15.4
15.4
No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
u
analysis for key accounts such as revenue and expenses are some of the
ed
many tests you may encounter if you pursue a career in accounting data
analytics.
u.
When you perform data analytics, it’s important to obtain data from the
source system. Rather than trust a report provided by management, go
ny
directly to the data in the system and request an extract. You can
compare the source data to the financial statements to see if somewhere
n.
along the way management has manipulated the data. You can’t always
trust management, as they are most often responsible for—or at least
er
involved in—financial statement fraud. Use your professional skepticism
and critical-thinking skills to ask questions, dig deeper, and verify results
st
u
ed
u.
ny
John Aubrey Pickens, CFE, CISA
n.
John is a risk and compliance professional with over 13 years of experience
identifying, managing, and mitigating risk through compliance and internal
er
audit departments. He earned a bachelor’s degree with a double major in
accounting and management information systems and began his career as an
IT and financial auditor for one of the Big Four firms. John soon realized that
st
auditing. Since then, he has led internal audits, helped build compliance and
internal audit functions, and led the risk and control portions of major
software implementations. He has also built fraud detection and anti-fraud
03
daughter, traveling abroad, and, when he can, sneaking away to fish or hike.
What types of fraud risks have you encountered throughout your
jm
career?
I have seen the most fraud risks and cases of fraud around business
processes where employees have fast, easy access to money or something
they can convert to money. Whether it’s buying extra inventory and selling
some of it, abusing corporate cards by expensing inappropriate expenses, or
setting up fictitious vendors, these methods of stealing assets are common. In
my experience, fraudsters tend to get as much as they can while under the
radar so that they can act fast, before they are detected.
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
Is there a specific example of fraud you have uncovered that you can
share with us?
I can’t be very specific, but corporate cards, which are used to expense travel
and for corporate purchasing, are often abused in interesting ways and are
frequently involved in frauds, typically involving low dollar amounts. It is very
easy for fraudsters to swipe a card with certain merchant providers and call it
something that seems like a legitimate business expense. They can also use a
corporate card to buy something that does not exist by creating shell
companies. I once caught someone who put their own address as the
u
business address when creating a shell company in the AIS. They ended up
ed
having a long conversation with me.
What data analytics tools do you find most useful for fraud testing?
u.
I believe that to be good at data analytics or data science, you need to be tool
agnostic. Not all data is the same, and not every company uses the same
ny
tools. I have used basic SQL queries and Excel to catch just as much fraud as I
have caught using specialized software. If you don’t enjoy coding, you can use
n.
a number of specialized software options that come with prebuilt scripts that
enable you to start performing fraud data analytics quickly.
er
What recommendations do you have for an accounting major who is
interested in pursuing a career path like yours?
st
deserve on your resume to set yourself apart when making career changes.
l10
asset misappropriation
behavioral red flag
billing scheme
capitalization of expenses
channel stuffing
corruption
double dipping
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
expense cutoff
expense reimbursement scheme
expensing capitalized cost
external fraud
financial statement fraud
fraud
fraud triangle
u
fraudulent disbursement
ed
larceny
u.
management override
misclassification of revenue
ny
non-behavioral red flag
occupational fraud
opportunity
n.
er
pay and return
payroll scheme
st
perceived pressure
8@
rationalization
sales cutoff
03
sham sale
skimming
l10
unauthorized shipment
unrecorded revenue
whistleblower
u
Damages: The victim suffers damages as a result of relying on this false
statement.
ed
Occupational fraud is committed by owners, executives, management, and
employees who use their positions to enrich themselves at the expense of the
u.
company. The ACFE identifies three high-level categories to map all fraud
schemes:
ny
Asset misappropriation
Financial statement fraud n.
Corruption
er
Corruption is the inappropriate use of influence to obtain a benefit contrary to the
perpetrator’s responsibility or the rights of other people. Perpetrators internal to
st
the organization may engage in four possible types of corruption fraud schemes:
8@
Conflicts of interest
Illegal gratuities
Commercial bribery
03
Economic extortion
l10
in a fraud. The presence of red flags does not mean a fraud is being committed.
There are six common behavioral red flags:
Financial difficulties
Living beyond one’s means
Close association with a vendor or customer
Recent divorce or family problems
Control issues or unwillingness to share duties
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
u
Opportunity: The element of the fraud triangle that a company can most
influence, which is created when a company has poor or no internal controls,
ed
when there is collusion to circumvent internal controls, or when management
overrides the internal controls.
u.
Rationalization: The attitude of the fraudster that justifies the fraud act in the
fraudster’s mind.
ny
Auditors refer to these three elements of the fraud triangle as “fraud risk factors,”
and they are typically observed after fraud occurs.
n.
Internal controls and an anti-fraud culture at a company can prevent fraud.
er
Collusion circumvents two controls:
Segregation of duties, where one person is not allowed to have conflicting
st
responsibilities
8@
Independent checks, where one person reviews the work of another for
accuracy and objectivity
The tone at the top is the culture of an organization that flows downstream from
03
leadership to impact all functional areas. A culture of zero tolerance for fraud and
unethical behavior is a strong deterrent to fraud.
l10
u
vendors).
ed
3 Explain how to identify, prevent, and detect asset misappropriation
schemes.
u.
Asset misappropriation is the theft of corporate assets including cash, inventory,
ny
fixed assets, and information such as customer lists and intellectual property.
Asset misappropriation can impact a company’s financial statements—specifically
n.
when the perpetrator creates fraudulent journal entries to conceal the theft.
The three major classes or subcategories of asset misappropriation are:
er
Skimming, which happens when an employee steals cash and does not enter
the transaction in the accounting records, leaving no audit trail or
st
Larceny, which is the theft of company cash and non-cash assets after the
company has recorded the assets in its books. The common types are
unconcealed larceny, where the fraudster does not attempt to conceal the
03
fraud, and fictitious sales larceny, where the fraudster creates falsified
documents or fraudulent journal entries.
l10
u
information in the financial statements to deceive investors, creditors, and other
ed
users of the financial statements. Financial statement fraud generally requires
management complicity.
u.
Section 302 of SOX makes the CEO and CFO directly responsible for the accuracy,
documentation, and submission of all financial reports, as well as a report on the
ny
adequacy of the system of internal controls, to the SEC.
Financial statement fraud is designed to achieve one of two goals:
n.
Overstate the company’s financial performance by overstating assets,
revenues, and profits and/or understating liabilities, expenses, and losses.
er
This can be done in the following ways:
Sham sales to overstate revenue
st
liabilities
Understate the company’s financial performance. Common schemes include:
jm
Controls to prevent and detect financial statement fraud include vertical and
horizontal analyses, segregation of duties, proper authorization procedures,
independent reviews, data analytics, a good control environment, a whistleblower
hotline, and systems controls.
CPA questions, as well as multiple choice, discussion, analysis and application, and
Tableau questions and other resources, are available online.
u
ed
Multiple Choice Questions
u.
red flag?
ny
a. Your coworker complains he didn’t get a large enough bonus this year and
won’t be able to afford his son’s soccer registration fees.
n.
b. Your coworker dislikes your manager and regularly complains about her.
c. Your coworker brags about buying a new house in one of the most expensive
er
parts of town, where a lot of the company’s executives live.
d. Your coworker never takes vacation days or sick days because he says nobody
st
illegal gratuities.
b. economic extortion, illegal gratuities, asset misappropriation, and expense
l10
reimbursement fraud.
c. asset misappropriation, bribery, stolen cash, and billing schemes.
d. bribery, conflicts of interest, economic extortion, and illegal gratuities.
jm
u
b. concealment.
ed
c. perceived pressure.
d. rationalization.
u.
6. (LO 2) The first behavioral element in the fraud triangle is
ny
a. perceived pressure.
b. opportunity.
c. rationalization. n.
d. conversion.
er
7. (LO 2) The element of the fraud triangle that a company has most influence
st
over is
8@
a. rationalization.
b. management perceptions of fraud.
c. opportunity.
03
d. perceived pressure.
l10
8. (LO 2) If perceived pressure and opportunity to commit fraud are high and
personal integrity is low, then the risk of fraud is
a. low.
jm
b. medium.
c. high.
d. certain.
c. fraudulent disbursements.
d. expense reimbursement fraud.
u
d. fictitious revenues.
ed
11. (LO 3) A major difference between skimming and cash larceny is that:
a. skimming is on the books, while larceny is off the books.
u.
b. skimming occurs after the cash has been entered into the accounting system,
while larceny occurs before it is entered into the system.
ny
c. larceny involves expense reimbursement schemes, while skimming involves
recording fictitious revenues.
n.
d. larceny occurs after both the transaction and the cash have been entered into
er
the accounting system, while skimming occurs without the transaction being
entered into the system.
st
15. (LO 4) A fraud committed to lessen the amount of earnings that will be taxed
this year is an example of
u
a. misappropriation of assets.
ed
b. financial statement fraud that understates company perfor-mance.
u.
c. financial statement fraud that overstates company performance.
d. skimming cash before it is recorded in the company’s accounting books.
ny
16. (LO 4) The fraud in which a company inflates its sales revenue by forcing more
products through a distribution channel than the channel is capable of selling is
called
n.
er
a. unauthorized sales.
b. sham sales.
st
c. cutoff fraud.
8@
d. channel stuffing.
Wake of COVID-19: Benchmarking Report, the ACFE reports the results of a survey of
its members. Overall, 79% of the survey respondents observed an increase in
fraud over the previous quarter, and 90% expected an increase in the next 12
jm
u
a specific fraud scheme Robin may be involved in?
ed
DQ4. (LO 2) Explain the difference between perceived pressure that could result
in the misappropriation of assets and perceived pressure that could result in
u.
financial statement fraud. Give examples of both types of pressure.
ny
DQ5. (LO 2) Which of the three elements of the fraud triangle can a company
most easily influence and why?
n.
DQ6. (LO 2) The following illustration provides useful information on the most
successful methods used recently for detecting occupational fraud, including the
er
importance of tips from a whistleblower hotline. Do any of the results surprise
you? Explain.
st
8@
03
l10
jm
to a shell company she maintained. She stole more than $500,000 over a five-year
period before another employee accidentally detected and reported the fraud.
Tina debited various expense accounts to conceal her criminal activities. Identify
the main category and one subcategory for this fraud and explain your answer by
discussing the impact on the financial statements.
u
include details about the fraud scheme used or suspected. Include a link to the
ed
original article in your submission.
DQ9. (LO 4) Distinguish financial statement fraud from other fraud types by
u.
explaining the role of management and who ultimately benefits from financial
statement fraud compared to other types.
ny
DQ10. (LO 4) Define capitalization and explain how it relates to fraud. Include the
types of fraud schemes that use capitalization.
n.
er
st
8@
03
l10
jm
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
u
B. A cashier pads their 2. Creating fictitious ii. Selling it online or at a
time sheet with receipts local pawn shop
ed
unauthorized hours
every shift
u.
C. An employee 3. Billing to a shell vendor iii. Inflating company
submits personal revenue on financial
ny
purchases as statements
restaurant expenses
D. An accounts payable n. 4. Shipping at the end of iv. Receiving a paycheck to a
clerk creates the accounting period to personal bank account
er
fraudulent cause returns to come
disbursements of back after the end of the
st
sales to customer
A1. (LO 1) In the table above, match the acts, concealments, and conversions to
l10
company riddled with a history of fraud and financial issues.12,13 From the 2015
accounting fraud where the company padded profits by more than ¥200 billion to
its negative net worth in fiscal year 2017 after massive losses to its nuclear power
plant business, Toshiba has experienced significant reputational damage.
In the early 2000s, Toshiba’s strategic plan included installing 45 new nuclear
power plants worldwide by 2030.
Consider the following unforeseen impacts on this strategic plan:
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
Toshiba suffered throughout the global financial crisis that began in 2008 but
appeared to be rebounding in 2010.
On March 11, 2011, a magnitude 9.1 earthquake near Tokyo set off a tsunami
that caused the loss of nearly 20,000 lives and material damage estimated at
¥25 trillion.
The tsunami’s damage caused all the country’s nuclear reactors to be taken
offline. By mid-2018, only 9 of the 54 nuclear reactors were back online.
China froze nuclear plant approvals and adopted a plan to decrease its usage
u
of nuclear energy by 2020, and the United States canceled or postponed plans
ed
to build 12 power plants.
The global reaction to the tsunami changed the demand for and acceptance
u.
of nuclear power.
During this time, the corporate culture at Toshiba was to push for success:
ny
The CEO in 2008 set income targets, known as “challenges,” for each division.
The income targets were so aggressive that they were often unattainable.
n.
The CEO insisted that the targets be achieved and even suggested that the
er
company would sell off underperforming divisions, putting both division
leaders and their employees at risk of losing their jobs.
st
The pressure from the CEO filtered through the company, all the way through
division leaders, managers, and employees.
8@
Even though the CEO never directly demanded that his employees commit fraud,
he relied on expected obedience—a significant part of the Japanese corporate
culture—to cause his employees to do whatever was necessary to meet his
03
demands.
Toshiba’s corporate structure failed to rotate key accounting and finance
l10
personnel. Employees were assigned to the same division for their entire careers
at Toshiba, which created a rapport among division employees that spanned
decades. This culture created an environment in which it was difficult for an
jm
u
A3. (LO 3) As a data analyst for an internal fraud
advisory team at a regional accounting firm, you have been asked to perform a
ed
review of the fraud risk in the client’s expense reimbursement process. You must
analyze the following travel expense transactions, submitted by the company’s
u.
vice president of sales. To assess the transactions for the presence of fraud flags,
you will perform the following four data analytics tests. Read about each test and
ny
visually review the spreadsheet below. Identify which transactions numbers each
test would identify.
Tests: n.
Double dipping: Transactions where the amounts are the same and the
er
transaction dates are the same, but the types are different (one is credit card
and one is cash).
st
Duplicate expenses: Transactions where all fields are the same except for
8@
Airline
Hotel
Rental Car
Meals (Over $35)
Rideshares (Uber, Lyft, etc.)
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
u
ed
u.
ny
A4. (LO 3) Ms. Conover recently purchased a local
n.
coffee shop in Burlington, Vermont, after its previous owners were unable to
continue paying the lease. She hired a young couple to run the business and pays
er
them each a monthly salary. The couple live rent-free in the apartment upstairs
and are responsible for daily operations of the coffee shop. Ms. Conover asks
st
them to hire and supervise four to five part-time employees. The couple is also
responsible for keeping financial records, including expenses, payroll, and sales
8@
(both cash and credit card). They will keep cash received in a safe and make a
weekly deposit at a local bank.
Ms. Conover lives almost four hours away, in Boston. She plans to drive up to
03
statements.
2. There is a lack of independent checks in the accounts receivable process.
3. The accounting department has experienced high turnover among senior
management.
4. There was a strained relationship between management and its previous
external auditors.
5. Vendor invoices are matched with related purchase orders and receiving
u
documents (a three-way match) by the accounts payable bookkeeper, who
then approves the payments.
ed
6. Management has been pushing for using aggressive accounting practices to
maintain an increasing trend of earnings.
u.
7. The company has consistently reporting substantial earnings growth but
ny
struggles to generate cash flows from operations.
expense management company for its use of fraudulent accounting practices that
artificially boosted company revenues between 2013 and 2015. Four former members
8@
of the company’s senior management team were also charged for their roles in the
alleged misconduct.
As alleged in the complaint, Tangoe Inc., formerly a public company headquartered in
03
allegedly reported revenue prematurely for work that had not been performed,
including service prepayments, and for transactions that did not produce any revenue
at all. The SEC alleges that Donald J. Farias, a Tangoe executive, falsified business
jm
records, some of which were provided to Tangoe’s external auditors to support revenue
recognition decisions.
“Without accurate financial reporting our public markets cannot function fairly or
efficiently,” said Paul G. Levenson, Director of the Boston Regional Office. “We are
committed to protect the investing public against illegal accounting tactics that
artificially boost company performance.”
The SEC’s complaint, filed in federal court in Connecticut, charges Tangoe, its former
CEO Albert R. Subbloie, former CFO Gary R. Martino, former vice president of finance
Thomas H. Beach, and former senior vice president of expense management
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
operations Donald J. Farias. Each is charged with violating provisions of the federal
securities laws. Tangoe, Subbloie, Martino, and Beach have agreed to settle the SEC’s
charges without admitting or denying the allegations. They agreed to pay penalties in
the amount of $1.5 million, $100,000, $50,000, and $20,000, respectively. The
settlement is subject to court approval.”14
u
A7. (LO 3–4) Was Tangoe Inc. charged with fraud
ed
resulting from asset misappropriation or financial statement fraud? What type of
fraud scheme was Tangoe Inc. using? What concealment method is mentioned in
the press release?
u.
A8. (LO 4) Members of the senior management team
ny
at Tangoe Inc. were personally charged and fined by the SEC. What regulation
specifies that management is responsible for the accuracy of financial statements
n.
and includes provisions that allow management to be personally charged and
fined for fraud?
er
Tableau Case: Employee Reimbursement Expenses at
st
Julia’s Cookies
8@
Case Background
Big Picture:
Analyze fraud red flags in expense reports.
Details:
Why is this data important, and what questions or problems need to be
addressed?
The employee expenses data reflects how employees are spending company
money on expenses related to the office, travel, subscriptions, memberships,
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
food, and more. Before you can start spending money and calling it a
reimbursable business expense, you should review the company’s policies
and procedures. There may be a prohibited vendor list or cost limits to
comply with.
Analysis of this data helps identify potential fraud (the objective). While some
employees may accidentally submit noncompliant expenses for
reimbursement, there may be other employees who try to take advantage of
internal control deficiencies and attempt to defraud the company. For
example, fraudsters may attempt to:
u
Double dip for a single purchase and be reimbursed twice
ed
Provide fraudulent mileage that might have been for personal travel
instead of business travel (usually around the holiday months)
u.
Ask the vendor to split a single invoice into multiple smaller ones in order
ny
to stay within the dollar amount limits that the business sets for a single
purchase
Plan: n.
What data is needed, and how should it be analyzed?
er
Data needed to answer the objective is pulled from Julia’s Cookies’ Employee
Expenses database.
st
Analyzing this data involves performing tests for four common employee
8@
Now it’s your turn to evaluate, analyze, and communicate your results!
l10
Questions
submitted?
2. Which department had the highest average amount per transaction?
3. Which expense category had the highest total transaction amount?
4. Employees should not approve their own expense reports. Usually their
manager is the approver; however, someone other than the employee should
approve a claim for segregation of duties purposes. Test the data to see which
employees approved their own expenses. (Hint: Create a true/false
calculation.) What are their names?
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
5. How much, in total, did the employees from question 4 approve for
themselves?
6. Julia’s Cookies has a list of prohibited vendors that employees are not allowed
to use while on business travel. One prohibited vendor is Airbnb. Julia’s
Cookies prohibits employees from staying at Airbnbs as they could be owned
by the employee or a family member, creating a conflict of interest. How
many employees broke the rules and used Airbnb as a vendor?
7. Employees at Julia’s Cookies can use their personal vehicles to travel to
u
customer sites. An employee who chooses to do so is reimbursed based on
mileage. Sometimes employees abuse the system. A red flag exists when an
ed
employee reports more miles than their monthly average. Test the data
between the transaction dates 7/1/2025 and 12/31/2025 for above-average
u.
mileage. (Hint: Use a line chart.) Identify the employee(s).
8. How many total miles did the employee(s) from question 7 report for the
ny
month for which they potentially committed this type of fraud?
Take it to the next level!
n.
9. When booking a flight, an employee books and pays for the flight in advance,
er
which means they can submit their air ticket reimbursement prior to their
trip. After they come back from the trip, some employees may claim
st
duplicated ticket numbers in the data set. How many air tickets were
reimbursed twice?
10. Which employee had duplicate reimbursements of airline tickets?
03
Notes
l10
which then pays fictitious “profits” to earlier investors with funds from more
recent investors. An example is the well-publicized fraud perpetrated by Bernie
Madoff.
3 www.acfe.com/report-to-the-nations/2020/
4 We mention the ACFE’s Report to the Nations: 2020 Global Study on Occupational
Fraud and Abuse a number of times in this chapter. To find more details or read
the report, see www.acfe.com/report-to-the-nations/2020/.
5 abcnews.go.com/Business/story?id=86817&page=1
Printed by: [email protected]. Printing is for personal use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be
prosecuted.
6 www.justice.gov/opa/pr/georgia-man-arrested-attempting-defraud-department-
veterans-affairs-multimillion-dollar-covid
7 abc7news.com/coronavirus-supplies-how-feds-uncovered-fraud-involving-39-
million-n95-masks/6104173/
8 Perri, Frank S., and Brody, Richard G. 2011. “The Sallie Rohrbach Story: Lessons
for Auditors and Fraud Examiners.” Journal of Financial Crime 18(1): 93–104.
9 www.wbtv.com/story/8361472/sallie-rohrbach-murder-investigation/
u
10 Research report commissioned by the Committee of Sponsoring Organizations
ed
(COSO): Fraudulent Reporting: 1998–2007, An Analysis of U.S. Public Companies.
11 www.acfe.com/uploadedFiles/ACFE_Website/Content/covid19/Covid-
u.
19%20Benchmarking%20Report%20December%20Edition.pdf
ny
12 www.investopedia.com/articles/investing/081315/toshibas-accounting-scandal-
how-it-happened.asp
n.
13 Unmasking the Fraud at Toshiba, Caplan, D., S.K. Dutta, & D.J. Marcinko. Issues
in Accounting Education 34(3), 2019.
er
14 www.sec.gov/news/press-release/2018-175
st
8@
03
l10
jm