Research Paper

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

APPENDIX B: Research Paper

Subject Matter: Description, discussion, and analysis of any fraud related matter that
encompasses an accounting, auditing, corruption, money laundering and/or financial related
issue. The matter needs to have a forensic posture (some type of fraud examination by an
interested party or authority) so that the suggested discussion areas below can be addressed.

Your research will not likely undercover all of the steps and issues which occurred during an
internal, regulatory, civil and/or criminal investigation. To the extent your research does not
reveal all of the logical steps that likely occurred, identify what the steps you believe might
have occurred and how you would have addressed them. You are given a creative license to
“make up the facts” that you think would have existed if the information was public. Be
sure to explicitly delineate between what your research reveals and what your educated
guess as to what the facts might be.

The purpose of this research is to describe a fraud related matter; understand the forensic
accountants and/or other professionals involved and the parties they represent; dissect the fraud;
discuss the investigative steps; describe the resolution of the issues; and be able to communicate
preventive measures.

Paper Outline:

Below is the outline to follow. Every case is different. You may want to emphasize some topics
in greater detail than others. You may also want to add topics that are not listed below. Do
address each topic in the Roman Numeral categories. Some alpha subcategories might not apply.
Regardless, do address Roman Number VII, B&C.

Do write your paper in outline form: Clearly label each section of your paper as shown below.

Use of Generative Artificial Intelligence: Use of AI in the writing of your paper is strongly
encouraged. As of the date of this syllabus, Microsoft’s Bing Chatbox is recommended because
it is currently leading other AI technology. Further, Bing Chatbox produces citations to websites
when providing an answer. Those citations should be reviewed for analysis and to assess if they
are credible sources that can used in your paper. Note the requirement below to describe the use
of AI at the begging of your paper.

At the beginning of your paper, in italics, advise how AI was used to research and write your
paper.

 Specify if AI was used and the name(s) of the AI used.


 If AI was used to discover an independent source, after verifying its accuracy, use

that source and not AI in your citation.

 If any content is derived from AI, footnote or reference that material as AI.
 Ensure that the AI is not biased or discriminatory.
 Verify the accuracy of the AI-generated content (AI did not hallucinate the

material).

 Use AI-generated sparingly and only if its analysis appears so brilliant that it

should be added.

I. Facts: Description of the Fraud

II. Classify the fraud using the ACFE’s Fraud Tree.

III. How was the fraud detected?

A. Whistleblower
B. Internal / External Audit C. Regulatory body
D. Self-reporting
E. Law enforcement
F. Lawsuit
G. Other

IV. Forensic Posture: What facts, analysis, opinion, and conclusions are being sought and by
whom?

A. Internal Proceedings
B. Regulatory
C. Civil
D. Criminal
E. Other

V. Analysis of the fraud:


A. How was the fraud perpetrated? Explain in detail. B. What was the motivation of the subject?
C. Were controls overridden?
D. Economic impact, if any, on the entity.
E. Economic gain, if any, to the subject.

VI. Internal Investigation:


A. Who comprised the internal investigation, if known and if there was one?

B. If an internal investigation is merited, who would be the best party to lead?

1. Internal component
2. External component
3. Let the Civil / Criminal Authorities resolve 4. Other
5. Provide your opinion here
VII. Investigative Steps:
A. Strategy and sequencing of investigative steps.

B. Information obtained from individuals.

1. Interviews of critical witnesses or subjects


2. Depositions

C. Documents Needed:

1. Internal
2. External
3. Public records

D. Computer forensics.
E. Undisclosed Participation or Undercover Technique Possible

VIII. Conclusions and resolutions reached by interested parties, lawsuits, etc.

IX. Recommendations:
A. Can this be prevented in the future?
B. Internal controls
C. Fraud prevention recommendations

X. Other
A. Unusual issue presented
B. Ethical issue presented

You might also like