Winkers The Fraud Triangle Case Study

Good Essays
Mogel’s Incorporated had multiple issues that produced the opportunity for Stefan Winkler to commit the crimes that he carried out. The main issue was the amount of access to Mogel’s assets Winkler had. As a result of this access and know how, Winkler had all opportunities in the world to steal as much as he did. If Mogel Inc. would incorporate a few tactics to strengthen their internal controls they could prevent this type of fraud within their business. Stefan used multiple types of skimming in order to carry out his crimes. The majority include Skimming and lapping of Accounts receivable, which are a result from poor collection procedures and poor supervision from higher management. By applying the basics of Cressey’s study to analyze winkers …show more content…
The first consist of situational pressure, which include personal or work related stressors. Stefan’s pressures included the recent loss of his home, and other financial downfalls. Leg two consists opportunity, involving direct access to assets. In this case Winkler had control over many cash assets, along with extensive know how to cover his tracks for the time being.(Hall, 2013) The last portion of the fraud triangle involves rationalization, or the ethic views of the perpetrator. (Hall, 2013)/(Wells, 2014) Clearly Stefan had a terrible conscience, he made unethical decisions and it cost both Mogel and Winkler. Ten suggestion that could help the Mogel Inc. Include the following:
1) Mogel collection system creates a big issue, which gave Stefan the chance to commit his crime. Because Stefan has access to both area where revenue, he was able to steal from the company. Page 62 in wells text book, explains that by providing extra oversight presence skimming opportunities should decreases would should prevent future criminal
…show more content…
(Wells, 2014) Because of his position Winkler had access to multiple different financial statements. By stealing and destroying the documents he made it tough to prosecute. By adding an electronic filing system and backup copies non accessible to anyone other than top management, Mogel Inc. could have avoided this issue, and prevent it from happening again.
9) By adding computer programs that regularly audit the companies statements is another preventive control that could be set in place to detect fraud. Although Computer programs are only as good as the program itself, it still one step that could truly help prevent Winkler’s crime from happening again.
10) Running trend analysis on aging of customer accounts can also be used to detect skimming. (Wells,2014) A rise in the number or size of overdue accounts could be a sign of an employee skimming from the company.(Wells, 2014) By running this program, Mogel Inc. could detect Skimming earlier before it’s too late and employees like Winkler walk off with over 350,000 dollars of their

Related Documents

  • Decent Essays

    It is sad because someone will profit off of another loses. Identity theft is where the illegal use of someone else 's personal information especially in order to obtain money or credit (Johnson, 2014). When it comes to identity theft there are all types of ways to commit identity theft. This paper will be an overview over all aspects of identity theft. After reviewing…

    • 1648 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    The accounts may also be deactivated after the dealing meaning no trail left to follow up. In other cases, the perpetrator uses programs that give IP addresses with misleading locations. E-commerce, therefore, need to be advanced as technology advances to reduce the cases of such incidences. It is, therefore, recommendable to prevent identity theft by keeping consumer information out of criminal’s reach, making it more difficult for perpetrators to misuse data and deterring…

    • 1498 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    People found guilty of the crime can be penalized strictly. It is a fact that one usually does a lot of downloading from different websites, thus a pirate is very susceptible to downloading a Trojan or spyware .If he is caught, and the company decides to press charges, this can lead to stiff fines and prison time. It is like you are taking the product of another person without prior permission or payment to the owner. Risky: Pirated software can be easily infected with serious computer viruses, which can damage the user's computer system. If we acquire a fake software, and it suddenly crashes, we will not be able to complain about the defective purchase as it's fake.…

    • 2800 Words
    • 12 Pages
    Decent Essays
  • Decent Essays

    Credit Card Fraud Case Study

    • 2744 Words
    • 11 Pages

    Shewood (2008) further mentions that merchant/employee mischief can also occur where the merchant/employee eavsdrop the customers PIN and after the transaction, perposely retains the customers credit card with the hope that the customer will forget the card. An illustration ,by Mehan (2012), of the positions of a customer and the merchant/employee when performing a transaction is dipicted in the figure…

    • 2744 Words
    • 11 Pages
    Decent Essays
  • Decent Essays

    Revenge of the Cube Dweller Book Report Revenge of the Cube Dweller by Joanne Fox Phillips presents a story of corporate fraud, cover-up, and manipulation. In the text, Tanzie Lewis exposes the crimes she has committed in the past. However, the major question remains if she has learned any lessons from the dirty dealings that she was a part of. The presented analysis outlines a book report on Phillips work. Fraudster’s Fraud Triangle Elements Pressure The desire to achieve self-gains is one of the factors that drive the actions of a fraudster who engages in corporate fraud.…

    • 821 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Sounds like a great idea in theory to bridge this gap and really it is something that should be more thoroughly worked on, but instead it is being used as a lie so that companies can ship a whole bunch of electronics that would cost too much to actually fix locally in the US, than they are worth. Another issue with this whole “bridging the digital divide” nonsense is that they are sending mostly broken and unfixable products. These countries are then forced to try to sort through hundreds of broken products to find maybe one or two that actually work. Then there is the issue of people attaining hard drives that belonged to the previous owners. Some of these computer hard drives are being sold on the black market and to crime lords that can easily access information left behind and can be used to steal identities, money or even be a possible threat to the previous owners, all because they trusted that their product would actually be recycled ethically.…

    • 1252 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    The Criminal Defense Lawyers say that “Like all criminal laws, identity theft laws differ from state to state, and there are also federal identity theft laws that have their own penalties. Being convicted of an identity theft crime can lead to incarcerations, fines, restitutions and probation.” In my opinion, I think that they should get a lot more than this. People that try and do steal people’s identity should have major consequences such a large amounts of jail time, really big fines and no chance of probation. These people that want to hide behind a computer deserve to get a large punishment. They really can ruin someone’s life in a matter of seconds just because they felt like they need to get their…

    • 1122 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    In order to get a confirmation, the auditors will ask the company 's bankers to verify that the balances of bank accounts have been fairly presented. In this case though, since only Wasendorf had seen the actual bank statements, he was able to forge a confirmation letter from the bank confirming what his otherwise forged statements had presented. This would signify a weak internal control and should have been flagged and should have been confirmed by going directly to the bank. During an audit, most auditors believe that confirming cash balances is mostly tedious, this makes it easy to commit fraud as they will not actually did that deep into the cash because a company normally either has cash or does not have the cash. Some inherent risks of Peregrine would include the complexity of their transactions, the complicated relationships that they hold with other companies, how the company has a large number of investor and client relationships and related parties are less transparent than separate entities.…

    • 1322 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    As stated before, Apple 's best interest is to look out for their customers and the FBI has spent more time over simplifying the truth. The FBI handles their issues much more differently than Apple does, they claim that they only want one piece of software from Apple but later they will undeniably ask for more. Furthermore, according to source G, a similar case to that is the one of Lavabit, when the founder Ladar Levison had to install a pen to obtain the metadata which eventually resulted in his company shutting down. However the FBI demanded for Levison’s company encryption key, the same is likely to happen to Apple if they create the operating system. The FBI operates so they can get whatever they need from a company, whether it 's an encryption key or any additional needed information, they fail to keep in mind that these demands will deteriorate a majority of these companies customer’s privacy.…

    • 1143 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The primary criminal use of stealing a victim’s information is credit card fraud. Apart from using the credit card for purchasing stuffs, criminal will change the victim’s address so that they will not be able to receive the bills and see the charges they did not make, this will allow the criminal more time to abuse the victim’s identity and credit. The criminal too could use open new accounts in the victim’s name. This will result in more incurring charge on the victim line of credit. The Identity Theft Resource Centre has predicted that organised crime groups will be more involved in identity theft related crimes and it will not only be restricted in the U.S or American but will go beyond…

    • 1253 Words
    • 6 Pages
    Decent Essays