Examlex
At the beginning of this chapter,you were presented with a situation regarding Jason Scott.Jason is an internal auditor for Northwest Industries,a forest products company.On March 31,he reviewed his completed tax return and noticed that the federal income tax withholding on his final paycheck was $5 more than the amount indicated on his W-2 form.He used the W-2 amount to complete his tax return and made a note to ask the payroll department what happened to the other $5.The next day,Jason was swamped,and he dismissed the $5 difference as immaterial.On April 16,a coworker grumbled that the company had taken $5 more from his check than he was given credit for on his W-2.When Jason realized he was not the only one with the $5 discrepancy,he investigated and found that all 1,500 employees had the same $5 discrepancy.He also discovered that the W-2 of Don Hawkins,the payroll programmer,had
thousands of dollars more in withholdings reported to the Internal Revenue Service (IRS)than had been withheld from his paycheck.
Identify the type of fraud scheme may have happened as described.Describe controls you would implement to address the fraud risk,and label each control as preventive or detective.
Homozygous
Having two identical alleles of a particular gene, resulting in a specific trait or characteristic.
Probability
The measure of the likelihood that an event will occur, expressed as a number between 0 and 1.
Y Chromosome
One of the two sex chromosomes of mammals and some other organisms; the Y chromosome determines male gender in humans; normal females are XX, normal males are XY. Compare with X chromosome.
Cystic Fibrosis
A hereditary disorder affecting the exocrine glands, causing the production of abnormally thick mucus, leading to blockage of the pancreatic ducts, intestines, and bronchi and resulting in respiratory and digestive problems.
Q5: A fraud technique that allows a hacker
Q8: Identify theft has always been a federal
Q24: Due to a power outage,the sales clerk
Q33: A DFD created at the highest-level or
Q49: Explain social engineering.
Q69: The process that uses automated tools to
Q90: Which statement below concerning the database management
Q91: Which is a true statement regarding the
Q98: Explain how a company could safeguard its
Q102: Why are threats to accounting information systems