All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
financial investigation and forensic accounting
Questions and Answers of
Financial Investigation And Forensic Accounting
What is social reciprocity?
What are ways in which you can help the witness to have a paradigm shift?
What must happen in order for you to move an avoidant witness to a cooperative orientation?
What is style matching? How can you use it to get more cooperation from witnesses?
What does your work in exercise 11 tell you about the underlying motivations for the witness intensity level?
What does your work in exercise 11 tell you about the underlying motivations for the witness behaviors?
Construct a Cylindrical Model. Now, identify, based on your answers to exercise 10, in which motivational frame and at what intensity level the witness behaviors would place them.
Write down witness behaviors (i.e. motivational frame reactions and intensity) you recall from past interviews or can imagine.
What is sensemaking and how can it help us to conduct more effective interviews?
Do high intensity responses make it more or less likely to conduct an effective interview?
What drives high intensity responses?
Why is the intensity of responses important to guage?
What witness behaviors flow from these motivations?
What are some motives that drive witness behaviors?
What are some of the factors that determine the interactions between interviewer and witness?
How can science help us to conduct more effective interviews?
What are the things you must never do when interviewing witnesses?
Develop a statement that you would use to authenticate evidence you have collected.
Create a proper chain of custody of evidence log form.
Why is creating a proper chain of custody of evidence log necessary to establish the chain of custody of evidence?
What is a chain of custody of evidence?
What are some of the techniques used to assure you have an accurate and complete forensic image of the evidentiary data you have collected?
What is a forensic image of evidentiary data?
What steps should be followed in collecting electronic evidence?
What is a good process for collecting electronic evidence?
If given a choice between a damaged original and a pristine duplicate, which would you choose to collect as evidence? Why?
Are there controls in place to make sure it is followed?
What is your company’s document retention policy?
What’s often the best way to avoid spoliation of evidence stored on an electronic device?
What is spoliation of evidence?
Can duplicates be admissible?
What contains the best evidence of an evidentiary matter contained in a writing, recording, or photograph?
What is required to authenticate evidence?
When is evidence, based on hearsay, admissible?
What is hearsay?
What are some reasons why relevant evidence might be excluded?
What type of evidence is admissible under the federal rules of evidence?
What things must you never do when interviewing a witness?
Under what circumstances can you legally record a telephone call?
Can you legally record a telephone conversation?
What onboarding steps can you take to make it easier to access information in employees’personal computer or other spaces following employment?
Should your company have an internal private network? Why?
List the practical steps your company can take to limit the ability of employees to prevent access to information they create and control.
Which third parties can legally grant access to a person’s personal computer or other spaces where they do have a reasonable expectation to privacy?
If you or law enforcement do gain access to a person’s personal computer or other spaces where they do have a reasonable expectation to privacy, what must you be certain to specify in the written
How could you or law enforcement gain access to an employee’s personal computer or other spaces where they do have a reasonable expectation to privacy?
If an employee steals your electronic data and you report it to law enforcement who then get a search warrant for the employee’s computer, can the law enforcement agency also seize and use other
If a computer technician is servicing an employee’s personal computer and finds contraband, can they turn the evidence over to law enforcement? What is this doctrine called?
How can you guarantee that you have a legal right to access discarded electronic storage devices or paper records from garbage or recycling bins left for waste pickup?
When do persons lose a reasonable expectation to privacy when they discard electronic storage devices or paper records?
What are ways that you can preserve your company’s right to access information in employee computers, files, and paper records when they are working remotely?
What are ways that you can preserve your company’s right to access information in employee computers, files, paper records, and other spaces on company property?
Under what circumstances can persons waive their reasonable expectation to privacy with respect to information stored in a computer?
Under what circumstances do persons not have a reasonable expectation to privacy with respect to information stored in a computer?
Under what circumstances do persons have a reasonable expectation to privacy with respect to information stored in a computer?
What two choices are available to you in investigating individuals?
What will happen if you or your agent makes a pretext call to a bank to get customer information?
What are the core GDPR privacy principles?
Under what circumstances may personal data not be protected under the GDPR?
Where in the world is GDPR personal data protected?
What is personal data under the GDPR?
How could you get around the Privacy Act restrictions with respect to an employee?
What should you do if a federal agent contacts you and says that he or she wants to ask you a few questions?
Which professional is most important to consult when beginning a fraud investigation or forensic accounting assignment?
Why would a forensic accountant need to perform a business valuation? Can people not just look up the value at a particular date on the appropriate stock exchange? Explain.
Do you agree that there really are many situations in which closely held companies need to be valued because of a desired or required sale of some portion of the ownership? Explain.
If a stock is traded publicly, is there ever a need to secure the services of a forensic accountant to perform a business valuation of the company? Explain.
Given the same financial and other relevant information about a particular company, is it not logical that any informed business valuation professional would come to similar valuations? Explain.
Describe some situations giving rise to the need for valuations.
Valuation methods can be broken into what three types?
Group these valuation approaches into asset-based, income approach, and market approach types:a. Adjusted book value methodb. Capitalization of earnings methodc. Discounted future earnings methodd.
Define these terms:a. Historical costb. Replacement costc. Intrinsic valued. Fair market valuee. Discounted future earnings methodf. Capitalization of earnings method g. Capital asset pricing model
Identify and describe the most common measure of value used in business valuations.
What are the most commonly used methods of business valuation? Are there any reasons to use business valuation methods other than the common ones? Explain.
If a forensic accountant decides to use an earnings model to perform a business valuation, should all earnings data be treated in the same way? Explain.
Two partners, Jones and Smith, owned and operated a successful dairy business together for 15 years. The business processed dairy products and operated a popular retail ice cream store. During the
What would be the effect on free cash flows of each of the following items:a. Purchase of \(\$ 400,000\) of fixed assetsb. Sale of \(\$ 220,000\) of book value fixed assets for a loss of \(\$
E\&K Company has a net book value of \(\$ 220,000\). The company has a 10 percent cost of capital. The firm expects to have profits of \(\$ 45,000, \$ 40,000\), and \(\$ 35,000\) respectively for the
Earnings valuation models. Bayview Real Estate Development is a company that owns and operates a number of real estate ventures. The company also engages in real estate acquisitions and sales of
Discounted cash flows valuation model. Smoothtone Products manufactures sound systems. The company's weighted average cost of capital is 15 percent. The company forecasted the following free cash
Business valuation. The Branson Trucking Company was started by three brothers in Columbus, Ohio in 1977. In 1982, Dave James came into the company primarily for marketing and growth purposes. Soon
Why is it so important to be able to clearly articulate the results of a fraud investigation?
Who decides what information provided by the forensic accountant can be used as evidence in a court of law?
What are the basic questions that the forensic accountant sets out to answer in a fraud investigation?
The forensic accountant must not only analyze documents, but investigate the character of individuals who may be involved in fraudulent activities. Based on your reading of the TruGloss and
What is it that generally sparks a forensic investigation? (It is not clever detective work!)
Do you believe the high expectations for the China operation of TruGloss may have contributed to the fraudulent activities involved? Why or why not?
Are there parallels between Enron and TruGloss?
Please identify at least one, up to three, pieces of documentary information that would corroborate the resolution of questions appearing at the end of the TruGloss exercise, namely: "What was
Aside from documentary evidence available from a client and from third-parties that do business with the client (banks, vendors, outsourced administrative services, like ADP payroll), what other
How might a business valuation-type fraud case differ from the types of fraud cases in this chapter?
Clearly distinguish between tangible and intangible assets. What are the tangible and intangible values attached to a computer software program?
The Nevada Code (refer again to Table 16.1) provides that damages from a cyber attack will include "past" losses. Describe the past losses that could be incurred from a computer crime.
When would the replacement cost of an asset be a more valid measure of the loss sustained in a cyber attack?
If a company website is penetrated by a hacker, why should that company report the attack and a damage estimate to law enforcement officials?
Thelegal statutes and insurance policy coverage identify a number of loss categories from a cyber attack. In the list of losses is one for "general injuries." Identify one general injury that might
What is the difference between a loss arising from the unavailability of a website and the lost profits that are incurred when that website is disabled?
What role should judgmental probabilities play in determining losses from cyber attacks?
What role should opportunity costs play in determining the loss from a cyber attack?
Corporation XW recently discovered that their network had been penetrated by a hacker six months ago. The hacker has not been active on their network for the last two months. No damages to the system
Showing 200 - 300
of 1521
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last