Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Consider each of the following fraud cases. Identify the incentive, opportunity, and rationalization present in each case. LO 12-3 An employee of a telecommunications firms

Consider each of the following fraud cases. Identify the incentive, opportunity, and rationalization present in each case. LO 12-3 An employee of a telecommunications firms payroll department moved to a new position within the department in which she no longer has privileged access to payroll accounts. However, when changing positions, her access rights to the payroll accounts were left unchanged. An associate told her that he was starting a financial service business and needed some contact information. Using the privileged access rights that she had retained, the employee provided her associate with confidential information of many employees, including 401(k) account numbers, credit card account numbers, and social security numbers, which he then used to commit more than 100 cases of identity theft. The insiders actions caused more than $1 million worth of damages to the firm and its employees.

23 A database analyst of a major check authorization and credit card processing company went beyond his authorized computer access rights. The employee obtained his firms consumer information of 8.4 million individuals. The stolen information included names and addresses, bank account information, and credit and debit card information. He sold the data to telemarketers over a five-year period.

24 An IT consultant working under contract for an offshore oil platform company was denied an offer for a permanent job with the same company. He then accessed the firms computer systems without approval and caused damage by impairing the integrity and availability of data.

25 A manager responsible for payment authorization hired an offshore programmer to insert a couple of independent contractors to the vendor table of his companys database. He then authorized payments to the independent contractors on fictitious services for personal gain. He spent the stolen money on luxury items and extravagant purchases for himself, his family, and friends.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing Cases An Interactive Learning Approach

Authors: Mark S Beasley, Frank A. Buckless, Steven M. Glover, Douglas F Prawitt

7th Edition

0134421825, 9780134421827

More Books

Students also viewed these Accounting questions

Question

2. Whats involved in listening?

Answered: 1 week ago

Question

1. How do listening and hearing diff er?

Answered: 1 week ago