Financial Transactions - Fraud Schemes Flashcards

1
Q

Name 4 overstated expense reimbursements

A
  1. Altered receipts
  2. Over-purchasing
  3. Overstating another employee’s expenses
  4. Orders to overstate expenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List 7 methods to prevent and detect mis-characterised expenses

A
  1. Establish & adhere to a system of controls
  2. Require detailed expense reports w/ original support documentation
  3. Require direct supervisory review of all travel and entertainment expenses
  4. Establish a policy that clearly states what will or will not be reimbursed
  5. Scrutinise any expense report that is approved outside of the restorer’s dept
  6. Compare dates/times with employee’s work schedule
  7. Compare prior/current/budgeted expenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 expense reimbursement schemes?

A
  1. Fictitious expense reimbursement
  2. Overstated expense reimbursement
  3. Mischaracterised expense reimbursement
  4. Multiple expense reimbursement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Predication

A

Totality of circumstances that would lead a reasonable, professionally trained and prudent individual to believe a fraud has occurred, is occurring and /or will occur. Fraud examination should not be conducted w/o proper predication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Skimming

A
  1. Using a device called a wedge or skimmer, fraudster takes credit card & runs through device, collecting # to be sold or used illegally (restaurants).
  2. Term also used to describe cash being taken before it is recorded on the books. Considered an OFF-Book fraud.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

No Receipt credit card fraud

A

Card is intercepted in route (mail) before it is received by owner. This type of fraud has been reduced by credit card companies implementing verification methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Microline

A

In order to curb check/credit card fraud, a line of small words that cannot be duplicated is embedded in check or card. Holograms can also be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Giro

A

Term used to describe payment transfers from one bank account to another bank account instigated by the payer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kiting

A

Term used to describe depositing money into another bank account without recording the withdrawal from the issuing account - double counting cash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Demand Draft

A

A demand draft is a way to initiate a bank transfer that does not require a signature, as is the case with a check. In fraud, it is used to remove funds from an account if the fraudster has the banking information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Paperhanger

A

Term to describe a person who writes a check for over the amount of purchase to receive cash from establishment. However, the check has NSF or is a fictitious account. Fraudster gets cash and establishment gets stuck with no cash and no payment for purchase. Use of checks has decreased this type of fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Probing

A

Fraud scheme to “probe” credit card companies/banks by running numbers through system until a number comes back approved. These credit card numbers are generally sold on black market.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Benford’s Law

A

Natural multi-digit numbering sequences are not random and follow a predicable pattern for the frequency of the first digit. The use of the numbers 1-9 decline as the number gets higher - ie. number 1 is used more than all others as the first digit and 9 is used less that all others as the first digit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pressure

A

One side of fraud triangle - deadlines, quotas, problems, concerns, outside party, etc. puts pressure on person to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Opportunity

A

One side of the fraud triangle - override, write off, recognise revenue, adjust, discount and reserve/provision are all opportunities for fraud by a person in a position to act on the opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rationalization

A

One side of the fraud triangle - reasonable, deserve, temporary, minimising, etc. are all used by someone committing fraud to rationalise their behaviour and actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Direct approach

A

Methods of tracing financial transactions to subject’s books/records
1. financial institutions
2. correspondent banking records
3. loan and credit card records
4. wire transfers
5. EFT or ACH records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Indirect approach

A

Method of tracing that is circumstantial evidence to prove source of funds
1. asset method
2. expense method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the fraud theory approach?

A

The fraud theory approach dictates that the fraud examiner:
1. analyse the available data
2. create a hypothesis
3. test the hypothesis
4. refine and amend the hypothesis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Wedge

A

A device designed to record all of the information contained on the magnetic strip on the back a credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Common credit card frauds

A
  1. advance payments
  2. card counterfeiting
  3. account takeovers
22
Q

Lapping

A

Lapping customer payments is one of the most common methods of concealing receivables skimming. Lapping is the crediting of one account through the abstraction of money from another account. It is the fraudster‘s version of “robbing Peter to pay Paul”.

23
Q

Cash theft

A

Cash theft schemes involve the theft of money that has already appeared on a victim company‘s books.

24
Q

Example of Lapping

A

For instance, assume that a company receives a $150 payment, but is diverted by an accounting clerk to a personal account. In order to hide the theft, the clerk would apply the second receivable to come in, assume $200, to the first receivable.

25
Detection of skimming schemes
1. horizontal analysis 2. vertical analysis 3. ratio analysis
26
Liquidity ratios
Current Ratio = Current Assets / Current Liabilities Quick Ratio = (Cash & Cash Equivalents + Accounts Receivables) / Current Liabilities Cash Ratio = Cash & Cash Equivalents / Current Liabilities
27
Solvency ratios
Debt-To-Equity Ratio = Total Debt / Total Equity Debt Ratio = Total Debt / Total Assets Interest Coverage Ratio = EBITDA / Interest Expense
28
Efficiency ratios
Receivables Turnover Ratio = Sales / Accounts Receivable Inventory Turnover Ratio = COGS / Inventories Payable Turnover Ratio = COGS / Accounts Payable Asset Turnover Ratio = Sales / Total Assets Net Fixed Asset Turnover Ratio = Sales / Net Fixed Assets Equity Turnover Ratio = Sales / Total Equity
29
Profitability ratios
Gross Margin = (Sales – COGS) / Sales Operating Profit Margin = EBIT / Sales Net Margin = Net Income / Sales Return on Total Asset (ROA) = EBIT / Total Assets Return on Total Equity (ROE) = Net Income / Total Equity
30
Cash receipt schemes
1. skimming (off-book fraud) 2. cash theft or larceny (on-book fraud)
31
Register disbursement scheme
Register disbursement schemes involve a fraudulent transaction that justifies the removal of cash from the register such as a false return or a voided sale
32
Physical padding
A method of concealing misappropriation of inventory where by some employees try to make it appear that there are more assets present in the warehouse or stockroom than there actually are.
33
Larceny
Felonious stealing, taking and carrying . . . away another's personal property with intent to convert it or deprive the owner thereof
34
Purchasing and receiving scheme
In purchasing and receiving schemes, dishonest employees manipulate the purchasing and receiving functions of a company to facilitate the theft of inventory and other assets.
35
Social engineering scheme
In a social engineering scheme, the information thief manipulates people into handing over secret information through use of trickery, persuasion, threats, or cajolery. The social engineer usually, though not always, operates by phone or email. Social engineering is thought to play at least some part in most computer system penetrations.
36
Misdirection
Method of fraud prevention involves feeding information thieves false facts in order to neutralise their intelligence efforts.
37
Fraud Tree
Corruption Asset Misappropriation Financial Statement Fraud
38
Corruption per the fraud tree
BICE bribery illegal gratuities conflicts of interest economic extortion
39
Financial Statement fraud per the fraud tree
Overstatements of net worth, net income Understatements of net worth, net income
40
Asset Misappropriation per the fraud tree
theft of cash theft of cash receipts fraudulent disbursements inventory/other assets misuse and larceny
41
Income smoothing
Moving revenue or expenses between one period and the next, increasing or decreasing earnings as desired.
42
Channel stuffing
This term refers to the sale of an unusually large quantity of a product to distributors who are encouraged to overbuy using deep discounts or extended payment terms.
43
Related-Party transactions
These transactions generally occur when a company does business with another entity whose management or operating policies can be controlled or significantly influenced by the company or by some other party in common.
44
What is a current ratio?
Current assets divided by current liabilities
45
What is a quick ratio?
cash + securities + receivables divided by current liabilities
46
How is A/R turnover calculated?
net sales on account divided by average net receivables
47
How is the collection ratio calculated?
365 divided by receivable turnover ratio
48
What is inventory turnover?
cost of good sold divided by average inventory
49
How is average number of days inventory is in stock calculated?
365 divided by inventory turnover
50
What is debt-to-equity ratio?
total liabilities divided by total equity
51
Calculate profit margin
net income divided by net sales