Professional Documents
Culture Documents
FRAUD TREE
Asset misappropriation fraud
1. 2. 3. 4.
Stealing something of value usually cash or inventory (i.e., asset theft) Converting asset to usable form Concealing the crime to avoid detection Usually, perpetrator is an employee
Financial fraud
1. 2. 3. 4. 5.
Does not involve direct theft of assets Often objective is to obtain higher stock price (i.e., financial fraud) Typically involves misstating financial data to gain additional compensation, promotion, or escape penalty for poor performance Often escapes detection until irreparable harm has been done Usually, perpetrator is executive management
Corruption fraud
1.
Bribery, etc.
IT Auditing & Assurance, 2e, Hall & Singleton
FRAUD SCHEMES
Fraudulent financial statements {5%}
Corruption {13%}
Bribery Illegal gratuities Conflicts of interest Economic extortion Charges to expense accounts Lapping Kiting Transaction fraud
IT Auditing & Assurance, 2e, Hall & Singleton
Percentages per ACFE 2002 Report to the Nation see Table 12-1
Database Management
Information Generation
2. Industry conditions
3. Operating characteristics and financial stability
MISAPPROPRIATION OF ASSETS
Risk factors:
1. Susceptibility of assets to
misappropriation
2. Controls
MISAPPROPRIATION OF ASSETS
Common schemes:
Personal purchases Ghost employees Fictitious expenses Altered payee Pass-through vendors Theft of cash (or inventory) Lapping
AUDITORS DOCUMENTATION
Document in the working papers criteria used for assessing fraud risk factors: 1. Those risk factors identified 2. Auditors response to them
Chapter 12:
Fraud Schemes & Fraud Detection