Question

In: Accounting

1. List some controls that reduce fraud risks. 2. Explain how you can detect fraud

 

1. List some controls that reduce fraud risks.

2. Explain how you can detect fraud.

Solutions

Expert Solution

Answer No 1

There are five basic elements that lead to a good system of internal control which helps in prevention and detention of errors & Fraud. These elements are control environment, risk assessment, control activities, monitoring, and information and communications. Let’s break these elements down to look at how they can be implemented.

Control Environment. Any good system of internal controls must begin with the control environment, particularly the “tone at the top.” You must make it clear to employees, investors, vendors, customers and competitors that the company will be run honestly and ethically and deviations from this policy will not be tolerated.

Risk Assessment. Once a proper tone is established, you should then perform a risk assessment. What areas of financial reporting are most vulnerable to fraud or error? Which assets are most likely to be stolen, misappropriated or wasted? In what areas are failure to comply with laws and regulations most likely to occur? In other words, you want to assess the areas where there is the greatest risk that your organization will not be successful. These are essential questions to ask as you look to protect your company from various types of fraud.

Control Activities. Once risk has been assessed, institute policies and procedures that mitigate those risks. A system of internal controls must be designed specifically to address the greatest areas of risk, whether the risk is the occurrence of fraud or error. Control activities that mitigate risk include segregation of duties, safeguarding of assets and policies related to information processing.

Unfortunately, leaders and management often accomplish the first three steps and then fail to follow through on the two elements listed below. Once the control environment has been established, risk has been assessed and control activities have been designed and implemented, there must be follow up in the form of monitoring and information and communications.

Monitoring:-Monitoring of the internal control system may include internal audits, testing of procedures, follow up on errors and reaction to perceived deficiencies. If it is clear that there are shortcomings in the system, the system will need to be altered. Both design and implementation are critical. It is not enough to assess risk and design a system of controls to mitigate those risks – the system must also be properly implemented. A system that is well designed but improperly implemented is probably as ineffective as a fully implemented system that was not properly designed.

Communication:-Finally, there must be clear communication of information. Provide all levels of employees with the information that they need to properly carry out the activities of the organization and adhere to the developed controls.

Answer No 2

1. Unusual Behavior

The perpetrator will often display unusual behavior, that when taken as a whole is a strong indicator of fraud. The fraudster may not ever take a vacation or call in sick in fear of being caught. He or she may not assign out work even when overloaded. Other symptoms may be changes in behavior such as increased drinking, smoking, defensiveness, and unusual irritability and suspiciousness.

2. Complaints

Frequently tips or complaints will be received which indicate that a fraudulent action is going on. Complaints have been known to be some of the best sources of fraud and should be taken seriously. Although all too often, the motives of the complainant may be suspect, the allegations usually have merit that warrant further investigation.

3. Stale Items in Reconciliations

In bank reconciliations, deposits or checks not included in the reconciliation could be indicative of theft. Missing deposits could mean the perpetrator absconded with the funds; missing checks could indicate one made out to a bogus payee.

4. Excessive Voids

Voided sales slips could mean that the sale was rung up, the payment diverted to the use of the perpetrator, and the sales slip subsequently voided to cover the theft.

5. Missing Documents

Documents which are unable to be located can be a red flag for fraud. Although it is expected that some documents will be misplaced, the auditor should look for explanations as to why the documents are missing, and what steps were taken to locate the requested items. All too often, the auditors will select an alternate item or allow the auditee to select an alternate without determining whether or not a problem exists.

6. Excessive Credit Memos

Similar to excessive voids, this technique can be used to cover the theft of cash. A credit memo to a phony customer is written out, and the cash is taken to make total cash balance.

7. Common Names and Addresses for Refunds

Sales employees frequently make bogus refunds to customers for merchandise. The address shown for the refund is then made to the employee's address, or to the address of a friend or co-worker.

8. Increasing Reconciling Items

Stolen deposits, or bogus checks written, are frequently not removed, or covered, from the reconciliation. Hence, over a period of time, the reconciling items tend to increase.

9. General Ledger Out-of-Balance

When funds, merchandise, or assets are stolen and not covered by a fictitious entry, the general ledger will be out of balance. An inventory of the merchandise or cash is needed to confirm the existence of the missing assets.

10. Adjustments to Receivables or Payables

In cases where customer payments are misappropriated, adjustments to receivables can be made to cover the shortage. Where payables are adjusted, the perpetrator can use a phony billing scheme to convert cash to his or her own use.

11. Excess Purchases

Excess purchases can be used to cover fraud in two ways:

Fictitious payees are used to convert funds.

Excessive purchases may indicate a possible payoff of purchasing agent.

12. Duplicate Payments

Duplicate payments are sometimes converted to the use of an employee. The employee may notice the duplicate payment, then he or she may prepare a phony endorsement of the check.

13. Ghost Employees

Ghost employee schemes are frequently uncovered when an auditor, fraud examiner, or other individual distributes paychecks to employees. Missing or otherwise unaccounted for employees could indicate the existence of a ghost employee scheme.

14. Employee Expense Accounts

Employees frequently conceal fraud in their individual expense account reimbursements. These reimbursements should be scrutinized for reasonableness and trends, especially in the area of cash transactions on the expense account.

15. Inventory Shortages

Normal shrinkage over a period of time can be computed through historical analysis. Excessive shrinkage could explain a host of fraudulent activity, from embezzlement to theft of inventory.

16. Increased Scrap

In the manufacturing process, an increased amount of scrap could indicate a scheme to steal and resell this material. Scrap is a favorite target of embezzlers because it is usually subject to less scrutiny than regular inventory.

17. Large Payments to Individuals

Excessively large payments to individuals may indicate instances of fraudulent disbursements.

18. Employee Overtime

Employees being paid for overtime hours not worked by altering time sheets before or after management approval.

19. Write-off of Accounts Receivable

Comparing the write-off of receivables by customers may lead to information indicating that the employee has absconded with customer payments.

20. Post Office Boxes as Shipping Addresses

In instances where merchandise is shipped to a post office box, this may indicate that an employee is shipping to a bogus purchaser.


Related Solutions

How do you detect billing scheme fraud
How do you detect billing scheme fraud
How may organizations utilize data analytics to achieve objectives, improve processes, strengthen controls, and detect fraud?...
How may organizations utilize data analytics to achieve objectives, improve processes, strengthen controls, and detect fraud? Provide an example of company that is utilizing data analytics. (Provide a supporting link.) What are some of the ethical considerations associated with data analytics? What are some other factors that companies should consider when using data analytics?
1) Discuss how HRM can reduce risks related to terrorism. 2) Discuss international initiatives to criminalize...
1) Discuss how HRM can reduce risks related to terrorism. 2) Discuss international initiatives to criminalize foreign bribery.
What is Benford's Law and how can it be applied to detect financial statement fraud?
What is Benford's Law and how can it be applied to detect financial statement fraud?
1. What are the risks that can arise in auditing inventory accounts? 2. State internal controls...
1. What are the risks that can arise in auditing inventory accounts? 2. State internal controls that can be applied by the company to prevent fraud that occurs in the company's inventory! 3. Make a case about inventory problems and how the audit procedures should be carried out on the case you made.
Adequate controls have to be implemented if an organization wants to reduce errors and fraud when...
Adequate controls have to be implemented if an organization wants to reduce errors and fraud when using computer technology. It is in the design stage of an information system that the appropriate controls are planned to ensure reliability of data. A good design can prevent both intentional and unintentional alteration and destruction of data. The data controls can be classified as input controls, process controls, and output controls. For each of these control categories, provide two specific controls, and state...
In your opinion, how can internal auditors best detect fraud in their organization? Provide explanations to...
In your opinion, how can internal auditors best detect fraud in their organization? Provide explanations to support your answer.
List 3 ways you, personally, can reduce your carbon footprint and explain how each reduces it....
List 3 ways you, personally, can reduce your carbon footprint and explain how each reduces it. What events are involved in the evolution of a new species? Why is an ecosystem-based on a food web more stable than one based on a food chain? answer all due in hour please typing please
1) Describe fraud. 2) What are the three categories of fraud and list an example of...
1) Describe fraud. 2) What are the three categories of fraud and list an example of each. 3) Describe the fraud triangle. 4) List the key requirements of the Sarbanes-Oxley Act (SOX) 5) List the components of the framework commonly used in corporations when analyzing their internal control systems: 1. 2. 3. 4. 5. 6) List the five common principles of Internal Control and give an explanation and example of each 1. 2. 3. 4. 5. 7) Name two reasons...
Using a coil of wire and an oscilloscope, explain how you can detect the presence of...
Using a coil of wire and an oscilloscope, explain how you can detect the presence of the Earth's magnetic field. Using a coil of wire and an oscilloscope, explain how you could show that a magnet is producing a magnetic field. A series LRC circuit is driven at a frequency which is much less than the resonant frequency with a sine wave voltage source V0sin(wt). What is the approximate voltage across the capacitor? Briefly explain A series LRC circuit is...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT