Chapter 12: Fraud Schemes & Fraud Detection

Slides:



Advertisements
Similar presentations
1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
Advertisements

Basic Fraud Audit Pertemuan VIII Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
© The McGraw-Hill Companies, Inc., 2006 Slide 10-1 Cash and Financial Investments.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
6 THE AUDIT PROCESS. AUDITRESPONSIBILITIES AND OBJECTIVES AUDITRESPONSIBILITIES Audit Objective Primary objective of the audit is to express an opinion.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11 By arens et.al.,.
1 Fraud Management’s Responsibility Auditor’s Consideration.
Chapter 6-1 The Islamic University of Gaza Accounting Information System Ethics, Fraud and Internal Control Dr. Hisham Madi.
McGraw-Hill/Irwin ©2007 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Management Fraud and Audit Risk "It takes 20 years to build a.
Assurance and Attestation Services BA 427 Winter 2007 Substantive Procedures Glenn Lovett, Shareholder.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
SAS 99: Consideration of Fraud in a Financial Statement Audit Based upon AICPA 2003 overview available at
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Chapter 6 Audit Responsibilities and Objectives
Chapter 4 Risk Assessment.
AUDIT RESPONSIBILITIES AND OBJECTIVES
Chapter 8 Auditing for Fraud.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Chapter 16: Audit of Cash Balances
Chapter 9 Auditing for Fraud
ETHICS, FRAUD AND INTERNAL CONTROL Pertemuan_5 Mata kuliah : CSP402, IT GOVERNANCE Tahun Akademik : 2012/2013 Outlines the roles of Information Technology.
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Chapter 4 Risk Assessment McGraw-Hill/Irwin
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Audit Planning and Types of Audit Tests Chapter Five.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
Chapter 12 Inventories and Cost of Goods Sold McGraw-Hill/Irwin
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 9 Auditing the Revenue Cycle REVIEW.
Audit Planning. Decide whether or not to accept the prospective client Obtain knowledge of client’s business and industry Make preliminary arrangements.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
Fraud Against Organizations FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud Against Organizations Chapter 13.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter 8.
Define risk in AUDITING
Audit Responsibilities and Objectives
PROFESSIONAL LIABILITY & QUALITY CONTROL
Types of fraud Fraudulent Financial Reporting—An intentional misstatement or omission of amounts or disclosures with the intent to deceive users. Most.
Internal Control Procedures
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Audit Planning, Types of Audit Tests and Materiality
Management Fraud and Audit Risk
Materiality and Risk Chapter 8.
Revenue and Collection Cycle
Audit Planning and Analytical Procedures
Fraud Auditing Chapter 11.
Cash and Financial Investments
Cindy Seipel PhD CPA CFE Professor of Accounting (Auditing) NMSU
Understanding the entity
Chapter 10 Cash and Financial Investments McGraw-Hill/Irwin
Management Fraud and Audit Risk
AU-C Section 240 Consideration of fraud in a financial statement
Audit Responsibilities and Objectives
Audit of the Payroll and Personnel Cycle
Presentation transcript:

Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton IT Auditing & Assurance, 2e, Hall & Singleton

IT Auditing & Assurance, 2e, Hall & Singleton FRAUD TREE Asset misappropriation fraud Stealing something of value – usually cash or inventory (i.e., asset theft) Converting asset to usable form Concealing the crime to avoid detection Usually, perpetrator is an employee Financial fraud Does not involve direct theft of assets Often objective is to obtain higher stock price (i.e., financial fraud) Typically involves misstating financial data to gain additional compensation, promotion, or escape penalty for poor performance Often escapes detection until irreparable harm has been done Usually, perpetrator is executive management Source: ACFE Corruption fraud Bribery, etc. IT Auditing & Assurance, 2e, Hall & Singleton

ACFE 2004 REPORT TO THE NATION IT Auditing & Assurance, 2e, Hall & Singleton

IT Auditing & Assurance, 2e, Hall & Singleton FRAUD SCHEMES Fraudulent financial statements {5%} Corruption {13%} Bribery Illegal gratuities Conflicts of interest Economic extortion Asset misappropriation {85%} Charges to expense accounts Lapping Kiting Transaction fraud FRAUD SCHEMES  ACFE 2002 Report to the Nation Fraudulent Financial Statements {5%} Corruption {10%} Bribery Illegal gratuities Conflicts of interest Economic extortion Asset Misappropriation {85%} Charges to Expense Accounts {??} Lapping {??} Kiting {??} Transaction Fraud {??} Percentages per ACFE 2002 Report to the Nation – see Table 12-1 IT Auditing & Assurance, 2e, Hall & Singleton

COMPUTER FRAUD SCHEMES Data Collection Data Processing Database Management Information Generation Employee fraud – done by non-management employees are generally designed to directly convert cash or other assets to the employee’s personal benefit.   Employee fraud usually involves 3 steps: stealing something of value, converting the asset to a usable form, and concealing the crime to avoid detection. Management fraud – often escapes detection until irreparable damage has been done. Does not involve the direct theft of assets. Management may engage in fraudulent activities to obtain a higher price from a stock or debt offering or just to meet the expectations of investors. May typically involve materially misstating financial data and reports to gain additional compensation, to garner a promotion, or to escape the penalty for poor performance. IT Auditing & Assurance, 2e, Hall & Singleton

AUDITOR’S RESPONSIBILITY FOR DETECTING FRAUD—SAS NO. 99 Sarbanes-Oxley Act 2002 SAS No. 99 – “Consideration of Fraud in a Financial Statement Audit” Description and characteristics of fraud Professional skepticism Engagement personnel discussion Obtaining audit evidence and information Identifying risks Assessing the identified risks Responding to the assessment Evaluating audit evidence and information Communicating possible fraud Documenting consideration of fraud Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

FRAUDULANT FINANCIAL REPORTING Risk factors: Management’s characteristics and influence over the control environment Industry conditions Operating characteristics and financial stability Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

FRAUDULANT FINANCIAL REPORTING Common schemes: Improper revenue recognition Improper treatment of sales Improper asset valuation Improper deferral of costs and expenses Improper recording of liabilities Inadequate disclosures Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

MISAPPROPRIATION OF ASSETS Risk factors: Susceptibility of assets to misappropriation Controls Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

MISAPPROPRIATION OF ASSETS Common schemes: Personal purchases Ghost employees Fictitious expenses Altered payee Pass-through vendors Theft of cash (or inventory) Lapping Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

ACFE 2004 REPORT TO THE NATION IT Auditing & Assurance, 2e, Hall & Singleton

AUDITOR’S RESPONSE TO RISK ASSESSMENT Engagement staffing and extent of supervision Professional skepticism Nature, timing, extent of procedures performed Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

AUDITOR’S RESPONSE TO DETECTED MISSTATEMENTS DUE TO FRAUD If no material effect: Refer matter to appropriate level of management Ensure implications to other aspects of the audit have been adequately addressed If effect is material or undeterminable: Consider implications for other aspects of the audit Discuss the matter with senior management and audit committee Attempt to determine if material effect Suggest client consult with legal counsel Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

AUDITOR’S DOCUMENTATION Document in the working papers criteria used for assessing fraud risk factors: Those risk factors identified Auditor’s response to them Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

FRAUD DETECTION TECHNIQUES USING ACL Payments to fictitious vendors Sequential invoice numbers Vendors with P.O. boxes Vendors with employee address Multiple company with same address Invoice amounts slightly below review threshold Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

FRAUD DETECTION TECHNIQUES USING ACL Payroll fraud Test for excessive hours worked Test for duplicate payments Tests for non-existent employee Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

FRAUD DETECTION TECHNIQUES USING ACL Lapping A.R. Balance forward method Open invoice method Three special characteristics: ·        Perpetrated at levels of management above the one where internal controls relate ·        Frequently involves using the financial statements to create illusions about corporate financial health ·        If fraud involves misappropriation of assets, it frequently is shrouded in a complex maze of business transactions, and often involves third parties IT Auditing & Assurance, 2e, Hall & Singleton

Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton IT Auditing & Assurance, 2e, Hall & Singleton