Concept explainers
To identify the type of fraud in the following cases:
Marcus pays $30 for a baseball of $70 by changing the price-tag.
Craig loses $500 by investing in a multilevel marketing scheme.
A bank employee diverts the amount from a wealthy customer’s account to his personal account. The bank was held responsible for the act of the employee.
A CEO showed profits for the year 2018, when there was a loss of $150 million. The CEO was held responsible and convicted with jail and fine.
The government lost $50 million as it was overcharged by contractor and sub-contractors in the Middle East for fictitious hours and assets.
A student accessed the school computer and changed her school grade to be accepted into graduate school.
Trending nowThis is a popular solution!
Chapter 1 Solutions
Fraud Examination
- Gladys is in charge of receiving all customer payments, recording the payments, and depositing them at the bank. What element of the fraud triangle is best described here? Group of answer choices Opportunity Rationalization Incentive/Pressure Attribution Gladys has large amounts of student loan debt and a crippling gambling habit. She works part-time job in another city. What element of the fraud triangle is best described here? Group of answer choices Opportunity Fraudy fraud Pressure/incentive Rationalizationarrow_forwardA long-time employee had become such a trusted employee that their bosses had put them in charge of paying bills, balancing bank accounts, and handling other cash management responsibilities. The employee became ill and took sick leave. During their absence, their employer determined they had been stealing company cash for years by forging checks and tamporing with company documents. The stolen cash was used to stoke a gambling habit. In total, the employee stole nearly $320,000. Answer questions in short answers What were the employee's perceived opportunities? What pressure did the trusted employee have to commit fraud? How did the fact that they were a trusted employee give them more opportinity to commit fraud? How do vices motivate people to commit fraud?arrow_forwardwhich of the followingtaxpayers has a deductible loss from identity thief? ashen he hasnt received rent from his tenant for several months because his tenant was a victim of identity theft and had $5000 stolen geraldine she fell victim to a phone scam shegave identitythieves her personal bank account information and$8000 was taken harris he is sole proprietor and was the target of a phishing attempt he does not have a business checking account but the login information for his personal checking account was stolen and thieves took $10000 from the account jessica she owns residential rental property identity thieves impersonated her and took out a $50000 second mortage on her rental property that jessica must now repayarrow_forward
- Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardSuppose that someone stole your ATM card and withdrew $1,000 from your checking account. How much money could you lose (according to federal legislation) if you reported the stolen card to the bank:arrow_forwardX sent his Y P1,000 via a telegraphic transfer through the Bank of D. The bank's remittance clerk made a mistake and credited Y with P1,000,000 which she promptly withdrew. The bank demanded the return of the mistakenly credited excess, but Y refused. The BIR entered the picture and investigated Y. How much income, if any, does Y earn from the above facts?arrow_forward
- Exposure from stolen ATM card. Suppose someone stole $1,000 dollars from your checking account. How much money could you lose if you reported the card to the bank the day it was stolen, 6 days later, and after you receive your periodic statement?arrow_forwardHelen was a very forgetful person, so she had placed her bank code (PIN number) on the back of her debit card. A thief stole Helen’s card and was able to take $100 from an ATM on the day of the theft. That same day, Helen realized that the card was gone and phoned her bank. The following morning, the thief withdrew another $100. For how much, if anything, is Helen responsible? Why?arrow_forwardTypes of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forward
- 30. Georgina is in dispute with her bank about some debits to her business account which she does not recognize. Which of the following is Georgina's duty with regards to her fiduciary relationship with her bank? To check bank statements To reimburse the bank if her personal identification number (PIN) is used fraudulently by a thief to obtain cash To keep her bank cards safe To maintain the account in credit unless specifically agreed otherwise 31. Helkats plc ensures that it offers breakthrough products in the market niche in which it operates. In terms of Porter's generic competitive strategies, Helkats plc's strategy is Cost leadership Cost-focus Differentiation Differentiation-focusarrow_forwardThe Laundry Money Skim The case below tells the actual story of a cash embezzlement scheme. The case has two major parts: (1) problem and (2) audit approach. For the case, please consider how the auditor may have discovered the cash embezzlement scheme.ProblemAlbert owned and operated 40 coin laundries around town. As the business grew, he could no longer visit each one, empty the cash boxes, and deposit the receipts. Each location grossed about $140 to $160 per day, operating 365 days per year—gross receipts of about $2 million per year. Each of four part-time employees visited 10 locations, collecting the cash boxes and delivering them to Albert’s office where he would count the coins and currency (from the change machine) and prepare a bank deposit. One of the employees skimmed $5 to $10 from each location visited each day.The daily theft does not seem like much, but at an average of $7.50 per day from each of 10 locations, totaled about $27,000 per year. If all four of the…arrow_forwardEvidence collection process in a fraud case Instructions Analize the following information: Indirect methods of income from unknown sources Assume that the following information is derived from reliable sources: Net Worth Lifestyle Approach Income from Known Sources Description Amount Asset Liability Sources Application Boat 25,000 Boat Loan 20,000 Boat Loan Payments 5,000 Car 40,000 Car Loan 40,000 Car Loan Payments 2,000 Deposit to bank account 400,000 Dividends reported on Tax Retun 5,000 Down Payment Boat 12,000 Down payment Car 7,000 Down Payment Time share 6,000 Down Payment Vacation home 15,000 House 275,000 Home equity loan 35,000 Home Equity Loan Payments 4,000 Income on Tax Return 1,000…arrow_forward
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning