SlideShare a Scribd company logo
1 of 3
Download to read offline
Subject " Forensic Accountng"
As we move forward, and computer technology improves, we will have the ability to utilize
programs to look for "red flags" or anomalies within a companies books. The other side of this
coin is that this technology can also be utilized to conduct fraudulent operations, and an article in
Accounting today even suggests that this will be the direction that fraud goes in 2015.
If a company is suspected of fraud, or a whistleblower comes to the SEC with information fraud
examiners will get to work! HOW an auditor investigate it.
Solution
Fraud has become very complicated in this era of technology, and increasingly difficult to detect,
especially when it is collusive in nature and committed by top management who are capable of
concealing it.
Over the last two decades, there have been developments concerning fraud which some have
seen as marking significant extension to audit responsibilities. The business community,
especially the accounting profession, has become increasingly concerned about the rise in
management fraud. Recent internal reports suggest that employee fraud is pervasive, plaguing
both large and small organization alike.
If a company is suspected of fraud or a whistle blower comes to SEC,an auditor has to conduct
thorough investigation to get the root of the fraud and carry out necessary actions accordingly.
First,we will take a look at various types of frauds that can prevail and different investigation
procedures.
TYPES OF INVESTIGATION
The forensic accountant could be asked to investigate many different types of fraud. It is useful
to categorise these types into three groups to provide an overview of the wide range of
investigations that could be carried out. The three categories of frauds are corruption, asset
misappropriation and financial statement fraud.
Corruption
There are three types of corruption fraud: conflicts of interest, bribery, and extortion. Research
shows that corruption is involved in around one third of all frauds.
Asset misappropriation
By far the most common frauds are those involving asset misappropriation, and there are many
different types of fraud which fall into this category. The common feature is the theft of cash or
other assets from the company, for example:
Financial statement fraud
This is also known as fraudulent financial reporting, and is a type of fraud that causes a material
misstatement in the financial statements. It can include deliberate falsification of accounting
records; omission of transactions, balances or disclosures from the financial statements; or the
misapplication of financial reporting standards. This is often carried out with the intention of
presenting the financial statements with a particular bias, for example concealing liabilities in
order to improve any analysis of liquidity and gearing.
CONDUCTING AN INVESTIGATION
The process of conducting a forensic investigation is, in many ways, similar to the process of
conducting an audit, but with some additional considerations. The various stages are briefly
described below.
Accepting the investigation
The forensic accountant must initially consider whether their firm has the necessary skills and
experience to accept the work. Forensic investigations are specialist in nature, and the work
requires detailed knowledge of fraud investigation techniques and the legal framework.
Investigators must also have received training in interview and interrogation techniques, and in
how to maintain the safe custody of evidence gathered.
Additional considerations include whether or not the investigation is being requested by an audit
client. If it is, this poses extra ethical questions, as the investigating firm would be potentially
exposed to self-review, advocacy and management threats to objectivity. Unless robust
safeguards are put in place, the firm should not provide audit and forensic investigation services
to the same client. Commercial considerations are also important, and a high fee level should be
negotiated to compensate for the specialist nature of the work, and the likely involvement of
senior and experienced members of the firm in the investigation.
Planning the investigation
The investigating team must carefully consider what they have been asked to achieve and plan
their work accordingly. The objectives of the investigation will include:
The investigators should also consider the best way to gather evidence – the use of computer
assisted audit techniques, for example, is very common in fraud investigations.
Gathering evidence
In order to gather detailed evidence, the investigator must understand the specific type of fraud
that has been carried out, and how the fraud has been committed.
Evidence can be gathered using various techniques, such as:
The ultimate goal of the forensic investigation team is to obtain a confession by the fraudster, if a
fraud did actually occur. For this reason, the investigators are likely to avoid deliberately
confronting the alleged fraudster(s) until they have gathered sufficient evidence to extract a
confession. The interview with the suspect is a crucial part of evidence gathered during the
investigation.
Reporting
The client will expect a report containing the findings of the investigation, including a summary
of evidence and a conclusion as to the amount of loss suffered as a result of the fraud. The report
will also discuss how the fraudster set up the fraud scheme, and which controls, if any, were
circumvented.
Court proceedings
The investigation is likely to lead to legal proceedings against the suspect, and members of the
investigative team will probably be involved in any resultant court case. The evidence gathered
during the investigation will be presented at court, and team members may be called to court to
describe the evidence they have gathered and to explain how the suspect was identified. It is
imperative that the members of the investigative team called to court can present their evidence
clearly and professionally, as they may have to simplify complex accounting issues so that non-
accountants involved in the court case can understand the evidence and its implications.
CONCLUSION
In summary, investigating a fraud especially involving technology is a very specialist type of
engagement, which requires highly skilled team members who have experience not only of
accounting and auditing techniques, but also of the relevant legal framework.

More Related Content

Similar to Subject Forensic AccountngAs we move forward, and computer te.pdf

Forensic Accounting An Ex Ante Ex post Evaluation for India
Forensic Accounting An Ex Ante Ex post Evaluation for IndiaForensic Accounting An Ex Ante Ex post Evaluation for India
Forensic Accounting An Ex Ante Ex post Evaluation for Indiaijtsrd
 
Process of Forensic Accounting
Process of Forensic AccountingProcess of Forensic Accounting
Process of Forensic Accountinginfantemiliya
 
chapter 1 introduction forensic accounting
chapter 1 introduction  forensic accountingchapter 1 introduction  forensic accounting
chapter 1 introduction forensic accountingMohamedAbdi347025
 
Ensuring Effective Suspicious Activity Reporting.pdf
Ensuring Effective Suspicious Activity Reporting.pdfEnsuring Effective Suspicious Activity Reporting.pdf
Ensuring Effective Suspicious Activity Reporting.pdfFlyingcolourAccounti
 
Discus the development of the fraud examinerforensic accounting pro.pdf
Discus the development of the fraud examinerforensic accounting pro.pdfDiscus the development of the fraud examinerforensic accounting pro.pdf
Discus the development of the fraud examinerforensic accounting pro.pdfMALASADHNANI
 
Case Study Audit
Case Study AuditCase Study Audit
Case Study AuditJessica Lopez
 
CAG's Regulations and Standing orders on the Audit of Fraud
CAG's Regulations and Standing orders on the Audit of FraudCAG's Regulations and Standing orders on the Audit of Fraud
CAG's Regulations and Standing orders on the Audit of FraudLife of A Public Auditor
 
Forensic Accounting in Brief
Forensic Accounting in BriefForensic Accounting in Brief
Forensic Accounting in BriefRaghavendraGowdaKarb
 
Computer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionComputer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionAlexander Decker
 
Procurement fraud-0614-1
Procurement fraud-0614-1Procurement fraud-0614-1
Procurement fraud-0614-1Dr Gordon Murray
 
Anti-Fraud 1Anti-Fraud PreventionName.docx
Anti-Fraud     1Anti-Fraud PreventionName.docxAnti-Fraud     1Anti-Fraud PreventionName.docx
Anti-Fraud 1Anti-Fraud PreventionName.docxrossskuddershamus
 
Forensic audit & procedure
Forensic audit & procedureForensic audit & procedure
Forensic audit & procedureVadivelM9
 
forensic accounting india
forensic accounting indiaforensic accounting india
forensic accounting indiaMayank Garg
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
 
Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Premier Publishers
 

Similar to Subject Forensic AccountngAs we move forward, and computer te.pdf (20)

Forensic Accounting An Ex Ante Ex post Evaluation for India
Forensic Accounting An Ex Ante Ex post Evaluation for IndiaForensic Accounting An Ex Ante Ex post Evaluation for India
Forensic Accounting An Ex Ante Ex post Evaluation for India
 
Process of Forensic Accounting
Process of Forensic AccountingProcess of Forensic Accounting
Process of Forensic Accounting
 
chapter 1 introduction forensic accounting
chapter 1 introduction  forensic accountingchapter 1 introduction  forensic accounting
chapter 1 introduction forensic accounting
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 
Best practices in conducting Financial Investigations
Best practices in conducting Financial InvestigationsBest practices in conducting Financial Investigations
Best practices in conducting Financial Investigations
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Ensuring Effective Suspicious Activity Reporting.pdf
Ensuring Effective Suspicious Activity Reporting.pdfEnsuring Effective Suspicious Activity Reporting.pdf
Ensuring Effective Suspicious Activity Reporting.pdf
 
Kenya AMC Presentation 1
Kenya AMC Presentation 1Kenya AMC Presentation 1
Kenya AMC Presentation 1
 
Discus the development of the fraud examinerforensic accounting pro.pdf
Discus the development of the fraud examinerforensic accounting pro.pdfDiscus the development of the fraud examinerforensic accounting pro.pdf
Discus the development of the fraud examinerforensic accounting pro.pdf
 
Case Study Audit
Case Study AuditCase Study Audit
Case Study Audit
 
Understanding forensic investigation process by G. E. Oyedokun
Understanding forensic investigation process  by G. E. OyedokunUnderstanding forensic investigation process  by G. E. Oyedokun
Understanding forensic investigation process by G. E. Oyedokun
 
CAG's Regulations and Standing orders on the Audit of Fraud
CAG's Regulations and Standing orders on the Audit of FraudCAG's Regulations and Standing orders on the Audit of Fraud
CAG's Regulations and Standing orders on the Audit of Fraud
 
Forensic Accounting in Brief
Forensic Accounting in BriefForensic Accounting in Brief
Forensic Accounting in Brief
 
Computer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionComputer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detection
 
Procurement fraud-0614-1
Procurement fraud-0614-1Procurement fraud-0614-1
Procurement fraud-0614-1
 
Anti-Fraud 1Anti-Fraud PreventionName.docx
Anti-Fraud     1Anti-Fraud PreventionName.docxAnti-Fraud     1Anti-Fraud PreventionName.docx
Anti-Fraud 1Anti-Fraud PreventionName.docx
 
Forensic audit & procedure
Forensic audit & procedureForensic audit & procedure
Forensic audit & procedure
 
forensic accounting india
forensic accounting indiaforensic accounting india
forensic accounting india
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...
 

More from akilastationarrymdu

Summary the article below in the bullet point How can engineers m.pdf
Summary the article below in the bullet point How can engineers m.pdfSummary the article below in the bullet point How can engineers m.pdf
Summary the article below in the bullet point How can engineers m.pdfakilastationarrymdu
 
Sulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdf
Sulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdfSulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdf
Sulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdfakilastationarrymdu
 
Summarize statistical methods used in forecasting and the types of t.pdf
Summarize statistical methods used in forecasting and the types of t.pdfSummarize statistical methods used in forecasting and the types of t.pdf
Summarize statistical methods used in forecasting and the types of t.pdfakilastationarrymdu
 
Submit the introduction to fraud as it applies to your case study of.pdf
Submit the introduction to fraud as it applies to your case study of.pdfSubmit the introduction to fraud as it applies to your case study of.pdf
Submit the introduction to fraud as it applies to your case study of.pdfakilastationarrymdu
 
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfSubject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfakilastationarrymdu
 
Sum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdf
Sum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdfSum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdf
Sum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdfakilastationarrymdu
 
Submit your hypothesis development and investigation plan for your c.pdf
Submit your hypothesis development and investigation plan for your c.pdfSubmit your hypothesis development and investigation plan for your c.pdf
Submit your hypothesis development and investigation plan for your c.pdfakilastationarrymdu
 
Subsidence to sinkholes and rockfalls to avalanches. Each geographic.pdf
Subsidence to sinkholes and rockfalls to avalanches. Each geographic.pdfSubsidence to sinkholes and rockfalls to avalanches. Each geographic.pdf
Subsidence to sinkholes and rockfalls to avalanches. Each geographic.pdfakilastationarrymdu
 
Subjects were children enrolled in a health maintenance organization.pdf
Subjects were children enrolled in a health maintenance organization.pdfSubjects were children enrolled in a health maintenance organization.pdf
Subjects were children enrolled in a health maintenance organization.pdfakilastationarrymdu
 
Subject- organizational behaviour in 21st centuryWhat would you s.pdf
Subject- organizational behaviour in 21st centuryWhat would you s.pdfSubject- organizational behaviour in 21st centuryWhat would you s.pdf
Subject- organizational behaviour in 21st centuryWhat would you s.pdfakilastationarrymdu
 
Subject Risk ManagementThere are 4 critical success factors that .pdf
Subject Risk ManagementThere are 4 critical success factors that .pdfSubject Risk ManagementThere are 4 critical success factors that .pdf
Subject Risk ManagementThere are 4 critical success factors that .pdfakilastationarrymdu
 
Suppose a point is randomly selected along a line segment of length .pdf
Suppose a point is randomly selected along a line segment of length .pdfSuppose a point is randomly selected along a line segment of length .pdf
Suppose a point is randomly selected along a line segment of length .pdfakilastationarrymdu
 
Summarize the main features of the ADA and include an example of a .pdf
Summarize the main features of the ADA and include an example of a .pdfSummarize the main features of the ADA and include an example of a .pdf
Summarize the main features of the ADA and include an example of a .pdfakilastationarrymdu
 
summarize the processes involved in project human resource managemen.pdf
summarize the processes involved in project human resource managemen.pdfsummarize the processes involved in project human resource managemen.pdf
summarize the processes involved in project human resource managemen.pdfakilastationarrymdu
 
Suppose a Math 1040 class has 25 students and 5 if them are not pun.pdf
Suppose a Math 1040 class has 25 students and 5 if them are not pun.pdfSuppose a Math 1040 class has 25 students and 5 if them are not pun.pdf
Suppose a Math 1040 class has 25 students and 5 if them are not pun.pdfakilastationarrymdu
 
Suppose a large number of new immigrants enter the labor market. Ass.pdf
Suppose a large number of new immigrants enter the labor market. Ass.pdfSuppose a large number of new immigrants enter the labor market. Ass.pdf
Suppose a large number of new immigrants enter the labor market. Ass.pdfakilastationarrymdu
 
Suppose a function F(z) is a product of n differentiable functio.pdf
Suppose a function F(z) is a product of n differentiable functio.pdfSuppose a function F(z) is a product of n differentiable functio.pdf
Suppose a function F(z) is a product of n differentiable functio.pdfakilastationarrymdu
 
Suppose a disk is expected to fail in 1 to 2 years. If the failure d.pdf
Suppose a disk is expected to fail in 1 to 2 years. If the failure d.pdfSuppose a disk is expected to fail in 1 to 2 years. If the failure d.pdf
Suppose a disk is expected to fail in 1 to 2 years. If the failure d.pdfakilastationarrymdu
 
Suppose a division of New York instruments that sells computer micro.pdf
Suppose a division of New York instruments that sells computer micro.pdfSuppose a division of New York instruments that sells computer micro.pdf
Suppose a division of New York instruments that sells computer micro.pdfakilastationarrymdu
 
Suppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdf
Suppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdfSuppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdf
Suppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdfakilastationarrymdu
 

More from akilastationarrymdu (20)

Summary the article below in the bullet point How can engineers m.pdf
Summary the article below in the bullet point How can engineers m.pdfSummary the article below in the bullet point How can engineers m.pdf
Summary the article below in the bullet point How can engineers m.pdf
 
Sulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdf
Sulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdfSulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdf
Sulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdf
 
Summarize statistical methods used in forecasting and the types of t.pdf
Summarize statistical methods used in forecasting and the types of t.pdfSummarize statistical methods used in forecasting and the types of t.pdf
Summarize statistical methods used in forecasting and the types of t.pdf
 
Submit the introduction to fraud as it applies to your case study of.pdf
Submit the introduction to fraud as it applies to your case study of.pdfSubmit the introduction to fraud as it applies to your case study of.pdf
Submit the introduction to fraud as it applies to your case study of.pdf
 
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfSubject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
 
Sum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdf
Sum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdfSum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdf
Sum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdf
 
Submit your hypothesis development and investigation plan for your c.pdf
Submit your hypothesis development and investigation plan for your c.pdfSubmit your hypothesis development and investigation plan for your c.pdf
Submit your hypothesis development and investigation plan for your c.pdf
 
Subsidence to sinkholes and rockfalls to avalanches. Each geographic.pdf
Subsidence to sinkholes and rockfalls to avalanches. Each geographic.pdfSubsidence to sinkholes and rockfalls to avalanches. Each geographic.pdf
Subsidence to sinkholes and rockfalls to avalanches. Each geographic.pdf
 
Subjects were children enrolled in a health maintenance organization.pdf
Subjects were children enrolled in a health maintenance organization.pdfSubjects were children enrolled in a health maintenance organization.pdf
Subjects were children enrolled in a health maintenance organization.pdf
 
Subject- organizational behaviour in 21st centuryWhat would you s.pdf
Subject- organizational behaviour in 21st centuryWhat would you s.pdfSubject- organizational behaviour in 21st centuryWhat would you s.pdf
Subject- organizational behaviour in 21st centuryWhat would you s.pdf
 
Subject Risk ManagementThere are 4 critical success factors that .pdf
Subject Risk ManagementThere are 4 critical success factors that .pdfSubject Risk ManagementThere are 4 critical success factors that .pdf
Subject Risk ManagementThere are 4 critical success factors that .pdf
 
Suppose a point is randomly selected along a line segment of length .pdf
Suppose a point is randomly selected along a line segment of length .pdfSuppose a point is randomly selected along a line segment of length .pdf
Suppose a point is randomly selected along a line segment of length .pdf
 
Summarize the main features of the ADA and include an example of a .pdf
Summarize the main features of the ADA and include an example of a .pdfSummarize the main features of the ADA and include an example of a .pdf
Summarize the main features of the ADA and include an example of a .pdf
 
summarize the processes involved in project human resource managemen.pdf
summarize the processes involved in project human resource managemen.pdfsummarize the processes involved in project human resource managemen.pdf
summarize the processes involved in project human resource managemen.pdf
 
Suppose a Math 1040 class has 25 students and 5 if them are not pun.pdf
Suppose a Math 1040 class has 25 students and 5 if them are not pun.pdfSuppose a Math 1040 class has 25 students and 5 if them are not pun.pdf
Suppose a Math 1040 class has 25 students and 5 if them are not pun.pdf
 
Suppose a large number of new immigrants enter the labor market. Ass.pdf
Suppose a large number of new immigrants enter the labor market. Ass.pdfSuppose a large number of new immigrants enter the labor market. Ass.pdf
Suppose a large number of new immigrants enter the labor market. Ass.pdf
 
Suppose a function F(z) is a product of n differentiable functio.pdf
Suppose a function F(z) is a product of n differentiable functio.pdfSuppose a function F(z) is a product of n differentiable functio.pdf
Suppose a function F(z) is a product of n differentiable functio.pdf
 
Suppose a disk is expected to fail in 1 to 2 years. If the failure d.pdf
Suppose a disk is expected to fail in 1 to 2 years. If the failure d.pdfSuppose a disk is expected to fail in 1 to 2 years. If the failure d.pdf
Suppose a disk is expected to fail in 1 to 2 years. If the failure d.pdf
 
Suppose a division of New York instruments that sells computer micro.pdf
Suppose a division of New York instruments that sells computer micro.pdfSuppose a division of New York instruments that sells computer micro.pdf
Suppose a division of New York instruments that sells computer micro.pdf
 
Suppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdf
Suppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdfSuppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdf
Suppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdf
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Subject Forensic AccountngAs we move forward, and computer te.pdf

  • 1. Subject " Forensic Accountng" As we move forward, and computer technology improves, we will have the ability to utilize programs to look for "red flags" or anomalies within a companies books. The other side of this coin is that this technology can also be utilized to conduct fraudulent operations, and an article in Accounting today even suggests that this will be the direction that fraud goes in 2015. If a company is suspected of fraud, or a whistleblower comes to the SEC with information fraud examiners will get to work! HOW an auditor investigate it. Solution Fraud has become very complicated in this era of technology, and increasingly difficult to detect, especially when it is collusive in nature and committed by top management who are capable of concealing it. Over the last two decades, there have been developments concerning fraud which some have seen as marking significant extension to audit responsibilities. The business community, especially the accounting profession, has become increasingly concerned about the rise in management fraud. Recent internal reports suggest that employee fraud is pervasive, plaguing both large and small organization alike. If a company is suspected of fraud or a whistle blower comes to SEC,an auditor has to conduct thorough investigation to get the root of the fraud and carry out necessary actions accordingly. First,we will take a look at various types of frauds that can prevail and different investigation procedures. TYPES OF INVESTIGATION The forensic accountant could be asked to investigate many different types of fraud. It is useful to categorise these types into three groups to provide an overview of the wide range of investigations that could be carried out. The three categories of frauds are corruption, asset misappropriation and financial statement fraud. Corruption There are three types of corruption fraud: conflicts of interest, bribery, and extortion. Research shows that corruption is involved in around one third of all frauds. Asset misappropriation By far the most common frauds are those involving asset misappropriation, and there are many different types of fraud which fall into this category. The common feature is the theft of cash or
  • 2. other assets from the company, for example: Financial statement fraud This is also known as fraudulent financial reporting, and is a type of fraud that causes a material misstatement in the financial statements. It can include deliberate falsification of accounting records; omission of transactions, balances or disclosures from the financial statements; or the misapplication of financial reporting standards. This is often carried out with the intention of presenting the financial statements with a particular bias, for example concealing liabilities in order to improve any analysis of liquidity and gearing. CONDUCTING AN INVESTIGATION The process of conducting a forensic investigation is, in many ways, similar to the process of conducting an audit, but with some additional considerations. The various stages are briefly described below. Accepting the investigation The forensic accountant must initially consider whether their firm has the necessary skills and experience to accept the work. Forensic investigations are specialist in nature, and the work requires detailed knowledge of fraud investigation techniques and the legal framework. Investigators must also have received training in interview and interrogation techniques, and in how to maintain the safe custody of evidence gathered. Additional considerations include whether or not the investigation is being requested by an audit client. If it is, this poses extra ethical questions, as the investigating firm would be potentially exposed to self-review, advocacy and management threats to objectivity. Unless robust safeguards are put in place, the firm should not provide audit and forensic investigation services to the same client. Commercial considerations are also important, and a high fee level should be negotiated to compensate for the specialist nature of the work, and the likely involvement of senior and experienced members of the firm in the investigation. Planning the investigation The investigating team must carefully consider what they have been asked to achieve and plan their work accordingly. The objectives of the investigation will include: The investigators should also consider the best way to gather evidence – the use of computer assisted audit techniques, for example, is very common in fraud investigations. Gathering evidence
  • 3. In order to gather detailed evidence, the investigator must understand the specific type of fraud that has been carried out, and how the fraud has been committed. Evidence can be gathered using various techniques, such as: The ultimate goal of the forensic investigation team is to obtain a confession by the fraudster, if a fraud did actually occur. For this reason, the investigators are likely to avoid deliberately confronting the alleged fraudster(s) until they have gathered sufficient evidence to extract a confession. The interview with the suspect is a crucial part of evidence gathered during the investigation. Reporting The client will expect a report containing the findings of the investigation, including a summary of evidence and a conclusion as to the amount of loss suffered as a result of the fraud. The report will also discuss how the fraudster set up the fraud scheme, and which controls, if any, were circumvented. Court proceedings The investigation is likely to lead to legal proceedings against the suspect, and members of the investigative team will probably be involved in any resultant court case. The evidence gathered during the investigation will be presented at court, and team members may be called to court to describe the evidence they have gathered and to explain how the suspect was identified. It is imperative that the members of the investigative team called to court can present their evidence clearly and professionally, as they may have to simplify complex accounting issues so that non- accountants involved in the court case can understand the evidence and its implications. CONCLUSION In summary, investigating a fraud especially involving technology is a very specialist type of engagement, which requires highly skilled team members who have experience not only of accounting and auditing techniques, but also of the relevant legal framework.