WorldCom history The history of WorldCom Company dates back in 1983 which started as a partnership between a former basketball coach Bernard Ebbers. This company was established at Mississippi as a coffee shop, which later developed to long distance Telephone Company. The company’s name initially was Long Distance Discount Service whose operations began on 1984. After several years in operation, the company became public in August 1989 with Bernard Ebbers as the company’s CEO (Moberg 4). Over the
Words: 2628 - Pages: 11
(Controller) and Buford "Buddy" Yates (Director of General Accounting)) used fraudulent accounting methods to mask its declining earnings by painting a false picture of financial growth and profitability to prop up the price of WorldCom’s stock. The fraud was accomplished primarily in two ways: Underreporting ‘line costs’ (interconnection expenses with other telecommunication companies) by capitalizing these costs on the balance sheet rather than properly expensing them. Inflating revenues with bogus
Words: 1048 - Pages: 5
Embezzlement and Credit Card Fraud In almost every case, white collar crimes are committed by businesses and government professionals, and are generally of non-violent nature, in which are financially motivated. The Federal Bureau of Investigation now associates a wide range of fraudulent crimes as being white collar. Credit card fraud and embezzlement are two amongst those on their list. This paper will discuss what and how these two crimes are committed, the impacts each
Words: 1237 - Pages: 5
management can be defined as using reasonable and legal means to achieve stable and optimised financing results (Burgstahler & Dichev 1997). It should be noticed the earnings management is legal activities rather than the illegal accounting fraud. Due to the availability of difference legal choices, the management can choose the most suitable choice which can generate more close earnings number to desired target. For example, the test on the intangibles impairment requires professional judgement
Words: 1701 - Pages: 7
earnings by $2 billion. The Securities and Exchange Commission (SEC) was investigating Xerox and it charged the company with accounting manipulations (SEC Release No. 2002-52, 2002). There were two manipulations that formed the basis for the SEC investigation. The first manipulation involved improperly storing revenue off the balance sheet and then releasing the stored funds at strategic times in order to boost lagging earnings for a particular quarter. This method was called the “cookie jar” method
Words: 1382 - Pages: 6
economy. Due to the increase in corporate scandals the government issued new, stricter regulations in 2002. Majority of accounting firms within the AICPA stated that their need for forensic accountants surged following the rise of financial statement fraud. Forensic accounting involves a combination of accounting, auditing and investigating. There are some important skills that individuals going out for this position should have and the due diligence in this position is crucial. If pursuing the career
Words: 2320 - Pages: 10
Corporate Fraud and Schemes ACC 571 – Forensic Accounting October 20, 2014 Russell Wasendorf was the owner and chief executive officer of Peregrine Financial Group based in Cedar Falls Iowa. He stared the business in 1967 in Iowa and later decided to move the company to Chicago. Not long ago, he decided to move the company back to Iowa convincing many of his colleagues to move with him. Peregrine Financial Group had many customers and clients who trusted
Words: 978 - Pages: 4
accounting processes being used in his firm (and undoubtedly he was aware) and should have taken steps to prevent others test for ethics. Authur Anderson also missed opportunities where he could have disclosed the fraud. Cynthia Cooper and her team where the first people who uncovered the major fraud that was taking place at WorldCom. Accountants at WorldCom capitalized expenses in blatant violation of generally accepted accounting principles under the pressure from above management to maintain income growth
Words: 557 - Pages: 3
CHAPTER 5 COMPUTER FRAUD SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 5.1 Do you agree that the most effective way to obtain adequate system security is to rely on the integrity of company employees? Why or why not? Does this seem ironic? What should a company do to ensure the integrity of its employees? The statement is ironic because employees represent both the greatest control strength and the greatest control weakness. Honest, skilled employees are the most effective fraud deterrent. However
Words: 8875 - Pages: 36
Secure the computer framework to guarantee that the data and information are safe. This implies the investigators must verify that no unapproved individual can get to the computer or gadgets included in the investigation. 2. Searching each document on the system, including records that are scrambled, ensured by passwords, concealed or erased, however not yet overwritten. Agent should make a duplicate of the considerable number of documents on the computer. Getting
Words: 870 - Pages: 4