Preview

Fraud Paper

Satisfactory Essays
Open Document
Open Document
318 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fraud Paper
Assignment: R2-1, R2-3, R2-8

Fraud Homework #1

1. R2-1 : How is “skimming” defined?

- Skimming is defined by the theft of cash prior to its entry into the accounting system.

2. R2-3 : How do sales skimming schemes leave a victim organization’s books in balance, despite the theft of funds?

- They leave a victims organization’s books in balance because neither the sales transaction nor the stolen funds are ever recorded.

3. R2-8 : What are the six principal methods used to conceal receivables skimming?

* 1. Lapping – is when someone tries to conceal the theft of cash designated for accounts receivable by crediting one account while abstracting money from a different one. * 2. Force balancing – is when the fraudster falsifies account totals to conceal the theft of funds (also known as “plugging”). The fraudster will steal a customer’s payment but nevertheless post it to the customer’s account so that the account does not age past due. * 3. Stolen statements – is when the fraudster may steal or alter statements, or produce counterfeit statements to make it appear that the customer’s payments have been properly posted. The fraudster then sends the fake statements to the customer and leads them to believe that their account is up to date and keeps them from complaining about stolen payments. * 4. Fraudulent write-offs or discounts – When there is a fraudulent write-off of a customer’s account. Instead of writing off accounts as bad debts, some employees cover their skimming by posting entries to contra revenue accounts such as “discounts and allowances”. * 5. Debiting the wrong account – Fraudsters may debit existing or fictitious accounts receivable in order to conceal skimmed cash. They can add the amounts taken to the accounts of other patients that they know would soon be written off as uncollectable. * 6. Document destruction – when a perpetrator simply destroys an organization’s accounting records in order to

You May Also Find These Documents Helpful

  • Powerful Essays

    Au2 Question 4 Assignment 4

    • 5257 Words
    • 22 Pages

    Fraudulent financial reporting is an intentional misstatement or omission of amounts or disclosures with the intent to deceive users, while misappropriation of assets is fraud that involves theft of an entity’s assets. Frauds involving financial reporting are usually larger than frauds involving misappropriation of assets, usually involve top management, and do not directly involve theft of company assets.…

    • 5257 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Fraud Examination

    • 387 Words
    • 2 Pages

    Review 2-3: Sales skimming schemes leave a victims organization's books in balance because an employee will make a sale or a service to a customer, collect the payment at the point of sale, but will make no record of the transaction. The employee will then pocket the money received instead of turning it over to the employer.…

    • 387 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Leslie Fay

    • 1045 Words
    • 5 Pages

    Leslie Fay’s income was determined to be overstated $80 million over a period of just three years, 1990-1992. The overstatement of income was the result of over $130 million of fraudulent accounting transactions. Inventory was the main focal point of the Leslie Fay fraudulent activities. The fraud included inflating the number of dresses manufactured each quarter, creating fraudulent inventory tags, and overstating inventory by creating in-transit inventory shipments that didn’t exist. The fraud extended beyond inventory, however. Recording advance sales, not accruing expenses, not writing off bad debt, and not recording discounts on receivables were also amongst the fraudulent entries (Knapp, 2011).…

    • 1045 Words
    • 5 Pages
    Better Essays
  • Better Essays

    These transactions are resulting in the exploitation of resources of the Web site and of the Credit Card Providers for these users after the User’s reaches their responsible percentage quickly. The Hacker uses their methods to exploit found vulnerabilities or have a User click on an application that allows them to take control undetected while the user continues their shopping. Once the User signs off and leaves the transaction it supposedly closes its session, the Hacker suspends the transaction until the coast is clear and then continues undetected, (Imperva, 2012b).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Financial abuse: Financial abuse is the illegal or unauthorised use of a person’s money, property, pension book or other valuables…

    • 3231 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    The Corporate Con

    • 1118 Words
    • 5 Pages

    Pam was a graduate from high school who found work soon after graduation. She felt she wasn't getting paid enough for her work so she started stealing cash from the register and other places from where she worked. The type of fraud she committed was cash fraud. Cash is usually the focal point of many accounting entries. Cash on deposit in banks and petty cash, can be stolen through numerous different schemes. The schemes committed are either on-book or off-book, depending on the point of occurrence of the fraud scheme. Generally, a company focuses on cash scheme frauds, rather than other types of fraud because money getting stolen from the company is the easiest fraud that can be committed. Some of the basic cash fraud patterns are: skimming, voids/ under-rings, swapping cash for checks, alteration of cash receipt documentation, fictitious refunds and discounts, journal entries and kiting.…

    • 1118 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    If a salesperson reports selling more item that he/she actually sold, or induces customers to “load up” on products during a promotion period, it is a type of cheating that affects many people in adverse ways.…

    • 818 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    * Financial abuse - unauthorised use of the service users property, money or other valuables.…

    • 557 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Financial abuse is the illegal or unauthorised use of a person’s property, money, pension book or other valuables.…

    • 2189 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Financial abuse is the illegal or unauthorised use of a person’s property, money, pension book or other valuables.…

    • 1144 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fraudsters rationalize their misdeeds with thoughts like; they will replace the stolen asset in the near future before anyone notices, or maybe the boss is doing it so why can’t I? Higher level employees like the CEO may rationalize that stock prices will be higher if they manipulate the financial statements, after all who they are hurting? It all comes out in the wash, right? Creative accounting is all it takes and adjustments could be made in the future to remedy this year’s fraud.…

    • 708 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Coodner Brothers, Inc.

    • 494 Words
    • 2 Pages

    The sales reps often jotted the details of a transaction on a piece of scrap paper and entered information later either by themselves or others.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This course is designed to acquaint students, information technology managers and financial managers of interplay between fraud and electronic banking. It is aimed at extensive examination of the forms of electronic fraud that plague financial transactions, and in so doing explore ways to dealing with electronic fraud. The nature and forms of electronic banking is also examined with the intension to compare and contrast forms of electronic banking. Through a thorough x-ray of how to deal with electronic fraud schemes, we inspire confidence in would be electronic fund managers and investors to engage in electronic banking transactions.…

    • 654 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. There is possibility that the irregularities in the account balances is due to illegal transferring of a particular debtor’s balances to another debtor.…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Salami Attack

    • 830 Words
    • 4 Pages

    The victims that take the fall for such acts are usually bank holders, and websites that store account information like PayPal. It can be quite scary to have amounts disappear in large portions at once, making it a onetime incident for the company. Raj B Lon sane states that the amount of money that is then lost cannot be replaced by the company, leading them to take on court battles without the money to replace what is lost. Therefore for an insider to do this on a regular basis, he/she deducts money slyly in small quantities without having the customer in question, take notice.…

    • 830 Words
    • 4 Pages
    Good Essays