Principles of fraud examination:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
John Wiley
c2005
|
Schlagworte: | |
Online-Zugang: | Publisher description Table of contents Inhaltsverzeichnis |
Beschreibung: | XVII, 442 S. Ill. 26 cm |
ISBN: | 0471517089 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022251996 | ||
003 | DE-604 | ||
005 | 20070326 | ||
007 | t | ||
008 | 070201s2005 xxua||| |||| 00||| eng d | ||
010 | |a 2004042248 | ||
020 | |a 0471517089 |c cloth : acidfree paper |9 0-471-51708-9 | ||
035 | |a (OCoLC)55147414 | ||
035 | |a (DE-599)BVBBV022251996 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 |a DE-522 | ||
050 | 0 | |a HV6691 | |
082 | 0 | |a 657/.458 |2 22 | |
084 | |a QL 415 |0 (DE-625)141716: |2 rvk | ||
100 | 1 | |a Wells, Joseph T. |e Verfasser |0 (DE-588)13240687X |4 aut | |
245 | 1 | 0 | |a Principles of fraud examination |c Joseph T. Wells |
264 | 1 | |a Hoboken, N.J. |b John Wiley |c c2005 | |
300 | |a XVII, 442 S. |b Ill. |c 26 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Enquête |2 rasuqam | |
650 | 7 | |a Fraude fiscale |2 rasuqam | |
650 | 7 | |a Fraude |2 rasuqam | |
650 | 7 | |a Prévention |2 rasuqam | |
650 | 7 | |a Vérification interne |2 rasuqam | |
650 | 4 | |a Fraud | |
650 | 4 | |a Fraud investigation | |
650 | 4 | |a Fraud |x Prevention | |
650 | 4 | |a Auditing, Internal | |
650 | 0 | 7 | |a Revision |g Wirtschaft |0 (DE-588)4049674-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnungslegung |0 (DE-588)4128343-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betrug |0 (DE-588)4006249-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Betrug |0 (DE-588)4006249-1 |D s |
689 | 0 | 2 | |a Rechnungslegung |0 (DE-588)4128343-0 |D s |
689 | 0 | 3 | |a Revision |g Wirtschaft |0 (DE-588)4049674-0 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/description/wiley042/2004042248.html |3 Publisher description | |
856 | 4 | |u http://www.loc.gov/catdir/toc/wiley041/2004042248.html |3 Table of contents | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015462775&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015462775 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804136248468570112 |
---|---|
adam_text | CONTENTS
CHAPTER
Fraud Examination Methodology
Predication
Fraud Theory Approach
Tools Used in Fraud Examinations
Defining Occupational Fraud and Abuse
Defining Fraud
Defining Abuse
Research in Occupational Fraud and Abuse
Edwin H. Sutherland
Donald R. Cressey
Dr. W. Steve
Richard
The
Fraud and Abuse
Conclusion
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 46
Answers to Exercises
CHAPTER
Learning Objectives
Case Study: Shy Doc Gave Good Face
Overview
Skimming Data from ACFE
Fraud Survey
Skimming Schemes
Sales Skimming
Receivables Skimming
Case Study: Beverage Man Takes the Plunge
Proactive Computer Audit Tests for Detecting
Skimming
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 73
Answers to Exercises W-4
CHAPTERS CASH LARCENY
Case Study: Bank Teller Gets Nabbed for Theft
Overview
Cash Larceny Data from ACFE
Fraud Survey
Cash Larceny Schemes
Larceny at the Point of Sale
Thefts from Other Registers
Death by a Thousand Cuts
Reversing Transactions
Altering Cash Counts or Cash Register Tapes
Destroying Register Tapes
Preventing and Detecting Cash Larceny at the Point
of Sale
Larceny of Receivables
Force Balancing
Reversing Entries
Destruction of Records
Cash Larceny from the Deposit
Deposit Lapping
Deposits in Transit
Preventing and Detecting Cash Larceny
from the Deposit
Case Study: The Ol Fake Surprise Audit Gets
Em Every Time
Proactive Computer Audit Tests for Detecting
Cash Larceny
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 93
Answers to Exercises W-7
CHAPTER
Case Study: Medical School Treats Fraud
and Abuse
Overview
Billing Schemes Data from ACFE
National Fraud Survey
Billing Schemes
Shell
Forming a Shell Company
Submitting False Invoices
Self-Approval of Fraudulent Invoices
Rubber Stamp Supervisors
Reliance on False Documents
Collusion
Purchase of Services Rather than Goods
Pass-Through Schemes
Preventing and Detecting Shell Company Schemes
Billing Schemes Involving
Pay-and-Retum Schemes
Overtoiling with
Vendor s Invoices ill
Case Study: For This Magazine, Internal Fraud
Proved Hard to Digest
Personal Purchases with Company Funds
Personal Purchases Through False Invoicing
Personal Purchases on Credit Cards or
Other Company Accounts
Proactive Computer Audit Tests for Detecting Biffing
Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Answers to Exercises W-10
CHAPTERS CHECK TAMPERING 12B
Case Study: A Wolf in Sheep s Clothing
Overview
Check Tampering Data from ACFE
Fraud Survey
Check Tampering Schemes
Forged Maker Schemes
Obtaining the Check
To Whom Is the Check Made Payable?
Forging the Signature
Miscoding Fraudulent Checks
Converting the Check
Forged Endorsement Schemes
Intercepting Checks Before Delivery
Converting the Stolen Check
Preventing and Detecting the Theft of Outgoing
Company Checks
Altered Payee Schemes
Altering Checks Prepared by Others: Inserting
a New Payee
Altering Checks Prepared by Others: Tacking On
Altering Checks Prepared by the Fraudster:
Erasable Ink
Altering Checks Prepared by the Fraudster:
Blank Checks
Converting Altered Checks
Preventing and Detecting the Alteration
of Company Checks
Concealed Check Schemes
Authorized Maker Schemes
Overriding Controls Through Intimidation
Poor Controls
Preventing and Detecting Check Tampering by
Authorized Makers
Concealing Check Tampering
The Fraudster Reconciling the Bank Statement
Case Study: What Are Friends For?
Re-Alteration of Checks
Falsifying the Disbursements Journal
Reissuing Intercepted Checks
Bogus Supporting Documents
Proactive Computer Audit Tests for Detecting Check
Tampering Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 159
Answers to Exercises W-13
CHAPTER
Case Study: Say Cheese!
Overview
Payroll Scheme Data from ACFE
Fraud Survey
Payroll Schemes
Ghost Employees
Adding the Ghost to the Payroll
Collecting Timekeeping Information
Issuing the Ghost s Paycheck
Delivery of the Paycheck
Preventing and Detecting Ghost Employee Schemes
Falsified Hours and Salary
Manually Prepared Timecards
Time Clocks and Other Automated Timekeeping
Systems
Rates of Pay
Preventing and Detecting Falsified Hours and
Salary Schemes
Commission Schemes
Fictitious Sales
Altered Sales
Detecting Commission Schemes
Case Study: The All-American Girl
Proactive Computer Audit Tests for Detecting
Payroll Fraud
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 185
Answers to Exercises W-17
CHAPTER
____________
Case Study: Frequent Flier s Fraud Crashes
Overview
Expense Reimbursement Data from ACFE
Fraud Survey
Expense Reimbursement Schemes
Mischaracterized Expense Reimbursements
Preventing and Detecting Mischaracterized Expense
Reimbursements
Overstated Expense Reimbursements
Altered Receipts
Overpurchasing
Overstating Another Employee s Expenses
Orders to Overstate Expenses
Preventing and Detecting Overstated Expense
Reimbursement Schemes
Fictitious Expense Reimbursement Schemes
Producing Fictitious Receipts
Obtaining Blank Receipts from Vendors
Claiming the Expenses of Others
Preventing and Detecting Fictitious Expense
Reimbursement Schemes
Multiple Reimbursement Schemes
Preventing and Detecting Multiple Reimbursement
Schemes
Case Study: The Extravagant Salesman
Proactive Computer Audit Tests for Detecting Expense
Reimbursement Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 206
Answers to Exercises W-20
CHAPTERS REGISTER DISBURSEMENT SCHEMES
Case Study: Demotion Sets Fraud in Motion
Overview
Register Disbursement Data from ACFE
Fraud Survey
Register Disbursement Schemes
False Refunds
Fictitious Refunds
Overstated Refunds
Credit Card Refunds
Case Study: A Silent Crime
False Voids
Concealing Register Disbursements
Small Disbursements
Destroying Records
Preventing and Detecting Register Disbursement
Schemes
Proactive Computer Audit Tests for Detecting Register
Disbursement Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 225
Answers to Exercises W-23
CHAPTER
Case Study. Chipping Away at High-Tech Theft
Overview
Non-Cash Misappropriation Data from ACFE
2004
Non-Cash Misappropriation Schemes
Misuse of Non-Cash Assets
The Costs of Inventory Misuse
Unconcealed Larceny Schemes
The Fake Sale
Preventing and Detecting Larceny of
Non-Cash Assets
Asset Requisitions and Transfers
Purchasing and Receiving Schemes
Falsifying Incoming Shipments
False Shipments of Inventory and
Other Assets
Case Study: Hard Drives and Bad Luck
Other Schemes
Concealing Inventory Shrinkage
Altered Inventory Records
Fictitious Sales and Accounts Receivable
Write Off Inventory and Other Assets
Physical Padding
Preventing and Detecting Non-Cash Thefts That Are Concealed
by Fraudulent Support
Proactive Computer Audit Tests for Detecting
Non-Cash Misappropriations
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 251
Answers to Exercises W-26
CHAPTER
CaseStudy: Why Is This Furniture Falling Apart?
Overview
Corruption
Corruption Data
Fraud Survey
Bribery
Kickback Schemes
Bid-Rigging Schemes
Something of Value
Economic Extortion
Illegal Gratuities
Conflicts of Interest
Case Study: Working Double Duty
Purchasing Schemes 27B
Sales Schemes
Other Conflict of Interest Schemes
Preventing and Detecting Conflicts of Interest
Proactive Computer Audit Tests for Detecting
Corruption
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 285
Answers to Exercises W-29
CHAPTER
____________
Fraud in Financial Statements
Who Commits Financial Statement Fraud?
Why Do People Commit Financial Statement Fraud?
How Do People Commit Financial Statement Fraud?
Conceptual Framework for Financial Reporting
Economic Entity
Going Concern
Monetary Unit
Periodicity
Historical Cost
Revenue Recognition
Matching
Full Disclosure
Cost-Benefit
Materiality
Industry Practice
Conservation
Relevance and Reliability
Comparability and Consistency
Responsibility for Financial Statements
Users of Financial Statements
Types of Financial Statements
ТпеЅаЉапеѕ-ОхкуАс^гООг
Public Company Accounting Oversight Board
Certification Obligations for CEOs and CFOs
New Standards for Audit Committee Independence
New Standards for Auditor Independence
Enhanced Financial Disclosure Requirements
Protections for Corporate Whistleblowers under
Sarbanes-Oxley
Enhanced Penalties for White-Collar Crime
Financial Statement Fraud Data from ACFE
Fraud Survey
Frequency and Cost
Types of Financial Statement Schemes
Detection of Financial Statement Schemes
Perpetrators of Financial Statement Schemes
Victims of Corruption Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 316
Answers to Exercises W-32
CHAPTEH
____________
Case Study: That Way Lies Madness
Overview
Defining Financial Statement Fraud
Costs of Financial Statement Fraud
Methods of Financial Statement Fraud
Fictitious Revenues
Sales with Conditions
Pressures to Boost Revenues
Red Hags Associated with Fictitious Revenues
Timing Differences
Matching Revenues with Expenses
Premature Revenue Recognition
Long-Term
Channel Stuffing
Recording Expenses in the Wrong Period
Red Flags Associated with Timing Differences
Case Study: The Importance of Timing
Concealed Liabilities and Expenses
Liability/Expense Omissions
Capitalized Expenses
Expensing Capital Expenditures
Returns and Allowances and Warranties
Red Flags Associated with Concealed Liabilities
and Expenses
Improper Disclosures
Liability Omissions
Subsequent Events
Management Fraud
Related-Party Transactions
Accounting Changes
Red Flags Associated with Improper Disclosures
Improper Asset Valuation
Inventory Valuation
Accounts Receivable
Business Combinations
Fixed Assets
Red Flags Associated with Improper Asset
Valuation
Detection of Fraudulent Financial Statement Schemes
SAS
Statement Audit
SAS
Financial Statement Analysis
Deterrence of Financial Statement Fraud
Case Study: All on the Surface
Summary
Essential Terms
Review Questions
Discussion Issues
Answers to Exercises W-34
CHAPTER
Overview
Introductory Questions
Informational Questions
Closing Questions
Assessment Questions
Admission-Seeking Questions
Summary
Essential Terms
Review Questions
Discussion Issues
Answers to Exercises W-38
CHAPTER
____________
Defining Abusive Conduct
Measuring the Level of Occupational Fraud and Abuse
The Human Factor
Understanding Fraud Deterrence
The Impact of Controls
The Perception of Detection
The Corporate Sentencing Guidelines
Definition of Corporate Sentencing
Vicarious or Imputed Liability
Requirements
The Ethical Connection
Concluding Thoughts 4S0<&
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 407
Answers to Exercises W-40
APPENDIX
BIBLIOGRAPHY
INDEX
|
adam_txt |
CONTENTS
CHAPTER
Fraud Examination Methodology
Predication
Fraud Theory Approach
Tools Used in Fraud Examinations
Defining Occupational Fraud and Abuse
Defining Fraud
Defining Abuse
Research in Occupational Fraud and Abuse
Edwin H. Sutherland
Donald R. Cressey
Dr. W. Steve
Richard
The
Fraud and Abuse
Conclusion
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 46
Answers to Exercises
CHAPTER
Learning Objectives
Case Study: Shy Doc Gave Good Face
Overview
Skimming Data from ACFE
Fraud Survey
Skimming Schemes
Sales Skimming
Receivables Skimming
Case Study: Beverage Man Takes the Plunge
Proactive Computer Audit Tests for Detecting
Skimming
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 73
Answers to Exercises W-4
CHAPTERS CASH LARCENY
Case Study: Bank Teller Gets Nabbed for Theft
Overview
Cash Larceny Data from ACFE
Fraud Survey
Cash Larceny Schemes
Larceny at the Point of Sale
Thefts from Other Registers
Death by a Thousand Cuts
Reversing Transactions
Altering Cash Counts or Cash Register Tapes
Destroying Register Tapes
Preventing and Detecting Cash Larceny at the Point
of Sale
Larceny of Receivables
Force Balancing
Reversing Entries
Destruction of Records
Cash Larceny from the Deposit
Deposit Lapping
Deposits in Transit
Preventing and Detecting Cash Larceny
from the Deposit
Case Study: The Ol' Fake Surprise Audit Gets
'Em Every Time
Proactive Computer Audit Tests for Detecting
Cash Larceny
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 93
Answers to Exercises W-7
CHAPTER
Case Study: Medical School Treats Fraud
and Abuse
Overview
Billing Schemes Data from ACFE
National Fraud Survey
Billing Schemes
Shell
Forming a Shell Company
Submitting False Invoices
Self-Approval of Fraudulent Invoices
"Rubber Stamp" Supervisors
Reliance on False Documents
Collusion
Purchase of Services Rather than Goods
Pass-Through Schemes
Preventing and Detecting Shell Company Schemes
Billing Schemes Involving
Pay-and-Retum Schemes
Overtoiling with
Vendor's Invoices ill
Case Study: For This Magazine, Internal Fraud
Proved Hard to Digest
Personal Purchases with Company Funds
Personal Purchases Through False Invoicing
Personal Purchases on Credit Cards or
Other Company Accounts
Proactive Computer Audit Tests for Detecting Biffing
Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Answers to Exercises W-10
CHAPTERS CHECK TAMPERING 12B
Case Study: A Wolf in Sheep's Clothing
Overview
Check Tampering Data from ACFE
Fraud Survey
Check Tampering Schemes
Forged Maker Schemes
Obtaining the Check
To Whom Is the Check Made Payable?
Forging the Signature
Miscoding Fraudulent Checks
Converting the Check
Forged Endorsement Schemes
Intercepting Checks Before Delivery
Converting the Stolen Check
Preventing and Detecting the Theft of Outgoing
Company Checks
Altered Payee Schemes
Altering Checks Prepared by Others: Inserting
a New Payee
Altering Checks Prepared by Others: "Tacking On"
Altering Checks Prepared by the Fraudster:
Erasable Ink
Altering Checks Prepared by the Fraudster:
Blank Checks
Converting Altered Checks
Preventing and Detecting the Alteration
of Company Checks
Concealed Check Schemes
Authorized Maker Schemes
Overriding Controls Through Intimidation
Poor Controls
Preventing and Detecting Check Tampering by
Authorized Makers
Concealing Check Tampering
The Fraudster Reconciling the Bank Statement
Case Study: What Are Friends For?
Re-Alteration of Checks
Falsifying the Disbursements Journal
Reissuing Intercepted Checks
Bogus Supporting Documents
Proactive Computer Audit Tests for Detecting Check
Tampering Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 159
Answers to Exercises W-13
CHAPTER
Case Study: Say Cheese!
Overview
Payroll Scheme Data from ACFE
Fraud Survey
Payroll Schemes
Ghost Employees
Adding the Ghost to the Payroll
Collecting Timekeeping Information
Issuing the Ghost's Paycheck
Delivery of the Paycheck
Preventing and Detecting Ghost Employee Schemes
Falsified Hours and Salary
Manually Prepared Timecards
Time Clocks and Other Automated Timekeeping
Systems
Rates of Pay
Preventing and Detecting Falsified Hours and
Salary Schemes
Commission Schemes
Fictitious Sales
Altered Sales
Detecting Commission Schemes
Case Study: The All-American Girl
Proactive Computer Audit Tests for Detecting
Payroll Fraud
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 185
Answers to Exercises W-17
CHAPTER
_
Case Study: Frequent Flier's Fraud Crashes
Overview
Expense Reimbursement Data from ACFE
Fraud Survey
Expense Reimbursement Schemes
Mischaracterized Expense Reimbursements
Preventing and Detecting Mischaracterized Expense
Reimbursements
Overstated Expense Reimbursements
Altered Receipts
Overpurchasing
Overstating Another Employee's Expenses
Orders to Overstate Expenses
Preventing and Detecting Overstated Expense
Reimbursement Schemes
Fictitious Expense Reimbursement Schemes
Producing Fictitious Receipts
Obtaining Blank Receipts from Vendors
Claiming the Expenses of Others
Preventing and Detecting Fictitious Expense
Reimbursement Schemes
Multiple Reimbursement Schemes
Preventing and Detecting Multiple Reimbursement
Schemes
Case Study: The Extravagant Salesman
Proactive Computer Audit Tests for Detecting Expense
Reimbursement Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 206
Answers to Exercises W-20
CHAPTERS REGISTER DISBURSEMENT SCHEMES
Case Study: Demotion Sets Fraud in Motion
Overview
Register Disbursement Data from ACFE
Fraud Survey
Register Disbursement Schemes
False Refunds
Fictitious Refunds
Overstated Refunds
Credit Card Refunds
Case Study: A Silent Crime
False Voids
Concealing Register Disbursements
Small Disbursements
Destroying Records
Preventing and Detecting Register Disbursement
Schemes
Proactive Computer Audit Tests for Detecting Register
Disbursement Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 225
Answers to Exercises W-23
CHAPTER
Case Study. Chipping Away at High-Tech Theft
Overview
Non-Cash Misappropriation Data from ACFE
2004
Non-Cash Misappropriation Schemes
Misuse of Non-Cash Assets
The Costs of Inventory Misuse
Unconcealed Larceny Schemes
The Fake Sale
Preventing and Detecting Larceny of
Non-Cash Assets
Asset Requisitions and Transfers
Purchasing and Receiving Schemes
Falsifying Incoming Shipments
False Shipments of Inventory and
Other Assets
Case Study: Hard Drives and Bad Luck
Other Schemes
Concealing Inventory Shrinkage
Altered Inventory Records
Fictitious Sales and Accounts Receivable
Write Off Inventory and Other Assets
Physical Padding
Preventing and Detecting Non-Cash Thefts That Are Concealed
by Fraudulent Support
Proactive Computer Audit Tests for Detecting
Non-Cash Misappropriations
Summary
Essential Terms
Review Questions
Discussion Issues
Endnote 251
Answers to Exercises W-26
CHAPTER
CaseStudy: Why Is This Furniture Falling Apart?
Overview
Corruption
Corruption Data
Fraud Survey
Bribery
Kickback Schemes
Bid-Rigging Schemes
Something of Value
Economic Extortion
Illegal Gratuities
Conflicts of Interest
Case Study: Working Double Duty
Purchasing Schemes 27B
Sales Schemes
Other Conflict of Interest Schemes
Preventing and Detecting Conflicts of Interest
Proactive Computer Audit Tests for Detecting
Corruption
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 285
Answers to Exercises W-29
CHAPTER
_
Fraud in Financial Statements
Who Commits Financial Statement Fraud?
Why Do People Commit Financial Statement Fraud?
How Do People Commit Financial Statement Fraud?
Conceptual Framework for Financial Reporting
Economic Entity
Going Concern
Monetary Unit
Periodicity
Historical Cost
Revenue Recognition
Matching
Full Disclosure
Cost-Benefit
Materiality
Industry Practice
Conservation
Relevance and Reliability
Comparability and Consistency
Responsibility for Financial Statements
Users of Financial Statements
Types of Financial Statements
ТпеЅаЉапеѕ-ОхкуАс^гООг
Public Company Accounting Oversight Board
Certification Obligations for CEOs and CFOs
New Standards for Audit Committee Independence
New Standards for Auditor Independence
Enhanced Financial Disclosure Requirements
Protections for Corporate Whistleblowers under
Sarbanes-Oxley
Enhanced Penalties for White-Collar Crime
Financial Statement Fraud Data from ACFE
Fraud Survey
Frequency and Cost
Types of Financial Statement Schemes
Detection of Financial Statement Schemes
Perpetrators of Financial Statement Schemes
Victims of Corruption Schemes
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 316
Answers to Exercises W-32
CHAPTEH
_
Case Study: That Way Lies Madness
Overview
Defining Financial Statement Fraud
Costs of Financial Statement Fraud
Methods of Financial Statement Fraud
Fictitious Revenues
Sales with Conditions
Pressures to Boost Revenues
Red Hags Associated with Fictitious Revenues
Timing Differences
Matching Revenues with Expenses
Premature Revenue Recognition
Long-Term
Channel Stuffing
Recording Expenses in the Wrong Period
Red Flags Associated with Timing Differences
Case Study: The Importance of Timing
Concealed Liabilities and Expenses
Liability/Expense Omissions
Capitalized Expenses
Expensing Capital Expenditures
Returns and Allowances and Warranties
Red Flags Associated with Concealed Liabilities
and Expenses
Improper Disclosures
Liability Omissions
Subsequent Events
Management Fraud
Related-Party Transactions
Accounting Changes
Red Flags Associated with Improper Disclosures
Improper Asset Valuation
Inventory Valuation
Accounts Receivable
Business Combinations
Fixed Assets
Red Flags Associated with Improper Asset
Valuation
Detection of Fraudulent Financial Statement Schemes
SAS
Statement Audit
SAS
Financial Statement Analysis
Deterrence of Financial Statement Fraud
Case Study: All on the Surface
Summary
Essential Terms
Review Questions
Discussion Issues
Answers to Exercises W-34
CHAPTER
Overview
Introductory Questions
Informational Questions
Closing Questions
Assessment Questions
Admission-Seeking Questions
Summary
Essential Terms
Review Questions
Discussion Issues
Answers to Exercises W-38
CHAPTER
_
Defining Abusive Conduct
Measuring the Level of Occupational Fraud and Abuse
The Human Factor
Understanding Fraud Deterrence
The Impact of Controls
The Perception of Detection
The Corporate Sentencing Guidelines
Definition of Corporate Sentencing
Vicarious or Imputed Liability
Requirements
The Ethical Connection
Concluding Thoughts 4S0<&
Summary
Essential Terms
Review Questions
Discussion Issues
Endnotes 407
Answers to Exercises W-40
APPENDIX
BIBLIOGRAPHY
INDEX |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Wells, Joseph T. |
author_GND | (DE-588)13240687X |
author_facet | Wells, Joseph T. |
author_role | aut |
author_sort | Wells, Joseph T. |
author_variant | j t w jt jtw |
building | Verbundindex |
bvnumber | BV022251996 |
callnumber-first | H - Social Science |
callnumber-label | HV6691 |
callnumber-raw | HV6691 |
callnumber-search | HV6691 |
callnumber-sort | HV 46691 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | QL 415 |
ctrlnum | (OCoLC)55147414 (DE-599)BVBBV022251996 |
dewey-full | 657/.458 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 657 - Accounting |
dewey-raw | 657/.458 |
dewey-search | 657/.458 |
dewey-sort | 3657 3458 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02242nam a2200577zc 4500</leader><controlfield tag="001">BV022251996</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070326 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070201s2005 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2004042248</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471517089</subfield><subfield code="c">cloth : acidfree paper</subfield><subfield code="9">0-471-51708-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55147414</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022251996</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6691</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">657/.458</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QL 415</subfield><subfield code="0">(DE-625)141716:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wells, Joseph T.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)13240687X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of fraud examination</subfield><subfield code="c">Joseph T. Wells</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">John Wiley</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 442 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">26 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Enquête</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraude fiscale</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraude</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Prévention</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Vérification interne</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Auditing, Internal</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Revision</subfield><subfield code="g">Wirtschaft</subfield><subfield code="0">(DE-588)4049674-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnungslegung</subfield><subfield code="0">(DE-588)4128343-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnungslegung</subfield><subfield code="0">(DE-588)4128343-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Revision</subfield><subfield code="g">Wirtschaft</subfield><subfield code="0">(DE-588)4049674-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/description/wiley042/2004042248.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/wiley041/2004042248.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015462775&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015462775</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV022251996 |
illustrated | Illustrated |
index_date | 2024-07-02T16:39:51Z |
indexdate | 2024-07-09T20:53:23Z |
institution | BVB |
isbn | 0471517089 |
language | English |
lccn | 2004042248 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015462775 |
oclc_num | 55147414 |
open_access_boolean | |
owner | DE-739 DE-522 |
owner_facet | DE-739 DE-522 |
physical | XVII, 442 S. Ill. 26 cm |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | John Wiley |
record_format | marc |
spelling | Wells, Joseph T. Verfasser (DE-588)13240687X aut Principles of fraud examination Joseph T. Wells Hoboken, N.J. John Wiley c2005 XVII, 442 S. Ill. 26 cm txt rdacontent n rdamedia nc rdacarrier Enquête rasuqam Fraude fiscale rasuqam Fraude rasuqam Prévention rasuqam Vérification interne rasuqam Fraud Fraud investigation Fraud Prevention Auditing, Internal Revision Wirtschaft (DE-588)4049674-0 gnd rswk-swf Rechnungslegung (DE-588)4128343-0 gnd rswk-swf Betrug (DE-588)4006249-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Betrug (DE-588)4006249-1 s Rechnungslegung (DE-588)4128343-0 s Revision Wirtschaft (DE-588)4049674-0 s 1\p DE-604 http://www.loc.gov/catdir/description/wiley042/2004042248.html Publisher description http://www.loc.gov/catdir/toc/wiley041/2004042248.html Table of contents Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015462775&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wells, Joseph T. Principles of fraud examination Enquête rasuqam Fraude fiscale rasuqam Fraude rasuqam Prévention rasuqam Vérification interne rasuqam Fraud Fraud investigation Fraud Prevention Auditing, Internal Revision Wirtschaft (DE-588)4049674-0 gnd Rechnungslegung (DE-588)4128343-0 gnd Betrug (DE-588)4006249-1 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4049674-0 (DE-588)4128343-0 (DE-588)4006249-1 (DE-588)4061963-1 |
title | Principles of fraud examination |
title_auth | Principles of fraud examination |
title_exact_search | Principles of fraud examination |
title_exact_search_txtP | Principles of fraud examination |
title_full | Principles of fraud examination Joseph T. Wells |
title_fullStr | Principles of fraud examination Joseph T. Wells |
title_full_unstemmed | Principles of fraud examination Joseph T. Wells |
title_short | Principles of fraud examination |
title_sort | principles of fraud examination |
topic | Enquête rasuqam Fraude fiscale rasuqam Fraude rasuqam Prévention rasuqam Vérification interne rasuqam Fraud Fraud investigation Fraud Prevention Auditing, Internal Revision Wirtschaft (DE-588)4049674-0 gnd Rechnungslegung (DE-588)4128343-0 gnd Betrug (DE-588)4006249-1 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Enquête Fraude fiscale Fraude Prévention Vérification interne Fraud Fraud investigation Fraud Prevention Auditing, Internal Revision Wirtschaft Rechnungslegung Betrug Unternehmen |
url | http://www.loc.gov/catdir/description/wiley042/2004042248.html http://www.loc.gov/catdir/toc/wiley041/2004042248.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015462775&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wellsjosepht principlesoffraudexamination |