Exam 12: Business Ethics, Fraud, and Fraud Detection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Skimming involves stealing cash from an organization after it is recorded on the organization's books and records

(True/False)
4.9/5
(43)

Defalcation is another word for financial fraud.

(True/False)
4.8/5
(46)

What are the risk factors that relate to fraudulent financial reporting? What types of common schemes should auditors look for?

(Essay)
4.7/5
(29)

Para computer ethics is the exposure to stories and reports found in the popular media regarding the good or bad ramifications of computer technology.

(True/False)
4.9/5
(36)

Computer fraud can take on many forms, including each of the following except

(Multiple Choice)
4.8/5
(28)

What fraud scheme is similar to the "borrowing from Peter to pay Paul" scheme?

(Multiple Choice)
4.8/5
(44)

The trend toward distributed data processing increases the exposure to fraud from remote locations.

(True/False)
5.0/5
(34)

Situational pressure includes personal or job related stresses that could coerce an individual to act dishonestly.

(True/False)
4.9/5
(43)

What is the objective of SAS 99?

(Short Answer)
4.9/5
(33)

How does the auditor's judgements about the risk of material misstatements affect the audit?

(Essay)
4.9/5
(38)

Cash larceny involves stealing cash from an organization before it is recorded on the organization's books and records.

(True/False)
4.8/5
(45)

Explain the pass through fraud.

(Essay)
4.9/5
(29)

What are some conclusions to be drawn from the ACFE fraud study regarding losses from fraud?

(Essay)
4.9/5
(31)

The most common access point for perpetrating computer fraud is at the data collection stage.

(True/False)
4.9/5
(34)

Give two examples of employee fraud and explain how the theft might occur.

(Essay)
4.8/5
(33)

Which ethical principle states that the benefit from a decision must outweigh the risks, and that there is no alternative decision that provides the same or greater benefit with less risk?

(Multiple Choice)
4.9/5
(42)

Which of the following best describes lapping?

(Multiple Choice)
4.8/5
(36)

Why are the computer ethics issues of privacy, security, and property ownership of interest to accountants?

(Essay)
4.8/5
(44)

Forces which may permit fraud to occur do not include

(Multiple Choice)
4.9/5
(39)

The fraud triangle represents a geographic area in Southeast Asia where international fraud is prevalent.

(True/False)
4.9/5
(39)
Showing 61 - 80 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)