Term
| Non-accomplice Vendor (Billing) Schemes |
|
Definition
| In ________________ fraudsters use invoices from existing vendors to manufacture fake payments |
|
|
Term
| Crime is a learned behavior; it is not genetically based |
|
Definition
| What is Edwin Sutherland's Theory of Differential Association say? |
|
|
Term
1. Material false statement 2. Knowledge that the statement was false when uttered 3. Reliance on false statement by victim 4. Reliance leads to damages |
|
Definition
| What four elements must be present in a crime for fraud to exist? |
|
|
Term
1. Segregation of Duties 2. Watch for red flags 3. Routinely cross reference vendor addresses with employee addresses 4. Look for consecutive invoice numbers 5. Watch for payments just under the limit of authorization |
|
Definition
| List 5 ways of preventing/detecting Shell Co Schemes. |
|
|
Term
1) Conveys evidence 2) Adds credibility 3) Accomplishes objectives of case |
|
Definition
| What is the purpose of the report? |
|
|
Term
1. Independent checks of transactions 2. Require employees to take vacations or rotate duties 3. Mandate supervisory approval for write-offs or discounts to A/R |
|
Definition
| List 3 ways of preventing receivables skimming |
|
|
Term
1. Theft from other registers 2. Death by a thousand cuts 3. Reversing transactions 4. Altering cash counts or register tapes 5. Destroying register tapes |
|
Definition
| What 5 methods are used to conceal cash larceny @ the Point-of-Sale? |
|
|
Term
-Situational pressures -Perceived opportunities -Personal Integrity |
|
Definition
| What are the 3 components of Albrecht's "Fraud Scale"? |
|
|
Term
|
Definition
| _____ is a method of concealing receivables skimming whereby the fraudster falsifies account totals to conceal the theft of funds. |
|
|
Term
| The study found that employees steal mainly because of workplace conditions and that employee deviance is mainly caused by job dissatisfaction |
|
Definition
| What was the main reason the Hollinger-Clark Study identified as why employees steal? |
|
|
Term
1. Fraudulent Disbursement Schemes 2. Cash Receipt Schemes |
|
Definition
| What are the two groups of cash schemes? |
|
|
Term
1. Force Balancing 2. Reversing Entries 3. Destruction of Records |
|
Definition
| What 3 methods can be used to conceal Incoming Receivables cash larceny? |
|
|
Term
1. Lower-level employees and managers committed the most frauds (but fraud committed by owners and execs was most costly) 2. The older the employee, the more costly the fraud 3. Smallere business are more likely to be victims of fraud than large ones |
|
Definition
| What were the 3 major findings of the 2006 National Fraud Survey? |
|
|
Term
1. Skimming 2. Cash larceny |
|
Definition
| Cash receipt schemes generally fall into which 2 categories? |
|
|
Term
|
Definition
| _______ is the crediting of one account through the abstraction of money from another account |
|
|
Term
1. Asset misappropriations 2. Corruption 3. Fraudulent statements |
|
Definition
| What 3 classes of occupational fraud are defined by the "Fraud Tree"? |
|
|