SlideShare a Scribd company logo
1 of 447
Chapter 2: Theories about Business Government Relations
*
AgendaThree models of government-business relationsThe
shareholder modelThe strategic modelThe stakeholder
modelCrony Capitalism
*
Why Study Theories?Helpful in understanding complex social
realitiesSimplify and organize knowledge by describing patterns
and regularitiesOffer different perspectives regarding the
interactions between business and government.In practice they
define the strategies, operations, and outcomes of businesses
*
Three Models of Business and SocietyBusiness centered
approachesShareholder modelStrategic business
modelStakeholder modelNote that there are other important
“players” in society, in particular, religion
*
The Shareholder ModelEmphasizes economic principlesViews
business in isolationEmphasizes economic analysis and profit-
making for direct or indirect ownersEmphasizes the invisible
hand at the micro levelStresses the importance of dynamic
marketPromotes non-intervention by government Contends the
principle duty of government is to ensure that markets function
properly, and to correct market failures
*
Examples of shareholder modelEconomic freedom Index
(Heritage Foundation)Rule of lawLimited
governmentRegulatory efficiencyOpen markets(Top in 2015:
Hong Kong, Singapore, NZ, Australia, Switzerland, Canada,
Chile, Estonia, Ireland, and Mauritius)Domestic example:
Investment banks
Various critiques of the Shareholder ModelDownplays market
imperfections Ignores the need for government vigilance and
intervention to protect market failureIn practice, tends to ignore
the reality of business’ demands on government and the
advantages frequently provided by governmentToo much
emphasis on monetary and material gains
*
The Strategic Business ModelEmphasizes the practice of
business and successOne element: being highly competitiveMost
efficient and effective use of resources; Competing to win
through hard work and clevernessPlaying the game wellThe
model also emphasizes collaborationJoining other strong
competitors, networking, creating goodwill, focusing on
comparative strengthsPragmatically, it wants: Moderate taxes
and moderate regulations, stable policies, and protections in
global competitionTo pragmatically use/exploit governmental
resources
*
ExamplesCouncil on Competitiveness
Where America Needs to Be
To drive US productivity, buttress our leadership in world
markets, and raise the standard of living for all Americans, the
United States must:
• Immediately work to:
– Ensure lower cost, easy access to high quality education and
training for all Americans
– Maintain long-term federal investments in science and
technology leadership
– Reform and simplify the tax code to stimulate investment and
attract global capital to the United States
• Over the next ten years:
– Create at least 21 million jobs
– Reduce unemployment to 5 percent
– Reduce government debt by $4 trillion to ensure America’s
long term solvency
– Invest $2.2 trillion in infrastructure to maintain competitive
advantage
– Double exportsGlobal Competitiveness Index; Community
Banks
Critique of the Strategic Business Model
More balanced and realistic than the shareholder perspective,
but Unclear and inconsistentHow do you decide your values
when they compete and evolve?
*
The stakeholder modelThis perspective sees business as critical
to but nonetheless subordinate to society Stakeholders include
not only investors, partners and employees, but also customers,
the community, government, and other groups in society
affected by business (e.g., environmental groups)
*
The stakeholder modelCreates duties toward multiple
constituents of the corporationWhile profits are important and
one of the mainstays of business, they do not crowd out other
business and social values in the stakeholder viewA long-term
perspective encourages an attitude of sportsmanship in
competition, with the accent being on getting better rather than
simply winning in the short termPursuit of a good reputation for
pragmatic purposesRequires business management raise its gaze
above profits to see and respond to a spectrum of other values
*
Examples, company levelAnnual listing by Corporate
Responsibility
impact on the environment,
climate change behaviors,
avoidance of human rights abuse,
quality employee relations,
open corporate governance,
community-based philanthropy, and
financial integrity
Development banks
Examples, at the country level
Three stakeholder perspectives: quality of life, environmental
concern, equity
Human Development Index (UN) where US is very high
Environmental Performance Index where US is upper middle
Wealth distribution: Gini Coefficient (from .25 to .70 with low
fraction as the most equal); US in the lower middle
The stakeholder modelCritics to the stakeholder
modelUnrealistic assessment of power relationships between the
corporation and other entitiesToo vague a guideline to
substitute for the yardstick of profits Not clear who or what is a
legitimate stakeholder
*
Comparison of three
modelsModelsShareholderStrategicStakeholder Role of societal
interestsComplete separation of financial and societal
interestsMix of financial interestsFinancial interests should
never override social goodIntegration of private and public
sectorSectors as separate as possible; regulation or financial
incentives for business as little as possibleSectors work together
and business benefit from government support Business sector
should not manipulate the public sector for its selfish endsSize
of governmentGovernment as small as possible; private sector
models are preferred Government being large enough to ensure
basic servicesBusiness having self-regulation and strong
professional normsKey valuesShort-term wealth creation, self-
reliance, dynamic destruction by market; win-lose
philosophyLong-term wealth creation, synergy of sectors and
selective partnerships, pragmatic use/exploitation of
government, do good when it is profitable ; change is both
strategic/rational; game theory Wealth creation never at expense
of some stakeholders; inclusion of stakeholders ; win-win
strategies; concern for the world
*
When the Ideal Models Become Corrupted: Crony
CapitalismCrony CapitalismClose relationship between business
and government leading to favored treatment to individuals,
firms, or industries at the expense of the public
Spectrum of Crony Capitalism
1. Strongman modelDominance of leader and his/her group (i.e.,
dictatorships or quasi-dictatorships)Vague laws; laws instituted
abruptly by dominant figureExample:Russia under Putin
*
Spectrum of Crony Capitalism
2. Fused political-bureaucratic elite modelDominance by family
or small group of large asset owners (rather than strongman or
despot)Rampant bribery and corruption Example:Second
red/official generations in China
*
Spectrum of Crony Capitalism
3. Economic elite dominance modelDominance by economic
elites because of the power of money; often more subtleMarket
distortion and unhealthy imbalances in civil society
(Source: http://seanmarske.wordpress.com/2012/07/10/whos-
running-the-show-introducing-the-criminal-elite/)
*
Economic elite dominance modelPowerful financial interests
can corrupt the society throughAbility to change critical
administrative rulemakingExerting influence via control of
mediaIncreased opportunity to be elected officialsBuying access
based on economic support of candidatesAbility to influence the
electorate with threatsTo some degree in all developed capitalist
countries; Issue: when does elite dominance become
overweening?Example: US.
ConclusionThe three “pure” types of business-government
model ungird many of our public discussions. However, the
elements are often muddled and so we talk past one
another.Exaggerating for clarity, they emphasize business
efficiency, business pragmatism, and business
ethicsGovernment itself has elements that emphasize these
elements too!Securities and Exchange CommissionUS Trade
RepresentativeUS Department of Health and Human Services
Crony capitalism is a distortion of “pure” typesIt includes
various subtypes:StrongmanFused political-bureaucratic
eliteEconomic elite-dominance modelWhile crony capitalism
tendencies can never be fully eliminated, they can be reduced
by wise policies in order to retain the trust and respect of
society for both government and business in creating a fair
society and a healthy market economy.
ISSUES IN ACCOUNTING EDUCATION American Accounting
Association
Vol. 33, No. 2 DOI: 10.2308/iace-51973
May 2018
pp. 19–34
Fraud Risk Brainstorming at Tesla Motors
Megan F. Hess
Washington & Lee University
Lindsay M. Andiola
Virginia Commonwealth University
ABSTRACT: This instructional case offers students the
opportunity to explore the fraud risk assessment process
and participate in a simulated fraud brainstorming session as
required by AS 2401 (formerly SAS 99) for financial
statement audits. Drawing on publicly available information
about Tesla, Inc. (formerly Tesla Motors), the
revolutionary company behind the popular Model S all-electric
vehicle, the case materials guide students through
multiple learning objectives. These objectives include learning
how to: (1) recognize the factors that contribute to
financial statement fraud risk; (2) identify and evaluate the
likelihood and severity of fraud risks; (3) analyze the ways
that fraud risks can lead to material misstatements in the
financial statements; (4) understand the purpose of and
how to conduct a fraud brainstorming session; and (5) develop
audit procedures that respond to assessed fraud
risks. In a post-case learning assessment, students reported
significant improvement in their knowledge,
comprehension, and application of these learning objectives.
Students also indicated that they enjoyed learning
about these concepts in the context of this popular company.
This case has both an individual and a group
component, and it is designed for use in an auditing or forensic
accounting course at either the undergraduate or the
graduate level.
Keywords: fraud risk factors; fraud triangle; brainstorming
session; fraud risk matrix; AS 2401; SAS 99.
INTRODUCTION
O
ne of the most important skills needed by accountants today is
the ability to analyze and detect fraud risks (Carpenter
2007; Center for Audit Quality [CAQ] 2010;
PricewaterhouseCoopers [PwC] 2015). The Association of
Certified
Fraud Examiners (ACFE 2016) estimates that the typical
organization loses 5 percent of its revenues every year to
fraud. Beyond these losses, financial statement frauds also have
far-reaching negative consequences on investors, employees,
suppliers, and other stakeholders of the corporation. Because of
the importance of fraud detection to the integrity of our
markets, auditing standards (i.e., Public Company Accounting
Oversight Board [PCAOB] 2016a, 2016b, AS 2401; American
Institute of Certified Public Accountants [AICPA] 2006, AU
Section 316; International Federation of Accountants [IFAC]
2008, ISA 240) require that accountants fulfill their
responsibility to obtain reasonable assurance that the financial
statements
they audit are free of material misstatement due to error or
fraud. In particular, Auditing Standard (AS) 2401 (formerly
Statement on Auditing Standards No. 99), Consideration of
Fraud in a Financial Statement Audit, requires that fraud risk
brainstorming sessions be incorporated into every audit
engagement. These sessions are designed to increase the
probability
that auditors will detect intentional misstatements and to help
set the right tone for professional skepticism and heightened
sensitivity to fraud risk throughout the engagement (Ramos
2003).
YOUR TASK
This case requires you to imagine that you have been asked to
participate in a fraud risk brainstorming session as part of
the planning procedures for the 2016 financial statement audit
of Tesla Motors. This case has two parts. In Part I, you will
read
We thank Allen D. Blay (associate editor) and two anonymous
reviewers for their valuable input and guidance. We also thank
Mary Durkin, Jared Eustler,
Gary Sullivan, and Kim Westermann, as well as participants at
the 2016 AAA Forensic Section Midyear Meeting for their
feedback and assistance.
Finally, we thank Anthony Williams for his research assistance.
Supplemental materials can be accessed by clicking the links in
Appendix B.
Editor’s note: Accepted by Valaria P. Vendrzyk.
Submitted: March 2016
Accepted: November 2017
Published Online: November 2017
19
background information on Tesla Motors, learn how the concept
of the ‘‘fraud triangle’’ is used to identify fraud risk factors,
and work to complete the Part I case requirement questions
designed to help you identify some of the financial statement
fraud
risks associated with this company.
In Part II, you will learn how to conduct a fraud risk
brainstorming session and how to adapt your planned
procedures to
respond to identified fraud risks. After reading Part II, you will
work as part of an audit team to conduct a fraud risk
brainstorming session. During this session, your team will be
responsible for completing a fraud risk matrix and writing up a
memo for the audit file that documents the results of your fraud
risk assessment and identifies how your team believes the
nature, timing, and extent of the audit procedures should be
altered to respond to these identified risks.
It is important to note that as of September 2017, Tesla Motors
has not been accused of financial statement fraud.
Nevertheless, you and your team should resist the natural
inclination to presume that management is honest, and exercise
professional skepticism in evaluating fraud risks at this
company. Auditing standards remind us that we should conduct
the
engagement with a mindset that recognizes the possibility that a
material misstatement due to fraud could be present, regardless
of any past experience with the entity and regardless of the
auditor’s belief about management’s honesty and integrity
(PCAOB
2016a).
PART I
Tesla Motors Case Background
Founding and History of Tesla Motors
Tesla Motors (NASDAQ: TSLA) was founded in 2003 by a
group of engineers in Silicon Valley with the vision of
accelerating the world’s transition to sustainable transport. To
that end, Tesla Motors has created ‘‘cars without
compromise’’—
that is, all-electric vehicles that offer all of the torque, power,
and style of high-end automobiles with none of the emissions.
The company’s mission is ‘‘to accelerate the advent of
sustainable transport by bringing compelling mass market
electric cars to
market as soon as possible’’ (Tesla Motors 2015). Tesla’s first
release was the Roadster in 2008, which offered 0 to 60 mph
acceleration in 3.7 seconds and a range of 245 miles per charge
of its lithium-ion battery. In 2012, Tesla launched the Model S,
a four-door sedan that was named Motor Trend’s 2013 Car of
the Year. At the beginning of 2016, with more than 107,000
vehicles on the road worldwide, Tesla’s product line expanded
to include the Model X, a crossover vehicle that entered volume
production at the end of 2015, and the Model 3, a lower-priced
vehicle with an expected release in 2017. However, Tesla does
not limit its vision to only automobiles. The company is
described as ‘‘a technology and design company with a focus on
energy innovation’’ (Tesla Motors 2016b).
Tesla has revolutionized the automobile industry in many ways.
In addition to proving that all-electric vehicles can
perform as well, if not better than, gas-powered vehicles, Tesla
has challenged the conventional approach of how vehicles
are sold. Rather than selling through dealership franchises,
Tesla sells and services its vehicles through its own network,
including acceptance of online orders. To help establish the
value of the Tesla brand and encourage early adopters to buy
their vehicles, Tesla offers ‘‘resale value guarantees’’ to
customers. Under this program, customers have the option of
selling
their vehicle back to Tesla Motors during the period of 36 to 39
months after delivery for a pre-determined resale value
(Tesla Motors 2016b).
Due to widespread publicity and generally positive reviews of
the vehicles, Tesla has enjoyed greater demand for its
vehicles than it can fulfill. As such, the company has been
collecting deposits from customers at the time they place an
order for
a vehicle and, in some locations, at certain additional
milestones up to the point of delivery. In addition, a closer look
at Tesla’s
income statement reveals that Tesla sells much more than just
cars. Tesla also earns revenue from related services, including
access to its Supercharging network and software updates on the
vehicles. Tesla also earns revenue from the sale of regulatory
credits from energy tax credits and from the sale of components
to other manufacturers. Finally, Tesla earns revenue from
‘‘Tesla Energy,’’ a division of the company offering battery-
powered energy solutions for home, businesses, and utilities
(Tesla
Motors 2016b). Tesla’s income statement and balance sheet for
the past three years are presented in Exhibit 1 and 2,
respectively.
Tesla launched an initial public offering in June 2010 that
raised $226 million in equity. At the time, the company
employed less than 1,000 employees and had less than $150
million in revenue. The company has since experienced rapid
growth. During the period 2011–2015, revenues have grown
more than 1,000 percent from $204 million in 2011 to $4.1
billion
in 2015. After several years of trading between $22 and $33 per
share, Tesla’s surprise announcement of quarterly profits in
2013 drove the stock into the triple-digits (Taylor 2013). In
March 2016, the company enjoyed a market capitalization of
almost $30 billion and traded at about $200 per share. Tesla
Motors stock performance for the period 01/01/2014 to
03/31/2016
is provided in Exhibit 3.
20 Hess and Andiola
Issues in Accounting Education
Volume 33, Number 2, 2018
Tesla’s Leadership
Tesla Motors is led by CEO and co-founder Elon Musk. Mr.
Musk made his fortune as a co-founder of PayPal, which was
acquired by eBay in 2002 for $1.4 billion. He is also the CEO of
Space Exploration Technologies Corp., better known as
SpaceX, a company that aims to develop the world’s first
private spacecraft for commercial space travel, and he is
chairman of
the board of SolarCity Corporation, a company that aims to
expand the availability of clean, affordable energy. A self-made
man and serial entrepreneur, Mr. Musk’s innovations and
charisma have earned him the reputation as a ‘‘real-life Iron
Man’’ in
reference to the Marvel Comics super hero (Smith 2014).
Mr. Musk is known for his bold vision and his even bolder
proclamations. In a live interview in 2009, he called a New
York
Times journalist that wrote a critical review of Tesla an ‘‘idiot’’
(https://www.youtube.com/watch?v¼rwDU–NPqZ0; see also,
http://www.businessinsider.com/elon-musk-calls-times-writer-a-
huge-douchebag-and-an-idiot-video-2009-4). In an early 2015
earnings call with analysts, Mr. Musk also declared that he
thought Tesla’s market capitalization could rival Apple Inc.’s
$700
billion in the next ten years, which would be more than the
market capitalizations of Ford Motor Company, General Motors
Company (GM), Honda Motor Company, Ltd., Toyota Motor
Corporation, BMW, and Mercedes-Benz combined. Mr. Musk
made this declaration in the face of production delays,
weakening market conditions, and falling gas prices, which has
traditionally made the sale of electric cars more difficult.
Tesla’s future prospects appear to depend on Mr. Musk’s ability
to achieve feats that other carmakers would never dream
of. As an incentive for him to make his bold vision a reality,
Tesla’s Board of Directors granted 5,274,901 stock options to
Mr.
Musk that will ‘‘vest’’ or become available to him to exercise
based on his ability to lead the company toward meeting
specific
production and performance goals, including the successful
completion of the Model X and Model 3 prototypes and
reaching
100,000 units in total vehicle production (Tesla Motors 2016b).
In addition to overseeing Mr. Musk’s plans and providing the
company with guidance, Tesla’s Board of Directors is tasked
with protecting the interests of Tesla’s stockholders, including
the responsibility for risk oversight. Following best practices
for
corporate governance, Tesla’s guidelines suggest that the
majority of Tesla’s directors should be ‘‘outsiders,’’ meaning
non-
company employees, and it has a standing Audit Committee to
which both internal and external auditors report directly (Tesla
Motors 2016a). Some have raised concerns, however, about
whether Tesla’s board is as independent as it appears. CtW
EXHIBIT 1
Tesla Motors Income Statement
Fraud Risk Brainstorming at Tesla Motors 21
Issues in Accounting Education
Volume 33, Number 2, 2018
http://www.businessinsider.com/elon-musk-calls-times-writer-a-
huge-douchebag-and-an-idiot-video-4
http://www.businessinsider.com/elon-musk-calls-times-writer-a-
huge-douchebag-and-an-idiot-video-4
https://www.youtube.com/watch?v=rwDU--NPqZ0
Investment Group, which works with union-based pension funds
and holds 200,000 shares of Tesla, recently called on the
company to separate the chairman of the board and CEO roles,
both of which Elon Musk now holds, and to prohibit immediate
family members from serving on the board (Sage 2016). Mr.
Musk’s brother, Kimbal Musk, currently serves on the boards of
both Tesla and SpaceX. Board member Brad Buss is also a
former employee of SolarCity, Mr. Musk’s related company.
Tesla’s Employee Culture
Tesla’s culture has been described as ‘‘high risk, high reward,’’
and the company prides itself on operating like an internet
startup (Fehrenbacher 2015). Employees regularly work long
hours and the atmosphere has been described as ‘‘grueling.’’
Nevertheless, many employees have enjoyed big payouts
because of their association with Tesla. In mid-2015, Jerome
Guillen,
then Tesla’s Vice President of Sales and Services, exercised
options and sold shares netting him $4 million. Guillen has
subsequently taken a leave of absence from Tesla. In addition,
Tesla’s longtime CFO, Deepak Ahuja, has recently retired from
Tesla after making millions by exercising his stock options in
2015. While the environment may be one of high pressure for
employees, many may enjoy working in the innovative and
mission-driven environment Tesla promotes. As an example of
Tesla’s commitment to transparency and the advancement of
energy alternatives, Tesla made the radical announcement that it
would not initiate patent lawsuits against anyone who, in good
faith, wanted to use its technology (Tesla Motors 2015).
EXHIBIT 2
Tesla Motors Balance Sheet
22 Hess and Andiola
Issues in Accounting Education
Volume 33, Number 2, 2018
Challenges for Tesla and Its Future
Despite the company’s rapid growth and popularity, Tesla has
also experienced a number of setbacks. The company has
struggled to reach desired production levels, which has resulted
in lengthy delays for customers. Competitors, such as BMW,
Nissan Motor Company Ltd., and GM, have been developing
all-electric alternatives and boast much higher production and
distribution capabilities than Tesla. Exhibit 4 presents a peer
comparison of Tesla’s financials with current competitors. In
addition, analysts have raised questions about Tesla’s reliance
on emissions credits to shore up losses and the company’s
exposure to lawsuits and lobbying by dealership unions to block
states from allowing direct automotive sales to consumers
(Taylor 2013).
Moreover, while Tesla’s Model S achieved an overall five-star
safety rating by the National Highway Traffic Safety
Administration, questions about the safety of Tesla’s new
technology have continued to plague the company. In November
2013, a class action lawsuit was filed against Tesla and Mr.
Musk, alleging that he had made false and/or misleading
representations with respect to the safety of the Model S. The
case was dismissed in September 2014 by the trial court, but the
plaintiff’s appeal is still pending as of early 2016 (Tesla Motors
2016b).
Tesla has big plans for the future of its business. With the
popularity of Tesla’s vehicles continuing to climb, the company
has begun to expand its operations. Among these expansions,
the company has invested in an assembly facility in The
Netherlands and a specialized production plant in Lathrop,
California. Tesla has also entered into strategic partnerships
with
companies like Panasonic Corporation to focus on reducing the
costs of lithium-ion battery packs. In addition, Tesla recently
announced the beginning of construction on its multi-billion-
dollar investment in a ‘‘Gigafactory’’ in Nevada that will
facilitate
production of more affordable electric vehicles and battery-
powered energy alternatives (Tesla Motors 2015).
According to the company’s 2015 annual report, Tesla plans to
continue expanding stores and its service infrastructure
worldwide. The company will invest $1.5 billion in capital
expenditures in equipment to support cell production at the
Gigafactory, to begin installation of Model 3 vehicle production
machinery, to open about 80 retail locations and service
centers, and to energize about 300 new Supercharger locations
(Tesla Motors 2016b). These bold expansion plans could put
Tesla at the center of an energy revolution, or they could cause
the company to implode under the weight of significant debt
levels and even greater expectations.
EXHIBIT 3
Tesla Motors (TSLA) Stock Performance
(01/01/2014–03/31/2016)
Source: Stock chart from Yahoo! Finance.
Fraud Risk Brainstorming at Tesla Motors 23
Issues in Accounting Education
Volume 33, Number 2, 2018
Using the Fraud Triangle to Identify Fraud Risk Factors
Auditing standards define fraud as an intentional act that results
in a material misstatement in the financial reports (PCAOB
2016a). Research shows that fraud is more likely when three
conditions are present: incentives or pressures, opportunities,
and
attitudes or rationalizations. These three conditions are known
collectively as the ‘‘fraud triangle’’ (Cressey 1953). Auditors
use
the fraud triangle as a tool to help identify areas of risk during
the fraud risk brainstorming process. These risks are referred to
as fraud risk factors. The next section describes each of the
three conditions in more detail and provides examples from
recent
research of how each condition is linked with fraud.
The first leg of the fraud triangle is incentives or pressures.
This condition is present whenever management and/or
employees have incentives or are under pressures to commit
fraud (Arens, Beasley, and Alvin 2010). Research shows that
when
management compensation is tied to earnings and/or stock
performance (e.g., bonuses, stock options), the likelihood of
fraud is
higher (Healy and Wahlen 1999; Fields, Lys, and Vincent
2001). Other incentives than greed can also contribute to fraud
risk.
A recent study finds that CFOs may become involved in
deceptive accounting practices not for personal financial gain,
but
rather to appease their CEOs and protect their jobs (Feng, Ge,
Luo, and Shevlin 2011). Performance pressures also cause
managers and employees to engage in fraud. A recent survey
finds that 64 percent of employees engage in unethical behavior
because they feel pressure to ‘‘do whatever it takes’’ to meet
business targets (KPMG 2013). Changes in the external
environment, such as declines in customer demand, increased
competition, or new regulations can threaten the financial
stability of a firm and generate pressure to ‘‘cook the books’’
and create the appearance of success while the firm attempts to
adapt to the environmental changes. Paradoxically, both high-
performing firms (e.g., MacLean 2008; Mishina, Dykes, Block,
and Pollock 2010) and low-performing firms (e.g., Harris and
Bromiley 2007; Zhang, Bartol, Smith, Pfarrer, and Khanin
2008)
have higher risks of financial statement fraud because both
situations put pressure on executives to meet or exceed last
period’s
earnings. Managers at poorly performing firms may also feel
pressure to manipulate earnings or inflate asset balances in
order
to meet debt covenant requirements and avoid defaulting on
loans.
EXHIBIT 4
Peer Comparison
24 Hess and Andiola
Issues in Accounting Education
Volume 33, Number 2, 2018
The second leg of the fraud triangle is opportunities. This
condition is present whenever circumstances allow management
or employees to commit and conceal fraudulent behavior (Arens
et al. 2010). Many different factors create opportunities for
fraud. The use of significant accounting estimates creates
opportunities for earnings management and fraud, especially in
the
area of reserves, allowances, and depreciation (PCAOB 2016c).
Difficulty in verifying estimates and valuations also creates
opportunities for manipulation, particularly in areas such as
intangible assets and Level 3 fair market valuations (PCAOB
2016d). In addition, fraud risks are higher when internal
controls are weak or ineffective, when company policies are
ambiguous or enforced unevenly, or when oversight of financial
reporting is inadequate; all of these circumstances make it
easier to commit and conceal fraudulent activity. Finally,
transactions and financial relationships with related parties can
create
opportunities to commit and conceal fraud (PCAOB 2016b).
The last leg of the fraud triangle is attitudes or rationalizations.
This condition is present whenever management or
employees exhibit an attitude, character, or set of ethical values
that would enable committing a dishonest act (i.e., ‘‘bad
apples’’) or whenever the environment imposes sufficient
pressure on management or employees to cause good people to
rationalize engaging in bad behavior (i.e., ‘‘bad barrels’’)
(Treviño and Youngblood 1990; Arens et al. 2010). Auditors
should
be alert to the risk of bad apples for situations in which
management has a history of being dishonest and violating laws
and
regulations, or a reputation for making overly aggressive or
unrealistic forecasts. In these circumstances, auditors should be
skeptical of management’s integrity and the veracity of their
statements. Auditors also need to identify circumstances in
which
good people may be tempted to make bad choices. Under the
right pressure(s), managers and employees can rationalize
fraudulent activity as acceptable or even necessary, and thus
disengage from the feelings of guilt and regret that normally
prevent people from behaving dishonestly. For example,
management might rationalize financial statement fraud if the
act
prevents the loss of jobs or the closure of the business.
Employees can also rationalize stealing from a company as
‘‘getting
what they are due’’ if they feel underpaid or underappreciated.
Finally, managers might rationalize committing fraud if they
suspect that competitors are doing the same.
Detecting rationalization risks can be difficult, but auditors
should be alert for potential indicators such as the use of
euphemistic language, social norms in the company and/or
industry that treat dishonesty as a part of doing business, and
the
tone at the top set by the company’s CEO. A CEO who
explicitly values ethics and honesty and emphasizes not only
results,
but also the just means used to reach those results can foster
ethical choices, whereas a CEO who is perceived as unethical or
even ethically neutral can foster an environment in which fraud
is more easily rationalized (Treviño, Hartman, and Brown
2000).
By examining fraud risk factors using the three legs of the fraud
triangle, auditors may develop more accurate fraud risk
assessments and become better prepared to alter the nature,
timing, and extent of their audit procedures to respond to these
identified risks.
Part I Case Requirements: Identifying Fraud Risk Factors
You should work individually to complete responses to each of
the assigned case requirement questions using the
information on Tesla Motors provided above and, where noted,
in the case supplements, available for download in Appendix B.
Your responses should be completed before proceeding to Part
II.
1. Fraud risks related to Tesla’s culture, leadership, and
governance structure.
a. How would you describe the ‘‘tone at the top’’ set by Tesla’s
leader, Elon Musk? How do Mr. Musk’s leadership
style and his ‘‘tone at the top’’ contribute to possible fraud risk
at Tesla Motors?
b. How would you describe the company’s culture? How might
this culture create pressures and rationalizations for
fraud?
c. Review Tesla’s Code of Business Conduct and Ethics (see
Appendix B for the link to ‘‘Tesla’s Code of Business
Conduct and Ethics’’). How might any potential weaknesses in
this code contribute to fraud risk at this company?
d. Describe some possible concerns regarding Tesla’s board of
directors. How might these concerns create
opportunities and rationalizations for fraud?
2. Fraud risks related to Tesla’s incentive structures and stock
performance.
a. To what extent are executives and employees incentivized
with shares and stock options (see Appendix B for the
link to ‘‘Tesla’s 2015 Annual Report,’’ Item 7 Management’s
Discussion and Analysis (MD&A) and Item 8
Financial Statements and Supplementary Data section, Note
10)? How do these pay structures create pressures/
incentives for fraud?
b. Review Tesla’s stock performance over the last two years
(refer to Exhibit 3). What fraud pressures are created by
this stock performance?
3. Fraud risks related to revenue recognition at Tesla.
a. What does Tesla sell and how does the company account for
revenue, accounts receivable, and COGS (see ‘‘Tesla’s
Fraud Risk Brainstorming at Tesla Motors 25
Issues in Accounting Education
Volume 33, Number 2, 2018
2015 Annual Report,’’ Item 1 Business, Item 7 MD&A, and
Item 8 Financial Statements and Supplementary Data,
Note 2)?
b. How might these revenue-recognition practices create
opportunities, incentives, and/or rationalizations for fraud?
4. Fraud risks related to Tesla’s business and operating
conditions.
a. Review the business risks disclosed by the company (see
Tesla’s 2015 Annual Report, Item 1A Risk Factors and
Item 8 Financial Statements and Supplementary Data, Note 2
and Note 13). How might some of these business risks
from the external environment also create fraud risks within
Tesla?
b. What fraud risks are posed by Tesla’s expansion plans and
the company’s ability to operate as a going concern (see
‘‘Tesla’s 2015 Annual Report,’’ refer to Item 1A)?
c. What related-party transactions support Tesla’s financial
performance (see ‘‘Tesla’s 2015 Annual Report,’’ Item 1
Manufacturing)? How might these transactions create
opportunities for fraud?
5. Fraud risks indicated by the results of preliminary analytical
procedures.
a. What fraud risks may be indicated by the year-to-year
comparisons of Tesla’s financial statements (refer to Exhibits
1 and 2)?
b. How does the company perform relative to its peers (refer to
Exhibit 4)? Do these ratios and trends seem
reasonable?
PART II
Fraud Brainstorming Session Best Practices
Brainstorming refers to an idea-generation process in which
multiple participants share and explore their thoughts on a
particular topic. The brainstorming approach is advantageous in
that the process can help participants identify and synergize
multiple ideas and perspectives in a relatively short amount of
time. However, the process is not always effective;
brainstorming sessions may fail to deliver quality results for a
number of reasons. Participants may consciously or
unconsciously engage in ‘‘social loafing’’ and hesitate to share
their ideas because they think their efforts are either less
important or less identifiable (Latané, Williams, and Harkins
1979). Research shows that inexperienced auditors may be
especially prone to social loafing when working in a group
setting, which may cause them to produce significantly fewer
and
less well-developed mental simulations of possible fraud
schemes (Chen, Trotman, and Zhou 2015). Fraud brainstorming
sessions may also suffer process losses from ‘‘production
blocking,’’ a phenomenon whereby participants lose an idea
while
waiting their turn and listening to others (Diehl and Stroebe
1987). Brainstorming sessions can also deteriorate due to
‘‘groupthink,’’ a phenomenon whereby a group coalesces on a
single perspective rather than considering multiple ideas or
points of view (Beasley and Jenkins 2003).
To minimize these obstacles to effective fraud risk
brainstorming, groups should use content facilitation
techniques, such
as prompts, to stimulate idea generation (Lynch, Murthy, and
Engle 2009). The case requirements you completed in Part I of
this case are examples of the types of prompts used by auditors
in actual fraud risk brainstorming sessions. To minimize the
risks of groupthink and production blocking, auditors commonly
work individually to develop a list of fraud risks prior to
joining the brainstorming session, and spend an average of five
hours on preparing for each session (Dennis and Johnstone
2016). Brainstorming sessions can also be enhanced by
following best practices (see Brazel, Carpenter, and Jenkins
[2010] for
a recent field study of fraud risk brainstorming activities in
audit firms). These best practices include a brainstorming
session
that:
a. is led by a partner or forensic specialist;
b. includes an IT audit specialist;
c. is held early in the audit process (pre-planning or audit-
planning stage);
d. includes extensive discussion about how management might
perpetrate fraud;
e. includes extensive discussion about audit responses to fraud
risk;
f. includes significant contributions from managers on the audit
team; and
g. includes significant contributions from the audit partner.
Responding to Assessed Fraud Risks
In addition to using the concept of the fraud triangle as a tool to
identify fraud risks, auditors may work in their fraud risk
brainstorming sessions to create a fraud risk matrix to help them
better identify and respond to assessed fraud risks. A fraud risk
matrix is a tool that helps auditors connect identified fraud risk
factors with possible fraud schemes and the account balances
that may be affected. The fraud risk matrix allows auditors to
make a preliminary assessment of the likelihood and
significance
26 Hess and Andiola
Issues in Accounting Education
Volume 33, Number 2, 2018
of such a scheme occurring within their client’s company. This
then allows them to adapt the nature, timing, and extent of their
planned audit procedures to respond to the more likely and/or
more significant identified fraud risks. Exhibit 5 provides an
example of a fraud risk matrix.
Auditing standards note that determining the nature, timing, and
extent of planned audit procedures is a matter of
professional judgment. When the likelihood and/or significance
of material misstatement due to fraud or error is high, the
auditor should respond by planning audit procedures that will
increase both the quality—that is, the reliability and
relevance—
and the quantity of the evidence collected (AICPA 2006). For
example, when the likelihood of a particular fraud scheme is
low
and the significance is low (e.g., employees being paid for
unworked overtime when little to no overtime was reported in
the
year), the audit team may decide that inquiries of associated
personnel are sufficient to determine whether evidence of a
material misstatement exists for the account balances affected
by such a scheme. When the likelihood of a particular fraud
scheme is high, but the significance is low (e.g., employees
submitting false travel expense reimbursement claims for
amounts
not requiring a receipt), the audit team may respond with
additional procedures beyond inquiries of personnel to include
both
tests of controls and analytical procedures, and determine
whether additional substantive procedures are needed as this
evidence
is evaluated. However, when the potential significance of a
fraud scheme is high even when the likelihood may be low (e.g.,
members of management colluding to overstate revenue),
auditors should plan for more substantive testing. Substantive
testing
can include observing and/or re-performing significant
transactions, recalculating balances, obtaining third-party
confirmations,
and making physical inspections of assets and records. In
response to increased risks of fraud, the timing of testing may
also be
adjusted to perform more testing near the end of a period rather
than at an interim date.
Once the fraud risk brainstorming session is complete, a
member of the team is designated to document the results of the
session, which include: the identified fraud risks, the potential
fraud schemes and the balances that would be affected, the
group’s assessment of the likelihood and significance of such
schemes occurring, and the plan for adapting the nature, timing,
EXHIBIT 5
Sample Fraud Risk Matrix
Fraud Risk Brainstorming at Tesla Motors 27
Issues in Accounting Education
Volume 33, Number 2, 2018
and/or extent of audit procedures to respond to this fraud risk
assessment. This documentation may take the form of a
memorandum that is added to the audit file.
Part II Case Requirements: Conducting a Fraud Brainstorming
Session
In Part II of this case, you will work in a group to simulate an
audit team that is conducting a fraud risk brainstorming
session for Tesla Motors. Your instructor will provide you with
further instructions regarding the composition of your audit
team and the timing of this brainstorming session. The
following case requirements will help guide your activities in
this
simulated brainstorming session.
1. Conducting the fraud brainstorming session.
a. Share and discuss your individual responses to each of the
case requirement questions from Part I.
b. Work together to develop a fraud risk matrix (see Exhibit 5
for an example) that identifies the three fraud risk factors
that your team believes present the greatest concern to the audit
based on your team’s assessment of their likelihood
and significance. Focus on those fraud risk areas that pose the
greatest potential threat for a material misstatement in
the financials.
c. Determine how the nature, timing, and extent of the audit
procedures should be altered to respond to these identified
risks.
2. Documenting the results of the fraud brainstorming session.
Document your conclusions from this brainstorming session in a
memorandum for the audit file. A template for your
reference is included in Appendix A. Your documentation
should include:
a. The date, the attendees, and the purpose of the session, as
well as how long the session lasted.
b. The three most concerning fraud risks at Tesla, the potential
fraud schemes and account balances that would be
affected, and the group’s assessment of the likelihood and
significance of such schemes occurring in a fraud risk matrix
(from 1b above).
c. The team’s consensus (or lack thereof, if applicable)
regarding the overall risk of fraud at Tesla Motors.
d. The team’s plan for adapting the nature, timing, and/or extent
of audit procedures to respond to this fraud risk
assessment.
REFERENCES
American Institute of Certified Public Accountants (AICPA).
2006. Consideration of Fraud in a Financial Statement Audit.
AU. Section
316. New York, NY: AICPA.
Arens, I. R. J., M. S. Beasley III, and A. Alvin. 2010. Auditing
and Assurance Services: An Integrated Approach-13/E.
Englewood Cliffs,
NJ: Pearson Prentice Hall.
Association of Certified Fraud Examiners (ACFE). 2016. Report
to the Nations on Occupational Fraud and Abuse. Available at:
http://
www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf
Beasley, M. S., and J. G. Jenkins. 2003. A primer for
brainstorming fraud risks. Journal of Accountancy 196 (6): 32.
Brazel, J. F., T. D. Carpenter, and J. G. Jenkins. 2010.
Auditors’ use of brainstorming in the consideration of fraud:
Reports from the field.
The Accounting Review 85 (4): 1273–1301.
https://doi.org/10.2308/accr.2010.85.4.1273
Carpenter, T. D. 2007. Audit team brainstorming, fraud risk
identification, and fraud risk assessment: Implications of SAS
No. 99. The
Accounting Review 82 (5): 1119–1140.
https://doi.org/10.2308/accr.2007.82.5.1119
Center for Audit Quality (CAQ). 2010. Report on Deterring and
Detecting Financial Reporting Fraud: A Plan for Action.
Available at:
http://www.thecaq.org/deterring-and-detecting-financial-
reporting-fraud
Chen, C. X., K. T. Trotman, and F. Zhou. 2015. Nominal versus
interacting electronic fraud brainstorming in hierarchical audit
teams. The
Accounting Review 90 (1): 175–198.
https://doi.org/10.2308/accr-50855
Cressey, D. R. 1953. Other People’s Money; A Study of the
Social Psychology of Embezzlement. Ann Arbor, MI: Free
Press: University of
Michigan.
Dennis, S. A., and K. M. Johnstone. 2016. A field survey of
contemporary brainstorming practices. Accounting Horizons 30
(4): 449–472.
https://doi.org/10.2308/acch-51503
Diehl, M., and W. Stroebe. 1987. Productivity loss in
brainstorming groups: Toward the solution of a riddle. Journal
of Personality and
Social Psychology 53 (3): 497–509.
https://doi.org/10.1037/0022-3514.53.3.497
Fehrenbacher, K. 2015. Tesla’s startup culture has big risks and
rewards. Fortune.com. Available at:
http://fortune.com/2015/08/21/teslas-
startup-culture-musk/
Feng, M., W. Ge, S. Luo, and T. Shevlin. 2011. Why do CFOs
become involved in material accounting manipulations? Journal
of
Accounting and Economics 51 (1-2): 21–36.
https://doi.org/10.1016/j.jacceco.2010.09.005
28 Hess and Andiola
Issues in Accounting Education
Volume 33, Number 2, 2018
https://doi.org/10.2308/accr.2010.85.4.1273
https://doi.org/10.2308/accr.2007.82.5.1119
http://www.thecaq.org/deterring-and-detecting-financial-
reporting-fraud
https://doi.org/10.2308/accr-50855
https://doi.org/10.2308/acch-51503
https://doi.org/10.1037/0022-3514.53.3.497
http://fortune.com/2015/08/21/teslas-startup-culture-musk/
http://fortune.com/2015/08/21/teslas-startup-culture-musk/
https://doi.org/10.1016/j.jacceco.2010.09.005
Fields, T. D., T. Z. Lys, and L. Vincent. 2001. Empirical
research on accounting choice. Journal of Accounting and
Economics 31 (1-3):
255–307. https://doi.org/10.1016/S0165-4101(01)00028-3
Harris, J., and P. Bromiley. 2007. Incentives to cheat: The
influence of executive compensation and firm performance on
financial
misrepresentation. Organization Science 18 (3): 350–367.
https://doi.org/10.1287/orsc.1060.0241
Healy, P. M., and J. M. Wahlen. 1999. A review of the earnings
management literature and its implications for standard setting.
Accounting Horizons 13 (4): 365–383.
https://doi.org/10.2308/acch.1999.13.4.365
International Federation of Accountants (IFAC). 2008. The
Auditor’s Responsibilities Relating to Fraud in an Audit of
Financial
Statements. IAS 240. Available at:
http://www.ifac.org/system/files/downloads/a012-2010-iaasb-
handbook-isa-240.pdf
KPMG. 2013. Integrity Survey 2013. Available at:
http://www.kpmg-institutes.com/institutes/advisory-
institute/articles/2013/07/integrity-
survey-2013.html
Latané, B., K. Williams, and S. Harkins. 1979. Many hands
make light the work: The causes and consequences of social
loafing. Journal
of Personality and Social Psychology 37 (6): 822–832.
https://doi.org/10.1037/0022-3514.37.6.822
Lynch, A. L., U. S. Murthy, and T. J. Engle. 2009. Fraud
brainstorming using computer-mediated communication: The
effects of
brainstorming technique and facilitation. The Accounting
Review 84 (4): 1209–1232.
https://doi.org/10.2308/accr.2009.84.4.1209
MacLean, T. L. 2008. Framing and organizational misconduct:
A symbolic interactionist study. Journal of Business Ethics 78
(1–2): 3–
16. https://doi.org/10.1007/s10551-006-9324-x
Mishina, Y., B. J. Dykes, E. S. Block, and T. G. Pollock. 2010.
Why ‘‘good’’ firms do bad things: The effects of high
aspirations, high
expectations, and prominence on the incidence of corporate
illegality. Academy of Management Journal 53 (4): 701–722.
https://
doi.org/10.5465/AMJ.2010.52814578
PricewaterhouseCoopers (PwC). 2015. Data Driven: What
Students Need to Succeed in a Rapidly Changing Business
World. Available
at: https://www.pwc.com/us/en/faculty-resource/assets/pwc-
data-driven-paper-feb2015.pdf
Public Company Accounting Oversight Board (PCAOB). 2016a.
Consideration of Fraud in a Financial Statement Audit. AS
2401.
Washington, DC: PCAOB.
Public Company Accounting Oversight Board (PCAOB). 2016b.
Related Parties. AS 2410. Washington, DC: PCAOB.
Public Company Accounting Oversight Board (PCAOB). 2016c.
Auditing Accounting Estimates. AS 2501. Washington, DC:
PCAOB.
Public Company Accounting Oversight Board (PCAOB). 2016d.
Auditing Fair Value Measurements and Disclosures. AS 2502.
Washington, DC: PCAOB.
Ramos, M. 2003. Auditors’ responsibility for fraud detection.
Journal of Accountancy 195 (1): 28–36.
Sage, A. 2016. Tesla investor group wants more independent
board, cites Musk ties. Reuters (June 28). Available at:
http://www.reuters.
com/article/us-solarcity-m-a-tesla-idUSKCN0ZE2ZL
Smith, A. 2014. Who is Elon Musk? Tech Billionaire, SpaceX
Cowboy, Tesla Pioneer—and Real Life Iron Man. The
Telegraph (January
4). Available at:
http://www.telegraph.co.uk/technology/news/10544247/Meet-
tech-billionaire-and-real-life-Iron-Man-Elon-Musk.
html
Taylor, A., III. 2013. 9 Questions for Tesla’s Elon Musk.
Fortune (June 12). Available at:
http://fortune.com/2013/06/12/9-questions-for-
teslas-elon-musk/
Telsa Motors. 2015. About Tesla. Palo Alto, CA: Tesla Motors;
Available at: https://www.teslamotors.com/about
Telsa Motors. 2016a. Corporate Governance Guidelines. Palo
Alto, CA: Tesla Motors. Available at:
http://ir.tesla.com/corporate-
governance-document.cfm?DocumentID¼14836
Telsa Motors. 2016b. Tesla Motors Inc 2015 Annual Report.
Palo Alto, CA: Tesla Motors. Available at:
http://files.shareholder.com/
downloads/ABEA-4CW8X0/1651466307x0xS1564590-16-
13195/1318605/filing.pdf
Treviño, L. K., and S. A. Youngblood. 1990. Bad apples in bad
barrels: A causal analysis of ethical decision-making behavior.
The
Journal of Applied Psychology 75 (4): 378–385.
https://doi.org/10.1037/0021-9010.75.4.378
Treviño, L. K., L. P. Hartman, and M. Brown. 2000. Moral
person and moral manager: How executives develop a reputation
for ethical
leadership. California Management Review 42 (4): 128–142.
https://doi.org/10.2307/41166057
Zhang, X., K. M. Bartol, K. G. Smith, M. D. Pfarrer, and D. M.
Khanin. 2008. CEOs on the edge: Earnings manipulation and
stock-based
incentive misalignment. Academy of Management Journal 51
(2): 241–258. https://doi.org/10.5465/AMJ.2008.31767230
APPENDIX A
Memo Template to Document the Results of a Fraud
Brainstorming Session
Date: [DATE OF SESSION]
Participants: [NAME OF ALL SESSION PARTICIPANTS]
Length of Session: [TIME IN HOURS_MINUTES]
Purpose of the Session: [FILL IN]
Fraud Risk Brainstorming at Tesla Motors 29
Issues in Accounting Education
Volume 33, Number 2, 2018
https://doi.org/10.1016/S0165-4101(01)00028-3
https://doi.org/10.1287/orsc.1060.0241
https://doi.org/10.2308/acch.1999.13.4.365
http://www.ifac.org/system/files/downloads/a012-2010-iaasb-
handbook-isa-240.pdf
http://www.kpmg-institutes.com/institutes/advisory-
institute/articles/2013/07/integrity-survey-2013.html
http://www.kpmg-institutes.com/institutes/advisory-
institute/articles/2013/07/integrity-survey-2013.html
https://doi.org/10.1037/0022-3514.37.6.822
https://doi.org/10.2308/accr.2009.84.4.1209
https://doi.org/10.1007/s10551-006-9324-x
https://doi.org/10.5465/AMJ.2010.52814578
https://doi.org/10.5465/AMJ.2010.52814578
https://www.pwc.com/us/en/faculty-resource/assets/pwc-data-
driven-paper-feb2015.pdf
http://www.reuters.com/article/us-solarcity-m-a-tesla-
idUSKCN0ZE2ZL
http://www.reuters.com/article/us-solarcity-m-a-tesla-
idUSKCN0ZE2ZL
http://www.telegraph.co.uk/technology/news/10544247/Meet-
tech-billionaire-and-real-life-Iron-Man-Elon-Musk.html
http://www.telegraph.co.uk/technology/news/10544247/Meet-
tech-billionaire-and-real-life-Iron-Man-Elon-Musk.html
http://fortune.com/2013/06/12/9-questions-for-teslas-elon-musk/
http://fortune.com/2013/06/12/9-questions-for-teslas-elon-musk/
https://www.teslamotors.com/about
http://ir.tesla.com/corporate-governance-
document.cfm?DocumentID=14836
http://ir.tesla.com/corporate-governance-
document.cfm?DocumentID=14836
http://ir.tesla.com/corporate-governance-
document.cfm?DocumentID=14836
http://files.shareholder.com/downloads/ABEA-
4CW8X0/1651466307x0xS1564590-16-
13195/1318605/filing.pdf
http://files.shareholder.com/downloads/ABEA-
4CW8X0/1651466307x0xS1564590-16-
13195/1318605/filing.pdf
https://doi.org/10.1037/0021-9010.75.4.378
https://doi.org/10.2307/41166057
https://doi.org/10.5465/AMJ.2008.31767230
Part A—Assessment of Fraud Risks
[INSERT FRAUD MATRIX HERE]
Part B—Overall Fraud Risk Assessment
As a group, how would you rate the overall potential of a risk of
material misstatement due to fraud at this client (e.g., low
risk, moderate risk, or high risk)? Provide justification for your
assessment and note any dissension about this assessment
among the team members, if applicable.
Part C—Planning the Nature, Timing, and Extent of Procedures
Based on the identified fraud risk factors and the level of
assessed fraud at this client, how would your group modify the
nature, timing, and/or extent of the planned audit procedures?
Discuss at least three audit procedures that should be performed
on this audit in response to the fraud risk factors identified
above. Your group should try to be as specific as possible (i.e.,
the
account(s) that you would focus on, the procedure(s) you may
perform, and when you would perform the procedure).
1. [FILL IN]
2. [FILL IN]
3. [FILL IN]
APPENDIX B
iace-51973_ Tesla’s Code of Business Conduct and Ethics:
http://dx.doi.org/10.2308/iace-51973.s01
iace-51973_ Tesla’s 2015 Annual Report:
http://dx.doi.org/10.2308/iace-51973.s02
30 Hess and Andiola
Issues in Accounting Education
Volume 33, Number 2, 2018
http://dx.doi.org/10.2308/iace-51973.s01
http://dx.doi.org/10.2308/iace-51973.s02
CASE LEARNING OBJECTIVES AND IMPLEMENTATION
GUIDANCE
This instructional case involves identifying fraud risk factors at
a public company and conducting a fraud risk
brainstorming session, consistent with the guidance under AS
2401, Consideration of Fraud in a Financial Statement Audit.
We see the instructional value of this case as two-fold. Not only
does the case incorporate important auditing and forensic
concepts like assessing fraud risk and applying the fraud
triangle, but also the case gives students first-hand experience
with
conducting a fraud risk brainstorming session in a team
environment and documenting this process. While there are a
number
of cases published in the last 15 years that focus on the issue of
identifying fraud risk factors and responding to fraud risks
(e.g.,
Agoglia, Brown, and Hanno 2003; Ballou and Mueller 2005;
Owhoso and Weickgenannt 2010; Gifford and Howe 2011;
Rufus
and Hahn 2011; Dickins and Reisch 2012; Dee, Durtschi, and
Mindak 2014), we are not aware of any instructional cases that
combine fraud risk assessment with guidance on how to conduct
and document a fraud risk brainstorming session. Students
also indicated that they found this case to be realistic and
enjoyed learning about these concepts in the context of this
popular
company.
Learning Objectives
There are five learning objectives for this case:
1. To recognize the factors that contribute to financial statement
fraud risk (Part I).
2. To identify and evaluate the likelihood and severity of fraud
risks for a particular organization (Part I).
3. To analyze the ways that fraud risks can lead to material
misstatements in the financial statements (Parts I and II).
4. To understand the purpose of and how to conduct a fraud
brainstorming session as a team (Part II).
5. To develop audit procedures that respond to assessed fraud
risks (Part II).
Implementation Guidance
This case is designed for use in either undergraduate- or
graduate-level courses that feature an emphasis on fraud risk
assessments or assurance (e.g., auditing, fraud, forensic
accounting). This case offers students the opportunity to explore
the
fraud risk assessment process and to participate in a simulated
fraud brainstorming session. To be most effective and more
closely simulate an actual fraud brainstorming session, we
recommend that Part I of the case be completed by students
individually as a take-home assignment. Instructors will need to
provide students with the case document in order for them to
complete Part I. Students should turn in Part I as an individual
assignment (Deliverable 1), and then use their responses from
Part I as inputs for the brainstorming session in Part II. Students
report spending approximately 3.5 hours to complete all of the
case requirement questions in Part I. To minimize the time
required, instructors may choose to divide the case requirements
among the students (e.g., half of the students complete case
Requirements 1 and 2 (six questions) and the other half
complete
case Requirements 3 through 5 (seven questions). Before
moving to Part II, we encourage instructors to dedicate some
class
time (10–15 minutes) to review student responses to Part I and
explain the tasks and deliverables associated with Part II. More
guidance on discussing the key concepts of this case is provided
in the Teaching Notes.
For Part II of the case, instructors will need to group students
into small audit teams (‘‘investigation teams’’ if using in a
forensic accounting class) to hold a fraud risk brainstorming
session. The instructor will also need to provide students with
guidance on when they should hold their brainstorming session
and how long they should spend brainstorming. We
recommend that students dedicate no more than one hour to the
brainstorming session and reserve one to two hours for
documenting their results (Deliverable 2). We suggest that Part
II be completed as a take-home group assignment, but
instructors also could complete Part II of the case as an in-class
activity.
Following the completion and documentation of the team
brainstorming sessions, we recommend that instructors lead a
class discussion of the key learning objectives from the case
(about 30 minutes). Guidance on these topics and solutions are
available in the Teaching Notes. This discussion should
highlight some of the challenges of (1) assessing fraud risk
factors, (2)
conducting effective brainstorming sessions, and (3) linking
risk factors to appropriate audit responses. Through this
discussion, instructors can elicit observations from the students
on the effectiveness of their brainstorming session, as well as
specific examples of the fraud risk factors documented in their
fraud risk matrices and the suggested audit procedures to reduce
these risks.
Customizing the Case
The usage of this case can vary somewhat depending on the
specific student audience. The instructor can tailor the
difficulty of the case and the focus of the case depending on the
knowledge and skill level of the students, as well as the focus
Fraud Risk Brainstorming at Tesla Motors 31
Issues in Accounting Education
Volume 33, Number 2, 2018
of the class (i.e., auditing versus fraud). To increase the
difficulty of the case, instructors can implement one or more of
the
following ideas:
� Assign additional readings from the academic literature
related to financial statement fraud risks (e.g., MacLean 2008;
Mishina, Dykes, Block, and Pollock 2010) or fraud
brainstorming (e.g., Brazel, Carpenter, and Jenkins 2010;
Dennis
and Johnstone 2016). As part of the class discussion of the key
learning objectives, the instructor can facilitate a
dialogue on the findings taken from the academic research
literature.
� Assign additional analytical procedures for Part I, such as the
calculation of Beneish’s (1997) ‘‘M-Score’’ for Tesla.
Instructors may find Wells’ (2001) article ‘‘Irrational Ratios’’
helpful in guiding students’ efforts to calculate and
interpret Beneish’s M-Score.
� Increase the number of fraud risks documented in the fraud
risk matrix and the number of audit procedures described in
the memorandum of the fraud brainstorming session.
To simplify the case, instructors can implement one or more of
the following ideas:
� Allow students to work in groups of two to complete Part I.
� Remove the case requirement in Part II that requires students
to identify the nature, timing, and extent of audit
procedures.
� Conduct Part II as a class activity with the entire class
participating in the session as one team.
Evidence of Efficacy
To assess the effectiveness of the case, we tested it in five
undergraduate audit classes (185 students) and two graduate
fraud classes (39 students) at three public and two private
universities (four independent instructors and one author). Pre-
and
post-test surveys were Institutional Review Board (IRB)
approved, were formatted similarly to those in Worrell (2010)
and
Dow, Watson, and Shea (2013), and were administered using
comparable procedures to avoid any potential demand effects.
The pre-test survey was administered a few days prior to
assigning the case. Students were informed that the survey was
to
assess their knowledge and comfort level with specific course-
related topics, that it was entirely voluntary, and that all
responses would remain anonymous. The post-test survey was
administered on the submission date of the completed
Deliverable 2.
The questions used in the survey, the pre-test and post-test
means, and significance levels are presented in Table 1, Panel
A. In addition, Table 1, Panel B presents the results of several
additional questions asked after completion of the case. To
assess
the case’s impact on students’ knowledge, we asked students six
questions before and after case completion that dealt with their
understanding of the key learning objectives of the case.1 Table
1, Panel A shows that the case significantly increased students’
knowledge of fraud risk factors and fraud brainstorming
sessions (p , 0.001, two-tailed in both). In addition, the case
made
students more comfortable with applying the fraud triangle,
creating a fraud risk matrix, adapting audit procedures, and
conducting a fraud brainstorming session (p , 0.001, two-tailed
for all).
In addition, Table 1, Panel B indicates that students perceived
the case to be a realistic scenario (77.0 percent agree or
strongly agree), that was interesting (75.8 percent agree or
strongly agree), and provided a positive learning experience
(78.2
percent agree or strongly agree). In addition, students felt that
the case required them to think critically (80.6 percent agree or
strongly agree) and apply their professional skepticism (78.2
percent agree or strongly agree). We also asked students to
provide verbal feedback about the case. An overwhelming
number of responses indicated that students liked that the case
used a
real, recognizable, and current company, with real data and
information. For example, one student commented that ‘‘the
issues
Tesla faces are realistic issues that auditors have to be able to
analyze and assess for any company.’’ In addition, several
students pointed out that they liked conducting the actual
brainstorming session to be able to pool their ideas and better
understand how the session would work in practice. Thus, the
case appears to provide a realistic learning environment to help
students prepare for procedures they will be asked to do in audit
practice.
TEACHING NOTES
Teaching Notes are available only to non-student-member
subscribers to Issues in Accounting Education through the
American Accounting Association’s electronic publications
system at http://aaapubs.org/. Non-student-member subscribers
should use their usernames and passwords for entry into the
system where the Teaching Notes can be reviewed and printed.
Please do not make the Teaching Notes available to students or
post them on websites.
1 We investigated whether the responses differed by level (i.e.,
undergraduate, graduate), but results were quantitatively
similar. Therefore, the combined
results are presented in Table 1.
32 Hess and Andiola
Issues in Accounting Education
Volume 33, Number 2, 2018
http://aaapubs.org/
If you are a non-student-member of AAA with a subscription to
Issues in Accounting Education and have any trouble
accessing this material, then please contact the AAA
headquarters office at [email protected] or (941) 921-7747.
REFERENCES
Agoglia, C. P., K. F. Brown, and D. M. Hanno. 2003. Dickinson
Technologies, Inc.: Assessing control environment and fraud
risk. Issues
in Accounting Education 18 (1): 71–78.
https://doi.org/10.2308/iace.2003.18.1.71
Ballou, B., and J. M. Mueller. 2005. Helecom communications:
Considering fraud risk on an engagement before and after
analyzing a key
business process. Issues in Accounting Education 20 (1): 99–
118. https://doi.org/10.2308/iace.2005.20.1.99
TABLE 1
Student Learning Perceptions
Panel A: Questions Asked Before and After Case Completion
Survey Item
Pre-Case
Mean
(SD)
Post-Case
Mean
(SD) t-statistic
1. Rate your level of knowledge of identifying fraud risk factors
of an organization. 3.34 4.70 10.7***
(1.26) (1.11)
2. Rate how comfortable you feel applying the fraud triangle to
identify fraud risk factors. 3.66 4.98 10.0***
(1.35) (1.09)
3. Rate your level of knowledge of the purpose of fraud
brainstorming sessions. 3.34 5.10 12.8***
(1.38) (1.16)
4. Rate how comfortable you feel creating a fraud risk matrix.
2.64 4.52 14.8***
(1.20) (1.17)
5. Rate how comfortable you feel adapting audit procedures to
respond to assessed fraud risks. 3.23 4.41 9.3***
(1.24) (1.13)
6. Rate how comfortable you feel conducting a fraud
brainstorming session. 3.08 4.91 14.0***
(1.32) (1.09)
Panel B: Questions Asked After Case Completion
Survey Item
Strongly
Disagree
1
Disagree
2
Somewhat
Disagree
3
Neutral
4
Somewhat
Agree
5
Agree
6
Strongly
Agree
7
Mean
(SD)
This case represents a realistic scenario. 0.0% 0.0% 1.2% 4.8%
17.0% 39.4% 37.6% 6.07
(0) (0) (2) (8) (28) (65) (62) (0.92)
The case encouraged me to think critically
about the factors that contribute to fraud
risk.
0.0% 0.6% 0.6% 4.3% 13.9% 49.1% 31.5% 6.04
(0) (1) (1) (7) (23) (81) (52) (0.91)
The case encouraged me to apply
professional skepticism.
0.0% 0.0% 0.0% 4.8% 17.0% 46.7% 31.5% 6.05
(0) (0) (0) (8) (28) (77) (52) (0.83)
I found the case interesting. 0.0% 0.0% 4.8% 3.6% 15.8%
46.7% 29.1% 5.92
(0) (0) (8) (6) (26) (77) (48) (1.02)
The case was a positive learning experience. 0.0% 0.6% 2.4%
6.7% 12.1% 45.5% 32.7% 5.98
(0) (1) (4) (11) (20) (75) (54) (1.02)
***Signifies p , 0.001.
Panel A presents results of a pre-case and post-case comparison
of a set of six questions. Responses were provided on a series of
seven-point scales with 1
labeled ‘‘low knowledge’’ and ‘‘highly uncomfortable’’ and 7
labeled ‘‘high knowledge’’ and ‘‘highly comfortable’’ (for
questions 1 and 3, and 2, 4–6,
respectively). The pre-case data includes 185 (146
undergraduate and 39 graduate) students and the post-case data
includes 165 (132 undergraduate and 33
graduate) students.
Panel B presents results of five additional post-case questions.
Responses were provided on a series of seven-point scales with
1 labeled ‘‘strongly
disagree’’ and 7 labeled ‘‘strongly agree.’’
Fraud Risk Brainstorming at Tesla Motors 33
Issues in Accounting Education
Volume 33, Number 2, 2018
mailto:[email protected]
https://doi.org/10.2308/iace.2003.18.1.71
https://doi.org/10.2308/iace.2005.20.1.99
Beneish, M. D. 1997. Detecting GAAP violation: Implications
for assessing earnings management among firms with extreme
financial
performance. Journal of Accounting and Public Policy 16 (3):
271–309. https://doi.org/10.1016/S0278-4254(97)00023-9
Brazel, J. F., T. D. Carpenter, and J. G. Jenkins. 2010.
Auditors’ use of brainstorming in the consideration of fraud:
Reports from the field.
The Accounting Review 85 (4): 1273–1301.
https://doi.org/10.2308/accr.2010.85.4.1273
Dee, C., C. Durtschi, and M. P. Mindak. 2014. Grand Teton
Candy Company: Connecting the dots in a fraud investigation.
Issues in
Accounting Education 29 (3): 443–458.
https://doi.org/10.2308/iace-50763
Dennis, S. A., and K. M. Johnstone. 2016. A field survey of
contemporary brainstorming practices. Accounting Horizons 30
(4): 449–472.
https://doi.org/10.2308/acch-51503
Dickins, D., and J. T. Reisch. 2012. Enhancing auditors’ ability
to identify opportunities to commit fraud: Instructional resource
cases.
Issues in Accounting Education 27 (4): 1153–1169.
https://doi.org/10.2308/iace-50178
Dow, K. E., M. W. Watson, and V. J. Shea. 2013.
Understanding the links between audit risks and audit steps: The
case of procurement
cards. Issues in Accounting Education 28 (4): 913–921.
https://doi.org/10.2308/iace-50508
Gifford, R. H., and H. Howe. 2011. Relating operational and
financial factors to assess risk and identify fraud in an
operational setting.
Issues in Accounting Education 26 (2): 361–376.
https://doi.org/10.2308/iace-10021
MacLean, T. L. 2008. Framing and organizational misconduct:
A symbolic interactionist study. Journal of Business Ethics 78
(1–2): 3–
16. https://doi.org/10.1007/s10551-006-9324-x
Mishina, Y., B. J. Dykes, E. S. Block, and T. G. Pollock. 2010.
Why ‘‘good’’ firms do bad things: The effects of high
aspirations, high
expectations, and prominence on the incidence of corporate
illegality. Academy of Management Journal 53 (4): 701–722.
https://
doi.org/10.5465/AMJ.2010.52814578
Owhoso, V., and A. Weickgenannt. 2010. Vinand Petroleum,
Inc.: Initial audit engagement and fraud risk case for a
specialized industry.
Issues in Accounting Education 25 (2): 331–346.
https://doi.org/10.2308/iace.2010.25.2.331
Rufus, R. J., and W. Hahn. 2011. Mountain State Sporting
Goods: A case of fraud? A case study in fraud examination.
Issues in
Accounting Education 26 (1): 201–217.
https://doi.org/10.2308/iace.2011.26.1.201
Wells, J. T. 2001. Irrational ratios. Journal of Accountancy 192
(2): 80–83.
Worrell, J. L. 2010. Blazer communications: A procurement
audit simulation. Issues in Accounting Education 25 (3): 527–
546. https://
doi.org/10.2308/iace.2010.25.3.527
34 Hess and Andiola
Issues in Accounting Education
Volume 33, Number 2, 2018
https://doi.org/10.1016/S0278-4254(97)00023-9
https://doi.org/10.2308/accr.2010.85.4.1273
https://doi.org/10.2308/iace-50763
https://doi.org/10.2308/acch-51503
https://doi.org/10.2308/iace-50178
https://doi.org/10.2308/iace-50508
https://doi.org/10.2308/iace-10021
https://doi.org/10.1007/s10551-006-9324-x
https://doi.org/10.5465/AMJ.2010.52814578
https://doi.org/10.5465/AMJ.2010.52814578
https://doi.org/10.2308/iace.2010.25.2.331
https://doi.org/10.2308/iace.2011.26.1.201
https://doi.org/10.2308/iace.2010.25.3.527
https://doi.org/10.2308/iace.2010.25.3.527
Code of Business Conduct and Ethics
(Adopted by the Board of Directors on May 20, 2010)
Introduction
This Code of Business Conduct and Ethics covers a wide range
of business practices and procedures. It does not cover every
issue that may arise, but it sets out basic principles to guide all
employees, directors and officers of Tesla Motors, Inc, (the
"Company"). All of our employees, directors and officers must
conduct themselves accordingly and seek to avoid even the
appearance of improper behavior. The Code should also be
provided to and followed by the Company's agents and
representatives, including consultants.
If a law conflicts with a policy in this Code, you must comply
with the law. If you have any questions about these conflicts,
you
should ask your supervisor how to handle the situation.
Those who violate the standards in this Code will be subject to
disciplinary action, up to and including termination of
employment. If you are in a situation which you believe may
violate or lead to a violation of this Code, follow the guidelines
described in Section 14 of this Code.
1. Compliance with Laws, Rules and Regulations
Obeying the law, both in letter and in spirit, is the foundation
on which this Company's ethical standards are built. All
employees
must respect and obey the laws of the cities, states and
countries in which we operate. Although not all employees are
expected to know the details of these laws, it is important to
know enough to determine when to seek advice from
supervisors,
managers or other appropriate personnel.
If requested, the Company will hold information and training
sessions to promote compliance with laws, rules and
regulations,
including insider-trading laws.
2. Conflicts of Interest
A "conflict of interest" exists when a person's private interest
interferes, or appears to interfere, in any way with the interests
of
the Company. A conflict situation can arise when an employee,
officer or director takes actions or has interests that may make
it difficult to perform his or her Company work objectively and
effectively. Conflicts of interest may also arise when an
employee,
officer or director, or members of his or her family, receives
improper personal benefits as a result of his or her position in
the
Company. Loans to, or guarantees of obligations of, employees
and their family members may create conflicts of interest.
It is almost always a conflict of interest for a Company
employee to work simultaneously for a competitor, customer or
supplier.
You are not allowed to work for a competitor as a consultant or
board member. The best policy is to avoid any direct or indirect
business connection with our customers, suppliers or
competitors, except on our behalf. Conflicts of interest are
prohibited as a
matter of Company policy, except under guidelines approved by
the Board of Directors. Conflicts of interest may not always be
clear-cut, so if you have a question, you should consult with
higher levels of management or the Company's Legal
Department.
Any employee, officer or director who becomes aware of a
conflict or potential conflict should bring it to the attention of a
supervisor, manager or other appropriate personnel or consult
the procedures described in Section 14 of this Code.
3. Insider Trading
Employees who have access to confidential information are not
permitted to use or share that information for stock trading
purposes or for any other purpose except the conduct of our
business. All non-public information about the Company should
be considered confidential information. To use non-public
information for personal financial benefit or to "tip" others who
might
make an investment decision on the basis of this information is
not only unethical but also illegal. In order to assist with
compliance with laws against insider trading, the Company has
adopted a specific policy governing employees' trading in
securities of the Company. This policy has been distributed to
every employee. If you have any questions, please consult the
Company's Legal Department.
4. Corporate Opportunities
Employees, officers and directors are prohibited from taking for
themselves personally opportunities that are discovered
through the use of corporate property, information or position
without the consent of the Board of Directors. No employee
may
use corporate property, information, or position for improper
personal gain, and no employee may compete with the Company
directly or indirectly. Employees, officers and directors owe a
duty to the Company to advance its legitimate interests when
the
opportunity to do so arises.
5. Competition and Fair Dealing
We seek to outperform our competition fairly and honestly.
Stealing proprietary information, possessing trade secret
information that was obtained without the owner's consent, or
inducing such disclosures by past or present employees of other
companies is prohibited. Each employee, officer and director
should endeavor to respect the rights of and deal fairly with the
Company's customers, suppliers, competitors and employees.
No employee, officer or director should take unfair advantage
of
anyone through manipulation, concealment, abuse of privileged
information, misrepresentation of material facts, or any other
intentional unfair-dealing practice.
The purpose of business entertainment and gifts in a commercial
setting is to create good will and sound working relationships,
not to gain unfair advantage with customers. No gift or
entertainment should ever be offered, given, provided or
accepted by
any Company employee, family member of an employee or
agent unless it: (1) is not a cash gift, (2) is consistent with
customary business practices, (3) is not excessive in value, (4)
cannot be construed as a bribe or payoff and (5) does not
violate any laws or regulations. Please discuss with your
supervisor any gifts or proposed gifts which you are not certain
are
appropriate.
6. Discrimination and Harassment
The diversity of the Company's employees is a tremendous
asset. We are firmly committed to providing equal opportunity
in all
aspects of employment and will not tolerate any illegal
discrimination or harassment of any kind. Examples include
derogatory
comments based on racial or ethnic characteristics and
unwelcome sexual advances.
7. Health and Safety
The Company strives to provide each employee with a safe and
healthy work environment. Each employee has responsibility
for maintaining a safe and healthy workplace for all employees
by following safety and health rules and practices and reporting
accidents, injuries and unsafe equipment, practices or
conditions.
Violence and threatening behavior are not permitted. Employees
should report to work in condition to perform their duties, free
from the influence of illegal drugs or alcohol. The use of illegal
drugs in the workplace will not be tolerated.
8. Record-Keeping
The Company requires honest and accurate recording and
reporting of information in order to make responsible business
decisions. For example, only the true and actual number of
hours worked should be reported.
Many employees regularly use business expense accounts,
which must be documented and recorded accurately. If you are
not
sure whether a certain expense is legitimate, ask your
supervisor or your controller.
All of the Company's books, records, accounts and financial
statements must be maintained in reasonable detail, must
appropriately reflect the Company's transactions and must
conform both to applicable legal requirements and to the
Company's system of internal controls. Unrecorded or "off the
books" funds or assets should not be maintained unless
permitted by applicable law or regulation.
Business records and communications often become public, and
we should avoid exaggeration, derogatory remarks,
guesswork, or inappropriate characterizations of people and
companies that can be misunderstood. This applies equally to e-
mail, internal memos, and formal reports. Records should
always be retained or destroyed according to the Company's
record
retention policies. In accordance with those policies, in the
event of litigation or governmental investigation please consult
the
Company's Legal Department.
9. Confidentiality
Employees, officers and directors must maintain the
confidentiality of confidential information entrusted to them by
the
Company or its customers, except when disclosure is authorized
by the Legal Department or required by laws or regulations.
Confidential information includes all non-public information
that might be of use to competitors, or harmful to the Company
or its
customers, if disclosed. It also includes information that
suppliers and customers have entrusted to us. The obligation to
preserve confidential information continues even after
employment ends. In connection with this obligation, every
employee
should have executed a confidentiality agreement when he or
she began his or her employment with the Company.
10. Protection and Proper Use of Company Assets
All employees, officers and directors should endeavor to protect
the Company's assets and ensure their efficient use. Theft,
carelessness, and waste have a direct impact on the Company's
profitability. Any suspected incident of fraud or theft should be
immediately reported for investigation. Company equipment
should not be used for non-Company business, though
incidental
personal use may be permitted.
The obligation of employees to protect the Company's assets
includes its proprietary information. Proprietary information
includes intellectual property such as trade secrets, patents,
trademarks, and copyrights, as well as business, marketing and
service plans, engineering and manufacturing ideas, designs,
databases, records, salary information and any unpublished
financial data and reports. Unauthorized use or distribution of
this information would violate Company policy. It could also be
illegal and result in civil or even criminal penalties.
11. Payments to Government Personnel
The U.S. Foreign Corrupt Practices Act prohibits giving
anything of value, directly or indirectly, to officials of foreign
governments or foreign political candidates in order to obtain or
retain business. It is strictly prohibited to make illegal payments
to government officials of any country.
In addition, the U.S. government has a number of laws and
regulations regarding business gratuities which may be accepted
by
U.S. government personnel. The promise, offer or delivery to an
official or employee of the U.S. government of a gift, favor or
other gratuity in violation of these rules would not only violate
Company policy but could also be a criminal offense. State and
local governments, as well as foreign governments, may have
similar rules. The Company's Legal Department can provide
guidance to you in this area.
12. Waivers of the Code of Business Conduct and Ethics
Any waiver of this Code for executive officers or directors may
be made only by the Board of Directors and will be promptly
disclosed, along with the reasons for the waiver, as required by
law or stock exchange regulation.
13. Reporting any Illegal or Unethical Behavior
Employees are encouraged to talk to supervisors, managers or
other appropriate personnel about observed illegal or unethical
behavior and when in doubt about the best course of action in a
particular situation. It is the policy of the Company not to allow
retaliation for reports of misconduct by others made in good
faith by employees. Employees are expected to cooperate in
internal investigations of misconduct.
Any employee may submit a good faith concern regarding
questionable accounting or auditing matters without fear of
dismissal
or retaliation of any kind.
14. Compliance Procedures
We must all work to ensure prompt and consistent action against
violations of this Code. However, in some situations it is
difficult to know if a violation has occurred. Since we cannot
anticipate every situation that will arise, it is important that we
have
a way to approach a new question or problem. These are the
steps to keep in mind:
● Make sure you have all the facts. In order to reach the right
solutions, we must be as fully informed as possible.
● Ask yourself: What specifically am I being asked to do? Does
it seem unethical or improper? This will enable you to focus
on the specific question you are faced with, and the alternatives
you have. Use your judgment and common sense; if
something seems unethical or improper, it probably is.
● Clarify your responsibility and role. In most situations, there
is shared responsibility. Are your colleagues informed? It may
help to get others involved and discuss the problem.
● Discuss the problem with your supervisor. This is the basic
guidance for all situations. In many cases, your supervisor will
be more knowledgeable about the question, and will appreciate
being brought into the decision-making process.
Remember that it is your supervisor's responsibility to help
solve problems.
● Seek help from Company resources. In the rare case where it
may not be appropriate to discuss an issue with your
supervisor, or where you do not feel comfortable approaching
your supervisor with your question, discuss it locally with
your office manager or your Human Resources manager.
● You may report ethical violations in confidence and without
fear of retaliation. If your situation requires that your identity
be
kept secret, your anonymity will be protected. The Company
does not permit retaliation of any kind against employees for
good faith reports of ethical violations.
● Always ask first, act later: If you are unsure of what to do in
any situation, seek guidance before you act.
CODE OF ETHICS FOR CEO AND SENIOR FINANCIAL
OFFICERS
The Company has a Code of Business Conduct and Ethics
applicable to all directors and employees of the Company. The
CEO and all senior financial officers, including the CFO and
principal accounting officer, are bound by the provisions set
forth
therein relating to ethical conduct, conflicts of interest and
compliance with law. In addition to the Code of Business
Conduct
and Ethics, the CEO and senior financial officers are subject to
the following additional specific policies:
1. The CEO and all senior financial officers are responsible for
full, fair, accurate, timely and understandable disclosure in
the periodic reports required to be filed by the Company with
the SEC. Accordingly, it is the responsibility of the CEO and
each senior financial officer promptly to bring to the attention
of the Disclosure Committee any material information of
which he or she may become aware that affects the disclosures
made by the Company in its public filings or otherwise
assist the Disclosure Committee in fulfilling its responsibilities
as specified in the Company's Disclosure Controls and
Procedures Policy.
2. The CEO and each senior financial officer shall promptly
bring to the attention of the Disclosure Committee and the
Audit
Committee any information he or she may have concerning (a)
significant deficiencies in the design or operation of
internal controls which could adversely affect the Company's
ability to record, process, summarize and report financial
data or (b) any fraud, whether or not material, that involves
management or other employees who have a significant role in
the Company's financial reporting, disclosures or internal
controls.
3. The CEO and each senior financial officer shall promptly
bring to the attention of the General Counsel or the Legal
Department or the CEO and to the Audit Committee any
information he or she may have concerning any violation of the
Company's Code of Business Conduct and Ethics, including any
actual or apparent conflicts of interest between personal
and professional relationships, involving any management or
other employees who have a significant role in the
Company's financial reporting, disclosures or internal controls.
4. The CEO and each senior financial officer shall promptly
bring to the attention of the General Counsel or the Legal
Department or the CEO and to the Audit Committee any
information he or she may have concerning evidence of a
material violation of the securities or other laws, rules or
regulations applicable to the Company and the operation of its
business, by the Company or any agent thereof, or of violation
of the Code of Business Conduct and Ethics or of these
additional procedures.
5. The Board of Directors shall determine, or designate
appropriate persons to determine, appropriate actions to be
taken in
the event of violations of the Code of Business Conduct and
Ethics or of these additional procedures by the CEO and the
Company's senior financial officers. Such actions shall be
reasonably designed to deter wrongdoing and to promote
accountability for adherence to the Code of Business Conduct
and Ethics and to these additional procedures, and shall
include written notices to the individual involved that the Board
has determined that there has been a violation, censure by
the Board, demotion or re-assignment of the individual
involved, suspension with or without pay or benefits (as
determined
by the Board) and termination of the individual's employment.
In determining what action is appropriate in a particular
case, the Board of Directors or such designee shall take into
account all relevant information, including the nature and
severity of the violation, whether the violation was a single
occurrence or repeated occurrences, whether the violation
appears to have been intentional or inadvertent, whether the
individual in question had been advised prior to the violation
as to the proper course of action and whether or not the
individual in question had committed other violations in the
past.
TESLA MOTORS INC
FORM 10-K
(Annual Report)
Filed 02/24/16 for the Period Ending 12/31/15
Address 3500 DEER CREEK RD
PALO ALTO, CA 94070
Telephone 650-681-5000
CIK 0001318605
Symbol TSLA
SIC Code 3711 - Motor Vehicles and Passenger Car Bodies
Industry Auto & Truck Manufacturers
Sector Consumer Cyclical
Fiscal Year 12/31
http://www.edgar-online.com
© Copyright 2016, EDGAR Online, Inc. All Rights Reserved.
Distribution and use of this document restricted under EDGAR
Online, Inc. Terms of Use.
http://www.edgar-online.com
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
FORM 10-K
(Mark One)
x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d)
OF THE SECURITIES EXCHANGE ACT OF 1934
For the fiscal year ended December 31, 2015
OR
¨ TRANSITION REPORT PURSUANT TO SECTION 13 OR
15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the transition period from to
Commission File Number: 001-34756
Tesla Motors, Inc.
(Exact name of registrant as specified in its charter)
Delaware 91-2197729
(State or other jurisdiction of
incorporation or organization)
(I.R.S. Employer
Identification No.)
3500 Deer Creek Road
Palo Alto, California 94304
(Address of principal executive offices) (Zip Code)
(650) 681-5000
(Registrant’s telephone number, including area code)
Securities registered pursuant to Section 12(b) of the Act:
Title of each class Name of each exchange on which registered
Common Stock, $0.001 par value
The NASDAQ Stock Market LLC
Securities registered pursuant to Section 12(g) of the Act:
None
Indicate by check mark whether the registrant is a well-
known seasoned issuer, as defined in Rule 405 of the Securities
Act. Yes x
No ¨
Indicate by check mark if the registrant is not required to file re
ports pursuant to Section 13 or 15(d) of the Act. Yes ¨
No x
Indicate by check mark whether the registrant (1) has filed all re
ports required to be filed by Section 13 or 15(d) of the Securitie
s Exchange Act of 1934 (“Exchange Act”) during the
preceding 12 months (or for such shorter period that the registra
nt was required to file such reports), and (2) has been subject to
such filing requirements for the past 90 days. Yes x
No
¨
Indicate by check mark whether the registrant has submitted ele
ctronically and posted on its corporate Web site, if any, every In
teractive Data File required to be submitted and posted
pursuant to Rule 405 of Regulation S-
T during the preceding 12 months (or for such shorter period tha
t the registrant was required to submit and post such files). Ye
s x
No ¨
Indicate by check mark if disclosure of delinquent filers pursua
nt to Item 405 of Regulation S-
K (§229.405 of this chapter) is not contained herein, and will no
t be contained, to the best of
registrant’s knowledge, in definitive proxy or information state
ments incorporated by reference in Part III of this Form 10-
K or any amendment to this Form 10-K. ¨
Indicate by check mark whether the registrant is a large accelera
ted filer, an accelerated filer, a non-
accelerated filer or a smaller reporting company. See the definit
ions of “large accelerated
filer,” “accelerated filer,” and “smaller reporting company” in R
ule 12b-2 of the Exchange Act:
Large accelerated filer x Accelerated filer ¨
Non-accelerated filer ¨
(Do not check if a smaller reporting company)
Smaller reporting company ¨
Indicate by check mark whether the registrant is a shell compan
y (as defined in Rule 12b-2 of the Exchange Act). Yes ¨
No x
The aggregate market value of voting stock held by non-
affiliates of the registrant, as of June 30, 2015, the last day of r
egistrant’s most recently completed second fiscal quarter, was
$26,340,519,416 (based on the closing price for shares of the re
gistrant’s Common Stock as reported by the NASDAQ Global S
elect Market on June 30, 2015). Shares of Common Stock held b
y
each executive officer, director, and holder of 5% or more of th
e outstanding Common Stock have been excluded in that such p
ersons may be deemed to be affiliates. This determination of
affiliate status is not necessarily a conclusive determination for
other purposes.
As of January 31, 2016, there were 132,056,338 shares of the re
gistrant’s Common Stock outstanding.
DOCUMENTS INCORPORATED BY REFERENCE
Portions of the registrant’s Proxy Statement for the 2015 Annua
l Meeting of Stockholders are incorporated herein by reference i
n Part III of this Annual Report on Form 10-K to the extent
stated herein. Such proxy statement will be filed with the Securi
ties and Exchange Commission within 120 days of the registrant
’s fiscal year ended December 31, 2015.
TESLA MOTORS, INC.
ANNUAL REPORT ON FORM 10-K FOR THE YEAR ENDED
DECEMBER 31, 2015
INDEX
Page
PART I.
Item 1. Business 4
Item 1A. Risk Factors 13
Item 1B. Unresolved Staff Comments 27
Item 2. Properties 28
Item 3. Legal Proceedings 28
Item 4. Mine Safety Disclosures 28
PART II.
Item 5.
Market for Registrant’s Common Equity, Related Stockholder
Matters and Issuer Purchases of Equity Securities 29
Item 6. Selected Financial Data 31
Item 7.
Management’s Discussion and Analysis of Financial Condition
and Results of Operations 32
Item 7A.
Quantitative and Qualitative Disclosures About Market Risk
43
Item 8. Financial Statements and Supplementary Data 45
Item 9.
Changes in and Disagreements with Accountants on Accounting
and Financial Disclosure 74
Item 9A. Controls and Procedures 74
Item 9B. Other Information 74
PART III.
Item 10.
Directors, Executive Officers and Corporate Governance 75
Item 11. Executive Compensation 75
Item 12.
Security Ownership of Certain Beneficial Owners and Manage
ment and Related Stockholder Matters 75
Item 13.
Certain Relationships and Related Transactions, and Director I
ndependence 75
Item 14. Principal Accountant Fees and Services 75
PART IV.
Item 15. Exhibits and Financial Statement Schedules 75
Signatures 82
2
Forward-Looking Statements
The discussions in this Annual Report on Form 10-K contain
forward-looking statements reflecting our current expectations
that involve risks and
uncertainties. These forward-looking statements include, but are
not limited to, statements concerning our strategy, future
operations, future financial position,
future revenues, projected costs, profitability, expected cost
reductions, capital adequacy, expectations regarding demand
and acceptance for our technologies,
growth opportunities and trends in the market in which we
operate, prospects and plans and objectives of management. The
words “anticipates”, “believes”,
“estimates”, “expects”, “intends”, “may”, “plans”, “projects”,
“will”, “would” and similar expressions are intended to identify
forward-looking statements,
although not all forward-looking statements contain these
identifying words. We may not actually achieve the plans,
intentions or expectations disclosed in our
forward-looking statements and you should not place undue
reliance on our forward-looking statements. Actual results or
events could differ materially from
the plans, intentions and expectations disclosed in the forward-
looking statements that we make. These forward-looking
statements involve risks and
uncertainties that could cause our actual results to differ
materially from those in the forward-looking statements,
including, without limitation, the risks set
forth in Part I, Item 1A, “Risk Factors” in this Annual Report
on Form 10-K and in our other filings with the Securities and
Exchange Commission. We do not
assume any obligation to update any forward-looking
statements.
3
P ART I
I TEM 1. BUSINESS
Overview
We design, develop, manufacture and sell high-
performance fully electric vehicles and energy storage products.
We have established our own network of
vehicle sales and service centers and Supercharger stations glob
ally to accelerate the widespread adoption of electric vehicles.
Our vehicles, electric vehicle
engineering expertise, and business model differentiates us from
incumbent automobile manufacturers.
We currently produce and sell two fully electric vehicles, the M
odel S sedan and the Model X sport utility vehicle (SUV). Both
vehicles offer exceptional
performance, functionality and attractive styling. We commence
d deliveries of Model S in June 2012 and as of December 31, 20
15 we have delivered over 107,000
new Model S vehicles worldwide. We have continued to improv
e Model S by introducing performance, all-
wheel drive dual motor, and autopilot options, as well
as free over-the-air software updates.
We commenced customer deliveries of Model X in the third qua
rter of 2015. This unique vehicle offers exceptional safety, seati
ng for seven people, all-
wheel drive, and our autopilot functionality. We are currently ra
mping production and deliveries of Model X in the United State
s and plan to offer it in Europe and
Asia in 2016.
After the Model X, our goal is to introduce the Model 3, a lower
priced sedan designed for the mass market. We intend to unveil
Model 3 in the first quarter
of 2016 and start production and deliveries in late 2017.
The commercial production of fully electric vehicles that meets
consumers’ range and performance expectations requires substa
ntial design, engineering,
and integration work on almost every system of our vehicles. O
ur design and vehicle engineering capabilities, combined with th
e technical advancements of our
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx
Chapter 2 Theories about Business Government .docx

More Related Content

Similar to Chapter 2 Theories about Business Government .docx

public sector economics CH 6-7.pptx
public sector economics CH 6-7.pptxpublic sector economics CH 6-7.pptx
public sector economics CH 6-7.pptxkebede28
 
Future of the company An initial perspective - Paige Morrow - Frank Bold
Future of the company An initial perspective - Paige Morrow - Frank BoldFuture of the company An initial perspective - Paige Morrow - Frank Bold
Future of the company An initial perspective - Paige Morrow - Frank BoldFuture Agenda
 
amtreuf.docx
amtreuf.docxamtreuf.docx
amtreuf.docxTeshome48
 
Running Head ECONOMICS AND ADMINISTRATION1ECONOMICS AND ADMI.docx
Running Head ECONOMICS AND ADMINISTRATION1ECONOMICS AND ADMI.docxRunning Head ECONOMICS AND ADMINISTRATION1ECONOMICS AND ADMI.docx
Running Head ECONOMICS AND ADMINISTRATION1ECONOMICS AND ADMI.docxtodd271
 
Pest (political)
Pest (political)Pest (political)
Pest (political)BIJOYA
 
Pest (political)
Pest (political)Pest (political)
Pest (political)BIJOYA
 
413 ib Indian Economy and Trade Dependencies
413 ib Indian Economy and Trade Dependencies413 ib Indian Economy and Trade Dependencies
413 ib Indian Economy and Trade DependenciesASM's IBMR- Chinchwad
 
413 ib Global Competitiveness & Strategic alliances
413 ib Global Competitiveness & Strategic alliances413 ib Global Competitiveness & Strategic alliances
413 ib Global Competitiveness & Strategic alliancesASM's IBMR- Chinchwad
 
C H A P T E R S • T H E E X T E R N A L A S S E S S M E N T 61.docx
C H A P T E R S • T H E E X T E R N A L A S S E S S M E N T 61.docxC H A P T E R S • T H E E X T E R N A L A S S E S S M E N T 61.docx
C H A P T E R S • T H E E X T E R N A L A S S E S S M E N T 61.docxhumphrieskalyn
 
IStrategicpositionMacro- environmentResources Cu
IStrategicpositionMacro- environmentResources CuIStrategicpositionMacro- environmentResources Cu
IStrategicpositionMacro- environmentResources CuTatianaMajor22
 
Pest (political)
Pest (political)Pest (political)
Pest (political)shibom
 
Powerpoint presentation of_business_globalisation
Powerpoint presentation of_business_globalisationPowerpoint presentation of_business_globalisation
Powerpoint presentation of_business_globalisationshub-singhania
 
Corporate Strategy. Week 3 LectureOrganisational Purpo.docx
Corporate Strategy.  Week 3 LectureOrganisational Purpo.docxCorporate Strategy.  Week 3 LectureOrganisational Purpo.docx
Corporate Strategy. Week 3 LectureOrganisational Purpo.docxvanesaburnand
 

Similar to Chapter 2 Theories about Business Government .docx (20)

public sector economics CH 6-7.pptx
public sector economics CH 6-7.pptxpublic sector economics CH 6-7.pptx
public sector economics CH 6-7.pptx
 
Future of the company An initial perspective - Paige Morrow - Frank Bold
Future of the company An initial perspective - Paige Morrow - Frank BoldFuture of the company An initial perspective - Paige Morrow - Frank Bold
Future of the company An initial perspective - Paige Morrow - Frank Bold
 
amtreuf.docx
amtreuf.docxamtreuf.docx
amtreuf.docx
 
Business and society
Business and society Business and society
Business and society
 
Running Head ECONOMICS AND ADMINISTRATION1ECONOMICS AND ADMI.docx
Running Head ECONOMICS AND ADMINISTRATION1ECONOMICS AND ADMI.docxRunning Head ECONOMICS AND ADMINISTRATION1ECONOMICS AND ADMI.docx
Running Head ECONOMICS AND ADMINISTRATION1ECONOMICS AND ADMI.docx
 
Daniels03 im
Daniels03 imDaniels03 im
Daniels03 im
 
Pest (political)
Pest (political)Pest (political)
Pest (political)
 
Pest (political)
Pest (political)Pest (political)
Pest (political)
 
New institutional economics
New institutional economicsNew institutional economics
New institutional economics
 
413 ib Indian Economy and Trade Dependencies
413 ib Indian Economy and Trade Dependencies413 ib Indian Economy and Trade Dependencies
413 ib Indian Economy and Trade Dependencies
 
413 ib Global Competitiveness & Strategic alliances
413 ib Global Competitiveness & Strategic alliances413 ib Global Competitiveness & Strategic alliances
413 ib Global Competitiveness & Strategic alliances
 
C H A P T E R S • T H E E X T E R N A L A S S E S S M E N T 61.docx
C H A P T E R S • T H E E X T E R N A L A S S E S S M E N T 61.docxC H A P T E R S • T H E E X T E R N A L A S S E S S M E N T 61.docx
C H A P T E R S • T H E E X T E R N A L A S S E S S M E N T 61.docx
 
Sample Of Comparative Essay
Sample Of Comparative EssaySample Of Comparative Essay
Sample Of Comparative Essay
 
IStrategicpositionMacro- environmentResources Cu
IStrategicpositionMacro- environmentResources CuIStrategicpositionMacro- environmentResources Cu
IStrategicpositionMacro- environmentResources Cu
 
Pest (political)
Pest (political)Pest (political)
Pest (political)
 
BUSINESS ENVIRONMENT UNIT-1
BUSINESS ENVIRONMENT UNIT-1BUSINESS ENVIRONMENT UNIT-1
BUSINESS ENVIRONMENT UNIT-1
 
UNIT- II- BOB.pptx
UNIT- II- BOB.pptxUNIT- II- BOB.pptx
UNIT- II- BOB.pptx
 
Powerpoint presentation of_business_globalisation
Powerpoint presentation of_business_globalisationPowerpoint presentation of_business_globalisation
Powerpoint presentation of_business_globalisation
 
Corporate Strategy. Week 3 LectureOrganisational Purpo.docx
Corporate Strategy.  Week 3 LectureOrganisational Purpo.docxCorporate Strategy.  Week 3 LectureOrganisational Purpo.docx
Corporate Strategy. Week 3 LectureOrganisational Purpo.docx
 
Corruption and fdi: a theorical analysis
Corruption and fdi: a theorical analysisCorruption and fdi: a theorical analysis
Corruption and fdi: a theorical analysis
 

More from walterl4

Chapter 27 The purchase agreement 185After read.docx
Chapter 27 The purchase agreement           185After read.docxChapter 27 The purchase agreement           185After read.docx
Chapter 27 The purchase agreement 185After read.docxwalterl4
 
Chapter 27Gender and Media Content, Uses, and ImpactDar.docx
Chapter 27Gender and Media Content, Uses, and ImpactDar.docxChapter 27Gender and Media Content, Uses, and ImpactDar.docx
Chapter 27Gender and Media Content, Uses, and ImpactDar.docxwalterl4
 
CHAPTER 25Arab Unity and Disunity (since 1967)THE CRIS.docx
CHAPTER 25Arab Unity and Disunity (since 1967)THE CRIS.docxCHAPTER 25Arab Unity and Disunity (since 1967)THE CRIS.docx
CHAPTER 25Arab Unity and Disunity (since 1967)THE CRIS.docxwalterl4
 
Chapter 28 presents historical challenges to creating a sense of pe.docx
Chapter 28 presents historical challenges to creating a sense of pe.docxChapter 28 presents historical challenges to creating a sense of pe.docx
Chapter 28 presents historical challenges to creating a sense of pe.docxwalterl4
 
Chapter 24Tort Reform© 2014 Jones and Bartlett Pub.docx
Chapter 24Tort Reform© 2014 Jones and Bartlett Pub.docxChapter 24Tort Reform© 2014 Jones and Bartlett Pub.docx
Chapter 24Tort Reform© 2014 Jones and Bartlett Pub.docxwalterl4
 
Chapter 24 Palliative and End-of-Life CareThe hospice nur.docx
Chapter 24 Palliative and End-of-Life CareThe hospice nur.docxChapter 24 Palliative and End-of-Life CareThe hospice nur.docx
Chapter 24 Palliative and End-of-Life CareThe hospice nur.docxwalterl4
 
Chapter 24Mental HealthCopyright © 2018, Elsevie.docx
Chapter 24Mental HealthCopyright © 2018, Elsevie.docxChapter 24Mental HealthCopyright © 2018, Elsevie.docx
Chapter 24Mental HealthCopyright © 2018, Elsevie.docxwalterl4
 
Chapter 23Rural and Migrant HealthCopyright © 2015, 2011, 20.docx
Chapter 23Rural and Migrant HealthCopyright © 2015, 2011, 20.docxChapter 23Rural and Migrant HealthCopyright © 2015, 2011, 20.docx
Chapter 23Rural and Migrant HealthCopyright © 2015, 2011, 20.docxwalterl4
 
Chapter 3Linking IT to Business Metrics From the first time IT.docx
Chapter 3Linking IT to Business Metrics From the first time IT.docxChapter 3Linking IT to Business Metrics From the first time IT.docx
Chapter 3Linking IT to Business Metrics From the first time IT.docxwalterl4
 
Chapter 23 The Skeletal SystemKEY TERMSAxial skeleton v.docx
Chapter 23 The Skeletal SystemKEY TERMSAxial skeleton v.docxChapter 23 The Skeletal SystemKEY TERMSAxial skeleton v.docx
Chapter 23 The Skeletal SystemKEY TERMSAxial skeleton v.docxwalterl4
 
Chapter 4 A Tour of the CellChapter 4 A Tour of the CellName.docx
Chapter 4 A Tour of the CellChapter 4 A Tour of the CellName.docxChapter 4 A Tour of the CellChapter 4 A Tour of the CellName.docx
Chapter 4 A Tour of the CellChapter 4 A Tour of the CellName.docxwalterl4
 
Chapter 4 Managing Disputes ADR and Litigation StrategiesI.docx
Chapter 4  Managing Disputes ADR and Litigation StrategiesI.docxChapter 4  Managing Disputes ADR and Litigation StrategiesI.docx
Chapter 4 Managing Disputes ADR and Litigation StrategiesI.docxwalterl4
 
Chapter 4 Data Communications and Networking 1 of 40 .docx
Chapter 4  Data Communications and Networking  1 of 40 .docxChapter 4  Data Communications and Networking  1 of 40 .docx
Chapter 4 Data Communications and Networking 1 of 40 .docxwalterl4
 
Chapter 3 The APA Ethics Code and Ethical Decision MakingThe APA.docx
Chapter 3 The APA Ethics Code and Ethical Decision MakingThe APA.docxChapter 3 The APA Ethics Code and Ethical Decision MakingThe APA.docx
Chapter 3 The APA Ethics Code and Ethical Decision MakingThe APA.docxwalterl4
 
Chapter 3 3Plainchant Alleluia, Caro mea”Composed ca. 1275This.docx
Chapter 3 3Plainchant Alleluia, Caro mea”Composed ca. 1275This.docxChapter 3 3Plainchant Alleluia, Caro mea”Composed ca. 1275This.docx
Chapter 3 3Plainchant Alleluia, Caro mea”Composed ca. 1275This.docxwalterl4
 
chapter 3 Chapter 3 Managerial Decision Making1. Describ.docx
chapter 3 Chapter 3 Managerial Decision Making1. Describ.docxchapter 3 Chapter 3 Managerial Decision Making1. Describ.docx
chapter 3 Chapter 3 Managerial Decision Making1. Describ.docxwalterl4
 
Chapter 3What are GPNs and how do they function and operate W.docx
Chapter 3What are GPNs and how do they function and operate W.docxChapter 3What are GPNs and how do they function and operate W.docx
Chapter 3What are GPNs and how do they function and operate W.docxwalterl4
 
CHAPTER 3the story of the slave ship, the Zong- in Novembe.docx
CHAPTER 3the story of the slave ship, the Zong- in Novembe.docxCHAPTER 3the story of the slave ship, the Zong- in Novembe.docx
CHAPTER 3the story of the slave ship, the Zong- in Novembe.docxwalterl4
 
Chapter 3The Civilization of the GreeksCopyright © 2017 Ceng.docx
Chapter 3The Civilization of the GreeksCopyright © 2017 Ceng.docxChapter 3The Civilization of the GreeksCopyright © 2017 Ceng.docx
Chapter 3The Civilization of the GreeksCopyright © 2017 Ceng.docxwalterl4
 
Chapter 3What is the basic accounting equation Give an exampl.docx
Chapter 3What is the basic accounting equation Give an exampl.docxChapter 3What is the basic accounting equation Give an exampl.docx
Chapter 3What is the basic accounting equation Give an exampl.docxwalterl4
 

More from walterl4 (20)

Chapter 27 The purchase agreement 185After read.docx
Chapter 27 The purchase agreement           185After read.docxChapter 27 The purchase agreement           185After read.docx
Chapter 27 The purchase agreement 185After read.docx
 
Chapter 27Gender and Media Content, Uses, and ImpactDar.docx
Chapter 27Gender and Media Content, Uses, and ImpactDar.docxChapter 27Gender and Media Content, Uses, and ImpactDar.docx
Chapter 27Gender and Media Content, Uses, and ImpactDar.docx
 
CHAPTER 25Arab Unity and Disunity (since 1967)THE CRIS.docx
CHAPTER 25Arab Unity and Disunity (since 1967)THE CRIS.docxCHAPTER 25Arab Unity and Disunity (since 1967)THE CRIS.docx
CHAPTER 25Arab Unity and Disunity (since 1967)THE CRIS.docx
 
Chapter 28 presents historical challenges to creating a sense of pe.docx
Chapter 28 presents historical challenges to creating a sense of pe.docxChapter 28 presents historical challenges to creating a sense of pe.docx
Chapter 28 presents historical challenges to creating a sense of pe.docx
 
Chapter 24Tort Reform© 2014 Jones and Bartlett Pub.docx
Chapter 24Tort Reform© 2014 Jones and Bartlett Pub.docxChapter 24Tort Reform© 2014 Jones and Bartlett Pub.docx
Chapter 24Tort Reform© 2014 Jones and Bartlett Pub.docx
 
Chapter 24 Palliative and End-of-Life CareThe hospice nur.docx
Chapter 24 Palliative and End-of-Life CareThe hospice nur.docxChapter 24 Palliative and End-of-Life CareThe hospice nur.docx
Chapter 24 Palliative and End-of-Life CareThe hospice nur.docx
 
Chapter 24Mental HealthCopyright © 2018, Elsevie.docx
Chapter 24Mental HealthCopyright © 2018, Elsevie.docxChapter 24Mental HealthCopyright © 2018, Elsevie.docx
Chapter 24Mental HealthCopyright © 2018, Elsevie.docx
 
Chapter 23Rural and Migrant HealthCopyright © 2015, 2011, 20.docx
Chapter 23Rural and Migrant HealthCopyright © 2015, 2011, 20.docxChapter 23Rural and Migrant HealthCopyright © 2015, 2011, 20.docx
Chapter 23Rural and Migrant HealthCopyright © 2015, 2011, 20.docx
 
Chapter 3Linking IT to Business Metrics From the first time IT.docx
Chapter 3Linking IT to Business Metrics From the first time IT.docxChapter 3Linking IT to Business Metrics From the first time IT.docx
Chapter 3Linking IT to Business Metrics From the first time IT.docx
 
Chapter 23 The Skeletal SystemKEY TERMSAxial skeleton v.docx
Chapter 23 The Skeletal SystemKEY TERMSAxial skeleton v.docxChapter 23 The Skeletal SystemKEY TERMSAxial skeleton v.docx
Chapter 23 The Skeletal SystemKEY TERMSAxial skeleton v.docx
 
Chapter 4 A Tour of the CellChapter 4 A Tour of the CellName.docx
Chapter 4 A Tour of the CellChapter 4 A Tour of the CellName.docxChapter 4 A Tour of the CellChapter 4 A Tour of the CellName.docx
Chapter 4 A Tour of the CellChapter 4 A Tour of the CellName.docx
 
Chapter 4 Managing Disputes ADR and Litigation StrategiesI.docx
Chapter 4  Managing Disputes ADR and Litigation StrategiesI.docxChapter 4  Managing Disputes ADR and Litigation StrategiesI.docx
Chapter 4 Managing Disputes ADR and Litigation StrategiesI.docx
 
Chapter 4 Data Communications and Networking 1 of 40 .docx
Chapter 4  Data Communications and Networking  1 of 40 .docxChapter 4  Data Communications and Networking  1 of 40 .docx
Chapter 4 Data Communications and Networking 1 of 40 .docx
 
Chapter 3 The APA Ethics Code and Ethical Decision MakingThe APA.docx
Chapter 3 The APA Ethics Code and Ethical Decision MakingThe APA.docxChapter 3 The APA Ethics Code and Ethical Decision MakingThe APA.docx
Chapter 3 The APA Ethics Code and Ethical Decision MakingThe APA.docx
 
Chapter 3 3Plainchant Alleluia, Caro mea”Composed ca. 1275This.docx
Chapter 3 3Plainchant Alleluia, Caro mea”Composed ca. 1275This.docxChapter 3 3Plainchant Alleluia, Caro mea”Composed ca. 1275This.docx
Chapter 3 3Plainchant Alleluia, Caro mea”Composed ca. 1275This.docx
 
chapter 3 Chapter 3 Managerial Decision Making1. Describ.docx
chapter 3 Chapter 3 Managerial Decision Making1. Describ.docxchapter 3 Chapter 3 Managerial Decision Making1. Describ.docx
chapter 3 Chapter 3 Managerial Decision Making1. Describ.docx
 
Chapter 3What are GPNs and how do they function and operate W.docx
Chapter 3What are GPNs and how do they function and operate W.docxChapter 3What are GPNs and how do they function and operate W.docx
Chapter 3What are GPNs and how do they function and operate W.docx
 
CHAPTER 3the story of the slave ship, the Zong- in Novembe.docx
CHAPTER 3the story of the slave ship, the Zong- in Novembe.docxCHAPTER 3the story of the slave ship, the Zong- in Novembe.docx
CHAPTER 3the story of the slave ship, the Zong- in Novembe.docx
 
Chapter 3The Civilization of the GreeksCopyright © 2017 Ceng.docx
Chapter 3The Civilization of the GreeksCopyright © 2017 Ceng.docxChapter 3The Civilization of the GreeksCopyright © 2017 Ceng.docx
Chapter 3The Civilization of the GreeksCopyright © 2017 Ceng.docx
 
Chapter 3What is the basic accounting equation Give an exampl.docx
Chapter 3What is the basic accounting equation Give an exampl.docxChapter 3What is the basic accounting equation Give an exampl.docx
Chapter 3What is the basic accounting equation Give an exampl.docx
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Chapter 2 Theories about Business Government .docx

  • 1. Chapter 2: Theories about Business Government Relations * AgendaThree models of government-business relationsThe shareholder modelThe strategic modelThe stakeholder modelCrony Capitalism * Why Study Theories?Helpful in understanding complex social realitiesSimplify and organize knowledge by describing patterns and regularitiesOffer different perspectives regarding the interactions between business and government.In practice they define the strategies, operations, and outcomes of businesses
  • 2. * Three Models of Business and SocietyBusiness centered approachesShareholder modelStrategic business modelStakeholder modelNote that there are other important “players” in society, in particular, religion * The Shareholder ModelEmphasizes economic principlesViews business in isolationEmphasizes economic analysis and profit- making for direct or indirect ownersEmphasizes the invisible hand at the micro levelStresses the importance of dynamic marketPromotes non-intervention by government Contends the principle duty of government is to ensure that markets function properly, and to correct market failures * Examples of shareholder modelEconomic freedom Index (Heritage Foundation)Rule of lawLimited governmentRegulatory efficiencyOpen markets(Top in 2015:
  • 3. Hong Kong, Singapore, NZ, Australia, Switzerland, Canada, Chile, Estonia, Ireland, and Mauritius)Domestic example: Investment banks Various critiques of the Shareholder ModelDownplays market imperfections Ignores the need for government vigilance and intervention to protect market failureIn practice, tends to ignore the reality of business’ demands on government and the advantages frequently provided by governmentToo much emphasis on monetary and material gains * The Strategic Business ModelEmphasizes the practice of business and successOne element: being highly competitiveMost efficient and effective use of resources; Competing to win through hard work and clevernessPlaying the game wellThe model also emphasizes collaborationJoining other strong competitors, networking, creating goodwill, focusing on comparative strengthsPragmatically, it wants: Moderate taxes and moderate regulations, stable policies, and protections in global competitionTo pragmatically use/exploit governmental resources *
  • 4. ExamplesCouncil on Competitiveness Where America Needs to Be To drive US productivity, buttress our leadership in world markets, and raise the standard of living for all Americans, the United States must: • Immediately work to: – Ensure lower cost, easy access to high quality education and training for all Americans – Maintain long-term federal investments in science and technology leadership – Reform and simplify the tax code to stimulate investment and attract global capital to the United States • Over the next ten years: – Create at least 21 million jobs – Reduce unemployment to 5 percent – Reduce government debt by $4 trillion to ensure America’s long term solvency – Invest $2.2 trillion in infrastructure to maintain competitive advantage – Double exportsGlobal Competitiveness Index; Community Banks Critique of the Strategic Business Model More balanced and realistic than the shareholder perspective, but Unclear and inconsistentHow do you decide your values when they compete and evolve? *
  • 5. The stakeholder modelThis perspective sees business as critical to but nonetheless subordinate to society Stakeholders include not only investors, partners and employees, but also customers, the community, government, and other groups in society affected by business (e.g., environmental groups) * The stakeholder modelCreates duties toward multiple constituents of the corporationWhile profits are important and one of the mainstays of business, they do not crowd out other business and social values in the stakeholder viewA long-term perspective encourages an attitude of sportsmanship in competition, with the accent being on getting better rather than simply winning in the short termPursuit of a good reputation for pragmatic purposesRequires business management raise its gaze above profits to see and respond to a spectrum of other values * Examples, company levelAnnual listing by Corporate Responsibility impact on the environment, climate change behaviors, avoidance of human rights abuse, quality employee relations, open corporate governance, community-based philanthropy, and
  • 6. financial integrity Development banks Examples, at the country level Three stakeholder perspectives: quality of life, environmental concern, equity Human Development Index (UN) where US is very high Environmental Performance Index where US is upper middle Wealth distribution: Gini Coefficient (from .25 to .70 with low fraction as the most equal); US in the lower middle The stakeholder modelCritics to the stakeholder modelUnrealistic assessment of power relationships between the corporation and other entitiesToo vague a guideline to substitute for the yardstick of profits Not clear who or what is a legitimate stakeholder * Comparison of three modelsModelsShareholderStrategicStakeholder Role of societal interestsComplete separation of financial and societal interestsMix of financial interestsFinancial interests should never override social goodIntegration of private and public sectorSectors as separate as possible; regulation or financial incentives for business as little as possibleSectors work together and business benefit from government support Business sector should not manipulate the public sector for its selfish endsSize
  • 7. of governmentGovernment as small as possible; private sector models are preferred Government being large enough to ensure basic servicesBusiness having self-regulation and strong professional normsKey valuesShort-term wealth creation, self- reliance, dynamic destruction by market; win-lose philosophyLong-term wealth creation, synergy of sectors and selective partnerships, pragmatic use/exploitation of government, do good when it is profitable ; change is both strategic/rational; game theory Wealth creation never at expense of some stakeholders; inclusion of stakeholders ; win-win strategies; concern for the world * When the Ideal Models Become Corrupted: Crony CapitalismCrony CapitalismClose relationship between business and government leading to favored treatment to individuals, firms, or industries at the expense of the public
  • 8. Spectrum of Crony Capitalism 1. Strongman modelDominance of leader and his/her group (i.e., dictatorships or quasi-dictatorships)Vague laws; laws instituted abruptly by dominant figureExample:Russia under Putin * Spectrum of Crony Capitalism 2. Fused political-bureaucratic elite modelDominance by family or small group of large asset owners (rather than strongman or despot)Rampant bribery and corruption Example:Second red/official generations in China * Spectrum of Crony Capitalism 3. Economic elite dominance modelDominance by economic elites because of the power of money; often more subtleMarket distortion and unhealthy imbalances in civil society (Source: http://seanmarske.wordpress.com/2012/07/10/whos- running-the-show-introducing-the-criminal-elite/) *
  • 9. Economic elite dominance modelPowerful financial interests can corrupt the society throughAbility to change critical administrative rulemakingExerting influence via control of mediaIncreased opportunity to be elected officialsBuying access based on economic support of candidatesAbility to influence the electorate with threatsTo some degree in all developed capitalist countries; Issue: when does elite dominance become overweening?Example: US. ConclusionThe three “pure” types of business-government model ungird many of our public discussions. However, the elements are often muddled and so we talk past one another.Exaggerating for clarity, they emphasize business efficiency, business pragmatism, and business ethicsGovernment itself has elements that emphasize these elements too!Securities and Exchange CommissionUS Trade RepresentativeUS Department of Health and Human Services Crony capitalism is a distortion of “pure” typesIt includes various subtypes:StrongmanFused political-bureaucratic eliteEconomic elite-dominance modelWhile crony capitalism tendencies can never be fully eliminated, they can be reduced by wise policies in order to retain the trust and respect of society for both government and business in creating a fair society and a healthy market economy. ISSUES IN ACCOUNTING EDUCATION American Accounting Association Vol. 33, No. 2 DOI: 10.2308/iace-51973 May 2018 pp. 19–34
  • 10. Fraud Risk Brainstorming at Tesla Motors Megan F. Hess Washington & Lee University Lindsay M. Andiola Virginia Commonwealth University ABSTRACT: This instructional case offers students the opportunity to explore the fraud risk assessment process and participate in a simulated fraud brainstorming session as required by AS 2401 (formerly SAS 99) for financial statement audits. Drawing on publicly available information about Tesla, Inc. (formerly Tesla Motors), the revolutionary company behind the popular Model S all-electric vehicle, the case materials guide students through multiple learning objectives. These objectives include learning how to: (1) recognize the factors that contribute to financial statement fraud risk; (2) identify and evaluate the likelihood and severity of fraud risks; (3) analyze the ways that fraud risks can lead to material misstatements in the financial statements; (4) understand the purpose of and how to conduct a fraud brainstorming session; and (5) develop audit procedures that respond to assessed fraud risks. In a post-case learning assessment, students reported significant improvement in their knowledge, comprehension, and application of these learning objectives. Students also indicated that they enjoyed learning about these concepts in the context of this popular company. This case has both an individual and a group component, and it is designed for use in an auditing or forensic accounting course at either the undergraduate or the graduate level. Keywords: fraud risk factors; fraud triangle; brainstorming
  • 11. session; fraud risk matrix; AS 2401; SAS 99. INTRODUCTION O ne of the most important skills needed by accountants today is the ability to analyze and detect fraud risks (Carpenter 2007; Center for Audit Quality [CAQ] 2010; PricewaterhouseCoopers [PwC] 2015). The Association of Certified Fraud Examiners (ACFE 2016) estimates that the typical organization loses 5 percent of its revenues every year to fraud. Beyond these losses, financial statement frauds also have far-reaching negative consequences on investors, employees, suppliers, and other stakeholders of the corporation. Because of the importance of fraud detection to the integrity of our markets, auditing standards (i.e., Public Company Accounting Oversight Board [PCAOB] 2016a, 2016b, AS 2401; American Institute of Certified Public Accountants [AICPA] 2006, AU Section 316; International Federation of Accountants [IFAC] 2008, ISA 240) require that accountants fulfill their responsibility to obtain reasonable assurance that the financial statements they audit are free of material misstatement due to error or fraud. In particular, Auditing Standard (AS) 2401 (formerly Statement on Auditing Standards No. 99), Consideration of Fraud in a Financial Statement Audit, requires that fraud risk
  • 12. brainstorming sessions be incorporated into every audit engagement. These sessions are designed to increase the probability that auditors will detect intentional misstatements and to help set the right tone for professional skepticism and heightened sensitivity to fraud risk throughout the engagement (Ramos 2003). YOUR TASK This case requires you to imagine that you have been asked to participate in a fraud risk brainstorming session as part of the planning procedures for the 2016 financial statement audit of Tesla Motors. This case has two parts. In Part I, you will read We thank Allen D. Blay (associate editor) and two anonymous reviewers for their valuable input and guidance. We also thank Mary Durkin, Jared Eustler, Gary Sullivan, and Kim Westermann, as well as participants at the 2016 AAA Forensic Section Midyear Meeting for their feedback and assistance. Finally, we thank Anthony Williams for his research assistance. Supplemental materials can be accessed by clicking the links in Appendix B. Editor’s note: Accepted by Valaria P. Vendrzyk. Submitted: March 2016 Accepted: November 2017 Published Online: November 2017
  • 13. 19 background information on Tesla Motors, learn how the concept of the ‘‘fraud triangle’’ is used to identify fraud risk factors, and work to complete the Part I case requirement questions designed to help you identify some of the financial statement fraud risks associated with this company. In Part II, you will learn how to conduct a fraud risk brainstorming session and how to adapt your planned procedures to respond to identified fraud risks. After reading Part II, you will work as part of an audit team to conduct a fraud risk brainstorming session. During this session, your team will be responsible for completing a fraud risk matrix and writing up a memo for the audit file that documents the results of your fraud risk assessment and identifies how your team believes the nature, timing, and extent of the audit procedures should be altered to respond to these identified risks. It is important to note that as of September 2017, Tesla Motors has not been accused of financial statement fraud. Nevertheless, you and your team should resist the natural inclination to presume that management is honest, and exercise
  • 14. professional skepticism in evaluating fraud risks at this company. Auditing standards remind us that we should conduct the engagement with a mindset that recognizes the possibility that a material misstatement due to fraud could be present, regardless of any past experience with the entity and regardless of the auditor’s belief about management’s honesty and integrity (PCAOB 2016a). PART I Tesla Motors Case Background Founding and History of Tesla Motors Tesla Motors (NASDAQ: TSLA) was founded in 2003 by a group of engineers in Silicon Valley with the vision of accelerating the world’s transition to sustainable transport. To that end, Tesla Motors has created ‘‘cars without compromise’’— that is, all-electric vehicles that offer all of the torque, power, and style of high-end automobiles with none of the emissions. The company’s mission is ‘‘to accelerate the advent of sustainable transport by bringing compelling mass market electric cars to market as soon as possible’’ (Tesla Motors 2015). Tesla’s first release was the Roadster in 2008, which offered 0 to 60 mph
  • 15. acceleration in 3.7 seconds and a range of 245 miles per charge of its lithium-ion battery. In 2012, Tesla launched the Model S, a four-door sedan that was named Motor Trend’s 2013 Car of the Year. At the beginning of 2016, with more than 107,000 vehicles on the road worldwide, Tesla’s product line expanded to include the Model X, a crossover vehicle that entered volume production at the end of 2015, and the Model 3, a lower-priced vehicle with an expected release in 2017. However, Tesla does not limit its vision to only automobiles. The company is described as ‘‘a technology and design company with a focus on energy innovation’’ (Tesla Motors 2016b). Tesla has revolutionized the automobile industry in many ways. In addition to proving that all-electric vehicles can perform as well, if not better than, gas-powered vehicles, Tesla has challenged the conventional approach of how vehicles are sold. Rather than selling through dealership franchises, Tesla sells and services its vehicles through its own network, including acceptance of online orders. To help establish the value of the Tesla brand and encourage early adopters to buy their vehicles, Tesla offers ‘‘resale value guarantees’’ to customers. Under this program, customers have the option of selling their vehicle back to Tesla Motors during the period of 36 to 39 months after delivery for a pre-determined resale value (Tesla Motors 2016b).
  • 16. Due to widespread publicity and generally positive reviews of the vehicles, Tesla has enjoyed greater demand for its vehicles than it can fulfill. As such, the company has been collecting deposits from customers at the time they place an order for a vehicle and, in some locations, at certain additional milestones up to the point of delivery. In addition, a closer look at Tesla’s income statement reveals that Tesla sells much more than just cars. Tesla also earns revenue from related services, including access to its Supercharging network and software updates on the vehicles. Tesla also earns revenue from the sale of regulatory credits from energy tax credits and from the sale of components to other manufacturers. Finally, Tesla earns revenue from ‘‘Tesla Energy,’’ a division of the company offering battery- powered energy solutions for home, businesses, and utilities (Tesla Motors 2016b). Tesla’s income statement and balance sheet for the past three years are presented in Exhibit 1 and 2, respectively. Tesla launched an initial public offering in June 2010 that raised $226 million in equity. At the time, the company employed less than 1,000 employees and had less than $150 million in revenue. The company has since experienced rapid
  • 17. growth. During the period 2011–2015, revenues have grown more than 1,000 percent from $204 million in 2011 to $4.1 billion in 2015. After several years of trading between $22 and $33 per share, Tesla’s surprise announcement of quarterly profits in 2013 drove the stock into the triple-digits (Taylor 2013). In March 2016, the company enjoyed a market capitalization of almost $30 billion and traded at about $200 per share. Tesla Motors stock performance for the period 01/01/2014 to 03/31/2016 is provided in Exhibit 3. 20 Hess and Andiola Issues in Accounting Education Volume 33, Number 2, 2018 Tesla’s Leadership Tesla Motors is led by CEO and co-founder Elon Musk. Mr. Musk made his fortune as a co-founder of PayPal, which was acquired by eBay in 2002 for $1.4 billion. He is also the CEO of Space Exploration Technologies Corp., better known as SpaceX, a company that aims to develop the world’s first private spacecraft for commercial space travel, and he is chairman of the board of SolarCity Corporation, a company that aims to
  • 18. expand the availability of clean, affordable energy. A self-made man and serial entrepreneur, Mr. Musk’s innovations and charisma have earned him the reputation as a ‘‘real-life Iron Man’’ in reference to the Marvel Comics super hero (Smith 2014). Mr. Musk is known for his bold vision and his even bolder proclamations. In a live interview in 2009, he called a New York Times journalist that wrote a critical review of Tesla an ‘‘idiot’’ (https://www.youtube.com/watch?v¼rwDU–NPqZ0; see also, http://www.businessinsider.com/elon-musk-calls-times-writer-a- huge-douchebag-and-an-idiot-video-2009-4). In an early 2015 earnings call with analysts, Mr. Musk also declared that he thought Tesla’s market capitalization could rival Apple Inc.’s $700 billion in the next ten years, which would be more than the market capitalizations of Ford Motor Company, General Motors Company (GM), Honda Motor Company, Ltd., Toyota Motor Corporation, BMW, and Mercedes-Benz combined. Mr. Musk made this declaration in the face of production delays, weakening market conditions, and falling gas prices, which has traditionally made the sale of electric cars more difficult. Tesla’s future prospects appear to depend on Mr. Musk’s ability to achieve feats that other carmakers would never dream of. As an incentive for him to make his bold vision a reality, Tesla’s Board of Directors granted 5,274,901 stock options to
  • 19. Mr. Musk that will ‘‘vest’’ or become available to him to exercise based on his ability to lead the company toward meeting specific production and performance goals, including the successful completion of the Model X and Model 3 prototypes and reaching 100,000 units in total vehicle production (Tesla Motors 2016b). In addition to overseeing Mr. Musk’s plans and providing the company with guidance, Tesla’s Board of Directors is tasked with protecting the interests of Tesla’s stockholders, including the responsibility for risk oversight. Following best practices for corporate governance, Tesla’s guidelines suggest that the majority of Tesla’s directors should be ‘‘outsiders,’’ meaning non- company employees, and it has a standing Audit Committee to which both internal and external auditors report directly (Tesla Motors 2016a). Some have raised concerns, however, about whether Tesla’s board is as independent as it appears. CtW EXHIBIT 1 Tesla Motors Income Statement Fraud Risk Brainstorming at Tesla Motors 21 Issues in Accounting Education Volume 33, Number 2, 2018
  • 20. http://www.businessinsider.com/elon-musk-calls-times-writer-a- huge-douchebag-and-an-idiot-video-4 http://www.businessinsider.com/elon-musk-calls-times-writer-a- huge-douchebag-and-an-idiot-video-4 https://www.youtube.com/watch?v=rwDU--NPqZ0 Investment Group, which works with union-based pension funds and holds 200,000 shares of Tesla, recently called on the company to separate the chairman of the board and CEO roles, both of which Elon Musk now holds, and to prohibit immediate family members from serving on the board (Sage 2016). Mr. Musk’s brother, Kimbal Musk, currently serves on the boards of both Tesla and SpaceX. Board member Brad Buss is also a former employee of SolarCity, Mr. Musk’s related company. Tesla’s Employee Culture Tesla’s culture has been described as ‘‘high risk, high reward,’’ and the company prides itself on operating like an internet startup (Fehrenbacher 2015). Employees regularly work long hours and the atmosphere has been described as ‘‘grueling.’’ Nevertheless, many employees have enjoyed big payouts because of their association with Tesla. In mid-2015, Jerome Guillen, then Tesla’s Vice President of Sales and Services, exercised options and sold shares netting him $4 million. Guillen has subsequently taken a leave of absence from Tesla. In addition,
  • 21. Tesla’s longtime CFO, Deepak Ahuja, has recently retired from Tesla after making millions by exercising his stock options in 2015. While the environment may be one of high pressure for employees, many may enjoy working in the innovative and mission-driven environment Tesla promotes. As an example of Tesla’s commitment to transparency and the advancement of energy alternatives, Tesla made the radical announcement that it would not initiate patent lawsuits against anyone who, in good faith, wanted to use its technology (Tesla Motors 2015). EXHIBIT 2 Tesla Motors Balance Sheet 22 Hess and Andiola Issues in Accounting Education Volume 33, Number 2, 2018 Challenges for Tesla and Its Future Despite the company’s rapid growth and popularity, Tesla has also experienced a number of setbacks. The company has struggled to reach desired production levels, which has resulted in lengthy delays for customers. Competitors, such as BMW, Nissan Motor Company Ltd., and GM, have been developing all-electric alternatives and boast much higher production and distribution capabilities than Tesla. Exhibit 4 presents a peer
  • 22. comparison of Tesla’s financials with current competitors. In addition, analysts have raised questions about Tesla’s reliance on emissions credits to shore up losses and the company’s exposure to lawsuits and lobbying by dealership unions to block states from allowing direct automotive sales to consumers (Taylor 2013). Moreover, while Tesla’s Model S achieved an overall five-star safety rating by the National Highway Traffic Safety Administration, questions about the safety of Tesla’s new technology have continued to plague the company. In November 2013, a class action lawsuit was filed against Tesla and Mr. Musk, alleging that he had made false and/or misleading representations with respect to the safety of the Model S. The case was dismissed in September 2014 by the trial court, but the plaintiff’s appeal is still pending as of early 2016 (Tesla Motors 2016b). Tesla has big plans for the future of its business. With the popularity of Tesla’s vehicles continuing to climb, the company has begun to expand its operations. Among these expansions, the company has invested in an assembly facility in The Netherlands and a specialized production plant in Lathrop, California. Tesla has also entered into strategic partnerships with companies like Panasonic Corporation to focus on reducing the
  • 23. costs of lithium-ion battery packs. In addition, Tesla recently announced the beginning of construction on its multi-billion- dollar investment in a ‘‘Gigafactory’’ in Nevada that will facilitate production of more affordable electric vehicles and battery- powered energy alternatives (Tesla Motors 2015). According to the company’s 2015 annual report, Tesla plans to continue expanding stores and its service infrastructure worldwide. The company will invest $1.5 billion in capital expenditures in equipment to support cell production at the Gigafactory, to begin installation of Model 3 vehicle production machinery, to open about 80 retail locations and service centers, and to energize about 300 new Supercharger locations (Tesla Motors 2016b). These bold expansion plans could put Tesla at the center of an energy revolution, or they could cause the company to implode under the weight of significant debt levels and even greater expectations. EXHIBIT 3 Tesla Motors (TSLA) Stock Performance (01/01/2014–03/31/2016) Source: Stock chart from Yahoo! Finance. Fraud Risk Brainstorming at Tesla Motors 23 Issues in Accounting Education Volume 33, Number 2, 2018
  • 24. Using the Fraud Triangle to Identify Fraud Risk Factors Auditing standards define fraud as an intentional act that results in a material misstatement in the financial reports (PCAOB 2016a). Research shows that fraud is more likely when three conditions are present: incentives or pressures, opportunities, and attitudes or rationalizations. These three conditions are known collectively as the ‘‘fraud triangle’’ (Cressey 1953). Auditors use the fraud triangle as a tool to help identify areas of risk during the fraud risk brainstorming process. These risks are referred to as fraud risk factors. The next section describes each of the three conditions in more detail and provides examples from recent research of how each condition is linked with fraud. The first leg of the fraud triangle is incentives or pressures. This condition is present whenever management and/or employees have incentives or are under pressures to commit fraud (Arens, Beasley, and Alvin 2010). Research shows that when management compensation is tied to earnings and/or stock performance (e.g., bonuses, stock options), the likelihood of fraud is higher (Healy and Wahlen 1999; Fields, Lys, and Vincent 2001). Other incentives than greed can also contribute to fraud
  • 25. risk. A recent study finds that CFOs may become involved in deceptive accounting practices not for personal financial gain, but rather to appease their CEOs and protect their jobs (Feng, Ge, Luo, and Shevlin 2011). Performance pressures also cause managers and employees to engage in fraud. A recent survey finds that 64 percent of employees engage in unethical behavior because they feel pressure to ‘‘do whatever it takes’’ to meet business targets (KPMG 2013). Changes in the external environment, such as declines in customer demand, increased competition, or new regulations can threaten the financial stability of a firm and generate pressure to ‘‘cook the books’’ and create the appearance of success while the firm attempts to adapt to the environmental changes. Paradoxically, both high- performing firms (e.g., MacLean 2008; Mishina, Dykes, Block, and Pollock 2010) and low-performing firms (e.g., Harris and Bromiley 2007; Zhang, Bartol, Smith, Pfarrer, and Khanin 2008) have higher risks of financial statement fraud because both situations put pressure on executives to meet or exceed last period’s earnings. Managers at poorly performing firms may also feel pressure to manipulate earnings or inflate asset balances in order
  • 26. to meet debt covenant requirements and avoid defaulting on loans. EXHIBIT 4 Peer Comparison 24 Hess and Andiola Issues in Accounting Education Volume 33, Number 2, 2018 The second leg of the fraud triangle is opportunities. This condition is present whenever circumstances allow management or employees to commit and conceal fraudulent behavior (Arens et al. 2010). Many different factors create opportunities for fraud. The use of significant accounting estimates creates opportunities for earnings management and fraud, especially in the area of reserves, allowances, and depreciation (PCAOB 2016c). Difficulty in verifying estimates and valuations also creates opportunities for manipulation, particularly in areas such as intangible assets and Level 3 fair market valuations (PCAOB 2016d). In addition, fraud risks are higher when internal controls are weak or ineffective, when company policies are ambiguous or enforced unevenly, or when oversight of financial reporting is inadequate; all of these circumstances make it easier to commit and conceal fraudulent activity. Finally, transactions and financial relationships with related parties can
  • 27. create opportunities to commit and conceal fraud (PCAOB 2016b). The last leg of the fraud triangle is attitudes or rationalizations. This condition is present whenever management or employees exhibit an attitude, character, or set of ethical values that would enable committing a dishonest act (i.e., ‘‘bad apples’’) or whenever the environment imposes sufficient pressure on management or employees to cause good people to rationalize engaging in bad behavior (i.e., ‘‘bad barrels’’) (Treviño and Youngblood 1990; Arens et al. 2010). Auditors should be alert to the risk of bad apples for situations in which management has a history of being dishonest and violating laws and regulations, or a reputation for making overly aggressive or unrealistic forecasts. In these circumstances, auditors should be skeptical of management’s integrity and the veracity of their statements. Auditors also need to identify circumstances in which good people may be tempted to make bad choices. Under the right pressure(s), managers and employees can rationalize fraudulent activity as acceptable or even necessary, and thus disengage from the feelings of guilt and regret that normally prevent people from behaving dishonestly. For example, management might rationalize financial statement fraud if the act prevents the loss of jobs or the closure of the business. Employees can also rationalize stealing from a company as
  • 28. ‘‘getting what they are due’’ if they feel underpaid or underappreciated. Finally, managers might rationalize committing fraud if they suspect that competitors are doing the same. Detecting rationalization risks can be difficult, but auditors should be alert for potential indicators such as the use of euphemistic language, social norms in the company and/or industry that treat dishonesty as a part of doing business, and the tone at the top set by the company’s CEO. A CEO who explicitly values ethics and honesty and emphasizes not only results, but also the just means used to reach those results can foster ethical choices, whereas a CEO who is perceived as unethical or even ethically neutral can foster an environment in which fraud is more easily rationalized (Treviño, Hartman, and Brown 2000). By examining fraud risk factors using the three legs of the fraud triangle, auditors may develop more accurate fraud risk assessments and become better prepared to alter the nature, timing, and extent of their audit procedures to respond to these identified risks. Part I Case Requirements: Identifying Fraud Risk Factors You should work individually to complete responses to each of the assigned case requirement questions using the
  • 29. information on Tesla Motors provided above and, where noted, in the case supplements, available for download in Appendix B. Your responses should be completed before proceeding to Part II. 1. Fraud risks related to Tesla’s culture, leadership, and governance structure. a. How would you describe the ‘‘tone at the top’’ set by Tesla’s leader, Elon Musk? How do Mr. Musk’s leadership style and his ‘‘tone at the top’’ contribute to possible fraud risk at Tesla Motors? b. How would you describe the company’s culture? How might this culture create pressures and rationalizations for fraud? c. Review Tesla’s Code of Business Conduct and Ethics (see Appendix B for the link to ‘‘Tesla’s Code of Business Conduct and Ethics’’). How might any potential weaknesses in this code contribute to fraud risk at this company? d. Describe some possible concerns regarding Tesla’s board of directors. How might these concerns create opportunities and rationalizations for fraud? 2. Fraud risks related to Tesla’s incentive structures and stock performance. a. To what extent are executives and employees incentivized with shares and stock options (see Appendix B for the
  • 30. link to ‘‘Tesla’s 2015 Annual Report,’’ Item 7 Management’s Discussion and Analysis (MD&A) and Item 8 Financial Statements and Supplementary Data section, Note 10)? How do these pay structures create pressures/ incentives for fraud? b. Review Tesla’s stock performance over the last two years (refer to Exhibit 3). What fraud pressures are created by this stock performance? 3. Fraud risks related to revenue recognition at Tesla. a. What does Tesla sell and how does the company account for revenue, accounts receivable, and COGS (see ‘‘Tesla’s Fraud Risk Brainstorming at Tesla Motors 25 Issues in Accounting Education Volume 33, Number 2, 2018 2015 Annual Report,’’ Item 1 Business, Item 7 MD&A, and Item 8 Financial Statements and Supplementary Data, Note 2)? b. How might these revenue-recognition practices create opportunities, incentives, and/or rationalizations for fraud? 4. Fraud risks related to Tesla’s business and operating conditions. a. Review the business risks disclosed by the company (see Tesla’s 2015 Annual Report, Item 1A Risk Factors and
  • 31. Item 8 Financial Statements and Supplementary Data, Note 2 and Note 13). How might some of these business risks from the external environment also create fraud risks within Tesla? b. What fraud risks are posed by Tesla’s expansion plans and the company’s ability to operate as a going concern (see ‘‘Tesla’s 2015 Annual Report,’’ refer to Item 1A)? c. What related-party transactions support Tesla’s financial performance (see ‘‘Tesla’s 2015 Annual Report,’’ Item 1 Manufacturing)? How might these transactions create opportunities for fraud? 5. Fraud risks indicated by the results of preliminary analytical procedures. a. What fraud risks may be indicated by the year-to-year comparisons of Tesla’s financial statements (refer to Exhibits 1 and 2)? b. How does the company perform relative to its peers (refer to Exhibit 4)? Do these ratios and trends seem reasonable? PART II Fraud Brainstorming Session Best Practices Brainstorming refers to an idea-generation process in which multiple participants share and explore their thoughts on a
  • 32. particular topic. The brainstorming approach is advantageous in that the process can help participants identify and synergize multiple ideas and perspectives in a relatively short amount of time. However, the process is not always effective; brainstorming sessions may fail to deliver quality results for a number of reasons. Participants may consciously or unconsciously engage in ‘‘social loafing’’ and hesitate to share their ideas because they think their efforts are either less important or less identifiable (Latané, Williams, and Harkins 1979). Research shows that inexperienced auditors may be especially prone to social loafing when working in a group setting, which may cause them to produce significantly fewer and less well-developed mental simulations of possible fraud schemes (Chen, Trotman, and Zhou 2015). Fraud brainstorming sessions may also suffer process losses from ‘‘production blocking,’’ a phenomenon whereby participants lose an idea while waiting their turn and listening to others (Diehl and Stroebe 1987). Brainstorming sessions can also deteriorate due to ‘‘groupthink,’’ a phenomenon whereby a group coalesces on a single perspective rather than considering multiple ideas or points of view (Beasley and Jenkins 2003). To minimize these obstacles to effective fraud risk brainstorming, groups should use content facilitation techniques, such
  • 33. as prompts, to stimulate idea generation (Lynch, Murthy, and Engle 2009). The case requirements you completed in Part I of this case are examples of the types of prompts used by auditors in actual fraud risk brainstorming sessions. To minimize the risks of groupthink and production blocking, auditors commonly work individually to develop a list of fraud risks prior to joining the brainstorming session, and spend an average of five hours on preparing for each session (Dennis and Johnstone 2016). Brainstorming sessions can also be enhanced by following best practices (see Brazel, Carpenter, and Jenkins [2010] for a recent field study of fraud risk brainstorming activities in audit firms). These best practices include a brainstorming session that: a. is led by a partner or forensic specialist; b. includes an IT audit specialist; c. is held early in the audit process (pre-planning or audit- planning stage); d. includes extensive discussion about how management might perpetrate fraud; e. includes extensive discussion about audit responses to fraud risk; f. includes significant contributions from managers on the audit team; and
  • 34. g. includes significant contributions from the audit partner. Responding to Assessed Fraud Risks In addition to using the concept of the fraud triangle as a tool to identify fraud risks, auditors may work in their fraud risk brainstorming sessions to create a fraud risk matrix to help them better identify and respond to assessed fraud risks. A fraud risk matrix is a tool that helps auditors connect identified fraud risk factors with possible fraud schemes and the account balances that may be affected. The fraud risk matrix allows auditors to make a preliminary assessment of the likelihood and significance 26 Hess and Andiola Issues in Accounting Education Volume 33, Number 2, 2018 of such a scheme occurring within their client’s company. This then allows them to adapt the nature, timing, and extent of their planned audit procedures to respond to the more likely and/or more significant identified fraud risks. Exhibit 5 provides an example of a fraud risk matrix. Auditing standards note that determining the nature, timing, and extent of planned audit procedures is a matter of
  • 35. professional judgment. When the likelihood and/or significance of material misstatement due to fraud or error is high, the auditor should respond by planning audit procedures that will increase both the quality—that is, the reliability and relevance— and the quantity of the evidence collected (AICPA 2006). For example, when the likelihood of a particular fraud scheme is low and the significance is low (e.g., employees being paid for unworked overtime when little to no overtime was reported in the year), the audit team may decide that inquiries of associated personnel are sufficient to determine whether evidence of a material misstatement exists for the account balances affected by such a scheme. When the likelihood of a particular fraud scheme is high, but the significance is low (e.g., employees submitting false travel expense reimbursement claims for amounts not requiring a receipt), the audit team may respond with additional procedures beyond inquiries of personnel to include both tests of controls and analytical procedures, and determine whether additional substantive procedures are needed as this evidence is evaluated. However, when the potential significance of a fraud scheme is high even when the likelihood may be low (e.g.,
  • 36. members of management colluding to overstate revenue), auditors should plan for more substantive testing. Substantive testing can include observing and/or re-performing significant transactions, recalculating balances, obtaining third-party confirmations, and making physical inspections of assets and records. In response to increased risks of fraud, the timing of testing may also be adjusted to perform more testing near the end of a period rather than at an interim date. Once the fraud risk brainstorming session is complete, a member of the team is designated to document the results of the session, which include: the identified fraud risks, the potential fraud schemes and the balances that would be affected, the group’s assessment of the likelihood and significance of such schemes occurring, and the plan for adapting the nature, timing, EXHIBIT 5 Sample Fraud Risk Matrix Fraud Risk Brainstorming at Tesla Motors 27 Issues in Accounting Education Volume 33, Number 2, 2018 and/or extent of audit procedures to respond to this fraud risk assessment. This documentation may take the form of a
  • 37. memorandum that is added to the audit file. Part II Case Requirements: Conducting a Fraud Brainstorming Session In Part II of this case, you will work in a group to simulate an audit team that is conducting a fraud risk brainstorming session for Tesla Motors. Your instructor will provide you with further instructions regarding the composition of your audit team and the timing of this brainstorming session. The following case requirements will help guide your activities in this simulated brainstorming session. 1. Conducting the fraud brainstorming session. a. Share and discuss your individual responses to each of the case requirement questions from Part I. b. Work together to develop a fraud risk matrix (see Exhibit 5 for an example) that identifies the three fraud risk factors that your team believes present the greatest concern to the audit based on your team’s assessment of their likelihood and significance. Focus on those fraud risk areas that pose the greatest potential threat for a material misstatement in the financials. c. Determine how the nature, timing, and extent of the audit procedures should be altered to respond to these identified
  • 38. risks. 2. Documenting the results of the fraud brainstorming session. Document your conclusions from this brainstorming session in a memorandum for the audit file. A template for your reference is included in Appendix A. Your documentation should include: a. The date, the attendees, and the purpose of the session, as well as how long the session lasted. b. The three most concerning fraud risks at Tesla, the potential fraud schemes and account balances that would be affected, and the group’s assessment of the likelihood and significance of such schemes occurring in a fraud risk matrix (from 1b above). c. The team’s consensus (or lack thereof, if applicable) regarding the overall risk of fraud at Tesla Motors. d. The team’s plan for adapting the nature, timing, and/or extent of audit procedures to respond to this fraud risk assessment. REFERENCES American Institute of Certified Public Accountants (AICPA). 2006. Consideration of Fraud in a Financial Statement Audit. AU. Section 316. New York, NY: AICPA. Arens, I. R. J., M. S. Beasley III, and A. Alvin. 2010. Auditing
  • 39. and Assurance Services: An Integrated Approach-13/E. Englewood Cliffs, NJ: Pearson Prentice Hall. Association of Certified Fraud Examiners (ACFE). 2016. Report to the Nations on Occupational Fraud and Abuse. Available at: http:// www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf Beasley, M. S., and J. G. Jenkins. 2003. A primer for brainstorming fraud risks. Journal of Accountancy 196 (6): 32. Brazel, J. F., T. D. Carpenter, and J. G. Jenkins. 2010. Auditors’ use of brainstorming in the consideration of fraud: Reports from the field. The Accounting Review 85 (4): 1273–1301. https://doi.org/10.2308/accr.2010.85.4.1273 Carpenter, T. D. 2007. Audit team brainstorming, fraud risk identification, and fraud risk assessment: Implications of SAS No. 99. The Accounting Review 82 (5): 1119–1140. https://doi.org/10.2308/accr.2007.82.5.1119 Center for Audit Quality (CAQ). 2010. Report on Deterring and Detecting Financial Reporting Fraud: A Plan for Action. Available at: http://www.thecaq.org/deterring-and-detecting-financial- reporting-fraud Chen, C. X., K. T. Trotman, and F. Zhou. 2015. Nominal versus interacting electronic fraud brainstorming in hierarchical audit teams. The Accounting Review 90 (1): 175–198. https://doi.org/10.2308/accr-50855
  • 40. Cressey, D. R. 1953. Other People’s Money; A Study of the Social Psychology of Embezzlement. Ann Arbor, MI: Free Press: University of Michigan. Dennis, S. A., and K. M. Johnstone. 2016. A field survey of contemporary brainstorming practices. Accounting Horizons 30 (4): 449–472. https://doi.org/10.2308/acch-51503 Diehl, M., and W. Stroebe. 1987. Productivity loss in brainstorming groups: Toward the solution of a riddle. Journal of Personality and Social Psychology 53 (3): 497–509. https://doi.org/10.1037/0022-3514.53.3.497 Fehrenbacher, K. 2015. Tesla’s startup culture has big risks and rewards. Fortune.com. Available at: http://fortune.com/2015/08/21/teslas- startup-culture-musk/ Feng, M., W. Ge, S. Luo, and T. Shevlin. 2011. Why do CFOs become involved in material accounting manipulations? Journal of Accounting and Economics 51 (1-2): 21–36. https://doi.org/10.1016/j.jacceco.2010.09.005 28 Hess and Andiola Issues in Accounting Education Volume 33, Number 2, 2018 https://doi.org/10.2308/accr.2010.85.4.1273 https://doi.org/10.2308/accr.2007.82.5.1119 http://www.thecaq.org/deterring-and-detecting-financial- reporting-fraud
  • 41. https://doi.org/10.2308/accr-50855 https://doi.org/10.2308/acch-51503 https://doi.org/10.1037/0022-3514.53.3.497 http://fortune.com/2015/08/21/teslas-startup-culture-musk/ http://fortune.com/2015/08/21/teslas-startup-culture-musk/ https://doi.org/10.1016/j.jacceco.2010.09.005 Fields, T. D., T. Z. Lys, and L. Vincent. 2001. Empirical research on accounting choice. Journal of Accounting and Economics 31 (1-3): 255–307. https://doi.org/10.1016/S0165-4101(01)00028-3 Harris, J., and P. Bromiley. 2007. Incentives to cheat: The influence of executive compensation and firm performance on financial misrepresentation. Organization Science 18 (3): 350–367. https://doi.org/10.1287/orsc.1060.0241 Healy, P. M., and J. M. Wahlen. 1999. A review of the earnings management literature and its implications for standard setting. Accounting Horizons 13 (4): 365–383. https://doi.org/10.2308/acch.1999.13.4.365 International Federation of Accountants (IFAC). 2008. The Auditor’s Responsibilities Relating to Fraud in an Audit of Financial Statements. IAS 240. Available at: http://www.ifac.org/system/files/downloads/a012-2010-iaasb- handbook-isa-240.pdf KPMG. 2013. Integrity Survey 2013. Available at: http://www.kpmg-institutes.com/institutes/advisory- institute/articles/2013/07/integrity- survey-2013.html
  • 42. Latané, B., K. Williams, and S. Harkins. 1979. Many hands make light the work: The causes and consequences of social loafing. Journal of Personality and Social Psychology 37 (6): 822–832. https://doi.org/10.1037/0022-3514.37.6.822 Lynch, A. L., U. S. Murthy, and T. J. Engle. 2009. Fraud brainstorming using computer-mediated communication: The effects of brainstorming technique and facilitation. The Accounting Review 84 (4): 1209–1232. https://doi.org/10.2308/accr.2009.84.4.1209 MacLean, T. L. 2008. Framing and organizational misconduct: A symbolic interactionist study. Journal of Business Ethics 78 (1–2): 3– 16. https://doi.org/10.1007/s10551-006-9324-x Mishina, Y., B. J. Dykes, E. S. Block, and T. G. Pollock. 2010. Why ‘‘good’’ firms do bad things: The effects of high aspirations, high expectations, and prominence on the incidence of corporate illegality. Academy of Management Journal 53 (4): 701–722. https:// doi.org/10.5465/AMJ.2010.52814578 PricewaterhouseCoopers (PwC). 2015. Data Driven: What Students Need to Succeed in a Rapidly Changing Business World. Available at: https://www.pwc.com/us/en/faculty-resource/assets/pwc- data-driven-paper-feb2015.pdf Public Company Accounting Oversight Board (PCAOB). 2016a. Consideration of Fraud in a Financial Statement Audit. AS
  • 43. 2401. Washington, DC: PCAOB. Public Company Accounting Oversight Board (PCAOB). 2016b. Related Parties. AS 2410. Washington, DC: PCAOB. Public Company Accounting Oversight Board (PCAOB). 2016c. Auditing Accounting Estimates. AS 2501. Washington, DC: PCAOB. Public Company Accounting Oversight Board (PCAOB). 2016d. Auditing Fair Value Measurements and Disclosures. AS 2502. Washington, DC: PCAOB. Ramos, M. 2003. Auditors’ responsibility for fraud detection. Journal of Accountancy 195 (1): 28–36. Sage, A. 2016. Tesla investor group wants more independent board, cites Musk ties. Reuters (June 28). Available at: http://www.reuters. com/article/us-solarcity-m-a-tesla-idUSKCN0ZE2ZL Smith, A. 2014. Who is Elon Musk? Tech Billionaire, SpaceX Cowboy, Tesla Pioneer—and Real Life Iron Man. The Telegraph (January 4). Available at: http://www.telegraph.co.uk/technology/news/10544247/Meet- tech-billionaire-and-real-life-Iron-Man-Elon-Musk. html Taylor, A., III. 2013. 9 Questions for Tesla’s Elon Musk. Fortune (June 12). Available at: http://fortune.com/2013/06/12/9-questions-for- teslas-elon-musk/ Telsa Motors. 2015. About Tesla. Palo Alto, CA: Tesla Motors;
  • 44. Available at: https://www.teslamotors.com/about Telsa Motors. 2016a. Corporate Governance Guidelines. Palo Alto, CA: Tesla Motors. Available at: http://ir.tesla.com/corporate- governance-document.cfm?DocumentID¼14836 Telsa Motors. 2016b. Tesla Motors Inc 2015 Annual Report. Palo Alto, CA: Tesla Motors. Available at: http://files.shareholder.com/ downloads/ABEA-4CW8X0/1651466307x0xS1564590-16- 13195/1318605/filing.pdf Treviño, L. K., and S. A. Youngblood. 1990. Bad apples in bad barrels: A causal analysis of ethical decision-making behavior. The Journal of Applied Psychology 75 (4): 378–385. https://doi.org/10.1037/0021-9010.75.4.378 Treviño, L. K., L. P. Hartman, and M. Brown. 2000. Moral person and moral manager: How executives develop a reputation for ethical leadership. California Management Review 42 (4): 128–142. https://doi.org/10.2307/41166057 Zhang, X., K. M. Bartol, K. G. Smith, M. D. Pfarrer, and D. M. Khanin. 2008. CEOs on the edge: Earnings manipulation and stock-based incentive misalignment. Academy of Management Journal 51 (2): 241–258. https://doi.org/10.5465/AMJ.2008.31767230 APPENDIX A Memo Template to Document the Results of a Fraud Brainstorming Session
  • 45. Date: [DATE OF SESSION] Participants: [NAME OF ALL SESSION PARTICIPANTS] Length of Session: [TIME IN HOURS_MINUTES] Purpose of the Session: [FILL IN] Fraud Risk Brainstorming at Tesla Motors 29 Issues in Accounting Education Volume 33, Number 2, 2018 https://doi.org/10.1016/S0165-4101(01)00028-3 https://doi.org/10.1287/orsc.1060.0241 https://doi.org/10.2308/acch.1999.13.4.365 http://www.ifac.org/system/files/downloads/a012-2010-iaasb- handbook-isa-240.pdf http://www.kpmg-institutes.com/institutes/advisory- institute/articles/2013/07/integrity-survey-2013.html http://www.kpmg-institutes.com/institutes/advisory- institute/articles/2013/07/integrity-survey-2013.html https://doi.org/10.1037/0022-3514.37.6.822 https://doi.org/10.2308/accr.2009.84.4.1209 https://doi.org/10.1007/s10551-006-9324-x https://doi.org/10.5465/AMJ.2010.52814578 https://doi.org/10.5465/AMJ.2010.52814578 https://www.pwc.com/us/en/faculty-resource/assets/pwc-data- driven-paper-feb2015.pdf http://www.reuters.com/article/us-solarcity-m-a-tesla- idUSKCN0ZE2ZL http://www.reuters.com/article/us-solarcity-m-a-tesla- idUSKCN0ZE2ZL http://www.telegraph.co.uk/technology/news/10544247/Meet- tech-billionaire-and-real-life-Iron-Man-Elon-Musk.html http://www.telegraph.co.uk/technology/news/10544247/Meet- tech-billionaire-and-real-life-Iron-Man-Elon-Musk.html http://fortune.com/2013/06/12/9-questions-for-teslas-elon-musk/ http://fortune.com/2013/06/12/9-questions-for-teslas-elon-musk/
  • 46. https://www.teslamotors.com/about http://ir.tesla.com/corporate-governance- document.cfm?DocumentID=14836 http://ir.tesla.com/corporate-governance- document.cfm?DocumentID=14836 http://ir.tesla.com/corporate-governance- document.cfm?DocumentID=14836 http://files.shareholder.com/downloads/ABEA- 4CW8X0/1651466307x0xS1564590-16- 13195/1318605/filing.pdf http://files.shareholder.com/downloads/ABEA- 4CW8X0/1651466307x0xS1564590-16- 13195/1318605/filing.pdf https://doi.org/10.1037/0021-9010.75.4.378 https://doi.org/10.2307/41166057 https://doi.org/10.5465/AMJ.2008.31767230 Part A—Assessment of Fraud Risks [INSERT FRAUD MATRIX HERE] Part B—Overall Fraud Risk Assessment As a group, how would you rate the overall potential of a risk of material misstatement due to fraud at this client (e.g., low risk, moderate risk, or high risk)? Provide justification for your assessment and note any dissension about this assessment among the team members, if applicable. Part C—Planning the Nature, Timing, and Extent of Procedures Based on the identified fraud risk factors and the level of assessed fraud at this client, how would your group modify the
  • 47. nature, timing, and/or extent of the planned audit procedures? Discuss at least three audit procedures that should be performed on this audit in response to the fraud risk factors identified above. Your group should try to be as specific as possible (i.e., the account(s) that you would focus on, the procedure(s) you may perform, and when you would perform the procedure). 1. [FILL IN] 2. [FILL IN] 3. [FILL IN] APPENDIX B iace-51973_ Tesla’s Code of Business Conduct and Ethics: http://dx.doi.org/10.2308/iace-51973.s01 iace-51973_ Tesla’s 2015 Annual Report: http://dx.doi.org/10.2308/iace-51973.s02 30 Hess and Andiola Issues in Accounting Education Volume 33, Number 2, 2018 http://dx.doi.org/10.2308/iace-51973.s01 http://dx.doi.org/10.2308/iace-51973.s02 CASE LEARNING OBJECTIVES AND IMPLEMENTATION GUIDANCE
  • 48. This instructional case involves identifying fraud risk factors at a public company and conducting a fraud risk brainstorming session, consistent with the guidance under AS 2401, Consideration of Fraud in a Financial Statement Audit. We see the instructional value of this case as two-fold. Not only does the case incorporate important auditing and forensic concepts like assessing fraud risk and applying the fraud triangle, but also the case gives students first-hand experience with conducting a fraud risk brainstorming session in a team environment and documenting this process. While there are a number of cases published in the last 15 years that focus on the issue of identifying fraud risk factors and responding to fraud risks (e.g., Agoglia, Brown, and Hanno 2003; Ballou and Mueller 2005; Owhoso and Weickgenannt 2010; Gifford and Howe 2011; Rufus and Hahn 2011; Dickins and Reisch 2012; Dee, Durtschi, and Mindak 2014), we are not aware of any instructional cases that combine fraud risk assessment with guidance on how to conduct and document a fraud risk brainstorming session. Students also indicated that they found this case to be realistic and enjoyed learning about these concepts in the context of this popular company.
  • 49. Learning Objectives There are five learning objectives for this case: 1. To recognize the factors that contribute to financial statement fraud risk (Part I). 2. To identify and evaluate the likelihood and severity of fraud risks for a particular organization (Part I). 3. To analyze the ways that fraud risks can lead to material misstatements in the financial statements (Parts I and II). 4. To understand the purpose of and how to conduct a fraud brainstorming session as a team (Part II). 5. To develop audit procedures that respond to assessed fraud risks (Part II). Implementation Guidance This case is designed for use in either undergraduate- or graduate-level courses that feature an emphasis on fraud risk assessments or assurance (e.g., auditing, fraud, forensic accounting). This case offers students the opportunity to explore the fraud risk assessment process and to participate in a simulated fraud brainstorming session. To be most effective and more closely simulate an actual fraud brainstorming session, we recommend that Part I of the case be completed by students individually as a take-home assignment. Instructors will need to
  • 50. provide students with the case document in order for them to complete Part I. Students should turn in Part I as an individual assignment (Deliverable 1), and then use their responses from Part I as inputs for the brainstorming session in Part II. Students report spending approximately 3.5 hours to complete all of the case requirement questions in Part I. To minimize the time required, instructors may choose to divide the case requirements among the students (e.g., half of the students complete case Requirements 1 and 2 (six questions) and the other half complete case Requirements 3 through 5 (seven questions). Before moving to Part II, we encourage instructors to dedicate some class time (10–15 minutes) to review student responses to Part I and explain the tasks and deliverables associated with Part II. More guidance on discussing the key concepts of this case is provided in the Teaching Notes. For Part II of the case, instructors will need to group students into small audit teams (‘‘investigation teams’’ if using in a forensic accounting class) to hold a fraud risk brainstorming session. The instructor will also need to provide students with guidance on when they should hold their brainstorming session and how long they should spend brainstorming. We recommend that students dedicate no more than one hour to the brainstorming session and reserve one to two hours for
  • 51. documenting their results (Deliverable 2). We suggest that Part II be completed as a take-home group assignment, but instructors also could complete Part II of the case as an in-class activity. Following the completion and documentation of the team brainstorming sessions, we recommend that instructors lead a class discussion of the key learning objectives from the case (about 30 minutes). Guidance on these topics and solutions are available in the Teaching Notes. This discussion should highlight some of the challenges of (1) assessing fraud risk factors, (2) conducting effective brainstorming sessions, and (3) linking risk factors to appropriate audit responses. Through this discussion, instructors can elicit observations from the students on the effectiveness of their brainstorming session, as well as specific examples of the fraud risk factors documented in their fraud risk matrices and the suggested audit procedures to reduce these risks. Customizing the Case The usage of this case can vary somewhat depending on the specific student audience. The instructor can tailor the difficulty of the case and the focus of the case depending on the knowledge and skill level of the students, as well as the focus
  • 52. Fraud Risk Brainstorming at Tesla Motors 31 Issues in Accounting Education Volume 33, Number 2, 2018 of the class (i.e., auditing versus fraud). To increase the difficulty of the case, instructors can implement one or more of the following ideas: � Assign additional readings from the academic literature related to financial statement fraud risks (e.g., MacLean 2008; Mishina, Dykes, Block, and Pollock 2010) or fraud brainstorming (e.g., Brazel, Carpenter, and Jenkins 2010; Dennis and Johnstone 2016). As part of the class discussion of the key learning objectives, the instructor can facilitate a dialogue on the findings taken from the academic research literature. � Assign additional analytical procedures for Part I, such as the calculation of Beneish’s (1997) ‘‘M-Score’’ for Tesla. Instructors may find Wells’ (2001) article ‘‘Irrational Ratios’’ helpful in guiding students’ efforts to calculate and interpret Beneish’s M-Score. � Increase the number of fraud risks documented in the fraud risk matrix and the number of audit procedures described in the memorandum of the fraud brainstorming session. To simplify the case, instructors can implement one or more of the following ideas:
  • 53. � Allow students to work in groups of two to complete Part I. � Remove the case requirement in Part II that requires students to identify the nature, timing, and extent of audit procedures. � Conduct Part II as a class activity with the entire class participating in the session as one team. Evidence of Efficacy To assess the effectiveness of the case, we tested it in five undergraduate audit classes (185 students) and two graduate fraud classes (39 students) at three public and two private universities (four independent instructors and one author). Pre- and post-test surveys were Institutional Review Board (IRB) approved, were formatted similarly to those in Worrell (2010) and Dow, Watson, and Shea (2013), and were administered using comparable procedures to avoid any potential demand effects. The pre-test survey was administered a few days prior to assigning the case. Students were informed that the survey was to assess their knowledge and comfort level with specific course- related topics, that it was entirely voluntary, and that all responses would remain anonymous. The post-test survey was administered on the submission date of the completed Deliverable 2.
  • 54. The questions used in the survey, the pre-test and post-test means, and significance levels are presented in Table 1, Panel A. In addition, Table 1, Panel B presents the results of several additional questions asked after completion of the case. To assess the case’s impact on students’ knowledge, we asked students six questions before and after case completion that dealt with their understanding of the key learning objectives of the case.1 Table 1, Panel A shows that the case significantly increased students’ knowledge of fraud risk factors and fraud brainstorming sessions (p , 0.001, two-tailed in both). In addition, the case made students more comfortable with applying the fraud triangle, creating a fraud risk matrix, adapting audit procedures, and conducting a fraud brainstorming session (p , 0.001, two-tailed for all). In addition, Table 1, Panel B indicates that students perceived the case to be a realistic scenario (77.0 percent agree or strongly agree), that was interesting (75.8 percent agree or strongly agree), and provided a positive learning experience (78.2 percent agree or strongly agree). In addition, students felt that the case required them to think critically (80.6 percent agree or strongly agree) and apply their professional skepticism (78.2 percent agree or strongly agree). We also asked students to provide verbal feedback about the case. An overwhelming
  • 55. number of responses indicated that students liked that the case used a real, recognizable, and current company, with real data and information. For example, one student commented that ‘‘the issues Tesla faces are realistic issues that auditors have to be able to analyze and assess for any company.’’ In addition, several students pointed out that they liked conducting the actual brainstorming session to be able to pool their ideas and better understand how the session would work in practice. Thus, the case appears to provide a realistic learning environment to help students prepare for procedures they will be asked to do in audit practice. TEACHING NOTES Teaching Notes are available only to non-student-member subscribers to Issues in Accounting Education through the American Accounting Association’s electronic publications system at http://aaapubs.org/. Non-student-member subscribers should use their usernames and passwords for entry into the system where the Teaching Notes can be reviewed and printed. Please do not make the Teaching Notes available to students or post them on websites. 1 We investigated whether the responses differed by level (i.e., undergraduate, graduate), but results were quantitatively similar. Therefore, the combined results are presented in Table 1. 32 Hess and Andiola
  • 56. Issues in Accounting Education Volume 33, Number 2, 2018 http://aaapubs.org/ If you are a non-student-member of AAA with a subscription to Issues in Accounting Education and have any trouble accessing this material, then please contact the AAA headquarters office at [email protected] or (941) 921-7747. REFERENCES Agoglia, C. P., K. F. Brown, and D. M. Hanno. 2003. Dickinson Technologies, Inc.: Assessing control environment and fraud risk. Issues in Accounting Education 18 (1): 71–78. https://doi.org/10.2308/iace.2003.18.1.71 Ballou, B., and J. M. Mueller. 2005. Helecom communications: Considering fraud risk on an engagement before and after analyzing a key business process. Issues in Accounting Education 20 (1): 99– 118. https://doi.org/10.2308/iace.2005.20.1.99 TABLE 1 Student Learning Perceptions Panel A: Questions Asked Before and After Case Completion Survey Item
  • 57. Pre-Case Mean (SD) Post-Case Mean (SD) t-statistic 1. Rate your level of knowledge of identifying fraud risk factors of an organization. 3.34 4.70 10.7*** (1.26) (1.11) 2. Rate how comfortable you feel applying the fraud triangle to identify fraud risk factors. 3.66 4.98 10.0*** (1.35) (1.09) 3. Rate your level of knowledge of the purpose of fraud brainstorming sessions. 3.34 5.10 12.8*** (1.38) (1.16) 4. Rate how comfortable you feel creating a fraud risk matrix. 2.64 4.52 14.8*** (1.20) (1.17) 5. Rate how comfortable you feel adapting audit procedures to respond to assessed fraud risks. 3.23 4.41 9.3*** (1.24) (1.13) 6. Rate how comfortable you feel conducting a fraud brainstorming session. 3.08 4.91 14.0***
  • 58. (1.32) (1.09) Panel B: Questions Asked After Case Completion Survey Item Strongly Disagree 1 Disagree 2 Somewhat Disagree 3 Neutral 4 Somewhat Agree 5 Agree 6 Strongly Agree 7 Mean
  • 59. (SD) This case represents a realistic scenario. 0.0% 0.0% 1.2% 4.8% 17.0% 39.4% 37.6% 6.07 (0) (0) (2) (8) (28) (65) (62) (0.92) The case encouraged me to think critically about the factors that contribute to fraud risk. 0.0% 0.6% 0.6% 4.3% 13.9% 49.1% 31.5% 6.04 (0) (1) (1) (7) (23) (81) (52) (0.91) The case encouraged me to apply professional skepticism. 0.0% 0.0% 0.0% 4.8% 17.0% 46.7% 31.5% 6.05 (0) (0) (0) (8) (28) (77) (52) (0.83) I found the case interesting. 0.0% 0.0% 4.8% 3.6% 15.8% 46.7% 29.1% 5.92 (0) (0) (8) (6) (26) (77) (48) (1.02) The case was a positive learning experience. 0.0% 0.6% 2.4% 6.7% 12.1% 45.5% 32.7% 5.98 (0) (1) (4) (11) (20) (75) (54) (1.02) ***Signifies p , 0.001.
  • 60. Panel A presents results of a pre-case and post-case comparison of a set of six questions. Responses were provided on a series of seven-point scales with 1 labeled ‘‘low knowledge’’ and ‘‘highly uncomfortable’’ and 7 labeled ‘‘high knowledge’’ and ‘‘highly comfortable’’ (for questions 1 and 3, and 2, 4–6, respectively). The pre-case data includes 185 (146 undergraduate and 39 graduate) students and the post-case data includes 165 (132 undergraduate and 33 graduate) students. Panel B presents results of five additional post-case questions. Responses were provided on a series of seven-point scales with 1 labeled ‘‘strongly disagree’’ and 7 labeled ‘‘strongly agree.’’ Fraud Risk Brainstorming at Tesla Motors 33 Issues in Accounting Education Volume 33, Number 2, 2018 mailto:[email protected] https://doi.org/10.2308/iace.2003.18.1.71 https://doi.org/10.2308/iace.2005.20.1.99 Beneish, M. D. 1997. Detecting GAAP violation: Implications for assessing earnings management among firms with extreme financial performance. Journal of Accounting and Public Policy 16 (3): 271–309. https://doi.org/10.1016/S0278-4254(97)00023-9 Brazel, J. F., T. D. Carpenter, and J. G. Jenkins. 2010. Auditors’ use of brainstorming in the consideration of fraud: Reports from the field. The Accounting Review 85 (4): 1273–1301.
  • 61. https://doi.org/10.2308/accr.2010.85.4.1273 Dee, C., C. Durtschi, and M. P. Mindak. 2014. Grand Teton Candy Company: Connecting the dots in a fraud investigation. Issues in Accounting Education 29 (3): 443–458. https://doi.org/10.2308/iace-50763 Dennis, S. A., and K. M. Johnstone. 2016. A field survey of contemporary brainstorming practices. Accounting Horizons 30 (4): 449–472. https://doi.org/10.2308/acch-51503 Dickins, D., and J. T. Reisch. 2012. Enhancing auditors’ ability to identify opportunities to commit fraud: Instructional resource cases. Issues in Accounting Education 27 (4): 1153–1169. https://doi.org/10.2308/iace-50178 Dow, K. E., M. W. Watson, and V. J. Shea. 2013. Understanding the links between audit risks and audit steps: The case of procurement cards. Issues in Accounting Education 28 (4): 913–921. https://doi.org/10.2308/iace-50508 Gifford, R. H., and H. Howe. 2011. Relating operational and financial factors to assess risk and identify fraud in an operational setting. Issues in Accounting Education 26 (2): 361–376. https://doi.org/10.2308/iace-10021 MacLean, T. L. 2008. Framing and organizational misconduct: A symbolic interactionist study. Journal of Business Ethics 78 (1–2): 3– 16. https://doi.org/10.1007/s10551-006-9324-x
  • 62. Mishina, Y., B. J. Dykes, E. S. Block, and T. G. Pollock. 2010. Why ‘‘good’’ firms do bad things: The effects of high aspirations, high expectations, and prominence on the incidence of corporate illegality. Academy of Management Journal 53 (4): 701–722. https:// doi.org/10.5465/AMJ.2010.52814578 Owhoso, V., and A. Weickgenannt. 2010. Vinand Petroleum, Inc.: Initial audit engagement and fraud risk case for a specialized industry. Issues in Accounting Education 25 (2): 331–346. https://doi.org/10.2308/iace.2010.25.2.331 Rufus, R. J., and W. Hahn. 2011. Mountain State Sporting Goods: A case of fraud? A case study in fraud examination. Issues in Accounting Education 26 (1): 201–217. https://doi.org/10.2308/iace.2011.26.1.201 Wells, J. T. 2001. Irrational ratios. Journal of Accountancy 192 (2): 80–83. Worrell, J. L. 2010. Blazer communications: A procurement audit simulation. Issues in Accounting Education 25 (3): 527– 546. https:// doi.org/10.2308/iace.2010.25.3.527 34 Hess and Andiola Issues in Accounting Education Volume 33, Number 2, 2018 https://doi.org/10.1016/S0278-4254(97)00023-9 https://doi.org/10.2308/accr.2010.85.4.1273
  • 63. https://doi.org/10.2308/iace-50763 https://doi.org/10.2308/acch-51503 https://doi.org/10.2308/iace-50178 https://doi.org/10.2308/iace-50508 https://doi.org/10.2308/iace-10021 https://doi.org/10.1007/s10551-006-9324-x https://doi.org/10.5465/AMJ.2010.52814578 https://doi.org/10.5465/AMJ.2010.52814578 https://doi.org/10.2308/iace.2010.25.2.331 https://doi.org/10.2308/iace.2011.26.1.201 https://doi.org/10.2308/iace.2010.25.3.527 https://doi.org/10.2308/iace.2010.25.3.527 Code of Business Conduct and Ethics (Adopted by the Board of Directors on May 20, 2010) Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not cover every issue that may arise, but it sets out basic principles to guide all employees, directors and officers of Tesla Motors, Inc, (the "Company"). All of our employees, directors and officers must conduct themselves accordingly and seek to avoid even the appearance of improper behavior. The Code should also be provided to and followed by the Company's agents and representatives, including consultants. If a law conflicts with a policy in this Code, you must comply with the law. If you have any questions about these conflicts, you should ask your supervisor how to handle the situation.
  • 64. Those who violate the standards in this Code will be subject to disciplinary action, up to and including termination of employment. If you are in a situation which you believe may violate or lead to a violation of this Code, follow the guidelines described in Section 14 of this Code. 1. Compliance with Laws, Rules and Regulations Obeying the law, both in letter and in spirit, is the foundation on which this Company's ethical standards are built. All employees must respect and obey the laws of the cities, states and countries in which we operate. Although not all employees are expected to know the details of these laws, it is important to know enough to determine when to seek advice from supervisors, managers or other appropriate personnel. If requested, the Company will hold information and training sessions to promote compliance with laws, rules and regulations, including insider-trading laws. 2. Conflicts of Interest A "conflict of interest" exists when a person's private interest interferes, or appears to interfere, in any way with the interests of the Company. A conflict situation can arise when an employee, officer or director takes actions or has interests that may make it difficult to perform his or her Company work objectively and effectively. Conflicts of interest may also arise when an employee, officer or director, or members of his or her family, receives improper personal benefits as a result of his or her position in
  • 65. the Company. Loans to, or guarantees of obligations of, employees and their family members may create conflicts of interest. It is almost always a conflict of interest for a Company employee to work simultaneously for a competitor, customer or supplier. You are not allowed to work for a competitor as a consultant or board member. The best policy is to avoid any direct or indirect business connection with our customers, suppliers or competitors, except on our behalf. Conflicts of interest are prohibited as a matter of Company policy, except under guidelines approved by the Board of Directors. Conflicts of interest may not always be clear-cut, so if you have a question, you should consult with higher levels of management or the Company's Legal Department. Any employee, officer or director who becomes aware of a conflict or potential conflict should bring it to the attention of a supervisor, manager or other appropriate personnel or consult the procedures described in Section 14 of this Code. 3. Insider Trading Employees who have access to confidential information are not permitted to use or share that information for stock trading purposes or for any other purpose except the conduct of our business. All non-public information about the Company should be considered confidential information. To use non-public information for personal financial benefit or to "tip" others who might make an investment decision on the basis of this information is not only unethical but also illegal. In order to assist with compliance with laws against insider trading, the Company has adopted a specific policy governing employees' trading in securities of the Company. This policy has been distributed to
  • 66. every employee. If you have any questions, please consult the Company's Legal Department. 4. Corporate Opportunities Employees, officers and directors are prohibited from taking for themselves personally opportunities that are discovered through the use of corporate property, information or position without the consent of the Board of Directors. No employee may use corporate property, information, or position for improper personal gain, and no employee may compete with the Company directly or indirectly. Employees, officers and directors owe a duty to the Company to advance its legitimate interests when the opportunity to do so arises. 5. Competition and Fair Dealing We seek to outperform our competition fairly and honestly. Stealing proprietary information, possessing trade secret information that was obtained without the owner's consent, or inducing such disclosures by past or present employees of other companies is prohibited. Each employee, officer and director should endeavor to respect the rights of and deal fairly with the Company's customers, suppliers, competitors and employees. No employee, officer or director should take unfair advantage of anyone through manipulation, concealment, abuse of privileged information, misrepresentation of material facts, or any other intentional unfair-dealing practice. The purpose of business entertainment and gifts in a commercial setting is to create good will and sound working relationships,
  • 67. not to gain unfair advantage with customers. No gift or entertainment should ever be offered, given, provided or accepted by any Company employee, family member of an employee or agent unless it: (1) is not a cash gift, (2) is consistent with customary business practices, (3) is not excessive in value, (4) cannot be construed as a bribe or payoff and (5) does not violate any laws or regulations. Please discuss with your supervisor any gifts or proposed gifts which you are not certain are appropriate. 6. Discrimination and Harassment The diversity of the Company's employees is a tremendous asset. We are firmly committed to providing equal opportunity in all aspects of employment and will not tolerate any illegal discrimination or harassment of any kind. Examples include derogatory comments based on racial or ethnic characteristics and unwelcome sexual advances. 7. Health and Safety The Company strives to provide each employee with a safe and healthy work environment. Each employee has responsibility for maintaining a safe and healthy workplace for all employees by following safety and health rules and practices and reporting accidents, injuries and unsafe equipment, practices or conditions. Violence and threatening behavior are not permitted. Employees should report to work in condition to perform their duties, free from the influence of illegal drugs or alcohol. The use of illegal drugs in the workplace will not be tolerated.
  • 68. 8. Record-Keeping The Company requires honest and accurate recording and reporting of information in order to make responsible business decisions. For example, only the true and actual number of hours worked should be reported. Many employees regularly use business expense accounts, which must be documented and recorded accurately. If you are not sure whether a certain expense is legitimate, ask your supervisor or your controller. All of the Company's books, records, accounts and financial statements must be maintained in reasonable detail, must appropriately reflect the Company's transactions and must conform both to applicable legal requirements and to the Company's system of internal controls. Unrecorded or "off the books" funds or assets should not be maintained unless permitted by applicable law or regulation. Business records and communications often become public, and we should avoid exaggeration, derogatory remarks, guesswork, or inappropriate characterizations of people and companies that can be misunderstood. This applies equally to e- mail, internal memos, and formal reports. Records should always be retained or destroyed according to the Company's record retention policies. In accordance with those policies, in the event of litigation or governmental investigation please consult the Company's Legal Department. 9. Confidentiality
  • 69. Employees, officers and directors must maintain the confidentiality of confidential information entrusted to them by the Company or its customers, except when disclosure is authorized by the Legal Department or required by laws or regulations. Confidential information includes all non-public information that might be of use to competitors, or harmful to the Company or its customers, if disclosed. It also includes information that suppliers and customers have entrusted to us. The obligation to preserve confidential information continues even after employment ends. In connection with this obligation, every employee should have executed a confidentiality agreement when he or she began his or her employment with the Company. 10. Protection and Proper Use of Company Assets All employees, officers and directors should endeavor to protect the Company's assets and ensure their efficient use. Theft, carelessness, and waste have a direct impact on the Company's profitability. Any suspected incident of fraud or theft should be immediately reported for investigation. Company equipment should not be used for non-Company business, though incidental personal use may be permitted. The obligation of employees to protect the Company's assets includes its proprietary information. Proprietary information includes intellectual property such as trade secrets, patents, trademarks, and copyrights, as well as business, marketing and service plans, engineering and manufacturing ideas, designs, databases, records, salary information and any unpublished
  • 70. financial data and reports. Unauthorized use or distribution of this information would violate Company policy. It could also be illegal and result in civil or even criminal penalties. 11. Payments to Government Personnel The U.S. Foreign Corrupt Practices Act prohibits giving anything of value, directly or indirectly, to officials of foreign governments or foreign political candidates in order to obtain or retain business. It is strictly prohibited to make illegal payments to government officials of any country. In addition, the U.S. government has a number of laws and regulations regarding business gratuities which may be accepted by U.S. government personnel. The promise, offer or delivery to an official or employee of the U.S. government of a gift, favor or other gratuity in violation of these rules would not only violate Company policy but could also be a criminal offense. State and local governments, as well as foreign governments, may have similar rules. The Company's Legal Department can provide guidance to you in this area. 12. Waivers of the Code of Business Conduct and Ethics Any waiver of this Code for executive officers or directors may be made only by the Board of Directors and will be promptly disclosed, along with the reasons for the waiver, as required by law or stock exchange regulation. 13. Reporting any Illegal or Unethical Behavior Employees are encouraged to talk to supervisors, managers or other appropriate personnel about observed illegal or unethical behavior and when in doubt about the best course of action in a particular situation. It is the policy of the Company not to allow
  • 71. retaliation for reports of misconduct by others made in good faith by employees. Employees are expected to cooperate in internal investigations of misconduct. Any employee may submit a good faith concern regarding questionable accounting or auditing matters without fear of dismissal or retaliation of any kind. 14. Compliance Procedures We must all work to ensure prompt and consistent action against violations of this Code. However, in some situations it is difficult to know if a violation has occurred. Since we cannot anticipate every situation that will arise, it is important that we have a way to approach a new question or problem. These are the steps to keep in mind: ● Make sure you have all the facts. In order to reach the right solutions, we must be as fully informed as possible. ● Ask yourself: What specifically am I being asked to do? Does it seem unethical or improper? This will enable you to focus on the specific question you are faced with, and the alternatives you have. Use your judgment and common sense; if something seems unethical or improper, it probably is. ● Clarify your responsibility and role. In most situations, there is shared responsibility. Are your colleagues informed? It may help to get others involved and discuss the problem. ● Discuss the problem with your supervisor. This is the basic guidance for all situations. In many cases, your supervisor will be more knowledgeable about the question, and will appreciate being brought into the decision-making process.
  • 72. Remember that it is your supervisor's responsibility to help solve problems. ● Seek help from Company resources. In the rare case where it may not be appropriate to discuss an issue with your supervisor, or where you do not feel comfortable approaching your supervisor with your question, discuss it locally with your office manager or your Human Resources manager. ● You may report ethical violations in confidence and without fear of retaliation. If your situation requires that your identity be kept secret, your anonymity will be protected. The Company does not permit retaliation of any kind against employees for good faith reports of ethical violations. ● Always ask first, act later: If you are unsure of what to do in any situation, seek guidance before you act. CODE OF ETHICS FOR CEO AND SENIOR FINANCIAL OFFICERS The Company has a Code of Business Conduct and Ethics applicable to all directors and employees of the Company. The CEO and all senior financial officers, including the CFO and principal accounting officer, are bound by the provisions set forth therein relating to ethical conduct, conflicts of interest and compliance with law. In addition to the Code of Business Conduct and Ethics, the CEO and senior financial officers are subject to the following additional specific policies: 1. The CEO and all senior financial officers are responsible for
  • 73. full, fair, accurate, timely and understandable disclosure in the periodic reports required to be filed by the Company with the SEC. Accordingly, it is the responsibility of the CEO and each senior financial officer promptly to bring to the attention of the Disclosure Committee any material information of which he or she may become aware that affects the disclosures made by the Company in its public filings or otherwise assist the Disclosure Committee in fulfilling its responsibilities as specified in the Company's Disclosure Controls and Procedures Policy. 2. The CEO and each senior financial officer shall promptly bring to the attention of the Disclosure Committee and the Audit Committee any information he or she may have concerning (a) significant deficiencies in the design or operation of internal controls which could adversely affect the Company's ability to record, process, summarize and report financial data or (b) any fraud, whether or not material, that involves management or other employees who have a significant role in the Company's financial reporting, disclosures or internal controls. 3. The CEO and each senior financial officer shall promptly bring to the attention of the General Counsel or the Legal Department or the CEO and to the Audit Committee any information he or she may have concerning any violation of the Company's Code of Business Conduct and Ethics, including any actual or apparent conflicts of interest between personal and professional relationships, involving any management or other employees who have a significant role in the Company's financial reporting, disclosures or internal controls. 4. The CEO and each senior financial officer shall promptly bring to the attention of the General Counsel or the Legal Department or the CEO and to the Audit Committee any
  • 74. information he or she may have concerning evidence of a material violation of the securities or other laws, rules or regulations applicable to the Company and the operation of its business, by the Company or any agent thereof, or of violation of the Code of Business Conduct and Ethics or of these additional procedures. 5. The Board of Directors shall determine, or designate appropriate persons to determine, appropriate actions to be taken in the event of violations of the Code of Business Conduct and Ethics or of these additional procedures by the CEO and the Company's senior financial officers. Such actions shall be reasonably designed to deter wrongdoing and to promote accountability for adherence to the Code of Business Conduct and Ethics and to these additional procedures, and shall include written notices to the individual involved that the Board has determined that there has been a violation, censure by the Board, demotion or re-assignment of the individual involved, suspension with or without pay or benefits (as determined by the Board) and termination of the individual's employment. In determining what action is appropriate in a particular case, the Board of Directors or such designee shall take into account all relevant information, including the nature and severity of the violation, whether the violation was a single occurrence or repeated occurrences, whether the violation appears to have been intentional or inadvertent, whether the individual in question had been advised prior to the violation as to the proper course of action and whether or not the individual in question had committed other violations in the past.
  • 75. TESLA MOTORS INC FORM 10-K (Annual Report) Filed 02/24/16 for the Period Ending 12/31/15 Address 3500 DEER CREEK RD PALO ALTO, CA 94070 Telephone 650-681-5000 CIK 0001318605 Symbol TSLA SIC Code 3711 - Motor Vehicles and Passenger Car Bodies Industry Auto & Truck Manufacturers Sector Consumer Cyclical Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2016, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. http://www.edgar-online.com UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549
  • 76. FORM 10-K (Mark One) x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2015 OR ¨ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number: 001-34756 Tesla Motors, Inc. (Exact name of registrant as specified in its charter) Delaware 91-2197729 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) 3500 Deer Creek Road Palo Alto, California 94304
  • 77. (Address of principal executive offices) (Zip Code) (650) 681-5000 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered Common Stock, $0.001 par value The NASDAQ Stock Market LLC Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark whether the registrant is a well- known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes x No ¨ Indicate by check mark if the registrant is not required to file re ports pursuant to Section 13 or 15(d) of the Act. Yes ¨ No x Indicate by check mark whether the registrant (1) has filed all re ports required to be filed by Section 13 or 15(d) of the Securitie s Exchange Act of 1934 (“Exchange Act”) during the preceding 12 months (or for such shorter period that the registra nt was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes x No ¨ Indicate by check mark whether the registrant has submitted ele ctronically and posted on its corporate Web site, if any, every In teractive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-
  • 78. T during the preceding 12 months (or for such shorter period tha t the registrant was required to submit and post such files). Ye s x No ¨ Indicate by check mark if disclosure of delinquent filers pursua nt to Item 405 of Regulation S- K (§229.405 of this chapter) is not contained herein, and will no t be contained, to the best of registrant’s knowledge, in definitive proxy or information state ments incorporated by reference in Part III of this Form 10- K or any amendment to this Form 10-K. ¨ Indicate by check mark whether the registrant is a large accelera ted filer, an accelerated filer, a non- accelerated filer or a smaller reporting company. See the definit ions of “large accelerated filer,” “accelerated filer,” and “smaller reporting company” in R ule 12b-2 of the Exchange Act: Large accelerated filer x Accelerated filer ¨ Non-accelerated filer ¨ (Do not check if a smaller reporting company) Smaller reporting company ¨ Indicate by check mark whether the registrant is a shell compan y (as defined in Rule 12b-2 of the Exchange Act). Yes ¨ No x The aggregate market value of voting stock held by non- affiliates of the registrant, as of June 30, 2015, the last day of r egistrant’s most recently completed second fiscal quarter, was $26,340,519,416 (based on the closing price for shares of the re gistrant’s Common Stock as reported by the NASDAQ Global S
  • 79. elect Market on June 30, 2015). Shares of Common Stock held b y each executive officer, director, and holder of 5% or more of th e outstanding Common Stock have been excluded in that such p ersons may be deemed to be affiliates. This determination of affiliate status is not necessarily a conclusive determination for other purposes. As of January 31, 2016, there were 132,056,338 shares of the re gistrant’s Common Stock outstanding. DOCUMENTS INCORPORATED BY REFERENCE Portions of the registrant’s Proxy Statement for the 2015 Annua l Meeting of Stockholders are incorporated herein by reference i n Part III of this Annual Report on Form 10-K to the extent stated herein. Such proxy statement will be filed with the Securi ties and Exchange Commission within 120 days of the registrant ’s fiscal year ended December 31, 2015. TESLA MOTORS, INC. ANNUAL REPORT ON FORM 10-K FOR THE YEAR ENDED DECEMBER 31, 2015 INDEX Page PART I. Item 1. Business 4
  • 80. Item 1A. Risk Factors 13 Item 1B. Unresolved Staff Comments 27 Item 2. Properties 28 Item 3. Legal Proceedings 28 Item 4. Mine Safety Disclosures 28 PART II. Item 5. Market for Registrant’s Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities 29 Item 6. Selected Financial Data 31 Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations 32 Item 7A. Quantitative and Qualitative Disclosures About Market Risk 43 Item 8. Financial Statements and Supplementary Data 45 Item 9. Changes in and Disagreements with Accountants on Accounting and Financial Disclosure 74 Item 9A. Controls and Procedures 74 Item 9B. Other Information 74 PART III. Item 10. Directors, Executive Officers and Corporate Governance 75 Item 11. Executive Compensation 75 Item 12. Security Ownership of Certain Beneficial Owners and Manage
  • 81. ment and Related Stockholder Matters 75 Item 13. Certain Relationships and Related Transactions, and Director I ndependence 75 Item 14. Principal Accountant Fees and Services 75 PART IV. Item 15. Exhibits and Financial Statement Schedules 75 Signatures 82 2 Forward-Looking Statements The discussions in this Annual Report on Form 10-K contain forward-looking statements reflecting our current expectations that involve risks and uncertainties. These forward-looking statements include, but are not limited to, statements concerning our strategy, future operations, future financial position, future revenues, projected costs, profitability, expected cost reductions, capital adequacy, expectations regarding demand and acceptance for our technologies, growth opportunities and trends in the market in which we operate, prospects and plans and objectives of management. The words “anticipates”, “believes”,
  • 82. “estimates”, “expects”, “intends”, “may”, “plans”, “projects”, “will”, “would” and similar expressions are intended to identify forward-looking statements, although not all forward-looking statements contain these identifying words. We may not actually achieve the plans, intentions or expectations disclosed in our forward-looking statements and you should not place undue reliance on our forward-looking statements. Actual results or events could differ materially from the plans, intentions and expectations disclosed in the forward- looking statements that we make. These forward-looking statements involve risks and uncertainties that could cause our actual results to differ materially from those in the forward-looking statements, including, without limitation, the risks set forth in Part I, Item 1A, “Risk Factors” in this Annual Report on Form 10-K and in our other filings with the Securities and Exchange Commission. We do not assume any obligation to update any forward-looking statements. 3 P ART I I TEM 1. BUSINESS Overview We design, develop, manufacture and sell high- performance fully electric vehicles and energy storage products. We have established our own network of
  • 83. vehicle sales and service centers and Supercharger stations glob ally to accelerate the widespread adoption of electric vehicles. Our vehicles, electric vehicle engineering expertise, and business model differentiates us from incumbent automobile manufacturers. We currently produce and sell two fully electric vehicles, the M odel S sedan and the Model X sport utility vehicle (SUV). Both vehicles offer exceptional performance, functionality and attractive styling. We commence d deliveries of Model S in June 2012 and as of December 31, 20 15 we have delivered over 107,000 new Model S vehicles worldwide. We have continued to improv e Model S by introducing performance, all- wheel drive dual motor, and autopilot options, as well as free over-the-air software updates. We commenced customer deliveries of Model X in the third qua rter of 2015. This unique vehicle offers exceptional safety, seati ng for seven people, all- wheel drive, and our autopilot functionality. We are currently ra mping production and deliveries of Model X in the United State s and plan to offer it in Europe and Asia in 2016. After the Model X, our goal is to introduce the Model 3, a lower priced sedan designed for the mass market. We intend to unveil Model 3 in the first quarter of 2016 and start production and deliveries in late 2017. The commercial production of fully electric vehicles that meets consumers’ range and performance expectations requires substa ntial design, engineering, and integration work on almost every system of our vehicles. O ur design and vehicle engineering capabilities, combined with th e technical advancements of our