SU 6 - Fraud Risks Flashcards
Any illegal acts characterized by deceit, concealment, or violation of trust.
Fraud
A term used to refer to indicators of fraud; signs that indicate both the inadequacy of controls in place to deter fraud and the possibility that some perpetrator has already overcome these weak or absent controls to commit fraud.
Red Flags
The application of auditing skills to gather evidence that may be used in a court of law for a criminal or civil matter.
Forensic Auditing
The offering, giving, receiving, or soliciting of anything of value to influence an outcome.
Bribery
A term used to refer to individuals who report fraud and abuse.
Whistleblowers
The misuse of entrusted power for private gain.
Corruption
The practice of inflating sales figures by forcing more products through a distribution channel than the channel can actually sell.
Channel loading
The probability that fraud will occur and the potential severity or consequences to the organization when it occurs.
Fraud Risks
A set of three conditions that, if present in the right proportions, suggest the possibility of fraud: opportunity, motive, and rationalization.
Fraud Triangle
Theft of a material amount of an organization’s assets.
Misappropriation of assets
While reviewing an engagement team’s forensic workpapers, the chief audit executive determined that too much time was being spent reviewing outliers. The use of which techniques is most likely to address this problem.
a) Topic modeling and linguistic analysis.
b) Statistical analysis and machine learning.
c) Data visualization dashboards.
d) Pattern and link analysis.
b) Statistical analysis and machine learning.
Rationale
Statistical analysis and machine learning increases the confidence that items identified as outliers warrant additional review, thus limiting the number of false positives and increasing the efficiency of the review process. Pattern and link analysis is a data visualization technique that exposes hidden relationships between data sources. Topic modeling and linguistic analysis help the investigative team to understand what information may have been compromised or the corrupt intent of certain business activities. Data visualization dashboards identify trends and outliers but do not provide information about whether outliers warrant additional review.
An organization’s chief audit executive (CAE) feels that his team lacks the knowledge, skills, or other competencies needed to perform a fraud investigation. Implementation Standard 1210.A1 and Implementation Guide 2050 indicate that the CAE should
a) contact appropriate government investigative authorities.
b) outsource the forensic review to a team with the proper industry experience.
c) train the staff in forensic auditing prior to reviewing the particular case.
d) refer the matter to the legal department.
b) outsource the forensic review to a team with the proper industry experience.
Rationale
Implementation Standard 1210.A1 states that “the chief audit executive must obtain competent advice and assistance if the internal auditors lack the knowledge, skills, or other competencies needed to perform all or part of the engagement.” Implementation Guide 2050 advises the CAE to consider a service provider’s professional certifications, memberships in professional associations, reputation, experience, and familiarity with the organization’s industry or business. In addition, the CAE must ensure the independence and objectivity of the service provider.
A chief audit executive (CAE) uncovers significant fraudulent activity that clearly involves the executive vice president to whom the CAE reports. Which of the following best describes how the CAE should proceed?
a) Carry out an examination for the purpose of determining the extent of the fraud.
b) Report the facts to the chief executive officer and the audit committee of the board of directors.
c) Interview the executive vice president to obtain essential evidence.
d) Notify regulatory authorities and the police.
b) Report the facts to the chief executive officer and the audit committee of the board of directors.
Rationale
This is a management decision and a management responsibility. Upon the discovery of fraud, the CAE should inform executive management and the audit committee.
Besides the definitions of fraud from the Standards and from “Managing the Business Risk of Fraud, A Practical Guide” by The IIA, AICPA, and ACFE, what else do internal auditors need to understand fraud?
a) Formal training in fraud investigations to develop the necessary expertise
b) Sufficient knowledge of fraud to declare when fraud is occurring
c) The legal definition of fraud in relevant jurisdictions
d) Nothing else is needed; the auditors would be in conformance with the Standards for understanding fraud.
c) The legal definition of fraud in relevant jurisdictions
Rationale
In addition to the definitions mentioned in the question, each jurisdiction under which the organization operates may have a specific legal definition of fraud. Internal auditors are not expected to be experts in fraud investigations, nor are they the proper persons to declare when fraud is occurring. Rather, internal auditors should have sufficient knowledge of fraud to identify red flags indicating that fraud may have been committed. Professional fraud investigators would be responsible for declaring the existence of fraud.
Which of the following control procedures would be effective in preventing frauds in which purchase orders are issued to fictitious vendors?
a) Requiring single-use contracts (purchase orders) with all major vendors from whom production components are purchased
b) Requiring that a three-way match process occur between the receiving record, the invoice, and the purchase order
c) Requiring that total purchases from all vendors for a month not exceed the total budgeted purchases for that month
d) Requiring that all purchases be made from an authorized vendor list maintained independently of the individual placing the purchase order
d) Requiring that all purchases be made from an authorized vendor list maintained independently of the individual placing the purchase order
Rationale
Use of an authorized vendor list would be an effective control. Long-term contracts with major vendors would also be effective so requiring only use of purchase orders would be too restrictive a control. Requiring that purchases from all vendors for a month not exceed the total budgeted purchases for that month would be ineffective, because it controls the total amount of expenditures but not where the purchase orders are placed or whether there is receipt of goods for the items purchased. A three-way match is an important control to detect other types of fraud but a fictitious vendor would not be detected in this way.
Analyzing matches between vendor and employee addresses could identify what type of fraud risk?
a) Fixed bidding
b) Inflated prices
c) Ghost employees
d) Fictitious vendors
d) Fictitious vendors
Rationale
Per Global Technology Audit Guide 13, “Fraud Prevention and Detection in an Automated World,” fictitious vendors could be discovered by running a check to uncover post office boxes used as addresses and to find any matches between vendor and employee addresses and/or phone numbers.
What three factors are consistently present when people commit fraud?
a) Opportunity, motive, and rationalization
b) Opportunity, due professional care, and justification
c) Experience, proficiency, and rationalization
d) Pressure, effective controls, and explanation
a) Opportunity, motive, and rationalization
Rationale
Three factors are consistently present when people commit fraud:
- Opportunity, a combination of circumstances or conditions that enable fraud to occur
- Motive, an actual or perceived need that provides a reason for the fraud
- Rationalization, a concocted, convincing, and plausible justification
An IT fraud risk assessment usually includes which of the following activities?
a) Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact
b) Remediation of gaps identified in IT general controls
c) Performing an inventory of all IT systems
d) Establishing user access controls for IT applications
a) Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact
Rationale
An IT fraud risk assessment usually includes:
- Identifying relevant IT fraud risk factors.
- Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact.
- Mapping existing controls to potential fraud schemes and identifying gaps.
- Testing operating effectiveness of fraud prevention and detection controls.
- Assessing the likelihood and business impact of a control failure and/or a fraud incident.
Which is an internal auditing responsibility related to the deterrence of fraud?
a) Internal auditors should determine whether communication channels provide management with adequate and reliable information on the effectiveness of the control system and the occurrence of unusual transactions.
b) The primary means of deterring fraud is through an effective control system designed, but never managed, by internal auditors.
c) Internal auditors should recommend a culture of loyalty to top management so that employees are more likely to report fraud that harms the organization.
d) Internal auditors are responsible for initiating an affirmation or certification process to confirm that employees have read and understand the corporate policies and are in compliance with them.
a) Internal auditors should determine whether communication channels provide management with adequate and reliable information on the effectiveness of the control system and the occurrence of unusual transactions.
Rationale
Internal auditing responsibilities related to monitoring include assessing whether deficiencies in the fraud risk management program are communicated effectively and to the appropriate parties, including senior management and the board.
Which most accurately describes the “fraud triangle”?
a) Incentive (motivation to for committing fraud); Opportunity (a control weakness or gap that makes fraud possible); Rationalization (justification for committing fraud).
b) Opportunity (weakness or gap that makes fraud possible); Rationalization (justification for committing fraud); Methodology (misappropriation of assets or financial misstatements).
c) Methodology (misappropriation of assets or financial misstatements); Opportunity (weakness or gap that makes fraud possible); Incentive (motivation to for committing fraud); Opportunity (weakness or gap that makes fraud possible).
d) Rationalization (justification for committing fraud); Methodology (misappropriation of assets or financial misstatements); Incentive (motivation to for committing fraud).
a) Incentive (motivation to for committing fraud); Opportunity (a control weakness or gap that makes fraud possible); Rationalization (justification for committing fraud).
Rationale
The “fraud triangle” describes the convergence of three factors: Pressure/Incentive (the motivation for committing fraud); Opportunity (a control weakness or other gap that makes it possible to commit fraud); and Rationalization (How an individual or group justifies their fraudulent activities.)
What method the fraudster used (whether the fraudster misappropriated assets or made financial statement misstatements) is not part of the fraud triangle.
In regard to fraud detection, each internal auditor should be competent at which of the following levels as they are defined in The IIA’s International Professional Practices Framework?
a) Each internal auditor is responsible only for knowing The IIA’s definition of fraud and being able to identify the fraud detection experts relied upon by the internal audit activity.
b) Each internal auditor should be sufficiently trained in fraud detection to be able to devise controls to identify and prevent the major types of fraud likely to occur in a given organizational activity.
c) Each internal auditor should be proficient in fraud detection so as to be able to conduct an investigation with a high statistical probability of discovering at least one instance of fraud, if fraud is being perpetrated.
d) Each internal auditor should have sufficient knowledge of fraud to recognize conditions that indicate the need for further action or a fraud investigation.
d) Each internal auditor should have sufficient knowledge of fraud to recognize conditions that indicate the need for further action or a fraud investigation.
Rationale
Each internal auditor is responsible for a sufficient knowledge of fraud to be able to identify the red flags that indicate the presence of fraud and to be able to recommend appropriate next steps for determining the likelihood of fraud.
Which is the best way listed to detect bid rigging?
a) Interview losing bidders.
b) Compare the winning bid to the other bids received.
c) Do a market scan for the given good or service.
d) Interview the bid evaluator.
c) Do a market scan for the given good or service.
Rationale
Bid rigging involves the collusion of a limited number of bidders in which they all submit high bids. The bid winner may provide subcontracts to the other bidders; the bid evaluator may also be in on the collusion.
Doing a market scan can provide a ballpark cost for the type of good or service to see if the winning bid seems appropriate.
The other answer choices would fail to reveal whether this practice is occurring. For example, talking to the bid evaluator would be unlikely to reveal the fraud if that person was colluding in it.
Which example of fraud is most likely to injure the organization?
a) Intentionally misapplying accounting principles
b) Invoices received for catering services not actually provided
c) Biasing assumptions used to estimate account balances
d) Fictitious journal entries intended to manipulate operating results
b) Invoices received for catering services not actually provided
Rationale
Fraud perpetrated to the detriment of the organization is conducted generally for the direct or indirect benefit of an employee, outside individual, or another organization.
The other examples are all more likely to be fraud designed to benefit the organization, such as by exploiting an unfair or dishonest advantage that also may deceive an outside party. The three incorrect answer choices are common examples of manipulating financial statements to deceive investors and lenders into believing that the company is more solvent or more profitable than it actually is.
e Standards require the internal audit activity to assess fraud risks at the ___________________ levels.
a) system and entity
b) business and departmental
c) enterprise and operational
d) organizational and engagement
d) organizational and engagement
Rationale
The Standards require the internal audit activity to assess fraud risks at the organizational and engagement levels. To ensure adequate review of the risks relevant to each engagement, internal auditors should conduct a fraud risk assessment as part of engagement planning. Over time, the knowledge the internal audit activity obtains during individual engagements can be compiled into a more robust and comprehensive organization-wide fraud risk assessment.
Internal auditors must have __________ knowledge to evaluate the risk of fraud.
a) specialist
b) expert
c) sufficient
d) legal
c) sufficient
Rationale
While internal auditors must have sufficient knowledge to evaluate the risk of fraud and how it is managed by the organization, they are not expected to have the expertise of a person whose primary responsibility is detecting and investigating fraud (Standard 1210.A2).
Which would most likely be considered a red flag?
a) An individual who has been in a cash-handling job for an extended period always takes a long vacation in February.
b) The organization has a third-party-operated whistleblower hotline in place, but no one has ever used it.
c) Managers never override controls, even if this sometimes harms profitability.
d) Just after management resolves one crisis, the next always seems to pop up.
d) Just after management resolves one crisis, the next always seems to pop up.
Rationale
An atmosphere of constant crisis can create the opportunity for fraud.
While a red flag for fraud is employees who never take vacations, the situation of an employee taking a vacation at the same time each year would not necessarily be a red flag, since the vacation period reduces the opportunity for fraud. The person taking over temporarily would create a window to observe how the operation occurs when the other person is not present. (An exception could be if the operation were shut down during that period or some other situation-specific event, but this isn’t mentioned in the question.)
The fact that no one has used a whistleblower hotline is not a red flag in itself.
Managers frequently overriding controls—not avoiding doing so—is a red flag.
When communicating fraud audit outcomes, the internal auditor should
a) provide an opinion regarding the culpability of the fraud suspect.
b) provide an opinion on how management should discipline the perpetrators.
c) conduct fraud training with staff in the same position as the perpetrator to indicate how the person was detected.
d) cite relevant laws and regulations that may be applicable to the case at hand.
d) cite relevant laws and regulations that may be applicable to the case at hand.
Rationale
The communication should be written in a systematic and organized manner to enhance clarity and comprehension. It is inappropriate to interject any personal opinions or speculation. The determination of culpability is a function of the legal system and typically outside the scope of the internal auditor.
How does fraud awareness training support fraud prevention?
a) It limits rationalization.
b) It reduces opportunities to commit fraud.
c) It helps develop credible responses to potential risks.
d) It facilitates the testing of controls.
a) It limits rationalization.
Rationale
Rationalization is how an individual justifies fraudulent actions. Human nature is such that most people will not commit fraud unless they can rationalize it to themselves. Fraud awareness training minimizes rationalization by supporting the ethical “tone at the top,” promoting an anti-fraud environment, and sending the message that the organization will not tolerate misconduct of any kind.
Which of the following statements correctly characterizes red flags?
a) Many red flags are subjective in nature, but they still should come to the auditor’s attention during the course of an audit if it is properly planned and conducted in accordance with the Standards.
b) Red flags are items or actions that are almost always associated with fraudulent conduct.
c) Training all personnel in the organization’s ethical code tends to reduce red flags but not actual instances of fraud.
d) The auditor should document all red flags that may have been noted in an audit engagement even if the chief audit executive determines that no fraud investigation is warranted.
d) The auditor should document all red flags that may have been noted in an audit engagement even if the chief audit executive determines that no fraud investigation is warranted.
Rationale
The auditor should document all red flags that may have been noted in an audit engagement even if the chief audit executive determines that no fraud investigation is warranted. This will show that the auditor is fully disclosing all information gathered, and such information may become relevant on a future audit if the patterns continue or get worse. However, many red flags are personal in nature and would not necessarily come to the attention of the auditor. These would include items such as the excessive living style of a manager or excessive gambling.
Management of a property and casualty insurance company has two major concerns about the efficiency and effectiveness of the claims-processing activities:
- Some claims are being paid that should not be paid or are being paid in amounts in excess of the policy.
- Many claims are not being paid on a timely basis.
In preparing for an audit of the area, the internal auditor decides to perform a preliminary survey to gather more information about the nature of processing and potential problems. After informing management, the auditor is directed to go ahead with a fraud investigation. The auditor has identified the parties most likely to have been involved in the fraud, if indeed one is taking place. The auditor sends each potential participant a personal email indicating the nature of the investigation and urges the individual to come forward and explain the nature of the fraud. The auditor states that this is strictly an audit investigation and legal authorities are not involved. A major problem with this particular communication is
a) the medium. Personal interviews should have been used instead of email.
b) the nature of the message. The auditor should have detailed the specific allegations against each employee and allowed them the opportunity to respond. The message, as written, is too general.
c) the nature of the communication. The auditor should have sent a questionnaire to each employee rather than seeking an open-ended response.
d) the medium. A paper-based document, such as a letter, should have been used instead of email.
a) the medium. Personal interviews should have been used instead of email.
Rationale
The nature of the communication is highly sensitive and personal. A more personal form of communication, such as a direct interview, should have been used to elicit the response from the employees.
The auditor is not in a position to detail the allegations against each specific employee.
Which of the following might alert an auditor to the possibility of fraud in a division?
a) The division is not scheduled for an external audit this year.
b) The organization’s share prices were on the rise but now are falling.
c) A significant portion of management’s compensation is directly tied to the division’s reported net income.
d) Sales have increased by 10%.
c) A significant portion of management’s compensation is directly tied to the division’s reported net income.
Rationale
One of the most common red flags identified in the literature is a significant portion of management’s compensation being directly tied to the division’s reported net income.
Which of the following fraud risk factors is generally higher in a computer environment?
a) Motivation of executive management
b) Possibility of large dollar amounts being involved
c) Number of persons with access to systems and assets
d) Degree of competence of operating personnel
b) Possibility of large dollar amounts being involved
Rationale
The dollar amounts of frauds perpetrated in computer environments have usually been very large when compared with frauds that do not involve computers.
What is defined as the offering, giving, receiving, or soliciting of anything of value to influence an outcome?
a) Embezzlement
b) Bribery
c) Corruption
d) Fraud
b) Bribery
Rationale
As described in the Practice Guide “Internal Auditing and Fraud,” bribery is the offering, giving, receiving, or soliciting of anything of value to influence an outcome.
An auditor uncovers a plan to overstate inventory and thereby increase reported profits for a division. The auditor has substantial evidence that the divisional manager was aware of and approved this plan. There is also some evidence that the manager may have been responsible for the plan’s implementation. The auditor should
a) continue to conduct interviews with subordinates until a definite case is made and then report the case to the audit committee.
b) inform the divisional manager of his or her suspicions and obtain the manager’s explanation of the findings before pursuing the matter further.
c) inform senior management and the audit committee of the findings and discuss possible further investigation.
d) document the case thoroughly and report the suspicions to the external auditor for further review.
c) inform senior management and the audit committee of the findings and discuss possible further investigation.
Rationale
In the normal course of audit work, internal auditors have a responsibility to exercise due professional care as specifically defined in Standard 1220 with respect to fraud detection. An internal auditor is responsible for notifying the appropriate authorities within the organization if a determination is made that fraud has occurred and to recommend an investigation.
Engagement findings revealed that an organization did not have an existing fraud risk management process. The chief audit executive recommended that the organization develop such a process. Which order of tasks to develop a fraud risk management process is most likely to be recommended by the chief audit executive?
a) Perform a comprehensive fraud risk assessment; establish a fraud risk management policy; select, develop, and deploy preventative and detective fraud control activities; establish a fraud reporting process and coordinated approach to investigative action; monitor the fraud risk management process, report results, and improve the process.
b) Perform a comprehensive fraud risk assessment; select, develop, and deploy preventative and detective fraud control activities; establish a fraud risk management policy; establish a fraud reporting process and coordinated approach to investigative action; monitor the fraud risk management process, report results, and improve the process.
c) Establish a fraud risk management policy; select, develop, and deploy preventative and detective fraud control activities; perform a comprehensive fraud risk assessment; establish a fraud reporting process and coordinated approach to investigative action; monitor the fraud risk management process, report results, and improve the process.
d) Establish a fraud risk management policy; perform a comprehensive fraud risk assessment; select, develop, and deploy preventative and detective fraud control activities; establish a fraud reporting process and coordinated approach to investigative action; monitor the fraud risk management process, report results, and improve the process.
d) Establish a fraud risk management policy; perform a comprehensive fraud risk assessment; select, develop, and deploy preventative and detective fraud control activities; establish a fraud reporting process and coordinated approach to investigative action; monitor the fraud risk management process, report results, and improve the process.
Rationale
According to COSO, the recommended sequential steps are: Establish a fraud risk management policy; perform a comprehensive fraud risk assessment; select, develop, and deploy preventative and detective fraud control activities; establish a fraud reporting process and coordinated approach to investigative action; monitor the fraud risk management process, report results, and improve the process.
An essential component of a robust anti-fraud program is
a) posting the whistleblower hotline number in common employee areas.
b) white papers on common fraud schemes.
c) a comprehensive fraud risk assessment.
d) reliance on existing internal controls.
c) a comprehensive fraud risk assessment.
Rationale
Comprehensive fraud risk assessments can enable internal audit to focus anti-fraud efforts on areas where the organization is most vulnerable.
Having a code of conduct, a whistleblower hotline, an internal audit department, surprise audits, fraud awareness training, and related controls and policies are necessary elements of an anti-fraud program. Collectively, they decrease losses from fraud. But they cannot guarantee that an organization will not be a victim of fraud.
A transportation business has multinational contracts to carry manufacturing supplies and finished products. The corporation coordinates trucks, railcars, and shipping containers. A warehouse and depot were purchased from a smaller company last year; this facility has never been audited. The employees of the warehouse/depot privately complain that the manager of the facility is difficult to work for. He frequently changes his mind, doesn’t communicate fully or clearly, and is generally disorganized. Although he has developed strong relationships with customers and vendors over the years, he has not been able to keep up with modern business models and tools. This, and the fact that his branch has the lowest profitability level in the company, may be why he has been passed over for promotion in the past. Which of the following factors might an internal auditor consider to be a red flag?
a) Recent merger and use of multiple modes of transportation
b) Lack of modern business models and lack of audits
c) Use of multinational contracts rather than simpler type for transportation
d) Branch’s weak performance and manager’s style and relationships
d) Branch’s weak performance and manager’s style and relationships
Rationale
The branch’s weak performance relative to the rest of the organization is a red flag. Managers who commit fraud may be very poor managers in one or more ways. They may be chronically late with reports, play favorites with employees, and demand loyalty from employees without showing loyalty to them or the company. Some bad managers are simply that—bad managers. Internal auditors, however, should consider these management areas as high risk for fraud and be alert to further red flags. The manager’s close relationship with customers and vendors is also problematic.
Which statement accurately describes fraud red flags?
a) They are more common in environments with redundant controls.
b) They direct an internal auditor to specific areas to investigate.
c) They are less common in environments when managers override controls, often for ethical reasons.
d) Those related to external vendors are more difficult to detect than those related to employees.
b) They direct an internal auditor to specific areas to investigate.
Rationale
Red flags can direct an internal auditor to areas that warrant further investigation. Fraud red flags may refer to a broad range of warning signs indicating the inadequacy of controls and the possibility that some perpetrator has overcome weak or absent controls. Organizations often establish lists of red flags. These lists indicate potential motives, opportunities, and rationalization for fraud in the particular organization.
Which is an example of something that usually tends to be present in people who have committed fraud?
a) They believe that they are bad people and will be less likely to repeat the fraud.
b) They believe that they are still normal people.
c) They believe no real reason is needed for what they did.
d) They believe that the opportunity they took means that the rules support their act.
b) They believe that they are still normal people.
Rationale
Fraud perpetrators must be able to justify their actions to themselves as a psychological coping mechanism, allowing them to believe they have done nothing wrong and are “normal people.”