Thursday, May 21, 2020

Elements of the Fraud Triangle - 1582 Words

Case 1.9 ZZZZ Best Company, Inc. Delta. Describe the elements of the Fraud Triangle that apply to this case. Assume you are the perpetrator. Is there a better way to perpetrate this fraud? If there is, describe your method. Specify practical recommendations for the client to prevent this fraud from occurring in the future. The first element of the Fraud Triangle in the case of ZZZZ Best, case 1.9 is Incentives/Pressure. Incentives/Pressure- As a result of the pressure placed on a person who is only a teenager in a tough business, one who faced a lack of working capital, the lack of assets and little profit make it difficult for a person of this stature to achieve financing to produce cash flow for sustaining of operations. One†¦show more content†¦Even as the auditor takes the necessary steps to visit one of the sites in which the company has claimed that work is being done, it is easy to pull off a charade by simply bribing and lying to a construction supervisor who is in charge of redoing a building. We simply have two of our confidantes pose as leasing agents, and that they represent a large client whom would like to view the premises for possible purchase. We then get access to the building, post signs up stating that we are doing the work there and make sure the person who is in charge of security is up to date with who the person really is and what we are doing there in the building. It doesn’t take much to get people to do what we want, simply offer them cash and many are willing contributors to our cause. This is one example of many of the opportunities that were available to ZZZZ Best Company back in the 1980’s before Sarbanes Oxley made changes to the accounting and auditing rules. Is there a better way to perpetrate this fraud? If there is, describe your method. I have read this case several times and there are a number of ways that Minkow could have done differently. First, is to be aware of threatening situations. You must be aware of human emotions and the possibility for revenge and retribution. While in his infancy of committing fraud, Minkow stole money from a woman through credit card fraud. She tried several times to get restitution from ZZZZ Best, but she never didShow MoreRelatedThe Fraud Triangle Consists Of Three Elements Perceived Pressures, Perceived Opportunity And Rationalisation2224 Words   |  9 PagesAccording to (Albrecht 2009) the fraud triangle consist of three elements perceived pressures, perceived opportunity and rationalisation. In the case of Bernie Ebbers and Scott Sullivan there appear to be various factors contributing to each of the elements mentioned in the fraud triangle. Perceived Pressure in this case was due to factors of greed, meeting expectations and to a certain degree, living beyond ones means. (Zekany 2002) describe facts surrounding the saga which indicate how greed playedRead MoreFinancial Statements And Report The Illegal Behavior1723 Words   |  7 PagesAs a auditorï ¼Å'it is impossible to report all the frauds that exist in t he financial statements, but auditor has the responsibility to expose the almost fraud in the financial statements and report the illegal behavior, which has a direct significant impact on the financial reporting. However, preventing fraud not only using management method, but also other methods. (1). Professional judgment of fraud auditors Auditors have to face internal managers of the companies and the CPAS in companies,Read MoreFinancial Fraud, And Identification Of The Different Fraud Types1734 Words   |  7 Pagesvarious types of fraud, in order to aid understanding in regards to the prevention of fraudulent activity. This paper begins with a review of the definition of financial fraud, and identification of the different fraud types. Further, included is an examination of what motivates individuals to commit fraud, including an identification of some of the method in which people commit fraud. A discussion of the importance of the fraud triangle, and how rationalization contributes to fraud is a key areaRead MoreOrganizations Can Easily be Taken Advantage of by the Fraud Triangle784 Words   |  4 Pagesclients and break the law. The best example can be illustrated in the fraud triangle which gives more explanation of why people commit fraud. The fraud triangle is divided into three parts which are the foll owings: Perceived Opportunity, Pressure, and Rationalization. According to Cressey, the most important part of the fraud triangle is pressure which is known as perceived non-shareable financial need. A person commits a fraud because he or she might have some financial pressure in their familyRead MoreHow to Incorporate the Fraud Triangle Theory797 Words   |  4 PagesThe term of â€Å"fraud triangle† was developed by Dr. Donald Cressey, a criminologist who studied embezzlers. The three basic elements of fraud triangle include perceived pressure, perceived opportunity, and the ability to rationalize. It explains the nature of many fraud offenders and also become a tool to assess the risk of fraud. It is important to companies to incorporate the fraud triangle theory in order to reduce the risk of fraud within their organization. From my standpoint, companies shouldRead MoreFraud : The Perfect Fraud Storm1420 Words   |  6 PagesStatement Fraud Option #2 The perfect fraud storm occurred between the years 2000 and 2002 involving two of the largest energy and telecom corporations in the United States: Enron and WorldCom. It was determined that both organizations fraudulently overstated assets, created assets from expenses or overstated revenues, costing investors billions of dollars and resulting in both organizations declaring bankruptcy (Albrecht, Albrecht, Albrecht Zimbelman, 2012). Nine factors contributed to fraud triangleRead MoreCorporate Culture Of Healthsouth Corporation1143 Words   |  5 Pagesway for its industry. However, prior to 2003 the company had a very dark secret: fraud. In 2003 HealthSouth was accused of making $2.7 billion in false journal entries in the company’s system (Helios, 2013). These false entries allowed the corporation to inflate its earnings and revenue. While the corporation was dabbling in a fraudulent, aggressive account system, auditors were unable to detect the extent of the fraud occu rring. If not for Michael Vines and Weston Smith, HealthSouth Corporation mightRead MoreFraud Triangle And Red Flags1485 Words   |  6 PagesOption #1 - Fraud Triangle and Red Flags Plutonium entered the Internet start-up boom in 1988. It experienced rapid growth that resulted in a haphazard information technology (IT) system in which pieces of technology were implemented quickly leaving poor integration and data integrity. To strengthen data integrity and create an integrated IT system, the organization installed a billing system, Gateway, which required testing utilizing an imitation yet live credit card number to test the softwareRead MoreThe Corruption Of The Fraud Triangle1640 Words   |  7 Pageslikelihood of fraud increases when the three elements of the fraud triangle come together. Analyze how the three elements of the fraud triangle are important and how all three elements were present in Helen’s case. The three elements of the fraud triangle are Motivation or Pressure, Opportunity and Rationalization. After reading the case, it was revealed that all of the three elements are present the Helen’s fraudulent activities. Motivation: This is a reason for why the fraudsters commit frauds. It providesRead MorePlutonium: Credit Card and Chris Essay1448 Words   |  6 PagesRunning Head: PLUTONIUM COMPANY Week 3 Case Study: Plutonium Company Fraud Kyle Harrison Keller Graduate School of Management AC 572: Accounting Fraud Examination Concepts Instructor Sherwin Cord January 25, 2009 Week 3 Case Study: Plutonium Company Fraud Plutonium, an Internet start-up company founded in 1988, was in the midst of a massive project to improve integration and internal data quality of its disparate information systems. At the heart of this project was an endeavor to implement

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.