Preview

Fraud Paper

Satisfactory Essays
Open Document
Open Document
318 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fraud Paper
Assignment: R2-1, R2-3, R2-8

Fraud Homework #1

1. R2-1 : How is “skimming” defined?

- Skimming is defined by the theft of cash prior to its entry into the accounting system.

2. R2-3 : How do sales skimming schemes leave a victim organization’s books in balance, despite the theft of funds?

- They leave a victims organization’s books in balance because neither the sales transaction nor the stolen funds are ever recorded.

3. R2-8 : What are the six principal methods used to conceal receivables skimming?

* 1. Lapping – is when someone tries to conceal the theft of cash designated for accounts receivable by crediting one account while abstracting money from a different one. * 2. Force balancing – is when the fraudster falsifies account totals to conceal the theft of funds (also known as “plugging”). The fraudster will steal a customer’s payment but nevertheless post it to the customer’s account so that the account does not age past due. * 3. Stolen statements – is when the fraudster may steal or alter statements, or produce counterfeit statements to make it appear that the customer’s payments have been properly posted. The fraudster then sends the fake statements to the customer and leads them to believe that their account is up to date and keeps them from complaining about stolen payments. * 4. Fraudulent write-offs or discounts – When there is a fraudulent write-off of a customer’s account. Instead of writing off accounts as bad debts, some employees cover their skimming by posting entries to contra revenue accounts such as “discounts and allowances”. * 5. Debiting the wrong account – Fraudsters may debit existing or fictitious accounts receivable in order to conceal skimmed cash. They can add the amounts taken to the accounts of other patients that they know would soon be written off as uncollectable. * 6. Document destruction – when a perpetrator simply destroys an organization’s accounting records in order to

You May Also Find These Documents Helpful

  • Better Essays

    These transactions are resulting in the exploitation of resources of the Web site and of the Credit Card Providers for these users after the User’s reaches their responsible percentage quickly. The Hacker uses their methods to exploit found vulnerabilities or have a User click on an application that allows them to take control undetected while the user continues their shopping. Once the User signs off and leaves the transaction it supposedly closes its session, the Hacker suspends the transaction until the coast is clear and then continues undetected, (Imperva, 2012b).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Au2 Question 4 Assignment 4

    • 5257 Words
    • 22 Pages

    Fraudulent financial reporting is an intentional misstatement or omission of amounts or disclosures with the intent to deceive users, while misappropriation of assets is fraud that involves theft of an entity’s assets. Frauds involving financial reporting are usually larger than frauds involving misappropriation of assets, usually involve top management, and do not directly involve theft of company assets.…

    • 5257 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    If a salesperson reports selling more item that he/she actually sold, or induces customers to “load up” on products during a promotion period, it is a type of cheating that affects many people in adverse ways.…

    • 818 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Financial abuse is the illegal or unauthorised use of a person’s property, money, pension book or other valuables.…

    • 1144 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Corporate Con

    • 1118 Words
    • 5 Pages

    Skimming is the process by which cash is removed from a victim entity before the cash is recorded in the accounting system. When an employee skims from a company they are stealing sales and receivables before they can be recorded into the company's book. These are considered off-book schemes since the receipt of the of the cash is never recorded. Since the stolen funds are never recorded, there is no direct audit trail. In the video Pam tells the audience how it felt after she was caught skimming.…

    • 1118 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Leslie Fay

    • 1045 Words
    • 5 Pages

    Leslie Fay’s income was determined to be overstated $80 million over a period of just three years, 1990-1992. The overstatement of income was the result of over $130 million of fraudulent accounting transactions. Inventory was the main focal point of the Leslie Fay fraudulent activities. The fraud included inflating the number of dresses manufactured each quarter, creating fraudulent inventory tags, and overstating inventory by creating in-transit inventory shipments that didn’t exist. The fraud extended beyond inventory, however. Recording advance sales, not accruing expenses, not writing off bad debt, and not recording discounts on receivables were also amongst the fraudulent entries (Knapp, 2011).…

    • 1045 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Fraudsters rationalize their misdeeds with thoughts like; they will replace the stolen asset in the near future before anyone notices, or maybe the boss is doing it so why can’t I? Higher level employees like the CEO may rationalize that stock prices will be higher if they manipulate the financial statements, after all who they are hurting? It all comes out in the wash, right? Creative accounting is all it takes and adjustments could be made in the future to remedy this year’s fraud.…

    • 708 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Asset Irregularities

    • 887 Words
    • 4 Pages

    The theft normally occurs between several customer accounts where the first payment is taken and the next customer’s payment is applied to the first and the cycle continues. To keep this fraud activity going, it takes good record keeping; however this can be exposed quickly if proper customer records are kept and evaluated on a regular basis will be exposed quickly. Discounting can be another area for fraudulent activity within the accounts receivable process.…

    • 887 Words
    • 4 Pages
    Good Essays
  • Good Essays

    One quickly realizes that through fraud a person could obtain funding to sustain operations. Through credit card fraudulent charges and check kiting and to stage theft to fleece one’s insurance company, producing more cash flow, one can raise quick and easy money. Through this experience with these types of fraud, it is realized quickly that one could bypass internal controls and create assets to bolster the company’s financial statements.…

    • 1570 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    This method of cash larceny is less effective than stealing directly from the till because it requires the fraudster to cover the balance with a personal cheque in order to allow the till balance to reconcile.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (ACFE )defines fraud as a false statements that an individual or entity knows that a lie may result in some unauthorized person or any other party or entity of profit. Also,ACFE defines fraud as an act of fraud or error committed by a natural or legal person who knows that the error may result in certain benefits that are not for individuals or entities or other parts. (Ernst & Young LLP, 2009).Moreover, fraud occurs in financial transactions in several ways. First,…

    • 215 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Coodner Brothers, Inc.

    • 494 Words
    • 2 Pages

    The sales reps often jotted the details of a transaction on a piece of scrap paper and entered information later either by themselves or others.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This course is designed to acquaint students, information technology managers and financial managers of interplay between fraud and electronic banking. It is aimed at extensive examination of the forms of electronic fraud that plague financial transactions, and in so doing explore ways to dealing with electronic fraud. The nature and forms of electronic banking is also examined with the intension to compare and contrast forms of electronic banking. Through a thorough x-ray of how to deal with electronic fraud schemes, we inspire confidence in would be electronic fund managers and investors to engage in electronic banking transactions.…

    • 654 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Salami Attack

    • 830 Words
    • 4 Pages

    The victims that take the fall for such acts are usually bank holders, and websites that store account information like PayPal. It can be quite scary to have amounts disappear in large portions at once, making it a onetime incident for the company. Raj B Lon sane states that the amount of money that is then lost cannot be replaced by the company, leading them to take on court battles without the money to replace what is lost. Therefore for an insider to do this on a regular basis, he/she deducts money slyly in small quantities without having the customer in question, take notice.…

    • 830 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. There is possibility that the irregularities in the account balances is due to illegal transferring of a particular debtor’s balances to another debtor.…

    • 519 Words
    • 3 Pages
    Satisfactory Essays