Chapter 3 - Assignment - Marcellana, Ariel P. - Bsa-31
Chapter 3 - Assignment - Marcellana, Ariel P. - Bsa-31
Chapter 3 - Assignment - Marcellana, Ariel P. - Bsa-31
BSA-31
ESSAY
1. The text describes six internal control activities. List four of them and provide a specific
example of each one.
- Establish a document trail
Prepare the proper documents (source documents) to support business activities that have
occurred. Use prenumbered purchase orders for purchases. Use prenumbered invoices to bill
customers and account for any missing invoices. Use a preestablished chart of accounts. all
accounts in the general ledger
- Establish responsibilities
Assign responsibilities to persons accountable for functions within an organization. A bank
teller or cashier is responsible for reconciling his or her assigned cash tray and ensuring that
there is no cash or fund shortage at the end of a shift. The manager is responsible for
authorizing expenditures within his or her own operating department or cost center.
Disbursement checks greater than $2,500 must have two signatures.
4. According to common law, there are five conditions that must be present for an act to be
deemed fraudulent. Name and explain each.
- The five conditions that must be present for an act to be deemed fraudulent are False
Representation, There must be a false statement or a nondisclosure. Material fact, a fact must
be a substantial factor in inducing someone to act. Intent, there must be the intent to deceive
or the knowledge that one’s statement is false. Justifiable reliance, the misrepresentation must
have been a substantial factor on which the injured party relied. Injury or loss, the deception
must have caused injury or loss to the victim of the fraud.
5. Management fraud is regarded as more serious than employee fraud. Three special
characteristics have been discussed for management fraud. What are they? Explain.
- The three special characteristics are the: First, fraud is perpetrated at levels of management
above the one to which internal control structures generally relate. Second, the fraud
frequently involves using the financial statements to create an illusion that an entity is
healthier and more prosperous than, in fact, it is. Lastly, if the fraud involves misappropriation
of assets, it frequently is shrouded in a maze of complex business transactions, often involving
related third parties.
6. Four principal types of corruption are discussed. Name all four and explain at least two.
- The four types of corruption are bribery, illegal gratuity, conflict of interest, and economic
extortion. In bribery, involves giving, offering, soliciting, or receiving things of value to
influence an official in the performance of his or her lawful duties. In illegal gratuity, involves
giving, receiving, offering, or soliciting something of value because of an official act that has
been taken. This is similar to a bribe, but the transaction occurs after the fact.
10. Since all fraud involves some form of financial misstatement, how is Fraudulent Statement
fraud different?
- All fraud involves some form of financial misstatement, to meet the definition under this
class of fraud scheme the statement itself must bring direct or indirect financial benefit to the
perpetrator. In other words, the statement is not simply a vehicle for obscuring or covering a
fraudulent act.
- A strong internal audit and/or compliance function is critical to assessing and maintaining
your control environment. Personnel with the experience and skill-sets specific to your
organization should be secured. If that is not possible, external entities should be engaged
periodically to assess the environment to provide management with an accurate picture of the
organization’s control environment. Please see our blog discussing the value of internal
auditors.
12. Standards requires auditors to obtain sufficient knowledge of the organization’s risk
assessment procedures to understand how management identifies, prioritizes and manages
financial reporting risk. List five circumstances that can cause risks to arise or change.
- Strategic Risk: They are the risks associated with the operations of that particular industry.
These kind of risks arise from:
a. Business Environment: Buyers and sellers interacting to buy and sell goods and services,
changes in supply and demand, competitive structures and introduction of new technologies.
b. Transaction: Assets relocation of mergers and acquisitions, spin-offs, alliances and joint
ventures.
c. Investor Relations: Strategy for communicating with individuals who have invested in the
business.
- Financial Risk: These are the risks associated with the financial structure and transactions of
the particular industry.
- Operational Risk: These are the risks associated with the operational and administrative
procedures of the particular industry.
- Compliance Risk (Legal Risk): These are risks associated with the need to comply with the
rules and regulations of the government.
- Other risks: There would be different risks like natural disaster (floods) and others depend
upon the nature and scale of the industry
16. Describe the factors that constitute the fraud triangle. Why is it important to auditors?
- The factors that constitute the fraud triangle are: First, situational pressure, which
includes personal or job-related stresses that could coerce an individual to act dishonestly.
Second, opportunity, which involves direct access to assets and/or access to information that
controls assets. Lastly, ethics, which pertains to one’s character and degree of moral
opposition to acts of dishonesty. It is important to auditors, it is shown that the auditor’s
evaluation of fraud is enhanced when the fraud triangle factors are considered.
17. Define each of the following input controls and give an example of how they may be used:
a. Missing data check - identifies blank or incomplete input fields.
d. Range check - verify that all amounts fall within an acceptable range
e. Reasonableness check - verify that amounts that have based limit and range checks are
reasonable.
18. If input and processing controls are adequate, why are output controls needed?
- Output controls are needed, it address what is done with the data and should compare output
results with the intended result by checking the output against the input. Output controls find
the errors and verify the accuracy and reasonableness of output data after processing is
complete.