FINANCIAL ACCOUNTING:TOOLS FOR BUSINESS
19th Edition
ISBN: 9781119493624
Author: Kimmel
Publisher: WILEY
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 7.4EYCT
(a)
To determine
Fraud: Fraud is a deliberate and deceptive action of an employee to obtain unlawful gain from the employer.
To find: The percentage of companies in the world which experienced fraud during the survey period, and find the country which has the highest percentage
(b)
To determine
To find: The percentage of survey respondents participated in anti-bribery/anti-corruption (ABAC), to assess the emerging risk during the last two years of survey period
(c)
To determine
To find: The percentage of C-suite executives have not participated in anti-bribery/anti-corruption (ABAC) training
(d)
To determine
To find: The source of cybercrime that concerns the respondents significantly
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Wise Limited has an online platform for purchase and sale of goods and services which connects customers all around the world. It provides additional services of invoicing and data collation for sellers on the platform. Sellers process sales orders and transport the orders to the customers. Payment is made through the platform directly to the seller for which Wise limited collects a fee for invoicing services
Further to the requirement of the Code of Corporate Governance Wise limited has decided to change its auditors after a period of 10 years. Your firm was approached and due process followed in the appointment of new Auditors including appropriate professional clearance. The audit is now set to commence.
You are the Audit Manager responsible for this engagement but some of your Team members are not conversant with controls in on-line businesses.
b. A computer-based information system is expected to have general IT controls in place. Discuss the main categories of general IT…
Some of the largest business frauds ever perpetrated have involved the misstatement of inventory. Two classics were at Leslie Fay and McKesson Corporation. Feel free to check them out to get a feel for the impact that it has. There is considerable information regarding inventory frauds available on the Internet. Search for information about another instance of inventory fraud at any other company, and prepare an explanation of the nature of the inventory fraud.
Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will customer orders be received via the Internet? Are all collections from customers received in the form of checks? Are product quantities monitored regularly?
Chapter 7 Solutions
FINANCIAL ACCOUNTING:TOOLS FOR BUSINESS
Ch. 7 - A local hank reported that it lost 150,000 as the...Ch. 7 - Prob. 2QCh. 7 - Prob. 3QCh. 7 - Prob. 4QCh. 7 - Prob. 5QCh. 7 - Prob. 6QCh. 7 - Prob. 7QCh. 7 - Prob. 8QCh. 7 - Prob. 9QCh. 7 - Prob. 10Q
Ch. 7 - Prob. 11QCh. 7 - Prob. 12QCh. 7 - Prob. 13QCh. 7 - Prob. 14QCh. 7 - Prob. 15QCh. 7 - Prob. 16QCh. 7 - Prob. 17QCh. 7 - Prob. 18QCh. 7 - Prob. 19QCh. 7 - Prob. 20QCh. 7 - Prob. 21QCh. 7 - Prob. 22QCh. 7 - Prob. 23QCh. 7 - Prob. 24QCh. 7 - Prob. 25QCh. 7 - Prob. 26QCh. 7 - Prob. 27QCh. 7 - Prob. 28QCh. 7 - Match each situation with the fraud triangle...Ch. 7 - Prob. 7.3BECh. 7 - Prob. 7.4BECh. 7 - Prob. 7.5BECh. 7 - While examining cash receipts information, the...Ch. 7 - Prob. 7.8BECh. 7 - Luke Rove is uncertain about the control features...Ch. 7 - Prob. 7.10BECh. 7 - Prob. 7.11BECh. 7 - Prob. 7.12BECh. 7 - Prob. 7.13BECh. 7 - Prob. 7.15BECh. 7 - Prob. 7.16BECh. 7 - Prob. 7.17BECh. 7 - Prob. 7.1DIECh. 7 - Prob. 7.2DIECh. 7 - Prob. 7.3DIECh. 7 - Prob. 7.4aDIECh. 7 - Prob. 7.4bDIECh. 7 - Prob. 7.1ECh. 7 - Prob. 7.2ECh. 7 - Prob. 7.5ECh. 7 - Prob. 7.6ECh. 7 - Prob. 7.7ECh. 7 - Prob. 7.9ECh. 7 - Prob. 7.10ECh. 7 - Prob. 7.11ECh. 7 - Prob. 7.12ECh. 7 - Prob. 7.13ECh. 7 - Prob. 7.14ECh. 7 - Prob. 7.16ECh. 7 - Prob. 7.18ECh. 7 - Prob. 7.19ECh. 7 - Prob. 7.1APCh. 7 - Prob. 7.2APCh. 7 - Prob. 7.1EYCTCh. 7 - Prob. 7.2EYCTCh. 7 - Prob. 7.3EYCTCh. 7 - Prob. 7.4EYCTCh. 7 - Prob. 7.5EYCTCh. 7 - Prob. 7.6EYCTCh. 7 - Prob. 7.7EYCTCh. 7 - Prob. 7.8EYCTCh. 7 - Prob. 7.9EYCTCh. 7 - Prob. 7.1IECh. 7 - Prob. 7.2IE
Knowledge Booster
Similar questions
- You are working for a new company that is primarily an Internet-based seller of goods whose business model is similar to eBay's. The company was founded on principles similar to eBay's and is an online auction business, but has the added benefit of having one common site that deals with customers world- wide. The CEO knows that privacy is very important in the online business and has requested that the internal audit function draft a best practices privacy policy for customers because the motto for the new company is "Your Pri- vacy is Our Policy." The company neither has, nor plans to hire, a privacy or compliance officer. The CEO expects the CAE to lead this effort and ensure the campaign delivers on the company's motto. With the advertising campaign slated to launch in one month, the CEO wants the privacy documentation finalized as soon as possible. A. Identify key sources on privacy that are available for you to reference as you define best practices. B. Determine the consulting…arrow_forwardA multimediacourse graduate used design software to create paychecks that lookedidentical to those of a company in his town.The paychecks were deposited electronically into ofhis friends’ accounts. What type of fraud did hecommit? Select one: a. output fraud. b. input fraud. c. computer instruction fraud. d. processor fraud.arrow_forwardMa4. What do you think are the top cyber threats targeting accounting firms? List two ways in which a company can protect its data What is the biggest challenges facing the accounting profession? What barriers might prevent you from conducting a good audit? Why is the leader important in accounting? How does new technology affect the accounting profession> What are the new technology being used in the accounting system?arrow_forward
- You are auditing Hawthorne Industries. The preliminary risk assessment resulted in a high potential for fraud given the number of offices it has across Canada and the high volume of travel-related expenses, as well as the weak controls around expense management. The travel expense account has been assigned to you for substantive testing and you would like to design an ADA to perform the testing. The data you have available include:• The general ledger• Corporate credit card data (in aggregate, as well as employee daily totals, location of charges, and vendor category, e.g., restaurant, fuel, hotel)• Payroll records that include start/end date, vacation and absenteeism data, and roleWhat are the main assertions related to the travel expense account? (Several choices may be correct.) Completeness Cut-off Classification Accuracy Occurrence Existencearrow_forwardAccounting The internal audit group at Freshfield Inc., a produce wholesaler, has tested the company’s IT controls and found security weaknesses in its e-commerce system. This is an example of which type of enterprise risk? a) Strategic risk b) Compliance risk c) Operational risk d) Reporting risk.arrow_forwardou are an investment banker performing due diligence on a potential acquisition for a financial buyer. For this particular transaction, the ability of the acquisition target to continue operations in severe weather is critical for profitability and the transaction’s success. As part of your due diligence you would most likely review which of the following reports? 1. SOC 1 2. PCI Compliance 3. SOC 2 4. SOC for cybersecurityarrow_forward
- Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?arrow_forwardRead the following information and then answer questions a & b below: Assume you are an internal auditor for a large, multinational, manufacturing organization with a division in Mexico. One of your responsibilities is to investigate allegations made on the company’s fraud hotline. When you arrive at work one morning you learn an anonymous tip was left on the hotline that alleges fraud involving the division manager. “Pat’s significant other is a fraudulent vendor,” was the anonymous tip left on your company’s fraud hotline. Pat is a division manager at your company. “Wow. I can’t believe this guy is so blatant,” you are thinking as you review some accounts payable invoices while following up on this anonymous tip. A quick search of the AP file reveals a total of three invoices like the one, all for identical amounts but on different dates. The division manager, Pat, has the authority to approve payment of invoices for less than $10,000. It is obvious to you that the manager has…arrow_forwardyou have been engaged as a consultant for Zenith Bank Ghana LTD. Draw up a comprehensive fraud risk assessement that would incorporate a formal process of accountability and reponsibility going forward for Zenith Ghana Ltd.arrow_forward
- Risk assessment is carried out by the organization to identify, analyze and manage relevant risks. Following are circumstances that can cause or change the risk, except: a. New personal who have a different or inadequate understanding of internal control.b. The board of directors establish a code of ethical standards.c. Significant and rapid growth that strains existing internal controls.d. Entering into foreign markets that may impact operations. Explain the answer in 100-150 wordsarrow_forward1. Access the International Federation of Accountants Web site (www.ifac.org) and briefly describe the following two International Auditing Standards: ISA 500 and ISA 505. 2. Access the U.S department of justice website, and briefly explain the characteristics of identity theft. Give two examples of ways to commit identity theft. 3. Locate SEC Accounting and Auditing Enforecement Release No. 3029. What did that SEC release discuss?arrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Is it appropriate to program the system for general authorization of certain sales, within given limits?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College PubAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning