IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.

Slides:



Advertisements
Similar presentations
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Advertisements

1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
© The McGraw-Hill Companies, Inc., 2006 Slide 10-1 Cash and Financial Investments.
6 THE AUDIT PROCESS. AUDITRESPONSIBILITIES AND OBJECTIVES AUDITRESPONSIBILITIES Audit Objective Primary objective of the audit is to express an opinion.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11 By arens et.al.,.
The Islamic University of Gaza
1 Fraud Management’s Responsibility Auditor’s Consideration.
Chapter 6-1 The Islamic University of Gaza Accounting Information System Ethics, Fraud and Internal Control Dr. Hisham Madi.
No Fraud Left Behind Fraud Risks and Prevention (Info gathered from the Association of Certified Fraud Examiners) Runyon Kersteen Ouellette.
McGraw-Hill/Irwin ©2007 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Management Fraud and Audit Risk "It takes 20 years to build a.
Assurance and Attestation Services BA 427 Winter 2007 Substantive Procedures Glenn Lovett, Shareholder.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
SAS 99: Consideration of Fraud in a Financial Statement Audit Based upon AICPA 2003 overview available at
Presented By: Donna Denker, CPA Donna Denker & Associates.
Nature of an Integrated Audit
Lecture 8 Understanding entity and its environment
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Chapter 6 Audit Responsibilities and Objectives
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens//Elder/Beasley Audit of the Payroll and Personnel Cycle Chapter 20.
Chapter 4 Risk Assessment.
Chapter 10 Cash and Financial Investments McGraw-Hill/Irwin
AUDIT RESPONSIBILITIES AND OBJECTIVES
Audit objectives, Planning The Audit
Planning an Audit The Audit Process consists of the following phases:
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Chapter 16: Audit of Cash Balances
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter 5 Internal Control over Financial Reporting
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Chapter 4 Risk Assessment McGraw-Hill/Irwin
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 8.1 Control Risk,
Electronic Presentations in Microsoft ® PowerPoint ® Prepared by Brad MacDonald SIAST © 2009 McGraw-Hill Ryerson Limited.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
Chapter 12 Inventories and Cost of Goods Sold McGraw-Hill/Irwin
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
OVERVIEW THE AUDIT PROCESS Overview of the Audit Process.
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
18-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 9 Auditing the Revenue Cycle REVIEW.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
Types of fraud Fraudulent Financial Reporting—An intentional misstatement or omission of amounts or disclosures with the intent to deceive users. Most.
Internal Control Procedures
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Audit of the Payroll and Personnel Cycle
Audit of the Payroll and Personnel Cycle
Fraud Auditing Chapter 11.
ACC 492 Competitive Success/snaptutorial.com
ACC 492 TUTOR Lessons in Excellence-- acctutor.com.
ACC 492 Education for Service/snaptutorial.com
ACC 492 TUTOR Education for Service- -acc492tutor.com.
ACC 492 Teaching Effectively-- snaptutorial.com
Defining Internal Control
Chapter 12: Fraud Schemes & Fraud Detection
Auditing the Inventory Management Process
Audit of the Payroll and Personnel Cycle
Audit of the Payroll and Personnel Cycle
Presentation transcript:

IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection

IT Auditing & Assurance, 2e, Hall & Singleton FRAUD  Asset misappropriation fraud 1. Stealing something of value – usually cash or inventory (i.e., asset theft) 2. Converting asset to usable form 3. Concealing the crime to avoid detection 4. Usually, perpetrator is an employee  Financial fraud 1. Does not involve direct theft of assets 2. Often objective is to obtain higher stock price (i.e., financial fraud) 3. Typically involves misstating financial data to gain additional compensation, promotion, or escape penalty for poor performance 4. Often escapes detection until irreparable harm has been done 5. Usually, perpetrator is executive management  Corruption fraud 1. Bribery, etc.

IT Auditing & Assurance, 2e, Hall & Singleton ACFE 2004 REPORT TO THE NATION

IT Auditing & Assurance, 2e, Hall & Singleton FRAUD SCHEMES  Fraudulent financial statements {5%}  Corruption {13%}  Bribery  Illegal gratuities  Conflicts of interest  Economic extortion  Asset misappropriation {85%}  Charges to expense accounts  Lapping  Kiting  Transaction fraud Percentages per ACFE 2002 Report to the Nation – see Table 12-1

IT Auditing & Assurance, 2e, Hall & Singleton COMPUTER FRAUD SCHEMES  Data Collection  Data Processing  Database Management  Information Generation

IT Auditing & Assurance, 2e, Hall & Singleton AUDITOR’S RESPONSIBILITY FOR DETECTING FRAUD—SAS NO. 99  Sarbanes-Oxley Act 2002  SAS No. 99 – “Consideration of Fraud in a Financial Statement Audit” 1. Description and characteristics of fraud 2. Professional skepticism 3. Engagement personnel discussion 4. Obtaining audit evidence and information 5. Identifying risks 6. Assessing the identified risks 7. Responding to the assessment 8. Evaluating audit evidence and information 9. Communicating possible fraud 10. Documenting consideration of fraud

IT Auditing & Assurance, 2e, Hall & Singleton FRAUDULANT FINANCIAL REPORTING  Risk factors: 1. Management’s characteristics and influence over the control environment 2. Industry conditions 3. Operating characteristics and financial stability

IT Auditing & Assurance, 2e, Hall & Singleton FRAUDULANT FINANCIAL REPORTING  Common schemes:  Improper revenue recognition  Improper treatment of sales  Improper asset valuation  Improper deferral of costs and expenses  Improper recording of liabilities  Inadequate disclosures

IT Auditing & Assurance, 2e, Hall & Singleton What Is Internal Control? Control Environment Control activities Risk Assessment Information / Communication Monitoring Sets the tone of an organization. Influences control consciousness Foundation for all other components Provides discipline and structure

IT Auditing & Assurance, 2e, Hall & Singleton Why Did It Take So Long to Find Out?

IT Auditing & Assurance, 2e, Hall & Singleton What Is Internal Control? Control Environment Control activities Risk Assessment Information / Communication Monitoring Identification and analysis Relevant risks to objective achievement Forms basis of risk management

IT Auditing & Assurance, 2e, Hall & Singleton What Is Internal Control? Control Environment Control activities Risk Assessment Information / Communication Monitoring Policies and procedures Help ensure achievement of management objectives

IT Auditing & Assurance, 2e, Hall & Singleton What Is Internal Control? Control Environment Control activities Risk Assessment Information / Communication Monitoring Information identification, capture, and exchange Forms and time frames Enables people to carry out responsibilities

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Misappropriation of Assets Poor recordkeeping Lack of management oversight Inadequate job applicant screening Poor segregation of duties or independent checks

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Misappropriation of Assets Poor physical safeguards Inappropriate transaction authorization and approval No mandatory vacations for control function employees Lack of timely and appropriate transaction documentation

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Susceptibility of Assets to Misappropriation Large amounts of cash on hand or in process.

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Susceptibility of Assets to Misappropriation Inventory that is small in size, high in value, or in high demand.

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Susceptibility of Assets to Misappropriation Easily convertible assets

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Susceptibility of Assets to Misappropriation Fixed assets that are small, marketable, or lack ownership identification.

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Material Misstatements Due to Fraud Transactions improperly recorded or not recorded completely / timely. Unsupported/unauthorized balances or transactions. Last-minute adjustments significantly affecting financial results.

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Conflicting or Missing Evidential Matter Missing documents or photocopies where originals should be. Missing significant inventory or physical assets.

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Conflicting or Missing Evidential Matter Unusual discrepancies between records and confirmation replies. Significant unexplained items on reconciliations.

IT Auditing & Assurance, 2e, Hall & Singleton Risk Factors Conflicting or Missing Evidential Matter Inconsistent, vague, or implausible responses to inquiries or analytical procedures.

IT Auditing & Assurance, 2e, Hall & Singleton MISAPPROPRIATION OF ASSETS  Common schemes:  Personal purchases  Ghost employees  Fictitious expenses  Altered payee  Pass-through vendors  Theft of cash (or inventory)  Lapping

IT Auditing & Assurance, 2e, Hall & Singleton ACFE 2004 REPORT TO THE NATION

IT Auditing & Assurance, 2e, Hall & Singleton AUDITOR’S RESPONSE TO RISK ASSESSMENT  Engagement staffing and extent of supervision  Professional skepticism  Nature, timing, extent of procedures performed

IT Auditing & Assurance, 2e, Hall & Singleton AUDITOR’S RESPONSE TO DETECTED MISSTATEMENTS DUE TO FRAUD  If no material effect:  Refer matter to appropriate level of management  Ensure implications to other aspects of the audit have been adequately addressed  If effect is material or undeterminable:  Consider implications for other aspects of the audit  Discuss the matter with senior management and audit committee  Attempt to determine if material effect  Suggest client consult with legal counsel

IT Auditing & Assurance, 2e, Hall & Singleton AUDITOR’S DOCUMENTATION  Document in the working papers criteria used for assessing fraud risk factors: 1.Those risk factors identified 2.Auditor’s response to them

IT Auditing & Assurance, 2e, Hall & Singleton FRAUD DETECTION TECHNIQUES USING ACL  Payments to fictitious vendors  Sequential invoice numbers  Vendors with P.O. boxes  Vendors with employee address  Multiple company with same address  Invoice amounts slightly below review threshold

IT Auditing & Assurance, 2e, Hall & Singleton FRAUD DETECTION TECHNIQUES USING ACL  Payroll fraud  Test for excessive hours worked  Test for duplicate payments  Tests for non-existent employee

IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton