SU 6 - Fraud Risks Flashcards
Any illegal acts characterized by deceit, concealment, or violation of trust.
Fraud
A term used to refer to indicators of fraud; signs that indicate both the inadequacy of controls in place to deter fraud and the possibility that some perpetrator has already overcome these weak or absent controls to commit fraud.
Red Flags
The application of auditing skills to gather evidence that may be used in a court of law for a criminal or civil matter.
Forensic Auditing
The offering, giving, receiving, or soliciting of anything of value to influence an outcome.
Bribery
A term used to refer to individuals who report fraud and abuse.
Whistleblowers
The misuse of entrusted power for private gain.
Corruption
The practice of inflating sales figures by forcing more products through a distribution channel than the channel can actually sell.
Channel loading
The probability that fraud will occur and the potential severity or consequences to the organization when it occurs.
Fraud Risks
A set of three conditions that, if present in the right proportions, suggest the possibility of fraud: opportunity, motive, and rationalization.
Fraud Triangle
Theft of a material amount of an organization’s assets.
Misappropriation of assets
While reviewing an engagement team’s forensic workpapers, the chief audit executive determined that too much time was being spent reviewing outliers. The use of which techniques is most likely to address this problem.
a) Topic modeling and linguistic analysis.
b) Statistical analysis and machine learning.
c) Data visualization dashboards.
d) Pattern and link analysis.
b) Statistical analysis and machine learning.
Rationale
Statistical analysis and machine learning increases the confidence that items identified as outliers warrant additional review, thus limiting the number of false positives and increasing the efficiency of the review process. Pattern and link analysis is a data visualization technique that exposes hidden relationships between data sources. Topic modeling and linguistic analysis help the investigative team to understand what information may have been compromised or the corrupt intent of certain business activities. Data visualization dashboards identify trends and outliers but do not provide information about whether outliers warrant additional review.
An organization’s chief audit executive (CAE) feels that his team lacks the knowledge, skills, or other competencies needed to perform a fraud investigation. Implementation Standard 1210.A1 and Implementation Guide 2050 indicate that the CAE should
a) contact appropriate government investigative authorities.
b) outsource the forensic review to a team with the proper industry experience.
c) train the staff in forensic auditing prior to reviewing the particular case.
d) refer the matter to the legal department.
b) outsource the forensic review to a team with the proper industry experience.
Rationale
Implementation Standard 1210.A1 states that “the chief audit executive must obtain competent advice and assistance if the internal auditors lack the knowledge, skills, or other competencies needed to perform all or part of the engagement.” Implementation Guide 2050 advises the CAE to consider a service provider’s professional certifications, memberships in professional associations, reputation, experience, and familiarity with the organization’s industry or business. In addition, the CAE must ensure the independence and objectivity of the service provider.
A chief audit executive (CAE) uncovers significant fraudulent activity that clearly involves the executive vice president to whom the CAE reports. Which of the following best describes how the CAE should proceed?
a) Carry out an examination for the purpose of determining the extent of the fraud.
b) Report the facts to the chief executive officer and the audit committee of the board of directors.
c) Interview the executive vice president to obtain essential evidence.
d) Notify regulatory authorities and the police.
b) Report the facts to the chief executive officer and the audit committee of the board of directors.
Rationale
This is a management decision and a management responsibility. Upon the discovery of fraud, the CAE should inform executive management and the audit committee.
Besides the definitions of fraud from the Standards and from “Managing the Business Risk of Fraud, A Practical Guide” by The IIA, AICPA, and ACFE, what else do internal auditors need to understand fraud?
a) Formal training in fraud investigations to develop the necessary expertise
b) Sufficient knowledge of fraud to declare when fraud is occurring
c) The legal definition of fraud in relevant jurisdictions
d) Nothing else is needed; the auditors would be in conformance with the Standards for understanding fraud.
c) The legal definition of fraud in relevant jurisdictions
Rationale
In addition to the definitions mentioned in the question, each jurisdiction under which the organization operates may have a specific legal definition of fraud. Internal auditors are not expected to be experts in fraud investigations, nor are they the proper persons to declare when fraud is occurring. Rather, internal auditors should have sufficient knowledge of fraud to identify red flags indicating that fraud may have been committed. Professional fraud investigators would be responsible for declaring the existence of fraud.
Which of the following control procedures would be effective in preventing frauds in which purchase orders are issued to fictitious vendors?
a) Requiring single-use contracts (purchase orders) with all major vendors from whom production components are purchased
b) Requiring that a three-way match process occur between the receiving record, the invoice, and the purchase order
c) Requiring that total purchases from all vendors for a month not exceed the total budgeted purchases for that month
d) Requiring that all purchases be made from an authorized vendor list maintained independently of the individual placing the purchase order
d) Requiring that all purchases be made from an authorized vendor list maintained independently of the individual placing the purchase order
Rationale
Use of an authorized vendor list would be an effective control. Long-term contracts with major vendors would also be effective so requiring only use of purchase orders would be too restrictive a control. Requiring that purchases from all vendors for a month not exceed the total budgeted purchases for that month would be ineffective, because it controls the total amount of expenditures but not where the purchase orders are placed or whether there is receipt of goods for the items purchased. A three-way match is an important control to detect other types of fraud but a fictitious vendor would not be detected in this way.
Analyzing matches between vendor and employee addresses could identify what type of fraud risk?
a) Fixed bidding
b) Inflated prices
c) Ghost employees
d) Fictitious vendors
d) Fictitious vendors
Rationale
Per Global Technology Audit Guide 13, “Fraud Prevention and Detection in an Automated World,” fictitious vendors could be discovered by running a check to uncover post office boxes used as addresses and to find any matches between vendor and employee addresses and/or phone numbers.
What three factors are consistently present when people commit fraud?
a) Opportunity, motive, and rationalization
b) Opportunity, due professional care, and justification
c) Experience, proficiency, and rationalization
d) Pressure, effective controls, and explanation
a) Opportunity, motive, and rationalization
Rationale
Three factors are consistently present when people commit fraud:
- Opportunity, a combination of circumstances or conditions that enable fraud to occur
- Motive, an actual or perceived need that provides a reason for the fraud
- Rationalization, a concocted, convincing, and plausible justification
An IT fraud risk assessment usually includes which of the following activities?
a) Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact
b) Remediation of gaps identified in IT general controls
c) Performing an inventory of all IT systems
d) Establishing user access controls for IT applications
a) Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact
Rationale
An IT fraud risk assessment usually includes:
- Identifying relevant IT fraud risk factors.
- Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact.
- Mapping existing controls to potential fraud schemes and identifying gaps.
- Testing operating effectiveness of fraud prevention and detection controls.
- Assessing the likelihood and business impact of a control failure and/or a fraud incident.
Which is an internal auditing responsibility related to the deterrence of fraud?
a) Internal auditors should determine whether communication channels provide management with adequate and reliable information on the effectiveness of the control system and the occurrence of unusual transactions.
b) The primary means of deterring fraud is through an effective control system designed, but never managed, by internal auditors.
c) Internal auditors should recommend a culture of loyalty to top management so that employees are more likely to report fraud that harms the organization.
d) Internal auditors are responsible for initiating an affirmation or certification process to confirm that employees have read and understand the corporate policies and are in compliance with them.
a) Internal auditors should determine whether communication channels provide management with adequate and reliable information on the effectiveness of the control system and the occurrence of unusual transactions.
Rationale
Internal auditing responsibilities related to monitoring include assessing whether deficiencies in the fraud risk management program are communicated effectively and to the appropriate parties, including senior management and the board.
Which most accurately describes the “fraud triangle”?
a) Incentive (motivation to for committing fraud); Opportunity (a control weakness or gap that makes fraud possible); Rationalization (justification for committing fraud).
b) Opportunity (weakness or gap that makes fraud possible); Rationalization (justification for committing fraud); Methodology (misappropriation of assets or financial misstatements).
c) Methodology (misappropriation of assets or financial misstatements); Opportunity (weakness or gap that makes fraud possible); Incentive (motivation to for committing fraud); Opportunity (weakness or gap that makes fraud possible).
d) Rationalization (justification for committing fraud); Methodology (misappropriation of assets or financial misstatements); Incentive (motivation to for committing fraud).
a) Incentive (motivation to for committing fraud); Opportunity (a control weakness or gap that makes fraud possible); Rationalization (justification for committing fraud).
Rationale
The “fraud triangle” describes the convergence of three factors: Pressure/Incentive (the motivation for committing fraud); Opportunity (a control weakness or other gap that makes it possible to commit fraud); and Rationalization (How an individual or group justifies their fraudulent activities.)
What method the fraudster used (whether the fraudster misappropriated assets or made financial statement misstatements) is not part of the fraud triangle.
In regard to fraud detection, each internal auditor should be competent at which of the following levels as they are defined in The IIA’s International Professional Practices Framework?
a) Each internal auditor is responsible only for knowing The IIA’s definition of fraud and being able to identify the fraud detection experts relied upon by the internal audit activity.
b) Each internal auditor should be sufficiently trained in fraud detection to be able to devise controls to identify and prevent the major types of fraud likely to occur in a given organizational activity.
c) Each internal auditor should be proficient in fraud detection so as to be able to conduct an investigation with a high statistical probability of discovering at least one instance of fraud, if fraud is being perpetrated.
d) Each internal auditor should have sufficient knowledge of fraud to recognize conditions that indicate the need for further action or a fraud investigation.
d) Each internal auditor should have sufficient knowledge of fraud to recognize conditions that indicate the need for further action or a fraud investigation.
Rationale
Each internal auditor is responsible for a sufficient knowledge of fraud to be able to identify the red flags that indicate the presence of fraud and to be able to recommend appropriate next steps for determining the likelihood of fraud.
Which is the best way listed to detect bid rigging?
a) Interview losing bidders.
b) Compare the winning bid to the other bids received.
c) Do a market scan for the given good or service.
d) Interview the bid evaluator.
c) Do a market scan for the given good or service.
Rationale
Bid rigging involves the collusion of a limited number of bidders in which they all submit high bids. The bid winner may provide subcontracts to the other bidders; the bid evaluator may also be in on the collusion.
Doing a market scan can provide a ballpark cost for the type of good or service to see if the winning bid seems appropriate.
The other answer choices would fail to reveal whether this practice is occurring. For example, talking to the bid evaluator would be unlikely to reveal the fraud if that person was colluding in it.
Which example of fraud is most likely to injure the organization?
a) Intentionally misapplying accounting principles
b) Invoices received for catering services not actually provided
c) Biasing assumptions used to estimate account balances
d) Fictitious journal entries intended to manipulate operating results
b) Invoices received for catering services not actually provided
Rationale
Fraud perpetrated to the detriment of the organization is conducted generally for the direct or indirect benefit of an employee, outside individual, or another organization.
The other examples are all more likely to be fraud designed to benefit the organization, such as by exploiting an unfair or dishonest advantage that also may deceive an outside party. The three incorrect answer choices are common examples of manipulating financial statements to deceive investors and lenders into believing that the company is more solvent or more profitable than it actually is.
e Standards require the internal audit activity to assess fraud risks at the ___________________ levels.
a) system and entity
b) business and departmental
c) enterprise and operational
d) organizational and engagement
d) organizational and engagement
Rationale
The Standards require the internal audit activity to assess fraud risks at the organizational and engagement levels. To ensure adequate review of the risks relevant to each engagement, internal auditors should conduct a fraud risk assessment as part of engagement planning. Over time, the knowledge the internal audit activity obtains during individual engagements can be compiled into a more robust and comprehensive organization-wide fraud risk assessment.