Download presentation
Presentation is loading. Please wait.
1
ACC 556 Education for Service-- snaptutorial.com
2
ACC 556 Crooked Scenario 2 Part 1 For more classes visit www.snaptutorial.com Shortly after you completed your work of unpacking all the players in the CrookEd Partners drama and identifying all potential fraudulent activity that had been relayed to you (Week One Scenario Assignment), your secretary came into your office and said you had a visitor. You inquired who it was and she said it was an accountant, C.H. Ainge O’Hart (Chainge ‘O Hart) from a local CPA firm, Inn, Kaw,
3
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 1 Crooked Scenario 1 For more classes visit www.snaptutorial.com Shortly after you completed your work of unpacking all the players in the CrookEd Partners drama and identifying all potential fraudulent activity that had been relayed to you (Week One Scenario Assignment), your secretary came into your office and said you had a visitor. You inquired who it was and she said it was an accountant, C.H. Ainge O’Hart (Chainge ‘O Hart) from a local CPA firm, Inn,
4
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 1 Sherlock Homes For more classes visit www.snaptutorial.com Shortly after you completed your work of unpacking all the players in the CrookEd Partners drama and identifying all potential fraudulent activity that had been relayed to you (Week One Scenario Assignment), your secretary came into your office and said you had a visitor. You inquired who it was and she said it was an accountant, C.H. Ainge O’Hart (Chainge ‘O Hart) from a local CPA firm, Inn, Kaw,
5
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 1 Short Answer Quiz For more classes visit www.snaptutorial.com Shortly after you completed your work of unpacking all the players in the CrookEd Partners drama and identifying all potential fraudulent activity that had been relayed to you (Week One Scenario Assignment), your secretary came into your office and said you had a visitor. You inquired who it was and she said it was an accountant, C.H. Ainge O’Hart (Chainge ‘O Hart) from a local CPA firm, Inn,
6
ACC 556 Education for Service-- snaptutorial.com ACC 556 WEEK 3 Assessing the Impact of Asset Misappropriation For more classes visit www.snaptutorial.com Shortly after you completed your work of unpacking all the players in the CrookEd Partners drama and identifying all potential fraudulent activity that had been relayed to you (Week One Scenario Assignment), your secretary came into your office and said you had a visitor. You inquired who it was and she said it was an accountant, C.H. Ainge O’Hart (Chainge ‘O Hart) from a local CPA firm, Inn,
7
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 3 Crooked Scenario 3 For more classes visit www.snaptutorial.com 1. Define and describe Theft Act Investigative Methods. 2. What is a Vulnerability Chart and how, when and why is it used? 3. Define Invigilation and discuss how, when and why it is used. 4. Discuss the steps in obtaining electronic evidence. 5. To what are Concealment Investigative Methods primarily related? 6. Discuss the following concealment investigative techniques: a. Audits
8
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 4 Impact of Corruption For more classes visit www.snaptutorial.com 1. Define and describe Theft Act Investigative Methods. 2. What is a Vulnerability Chart and how, when and why is it used? 3. Define Invigilation and discuss how, when and why it is used. 4. Discuss the steps in obtaining electronic evidence. 5. To what are Concealment Investigative Methods primarily related? 6. Discuss the following concealment investigative techniques: a. Audits 7. What is Discovery Sampling and what are some of its pitfalls and challenges?
9
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 5 Comparing the Impact For more classes visit www.snaptutorial.com 1. Define and describe Theft Act Investigative Methods. 2. What is a Vulnerability Chart and how, when and why is it used? 3. Define Invigilation and discuss how, when and why it is used. 4. Discuss the steps in obtaining electronic evidence. 5. To what are Concealment Investigative Methods primarily related? 6. Discuss the following concealment investigative techniques: a. Audits
10
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 5 Crooked Scenario 5 For more classes visit www.snaptutorial.com 1. Define and describe Theft Act Investigative Methods. 2. What is a Vulnerability Chart and how, when and why is it used? 3. Define Invigilation and discuss how, when and why it is used. 4. Discuss the steps in obtaining electronic evidence. 5. To what are Concealment Investigative Methods primarily related? 6. Discuss the following concealment investigative techniques: a. Audits
11
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 5 Memorandum Proactive Method of Fraud Detection For more classes visit www.snaptutorial.com INDIVIDUAL ASSIGNMENT Write a 600-800 word memo to your accounting committee on fraud detection discussing the 6 steps of the Proactive Method of Fraud Detection found in figure 6.1 of Chapter 6. Include methods to gather information about a business, questions that should be asked, and examples of fraud symptoms.
12
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 6 fraud symptoms and mitigation For more classes visit www.snaptutorial.com INDIVIDUAL ASSIGNMENT Prepare 7-10 Power Point slides discussing common business fraud symptoms and mitigation actions that can be taken to help deter and detect fraud. Choose some elements from Chapter 5: Recognizing the Symptoms of Fraud to discuss in your presentation keeping with the theme of the assignment. Please use the “Notes” section below each PowerPoint slide to explain your ideas clearly.
13
ACC 556 Education for Service-- snaptutorial.com ACC 556 Week 6 Short Answer Quiz For more classes visit www.snaptutorial.com INDIVIDUAL ASSIGNMENT Write a 600-800 word memo to your accounting committee on fraud detection discussing the 6 steps of the Proactive Method of Fraud Detection found in figure 6.1 of Chapter 6. Include methods to gather information about a business, questions that should be asked, and examples of fraud symptoms. Please use a memo format for this assignment and reference the Proactive Method of Fraud Detection from your textbook.
14
ACC 556 Education for Service-- snaptutorial.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.