Fraud Investigation FRAUD EXAMINATION ALBRECHT & ALBRECHT Theft and Concealment Investigation Methods CHAPTER 7.

Slides:



Advertisements
Similar presentations
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Advertisements

FRAUD EXAMINATION ALBRECHT, ALBRECHT & ALBRECHT
Fraud Examination, 3E Chapter 7: Investigating Theft Acts
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Auditing Computer-Based Information Systems
Evidence Collection & Admissibility Computer Forensics BACS 371.
Criminal Intelligence and Surveillance Operations
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
FORENSIC ACCOUNTING - BA124 - Spring 2011Slide 8-1 Today’s Topics n Concealment Investigation Methods.
Topics Creating DFD Physical and logical DFD Event driven modeling
Views Chapter 12. What Are Views? A virtual table that comprises the fields of one or more tables in the database It is a virtual table since it does.
Chapter 13: Audit Sampling Spring Overview of Sampling.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 7-1 Today’s Topics n Methods for Investigating Fraud n Theft Investigation Methods n Concealment Investigation.
Chapter 4.
FORENSIC ACCOUNTING - BA124 - Fall 2011Slide 7-1 Today’s Topics n Methods for Investigating Fraud n Theft Investigation Methods.
Information Storage and Retrieval CS French Chapter 3.
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Fraud Examination, 3E Chapter 8: Investigating Concealment COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Considering Internal Control
Evidence and Documentation
9 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 9.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
FORENSIC ACCOUNTING - BA124 – Spring 2015 Today’s Topics n Concealment Investigation Methods.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Evaluation of Internal Control System
Here are the main points:  use the words SEARCH, SORT and REPORT (report = a print out, sometimes called a hard copy)  mention the names of the fields.
Frequency Polygon Example The table below represents the marks obtained by children in an examination Mark 1 – – – – – –
Forensic Science: Fundamentals & Investigations, Chapter 16 1 Chapter 16 Tool Marks By the end of this chapter you will be able to: o Describe the three.
Nature and Type of Audit Evidence
Lesson 13 Databases Unit 2—Using the Computer. Computer Concepts BASICS - 22 Objectives Define the purpose and function of database software. Identify.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Recognizing the Symptoms of Fraud CHAPTER 5.
Audit Evidence Process
Evidence and Documentation
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Consumer Fraud Chapter 14.
Optimal Database Marketing Drozdenko & Drake, ©
Chapter 8: Investigating Concealment © 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
INFORMATION TECHNOLOGY DATABASE MANAGEMENT. A database is a collection of information organized to provide efficient retrieval. The collected information.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Unit 3: Impression Evidence tool marks
BY: NASUMBA KIZITO KWATUKHA
Chapter 7: Investigating Theft Acts
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Chapter 16 Tool Marks By the end of this chapter you will be able to:
BASIC AUDITING CONCEPTS: MATERIALITY, RISK ASSESSMENT, AND EVIDENCE
Chapter 3: Fighting Fraud: An Overview
Frequency Polygons Example
Chapter 16 Tool Marks By the end of this chapter you will be able to:
FRAUD EXAMINATION ALBRECHT & ALBRECHT
FRAUD EXAMINATION ALBRECHT & ALBRECHT
Fraud Examination Chapter 8
Chapter 16 Tool Marks By the end of this chapter you will be able to:
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
TOOL MARKS.
FRAUD EXAMINATION ALBRECHT & ALBRECHT
Evidence in an Electronic Age – What is admissible?
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Chapter Seven Construction and Scale Drawings
INTERNAL CONTROLS AND THE ASSESSMENT OF CONTROL RISK
Electronic Discovery Sabrina Jones 4/14/2011.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Beacon Media Supporting Christian schooling worldwide
Presentation transcript:

Fraud Investigation FRAUD EXAMINATION ALBRECHT & ALBRECHT Theft and Concealment Investigation Methods CHAPTER 7

Fraud Investigation Review Fraud Triangle

Fraud Investigation Discuss Inquiry Methods

Fraud Investigation Review the Target Approach to Theft Investigation

Fraud Investigation Comment on Properly Performed Surveillance

Fraud Investigation Describe How to Construct a Vulnerability Chart

Fraud Investigation Discuss Surveillance & Covert Operations, Define

Fraud Investigation When do you use undercover operations?

Fraud Investigation When do you use undercover operations?

Fraud Investigation Define Invigilation

Fraud Investigation Comment On Invigilation

Fraud Investigation Review the Concepts of Physical Evidence

Fraud Investigation What is the value of a good document to the fraud examiner?

Fraud Investigation Match the Following Concepts Organization Key to Retrieving & Maintaining a Database Carefully Maintain Record of Every Movement or Examination Originals Preferred, Sometimes a Copy Can Be Used Uniquely Marked, Make Copy, Store Original Safely, Use Copies in Investigation Chain of Custody Marking Evidence Organization of Evidence Rules Concerning Originals

Fraud Investigation What information should be stored in the database?

Fraud Investigation When can a photocopy be used as evidence?

Fraud Investigation Discuss Documentary Evidence

Fraud Investigation DISCOVERY SAMPLING Complete the Chart on Discovery Sampling

Fraud Investigation Review How to Use a Random Number Table

Fraud Investigation What conclusions can an Auditor/Examiner draw?

Fraud Investigation Match & Discuss Regarding Sampling Documentation Errors Sampling Risk Non-sampling Risk Computer Searches Methods & Sources Fraud or Not Representational Misrepresentation Fraud Signals

Fraud Investigation What are the hard to obtain documentary evidences?

Fraud Investigation Review & Discuss the Questions that Arise with Disputed Documents

Fraud Investigation When do you use a documentary expert?