Exam 12: Business Ethics, Fraud, and Fraud Detection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Individuals who acquire some level of skill and knowledge in the field of computer ethics are involved in which level of computer ethics?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then steal the data.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

False

Explain the Pay and Return scheme.

Free
(Essay)
4.7/5
(32)
Correct Answer:
Verified

A pay-and-return scheme involves a clerk with check-writing authority who pays a vendor twice for the same products (inventory or supplies) received. The vendor, recognizing that its customer made a double payment, issues a reimbursement to the victim company. The clerk intercepts and cashes the reimbursement check.

Explain the problems associated with lack of auditor independence.

(Essay)
4.9/5
(37)

Explain the shell company fraud.

(Essay)
4.8/5
(43)

In balancing the risks and benefits that are part of every ethical decision, managers receive guidance from each of the following except

(Multiple Choice)
4.9/5
(39)

The text discusses many questions about personal traits of executives which might help uncover fraudulent activity. What are three?

(Essay)
4.8/5
(38)

Employees should be made aware of the firm's commitment to ethics.

(True/False)
4.8/5
(32)

Computers can be misused in many ways.

(True/False)
4.7/5
(38)

According to common law, there are five conditions that must be present for an act to be deemed fraudulent. Name and explain each.

(Essay)
4.9/5
(35)

Database management fraud includes altering, updating, and deleting an organization's data.

(True/False)
4.8/5
(36)

Which of the following controls would best prevent the lapping of accounts receivable?

(Multiple Choice)
4.8/5
(38)

Business ethics involves

(Multiple Choice)
4.7/5
(40)

Distinguish between skimming and cash larceny. Give an example of each

(Essay)
4.8/5
(29)

Opportunity involves direct access to assets and/or access to information that controls assets.

(True/False)
5.0/5
(39)

Which characteristic is not associated with software as intellectual property?

(Multiple Choice)
4.8/5
(41)

Define database management fraud.

(Short Answer)
4.8/5
(37)

Changing the Hours Worked field in an otherwise legitimate payroll transaction to increase the amount of the paycheck is an example of data collection fraud.

(True/False)
4.8/5
(44)

Business bankruptcy cases always involve fraudulent behavior.

(True/False)
4.9/5
(35)

A shell company fraud involves

(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)