...The focus on fraud from a business perspective has significantly increased over the last decade. Every business, company or entity is subject to fraud risk; there is no immunity when it comes to fraud. There has been much legislation passed by the government and many new guidelines required by different accounting agencies. The Implementation or addition of an internal audit department has been wide spread. External audit independence, corporate governance and most recently the use of a fraud risk assessment have been a few recent developments of such new legislation and rules set forth. Businesses as well as the public were skeptical of the changes but admitted something had to be done. “The fraud triangle, developed by Donald R. Cressey, tells us that there are three interrelated elements that enable someone to commit fraud: the non-sharable financial need that drives a person to want to commit the fraud, the opportunity that enables him to commit the fraud, and the ability to rationalize the fraudulent behavior. The vulnerability that an organization has to those capable of overcoming these three elements is fraud risk,” (Wells, 2011). A fraud risk assessment is a process designed to proactively assess and correct these vulnerabilities to both internal and external fraud to defend against and reduce the chances of fraud. The objective of a fraud risk assessment is to identify and address these vulnerabilities to reduce that risk of fraud. In a 2008 study by the ACFE...
Words: 1260 - Pages: 6
...WorldCom history The history of WorldCom Company dates back in 1983 which started as a partnership between a former basketball coach Bernard Ebbers. This company was established at Mississippi as a coffee shop, which later developed to long distance Telephone Company. The company’s name initially was Long Distance Discount Service whose operations began on 1984. After several years in operation, the company became public in August 1989 with Bernard Ebbers as the company’s CEO (Moberg 4). Over the years, the company developed through mergers and acquisitions and becomes public in the year 1989. The notable merge which enabled the company to go public was the merger with the advantage companies Inc. This led to changing of the name from just LDDS to LDDS WorldCom in 1995 and to just WorldCom a year later (Moberg 4). In 1993, the company acquires long distance providers in the name of Resurgence Communications Group and Metromedia communications. This made history as the fourth largest long distance communication firm in United States. There were also several other mergers and acquisitions such as with IDB in 1994, WilTel in 1995, MFS communications in 1996, and the greatest merger which involved MCI communications. In 1998, WorldCom completed the merger with MCI at a cost estimated to be $40 billion. This was viewed as the greatest merger after brooks fiber properties and CompuServe which were valued at $ 1.2 and $ 1.3 billion respectively (Moberg 6). Another notable aspect...
Words: 2628 - Pages: 11
...THE ROLE OF INTERNAL AUDITING IN FRAUD PREVENTION AND INVESTIGATION. INTRODUCTION. Internal auditing is charged with the overall responsibility of reviewing, evaluating and monitoring the organization’s internal controls to ensure efficiency. Its functions include a detailed testing of transactions and balances, and performing routine or sometimes, random checks as a precautionary measure. During this process, an auditor might uncover fraudulent practices, which would otherwise have gone unnoticed. This paper intends to clarify the difference between auditing and fraud investigation, fraud indicators, highlight the role of audits in fraud prevention and investigation. THEORETICAL FRAMEWORK AND CONCLUSION. Paul A. Rodrigues said, “It has been aptly said that auditors look at the ‘donut’ and fraud examiners look at the ‘hole’” (Auditing vs. Fraud Examination, para. 2). That statement indicates a difference between auditing and fraud investigation; audits are reoccurring (on a regular basis), fraud investigations are not (only when there is sufficient predication); an audits scope is general, that of fraud investigations are specific (allegation based); an audit’s objective is to express a general opinion, a fraud examination’s is to affix blame where an allegation is confirmed (adapted from the ACFE Fraud Examiners Manual). That being said, an internal audit is party to a fraud investigation along side forensic investigators, legal counsel, law enforcement and the lot...
Words: 482 - Pages: 2
...• ACFE= Association of Certified Fraud Examiners; conducts comprehensive fraud studies; Report to the Nation on Occupational Fraud & Abuse • Fraud - deception that includes: a representation, about a material point, which is false, and intentionally or recklessly so, which is believed, and acted upon by the victim to the victim’s damage. Fraud is an act of dishonesty with the intention to deceive or cover the truth to gain an advantage. Most critical element: confidence. Fraud can be classified as (in terms of organization): against or on behalf of • Occupational fraud - use of one’s occupation for personnel enrichment through deliberate misuse or misapplication of the employing org’s resources or assets. Categories: Asset misappropriation (steal asset), f.s fraud (manipulate f.s), Corruption scheme (misuse connections). • Employee embezzlement-can be: direct (e.g: asset misappropriation, making dummy company and making employer pay for goods not actually delivered) (from perpetrator to employer); or indirect (corruption, taking bribes from outside) (3rd party involved) • Management fraud- aka financial statement fraud; involves top management’s deceptive manipulation of f.s.; more inclusive • Investment scam-consumer fraud: Ponzi scheme, telemarketing, identity theft, money scam, advance fee scam, letter of credit fraud, etc. • Vendor fraud-overcharge, send inferior goods, charge for goods not shipped; • Customer fraud-not pay, shoplift; • Miscellaneous¬-other ...
Words: 1542 - Pages: 7
...procedures, and poorly trained or supervised personnel, innocent errors or omissions, lost, erroneous, destroyed, or misplaced data, logic errors, systems that do not meet company needs or are incapable of handling tasks. MOST LOSSES OCCUR HERE! | Sabotage, which is destroying a system, computer fraud, misappropriation of assets, financial statement fraud, corruption. Deliberate destruction to harm a system. (Cookie: data website store on your computer that identify the site & you do not have to log on each time you visit the site) | * The Association of Certified Fraud Examiners (ACFE) 2014 Survey Results Show: * 5% of revenues are lost to fraud (≈ >$3.7 trillion lost globally) * Median loss: $145,000 (22% of cases involved with losses > $1,000,000) * Most frauds are fairly small in scope * Median fraud scheme lasts about 18 months * What is Fraud? * Gaining an unfair advantage over another person. All five of the following elements must be present for it to be legally considered fraud: 1. A false statement, representation, or disclosure. 2. A material fact that induces a person to act (influences the decision process). 3. An intent to deceive (not accidental). 4. A justifiable reliance; that is, the person relies on the misrepresentation to take an...
Words: 1792 - Pages: 8
...05/19/2013 forensic accountant CONTEMPORARY BUSINESS forensic accountant CONTEMPORARY BUSINESS 125/19/20135/19/20135/19/2013 fraud busters In today’s world, it is knows by everyone that different developments were taken place in the last periods. Our globalized world in a state of continuous technological change and innovations has been challenged by new generation criminology risk factors. From business, government, regulatory authorities, and the courts evidence indicates that a higher level of expertise is necessary to analyze current financial transactions and events. Forensic accounting is a specialized area of an accounting practice that describes engagements which results from actual or anticipated disputes or litigations. Forensic accounting has been defined as accounting analyzers that can uncover possible fraud that is suitable for presentation in court. A Forensic accountant needs accounting, law, finance, investigative and research skills to identify and prevent fraud. Forensic accountant uses her/his knowledge of accounting, law, and criminology to uncover fraud, as well as gather any evidence and present it to the court....
Words: 2300 - Pages: 10
...The Threat of Fraud Tracey Brewer American InterContinental University Security and Loss Prevention CRJS270-1301B-01 Jade Pumphrey March 28, 2013 Abstract Identity theft, whether on a personal or business level is a criminal act. So, for many years individuals have plotted and schemed to come up with scams to obtain personal information from other individuals or organization to either sabotage one’s reputation or obtain financial gain. Either way, this wave of criminal activity is wreaking havoc to innocent people and successful organizations everywhere. The Threat of Fraud Introduction Corporate fraud and executive identity theft are crimes that are on the rise. I don’t think corporations understand the impact this crime can have on their business. It only takes a few measures to ensure that the company is protecting against someone being able to access information that could bring the entire corporation to the ground. It can takes years to establish credit, build clientele and provide a service to the country or a community, however, it can only take the click of a mouse, that one email attachment or that one dishonest employee and your entire businesses financial data has been obtained, used or sold for the sole purpose of financial gain. Therefore, to protection your organization’s personal information. Well, it’s time to get the facts, take the necessary precautions, and start the process for what could be the first steps in protecting your organization...
Words: 1599 - Pages: 7
...is to always keep the operating system and applications current to the most recent release. This is because; all software is subject to a constant revision process as new security vulnerabilities are found and patches to correct any problems. Keeping antivirus up to date is also important. 2. Is a computer owner who refuses to purchase or use software and hardware to block attackers complicit when a bot herders attack, captures and then uses an unprotected computer to commit a crime? I think the computer owners should also be held responsible if any bot herder use the owner’s computer for criminal purposes. The owner should provide effective firewalls and other safeguards to their computer. 3. Do software developers shoulder some of the blame when they distribute operating systems and applications that include security flaws that make computers vulnerable? I don’t think so. Becacuse for me, nobody is perfect. Anyone is entitled for any lapses he or she may execute but that does not mean there will be no room for correction. If further development is needed, then it should be done in order to eliminate these bot herders who kept on seeking cybercrimes. 5.16 What are two tactics criminals use to commit credit fraud? What are two countermeasures financial institutions and retailers use to prevent credit fraud? 5.19 The meaning of the term hacker has changed overtime. Describe three phases it has gone through and what it meant it each phase. Explain the terms...
Words: 872 - Pages: 4
...The Fraud Triangle Abstract In 2002 SAS No. 99, Consideration of Fraud in a Financial Statement Audit describes the difference between material misstatements due to errors and intentional fraud and defines two types of intentional fraud: fraudulent financial reporting and misappropriation of assets. SAS No. 99 also introduced D. R. Cressey’s theory of the fraud triangle which is so named because it consists of three conditions that are generally present when fraud occurs: incentive/pressure, opportunity, and attitude/rationalization. Introduction This paper reflects on SAS No. 99 to describe the difference between material misstatements due to errors and intentional fraud which includes fraudulent financial reporting and misappropriation of assets. It also describes the fraud triangle theory proposed by D. R. Cressey. Think back to when you were in elementary school during fire safety week when the fire department would come and visit. Do you recall the fireman explaining what can be referred to as the fire triangle? That is, the description of what is necessary for fire to exist and continue. In order to create fire you need three things: fuel, oxygen, and heat. To put out (or prevent) the fire you would need to remove one of those three sides to the triangle. You could stop the fire by removing either the fuel, oxygen, or heat. This is a simple analogy for the fraud triangle. Just as there are three sides to the fire triangle there are three sides to...
Words: 2106 - Pages: 9
...prison in the Satyam fraud case. The court also imposed a fine of Rs 5 crore on Ramalinga Raju, the Satyam Computer Services Ltd's founder and former chairman, and his brother B Rama Raju and Rs 20-25 lakh each on the remaining accused. HT presents a lowdown of the country's biggest-ever corporate accounting scandal . What is the Satyam scam about? It is about corporate governance and fraudulent auditing practices allegedly in connivance with auditors and chartered accountants. The company misrepresented its accounts both to its board, stock exchanges, regulators, investors and all other stakeholders. Is this an accounting fraud, a market manipulation/fraud or both? It is a fraud, which misled the market and other stakeholders by lying about the company’s financial health. Even basic facts such as revenues, operating profits, interest liabilities and cash balances were grossly inflated to show the company in good health. Who is to blame here? The promoters? The promoters are primary culprits, although it is almost impossible to misrepresent such facts without the connivance of the auditors and some executive board members. Independent directors, it seems, were kept in the dark about the actual books of accounts. What about the auditors? The role of external third party auditors, who were tasked to ensure that no financial bungling is undertaken to carry out promoters’ interest or hide facts, have also been brought to question. Anatomy of a fraud 1. Maintaining...
Words: 3344 - Pages: 14
...criminal leaders who may not have been directly involved in a series of criminal acts but whose criminal organization carried out the details. 2. Benford’s Law (1)定义:A fraud indicator that predicts the relative incidence of first digits of numbers in certain types of random data. (2)Benford Analysis Benford analysis presents another interesting approach to fraud detection. Its general use is to determine the likelihood that fraud exists in records. This technique is based on Benford’s law, named after Frank Benford who realized that the likelihood that numbers 1, 2, 3, 4, 5, 6, 7, 8, and 9 will appear as the first digit in numbers occurring in a random data set conforms to a predictable pattern. That is, the number 1 is more likely to appear as the first digit in a number than is the number 2. The pattern of likelihood (Figure 6.6) continues with other digits: The number 2 is more likely to appear as a first digit than 3, 3 is more likely to appear as a first digit than 4, and so on. Note that just because the likelihood is higher that 7 will appear as a first digit than will 8 does not mean that a number that begins with 8 is due to fraud. Benford’s law can be used to determine whether a higher risk than normal exists that a population of numbers—for example, a collection of vendor’s invoices—contain fraud. Specifically, the invoice amounts can be...
Words: 5213 - Pages: 21
...FRAUD: FRAUDULENT ACTIVITIES A REVIEW OF THE CRIMES Introduction Investigations into fraudulent activities have brought much attention to Federal Government spending. The impact of fraud and the corruption caused by internal parties or external entities targeting government funds can be substantiated. For example, the Association of Certified Fraud Examiners (ACFE) in a 2012 Report to the Nations on Occupational Fraud and Abuse projected a global fraud loss of more than $3.5 trillion per year. Fraud and corruption is a common problem that is all over the world. The U.S. Nuclear Regulatory Commission (NRC, 2006) wrote in its “Fraud Awareness” handbook that fraud is an enormous problem that can waste valuable funding and other resources. Fraud is a potential problem that threatens the Federal Government mission of protecting the health and welfare of the American peoples. According to the Legal Information Institute (LII) at Cornell University Law School fraud precise legal definition varies in the area over which legal authority extends or the given power or authority that has exclusive jurisdiction to decide legal matters. LII defines fraud as “deliberately deceiving someone else with the intent of causing damage.” On December 2nd 2012 Special Agent Jason Muldrew of the Air Force Office of Special Investigations at Kunsan Air Base, Republic of Korea printed news story said, “Fraud is defined as the crime of obtaining money or other benefits by deliberate deception...
Words: 3344 - Pages: 14
...Running head: Internal Fraud Internal Fraud Jennifer England Strayer University Accounting Capstone – ACC 499 Professor Grant A. Wills August 3, 2011 Internal Fraud Infosys Limited is an IT and consulting company, it defines, designs and delivers technology-enabled solutions for Global 2000 companies. Infosys provides business and technology consulting, application services, systems integration, product engineering, custom software development, maintenance, re-engineering, independent testing and validation services, IT infrastructure services and business process outsourcing. Infosys pioneered the Global Delivery Model, which is based on the principle of taking work to the location where the best talent is available, with the least amount of acceptable risk and where it makes the most economic sense. Infosys employs more than 15,000 foreign workers in the United States. In February of this year, a suit was filed in Alabama that accuses Infosys of purposefully sending its Indian employees to work full-time on incorrect visas, and that Infosys was paying these employees in India for full-time work in the United States without withholding federal or state income taxes, and overbilling customers for the labor costs of these employees. Foreign nationals that work in the United Stated on temporary contracts require an H-1B visa. In 2009, increased restrictions began on H-1B visas and in 2010 the application price for H-1B visas doubled, this is when Infosys began sending...
Words: 1060 - Pages: 5
...SAS 99 AND ITS CHALLENGES TO THE ACCOUNTING PROFESSION Submitted by: Ronneil I. Capones Consideration of Fraud in a Financial Statement Audit, also known as Statement on Auditing Standard 99 was issued in November 2002. It is a revision to improve the deficiencies of SAS 82 with regards to audit process and quality (Marczewski and Akers, 2005, p. 38). The revision of SAS 82 was started prior to the huge accounting scandals that shook public confidence in the reliability of audits. Nevertheless, it gave the accounting profession more focus on tackling the issues of fraud detection on audits Three key fraud risk factors are classified and described in SAS 99; incentive/pressure to perpetrate fraud, opportunity to carry out the fraud, and attitude/ability to rationalize the fraudulent action. Incentives or pressure to perpetrate fraud may arise from the threat of losing profitability as a result of failures in the industry, declining product demand, frequent negative cash flows from operations, threat of losing job because of pressure from management to meet analysts’ expectations are a few examples (Casabona and Grego, 2003, p. 17). Opportunities to carry out fraud are characterized by the following conditions; abundance of transactions with related parties not within the normal course of business, unusual complex transactions coupled with subjective judgments, ineffective monitoring by management, board of directors, and audit committee (Casabona and Grego, 2003, p.17)...
Words: 687 - Pages: 3
...Anatomy of computer accounting frauds A. Seetharaman, M. Senthilvelmurugan and Rajan Periyanayagam Faculty of Management, Multimedia University, Malaysia Keywords Fraud, Corruption, Financial reporting, Whistleblowing, Internal control, Corporate governance Abstract This paper introduces fraud as asset misappropriations (85 per cent of cases), corruption and fraudulent statements. Symptoms include accounting anomalies, lack of internal control environment, lifestyle and behaviour. The most effective tools for fraud detection are internal audit review, specific investigation by management, and whistle-blowing. The paper details the fraud investigation process and the role of auditors as fraud examiners. The correlation of fraud perpetrators’ personality with the size of losses is examined. Personality is analysed into age, gender, position, educational background and collusion. A strong system of internal control is most effective in fraud prevention. Fraud prevention procedures, targeted goals and improvements to system weaknesses feature in the paper. Fraud impacts on accounting transactions in accounts receivable, receipts and disbursements, accounts payable, inventories and fixed assets, and financial reporting. The monetary impact resulting from fraud is analysed by the type of victim and the amount of loss. Internal control and good employment practices prevent fraud and mitigate loss. Computer accounting frauds 1055 Introduction Accounting fraud involves an intentional action...
Words: 8560 - Pages: 35