Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Match each term to its correct description Theft Act Investigations Surveillance Vulnerability Chart Invigilation Computer forensics Cyclic redundancy check number Concealment Investigative Methods Theft Investigative

  1. Match each term to its correct description

    Theft Act Investigations

    Surveillance

    Vulnerability Chart

    Invigilation

    Computer forensics

    Cyclic redundancy check number

    Concealment Investigative Methods

    Theft Investigative Methods

    Conversion Investigative Methods

    Inquiry Investigative Methods

    A.

    The gather of electronic evidence.

    B.

    Searching public records, online resources, the net worth method

    C.

    a theft act investigative technique that involves close supervision of suspects during an examination period.

    D.

    Document examination, audits, electronic searches, physical asset counts

    E.

    Also called observation, it involves watching and recording the physical facts, acts, and movements, which are part of the theft act of a fraud.

    F.

    a calculation based on the contents of a disk or file.

    G.

    a tool that explicitly considers all aspects of the fraud.

    H.

    Surveillance and covert operations, invigilating, seizing and searching computers, physical evidence.

    I.

    Interviews and interrogation, honesty testing

    J.

    activities that directly investigate the fraud act.

QUESTION 2

  1. Match each term to its correct description

    Chain of Custody

    Bates Numbers

    Link Analysis

    Discovery Sampling

    Sampling Risk

    Nonsampling Risk

    Subpoenas

    Document Examination

    Document Experts

    A.

    allows an auditor to generalize and make inferences from the sample to the population.

    B.

    a record must be kept of when a document is received and what has happened to it since its receipt.

    C.

    Risk that a sample is not representative of the population.

    D.

    A specialized form of investigation that applies forensic chemistry, microscopy, light, and photography in making determinations about documents.

    E.

    orders issued by a court of a grand jury to produce documents.

    F.

    The process of linking people, documents, and events in a case. Link analysis is often performed by automated software that helps coordinate large cases.

    G.

    can determine whether a document was written by the person whose signature it bears, has been forged, or has been altered by additions, deletions, obliterations, erasures, or photocopying.

    H.

    used by attorneys involved in litigation to track all documents.

    I.

    The risk that a finding will be misrepresented.

QUESTION 3

  1. Match each term to its correct description.

    Interview

    National Crime Information Center

    Interstate identification index

    Postal Inspectors

    Trashing

    Gramm-Leach-Bliley Act

    Opting Out

    Net worth method

    A.

    Federal investigators who can handle major fraud cases involving the use of mail; they work for the prosecution of offenders who violate postal laws.

    B.

    Analytical method that estimates a suspect's unexplained income.

    C.

    The process of looking through a person's trash for possible evidence.

    D.

    Information on stolen vehicles, license plates, securities, boats, and planes; stolen and missing firearms; missing persons; and individuals whoa re wanted on outstanding warrants.

    E.

    Protects against the use of false pretenses. It made it more difficult for officials and private citizens to access information from financial institutions.

    F.

    Not providing written notice to the bank denying the bank the right to sell their personal bank information.

    G.

    Retains arrest and criminal records on a nationwise basis

    H.

    A question and answer session designed to elicit information

QUESTION 4

  1. Match each term to its correct description

    Reaction to Crises

    Question Typology

    Elements of Conversation

    Inhibitors of Communication

    Facilitators of Communication

    Mechanics of the Interview

    Honesty Testing

    A.

    Pencil-and Paper Test, Graphology, Voice Stress Analysis and Polygraphs

    B.

    Expression, Persuasion, Therapy, Ritual, Information Exchange

    C.

    Introductory Questions, Informational Questions, Assessment Questions, Closing Questions, Admission-Seeking Questions

    D.

    Introductory Questions, Methodology, Informational Questions, Question Sequence, Informational Question Techniques, Note-Taking, Observing Respondent Reactions, Theme Development, Transition Methodology, Dealing with Resistance, Difficult People, Volatile Interviews, Assessment Questions, Detecting Deception, Methodology of Assessment Questions, Admission-Seeking Questions, Physical Evidence.

    E.

    Fulfilling Expectations, Recognition, Altruistic Appeals, Sympathetic Understanding, New Experience, atharsis, NEed for Meaning, Extrinsic Rewards.

    F.

    Denial, Anger, Rationalization, Depression, Acceptance.

    G.

    Competing Demands for Time, Threatened Egos, Etiquette, Trauma, Forgetting, Chronological Confusion, Inferential Confusion, Unconscious Behavior

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Performance Auditing

Authors: Shrivastava A.

1st Edition

8131316254, 978-8131316252

More Books

Students also viewed these Accounting questions