• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/90

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

90 Cards in this Set

  • Front
  • Back
Discipline of Fraud Examination
resolving allegation of fraud from tips, complaints, or accounting clues
Methods to resolve allegations
documents, interviews, investigative reports, testifying, assisting in the detection of fraud
Predication
circumstances that would lead a reasonable person to believe fraud has occurred, is occurring or will occur
Fraud Theory Approach
analyze data
create hypothesis
test hypothesis
amend hypothesis
Tools Used in Fraud Examination
document analysis
neutral third-party witness
corroborative witnesses
co-conspirators
target
Elements of Fraud
material misstatement
knowledge of the material misstatement
reliance on the information
damages resulting from the reliance
Fraud Traingle
pressure
rationalization (controllable)
opportunity
Fraud Triangle creator
donald cressey
White-collar crime creator
edward sutherland
most often position of fraudster
employee
most losses of fraudster
executive
most likely department
accounting
most loss by department
executive
most often initial detection
tip
types of occupational frauds
corruption
asset misappropriation
fraudulent statements
most frequent type of fraud
asset misappropriation
most losses come from
fraudulent statements
important of skepticism
increases the perception of detection
professional skepticism traits (7)
informed
independent in mind
persistant
ethical
perceptive
effective communications
question without adversary
skepticism during observation (2)
walk throughs:
1. perpetrate
2. conceal
3. conspire
4. override
lifestyle changes
skepticism during document reviews (3)
concealment techniques
1. modification
2. duplication
3. withholding
third party confirmations
use of experts
skepticism during interviews
investigate inconsistencies
signs of deception:
1. vocal clues
2. nonvocal clues
3. verbal clues
types of skimming
sales
receivables
refunds
skimming
theft of cash prior to its entry in the accounting system
most often asset misappropriations
cash (most often and most loss)
most frequent & biggest losses cash misappropriations
fraudulent disbursements
sales skimming
employee makes a sale, collects the payments and makes no record of the transaction
sales skimming prevention & detection (5)
perception of detection
oversight presence
video cameras
maintain activity logs
incoming mail opened in supervised area
receivables skimming
employee records sale, collection is expected, customer is notified when sale isn't received
types of receivable skimming
write-off
lapping
unconcealed
lapping
using one customers payments for another
hiding receivable skimming (5)
force balancing
stolen statements
fraudulent write-offs
debiting wrong account
destroying records
receivables skimming prevention & detection (3)
improve controls (vacations, auditing)
search for accounting clues
trend analysis
types of cash larceny (3)
cash on hand
incoming receivables
from the deposit
cash larceny stats
least common and least amount of losses
cash larceny
theft of incoming payments that have already been recorded on the books
larceny at point of sale
most common point of access to ready cash--imbalance between register amount and cash drawer
ways to conceal (5)
theft from other register
many small thefts
reversing transaction
altering cash counts
destroying register tapes
point of sale prevention & detection (4)
separation of duties
independent checks
cash to cashier's office
run reports
larceny of receivables
theft occurs after payment has been made resulting in an imbalance of cash
larceny from the deposit
individual who brings the money to the bank has an opportunity to take the deposit
deposit lapping
day 1 deposit is stolen and replaced by day 2 deposit
deposit in transit
missing money is carried as a deposit in transit but never hits the bank statement
deposit larceny prevention & detection (4)
separation of duties
incoming revenue to a centralized area
authenticated deposit slips
deposits at night drop box
types of billing schemes (3)
shell company
non-accomplice vendor
personal purchases
most frequent fraudulent disbursement
billing
most losses for fraudulent disbursement
check tampering
billing schemes
uses false documentation to cause a payment to be issued for a fraudulent purpose
shell schemes
fake entity created to commit fraud

(bank account, address, number, names, etc)
methods for shell schemes (5)
create false invoices
approve false invoice
collusion
purchase services
pass-through schemes
shell schemes prevention & detection (4)
regular updated approved vendor list
verify all vendors
identify shell invoices
test for shell schemes
1. pricing trends
2. budget overruns
3. compare vendor addresses
non-accomplice vendor schemes
payments owed to a legitimate vendor are intercepted and stolen or fake invoice is created to real company
non-accomplice prevention & detection (3)
incoming check should be attached to remittance
banks shouldn't cash checks payable to organization
spot check AP files
personal purchases with company funds
personal purchases unneeded assets
methods for personal purchases through false invoices (4)
authorizer for invoices
falsified documents
altering purchase orders
created false purchase requisition
personal purchase prevention & detection (4)
review of credit card statements
original support
two copies of credit card statements
monitor unexplained increases in purchases
types of check tampering (4)
forged maker
forged endorsement
altered payee
concealed checks
authorized maker
check tampering schemes
perpetrator physically prepares check depending on access to checks, bank statements, cash disbursement journal or ability to forge
forge maker scheme (def & 3 requirements)
employee misappropriates check and affixes the signature of an authorized maker

(access to blank check, good forging, ability to conceal)
forge maker prevention & detection (5)
safeguard checks
rules for custody
segregation of duties
rotate authorized signatures
limit access to signature stamps
forged endorsement schemes
employee intercepts a check intended for someone else and forges the endorsement
forged endorsement prevention & detection (7)
segregation of duties
training employees
investigate complaints
flag duplicate payments
restrict ability to make vendor checks
chart mailing
investigate cancelled checks
altered payee schemes
employee intercepts checks intended for third party and payee designation is altered
ability to alter
tack on letters
erasable ink
blank checks
altered payee prevention & detection (3)
separation of duties in check writing & reconciliation
compare canceled checks against entries
use carbon copies of checks
conceal check schemes
employee prepared fraudulent check and submits it with legitimate checks
conceal check prevention & detection (3)
(check signer generally is relied upon as control)

separation of duties
dual signatures for disbursement
up-to-date vendor list
concealing check tampering (5)
reconcile bank statement
re-alteration of check when return from bank
falsifying disbursement journal
reissuing intercepted checks
bogus supporting documents
electric payment tampering
gain access to employer payment system and tamper with information
electric payment tampering prevention & detection (5)
separation of duties
separate bank accounts for paper and electronic transactions
account monitoring
bank security services
bank security services (3)
ach blocks
positive pay
restive access to software
types of payroll schemes (4)
ghost employee
commission schemes
workers compensation
falsified wages
payroll schemes
person causes organization to issue a payment by making a false claim for compensation
ghost employee
someone on the payroll who does not actually exist
ghost employee prevention & detection (6)
separate hiring and payroll
maintain personnel records
verify changes to payroll
check payroll against terminated employees
run reports for SSN, no taxes, etc
proper distribution
falsified hours & salary
overpayment of wages by increasing hours worked or rate of pay
falsified hours & salary prevention & detection (6)
separation of duties
transfer of funds should be independent
sick/vacation should be monitored
authorize overtime
verify wages
no access to time cards after approval
tests for detecting payroll schemes (4)
review people with lots of overtime
trend analysis
large increase in wages should be checked
compare net payroll to checks issues
commission schemes
falsify the amount of sales make by creating false sales or overstating legitimate sales or increase rate of commission
commission schemes prevention & detection (4)
run reports
compare commission earned
track uncollected sales
random samples
expense reimbursement schemes (4)
mischaracterized expenses
overstated expenses
fictitious expenses
multiple reimbursement
mischaracterized expense reimbursement
fraudster seeks reimbursement for personal expenses
most often perpetrator?
high-level employees
mischaracterized expense reimbursement prevention & detection (6)
establish system of controls
original support documents
direct review of travel expenses
strict policies
scrutinize expenses paid by other dept
compare dates & prior years
overstated expense reimbursement (3)
altered receipts
overpurchasing
overstating another persons expenses
overstated expense reimbursement prevention & detection (5)
original receipts
verify photocopied receipts
book travel through company
compare employees expenses for inconsistencies
spot checks
fictitious expenses (3)
fake receipts
black receipts from vendors
claiming expenses paid by others
fictitious expense prevention & detection
look for high dollar items
rounded of expenses
same amount expenses
reimbursements just below the limit
over time expenses
not professional looking
multiple reimbursement schemes (3)
single expense several times
credit card receipts from corporate card
same expense to different departments
multiple reimbursement schemes prevention & detection
enforce policies
support documents
look at reports approved outside the dept
**reimbursement approved by direct supervisor
**policy that expenses have time limit