Fraud Auditing and Forensic Accounting - Tommie W. Singleton - E-Book

Fraud Auditing and Forensic Accounting E-Book

Tommie W. Singleton

4,5
81,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

FRAUD AUDITING AND FORENSIC ACCOUNTING With the responsibility of detecting and preventing fraud falling heavily on the accounting profession, every accountant needs to recognize fraud and learn the tools and strategies necessary to catch it in time. Providing valuable information to those responsible for dealing with prevention and discovery of financial deception, Fraud Auditing and Forensic Accounting, Fourth Edition helps accountants develop an investigative eye toward both internal and external fraud and provides tips for coping with fraud when it is found to have occurred. Completely updated and revised, the new edition presents: * Brand-new chapters devoted to fraud response as well as to the physiological aspects of the fraudster * A closer look at how forensic accountants get their job done * More about Computer-Assisted Audit Tools (CAATs) and digital forensics * Technological aspects of fraud auditing and forensic accounting * Extended discussion on fraud schemes * Case studies demonstrating industry-tested methods for dealing with fraud, all drawn from a wide variety of actual incidents Inside this book, you will find step-by-step keys to fraud investigation and the most current methods for dealing with financial fraud within your organization. Written by recognized experts in the field of white-collar crime, this Fourth Edition provides you, whether you are a beginning forensic accountant or an experienced investigator, with industry-tested methods for detecting, investigating, and preventing financial schemes.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 525

Veröffentlichungsjahr: 2010

Bewertungen
4,5 (18 Bewertungen)
13
1
4
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Contents

Cover

Title page

Copyright

Preface

Acknowledgments

CHAPTER ONE: Background of Fraud Auditing and Forensic Accounting

INTRODUCTION

BRIEF HISTORY OF FRAUD AND THE ANTIFRAUD PROFESSION

THE FRAUD CYCLE

REVIEW OF TECHNICAL LITERATURE

FORENSIC ACCOUNTANT AND AUDITS

FORENSIC ACCOUNTANTS

FRAUD AUDITORS

KEYS TO EFFECTIVE FRAUD INVESTIGATION

THE ANTIFRAUD PROFESSIONAL’S CAREER

SUMMARY

NOTES

CHAPTER TWO: Fraud Principles

INTRODUCTION

DEFINITION: WHAT IS FRAUD?

SYNONYMS: FRAUD, THEFT, AND EMBEZZLEMENT

CLASSIC FRAUD RESEARCH

FRAUD TRIANGLE

SCOPE OF FRAUD

PROFILE OF FRAUDSTERS

WHO IS VICTIMIZED BY FRAUD MOST OFTEN?

FRAUD TAXONOMIES

FRAUD TREE

EVOLUTION OF A TYPICAL FRAUD

SUMMARY

NOTES

CHAPTER THREE: Fraud Schemes

INTRODUCTION

ACFE FRAUD TREE

FINANCIAL STATEMENT SCHEMES

CORRUPTION SCHEMES

ASSET MISAPPROPRIATION SCHEMES

SUMMARY

NOTES

CHAPTER FOUR: Red Flags

INTRODUCTION

PROFESSIONAL STANDARDS

COMMON RED FLAGS

SPECIFIC RED FLAGS

FRAUD DETECTION MODEL

SUMMARY

NOTES

CHAPTER FIVE: Fraud Risk Assessment

INTRODUCTION

TECHNICAL LITERATURE AND RISK ASSESSMENT

RISK ASSESSMENT FACTORS

RISK ASSESSMENT BEST PRACTICES

RISK MANAGEMENT CHECKLISTS AND DOCUMENTATION

SUMMARY

NOTES

CHAPTER SIX: Fraud Prevention

INTRODUCTION

PREVENTION ENVIRONMENT

PERCEPTION OF DETECTION

CLASSIC APPROACHES

OTHER PREVENTION MEASURES

ACCOUNTING CYCLES

SUMMARY

NOTES

CHAPTER SEVEN: Fraud Detection

INTRODUCTION

FRAUD DETECTION AXIOMS

COMMON DETECTION METHODS

SPECIFIC DETECTION METHODS

SUMMARY

APPENDIX 7A: BENEISH’S RATIOS

CHAPTER EIGHT: Fraud Response

INTRODUCTION

FRAUD POLICY

FRAUD RESPONSE TEAM

RECOVERY

SUMMARY

NOTES

APPENDIX 8A: ACFE SAMPLE FRAUD POLICY

APPENDIX 8B: SAMPLE FRAUD POLICY DECISION MATRIX

CHAPTER NINE: Computer Crime

INTRODUCTION

HISTORY AND EVOLUTION OF COMPUTER CRIMES

COMPUTER CRIME THEORIES AND CATEGORIZATIONS

CHARACTERISTICS OF THE COMPUTER ENVIRONMENT

INFORMATION SECURITY (INFOSEC)

PROFILING INTERNET FRAUDSTERS

SUMMARY

NOTES

CHAPTER TEN: Fraud and the Accounting Information System

INTRODUCTION

ACCOUNTING CONCEPTS

SEGREGATION OF DUTIES

ACCOUNTING INFORMATION SYSTEMS

KEY PERSONNEL

COMPUTER HARDWARE

COMPUTER SOFTWARE

NEW FORMS OF MEDIA

AUDIT TRAIL CONCEPT

SUMMARY

CHAPTER ELEVEN: Gathering Evidence

INTRODUCTION

RULES OF EVIDENCE

HEARSAY EXCEPTIONS

OTHER RULES OF EVIDENCE

SUMMARY

NOTES

CHAPTER TWELVE: Cyber Forensics

INTRODUCTION

EXPECTATION OF PRIVACY

TYPES OF INVESTIGATIONS

SOURCES OF DIGITAL DATA

TYPES OF CYBER DATA

CYBER FORENSICS INVESTIGATION PROCESS

VARIETY OF SPECIALISTS IN CYBER FORENSICS

SUMMARY

NOTES

CHAPTER THIRTEEN: Obtaining and Evaluating Nonfinancial Evidence in a Fraud Examination

INTRODUCTION

INTERVIEWS

BODY LANGUAGE

DECEPTION CUES

EYE LANGUAGE

STATEMENT ANALYSIS

SCAN

SUMMARY

NOTES

CHAPTER FOURTEEN: General Criteria and Standards for Establishing an Expert Witness’s Qualifications

INTRODUCTION

CREDENTIALS

PERSONAL QUALITIES OF THE EXPERT

SOURCES FOR LOCATING EXPERT WITNESSES

DISTINGUISHING THE ACTUAL AREA OF COMPETENCE

SUMMARY

NOTES

CHAPTER FIFTEEN: The Legal Role and Qualifications of an Expert Witness

INTRODUCTION

ROLE OF A FORENSIC ACCOUNTANT AS A WITNESS IN COURT

LEGAL QUALIFICATIONS FOR A FORENSIC ACCOUNTANT AS AN EXPERT WITNESS

QUALIFICATION AND ADMISSIBILITY OF ACCOUNTING EVIDENCE

EXPERT’S ROLE IN THE LITIGATION TEAM

PRETESTIMONY ACTIVITIES

SUMMARY

NOTES

APPENDIX 15A: TRANSCRIPT OF TYPICAL COURT TESTIMONY OF EXPERT WITNESS

CHAPTER SIXTEEN: Effective Tactics and Procedures for the Expert Witness in Court

INTRODUCTION

EFFECTIVE PROFILE

BEING A CREDIBLE EXPERT WITNESS

EXPERT’S ROLE IN THE LITIGATION TEAM

PRETESTIMONY ACTIVITIES

TRIAL AND TESTIMONY

SURVIVAL TECHNIQUES

SUMMARY

NOTES

CHAPTER SEVENTEEN: Fraud and the Public Accounting Profession

INTRODUCTION

HISTORY OF FRAUD AND THE AUDITOR: A SUMMARY

FRAUD AND THE AUDITOR’S LIABILITY

FRAUD AND THE AUDITOR’S RESPONSIBILITY

FRAUD AND THE AUDITOR’S ROLE

SUMMARY

NOTE

About the Authors

Index

End User License Agreement

Pages

C1

iii

iv

v

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

Guide

Cover

Contents

Start Reading

List of Illustrations

EXHIBIT 2.1 The Fraud Triangle

EXHIBIT 2.6 The ACFE Fraud Tree

EXHIBIT 3.2 ACFE Fraud Tree

EXHIBIT 7.1 Most Common Detection Controls

EXHIBIT 9.3 Computer Theft Iteration

EXHIBIT 10.1 Revenue Cycle

EXHIBIT 10.2 Expenditures Cycle

EXHIBIT 10.3 Documents in the Revenue Cycle

EXHIBIT 10.4 Documents in the Payment Cycle

EXHIBIT 10.5 Bank Reconciliation

EXHIBIT 14.1 Likely Sources of Technical Advisors in Computer-Related Crime Cases, by Type of Experience

List of Tables

EXHIBIT 2.2 Fraud by Corporate Owners and Managers

EXHIBIT 2.3 Fraud by Corporate Vendors, Suppliers, and Contractors

EXHIBIT 2.4 Fraud by Corporate Customers

EXHIBIT 2.5 Fraud by Corporate Employees

EXHIBIT 2.7 Application of Fraud Taxonomy/Fraud Tree

EXHIBIT 2.8 Summary of Models/Typologies/Taxonomies

EXHIBIT 3.1 ACFE Fraud Tree: Unique Characteristics of Each Category

EXHIBIT 3.3 Average Cost of Fraud per Employee

EXHIBIT 4.1 SAS No. 99 Red Flag Matrix

EXHIBIT 5.1 Corporate Fraud Environment: Potential for Fraud

EXHIBIT 5.2 Risk Management Checklist

EXHIBIT 5.3 Fraud Schemes Risk Checklist

EXHIBIT 7.2 Effective Antifraud Detection Controls

EXHIBIT 8.1 Fraud Response Team and SMEs

EXHIBIT 9.1 Estimated U.S. Computer Crime Losses

EXHIBIT 9.2 Computer Crimes

EXHIBIT 12.1 Typical Cyber Forensic Investigation Process

EXHIBIT 12.2 Sample Chain of Custody Form for Cyber Forensic Evidence

EXHIBIT 13.1 Top Ten Steps in a Top-Notch Interview

EXHIBIT 13.2 Statement Analysis

EXHIBIT 17.1 Significant Events in History of Fraud and Public Accounting

Fraud Auditing and Forensic Accounting

Fourth Edition

TOMMIE W. SINGLETON

AARON J. SINGLETON

Copyright © 2010 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging-in-Publication Data:Singleton, Tommie.Fraud auditing and forensic accounting/Tommie W. Singleton, Aaron J. Singleton. -4th ed.      p. cm.    Rev. ed. of: Fraud auditing and forensic accounting. 3rd ed. 2006.  Includes index.  ISBN 978-0-470-56413-4; ISBN 978-0-470-87748-7 (ebk);ISBN 978-0-470-87790-6 (ebk); ISBN 978-0-470-87791-3 (ebk)  1. White collar crime investigation–United States. 2. Forensic accounting–United States. 3. Fraud investigation–United States. I. Singleton, Aaron J., 1980-II. Fraud auditing and forensic accounting. III. Title.  HV8079.W47B65 2010  364.16’3—dc22

2010013504

10  9  8  7  6  5  4  3  2  1

Preface

When times are good, people steal. When times are bad, people steal more!

THIS QUOTE WAS MADE casually in a conversation by Tommie to an academic colleague, but does represent the raison d’être for the new edition of this book. Since time immortal, there have always been a number of humans who are bent in their ethics, morals, sociological makeup, psychological makeup, or sense of justice, and are ready, willing, and able to commit crimes of all types, including white-collar crimes. But hard economic times seem to cause a few more than normal to crumble under the economic pressure and give in to the temptation to commit a fraud.

The Association of Certified Fraud Examiners (ACFE) did an empirical study in 2009 on the effect of the weak economy on the number of frauds being detected by CFEs, entitled “Occupational Fraud: A Study of the Impact of an Economic Recession.” Based on the results of the responses of 507 CFEs, more than half indicated that the number of frauds had increased since the recession began (37.3 percent slight increase, 18.1 percent significant increase). About 49 percent also saw an increase in the dollar amount of the losses due to fraud. Obviously, and empirically evident in the ACFE study, pressure has increased on an increasing number of people due to the recession. And as all antifraud professionals know, pressure is a key to the occurrence of frauds. Therefore, there is a greater need than ever for corporations, companies, and government agencies to be vigilant to protect assets that are more precious than ever.

We are proud to be a part of the fourth edition of this book. The book begins with a general background about fraud auditing and forensic accounting in Chapter 1. Chapters 2 through 5 provide the basics of fraud such as fraud schemes, how they are perpetrated, what red flags (similar to fingerprints) exist for certain types of schemes, understanding the fraudster, and a fraud risk assessment to identify weak areas. Chapters 6 through 8 follow the “PDC” model for the antifraud profession: prevent, detect, and correct (respond). Chapters 9 though 12 cover the information technology (IT) aspects of fraud including the computer as an instrument of fraud, the target of fraud, and the fact systems are “data warehouses” that contain evidence of fraud. Chapter 13 focuses on the nonfinancial aspects of fraud investigation. Chapters 14 through 16 focus on the legal disposition of a fraud investigation and the major legal concepts, principles, and help for fraud auditors and forensic accountants, especially related to evidence and expert testimony. Chapter 17 is written specifically for public accounting and CPAs.

The material has been slightly reorganized from the third edition to make reading and assimilation of the content easier. New material includes updates in fraud response (a new Chapter 8), computer-related fraud (Chapter 9), cyber forensics (Chapter 12), physiological aspects of the fraudster (a new Chapter 13), and fraud and the CPA (Chapter 17).

We hope this book enables and empowers auditors, CPAs, law enforcement, risk and loss prevention professionals, and all others who have a responsibility related to fraud to better prevent, detect, and respond to fraud.

Tommie W. Singleton Aaron J. Singleton August 2010

Acknowledgments

IT IS TRUE THAT anything or anyone visible to the public eye is actually standing on the shoulders of others who made that moment possible. So we would like to acknowledge a few ‘‘shoulders.’’

First, we want to thank Jack Bologna and Robert Lindquist, authors of the first two editions of this book. In 1992, Dr. Tommie Singleton interviewed Jack Bologna as part of his dissertation at the University of Mississippi on the topic of pioneers in electronic data processing (EDP) audit. Mr. Bologna was indeed a pioneer not only in EDP audit, but also in forensic accounting. Jack was involved with the Association of Certified Fraud Examiners (ACFE) in its early days, was editor for what may have been the first forensic accounting journal in the 1980s, and was an academic who taught forensic accounting. His contributions are a monument and testimony to his knowledge and abilities regarding fraud. Robert Lindquist has a strong reputation of being a fraud expert and is sought after as an expert witness in fraud cases. His work and efforts are stellar, and he is a well-respected professional in Canada and the United States.

Second, we would like to thank some individuals who have helped us in our professional growth. Former FBI agent Alton Sizemore became a supporter and friend to Dr. Singleton about 14 years ago. He is a frequent guest lecturer in Tommie’s classes, even when he was over 100 miles from the university where Dr. Singleton taught for many of those years. He has taught us much regarding the legal elements of fraud, digital evidence, and the law enforcement perspective of fraud. He also has taught us to have fun when circumstances allow it. Indeed, Alton is a favorite of former students for these reasons.

Kevin Andrews has been a supporter, continually involving us in the local chapter of the ACFE. Like Alton, Kevin is a staple in Dr. Singleton’s classes speaking to students about the antifraud profession and how to develop a career as a forensic accountant. He also had a vision of a local, high quality, fraud seminar for Birmingham which he made happen two years ago, and of which we are pleased to be a part.

Another great friend is Ralph Summerford of Forensic/Strategic Solutions in Birmingham, Alabama. He became a supporter of Dr. Singleton instantly at their first meeting, and has been a faithful, instrumental supporter over the last eight years. No one has been more inspiring or financially supportive of Dr. Singleton’s academic programs than Mr. Summerford.

Another person who has been instrumental in teaching, supporting, and modeling the antifraud profession to us is retired U.S. Treasury investigator Lynn Shobe. Lynn is a key leader in our area, especially for the local ACFE chapter. But he also is an adjunct professor for the forensic accounting program at UAB where Dr. Singleton is the director of that program and an associate professor.

Third, we want to extend a special thank you to Sheck Cho, Wiley editor. He has been a wonderful supporter of our efforts not only on two editions of this book, but on another book as well. Stacey Rivera, our development editor on this edition, was professional throughout, patient and kind, and a joy to work with.

CHAPTER ONEBackground of Fraud Auditing and Forensic Accounting

There’s a sucker born every minute.

—P. T. Barnum

Trust everyone, but cut the deck.

—P. T. Barnum

INTRODUCTION

In the first decade of the twenty-first century, the news has been filled with reports on frauds and indicators that it is increasing in its scope and costs to the U.S. economy. Almost everyone has read about corporate financial statement frauds such as Enron and WorldCom, or frauds against the government such as false claims following Katrina, or huge Ponzi schemes such as the Madoff scam that set a new record for losses associated with a fraud. Many people have been directly affected by identity theft. The economic downturn that began in 2008 has made it hard to rebound from such losses. To make matters worse, reports on activities related to fraud bear bad news.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!