Financial Transactions - Fraud Schemes Flashcards

1
Q

Name 4 overstated expense reimbursements

A
  1. Altered receipts
  2. Over-purchasing
  3. Overstating another employee’s expenses
  4. Orders to overstate expenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List 7 methods to prevent and detect mis-characterised expenses

A
  1. Establish & adhere to a system of controls
  2. Require detailed expense reports w/ original support documentation
  3. Require direct supervisory review of all travel and entertainment expenses
  4. Establish a policy that clearly states what will or will not be reimbursed
  5. Scrutinise any expense report that is approved outside of the restorer’s dept
  6. Compare dates/times with employee’s work schedule
  7. Compare prior/current/budgeted expenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 expense reimbursement schemes?

A
  1. Fictitious expense reimbursement
  2. Overstated expense reimbursement
  3. Mischaracterised expense reimbursement
  4. Multiple expense reimbursement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Predication

A

Totality of circumstances that would lead a reasonable, professionally trained and prudent individual to believe a fraud has occurred, is occurring and /or will occur. Fraud examination should not be conducted w/o proper predication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Skimming

A
  1. Using a device called a wedge or skimmer, fraudster takes credit card & runs through device, collecting # to be sold or used illegally (restaurants).
  2. Term also used to describe cash being taken before it is recorded on the books. Considered an OFF-Book fraud.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

No Receipt credit card fraud

A

Card is intercepted in route (mail) before it is received by owner. This type of fraud has been reduced by credit card companies implementing verification methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Microline

A

In order to curb check/credit card fraud, a line of small words that cannot be duplicated is embedded in check or card. Holograms can also be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Giro

A

Term used to describe payment transfers from one bank account to another bank account instigated by the payer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kiting

A

Term used to describe depositing money into another bank account without recording the withdrawal from the issuing account - double counting cash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Demand Draft

A

A demand draft is a way to initiate a bank transfer that does not require a signature, as is the case with a check. In fraud, it is used to remove funds from an account if the fraudster has the banking information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Paperhanger

A

Term to describe a person who writes a check for over the amount of purchase to receive cash from establishment. However, the check has NSF or is a fictitious account. Fraudster gets cash and establishment gets stuck with no cash and no payment for purchase. Use of checks has decreased this type of fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Probing

A

Fraud scheme to “probe” credit card companies/banks by running numbers through system until a number comes back approved. These credit card numbers are generally sold on black market.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Benford’s Law

A

Natural multi-digit numbering sequences are not random and follow a predicable pattern for the frequency of the first digit. The use of the numbers 1-9 decline as the number gets higher - ie. number 1 is used more than all others as the first digit and 9 is used less that all others as the first digit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pressure

A

One side of fraud triangle - deadlines, quotas, problems, concerns, outside party, etc. puts pressure on person to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Opportunity

A

One side of the fraud triangle - override, write off, recognise revenue, adjust, discount and reserve/provision are all opportunities for fraud by a person in a position to act on the opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rationalization

A

One side of the fraud triangle - reasonable, deserve, temporary, minimising, etc. are all used by someone committing fraud to rationalise their behaviour and actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Direct approach

A

Methods of tracing financial transactions to subject’s books/records
1. financial institutions
2. correspondent banking records
3. loan and credit card records
4. wire transfers
5. EFT or ACH records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Indirect approach

A

Method of tracing that is circumstantial evidence to prove source of funds
1. asset method
2. expense method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the fraud theory approach?

A

The fraud theory approach dictates that the fraud examiner:
1. analyse the available data
2. create a hypothesis
3. test the hypothesis
4. refine and amend the hypothesis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Wedge

A

A device designed to record all of the information contained on the magnetic strip on the back a credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Common credit card frauds

A
  1. advance payments
  2. card counterfeiting
  3. account takeovers
22
Q

Lapping

A

Lapping customer payments is one of the most common methods of concealing receivables skimming. Lapping is the crediting of one account through the abstraction of money from another account. It is the fraudster‘s version of “robbing Peter to pay Paul”.

23
Q

Cash theft

A

Cash theft schemes involve the theft of money that has already appeared on a victim company‘s books.

24
Q

Example of Lapping

A

For instance, assume that a company receives a $150 payment, but is diverted by an accounting clerk to a personal account. In order to hide the theft, the clerk would apply the second receivable to come in, assume $200, to the first receivable.

25
Q

Detection of skimming schemes

A
  1. horizontal analysis
  2. vertical analysis
  3. ratio analysis
26
Q

Liquidity ratios

A

Current Ratio = Current Assets / Current Liabilities
Quick Ratio = (Cash & Cash Equivalents + Accounts Receivables) / Current Liabilities
Cash Ratio = Cash & Cash Equivalents / Current Liabilities

27
Q

Solvency ratios

A

Debt-To-Equity Ratio = Total Debt / Total Equity
Debt Ratio = Total Debt / Total Assets
Interest Coverage Ratio = EBITDA / Interest Expense

28
Q

Efficiency ratios

A

Receivables Turnover Ratio = Sales / Accounts Receivable
Inventory Turnover Ratio = COGS / Inventories
Payable Turnover Ratio = COGS / Accounts Payable
Asset Turnover Ratio = Sales / Total Assets
Net Fixed Asset Turnover Ratio = Sales / Net Fixed Assets
Equity Turnover Ratio = Sales / Total Equity

29
Q

Profitability ratios

A

Gross Margin = (Sales – COGS) / Sales
Operating Profit Margin = EBIT / Sales
Net Margin = Net Income / Sales
Return on Total Asset (ROA) = EBIT / Total Assets
Return on Total Equity (ROE) = Net Income / Total Equity

30
Q

Cash receipt schemes

A
  1. skimming (off-book fraud)
  2. cash theft or larceny (on-book fraud)
31
Q

Register disbursement scheme

A

Register disbursement schemes involve a fraudulent transaction that justifies the removal of cash from the register such as a false return or a voided sale

32
Q

Physical padding

A

A method of concealing misappropriation of inventory where by some employees try to make it appear that there are more assets present in the warehouse or stockroom than there actually are.

33
Q

Larceny

A

Felonious stealing, taking and carrying . . . away another’s personal property with intent to convert it or deprive the owner thereof

34
Q

Purchasing and receiving scheme

A

In purchasing and receiving schemes, dishonest employees manipulate the purchasing and receiving functions of a company to facilitate the theft of inventory and other assets.

35
Q

Social engineering scheme

A

In a social engineering scheme, the information thief manipulates people into handing over secret information through use of trickery, persuasion, threats, or cajolery. The social engineer usually, though not always, operates by phone or email. Social engineering is thought to play at least some part in most computer system penetrations.

36
Q

Misdirection

A

Method of fraud prevention involves feeding information thieves false facts in order to neutralise their intelligence efforts.

37
Q

Fraud Tree

A

Corruption
Asset Misappropriation
Financial Statement Fraud

38
Q

Corruption per the fraud tree

A

BICE
bribery
illegal gratuities
conflicts of interest
economic extortion

39
Q

Financial Statement fraud per the fraud tree

A

Overstatements of net worth, net income
Understatements of net worth, net income

40
Q

Asset Misappropriation per the fraud tree

A

theft of cash
theft of cash receipts
fraudulent disbursements
inventory/other assets misuse and larceny

41
Q

Income smoothing

A

Moving revenue or expenses between one period and the next, increasing or decreasing earnings as desired.

42
Q

Channel stuffing

A

This term refers to the sale of an unusually large quantity of a product to distributors who are encouraged to overbuy using deep discounts or extended payment terms.

43
Q

Related-Party transactions

A

These transactions generally occur when a company does business with another entity whose management or operating policies can be controlled or significantly influenced by the company or by some other party in common.

44
Q

What is a current ratio?

A

Current assets divided by current liabilities

45
Q

What is a quick ratio?

A

cash + securities + receivables divided by current liabilities

46
Q

How is A/R turnover calculated?

A

net sales on account divided by average net receivables

47
Q

How is the collection ratio calculated?

A

365 divided by receivable turnover ratio

48
Q

What is inventory turnover?

A

cost of good sold divided by average inventory

49
Q

How is average number of days inventory is in stock calculated?

A

365 divided by inventory turnover

50
Q

What is debt-to-equity ratio?

A

total liabilities divided by total equity

51
Q

Calculate profit margin

A

net income divided by net sales