Question
For this project, you will select a client from the Project One Client Case Studies provided in the Supporting Materials section, review the scenario, and,
For this project, you will select a client from the Project One Client Case Studies provided in the Supporting Materials section, review the scenario, and, based on what you have learned in this course, analyze the information provided by the client to determine the impact of the act or acts of fraud that have occurred. You will create a work paper, used by forensic accountants and auditors, to document your findings. Specifically, you will use the Project One Work Paper Template located in the What to Submit section. Specifically, you must address the following rubric criteria: Describe the impact(s) of the act or acts of computer fraud on the client's organization. Include the following: Financial-related impact(s) Cybercrime-related impact(s) Explain the type of intrusion(s) performed by the act or acts of computer fraud. Include the following: Reflect on whether the act or acts of fraud were performed with or against a computer system. Justify whether the act or acts of computer fraud meet the legal definition of computer fraud. Include the following: List areas of intent to defraud using a computer system. Determine how intent applies for each area in this act of computer fraud. Explain the types of potential damages
Scenario One
The Meier Corporation is growing fast. Many of the employees and managers have been with the company from the start. The company is adding and improving its IT systems on the fly. Jeff, the IT manager, has full, unrestricted access to the company's systems, including the company bank account details.
With the expansion of the company, a new chief operating officer has been hired from outside the company. Having worked demanding hours over the previous couple of years, Jeff had expected to be promoted to that position and is disappointed. Jeff decides to utilize his inside experience, knowledge of passwords, and involvement in procedures for his own benefit.
Jeff uses his access to the company's private systems to create a second bank account in his name and divert company funds to this bank account through online banking access. He covers up the transactions with general ledger entries. Twice during the year, when questions arise, he tells the accounts department that the issue is due to a "system imbalance" and promises to have it resolved as soon as possible.
During testing at year-end by the external auditors, one of the anomalous payments is examined along with the detail and explanation for the entries. Unbeknownst to the IT manager, the company's audit committee requests a full review of the company's systems to identify the cause of the "system imbalances." The extent of the IT manager's fraud takes several months to ascertain, such was the skill with which the account balances had been manipulated.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started