Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Jackson Company manufactures pet supplies for birds and cats. Its top-level staff includes two accountants, a technology coordinator, a production manager, a ware- house manager,

Jackson Company manufactures pet supplies for birds and cats. Its top-level staff includes two accountants, a technology coordinator, a production manager, a ware- house manager, an office manager, two sales managers, two assistants, and the CEO. The companys main offices and manufacturing plant in Los Angeles consist of an office building, a plant building, and two small warehouses. All buildings are connected via underground fiber optic cable. The servers, hubs, and routers are stored in the main office building.

The brain behind the IT network includes three server machines, named Washington, Jefferson, and Adams. The Adams server hosts the Mixta accounting system, which processes all internal and external accounting transactions in real time. A recent audit by a regional accounting firm discovered six customer accounts that could not be traced back to real people. The auditors confirmations had been returned in the mail, marked Undeliverable and with Invalid Address stamps. To make things worse, all six accounts had been written off for nonpayment of amounts ranging from $4,200 to $7,000. The discovery was a complete surprise to Sandra Winger, the credit manager, because she always reviewed and personally approved all write-offs over $2,500. She was sure that she had not approved any of these.

Sandra called in Tom Surefoot, a local forensic accountant, to investigate. She was sure that fraud was involved, and she strongly suspected that Betty Beanco, one of the office managers, had somehow gotten into the accounting system and set up the phony customer accounts and had probably sold the written-off accounts on the gray market. Sandra was furious.

I dont care how much it costs, Sandra told Tom. I want you to catch that woman. Im not going to let her get away with robbing me like that.

How could Tom apply computer forensics and other techniques to determine whether or not Betty Beanco should be a suspect?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Fraud Auditing And Forensic Accounting

Authors: Tommie W. Singleton, Aaron J. Singleton, G. Jack Bologna, Robert J. Lindquist

3rd Edition

0471785911, 978-0471785910

More Books

Students also viewed these Accounting questions