Details

A Guide to Forensic Accounting Investigation


A Guide to Forensic Accounting Investigation


2. Aufl.

von: Steven L. Skalak, Thomas W. Golden, Mona M. Clayton, Jessica S. Pill

173,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 28.12.2015
ISBN/EAN: 9781118017715
Sprache: englisch
Anzahl Seiten: 656

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Recent catastrophic business failures have caused some to rethink the value of the audit, with many demanding that auditors take more responsibility for fraud detection. This book provides forensic accounting specialists?experts in uncovering fraud?with new coverage on the latest PCAOB Auditing Standards, the Foreign Corrupt Practices Act, options fraud, as well as fraud in China and its implications. Auditors are equipped with the necessary practical aids, case examples, and skills for identifying situations that call for extended fraud detection procedures.
<p>Preface xxi</p> <p>Acknowledgments xxiii</p> <p><b>Chapter 1 Fraud: An Introduction 1</b></p> <p>Fraud: What is It? 2</p> <p>Fraud: Prevalence, Impact, and Form 3</p> <p>Fraud in Historical Perspective 4</p> <p>Types of Fraud 5</p> <p>Root Causes of Fraud 6</p> <p>A Historical Account of the Auditor’s Role 7</p> <p>Auditors Are Not Alone 14</p> <p>Deterrence, Auditing, and Investigation 16</p> <p>Conceptual Overview of the Fraud Deterrence Cycle 17</p> <p>First Look Inside the Fraud Deterrence Cycle 19</p> <p>Auditing and Investigation 22</p> <p><b>Chapter 2 Psychology of the Fraudster 25</b></p> <p>Calculating Criminals 26</p> <p>Situation-Dependent Criminals 27</p> <p>Power Brokers 28</p> <p>Fraudsters Do Not Intend to Harm 28</p> <p>Kinds of Rationalization 33</p> <p>Auditors’ Need to Understand the Mind of the Fraudster 33</p> <p>Conclusion 34</p> <p><b>Chapter 3 The Roles of the Auditor and the Forensic Accounting Investigator 37</b></p> <p>The Patrolman and the Detective 38</p> <p>Complexity and Change 41</p> <p>Auditor Roles in Perspective 42</p> <p>Not All Good People 44</p> <p>Each Company is Unique 45</p> <p>Role of Company Culture 45</p> <p>Estimates 46</p> <p>Choices 49</p> <p>What Auditors Do 50</p> <p>Bedrock of an Effective Audit 55</p> <p>SPADE 57</p> <p>Auditing Standards Take a Risk-Based Approach to Fraud 58</p> <p>Management Override 60</p> <p>Regulatory Reaction to Fraud 60</p> <p>Financial Benefits of Effective Fraud Management 61</p> <p>Conclusion 61</p> <p><b>Chapter 4 Auditor Responsibilities and the Law 63</b></p> <p>Appendix: Summary of PCAOB Matters Involving Detection of Fraud 77</p> <p><b>Chapter 5 When and Why to Call in Forensic Accounting Investigators 79</b></p> <p>Today’s Auditors Are Not Forensic Accounting Investigators 80</p> <p>Auditors Are Not Authenticators 80</p> <p>Auditors Have Limited Exposure to Fraud 81</p> <p>Auditors Are Not Guarantors 82</p> <p>Historically, Audits May Have Been Predictable 83</p> <p>Potential Trigger Points of Fraud 84</p> <p>Reliance on Others 91</p> <p>Conclusion 92</p> <p><b>Chapter 6 Internal Audit: The Second Line of Defense 95</b></p> <p>What Do Internal Auditors Do? 96</p> <p>Internal Audit Scope of Services 98</p> <p>The Handoff to Forensic Accounting Investigators and Legal Counsel 99</p> <p>Perception Problem 101</p> <p>Complex Corporate Fraud and the Internal Audit 102</p> <p>WorldCom and the Thornburgh Report 102</p> <p>Case Studies: The Internal Auditor Addresses Fraud 103</p> <p>A Tragic Circumstance 105</p> <p>Reporting Relationships: A Key to Empowering Fraud Detection 111</p> <p>Tomorrow’s Internal Auditor, Tomorrow’s Management and Board 113</p> <p><b>Chapter 7 Teaming with Forensic Accounting Investigators 115</b></p> <p>Forensic Accounting Investigators’ Cooperation with Internal Auditors 117</p> <p>Forensic Accounting Investigators’ Cooperation with External Auditors 120</p> <p>Objectives of All Interested Parties 122</p> <p>Forensic Accounting Investigators’ Objectives 122</p> <p>Who Should Direct the Investigation and Why? 126</p> <p>Ready When Needed 127</p> <p>Where to Find Skilled Forensic Accounting Investigators 127</p> <p><b>Chapter 8 Anonymous Communications 133</b></p> <p>Typical Characteristics of Anonymous Tips 134</p> <p>Federal Statutes Related to Anonymous Reporting and Whistle-Blower Protections 135</p> <p>Receipt of an Anonymous Communication 139</p> <p>Initial Understanding of Allegations 140</p> <p>Determine Whether Any Allegation Requires Immediate Remedial Action 141</p> <p>Development and Implementation of the Investigative Strategy 142</p> <p>The Investigation Team 142</p> <p>Disclosure Decisions 143</p> <p>Prioritize the Allegations 144</p> <p>Interviewing Employees 145</p> <p>Follow-Up Tip 149</p> <p>Conclusion 150</p> <p><b>Chapter 9 Personal Privacy and Public Disclosure 151</b></p> <p>Introduction 151</p> <p>Data Privacy: Providing Context 152</p> <p>Data Privacy in the United States 153</p> <p>Data Privacy in the European Union 158</p> <p>Navigating the Legal Differences Between the United States and the European Union 162</p> <p>Elsewhere around the Globe 165</p> <p>Public Disclosure 168</p> <p>Conclusion 173</p> <p><b>Chapter 10 Building a Case: Gathering and Documenting Evidence 175</b></p> <p>Critical Steps in Gathering Evidence 176</p> <p>Whose Evidence is It? 182</p> <p>Evidence Created by the Forensic Accounting Investigator 183</p> <p>What Evidence Should Be Gathered? 185</p> <p>Important Considerations Regarding Documents and Working Papers 186</p> <p>Conclusion 189</p> <p><b>Chapter 11 Independence, Objectivity, Skepticism 191</b></p> <p>Accountant’s Independence 192</p> <p>SEC Final Rules for Strengthening Auditor Independence 192</p> <p>SEC Regulation of Forensic Accounting Services 193</p> <p>Consulting versus Attest Services 196</p> <p>Integrity and Objectivity 198</p> <p>Professional Skepticism 199</p> <p>Trust but Verify: Exploring Further 203</p> <p>Loose-Thread Theory of Auditing 207</p> <p>Further Thoughts on the Loose-Thread Theory 210</p> <p><b>Chapter 12 Potential Missteps: Considerations When Fraud</b> is <b>Suspected 213</b></p> <p>Confronting Suspects 213</p> <p>Dismissing the Target 216</p> <p>Assumptions 217</p> <p>The Small Stuff Could Be Important 221</p> <p>Materiality: More on a Key Topic 223</p> <p>Addressing Allegations 224</p> <p>The Case of the Central American General Manager 225</p> <p>Exercising Skepticism 228</p> <p>Case Outcomes 229</p> <p><b>Chapter 13 Potential Red Flags and Fraud Detection Techniques 231</b></p> <p>Types of Fraud Revisited 232</p> <p>Fraud Detection: Overview 233</p> <p>Laying a Foundation for Detection 236</p> <p>Interpreting Potential Red Flags 238</p> <p>Importance of Professional Skepticism 240</p> <p>Revisiting the Fraud Triangle 243</p> <p>Identifying and Evaluating Risk Factors 248</p> <p>Information Gathering 251</p> <p>Analytic Procedures 254</p> <p>Analytic Techniques 258</p> <p>Assessing the Potential Impact of Fraud Risk Factors 260</p> <p>Evaluating Controls 261</p> <p>Unpredictable Audit Tests 263</p> <p>Observation and Inspection 264</p> <p>Financial Statement Fraud: Detection Techniques 266</p> <p>Revenue Recognition 267</p> <p>Corruption 268</p> <p>Summary 269</p> <p><b>Chapter 14 Investigative Techniques 271</b></p> <p>Timing 271</p> <p>Communication 272</p> <p>Early Administrative Matters 272</p> <p>Predication 273</p> <p>What Should You Know before You Start? 275</p> <p>A Word about Insurance 281</p> <p>Exceptions and Other Considerations 282</p> <p>Considerations on International Assignments 283</p> <p>Accounting Issues 285</p> <p>Data Analysis 286</p> <p>Document Review 286</p> <p>Conclusion 291</p> <p><b>Chapter 15 Corporate Intelligence 293</b></p> <p>Definition of Corporate Intelligence 293</p> <p>Evolution of Corporate Intelligence 294</p> <p>Today’s Business Need 297</p> <p>Legal and Regulatory Drivers of Corporate Intelligence 297</p> <p>Cost Drivers of Corporate Intelligence 301</p> <p>Negotiation Drivers of Corporate Intelligence 303</p> <p>Basic Deployment and Consumption of Corporate Intelligence 304</p> <p>Customary Data Fields Necessary to Fulfill Corporate Intelligence Remits 306</p> <p>Analysis and Reporting of Findings 307</p> <p>Coordination and Selection of Management and External Advisors for Intelligence Gathering 307</p> <p>Timing of Deployment 308</p> <p>Limitations of and Inherent Barriers to Corporate Intelligence 308</p> <p>Legal Parameters and Operating Constraints versus Enabling Ethical Debates Surrounding Corporate Intelligence 313</p> <p>Summary 315</p> <p><b>Chapter 16 The Art of the Interview 317</b></p> <p>Difficulty and Value of Obtaining an Admission 318</p> <p>Planning for the Interview 319</p> <p>Types of Interviews 321</p> <p>Others May Wish to Attend Interviews 325</p> <p>Interview Process 326</p> <p>Documenting the Interview 330</p> <p>Use of Subterfuge 331</p> <p>Summary 331</p> <p><b>Chapter 17 Data Mining 333</b></p> <p>Definition and Benefits of Data Mining 334</p> <p>Structured versus Unstructured Data 335</p> <p>Planning 335</p> <p>Methods of Data Acquisition 340</p> <p>Structured Data Analysis 341</p> <p>Unstructured Data 352</p> <p>Advanced Data Analysis Tools 358</p> <p>Conclusion 360</p> <p><b>Chapter 18 Report of Investigation 363</b></p> <p>Types of Reports 364</p> <p>Importance of Adequate Preparation 364</p> <p>Standards of Reporting 365</p> <p>Written Report of Expert Witness Opining for the Plaintiff on a Civil Fraud Claim 371</p> <p>Affidavits 374</p> <p>Informal Reports 374</p> <p>Giving a Deposition 376</p> <p>Mistakes to Avoid in Reporting 380</p> <p>Working Papers 382</p> <p>Relationship Review 384</p> <p>Substantive Working Papers 384</p> <p>Each Working Paper Should Stand on Its Own 384</p> <p>Testimony Binder 386</p> <p>Interview Memorandums 386</p> <p><b>Chapter 19 Supporting a Criminal Prosecution 389</b></p> <p>Key Considerations 390</p> <p>Referral Considerations 393</p> <p><b>Chapter 20 Working with Attorneys 399</b></p> <p>In the Company of Lawyers 399</p> <p>Confidentiality Requirements 400</p> <p>Forming the Investigative Team 401</p> <p>Documentation 407</p> <p>Civil Litigation 408</p> <p>Interviewing 408</p> <p>External Audit Firm 409</p> <p>Working for or Interacting with Law Enforcement or Government Agencies 412</p> <p>Disagreements with Counsel 413</p> <p>Conclusion 414</p> <p><b>Chapter 21 Financial Reporting Fraud and the Capital Markets 417</b></p> <p>Targets of Capital Market Fraud 418</p> <p>Securities Investment Model 419</p> <p>Some Observations on Financial Fraud 429</p> <p>Summary 430</p> <p><b>Chapter 22 Financial Statement Fraud: Revenue and Receivables 433</b></p> <p>Improper Revenue Recognition 435</p> <p>Revenue Recognition Detection Techniques 438</p> <p>Analytical Procedures to Identify or Explore Potential Revenue Red Flags 440</p> <p>Improper Allocation of Value in Multiple-Element Revenue Arrangements 450</p> <p>Improper Accounting for Construction Contracts 452</p> <p>Related-Party Transactions 453</p> <p>Revenue and Receivable Misappropriation 455</p> <p>Inflating the Value of Receivables 460</p> <p>Extended Procedures 461</p> <p>Round-Tripping 463</p> <p>Improperly Holding Open the Books 464</p> <p>Consignments and Demonstration Goods 465</p> <p>Summary 466</p> <p><b>Chapter 23 Financial Statement Fraud: Other Schemes and Misappropriations 467</b></p> <p>Asset Misstatements 467</p> <p>Understatement of Liabilities and Expenses 478</p> <p>Backdating Share Options 479</p> <p>Off-Balance-Sheet Transactions 480</p> <p>Two Basic Accounting Models 481</p> <p>Cookie Jar Reserves 482</p> <p>Improper and Inadequate Disclosures 483</p> <p>Materiality 484</p> <p>Disbursement Schemes 485</p> <p>Invoice Schemes 486</p> <p>Check Tampering 489</p> <p>Expense Reimbursement Schemes 490</p> <p>Payroll Schemes 491</p> <p>Fraud in an Economic Downturn 492</p> <p>Unauthorized Trading 492</p> <p>Mortgage Fraud 494</p> <p><b>Chapter 24 Ponzi Schemes 495</b></p> <p>Ponzi Scheme Origin and Development 495</p> <p>Recent Spotlights 497</p> <p>Insights into Ponzi Schemes: Passing Trend or Lasting Reality? 503</p> <p>Accountant’s Challenges 507</p> <p>Regulatory Bodies and Task Forces 508</p> <p>Bankruptcy Implications 509</p> <p>Summary 510</p> <p><b>Chapter 25 Money Laundering 511</b></p> <p>Relationship between Fraud and Money Laundering 511</p> <p>Counter-Terrorist Financing 514</p> <p>Varying Impact of Money Laundering on Companies 515</p> <p>The Five-Point Program for AML-Regulated Businesses 516</p> <p>Impact of Money Laundering on Financial Statements 520</p> <p>AML and Forensic Accounting Investigation 521</p> <p>Legal Arrangements Lending Themselves to Anonymity 523</p> <p>Auditing and Money Laundering 524</p> <p>Relationship between Fraud Investigation and AML 525</p> <p><b>Chapter 26 Foreign Corrupt Practices Act 527</b></p> <p>Background 527</p> <p>Recent Enforcement Trends 530</p> <p>U.K. Bribery Act 2010 536</p> <p>The Role of the Forensic Accountant 537</p> <p>Red Flags 542</p> <p>Reporting 545</p> <p>Conclusion 546</p> <p><b>Chapter 27 Construction Projects 547</b></p> <p>The Nature of the Construction Industry 547</p> <p>Contract Pricing Strategy 550</p> <p>Standard Form Contracts 554</p> <p>Issues in Analysis 559</p> <p>Change Orders 560</p> <p>Financial Damages 561</p> <p>Underbid 567</p> <p>Inflation 567</p> <p>Analysis of Claims 567</p> <p>Summary 569</p> <p><b>Chapter 28 Contract Compliance 571</b></p> <p>Effective Integrated Internal and External Contract Compliance Program 572</p> <p>The Role of the Forensic Accountant 576</p> <p>Government Contracting 578</p> <p>Risk and Compliance 578</p> <p>Recovery 579</p> <p>Crisis Management and Litigation Support 581</p> <p><b>Chapter 29 Other Dimensions of Forensic Accounting 585</b></p> <p>Environmental Issues 586</p> <p>Intellectual Property 586</p> <p>Insurance and Business Interruption 587</p> <p>Marital Dissolution 588</p> <p>Shareholder Litigation 588</p> <p>Business Valuation 589</p> <p>Business Combinations 589</p> <p>Cybercrime 590</p> <p><b>Chapter 30 Corporate Remediation 593</b></p> <p>What is Remediation? 593</p> <p>What is Driving Corporate Remediation? 594</p> <p>Why is Remediation Necessary? 597</p> <p>How to Remediate 599</p> <p>Role of the Forensic Accountant 603</p> <p>Recent Cases 605</p> <p>Remediation Going Forward 607</p> <p>Index 611</p>
<b>Thomas W. Golden, CPA, CFE (Chicago, IL).</b> Partner, PricewaterhouseCooper LLP specializes in providing consulting and expert witness testimony in both civil and criminal matters with special expertise in forensic accounting, fraud investigation, and financial statement accounting. He is a former Chairman of the Board of Regents for the Association of Certified Fraud Examiners and the current President of the Better Government Association, a citizen watchdog group in Chicago, IL. Mr. Golden is an adjunct professor at DePaul University.<br /><br /> <b>Steven L. Skalak, CPA,</b> <b>(Chicago, IL)</b> is the National Practice Leader for PwC Investigations & Forensic Services of PricewaterhouseCoopers LLP. He has participated in a variety of corporate investigations relating to allegations that the Securities and Exchange Acts were violated, and of accounting or auditing improprieties. Steve has represented Audit Committees, Directors, Officers, Auditors, and Companies in class action litigation with shareholders and SEC investigations.<br /><br /> <b>Mona M. Clayton, CPA, CFE, (Chicago, IL)</b> Partner for Pwc specializes in international fraud investigations with particular emphasis in Latin America where she has conducted investigations.  She has designed investigative practice aids providing for consistent methodologies to be incorporated across common scheme investigations. Ms Clayton is an adjunct professor at DePaul University.

Diese Produkte könnten Sie auch interessieren:

Mindfulness
Mindfulness
von: Gill Hasson
PDF ebook
12,99 €
Counterparty Credit Risk, Collateral and Funding
Counterparty Credit Risk, Collateral and Funding
von: Damiano Brigo, Massimo Morini, Andrea Pallavicini
EPUB ebook
69,99 €