SlideShare a Scribd company logo
Subject " Forensic Accountng"
As we move forward, and computer technology improves, we will have the ability to utilize
programs to look for "red flags" or anomalies within a companies books. The other side of this
coin is that this technology can also be utilized to conduct fraudulent operations, and an article in
Accounting today even suggests that this will be the direction that fraud goes in 2015.
If a company is suspected of fraud, or a whistleblower comes to the SEC with information fraud
examiners will get to work! HOW an auditor investigate it.
Solution
Fraud has become very complicated in this era of technology, and increasingly difficult to detect,
especially when it is collusive in nature and committed by top management who are capable of
concealing it.
Over the last two decades, there have been developments concerning fraud which some have
seen as marking significant extension to audit responsibilities. The business community,
especially the accounting profession, has become increasingly concerned about the rise in
management fraud. Recent internal reports suggest that employee fraud is pervasive, plaguing
both large and small organization alike.
If a company is suspected of fraud or a whistle blower comes to SEC,an auditor has to conduct
thorough investigation to get the root of the fraud and carry out necessary actions accordingly.
First,we will take a look at various types of frauds that can prevail and different investigation
procedures.
TYPES OF INVESTIGATION
The forensic accountant could be asked to investigate many different types of fraud. It is useful
to categorise these types into three groups to provide an overview of the wide range of
investigations that could be carried out. The three categories of frauds are corruption, asset
misappropriation and financial statement fraud.
Corruption
There are three types of corruption fraud: conflicts of interest, bribery, and extortion. Research
shows that corruption is involved in around one third of all frauds.
Asset misappropriation
By far the most common frauds are those involving asset misappropriation, and there are many
different types of fraud which fall into this category. The common feature is the theft of cash or
other assets from the company, for example:
Financial statement fraud
This is also known as fraudulent financial reporting, and is a type of fraud that causes a material
misstatement in the financial statements. It can include deliberate falsification of accounting
records; omission of transactions, balances or disclosures from the financial statements; or the
misapplication of financial reporting standards. This is often carried out with the intention of
presenting the financial statements with a particular bias, for example concealing liabilities in
order to improve any analysis of liquidity and gearing.
CONDUCTING AN INVESTIGATION
The process of conducting a forensic investigation is, in many ways, similar to the process of
conducting an audit, but with some additional considerations. The various stages are briefly
described below.
Accepting the investigation
The forensic accountant must initially consider whether their firm has the necessary skills and
experience to accept the work. Forensic investigations are specialist in nature, and the work
requires detailed knowledge of fraud investigation techniques and the legal framework.
Investigators must also have received training in interview and interrogation techniques, and in
how to maintain the safe custody of evidence gathered.
Additional considerations include whether or not the investigation is being requested by an audit
client. If it is, this poses extra ethical questions, as the investigating firm would be potentially
exposed to self-review, advocacy and management threats to objectivity. Unless robust
safeguards are put in place, the firm should not provide audit and forensic investigation services
to the same client. Commercial considerations are also important, and a high fee level should be
negotiated to compensate for the specialist nature of the work, and the likely involvement of
senior and experienced members of the firm in the investigation.
Planning the investigation
The investigating team must carefully consider what they have been asked to achieve and plan
their work accordingly. The objectives of the investigation will include:
The investigators should also consider the best way to gather evidence – the use of computer
assisted audit techniques, for example, is very common in fraud investigations.
Gathering evidence
In order to gather detailed evidence, the investigator must understand the specific type of fraud
that has been carried out, and how the fraud has been committed.
Evidence can be gathered using various techniques, such as:
The ultimate goal of the forensic investigation team is to obtain a confession by the fraudster, if a
fraud did actually occur. For this reason, the investigators are likely to avoid deliberately
confronting the alleged fraudster(s) until they have gathered sufficient evidence to extract a
confession. The interview with the suspect is a crucial part of evidence gathered during the
investigation.
Reporting
The client will expect a report containing the findings of the investigation, including a summary
of evidence and a conclusion as to the amount of loss suffered as a result of the fraud. The report
will also discuss how the fraudster set up the fraud scheme, and which controls, if any, were
circumvented.
Court proceedings
The investigation is likely to lead to legal proceedings against the suspect, and members of the
investigative team will probably be involved in any resultant court case. The evidence gathered
during the investigation will be presented at court, and team members may be called to court to
describe the evidence they have gathered and to explain how the suspect was identified. It is
imperative that the members of the investigative team called to court can present their evidence
clearly and professionally, as they may have to simplify complex accounting issues so that non-
accountants involved in the court case can understand the evidence and its implications.
CONCLUSION
In summary, investigating a fraud especially involving technology is a very specialist type of
engagement, which requires highly skilled team members who have experience not only of
accounting and auditing techniques, but also of the relevant legal framework.

More Related Content

PPTX
Kenya AMC Presentation 2
PDF
What Makes Corporate Fraud Investigations Challenging: Dealing with Complex F...
PPTX
Forensic Audit.pptx
PPTX
Case study on forensic audit
PDF
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
PPT
Auditing for Internal Fraud
PDF
Audit, investigation & forensic accounting: Exploring the nexus
PDF
FORENSIC AUDIT.pdf hhhhdhdhdhdhdhddhddhddhhdd
Kenya AMC Presentation 2
What Makes Corporate Fraud Investigations Challenging: Dealing with Complex F...
Forensic Audit.pptx
Case study on forensic audit
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
Auditing for Internal Fraud
Audit, investigation & forensic accounting: Exploring the nexus
FORENSIC AUDIT.pdf hhhhdhdhdhdhdhddhddhddhhdd

Similar to Subject Forensic AccountngAs we move forward, and computer te.pdf (20)

PPTX
Forensic Audit Procedures
PPTX
Investigation and forensic audit in a computerized work environment
PPT
PPT-FRAUD-CORRUPTION-20210619112754 (6).ppt
PDF
Forensic Accounting An Ex Ante Ex post Evaluation for India
PPTX
Process of Forensic Accounting
PPTX
Setting up Fraud Investigation Practice Prof. Oyedokun.pptx
PPTX
What is Forensic Accounting and How Does It Work?
PDF
chapter 1 introduction forensic accounting
PPTX
Sahara Case Study.pptx sahara case study detail
PDF
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
PPTX
Best practices in conducting Financial Investigations
PDF
Empowering Auditors in Preventing Frauds
PPTX
Forensic accounting
PDF
Ensuring Effective Suspicious Activity Reporting.pdf
PPTX
Kenya AMC Presentation 1
PDF
Discus the development of the fraud examinerforensic accounting pro.pdf
PDF
Case Study Audit
PDF
Understanding forensic investigation process by G. E. Oyedokun
PPT
CAG's Regulations and Standing orders on the Audit of Fraud
PPTX
Forensic Accounting in Brief
Forensic Audit Procedures
Investigation and forensic audit in a computerized work environment
PPT-FRAUD-CORRUPTION-20210619112754 (6).ppt
Forensic Accounting An Ex Ante Ex post Evaluation for India
Process of Forensic Accounting
Setting up Fraud Investigation Practice Prof. Oyedokun.pptx
What is Forensic Accounting and How Does It Work?
chapter 1 introduction forensic accounting
Sahara Case Study.pptx sahara case study detail
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
Best practices in conducting Financial Investigations
Empowering Auditors in Preventing Frauds
Forensic accounting
Ensuring Effective Suspicious Activity Reporting.pdf
Kenya AMC Presentation 1
Discus the development of the fraud examinerforensic accounting pro.pdf
Case Study Audit
Understanding forensic investigation process by G. E. Oyedokun
CAG's Regulations and Standing orders on the Audit of Fraud
Forensic Accounting in Brief
Ad

More from akilastationarrymdu (20)

PDF
Summary the article below in the bullet point How can engineers m.pdf
PDF
Sulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdf
PDF
Summarize statistical methods used in forecasting and the types of t.pdf
PDF
Submit the introduction to fraud as it applies to your case study of.pdf
PDF
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
PDF
Sum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdf
PDF
Submit your hypothesis development and investigation plan for your c.pdf
PDF
Subsidence to sinkholes and rockfalls to avalanches. Each geographic.pdf
PDF
Subjects were children enrolled in a health maintenance organization.pdf
PDF
Subject- organizational behaviour in 21st centuryWhat would you s.pdf
PDF
Subject Risk ManagementThere are 4 critical success factors that .pdf
PDF
Suppose a point is randomly selected along a line segment of length .pdf
PDF
Summarize the main features of the ADA and include an example of a .pdf
PDF
summarize the processes involved in project human resource managemen.pdf
PDF
Suppose a Math 1040 class has 25 students and 5 if them are not pun.pdf
PDF
Suppose a large number of new immigrants enter the labor market. Ass.pdf
PDF
Suppose a function F(z) is a product of n differentiable functio.pdf
PDF
Suppose a disk is expected to fail in 1 to 2 years. If the failure d.pdf
PDF
Suppose a division of New York instruments that sells computer micro.pdf
PDF
Suppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdf
Summary the article below in the bullet point How can engineers m.pdf
Sulfur forms oxides, oxoanions, and halides. What is the hybridizati.pdf
Summarize statistical methods used in forecasting and the types of t.pdf
Submit the introduction to fraud as it applies to your case study of.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Sum of Squares (SS) in an ANOVA divided by the degrees of freedom eq.pdf
Submit your hypothesis development and investigation plan for your c.pdf
Subsidence to sinkholes and rockfalls to avalanches. Each geographic.pdf
Subjects were children enrolled in a health maintenance organization.pdf
Subject- organizational behaviour in 21st centuryWhat would you s.pdf
Subject Risk ManagementThere are 4 critical success factors that .pdf
Suppose a point is randomly selected along a line segment of length .pdf
Summarize the main features of the ADA and include an example of a .pdf
summarize the processes involved in project human resource managemen.pdf
Suppose a Math 1040 class has 25 students and 5 if them are not pun.pdf
Suppose a large number of new immigrants enter the labor market. Ass.pdf
Suppose a function F(z) is a product of n differentiable functio.pdf
Suppose a disk is expected to fail in 1 to 2 years. If the failure d.pdf
Suppose a division of New York instruments that sells computer micro.pdf
Suppoe x and y denotes individuals. Let C(x,y) be thestatement x a.pdf
Ad

Recently uploaded (20)

PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Pharma ospi slides which help in ospi learning
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Cell Structure & Organelles in detailed.
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Institutional Correction lecture only . . .
PDF
01-Introduction-to-Information-Management.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Types and Its function , kingdom of life
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
A systematic review of self-coping strategies used by university students to ...
Pharma ospi slides which help in ospi learning
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Cell Structure & Organelles in detailed.
Chinmaya Tiranga quiz Grand Finale.pdf
Microbial disease of the cardiovascular and lymphatic systems
Institutional Correction lecture only . . .
01-Introduction-to-Information-Management.pdf
human mycosis Human fungal infections are called human mycosis..pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Types and Its function , kingdom of life
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Complications of Minimal Access Surgery at WLH
STATICS OF THE RIGID BODIES Hibbelers.pdf
Classroom Observation Tools for Teachers
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Computing-Curriculum for Schools in Ghana
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Subject Forensic AccountngAs we move forward, and computer te.pdf

  • 1. Subject " Forensic Accountng" As we move forward, and computer technology improves, we will have the ability to utilize programs to look for "red flags" or anomalies within a companies books. The other side of this coin is that this technology can also be utilized to conduct fraudulent operations, and an article in Accounting today even suggests that this will be the direction that fraud goes in 2015. If a company is suspected of fraud, or a whistleblower comes to the SEC with information fraud examiners will get to work! HOW an auditor investigate it. Solution Fraud has become very complicated in this era of technology, and increasingly difficult to detect, especially when it is collusive in nature and committed by top management who are capable of concealing it. Over the last two decades, there have been developments concerning fraud which some have seen as marking significant extension to audit responsibilities. The business community, especially the accounting profession, has become increasingly concerned about the rise in management fraud. Recent internal reports suggest that employee fraud is pervasive, plaguing both large and small organization alike. If a company is suspected of fraud or a whistle blower comes to SEC,an auditor has to conduct thorough investigation to get the root of the fraud and carry out necessary actions accordingly. First,we will take a look at various types of frauds that can prevail and different investigation procedures. TYPES OF INVESTIGATION The forensic accountant could be asked to investigate many different types of fraud. It is useful to categorise these types into three groups to provide an overview of the wide range of investigations that could be carried out. The three categories of frauds are corruption, asset misappropriation and financial statement fraud. Corruption There are three types of corruption fraud: conflicts of interest, bribery, and extortion. Research shows that corruption is involved in around one third of all frauds. Asset misappropriation By far the most common frauds are those involving asset misappropriation, and there are many different types of fraud which fall into this category. The common feature is the theft of cash or
  • 2. other assets from the company, for example: Financial statement fraud This is also known as fraudulent financial reporting, and is a type of fraud that causes a material misstatement in the financial statements. It can include deliberate falsification of accounting records; omission of transactions, balances or disclosures from the financial statements; or the misapplication of financial reporting standards. This is often carried out with the intention of presenting the financial statements with a particular bias, for example concealing liabilities in order to improve any analysis of liquidity and gearing. CONDUCTING AN INVESTIGATION The process of conducting a forensic investigation is, in many ways, similar to the process of conducting an audit, but with some additional considerations. The various stages are briefly described below. Accepting the investigation The forensic accountant must initially consider whether their firm has the necessary skills and experience to accept the work. Forensic investigations are specialist in nature, and the work requires detailed knowledge of fraud investigation techniques and the legal framework. Investigators must also have received training in interview and interrogation techniques, and in how to maintain the safe custody of evidence gathered. Additional considerations include whether or not the investigation is being requested by an audit client. If it is, this poses extra ethical questions, as the investigating firm would be potentially exposed to self-review, advocacy and management threats to objectivity. Unless robust safeguards are put in place, the firm should not provide audit and forensic investigation services to the same client. Commercial considerations are also important, and a high fee level should be negotiated to compensate for the specialist nature of the work, and the likely involvement of senior and experienced members of the firm in the investigation. Planning the investigation The investigating team must carefully consider what they have been asked to achieve and plan their work accordingly. The objectives of the investigation will include: The investigators should also consider the best way to gather evidence – the use of computer assisted audit techniques, for example, is very common in fraud investigations. Gathering evidence
  • 3. In order to gather detailed evidence, the investigator must understand the specific type of fraud that has been carried out, and how the fraud has been committed. Evidence can be gathered using various techniques, such as: The ultimate goal of the forensic investigation team is to obtain a confession by the fraudster, if a fraud did actually occur. For this reason, the investigators are likely to avoid deliberately confronting the alleged fraudster(s) until they have gathered sufficient evidence to extract a confession. The interview with the suspect is a crucial part of evidence gathered during the investigation. Reporting The client will expect a report containing the findings of the investigation, including a summary of evidence and a conclusion as to the amount of loss suffered as a result of the fraud. The report will also discuss how the fraudster set up the fraud scheme, and which controls, if any, were circumvented. Court proceedings The investigation is likely to lead to legal proceedings against the suspect, and members of the investigative team will probably be involved in any resultant court case. The evidence gathered during the investigation will be presented at court, and team members may be called to court to describe the evidence they have gathered and to explain how the suspect was identified. It is imperative that the members of the investigative team called to court can present their evidence clearly and professionally, as they may have to simplify complex accounting issues so that non- accountants involved in the court case can understand the evidence and its implications. CONCLUSION In summary, investigating a fraud especially involving technology is a very specialist type of engagement, which requires highly skilled team members who have experience not only of accounting and auditing techniques, but also of the relevant legal framework.