Professional Documents
Culture Documents
Full download Forensic Accounting 1st Edition Rufus Solutions Manual all chapter 2024 pdf
Full download Forensic Accounting 1st Edition Rufus Solutions Manual all chapter 2024 pdf
Solutions Manual
Go to download the full and correct content document:
https://testbankfan.com/product/forensic-accounting-1st-edition-rufus-solutions-manu
al/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://testbankfan.com/product/forensic-accounting-1st-edition-
rufus-test-bank/
https://testbankfan.com/product/forensic-accounting-and-fraud-
examination-1st-edition-kranacher-test-bank/
https://testbankfan.com/product/forensic-accounting-and-fraud-
examination-2nd-edition-hopwood-solutions-manual/
https://testbankfan.com/product/forensic-investigative-
accounting-5th-edition-grumbley-test-bank/
Forensic Psychology 4th Edition Joanna Solutions Manual
https://testbankfan.com/product/forensic-psychology-4th-edition-
joanna-solutions-manual/
https://testbankfan.com/product/forensic-accounting-and-fraud-
examination-2nd-edition-hopwood-test-bank/
https://testbankfan.com/product/forensic-psychology-canadian-5th-
edition-pozzulo-solutions-manual/
https://testbankfan.com/product/forensic-chemistry-2nd-edition-
suzanne-bell-solutions-manual/
https://testbankfan.com/product/forensic-science-advanced-
investigations-copyright-update-1st-edition-brown-test-bank/
SOLUTIONS CHAPTER 6
Fraud and White-Collar Crime
CHAPTER
WORKPLACE PROBLEMS
LEARNING OBJECTIVE QUESTIONS APPLICATIONS and CASES
LO1. Define fraud and 4, 5, 6, 7, 8, 76, 77 78, 79, 81, 82
describe white-collar crime. 12, 13,
14, 15, 16,
42–51, 52–56
LO2. Explain the 17, 18, 76 82
development of fraud theory 19, 20,
beginning with the fraud 21, 22,
triangle. 23, 24,
25, 26,
57–66
LO3. Explain various 27, 28, 76 80, 81, 82
theories for why people 29, 30,
commit fraud. 31, 32, 33,
34, 35, 67–75
LO4. Identify the 39 76 82
characteristics of a typical
fraudster.
LO5. Describe the impact of 76 82
white-collar crime on victims.
LO6. Describe the 40 76 82
government’s role in
prosecuting white-collar
crime.
6-2. Unique skills that forensic accountants possess that are useful in the area of fraud
investigation include fraud deterrence, fraud detection, and fraud investigation. In
addition, a solid understanding of the judicial process, including the rules of evidence and
burden of proof, are useful skills.
1. Financial crimes are criminal offenses. The standard of proof is beyond a reasonable
doubt, and the burden of proof is on the prosecution.
2. Financial crimes are crimes of intent. Absent an admission, circumstantial evidence,
including expert witness testimony, is used to establish or infer fraudulent intent.
3. Financial crimes are not victimless. In addition to economic loss, financial crimes
can result in emotional and physical harm to individuals.
4. Financial crimes may involve violent acts. Although white-collar crime is generally
considered a nonviolent activity, the possibility of violence cannot be ignored.
5. The government (prosecution) is not always right. A criminal indictment is not proof
of a crime. It is an assertion that a crime has been committed.
6-4. Robbery is the use of force to persuade someone to surrender property. Fraud is the use
of deception to persuade someone to surrender property.
6-5. Fraud requires that the prosecution meet the “beyond a reasonable doubt” burden of proof
standard because it is a criminal/felony offense.
6-7. The four basic elements of fraud established by common law are:
6-8. Fraud is crime of intent because it is an intentional act conducted by a person who has
free will. In other words, the fraudster meant to do the act.
6-10. Fraudulent intent is established in the legal system through an admission or through the
gathering and presentation of circumstantial evidence.
6-11. Circumstantial evidence is objective data related to a crime. This evidence must consider
alternative explanations and the degree of impact of such data in order to make
circumstantial evidence compelling in the judicial process. When there are no alternative
explanations and the degree of impact of the observations is high, then probative value is
established. When there are multiple alternative explanations and the degree of impact is
low, the probative value of circumstantial evidence is diminished. Degree of impact
relates to the significance of an observation to the issue being considered by a court.
6-12. White-collar crime is a major subcategory of fraud. There are competing definitions of
white-collar crime. The following are provided by the U.S. Congressional Subcommittee
of Crime and the FBI.
2. The FBI defines white-collar crime as: “illegal acts which are characterized by deceit,
concealment, or violation of trust and which are not dependent upon the application
of threat of physical force or violence. Individuals and corporations commit these
acts to obtain money, property, or services; to avoid the payment or loss of money or
services; or to secure personal advantage.”
6-15. The FBI’s eight major categories of white-collar crime are (examples are selected from
those presented in a table in the chapter):
Examples for each of the fraud categories will differ from student to student. One
example from the table set forth in the text is provided for each fraud category.
6-16. Areas of white-collar crime, other than those identified by the FBI, include tax fraud,
mail fraud, Social Security fraud, food stamp fraud, immigration fraud, and bank fraud.
These frauds are investigated by other federal agencies such as the IRS, U.S. Postal
Service, Secret Service, Social Security Administration, Department of Agriculture, and
U.S. Immigration.
6-17. Donald Cressey postulated fraud theory by interviewing 209 inmates at three prisons in
the Midwest. His research was conducted in 1949. This work identified the convergence
of pressure, opportunity, and rationalization as primary fraud determinants.
6-18. The three elements of the fraud triangle are pressure, opportunity, and rationalization.
Pressure is a need or non-shareable problem that precedes the criminal violation of
financial trust. Opportunity is being in a position and having the skills necessary to take
advantage of a situation in a fraudulent manner. Rationalization is a process by which a
person attempts to make his or her actual or intended behavior more logical or justifiable.
6-19. Cressey believed that the three elements in the fraud triangle contribute to a forensic
accountant’s understanding of why people commit fraud because it illustrates how a
person in a position of trust solves a nonshareable problem (pressure) by taking
advantage of his or her position, training, and experience.
Student speculation as to why each might help a forensic accountant detect a fraudulent
situation will vary.
6-21. Students will identify three organizational characteristics that might serve as a red flag to
the possible presence of fraud. These are presented in a table in the chapter, which is
partially reproduced below:
6-22. Personal and organizational red flag characteristics relate to the fraud triangle by helping
a forensic accountant identify pressure, opportunity, and rationalization. As presented in
the chapter, personal characteristics relate to pressure and rationalization, whereas
organizational characteristics relate to opportunity. For example, high personal debt
might suggest pressure, not separating duties among accounting functions might present
an opportunity, and a feeling of not being appreciated might provide a basis for
rationalizing a fraudulent action.
6-23. The most common type of financial statement fraud is the overstatement of revenues. The
two primary motivators for this type of fraud are (1) market pressure to raise share values
and (2) the need to finance the firm’s growth.
6-24. In the fraud diamond, capability contributes to the possibility of fraud as a fraudster must
have not only the opportunity to commit a fraudulent act, but must also have the
necessary skill set to accomplish it.
6-25. The knuckle-head defense asserts that a person may have had the opportunity to commit a
fraud but did not have the ability to actually commit a fraudulent act. It is related to the
capability aspect of the fraud diamond.
6-26. The fraud scale differs from the fraud triangle by replacing rationalization with integrity.
When integrity is lacking, the likelihood of fraud increases.
6-27. Economic theory helps explain fraud through its premise that individuals are motived by
self-interest and thus are more likely to commit fraud when it is in a person’s self-interest
to do so.
6-28. The calculus of fraud equation is R (reward) > PL (probability of getting caught times the
perceived gravity of the loss). This suggests that a person will make a calculated choice
of whether to commit fraud by comparing the gain to be achieved by performing a
fraudulent act to the risk of that act (probability of getting caught multiplied by the
penalty to be paid if caught).
6-29. An economic model cannot fully and accurately explain why a person commits fraud.
Human behavior is too complex and uncertain to be reduced to elements in an economic
model.
6-30. Rational choice theory posits that offenders (fraudsters) are rational calculators who choose
courses of action that produce optimal rewards with limited effort. Two primary
components of a rational choice decision are opportunities and a cost-benefit trade-off.
Factors that increase benefits include low effort level needed, limited skill needed, available
targets, high expected yield, and low risk of getting caught, whereas costs include high effort
level needed, high skill needed, and a high risk of getting caught.
6-32. Three common neutralization techniques are denial, condemnation, and higher loyalty.
Denial is an attempt to assert that something true is actually false. Condemnation is an
attempt to shift blame to those who condemn an action (e.g., co-worker, employer, law
enforcement). Higher loyalty attempts to legitimize an action by reference to a stronger
bond that exists with a group than with society in general.
6-34. The general theory of crime explains crime as a natural consequence of uncontrolled
human desire to seek pleasure and avoid pain. It has two components: opportunity and
self-control. Opportunity is being in a situation where a fraudulent act is possible.
Self-control is the ability to control one’s emotions and desires.
6-35. High self-control is the ability to control one’s actions, and low self-control is the
inability to control one’s actions. In the broadest sense, it is the ability to do the right
thing, no matter what opportunity or cost a situation presents. In the chapter, high
self-control is presented as the tendency to avoid acts whose long-term costs exceed their
momentary advantages. Low self-control coupled with opportunity provides a higher
likelihood that fraud will occur.
6-38. Researchers estimate that 85% of the population would commit fraud if given the right
set of conditions, and only 10% of the population would not commit fraud regardless of
pressure and opportunity stimuli. The remaining 5% will commit fraud regardless of the
conditions and circumstances.
6-39. The characteristics of a typical fraudster, as presented in the chapter, include the
following, according to a 2011 KPMG study:
1. Above-average intelligence
2. Relatively well-educated
3. 36–45 years old
4. Male
5. White
6. Inclined to take risk
7. Commits fraud against own employer
8. Works in collusion with another offender
9. Employed by the company for more than ten years
10. Holds a senior management position
11. Works in finance or accounting
12. Lacks feelings of anxiety and empathy
13. External locus of control
6-40. The investigation of white-collar crimes is often a low priority for law enforcement
agencies because they are difficult and expensive to prove. Victims may be reluctant to
report an offense, and they rely significantly on circumstantial evidence. Finally, law
enforcement agencies may be ill-equipped and inadequately trained to properly
investigate and prosecute this type of crime.
6-41. A forensic accountant must understand the perceptions, opportunities, and risk-
assessment processes of a fraudster to successfully combat fraud because all
organizations are exposed to fraud risk, and no matter how well designed an internal
control system, fraud cannot be completely eliminated. Thus, understanding what
motivates a fraudster will help in the deterrence, detection, and investigation of possible
fraudulent acts.
6-42. A
6-43. B
6-44. B
6-45. A
6-46. D
6-47. C
6-48. E
6-49. A
6-50. B
6-51. B
Select the best response to the following questions related to white-collar crime:
6-52. B
6-53. B
6-54. A
6-55. D
6-56. C
Select the best response to the following questions related to fraud theory:
6-57. B
6-58. A
6-59. C
6-60. D
6-61. A
6-62. D
6-63. C
6-64. A
6-65. B
6-66. C
Select the best response to the following questions related to fraud motivation:
6-67. D
6-68. C
6-69. B
6-70. A
6-71. D
6-72. B
6-73. A
6-74. B
6-75. C
6. The court’s instructions to the jury are important to ensure that members of the jury
follow the law in order to perform their function as a trier of fact. The court’s
instruction clarifies how a jury should go about their duty, what evidence they may
consider, and how they should interpret expert testimony as well as the lack of
testimony by the defendant.
7. Peoples’s failure to testify should have had no impact on the jury’s deliberations. The
court’s instruction clearly points out that the defendant is not required to testify and
the burden of proof is the responsibility of the state.
8. The court’s instructions aside, opening and closing arguments are very important
components of a trial. Opening statements provide the first opportunity for each side
to connect with the jury and share their respective stories. Closing arguments provide
the final words, the last chance to identify a failure in the opposing side’s case, a
failure to produce evidence as promised, or a failure to respond to the evidence
presented.
9. Adversarial bias is the introduction of bias into a deliberative process when both
parties can choose experts that have opinions that fit the needs of their case.
Confirmation bias is the tendency of people to favor information that supports their
opinion. A case can be made that the use of Cpt. John Tabaretti as a primary witness
for the prosecution is indicative of adversarial bias, as the state did not employ an
independent forensic accountant. Confirmation bias is exhibited by Cpt. Tabaretti in
the manner in which he used his spreadsheet to match hours, and when his analysis
confirmed his belief about double dipping, he did not pursue alternative explanations.
The Forensic Accountant Program section of the 2009 Report contains the following
(Note the General Overview is a direct quote from the report):
I. General Overview
In March 2009, the FBI created the Forensic Accountant Program (FAP) and instituted
the Forensic Accountant Unit (FAU) within the CID, FCS. The Forensic Accountant
position was developed in an effort to attract and retain top-tier accounting professionals
who possess the ability to conduct complex, thorough forensic financial investigations.
The FAP is the culmination of years of effort to advance and professionalize the FBI’s
financial investigative capabilities. The FBI’s FoAs [forensic accountants] will be
expected to testify as expert witnesses in judicial proceedings and essentially retain
ownership of the financial investigative portion of complex investigations with little
guidance from the respective Case Agent(s).
The mission of the FAU is to support all FBI investigative matters requiring a forensic
financial investigation and to ensure the FBI’s financial investigative priorities are
continually addressed. The FAU seeks to provide the highest caliber of financial
investigative work-product and support as well as contributing to the FBI’s Intelligence
Cycle. The FAU is developing and implementing a rigorous training curriculum and
partnering with an array of public and private organizations in an effort to cultivate a
workforce that provides superior results both in the field offices and at FBIHQ.
II. Initiatives
1. Madoff Investigation: The FBI’s forensic accounting unit was actively engaged in
statistical work in this case.
2. Stanford Financial Group: A $7 billion Ponzi scheme was investigated, and the
forensic accounting unit’s work helped secure indictments and guilty pleas.
3. Bad Medicine: A $7 million health care fraud was perpetrated by doctors in Puerto
Rico submitting fraudulent health care claims to a major insurance company. This
resulted in multiple arrests and 168 indictments relating to 107 individuals.
4. Scott Rothstein: A $1.2 billion Ponzi scheme was conducted by a Fort Lauderdale
attorney through which money was fraudulently obtained using investment schemes
such as claiming to lend money to nonexistent borrowers and making investments to
clients who were supposedly backed by confidential civil lawsuit settlements but
were not.
Chapter Problems
6-78. The FBI’s Common Fraud Schemes can be found at http://www.fbi.gov/scams-
safety/fraud.
6-79. The FBI’s posting entitled 2009 Financial Crimes Report includes a section entitled
Corporate Fraud General Overview and one entitled Significant Cases. It is found at
http://www.fbi.gov/stats-services/publications/financial-crimes-report-2009.
Corporate Fraud, General Overview. This section discusses the FBI’s key investigative
initiatives for the past year. The following are listed:
The Significant Cases section includes information on the following cases: (1) Petters
Company, Inc., (2) Credit Suisse, and (3) 1031 Tax Group.
1. Petters Company, Inc. was a $3.4 billion fraud perpetrated by obtaining loans from
hedge funds and investment groups in order to finance transactions with major
department stores. These loans were obtained using fraudulent purchase and sales
transaction documents.
2. Credit Suisse was a scheme in which Credit Suisse induced a large corporate investor
to invest in securities using student loans as collateral. The securities actually
contained subprime loans as collateral. It was settled for $400 million.
3. 1031 Tax Group was a tax code scheme using Section 1031 of the code to induce
investment by “promising clients their money would be used solely to effect 1031
exchanges as outlined in the exchange agreements.” The owners of the company,
Okun and Coleman, siphoned off “approximately $132 million in client funds to
support Okun's lavish lifestyle, pay operating expenses for his various companies,
invest in commercial real estate, and purchase additional qualified intermediary
companies to obtain access to additional client funds.”
The sections included in the report are: Perpetrators of Fraud, Victims of Fraud, and
Fraud Detection. While each student’s memo will be different, the key findings of this
report presented on the web site include:
1. Perpetrators of Fraud:
A. Those in higher levels of authority perpetrate larger fraud schemes. For example,
median fraud losses were: owners $573,000, managers $180,000, and employees
$60,000.
B. 77% of all frauds were conducted by individuals in the areas of “accounting,
operations, sales, executive/upper management, customer service and purchasing.”
C. Most were first time offenders.
D. Over 80% displayed one of the fraud “red flags,” such as living beyond means,
financial distress, close ties with vendors or customers, and the need to control
situations.
2. Victims of fraud were primarily small businesses as their internal controls are usually
weaker and their trust levels higher than their larger counterparts. The industries in
which fraud victims are located are financial services, government and public
administration, and manufacturing. The employment of anti-fraud controls
significantly reduced the incidence of fraud, and about half of the fraud losses were
never recovered by the victims.
6-81. The 2007 Oversight Systems Report on Corporate Fraud report can be obtained by
searching the web site http://www.ethicsworld.org.
This is a comprehensive report that may have a variety of classroom uses. Student
responses to the following questions should contain:
Fraud is more widespread; 76% of respondents indicate fraud has increased, up from
67% in 2005.
According to survey respondents, executive fraud results from pressure to meet goals
(81%) and personal gain (72%). In addition, a belief they won’t get caught (41%)
and feeling actions are not fraudulent (40%) were the next most cited reasons.
A belief that regulations are easily bypassed (21%) and fear of losing their job if
goals are not met (20%) were additional reasons as well as lack of resources so
corners were cut (8%) and lack of understanding of laws and regulations (5%).
c. Identify the measures that are considered the most effective in preventing or deterring
fraud.
Forty-three percent of respondents feel that organizational leadership setting the right
tone is a key to fraud deterrence. None of the respondents felt that laws and
regulations deter fraud. In addition, technology enabled monitoring (15%), visible
prosecution and convictions (15%), stringent internal controls (13%), whistle blower
protections (12%), and quarterly/annual audits (2%) were additional measures that
could reduce fraud if implemented successfully.
Case
6-82. 1. This is a white-collar crime. It was committed by persons who were respected in the
banking organization and who held high executive positions.
4. As an investigator, planning the case is an important first step that would likely
include the following:
5. Intent impacted the actions of Randall and Tyre in several ways: First, they intended
to make the loan in an appropriate way. Once circumstances got out of control, they
intended to continue to work with the customer until the economy recovered. Most
importantly, they mutually agreed not to inform the board since they believed a
pending merger might be cancelled if the loan was discovered.
6. The calculus of fraud can be used to assess the actions of Randall and Tyre. The
formula is R>PL. Both Randall and Tyre felt the merger could be preserved and the
loan collected if there was enough time for the economy to recover. This would
allow them to keep their jobs. This outcome, in their minds, must have been greater
than the probability of getting caught and the likelihood of going to jail.
7. Randall and Tyre used neutralization techniques described in this chapter in the
following ways. They blamed the institution’s CEO and the board of directors for
applying pressure to generate loans (condemnation). They also exhibited denial of
responsibility as they felt the force of circumstance worked to their detriment—
specifically, the pressure to make the loan, the lack of time to perform an appropriate
due diligence analysis, and the severe economic downturn that hit the commercial
real estate area hard.
a. Randall and Tyre were not given enough time to adequately analyze the credit.
b. All lending procedures were followed up to the point that the loan was disbursed
and the correspondent bank had not yet approved their participation.
c. It was normal practice in the bank to work with customers and make payment
waivers during times of economic distress.
d. Randall might claim he informed Tyre of the recourse agreement, and Tyre failed
to inform the board.
e. There was no initial intent. There was an error in judgment once circumstances
put them in a no-win situation.
9. The primary reason Randall and Tyre were convicted of a crime was based on
violation of banking law and motive. The district attorney argued that both men were
aware of the banking regulations that were violated, suspected that institutional
knowledge of this loan would adversely impact a pending merger, and hid the facts
and circumstances in order to keep their jobs. Both served 2.3 years in a federal
prison.
Ziphiidæ, 264
Ziphioids, 258, 265
TRANSCRIBER’S NOTES
1. Silently corrected obvious typographical errors and
variations in spelling.
2. Retained archaic, non-standard, and uncertain spellings
as printed.
3. Re-indexed footnotes using numbers.
*** END OF THE PROJECT GUTENBERG EBOOK WHALE
HUNTING WITH GUN AND CAMERA ***
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.