Ch 11 Identifying and preventing fraud vi
Ch 11 Identifying and preventing fraud vi
I | What is Fraud?
Fraud, within a work context, is the deliberate use of deception, lies, or cheating to
unfairly gain money, property, or advantages that rightfully belong to the company or
another party. It represents a fundamental breach of trust aimed at deceitful acquisition.
The two primary categories are Asset Misappropriation (theft or misuse of company
resources) and Financial Statement Manipulation (falsifying corporate financial reports),
both leading to significant harm and misrepresentation.
Why it matters: Directly depletes the company's physical or monetary assets, causing
tangible financial loss.
Illustrative examples:
1. Theft of cash or inventory: Directly taking money (from registers, safes, deposits)
or company products/supplies.
3. Teeming & lading: Stealing an incoming payment from Customer A and using a
later payment from Customer B to cover Customer A's account, delaying detection.
Illustrative examples:
1. Overvaluing inventory: Reporting inventory at a higher value than its actual cost or
market price to inflate assets and profits.
3. Fictitious sales: Recording revenue from sales that never happened to make the
company look more successful.
Q1: What is the term given to a method of fraud in the accounts receivable area, by
which cash or cheque receipts are stolen, and the theft concealed by setting subsequent
receipts against the outstanding debt?
O Collusion
O Misrepresentation
O Teeming and lading
O (3) only
O (1) and (3) only
O (1) and (2) only
O (1), (2), (3) and (4)
Q3: X plc has a bad debt policy whereby aged receivables who are obviously not going to
pay, are written off. The financial accountant does not enforce this policy.
The simultaneous presence of these three elements significantly increases the likelihood of
fraud occurring.
What it is: The individual's internal willingness, justification, or predisposition that makes
committing fraud seem acceptable or necessary under the circumstances.
Why it matters: This element represents the overcoming of personal ethical barriers
required to initiate a fraudulent act.
o Personal character traits (e.g., low integrity, disregard for rules, need to 'win').
o Workplace culture that normalises or tolerates minor unethical acts (e.g., small
kickbacks, bending rules).
o Ability to rationalise the act (e.g., "I'm just borrowing it," "They owe me,"
"Everyone does it").
What it is: The pressure or compelling reason that pushes an individual towards committing
fraud – the problem they seek to solve or the gain they aim to achieve.
Why it matters: This provides the driving force or 'need' that makes the risk of fraud seem
worthwhile to the individual.
o Greed or a calculation that the potential fraudulent gain outweighs the perceived risk
of detection and punishment.
2.3 | Opportunity
What it is: The perception by the individual that they can commit the fraud and avoid
detection due to weaknesses in the system.
Why it matters: This element is created by failures or gaps in internal controls, allowing the
fraudulent act to be executed and potentially concealed. This is the element most directly
influenced by the organisation.
The primary goal is to understand these potential weaknesses thoroughly so that effective
controls and security measures can be designed and implemented to prevent or detect fraud.
What it is: Conditions originating outside the company (economic, industry, regulatory,
societal) that can create pressure or justification for individuals inside to commit fraud.
Why it matters: These factors often heighten the 'Motivation' element of the Fraud Triangle
for employees or the company itself.
What it is: Conditions, characteristics, or changes within the company related to its people,
systems, or culture that can increase fraud likelihood.
Why it matters: These factors can impact any element of the Fraud Triangle (Motivation,
Opportunity, Dishonesty/Rationalisation).
o General Mood (Culture): Weak "tone at the top," a culture where rule-bending is
common, unethical behaviour is tolerated or goes unpunished.
What it is: Particular functions, departments, or processes within the business that, due to
their nature, are inherently more susceptible to certain fraud schemes.
Illustrative examples:
1. Cash handling: Areas involving physical cash (registers, petty cash, donations) due
to ease of theft.
Q5: All of the following, with one exception, are internal factors which might increase
the risk profile of a business.
O Increased competition
O Corporate restructuring
O Upgraded management information system
O New personnel
Q6: Which of the following would most clearly present a personnel risk of fraud?
O Segregation of duties
O High staff morale
O Staff not taking their full holiday entitlements
O Consultative management style
Q7: Which of the following is NOT a key risk area for computer fraud?
O Hackers
O Lack of managerial understanding
O Inability to secure access to data
O Integration of data systems
What it is: The direct removal or stealing of the company's tangible or monetary assets (e.g.,
cash, inventory, equipment) by employees or associates.
Consequences:
o Reduces Available Funds: Less cash on hand to meet operational needs, pay bills,
or fund payroll.
o Lowers Profit: The value of stolen assets directly decreases reported profits.
What it is: Deliberately altering the company's accounting books and financial reports to
present an inaccurate view of its financial health or performance.
o Common tricks: Recording fictitious sales, inflating inventory values, delaying the
recording of incurred costs.
o Impacts:
Broken Trust: Severe loss of confidence from investors, banks, and the
market once the manipulation is discovered, potentially leading to
withdrawn investment, credit denial, and lawsuits.
o Impacts:
Q8: Which TWO of the following stakeholders will be most directly affected if a
business overstates its financial position?
□ Staff
□ Customers
□ Investors
□ Suppliers
Q9: All of the following, except one, are potential impacts on a business of removal of
significant funds or assets.
Organisations utilise Internal Controls as built-in operational safeguards designed with two
primary goals regarding fraud: Prevention (making it difficult or impossible for fraud to
occur) and Detection (identifying fraud quickly after it happens to limit damage).
Key approaches include Segregation of Duties (dividing sensitive tasks among multiple
people), employing a Proactive Internal Audit function (actively searching for weaknesses
and irregularities using risk-based methods and data analytics), and implementing Business
Area Specific Controls tailored to the unique risks inherent in different departments like
sales, procurement, or IT.
What it is: A fundamental prevention control principle where key, incompatible duties
within a process are assigned to different individuals.
Why it matters: Makes it significantly harder for one person to commit and conceal fraud
unilaterally, as they lack control over the entire transaction lifecycle. Fraud typically requires
collusion between individuals, which increases risk and complexity for the fraudsters.
Problem Addressed: The high risk of fraud and ease of concealment when a single
individual controls conflicting steps (e.g., authorising payments and recording them).
What it is: An independent, internal function tasked with deliberately and regularly
searching for control weaknesses, operational inefficiencies, errors, and indicators of fraud.
Why it matters: Acts as a key detection mechanism, aiming to identify issues internally
before they escalate or are discovered by external parties (regulators, external auditors),
allowing for timely correction.
Problem Addressed: The risk that fraud or significant errors remain hidden because they
are intentionally concealed or not obvious without active investigation.
What it is: Controls specifically designed and implemented to address the unique risks
inherent in particular business functions or departments.
1. Sales & Cash Handling: Using till counts (cash register logs) and reviewing
security camera footage against logs to prevent/detect skimming.
4. IT Systems: Requiring dual management approval for new user accounts and using
software to monitor system logs for unauthorized data access attempts.
Q10: Which of the following internal controls might be least effective in preventing
fraud, if staff are in collusion with customers?
O Physical security
O Requiring signatures to confirm receipt of goods or services
O Sequential numbering of transaction documents
O Authorisation policies
Q11: Which of the following would NOT form part of a fraud response plan?
Q12: Only allowing purchasing staff to choose suppliers from an approved list is an
example of what sort of fraud prevention measure?
O Segregation of duties
O Appropriate documentation
O Limitation control
O Check control
Q13: Which of the following statements about fraud prevention is NOT true?
Who They Are: The highest level of leadership responsible for steering the company.
1. Promote Honesty (Set the Tone at the Top): Demonstrate ethical leadership and
establish a clear expectation of integrity throughout the organisation, creating an
ethical culture.
3. Oversee Fraud Prevention and Detection Systems: Ensure specific measures are
in place to prevent fraud (like effective Segregation of Duties) and detect it promptly
if it occurs (like ensuring regular internal/external audits).
Who They Are: Independent professionals or firms engaged by the company to provide an
objective assessment of its financial statements.
Main Job: To examine the company's formal financial reports and provide assurance to
stakeholders.
Money laundering is the criminal process of disguising the illegal origins of funds ("dirty
money"), typically derived from activities like fraud, drug trafficking, or organized crime, to
make them appear legitimate.
The core purpose is to obscure the link between the money and the underlying crime, thereby
avoiding detection by law enforcement, preventing asset seizure, and allowing criminals to
use the proceeds freely.
What it is: The first stage where cash generated from criminal activity is physically placed
into the legitimate financial system.
o Depositing cash into bank accounts (often broken down into smaller amounts to
avoid suspicion - known as 'structuring').
Why it matters / Risks: This is often the point of highest vulnerability for detection, as
large or unusual cash transactions attract scrutiny from financial institutions and regulators.
What it is: Separating the illicit proceeds from their source by creating complex layers of
financial transactions designed to disguise the audit trail 1 and provide anonymity.
Why it matters / Purpose: To make it extremely difficult for investigators to trace the funds
back to their illegal origin.
What it is: The final stage where the laundered money is returned to the criminal in a way
that makes it appear to be legitimate income or wealth.
o Investing in legitimate businesses (either existing ones or new ventures set up by the
criminal).
Why it matters / Outcome: At this stage, the funds are fully assimilated into the legitimate
economy and become very difficult to distinguish from legally earned money, allowing the
criminal to use them without attracting attention.
▢▼ constitutes any financial transactions whose purpose is to conceal the origins of the
proceeds of criminal activity.
Q16: The initial disposal of the proceeds of an illegal activity into apparently
legitimate business activity is known as what?
O Placement
O Layering
O Integration