...—‰•OG13 PDFv„rHg,SïNå€T|ûQQ:1014347461 Answer key Apply lA. Apply An Clttendee of the conference sponsored by CC would pCly , for reg istrCltion Cl nd Cl room in the conference b lock, $620 + 2($110) = $840 . By emp loy ing the ROB strCltegy , Cln Clttendee would pCly $720 + 2($70) = $860 . Therefore the Clttendee would not SClve money by emp loy ing the ROB strCltegy . The correct answer is No. lB. Apply An Clttendee of the conference sponsored by FFNA would pCly , for reg istrCltion Clnd Cl room in the conference b lock, $275 + 2($140) = $555 . By emp loy ing the ROB strCltegy , Cln Clttendee would pCly $325 + 2($70) = $465 . Therefore the Clttendee would SClve money by emp loy ing the ROB strCltegy . The correct answer is Yes. lC. App ly An Clttendee of the conference sponsored by HMHPA would pCly , for reg istrCltion Clnd Cl room in the conference b lock, $575 + 2($104) = $783 . By e mploying t he ROB strCltegy , Cl l) Clttendee would PCly $600 + 2($79) = $758 . Therefore the Clttendee would SClve money by employ ing the ROB strCltegy . The correct answer is Yes. Apply For Cl hote l to lose room revenue in th is scenClrio, the lowest rClte must be less thCln 75% of the b lock rClte . Th is will occur when the rCltio of the lowest rClte to the b lock rate is less thCln 0 .75 . 2A. Apply For the conferences hosted by the As iCl w est Center, the rCltios Clre the conference sponsored by CDA Clnd The correct answer is No . ~:...
Words: 509 - Pages: 3
...ING DIRECT A Review of a Financial Services Company ING Direct is the world leading branchless online saving. As of 2009, ING Direct serves 85 million customers in Europe, the United States, Canada, Latin America, Asia and Australia. They draw on their experience and expertise, their commitment to excellent service and their global scale to meet the needs of a broad customer base, comprising individuals, families, small businesses, large corporations, institutions and governments. Based on market capitalization, ING DIRECT is one of the 20 largest financial institutions worldwide. “ING DIRECT is a federally chartered bank insured by the FDIC (Federal Deposit Insurance Corporation). It is registered with the FDIC under the name of ING Bank. ING Direct Headquarter Office is located in Wilmington, DE. The purpose of this research paper is to examine the banking industry of ING Direct and its Current Financial Conditions, Challenges dealing with the “New Normal” Economy, Customer Impact and Ways to improve any Industry Issues. Current Financial Conditions Even though a great many financial institutions have folded or merged with other financial institutions, ING Direct has been able to sustain its creditability and within its primary market has been able to issue new shares of stock and sell them to investors. This is mainly due to ING Direct gains during the fourth quarter of 2009. In the fourth quart of 2009 ING Direct stocks were at _______ which were just...
Words: 1804 - Pages: 8
...w rP os t S 910M96 ING DIRECT1 op yo Sean Cauterman wrote this case under the supervision of Professor Michael Sider solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Richard Ivey School of Business Foundation prohibits any form of reproduction, storage or transmission without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Richard Ivey School of Business Foundation, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2010, Richard Ivey School of Business Foundation Version: (A) 2010-11-01 It was August 1, 2008, and Maggie Fox, chief executive officer (CEO) of the Social Media Group (SMG), sat at her desk in Dundas, Ontario to review her internal creative team’s initial response to a request from her newest client, ING Direct Canada (ING). After the tremendous success of the Superstar Saver Search YouTube campaign, ING wanted to respond to the recent economic crisis and launch a second, complementary social media campaign. ING was looking for SMG to help them increase...
Words: 4427 - Pages: 18
...Barry Minkow created his own carpet cleaning business, ZZZZ Best, at the age of 16. “He seemed like a model young entrepreneur, except for the fact that he never actually ran a profitable business” (Ciulla). Instead of focusing on a carpet cleaning business, he focused on gaining capital in any way, including fraud. This fraud included forging money orders, adding “bogus charges to his customers’ credit card accounts,” and setting up a fake insurance company (Ciulla). He fooled the auditors by “rent[ing] a building and fix[ing] it up to look like a ZZZZ Best work site,” when the auditors wanted to see a restoration job that ZZZZ Best was working on (Ciulla). In 1986, ZZZZ Best went public, however within months people starting finding...
Words: 316 - Pages: 2
...Questions 1. Fraud always involves deception, confidence, and trickery. The following is one of the most common definitions of fraud: a. “Fraud is a generic term, and embraces all the multifarious means which human ingenuity can devise, which are resorted to by one individual, to get an advantage over another by false representations. No definite and invariable rule can be laid down as a general proposition in defining fraud, as it includes surprise, trickery, cunning and unfair ways by which another is cheated. The only boundaries defining it are those which limit human knavery.” Fraud is deception that includes the following elements: 1. 2. 3. 4. 5. 6. 7. 3. a. Employee Embezzlement: In this type of fraud, employees deceive their employers by taking company assets. Embezzlement can be either direct or indirect. b. Management Fraud: Distinguished from other types of fraud both by the nature of the perpetrators and by the method of deception. In its most common form, management fraud is deception perpetrated by top management’s manipulation of financial statements. The victims of management fraud are typically stockholders, lenders, and others who rely on financial statement information. c. Investment Scams or Consumer Scams: A type of fraud that is perpetrated when fraudulent and usually worthless investments are sold to unsuspecting investors. d. Vendor Fraud: Perpetrated by vendors; comes in two main varieties: fraud perpetrated by vendors acting alone, and fraud perpetrated...
Words: 1408 - Pages: 6
...MENUJU PELAKSANAAN FRAUD AUDITING Anna Retno Widayanti BPK-RI Imam Subekti Fakultas Ekonomi Universitas Brawijaya Abstract The objective o f this research was to analyze the expertise o f Su preme Audit Board o f Indonesia (BPK-RI), which related to the imple mentation of Fraud Auditing. The analysis was based on the data acquired from 147 respondents. The result showed that the audit expertise of Supreme Audit Board of Indonesia’s Auditor unconformity with the criteria o f Fraud auditor. So, with this condition Supreme Audit Board o f Indonesia is not ready fo r the implementation o f fraud auditing yet. The other result showed that there are significant expertise differences between structural official and functional auditor in con formity with fraud auditor’s criteria. The most significant difference was in their knowledge and cognitive ability. The structural official expertise was better than the functional official. This is logical, be cause the structural officials usually become a team leader. Besides that, based on the expertise difference test, accord ing the auditing scope, it was known that there are no significant expertise differences between employee in APBN, APBD/BUMD and BUMN sectors, in conformity with the Fraud auditor’s criteria. In ad dition, fo r the improvement o f the expertise o f supreme audit board of Indonesia’s auditor most of the respondents emphasize in the train ing quality improvement fo r the auditor. Keywords: fraud auditing, the expertise...
Words: 7126 - Pages: 29
...That was followed shortly by the replacement of accounting firm Arthur Andersen and a series of investigations and shareholders lawsuits, most of which are still pending. Sunbeam joins an ignominious cluster of companies — Rite Aid, c u e International (now part of Cendant Corp.), Livent, Oxford Health Plans, Phar-Mor, Miniscribe and, most recently. MicroStrategies — in business's hall of shame. All of these companies have one depressing feature in common: top managers who, whether out of desperation or greed, apparently turned to accounting trickery to manufacture imaginary sales and other revenues and pump up earnings, sometimes over a period of years. Writing in The Wall Street Journal, one pundit recently reckoned that just three recent fraud cases — Sunbeam, CUC and Oxford — burned...
Words: 2578 - Pages: 11
...Accounting Fraud at WorldCom 1) What are the pressures that lead executives and managers to “cook the books?” After the rapid evolution of the telecommunication industry in the 1990s, WorldCom shifted its strategy to focus on building revenues and acquiring capacity sufficient to handle expected growth. Their biggest goal was to be the No. 1 stock on Wall Street rather than capturing the market share. As a result, their Expense-to-Revenue (E/R) Ratio was their measurement for their main objective (increase revenues and become the No. 1 stock on Wall Street). Due to heightened competition, overcapacity and the reduced demand for telecommunication services at the onset of the economic recession and the aftermath of the dot-com bubble collapse, the telecommunication industry conditions began to deteriorate. Prices were falling and WorldCom had no option but to cut their prices as well. This action placed severe pressure on WorldCom’s most important measurement, the E/R ratio. The E/R ratio was being affected due to revenue and pricing pressures while the committed line cost was still the same. 2) Is there a boundary between earnings management and fraudulent reporting? If so, what is it? “Earnings Management is recognized as attempts by management to influence or manipulate reported earnings by using specific accounting methods (or changing methods), recognizing one-time non-recurring items, deferring or accelerating expense or revenue transactions, or using other...
Words: 3407 - Pages: 14
...A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this...
Words: 246885 - Pages: 988
...purpose of this case study is to identify the management issues of Satyam Computer Services Limited’s, former chairman Ramalinga Raju when he admitted to corporate fraud in 2009, and how these issues could be addressed. Satyam Computer Services Limited, (now known as Mahindra Satyam) is a “leading global information communications and technology company”. (Anon., n.d.) It is a part of the “US $15.4 billion dollar Mahindra group, a global industrial federation of companies of the top 10 business houses based in India”. (Anon., n.d., p. 1; Anon., n.d.)). 1.1 INTRODUCTION TO MANAGEMENT ISSUES “India’s corporate community experienced a significant shock in January 2009 with damaging revelations about board failure and colossal fraud in the financials of Satyam.” (Afsharipour, 2010)Ramalinga Raju and the CFO of the company were charged with “conspiracy, cheating and falsifying records. Raju was also allegedly using salary payments to fabricated employees, in order to steal money from the company.” (Anon., n.d.) This case study will explore the unethical behaviours of Ramalinga Raju, but also how ethical standards and social responsibility factors in with Satyam’s Computer Services Limited’s own management issues, which would have also contributed to the fraudulent activity that resulted in one of the biggest accounting fraud scandals in India. Secondly this case is going to explore how this case “served as a catalyst for the Indian...
Words: 1254 - Pages: 6
...CYBER SCAM AND ITS EFFECTS November 27, 2011 SUBMITTED BY: FETALVER, FRANCIS VIOLETA, ROGENE CRIS SUBMITTED TO: MRS. MARY GRACE P. ALFANTA I Introduction Background of the Study Experts and law-enforcement officials who track Internet crime say scams have intensified in the past six months, as fraudsters take advantage of economic confusion and anxiety to target both consumers and businesses. Thieves are sending out phony emails and putting up fake Web sites pretending to be banks, mortgage-service providers or even government agencies like the Federal Bureau of Investigation or the Federal Deposit Insurance Corp. Cell phones and Internet-based phone services have also been used to seek out victims. The object: to drain customer accounts of money or to gain information for identity theft. Most scams are done by e-mail (Spam). They entice users to give them critical information like usernames, passwords, credit card information, or other types of account information. Most of these e-mails can easily be identified as fraudulent, by identifying a couple of general characteristics. If someone pretending to represent a company or organization contact you by e-mail to supply them with usernames, passwords or other critical information by e-mail, then you can be certain it’s fraudulent. Today we have something we call SSL (Secure Socket Layer). E-mail is one of the most un-secure methods to send user information and passwords. Most organizations...
Words: 2516 - Pages: 11
...was EVP and a board member along with James Rigas (son) (USA Today, 2004). Together they owned the majority of Adelphia's stock and occupied the majority of the seats on the board. These two components would be key in the fraud that would ensue. The personal lives of the Rigas’ would be the root cause of their need for cash and the reason behind the fraud they would commit (USA Today, 2004). The Scandal The government described it as ''one of the most extensive financial frauds ever to take place at a public company" (Sorkin, 2004). The Rigas' used company money to construct a private golf course, own several private jets, and purchase multiple several luxury homes. They were able to do this by establishing "complicated cash-management systems to spread money around to various family-owned entities and as a cover for stealing about $100 million for themselves" (AP, 2005). In order to keep investment money flowing in, they would manipulate the books to meet analyst expectations, thus inflating the stock price and at times they would mix Adelphia's funds with their own private funds. Upon realizing the amount of funds that had been taken, Tim Rigas "limited" the amount of money his father could take to $1,000,000 per month. One example of the fraud they committed was they disguised Adelphia's actual expenses for digital decoder boxes. In 2001 the company claimed that it sold 525,000 boxes for $101 Adelphia million to an unaudited Rigas-owned company that has no cable...
Words: 951 - Pages: 4
...Burning Down the House: Mortgage Fraud and the Destruction of Residential Neighborhoods Ann Fulmer March 2010 Burning Down the House: Mortgage Fraud and the Destruction of Residential Neighborhoods Mortgage fraud is bank robbery without a gun. 1 It is a high-yield, 2 low risk enterprise that has been reported in all 50 states, Puerto Rico, Guam, American Samoa, 3 Canada, 4 New Zealand, 5 Australia, 6 and England. 7 In the United States, it is committed by organized international and domestic rings, 8 street gangs, 9 terrorists, 10 drug traffickers, 11 real estate agents, 12 closing attorneys, 13 appraisers, 14 mortgage brokers, 15 The targeted victims distinguish mortgage fraud from predatory lending. In predatory lending cases the borrower is victimized by the illegal practices of the lender or its agents with respect to fees and disclosures relating to the cost of the loan. It is unfortunate that the media, consumer activists, legislators and law enforcement personnel frequently conflate mortgage fraud with predatory lending since it adds unnecessary confusion to an already complex issue and diverts attention and badly needed resources from the fight against true mortgage fraud. 2 The average “take” on a bank robbery is approximately $3,000.00. By contrast, the average straw borrower receives a “cut” of at least $10,000 and the orchestrator’s “take” in a mortgage fraud transaction frequently exceeds $100,000. In a few cases the orchestrator’s take was in excess of $1...
Words: 11793 - Pages: 48
...SAS 99 AND ITS CHALLENGES TO THE ACCOUNTING PROFESSION Submitted by: Ronneil I. Capones Consideration of Fraud in a Financial Statement Audit, also known as Statement on Auditing Standard 99 was issued in November 2002. It is a revision to improve the deficiencies of SAS 82 with regards to audit process and quality (Marczewski and Akers, 2005, p. 38). The revision of SAS 82 was started prior to the huge accounting scandals that shook public confidence in the reliability of audits. Nevertheless, it gave the accounting profession more focus on tackling the issues of fraud detection on audits Three key fraud risk factors are classified and described in SAS 99; incentive/pressure to perpetrate fraud, opportunity to carry out the fraud, and attitude/ability to rationalize the fraudulent action. Incentives or pressure to perpetrate fraud may arise from the threat of losing profitability as a result of failures in the industry, declining product demand, frequent negative cash flows from operations, threat of losing job because of pressure from management to meet analysts’ expectations are a few examples (Casabona and Grego, 2003, p. 17). Opportunities to carry out fraud are characterized by the following conditions; abundance of transactions with related parties not within the normal course of business, unusual complex transactions coupled with subjective judgments, ineffective monitoring by management, board of directors, and audit committee (Casabona and Grego, 2003, p.17)...
Words: 687 - Pages: 3
...years that she worked there. It was discovered when Gilliken tried to use a debit card Josey had gotten for him. When asked to enter his zip code it was rejected when he put in his zip code. Upon going to the bank to address the problem it was discovered that it was her zip code that belonged to the card. Josey is currently being charged with two counts of felony embezzlement. Josey was your typical white collar criminal. She was in her 50’s with no prior criminal record, and was considered a loyal long time employee. Since she was considered a valuable employee and had been with the company for so long it seemed unlikely that she would have been capable of such a crime. There are three in the opportunity triangle that happens when fraud occurs. The three elements are commit,...
Words: 899 - Pages: 4