Outcomes Based Course Outline Revision

advertisement
Butler Community College
Career and Technical Education Division
Janice Akao
Fall 2010
COURSE OUTLINE
Introduction to Fraud Examination
Course Description
BA 148. Introduction to Fraud Examination. 3 hours credit. Prerequisite: BA 126 and
BA 127 with a C or better. This course will enable the student to become familiar with
the field of fraud examination which is one aspect of forensic accounting. The student
will use fraud examination methodology to explore the various types of fraudulent
financial schemes and analyze ways to prevent and/or detect financial fraud.
Course Relevance
Demand for fraud examiners has increased in recent years due to the increased
requirements of the Sarbanes-Oxley Act of 2002 and the increase in financial fraud.
The information learned in this class will enable the student to understand and detect
financial fraud and develop methods to detect or prevent its future occurrence.
Required Materials
Wells, J. T. (2008). Principles of fraud examination. (2nd ed.). Hoboken, NJ: John Wiley
& Sons, Inc.
Learning Outcomes
The intention is for the student to be able to:
1. Explain fraud examination methodology.
2. Identify various fraudulent financial schemes.
3. Develop appropriate action to prevent and/or detect financial fraud.
Learning PACT Skills that will be developed and documented in this course
Through involvement in this course, the student will develop ability in the following
PACT skill area(s):
Communication skills
1. Creation and delivery of message
Through the exploration of cases studies involving fraud, the student will develop
communication skills by preparing a written case analysis.
Major Summative Assessment Task(s)
These learning outcome(s) and the Learning PACT skill(s) will be demonstrated by:
1. Using fraud examination methodology to analyze a fraud case and prepare a written
report recommending appropriate measures to prevent and/or detect this type of
fraud in the future.
Course Content
I. Skills or Competencies – Actions that are essential to achieve the course outcomes:
A. Understand of business practices
BA148 Introduction to Fraud Examination
1
B. Appraise case studies
Learning Units
I. Introduction to forensic accounting
A. Define fraud examination and differentiate it from auditing
B. Understand fraud theory approach
C. Define occupational fraud
D. Define and differentiate between fraud and abuse
E. Describe the criminological contributions of Edwin H. Sutherland
F. Understand Donald Cressey's hypothesis
G. Give examples of non-shareable problems that contribute to fraud
H. Understand how perceived opportunity and rationalization contribute to fraud
I. Explain W. Steve Albrecht's fraud scale
J. Summarize the conclusions of the Hollinger-Clark Study
K. Summarize the results of the 2006 National Fraud Survey
II. Skimming
A. Define skimming
B. List and understand the two principal categories of skimming schemes
C. Review how sales skimming is committed and concealed
D. Describe schemes involving understated sales
E. Understand how cash register manipulations are used to skim currency
F. Explain how sales are skimmed during non-business hours
G. Discuss techniques for preventing and detecting sales skimming
H. List and explain the six methods typically used by fraudsters to conceal
receivables skimming
I. Define lapping and how it is used to hide skimming schemes
J. Explain how fraudsters use fraudulent write-offs or discounts to conceal
skimming
K. Discuss techniques for preventing and detecting receivables skimming
L. Identify proactive audit tests that can be used to detect skimming.
III. Cash larceny
A. Define cash larceny
B. Explain how cash receipts schemes differ from fraudulent disbursements
C. Recognize the difference between cash larceny and skimming
D. Understand the relative frequency and cost of cash larceny schemes as opposed
to other forms of cash misappropriations
E. Identify weaknesses in internal controls as inducing factors to cash larceny
schemes
F. Understand how cash larceny is committed at the point of sale
G. Discuss measures that can be used to prevent and detect cash larceny at the
point of sale
H. Identify various methods used by fraudsters to conceal cash larceny of
receivables
BA148 Introduction to Fraud Examination
2
I. Describe schemes involving cash larceny from deposits including lapping and
deposits in transit
J. Discuss controls and procedures that can be used to prevent and detect cash
larceny from bank deposits
K. Identify proactive audit tests that can be used to detect cash larceny schemes
IV. Billing schemes
A. List the five major categories of fraudulent disbursements
B. Define the term billing schemes
C. List the three categories of billing schemes
D. Understand what a shell company is and how it is formed
E. Discuss the four ways false invoices are approved for payment
F. Understand why most shell company schemes involve the purchase of services
rather than goods
G. Describe how a pass-through scheme differs from the usual shell company
schemes
H. Identify methods for preventing and detecting shell company schemes
I. Understand how pay-and-return schemes work
J. Understand how non-accomplice vendor schemes work
K. Identify methods for preventing and detecting non-accomplice vendor schemes
L. Understand how personal purchases schemes work
M. Identify methods for preventing and detecting personal purchases schemes
N. Discuss proactive audit tests that can be used to detect billing schemes
V. Check tampering
A. Define check tampering
B. Understand the five principal categories of check tampering
C. Detail the means by which employees fraudulently obtain company checks
D. Understand how forged signatures are created on blank check stock
E. Identify methods for preventing and detecting forged maker schemes
F. Differentiate between forged maker and forged endorsement schemes
G. Detail the methods employees use to intercept outgoing checks before they are
delivered to the intended payee
H. Discuss methods that can be used to prevent and detect the theft and/ or
alteration of outgoing company checks
I. Understand how authorized maker schemes work and why they are especially
difficult to prevent
J. Understand how check tampering is hidden in a company’s accounting records
K. Describe proactive audit tests that can be used to detect check tampering.
VI. Payroll schemes
A. List the three main categories of payroll fraud
B. Understand the relative cost and frequency of payroll frauds
C. Define a ghost employee
D. List the four steps to making a ghost employee scheme work
BA148 Introduction to Fraud Examination
3
E. Discuss how separation of duties in payroll and human resources functions can
reduce the threat of payroll fraud
F. Identify methods for preventing and detecting ghost employee schemes
G. List the four ways that employees can obtain authorization for a falsified timecard
in a manual system
H. Understand the role that payroll controls play in preventing falsified hours and
salary schemes
I. Discuss the methods for preventing and detecting falsified hours and salary
schemes
J. Identify red flags that are typically associated with commission schemes
K. Describe proactive audit tests that can be used to detect various forms of payroll
fraud
VII. Expense reimbursement schemes
A. Discuss expense reimbursement schemes
B. Understand how expense reimbursement schemes are committed
C. Identify controls for preventing and detecting expense reimbursement schemes
D. Identify overstatement methods used on expense reports
E. Explain fictitious reimbursement schemes
F. Identify red flags used in detecting fictitious reimbursement schemes
G. Discuss multiple reimbursement schemes
H. Identify proactive audit tests used to identify various types of expense
reimbursement schemes
VIII. Register disbursement schemes
A. Explain what constitutes a register disbursement scheme
B. Differentiate register disbursements from skimming and cash larceny schemes
C. List the two basic categories of register disbursements
D. Explain how false refund schemes are committed
E. Explain how false void schemes are committed
F. Understand how register disbursement schemes cause shrinkage
G. Discuss the methods by which fraudulent register disbursements are concealed
H. Identify methods for preventing and detecting register disbursement schemes
I. Discuss proactive audit tests that can be used to detect register disbursement
schemes
IX. Noncash assets
A. List the five categories of noncash misappropriations
B. Explain how misuse of noncash assets can negatively affect organizations
C. Understand how and why unconcealed larceny of noncash assets occurs
D. Identify internal controls and tests that can be used to prevent and detect
noncash larceny.
E. Understand how weaknesses in internal asset requisition and transfer
procedures can lead to the misappropriation of noncash assets
F. Explain how purchasing and receiving schemes are used to misappropriate
noncash assets
BA148 Introduction to Fraud Examination
4
G. Understand how the theft of noncash assets through the use of fraudulent
shipments is accomplished
H. Define the term shrinkage
I. Describe how fraudsters conceal the theft of noncash assets on the victim
organization’s books
J. Discuss proactive audit tests that can be used to detect misappropriations of
noncash assets
X. Corruption
A. Define corruption
B. Identify the four categories of corruption
C. Define bribery
D. Compare and contrast bribery, extortion, and illegal gratuities
E. Identify the two categories of bribery schemes
F. Understand kickback schemes and how they are committed
G. Understand bid- rigging schemes and explain how they are categorized
H. Describe the types of abuses that are committed at each stage of the competitive
bidding process
I. Identify the controls and techniques that can be used to prevent and detect
bribery
J. Define conflicts of interest
K. Differentiate conflicts of interest from bribery schemes and billing schemes
L. List and understand the two major categories of conflicts of interest
M. Discuss proactive audit tests that can be used to detect corruption schemes.
XI. Accounting principles and fraud
A. Define fraud as it relates to financial statements
B. Identify the three main groups of people who commit financial statement fraud
C. List the three primary reasons people commit financial statement fraud
D. Describe the three general methods used to commit financial statement fraud
E. Define overstatements and understatements
F. Describe the conceptual framework for financial reporting
G. List examples of various types of financial statements
XII. Fraudulent financial statement schemes
A. Define financial statement fraud and related schemes
B. Identify the five classifications of financial statement fraud
C. Explain how fictitious revenues schemes are committed as well as the
motivation for, and result of, committing this fraud
D. Explain how timing difference schemes are committed as well as the motivation
for, and result of, committing this fraud
E. Describe the methods by which concealed liabilities and expenses are used to
fraudulently improve a company’s balance sheet
F. Understand how improper disclosures may be used to mislead potential
investors, creditors, or any other users of the financial statements
G. Recognize how improper asset valuation may inflate the current ratio
BA148 Introduction to Fraud Examination
5
H. Identify detection and deterrence procedures that may be instrumental in dealing
with fraudulent financial statement schemes
I. Understand financial statement analysis for detecting fraud
J. Identify and characterize current professional and legislative actions that have
sought to improve corporate governance, enhance the reliability and quality of
financial reports, and foster credibility and effectiveness of audit functions
XIII. Interviewing witnesses
A. List the five types of interview questions
B. Understand how to ask introductory questions
C. Explain how to construct informational questions
D. Understand the differences between open, closed, and leading questions
E. Explain how to close an interview
F. Define and explain the purpose of assessment questions
G. List some nonverbal clues to deception
H. List some verbal clues to deception
I. Discuss the methodology of admission- seeking questions
J. List the elements of a signed statement
XIV. Conducting investigations and writing reports
A. Understand the circumstances that may necessitate an internal investigation
B. Identify who should be part of a fraud examination team
C. Define evidence
D. Identify several evidence gathering techniques
E. Understand the considerations and concerns related to preserving documentary
evidence
F. Understand the importance of and methods for organizing documentary
evidence
G. Identify several sources of evidence and the types of information each can
provide
H. Explain the standard format and requirements for a professional investigation
report
XV. Occupational fraud and abuse: the big picture
A. Understand and describe abusive conduct
B. Determine why attempting to achieve perfection in the workplace is not desirable
C. Explain the obstacles to accurately measure the level of occupational fraud and
abuse in organizations
D. Determine why greed is an inadequate explanation for occupational fraud and
abuse
E. Compare and contrast fraud prevention and fraud deterrence
F. Explain the relevance of adequate reporting programs to fraud deterrence
G. Understand the implications of the Corporate Sentencing Guidelines
H. Understand ethics and ethical theory
BA148 Introduction to Fraud Examination
6
Learning Activities
Learning activities will be assigned to assist the student to achieve intended course
learning outcomes through class lectures, homework problems, case studies, and other
activities at the discretion of the instructor. Activities may be both independent and
group activities.
Grade Determination
The student will be graded on learning activities and assessment tasks. Grade
determinants may include tests, quizzes, homework, internet assignments, class
participation, and other activities as determined by the instructor.
BA148 Introduction to Fraud Examination
7
Download