Working Questions 2 Flashcards
What are the stages in investigating theft acts in order
1 Interview Suspects
2 Interview former employers or unsuccessful vendors
3 Search public records, invigilation, or surveillance.
4 Check personal records or public records.
5 Interview other buyers, coworkers etc.
1 Check personal records or public records.
2 Interview former employers or unsuccessful vendors
3 Search public records, invigilation, or surveillance.
4 Interview other buyers, coworkers etc.
5 Interview Suspects
What are the four investigation methods?
Surveillance and covert operations
Invigilation
Obtaining physical evidence
Gathering electronic information
What are the four steps in order for ceazing electronic devices for
gathering electronic evidence?
1 Search the device manually
2 Secure the device and perform initial tasks
3 Search the device using automated procedures
4 Clone the device and calculate a CRC number
1 Secure the device and perform initial tasks
2 Clone the device and calculate a CRC number
3 Search the device manually
4 Search the device using automated procedures
What are the 7 types of audit tests in order
1 Observations
2 Inquiries
3 Mechanical Accuracy
4 Documentation
5 Analytical tests
6 Physical Examinations
7 Confirmations
1 Mechanical accuracy
2 Analytical Tests
3 Documentation
4 Confirmations
5 Observations
6 Physical Examinations
7 Inquiries
How do people react to a crisis (In order)
1 Anger
2 Depression
3 Denial
4 Rationalisation
5 Acceptance
1 Denial
2 Anger
3 Rationalization
4 Depression
5 Acceptance
What is the fraud scale and the relationship between the elements?
Perc. Pressure, Perseved Opportunity, and rationalization. Explain how each of these interact when increased or decreased.
What are the advantages of Data driven fraud?
- Full population analysis
- Time intensive tasks are done quickly
*Routines are easy to impliment such as stratisfication and Summarisation - Repeatability- processes of fraud detection can be improved and reused
What are the four different types of public records that can be searched?
Government Records
Private Records
Online databases
Internet searches
What are the five types of questions and interviewer can ask?
1 Introductory
2 Informational
3 Assessment
4 Closing
5 Admission seeking
What is the vulnerability chart?
It is a wholistic approach to systematic fraud detection and investigation where all the elements are coordinated and considered in detail.
-assets missing/taken
-Individual opportunities
-Concealment Possibilities
-Conversion Possibilities
-Symptoms observed
-Key internal controls compromised
-pressures on potential suspects are
considered
What are the three types of Honesty Testing methods? Describe each.
1) Pencil and paper tests
2) Graphology Tests
3) Polygraph tests
What are the three types of fraud experienced by organisations? Describe them.
1 Cash and other asset theft or missappropriation that are entering the system
2 Cash and Assets on hand
3) Disbursment fraud
What are some proactive steps in order to minimise the risks of ID theft?
Shredding important documents
Do not call register
Opting out of pre approved credit cards
installing surveillance cameras on letterboxes
Having a PO box instead of a mail box on the street
If you do use a mail box, have a lock installed.
Always use a virus scanner on your PC.
Only provide information if you initiated contact with a genuine company.