What employment opportunities currently exist for fraud examiners and financial forensics specialists?
> Why are introductory questions so important to an interview’s success?
> What are the three types of evidence that may be offered at trial?
> What are the challenges associated with proving intent on the part of a fraudster?
> How is the threshold for predication determined?
> Where may fraud examiners and forensic accountants find data?
> When is it appropriate to use an indirect method for income reconstruction?
> What is a kickback scheme and how is it committed?
> What are some ways that may be used to hide assets?
> Generally, how is the problem of management override and collusion addressed?
> What are the primary responsibilities of management?
> How can conflicts of interest be prevented and detected?
> What are the main components of the fraud risk assessment process?
> How did the Sarbanes-Oxley Act address corporate governance and public accounting responsibilities?
> What are the three major types of negotiated remedies and how do they differ?
> What is the discovery process and how does it work?
> A scientist has an unlimited water supply and two buckets, one holds 4 gallons and the other holds 5 gallons. By using nothing but the buckets and water, how can he accurately measure 3 gallons of water?
> What is meant by “hacking?”
> What methods are used by insiders to commit computer fraud? What red flags might indicate that insider computer fraud is occurring?
> Which types of economic damages are related to computer crimes?
> What is included as an expert’s work product?
> What is the difference between computer fraud and computer crime?
> How are computers used in cyber-crime?
> Which federal law enforcement agencies investigate domestic Internet crimes?
> What is a shell company and how is it formed?
> Why is Internet fraud particularly difficult to police?
> What are some indicators that a computer has been infected?
> List and describe various types of computer viruses.
> How do computer viruses work?
> How might a hacker access and manipulate a computer for illegal purposes?
> There are 5 different color houses, occupied by people of 5 different nationalities, who smoke 5 different cigar brands, drink 5 different types of alcohol, and have 5 different pets. The houses are lined up in a row. 1. The Brit lives in the red house.
> How are the objectives of terrorists and organized criminals different?
> What types of damages may ensue as a result of personal injury, wrongful death and survival actions?
> Why is financial statement fraud often considered a complex fraud?
> How is the concept of an “organization” involved in mixing illegal activities with legitimate ones?
> How do fraudulent disbursements at the cash register differ from other register frauds?
> What is the difference between a predator and an “accidental fraudster?”
> How have some of the more common securities fraud schemes been perpetrated?
> What is a documentary letter of credit used for?
> What are the different types of banks in the U.S. banking system? How are they different?
> Discuss the essence of organizational crime.
> Compare and contrast Cressey and Albrecht’s theories of crime causation.
> Describe occupational fraud and abuse.
> Identify ethical issues, conflicts of interest, and non-compliance with corporate policies and procedures in the Enron case.
> What are the considerations related to forecasting income and cash flows?
> Analyze the role of corporate governance mechanisms in fraud prevention.
> What red flags are commonly associated with fictitious expense schemes?
> Give examples of behavioral indications of fraud.
> Discuss alternative courses of action in the Enron case within the framework of appropriate ethical conduct.
> Which professional organizations support fraud examination and financial forensics professionals? What certifications do they offer?
> What is the role of research in the fraud examination and financial forensics professions?
> According to this chapter, what employment trends are expected for professionals in the fields of fraud examination and financial forensics? Why?
> What international opportunities exist in fraud examination and financial forensics?
> Explain the differences between an audit, fraud examination, and forensic accounting engagement.
> Describe the services that a forensic accountant might provide related to a marital dispute.
> How may lost profits be calculated using typical benchmarks?
> What is a ghost employee and what are the four steps needed to make this scheme work?
> Differentiate between fraud and abuse.
> Define fraud and identify a potentially fraudulent situation.
> What two points must an injured party prove to recover money in a civil lawsuit?
> What is meant by remediation?
> What is meant by corporate governance and why is it important?
> What is a deposition and why is it used?
> When may an expert’s opinion be subject to challenge?
> What is the difference between fact witnesses and expert witnesses?
> What are some of the ways in which financial statement fraud is committed?
> Why might senior management overstate or understate business performance?
> How may theft and alteration of outgoing company checks be prevented and detected?
> How can understating liabilities and expenses make a company appear more profitable?
> How are fictitious revenue schemes committed?
> What is the conceptual framework for financial reporting?
> What is defined as “something of value?”
> What are the different types of corruption schemes?
> What is the difference between fraud prevention and fraud deterrence?
> How does the “perception of detection” impact fraud deterrence?
> What legal mechanisms may be used to recover assets in the civil or criminal justice systems?
> What are the differences between forged maker and forged endorsement schemes?
> Which is the most effective control to prevent receivables skimming?
> What steps should an organization take to prevent fraudulent shipments of merchandise?
> How may the larceny of noncash assets be prevented?
> What types of company assets are typically misused?
> How are noncash assets misappropriated?
> What is the difference between skimming and cash larceny?
> How do e-discovery rules impact the storage of email and other electronic files?
> Why is it problematic for an organization to set standards that are too high?
> What computer functions that can make recovering deleted files more difficult?
> What is computer forensics?
> What are the types of losses available for recovery?
> What are the two major approaches for testing IT system controls?
> How is case management software used in an investigation?
> What role do graphics play in an investigation?
> What functions are used by data extraction and analysis software to highlight red flags of fraud?
> What are the five types of interview and interrogation questions?
> What are some suggested approaches for conducting interviews?
> Why are interviews in fraudulent financial statements and tax returns handled differently than interviews in other fraud examinations?
> What type of abuses may occur at the pre-solicitation stage of the bidding process?
> How does the legal system differentiate between “following” versus “tracing” the money?
> What are some of the decisions that need to be made with regard to quantifying lost revenues and increased expenses?
> What are the most common measures of system performance in a queuing analysis?
> Describe two examples of unethical behavior related to waiting line management, and state which ethical principles they violate.
> The owner of Eat Now Restaurant implemented an expanded menu early last year. The menu was a success, drawing many more customers, who seemed to like the increased variety of menu choices over that of the previous menu. But good news soon became bad news