SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Habib Ullah Qamar
Govt. college of Commerce Gujranwala
4/5/2016
 ACFE classification format. Three broad
categories of fraud schemes are defined
 Fraudulent statements : Fraudulent statements
are associated with management fraud
 Corruption : Corruption involves an executive,
manager, or employee of the organization in
collusion with an outsider.
 Asset misappropriation: The most common form
of fraud scheme involves some type of asset
misappropriation. 92% of the frauds included in
the ACFE study fall in this category.
 All fraud involves some form of financial
misstatement, to meet the definition under this
class of fraud scheme the statement itself must
bring direct or indirect financial benefit to the
perpetrator.
 For example, misstating the cash account
balance to cover the theft of cash is not financial
statement fraud.
 Fraudulent statements account for only 8 percent
of the fraud cases covered in the ACFE fraud
study
 The median loss due to this type of fraud scheme
is significantly higher than losses from
corruption and asset misappropriation.
 Lack of Auditor Independence. A There might be
two cases one if an auditor is hired from outside
world by the clients and secondly if auditor is
also a manager and performs some other
services too like actuarial services, internal audit
outsourcing services, and consulting.
 In both cases they will lack independence as their
performance will adversely affect their consulting
fees. For example, Enron’s auditors—Arthur
Andersen—were also their internal auditors and
their management consultants.
 Lack of Director Independence. Many boards of
directors are composed of individuals who are
not independent. Examples of lack of
independence are directors who have a personal
relationship by serving on the boards of other
directors’ companies; have a business trading
relationship as key customers or suppliers of the
company; have a financial relationship as primary
stockholders or have received personal loans
from the company; or have an operational
relationship as employees of the company.
 Adelphia Company : $60billion Fraud
 Questionable Executive Compensation
Schemes. A Thomson Financial survey
observed that executives have abused stock-
based compensation. The consensus is that
fewer stock options should be offered than
currently is the practice. Excessive use of
short-term stock options to compensate
directors and executives may result in short-
term thinking and strategies aimed at driving
up stock prices at the expense of the firm’s
long-term health.
 Inappropriate Accounting Practices. The use of
inappropriate accounting techniques is a
characteristic common to many financial
statement fraud schemes.
 Enron made elaborate use of special-purpose
entities (SPEs) to hide liabilities through off-
balance-sheet accounting. SPEs are legal, but
their application in this case was clearly intended
to deceive the market. Enron also employed
income-inflating techniques. For example, when
the company sold a contract to provide natural
gas for a period of two years, they would
recognize all the future revenue in the period
when the contract was sold.
 The SOX act establishes a framework to
modernize and reform the error and of public
company auditing.
 Its principal reforms includes
1. the creation of an accounting oversight
board
2. auditor independence
3. corporate governance and responsibility
4. disclosure requirements
5. penalties for fraud and other violations
 Corruption involves an executive, manager,
or employee of the organization in collusion
with an outsider.
 The ACFE study identifies four principal types
of corruption: bribery, illegal gratuities,
conflicts of interest, and economic extortion.
 Corruption accounts for about 10% of
occupational fraud cases.
 Bribery: giving, offering, soliciting, or receiving things of
value to influence an official in the performance of his or
her lawful duties.
 An illegal gratuity involves giving, receiving, offering, or
soliciting something of value because of an official act that
has been taken. This is similar to a bribe, but the
transaction occurs after the fact.
 A conflict of interest occurs when an employee acts on
behalf of a third party during the discharge of his or her
duties or has self-interest in the activity being performed.
 Economic extortion is the use (or threat) of force
(including economic sanctions) by an individual or
organization to obtain something of value. The item of
value could be a financial or economic asset, information,
or cooperation to obtain a favorable decision on some
matter under review.
 The most common form of fraud scheme
 92% of the frauds included in the ACFE study fall
in this category.
 Assets can be misappropriated either directly or
indirectly for the perpetrator’s benefit.
 Certain assets are more susceptible than others
to misappropriation.
 Transactions involving cash, checking accounts,
inventory, supplies, equipment, and information
are the most vulnerable to abuse.
 Examples of fraud schemes involving asset
misappropriation are described in the following
sections
 The theft of an asset creates an imbalance in
the basic accounting equation (assets =
equities), which the criminal must adjust if
the theft is to go undetected.
 The most common way to conceal the
imbalance is to charge the asset to an
expense account and reduce equity by the
same amount.
 For example, the theft of $20,000 cash could
be charged to a miscellaneous operating
expense account.
 Lapping involves the use of customer checks,
received in payment of their accounts, to conceal
cash previously stolen by an employee. For example,
the employee first steals and cashes Customer A’s
check for $500.
 Customer A’s account is not credited.
 Later (the next billing period), the employee uses a
$500 check received from Customer B and applies
this to Customer A’s account.
 Employees involved in this sort of fraud often
rationalize that they are simply borrowing the cash
and plan to repay it at some future date.
 Lapping is usually detected when the employee leaves
the organization or becomes sick and must take time
off work.
 Transaction fraud involves deleting, altering, or
adding false transactions to divert assets to the
perpetrator.
 This technique may be used to ship inventories to the
perpetrator in response to a fraudulent sales
transaction or to disburse cash in payment of a false
liability.
 A common type of transaction fraud involves the
distribution of fraudulent paychecks to nonexistent
employees.
 For example, a supervisor keeps an employee who
has left the organization on the payroll. Each week,
the supervisor continues to submit time cards to the
payroll department just as if the employee were still
working.
 Because computers lie at the heart of most
organizations’ accounting information systems
today.
 No one knows the true extent of business losses each
year due to computer fraud, but estimates reaching
$100 billion per year give some indication of the
problem’s magnitude.
 One reason for uncertainty in loss estimates is that
computer fraud is not well defined.
 For example, we saw in the ethics section of this
chapter that some people do not view copying
commercial computer software to be unethical.
 On the other side of this issue, software vendors
consider this a criminal act.
 The theft, misuse, or misappropriation of assets
by altering computer-readable records and files.
 The theft, misuse, or misappropriation of assets
by altering the logic of computer software.
 The theft or illegal use of computer-readable
information.
 The theft, corruption, illegal copying, or
intentional destruction of computer software.
 The theft, misuse, or misappropriation of
computer hardware.
 The simplest way to perpetrate a computer fraud
is at the data collection or data entry stage. This
is the computer equivalent of the transaction
fraud.
 The fraudulent act involves falsifying data as it
enters the system. This can be to delete, alter, or
add a transaction.
 For example, to commit payroll fraud, the
perpetrator may insert a fraudulent payroll
transaction along with other legitimate
transactions.
 change the Hours Worked field in an otherwise
legitimate payroll transaction to increase the
amount of the paycheck
 Data processing frauds fall into two classes:
program fraud and operations fraud.
 Program fraud : creating illegal programs that
can access data files to alter, delete, or insert
values into accounting records;
 Destroying or corrupting a program’s logic using
a computer virus
 Altering program logic to cause the application
to process data incorrectly.
 Operations fraud is the misuse or theft of the
firm’s computer resources. This often involves
using the computer to conduct personal
business.
 Database management fraud includes
altering, deleting, corrupting, destroying, or
stealing an organization’s data.
 Because access to database files is an
essential element of this fraud, it is usually
associated with transaction or program fraud.
 The most common technique is to access the
database from a remote site and browse the
files for useful information that can be
copied and sold to competitors.
 A common form of fraud at the information
generation stage is to steal, misdirect, or misuse
computer output.
 One simple but effective technique called scavenging
involves searching through the trash of the computer
center for discarded output
 Another form of fraud called eavesdropping involves
listening to output transmissions over
telecommunications lines. Technologies are readily
available that enable perpetrators to intercept
messages being sent over unprotected telephone
lines and microwave channels.
 Data encryption can, however, render useless any
data captured through eavesdropping.
 Accounting information Systesm : Chapter 3
James A Hall
 http://www.fraudessentials.com/people-
who-commit-fraud/
 https://en.wikipedia.org/wiki/Fraud
 Fraud Schemes
 Statement
 Corruption
 Asset Misappropriation
 Computer Frauds
See you again in sha ALLAH
4/5/2016

Weitere ähnliche Inhalte

Was ist angesagt?

Lecture 17 sas framework internal control - james a. hall book chapter 3
Lecture 17  sas framework internal control - james a. hall book chapter 3Lecture 17  sas framework internal control - james a. hall book chapter 3
Lecture 17 sas framework internal control - james a. hall book chapter 3Habib Ullah Qamar
 
Accounting for Non-Accountants
Accounting for Non-AccountantsAccounting for Non-Accountants
Accounting for Non-AccountantsHelen Weeber
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle Qamar Farooq
 
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
Lecture 22  expenditure cycle part ii - payroll processing accounting informa...Lecture 22  expenditure cycle part ii - payroll processing accounting informa...
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...Habib Ullah Qamar
 
521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx
521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx
521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptxOliviaCelestine
 
Technology Auditing, Assurance, Internal Control
Technology Auditing, Assurance, Internal ControlTechnology Auditing, Assurance, Internal Control
Technology Auditing, Assurance, Internal ControlZefren Edior
 
Accounting information systems 13th ed .
Accounting information systems  13th ed .Accounting information systems  13th ed .
Accounting information systems 13th ed .phayes833
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sBabasab Patil
 
Conceptual Framework of Accounting
Conceptual Framework of AccountingConceptual Framework of Accounting
Conceptual Framework of AccountingSabiha Jannat
 
General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)Osareme Erhomosele
 
Lecture 18 revenue cycle - accounting information systesm james a. hall boo...
Lecture 18  revenue cycle - accounting information systesm  james a. hall boo...Lecture 18  revenue cycle - accounting information systesm  james a. hall boo...
Lecture 18 revenue cycle - accounting information systesm james a. hall boo...Habib Ullah Qamar
 
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Lecture 21  expenditure cycle part i - accounting information systesm  james ...Lecture 21  expenditure cycle part i - accounting information systesm  james ...
Lecture 21 expenditure cycle part i - accounting information systesm james ...Habib Ullah Qamar
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...Habib Ullah Qamar
 

Was ist angesagt? (20)

Lecture 17 sas framework internal control - james a. hall book chapter 3
Lecture 17  sas framework internal control - james a. hall book chapter 3Lecture 17  sas framework internal control - james a. hall book chapter 3
Lecture 17 sas framework internal control - james a. hall book chapter 3
 
Revenue cycle (AIS)
Revenue cycle (AIS)Revenue cycle (AIS)
Revenue cycle (AIS)
 
Accounting for Non-Accountants
Accounting for Non-AccountantsAccounting for Non-Accountants
Accounting for Non-Accountants
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
 
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
Lecture 22  expenditure cycle part ii - payroll processing accounting informa...Lecture 22  expenditure cycle part ii - payroll processing accounting informa...
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
 
521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx
521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx
521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx
 
Technology Auditing, Assurance, Internal Control
Technology Auditing, Assurance, Internal ControlTechnology Auditing, Assurance, Internal Control
Technology Auditing, Assurance, Internal Control
 
James hall ch 1
James hall ch 1James hall ch 1
James hall ch 1
 
04 chapter 5 estate tax
04 chapter 5 estate tax04 chapter 5 estate tax
04 chapter 5 estate tax
 
Accounting information systems 13th ed .
Accounting information systems  13th ed .Accounting information systems  13th ed .
Accounting information systems 13th ed .
 
James hall ch 5
James hall ch 5James hall ch 5
James hall ch 5
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom s
 
Conceptual Framework of Accounting
Conceptual Framework of AccountingConceptual Framework of Accounting
Conceptual Framework of Accounting
 
James hall ch 8
James hall ch 8James hall ch 8
James hall ch 8
 
General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)
 
Lecture 18 revenue cycle - accounting information systesm james a. hall boo...
Lecture 18  revenue cycle - accounting information systesm  james a. hall boo...Lecture 18  revenue cycle - accounting information systesm  james a. hall boo...
Lecture 18 revenue cycle - accounting information systesm james a. hall boo...
 
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Lecture 21  expenditure cycle part i - accounting information systesm  james ...Lecture 21  expenditure cycle part i - accounting information systesm  james ...
Lecture 21 expenditure cycle part i - accounting information systesm james ...
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
 
Audit Of Liabilities
Audit Of LiabilitiesAudit Of Liabilities
Audit Of Liabilities
 
Business combinations
Business combinationsBusiness combinations
Business combinations
 

Andere mochten auch

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
Reflective Audio Journaling
Reflective Audio JournalingReflective Audio Journaling
Reflective Audio JournalingBernard Goldbach
 
The Strategy of Journaling
The Strategy of JournalingThe Strategy of Journaling
The Strategy of Journalingjlorlando
 
Cyber crime journal by central detective training school
Cyber crime journal by central detective training schoolCyber crime journal by central detective training school
Cyber crime journal by central detective training schoolBivas Chatterjee
 
Journaling Across the Curriculum
Journaling Across the CurriculumJournaling Across the Curriculum
Journaling Across the Curriculumashchapman3
 
10135 a 09
10135 a 0910135 a 09
10135 a 09Bố Su
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networksTommy Zul Hidayat
 
Do journaling filesystems guarantee against corruption after a power failure (1)
Do journaling filesystems guarantee against corruption after a power failure (1)Do journaling filesystems guarantee against corruption after a power failure (1)
Do journaling filesystems guarantee against corruption after a power failure (1)Rudhramoorthi Andiappan
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedSiddharth Bhattacharya
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Journaling And Reflective Practice
Journaling And Reflective PracticeJournaling And Reflective Practice
Journaling And Reflective PracticeSarah Stewart
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Jeremiah Grossman
 
Hacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtHacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtRaghav Bisht
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 

Andere mochten auch (20)

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Reflective Audio Journaling
Reflective Audio JournalingReflective Audio Journaling
Reflective Audio Journaling
 
The Strategy of Journaling
The Strategy of JournalingThe Strategy of Journaling
The Strategy of Journaling
 
Cyber crime journal by central detective training school
Cyber crime journal by central detective training schoolCyber crime journal by central detective training school
Cyber crime journal by central detective training school
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
 
Journaling Across the Curriculum
Journaling Across the CurriculumJournaling Across the Curriculum
Journaling Across the Curriculum
 
10135 a 09
10135 a 0910135 a 09
10135 a 09
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Do journaling filesystems guarantee against corruption after a power failure (1)
Do journaling filesystems guarantee against corruption after a power failure (1)Do journaling filesystems guarantee against corruption after a power failure (1)
Do journaling filesystems guarantee against corruption after a power failure (1)
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques Used
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Journaling And Reflective Practice
Journaling And Reflective PracticeJournaling And Reflective Practice
Journaling And Reflective Practice
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
Hacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtHacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav Bisht
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Linux device drivers
Linux device drivers Linux device drivers
Linux device drivers
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 

Ähnlich wie Lecture 15 fraud schemes - james a. hall book chapter 3

Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
The following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxThe following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxssuser454af01
 
Business risk, control systems and risk of fraud whitin bison hospitality ltd
Business risk, control systems and risk of fraud whitin bison hospitality ltdBusiness risk, control systems and risk of fraud whitin bison hospitality ltd
Business risk, control systems and risk of fraud whitin bison hospitality ltdSheik Shami Ullah Chowdhury
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXshwetadarak
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sBabasab Patil
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskSantosh Pande
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudFraudBusters
 
Lecture 14 fraud and accountant - james a. hall book chapter 3
Lecture 14  fraud and accountant - james a. hall book chapter 3Lecture 14  fraud and accountant - james a. hall book chapter 3
Lecture 14 fraud and accountant - james a. hall book chapter 3Habib Ullah Qamar
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Pairat Srivilairit
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptxjaramulat
 
Homework guidePlease read the following note on fraud to broaden.docx
Homework guidePlease read the following note on fraud to broaden.docxHomework guidePlease read the following note on fraud to broaden.docx
Homework guidePlease read the following note on fraud to broaden.docxadampcarr67227
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abusesharing notes123
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 
C492227.pdf
C492227.pdfC492227.pdf
C492227.pdfaijbm
 
Binary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinaryScamWatchMonitor
 

Ähnlich wie Lecture 15 fraud schemes - james a. hall book chapter 3 (20)

Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
The following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxThe following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docx
 
Summary presentation Highliths
Summary presentation HighlithsSummary presentation Highliths
Summary presentation Highliths
 
Business risk, control systems and risk of fraud whitin bison hospitality ltd
Business risk, control systems and risk of fraud whitin bison hospitality ltdBusiness risk, control systems and risk of fraud whitin bison hospitality ltd
Business risk, control systems and risk of fraud whitin bison hospitality ltd
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTX
 
Tackling Corporate Fraud
Tackling Corporate FraudTackling Corporate Fraud
Tackling Corporate Fraud
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom s
 
Auditing for Internal Fraud
Auditing for Internal FraudAuditing for Internal Fraud
Auditing for Internal Fraud
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Lecture 14 fraud and accountant - james a. hall book chapter 3
Lecture 14  fraud and accountant - james a. hall book chapter 3Lecture 14  fraud and accountant - james a. hall book chapter 3
Lecture 14 fraud and accountant - james a. hall book chapter 3
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptx
 
Homework guidePlease read the following note on fraud to broaden.docx
Homework guidePlease read the following note on fraud to broaden.docxHomework guidePlease read the following note on fraud to broaden.docx
Homework guidePlease read the following note on fraud to broaden.docx
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
C492227.pdf
C492227.pdfC492227.pdf
C492227.pdf
 
Binary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online Scam
 

Mehr von Habib Ullah Qamar

Educational technology and tv radio simulation
Educational technology and tv radio simulation Educational technology and tv radio simulation
Educational technology and tv radio simulation Habib Ullah Qamar
 
Lecture 1 ECommerce an Introduction for Master classes UOS
Lecture 1 ECommerce an Introduction for Master classes UOSLecture 1 ECommerce an Introduction for Master classes UOS
Lecture 1 ECommerce an Introduction for Master classes UOSHabib Ullah Qamar
 
Computer manged learning and problems code 8620 bed
Computer manged learning and problems code 8620 bedComputer manged learning and problems code 8620 bed
Computer manged learning and problems code 8620 bedHabib Ullah Qamar
 
Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620Habib Ullah Qamar
 
Computer Assisted Instructions AIOU MA Education MED code 855
Computer Assisted Instructions AIOU MA Education MED code 855Computer Assisted Instructions AIOU MA Education MED code 855
Computer Assisted Instructions AIOU MA Education MED code 855Habib Ullah Qamar
 
Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Habib Ullah Qamar
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6Habib Ullah Qamar
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2Habib Ullah Qamar
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2Habib Ullah Qamar
 
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...Habib Ullah Qamar
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...Habib Ullah Qamar
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...Habib Ullah Qamar
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2Habib Ullah Qamar
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2Habib Ullah Qamar
 
Lecture 2 e-cmmerce , types of e-commerces-an introduction
Lecture 2  e-cmmerce , types of e-commerces-an introductionLecture 2  e-cmmerce , types of e-commerces-an introduction
Lecture 2 e-cmmerce , types of e-commerces-an introductionHabib Ullah Qamar
 
Lecture 1 e-cmmerce , an introduction
Lecture 1  e-cmmerce , an introductionLecture 1  e-cmmerce , an introduction
Lecture 1 e-cmmerce , an introductionHabib Ullah Qamar
 
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...
Lecture 25  conversion cycle -wolrd class companies & lean manufacturing-...Lecture 25  conversion cycle -wolrd class companies & lean manufacturing-...
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...Habib Ullah Qamar
 

Mehr von Habib Ullah Qamar (20)

Guidance and counselling
Guidance and counsellingGuidance and counselling
Guidance and counselling
 
Educational technology and tv radio simulation
Educational technology and tv radio simulation Educational technology and tv radio simulation
Educational technology and tv radio simulation
 
Lecture 1 ECommerce an Introduction for Master classes UOS
Lecture 1 ECommerce an Introduction for Master classes UOSLecture 1 ECommerce an Introduction for Master classes UOS
Lecture 1 ECommerce an Introduction for Master classes UOS
 
Computer manged learning and problems code 8620 bed
Computer manged learning and problems code 8620 bedComputer manged learning and problems code 8620 bed
Computer manged learning and problems code 8620 bed
 
Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620
 
Computer Assisted Instructions AIOU MA Education MED code 855
Computer Assisted Instructions AIOU MA Education MED code 855Computer Assisted Instructions AIOU MA Education MED code 855
Computer Assisted Instructions AIOU MA Education MED code 855
 
Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
 
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
 
Lecture 2 e-cmmerce , types of e-commerces-an introduction
Lecture 2  e-cmmerce , types of e-commerces-an introductionLecture 2  e-cmmerce , types of e-commerces-an introduction
Lecture 2 e-cmmerce , types of e-commerces-an introduction
 
Lecture 1 e-cmmerce , an introduction
Lecture 1  e-cmmerce , an introductionLecture 1  e-cmmerce , an introduction
Lecture 1 e-cmmerce , an introduction
 
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...
Lecture 25  conversion cycle -wolrd class companies & lean manufacturing-...Lecture 25  conversion cycle -wolrd class companies & lean manufacturing-...
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...
 

Kürzlich hochgeladen

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 

Kürzlich hochgeladen (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Lecture 15 fraud schemes - james a. hall book chapter 3

  • 1. Habib Ullah Qamar Govt. college of Commerce Gujranwala 4/5/2016
  • 2.  ACFE classification format. Three broad categories of fraud schemes are defined  Fraudulent statements : Fraudulent statements are associated with management fraud  Corruption : Corruption involves an executive, manager, or employee of the organization in collusion with an outsider.  Asset misappropriation: The most common form of fraud scheme involves some type of asset misappropriation. 92% of the frauds included in the ACFE study fall in this category.
  • 3.  All fraud involves some form of financial misstatement, to meet the definition under this class of fraud scheme the statement itself must bring direct or indirect financial benefit to the perpetrator.  For example, misstating the cash account balance to cover the theft of cash is not financial statement fraud.  Fraudulent statements account for only 8 percent of the fraud cases covered in the ACFE fraud study  The median loss due to this type of fraud scheme is significantly higher than losses from corruption and asset misappropriation.
  • 4.  Lack of Auditor Independence. A There might be two cases one if an auditor is hired from outside world by the clients and secondly if auditor is also a manager and performs some other services too like actuarial services, internal audit outsourcing services, and consulting.  In both cases they will lack independence as their performance will adversely affect their consulting fees. For example, Enron’s auditors—Arthur Andersen—were also their internal auditors and their management consultants.
  • 5.  Lack of Director Independence. Many boards of directors are composed of individuals who are not independent. Examples of lack of independence are directors who have a personal relationship by serving on the boards of other directors’ companies; have a business trading relationship as key customers or suppliers of the company; have a financial relationship as primary stockholders or have received personal loans from the company; or have an operational relationship as employees of the company.  Adelphia Company : $60billion Fraud
  • 6.  Questionable Executive Compensation Schemes. A Thomson Financial survey observed that executives have abused stock- based compensation. The consensus is that fewer stock options should be offered than currently is the practice. Excessive use of short-term stock options to compensate directors and executives may result in short- term thinking and strategies aimed at driving up stock prices at the expense of the firm’s long-term health.
  • 7.  Inappropriate Accounting Practices. The use of inappropriate accounting techniques is a characteristic common to many financial statement fraud schemes.  Enron made elaborate use of special-purpose entities (SPEs) to hide liabilities through off- balance-sheet accounting. SPEs are legal, but their application in this case was clearly intended to deceive the market. Enron also employed income-inflating techniques. For example, when the company sold a contract to provide natural gas for a period of two years, they would recognize all the future revenue in the period when the contract was sold.
  • 8.  The SOX act establishes a framework to modernize and reform the error and of public company auditing.  Its principal reforms includes 1. the creation of an accounting oversight board 2. auditor independence 3. corporate governance and responsibility 4. disclosure requirements 5. penalties for fraud and other violations
  • 9.  Corruption involves an executive, manager, or employee of the organization in collusion with an outsider.  The ACFE study identifies four principal types of corruption: bribery, illegal gratuities, conflicts of interest, and economic extortion.  Corruption accounts for about 10% of occupational fraud cases.
  • 10.  Bribery: giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties.  An illegal gratuity involves giving, receiving, offering, or soliciting something of value because of an official act that has been taken. This is similar to a bribe, but the transaction occurs after the fact.  A conflict of interest occurs when an employee acts on behalf of a third party during the discharge of his or her duties or has self-interest in the activity being performed.  Economic extortion is the use (or threat) of force (including economic sanctions) by an individual or organization to obtain something of value. The item of value could be a financial or economic asset, information, or cooperation to obtain a favorable decision on some matter under review.
  • 11.  The most common form of fraud scheme  92% of the frauds included in the ACFE study fall in this category.  Assets can be misappropriated either directly or indirectly for the perpetrator’s benefit.  Certain assets are more susceptible than others to misappropriation.  Transactions involving cash, checking accounts, inventory, supplies, equipment, and information are the most vulnerable to abuse.  Examples of fraud schemes involving asset misappropriation are described in the following sections
  • 12.  The theft of an asset creates an imbalance in the basic accounting equation (assets = equities), which the criminal must adjust if the theft is to go undetected.  The most common way to conceal the imbalance is to charge the asset to an expense account and reduce equity by the same amount.  For example, the theft of $20,000 cash could be charged to a miscellaneous operating expense account.
  • 13.  Lapping involves the use of customer checks, received in payment of their accounts, to conceal cash previously stolen by an employee. For example, the employee first steals and cashes Customer A’s check for $500.  Customer A’s account is not credited.  Later (the next billing period), the employee uses a $500 check received from Customer B and applies this to Customer A’s account.  Employees involved in this sort of fraud often rationalize that they are simply borrowing the cash and plan to repay it at some future date.  Lapping is usually detected when the employee leaves the organization or becomes sick and must take time off work.
  • 14.  Transaction fraud involves deleting, altering, or adding false transactions to divert assets to the perpetrator.  This technique may be used to ship inventories to the perpetrator in response to a fraudulent sales transaction or to disburse cash in payment of a false liability.  A common type of transaction fraud involves the distribution of fraudulent paychecks to nonexistent employees.  For example, a supervisor keeps an employee who has left the organization on the payroll. Each week, the supervisor continues to submit time cards to the payroll department just as if the employee were still working.
  • 15.  Because computers lie at the heart of most organizations’ accounting information systems today.  No one knows the true extent of business losses each year due to computer fraud, but estimates reaching $100 billion per year give some indication of the problem’s magnitude.  One reason for uncertainty in loss estimates is that computer fraud is not well defined.  For example, we saw in the ethics section of this chapter that some people do not view copying commercial computer software to be unethical.  On the other side of this issue, software vendors consider this a criminal act.
  • 16.  The theft, misuse, or misappropriation of assets by altering computer-readable records and files.  The theft, misuse, or misappropriation of assets by altering the logic of computer software.  The theft or illegal use of computer-readable information.  The theft, corruption, illegal copying, or intentional destruction of computer software.  The theft, misuse, or misappropriation of computer hardware.
  • 17.
  • 18.  The simplest way to perpetrate a computer fraud is at the data collection or data entry stage. This is the computer equivalent of the transaction fraud.  The fraudulent act involves falsifying data as it enters the system. This can be to delete, alter, or add a transaction.  For example, to commit payroll fraud, the perpetrator may insert a fraudulent payroll transaction along with other legitimate transactions.  change the Hours Worked field in an otherwise legitimate payroll transaction to increase the amount of the paycheck
  • 19.  Data processing frauds fall into two classes: program fraud and operations fraud.  Program fraud : creating illegal programs that can access data files to alter, delete, or insert values into accounting records;  Destroying or corrupting a program’s logic using a computer virus  Altering program logic to cause the application to process data incorrectly.  Operations fraud is the misuse or theft of the firm’s computer resources. This often involves using the computer to conduct personal business.
  • 20.  Database management fraud includes altering, deleting, corrupting, destroying, or stealing an organization’s data.  Because access to database files is an essential element of this fraud, it is usually associated with transaction or program fraud.  The most common technique is to access the database from a remote site and browse the files for useful information that can be copied and sold to competitors.
  • 21.  A common form of fraud at the information generation stage is to steal, misdirect, or misuse computer output.  One simple but effective technique called scavenging involves searching through the trash of the computer center for discarded output  Another form of fraud called eavesdropping involves listening to output transmissions over telecommunications lines. Technologies are readily available that enable perpetrators to intercept messages being sent over unprotected telephone lines and microwave channels.  Data encryption can, however, render useless any data captured through eavesdropping.
  • 22.  Accounting information Systesm : Chapter 3 James A Hall  http://www.fraudessentials.com/people- who-commit-fraud/  https://en.wikipedia.org/wiki/Fraud
  • 23.  Fraud Schemes  Statement  Corruption  Asset Misappropriation  Computer Frauds
  • 24. See you again in sha ALLAH 4/5/2016