birds. 7. The owner of the yellow house smokes Dunhill. 8. The man living in the center house drinks milk. 9. The Norwegian lives in the first house. 10. The man who smokes Blends lives next to the one who keeps cats. 11. The man who keeps the horse lives next to the man who smokes Dunhill. 12. The owner who smokes Bluemasters drinks beer. 13. The German smokes Prince. 14. The Norwegian lives next to the blue house. 15. The man who smokes Blends has a neighbor who drinks water. Question: Who owns the fish?
> How might documents be altered?
> What remedies are available through the civil and criminal justice systems?
> How do witness interviewing and interrogation differ?
> What is meant by invigilation?
> What are the different types of commercial damages?
> Is earnings management considered fraud?
> How is materiality determined?
> What are the similarities and differences between analytical and accounting anomalies?
> What is meant by behavioral red flags?
> A scientist has an unlimited water supply and two buckets, one holds 4 gallons and the other holds 9 gallons. By using nothing but the buckets and water, how can he accurately measure 7 gallons of water?
> What are the factors that affect the decision to prosecute an entity?
> What must an injured party prove to be successful in a claim for damages?
> What is meant by demonstrative evidence? Give examples.
> How do pay-and-return schemes work?
> What are some non-verbal clues to deception?
> What are some of the verbal clues to deception?
> Why is it advisable to obtain a written confession from the subject of an investigation?
> What is the “expectations gap”?
> What constitutes “good cause” in the discharge of an employee?
> What are the various categories and calculations used in ratio analysis?
> Why are introductory questions so important to an interview’s success?
> What are the three types of evidence that may be offered at trial?
> What are the challenges associated with proving intent on the part of a fraudster?
> How is the threshold for predication determined?
> Where may fraud examiners and forensic accountants find data?
> When is it appropriate to use an indirect method for income reconstruction?
> What is a kickback scheme and how is it committed?
> What are some ways that may be used to hide assets?
> Generally, how is the problem of management override and collusion addressed?
> What are the primary responsibilities of management?
> How can conflicts of interest be prevented and detected?
> What are the main components of the fraud risk assessment process?
> How did the Sarbanes-Oxley Act address corporate governance and public accounting responsibilities?
> What are the three major types of negotiated remedies and how do they differ?
> What is the discovery process and how does it work?
> A scientist has an unlimited water supply and two buckets, one holds 4 gallons and the other holds 5 gallons. By using nothing but the buckets and water, how can he accurately measure 3 gallons of water?
> What is meant by “hacking?”
> What methods are used by insiders to commit computer fraud? What red flags might indicate that insider computer fraud is occurring?
> Which types of economic damages are related to computer crimes?
> What is included as an expert’s work product?
> What is the difference between computer fraud and computer crime?
> How are computers used in cyber-crime?
> Which federal law enforcement agencies investigate domestic Internet crimes?
> What is a shell company and how is it formed?
> Why is Internet fraud particularly difficult to police?
> What are some indicators that a computer has been infected?
> List and describe various types of computer viruses.
> How do computer viruses work?
> How might a hacker access and manipulate a computer for illegal purposes?
> How are the objectives of terrorists and organized criminals different?
> What types of damages may ensue as a result of personal injury, wrongful death and survival actions?
> Why is financial statement fraud often considered a complex fraud?
> How is the concept of an “organization” involved in mixing illegal activities with legitimate ones?
> How do fraudulent disbursements at the cash register differ from other register frauds?
> What is the difference between a predator and an “accidental fraudster?”
> How have some of the more common securities fraud schemes been perpetrated?
> What is a documentary letter of credit used for?
> What are the different types of banks in the U.S. banking system? How are they different?
> Discuss the essence of organizational crime.
> Compare and contrast Cressey and Albrecht’s theories of crime causation.
> Describe occupational fraud and abuse.
> Identify ethical issues, conflicts of interest, and non-compliance with corporate policies and procedures in the Enron case.
> What are the considerations related to forecasting income and cash flows?
> Analyze the role of corporate governance mechanisms in fraud prevention.
> What red flags are commonly associated with fictitious expense schemes?
> Give examples of behavioral indications of fraud.
> Discuss alternative courses of action in the Enron case within the framework of appropriate ethical conduct.
> Which professional organizations support fraud examination and financial forensics professionals? What certifications do they offer?
> What employment opportunities currently exist for fraud examiners and financial forensics specialists?
> What is the role of research in the fraud examination and financial forensics professions?
> According to this chapter, what employment trends are expected for professionals in the fields of fraud examination and financial forensics? Why?
> What international opportunities exist in fraud examination and financial forensics?
> Explain the differences between an audit, fraud examination, and forensic accounting engagement.
> Describe the services that a forensic accountant might provide related to a marital dispute.
> How may lost profits be calculated using typical benchmarks?
> What is a ghost employee and what are the four steps needed to make this scheme work?
> Differentiate between fraud and abuse.
> Define fraud and identify a potentially fraudulent situation.
> What two points must an injured party prove to recover money in a civil lawsuit?
> What is meant by remediation?
> What is meant by corporate governance and why is it important?
> What is a deposition and why is it used?
> When may an expert’s opinion be subject to challenge?
> What is the difference between fact witnesses and expert witnesses?
> What are some of the ways in which financial statement fraud is committed?
> Why might senior management overstate or understate business performance?
> How may theft and alteration of outgoing company checks be prevented and detected?
> How can understating liabilities and expenses make a company appear more profitable?
> How are fictitious revenue schemes committed?
> What is the conceptual framework for financial reporting?
> What is defined as “something of value?”
> What are the different types of corruption schemes?
> What is the difference between fraud prevention and fraud deterrence?
> How does the “perception of detection” impact fraud deterrence?
> What legal mechanisms may be used to recover assets in the civil or criminal justice systems?
> What are the differences between forged maker and forged endorsement schemes?
> Which is the most effective control to prevent receivables skimming?
> What steps should an organization take to prevent fraudulent shipments of merchandise?
> How may the larceny of noncash assets be prevented?
> What types of company assets are typically misused?