Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

For this project, you will select a client from the Project One Client Case Studies provided in the Supporting Materials section, review the scenario, and,

For this project, you will select a client from the Project One Client Case Studies provided in the Supporting Materials section, review the scenario, and, based on what you have learned in this course, analyze the information provided by the client to determine the impact of the act or acts of fraud that have occurred. You will create a work paper, used by forensic accountants and auditors, to document your findings. Specifically, you will use the Project One Work Paper Template located in the What to Submit section. Specifically, you must address the following rubric criteria: Describe the impact(s) of the act or acts of computer fraud on the client's organization. Include the following: Financial-related impact(s) Cybercrime-related impact(s) Explain the type of intrusion(s) performed by the act or acts of computer fraud. Include the following: Reflect on whether the act or acts of fraud were performed with or against a computer system. Justify whether the act or acts of computer fraud meet the legal definition of computer fraud. Include the following: List areas of intent to defraud using a computer system. Determine how intent applies for each area in this act of computer fraud. Explain the types of potential damages

Scenario One

The Meier Corporation is growing fast. Many of the employees and managers have been with the company from the start. The company is adding and improving its IT systems on the fly. Jeff, the IT manager, has full, unrestricted access to the company's systems, including the company bank account details.

With the expansion of the company, a new chief operating officer has been hired from outside the company. Having worked demanding hours over the previous couple of years, Jeff had expected to be promoted to that position and is disappointed. Jeff decides to utilize his inside experience, knowledge of passwords, and involvement in procedures for his own benefit.

Jeff uses his access to the company's private systems to create a second bank account in his name and divert company funds to this bank account through online banking access. He covers up the transactions with general ledger entries. Twice during the year, when questions arise, he tells the accounts department that the issue is due to a "system imbalance" and promises to have it resolved as soon as possible.

During testing at year-end by the external auditors, one of the anomalous payments is examined along with the detail and explanation for the entries. Unbeknownst to the IT manager, the company's audit committee requests a full review of the company's systems to identify the cause of the "system imbalances." The extent of the IT manager's fraud takes several months to ascertain, such was the skill with which the account balances had been manipulated.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Horngrens Financial And Managerial Accounting The Managerial Chapters

Authors: Tracie Miller Nobles, Brenda Mattison, Ella Mae Matsumura

6th Edition

0134486854, 978-0134486857

More Books

Students also viewed these Accounting questions

Question

Values: What is important to me?

Answered: 1 week ago

Question

Purpose: What do we seek to achieve with our behaviour?

Answered: 1 week ago