Chapter 18: Fraud Audit ACCT620 Internal Auditing Otto Chang Professor of Accounting.

Slides:



Advertisements
Similar presentations
Fraud and Internal Control Presented by Andy Harper Pugh & Company, P.C. April 28, 2011.
Advertisements

Auditing Cash and other Liquid Assets
Chapter 14 Audit of the Sales and Collection Cycle
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Obtaining Clients Submit a proposal
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
Fraud Auditing Chapter 11.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11 By arens et.al.,.
ACCT 100 Chapter 7 Internal Control and Cash Internal Control and Managing Cash 2 Objectives of the Chapter 1. Introduce the internal control to safeguard.
Management Fraud and Audit Risk
Understanding the Client and General Planning
CHAPTER 7 ACCEPTING THE ENGAGEMENT AND PLANNING THE AUDIT Fall 2007 u Client Acceptance and Retention u Planning the Audit u Obtaining an Understanding.
Planning the Audit; Linking Audit Procedures to Risk
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Planning the Audit Linking Audit procedures to Risk By
Chapter 4 Billing Schemes.
Cash and Financial Investments. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Internal Control Over --Cash Receipts.
KHALID AZIZ Fraud Auditing KHALID AZIZ JOIN KHALID AZIZ ECONOMICS OF ICMAP, ICAP, MA-ECONOMICS, B.COM. FINANCIAL.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
©2008 Pearson Prentice Hall. All rights reserved. 4-1 Internal Control & Cash Chapter 4.
Chapter 4 Risk Assessment.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 13-1 Chapter Thirteen Auditing the Inventory Management Process.
7-1 The Sarbanes-Oxley Act of 2002 (referred to simply as Sarbanes- Oxley) applies only to companies whose stock is traded on public exchanges. Its purpose.
Chapter 10 Cash and Financial Investments McGraw-Hill/Irwin
AUDIT RESPONSIBILITIES AND OBJECTIVES
Planning an Audit The Audit Process consists of the following phases:
Chapter 7 Preparation for the Audit ACCT620 Internal Auditing Otto Chang Professor of Accounting.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Chapter 16: Audit of Cash Balances
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Chapter 10 Identifying and preventing fraud Qiang Jiang School of Business Sichuan University, China
Auditing Investments and Cash Balances. Auditing the Investments In the previous chapter has been discussed the auditing of financing cycle. The possible.
Spiceland | Thomas | Herrmann Financial Accounting Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
Chapter 6 Payroll Schemes.
Chapter 06 Audit Planning, Understanding the Client, Assessing Risks, and Responding McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc.
Copyright © 2007 Pearson Education Canada 1 Chapter 11: Overall Audit Plan and Audit Program.
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Considering the Risk of Fraud
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
AUDIT QUALITY AND ASSURANCE 2 ND AND 3 RD OCTOBER 2014 HILTON HOTEL ANALYTICAL PROCEDURES 1.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Audit Planning, Understanding the Client, Assessing Risks and Responding Chapter 6.
Fraud’s Hidden Cost.
Internal control and cash
Fraud Auditing Chapter 11.
Management Fraud and Audit Risk
Chapter 12: Fraud Schemes & Fraud Detection
Auditing the Inventory Management Process
Problem EP 12-9 Listed below is a selection of items from the internal control questionnaire on payables in Appendix 12A, Page 694. Are invoices, receiving.
CCP 420: FRAUD DETECTION AND MANAGEMENT
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
2019/8/2 Topic 13 : Frauds 2019/8/2 Week 1.
Presentation transcript:

Chapter 18: Fraud Audit ACCT620 Internal Auditing Otto Chang Professor of Accounting

Objective of Fraud Audit Uncovering the presence, scope, and means of intentional misstatement of records and/or misappropriation of assets Fraud is an unusual occurrence. Alertness and professional skepticism are two of the most important skills. Often, the impetus for a fraud audit is some telltale sign of unusual transaction or a missing record.

Why Internal Auditors? Internal auditors issue no explicit disclaimer Internal audits are of sufficient scope and depth to detect irregularities Internal auditors are more familiar with operations and controls than external auditors Internal auditor’s primary focus is on controls expected to detect fraud

Loss from Fraud by Industry: 1996 CFE study Real Estate and Finance $475,000 Manufacturing 274,000 Banking 200,000 Oil and Gas 173,000 Construction 142,000 Health Care 105,000 Retail 100,000 Service 95,000 Insurance 72,000 Government 50,000 Utility 50,000 Education 32,000

Discovery of Computer Frauds By computer security officers 8.0% By auditors 4.5% By accident 32.0% By normal controls 45.0% By other methods 10.5%

Reporting Frauds Professional Standards Bulletin states that when that internal auditors suspect wrongdoing, they “should determine the possible effects…, discuss the matter with the appropriate level of management who should investigate or otherwise follow up the suspicion.”

Fraud Audit Approach Threat analysis: what assets are held? How could they be taken? Fraud assessment criteria: opportunity, motivation, and attitudes or ethical values Fraud scale theory: a 50% likelihood of fraud exists in the presence of low integrity, very moderate level of situational pressure, and opportunity to commit fraud.

Fraudulent Financial Reporting: Risk Assessment Management’s predisposition to distort F/S: excessive emphasis on meeting target Failure to establish policies and procedures Lack of control over operations Lack of control over computer processes Inadequate communication of policies and procedures for security of data or assets

Red Flag Indicators Personal situations creating undue pressure: –Indebtedness –Serious illness –Gambling problems –Alcohol problems –Resentment and frustration –Lack of personal ethics

Red Flag Indicators Company setting creating undue pressure: –Economic hardship –Dependency on limited number of products –Excessive leverage –Rapid growth –Tight credit –Increased competition –Restrictive loan provisions

Example of Red Flags Specific control risks: –One person handles all portions of an important transaction –Poor supervision –No clear assignment of responsibility and accountability –No required vacation –No rotation of workers

Common Methods of Embezzlement Removing small amounts from cash on hand Failing to record sales and pocketing the cash Overloading expense accounts to personal use Lapping collections on customer’s accounts Collecting an account and writing it off Recording unauthorized cash discount or sales return Carrying fictitious extra help on payrolls, increasing pay rates Paying false invoices Increasing the supplier’s invoice through collusion

Common Embezzlement Selling waste and scrap and pocketing the proceeds Falsifying bill of lading and splitting the cash with carrier Obtaining unprotected blank checks and forging signature Permitting special prices to customers or granting business to favored suppliers for kickbacks Outright staling of inventory, equipment, or other assets Using personal expenditure receipts to support false paid- out items Charging personal purchases to the company through the misuse of purchase order

Computer frauds Hacking:the use of talents to circumvent a computer’s security system Phreaking: penetrating corporate telecommunication systems and stealing telephone service Software piracy: illegal copy of software Viruses: the use of a program that modifies other programs

The Audit Process Selection of a team: use seasoned auditors Preliminary survey: looking for red flags Working paper documentation: use special care. Control access and retention of work paper because of legal issues Audit report: restricted to persons need to know Follow up: conducted by managers at least one level above the auditee

Legal Ramifications of Fraud Audits Slander and Libel: oral or written defamation False imprisonment: confinement of a person within boundaries Compounding a felony: agreeing for a consideration not to prosecute a criminal Confessions: are rarely sufficient basis for supporting accusation

Relative Performance of Audit Procedures Audit Procedures Errors Expectation from experience in prior years 287 Inquiry with client’s employees 504 Test of controls 7 Analytical procedures 293 Analysis of accounts and inspection of details 767 Evaluation of accounting estimates 202 Re-computations 162 Cutoff tests 155 Observation and other tests 205 2,582