abuse
misuse employee discounts
take extended lunch break
come late
use sick leave when not sick
work slow
personal use of organization product
people
Edward Sutherland
white-collar crime
theory of differential association
crime is learned
Donald cressey
cressey's hypothesis
trust violators
technical skills
nonsharable problems.
general information
offender types
independent businessmen
Long-term violators
absconders 潜逃者
3 elements for trust violation
perceived motive
perceived opportunity
ability to rationalize
Dr. Steve Albrecht
CFE
1980 study
Fraud scale
situational pressures
opportunities to commit
personal integrity
Richard C. Hollinger
Workplace conditions
perception of management
Controls
Enforcing sanctions
publicizing sanctions 制裁
Fraud triangle
pressure
opportunity
rationalization
misappropriations
skimming schemes
corruption
asset misappropriation
Cash
skimming
Larceny
Fraudulent disbursements
Inventory & other assets
misuse
Larceny 盗窃
Fraudulent statements
Assets
Future economic benefits
Intangible
Hard to misappropriate
Tangible
Cash, AR
Inv, P&E, investments
supplies and information
Accounting equation
A = L + OE
Balance sheet affected dollar for dollar of misappropriation
The asset side of equation is what is affected by misappropriations
The corresponding affect is to Owner's Eqity
Income statement
REV - Exp = Profit (Loss)
A misappropriation filters through the income statement to the owner's equity on the balance sheet
misappropriations are truly expense of doing business.
Cash vs. Accrual accounting
cash
Income recognized when collected
exp incurred when paid
Accural
Income recognized when earned
Expense recognized through matching
Concealing asset misappropriations
out of balance conditions
false debits
expense
assets
forced balances
omitted credits
Skimming
Define
Theft of cash from victim entity prior to its entry in an accounting system
off-book
No direct audit trail
Difficulty of detection
asset misappropriations cases
cash misappropriations
85.6%
Non cash misappropriation
20.3%
Frequency of cash misappropriations
fraudulent disbursements
67.7%
Skimming
19.6%
Larceny
13.3%
sales skimming
method
employee pockets the proceeds of the sale
employee makes a sale of goods or services, collects the payment, and makes no record of the transaction
without a record of the sale, there is no audit trail
ways
cash register manipulation
No sale or other non-cash transaction is recorded
cash registers are rigged so that sales are not recorded on the register tapes.
No receipt is issued
After hours sales
Sales are conducted during non-business hours without the knowledge of the owners.
Skimming by off-site employees
Independent salespeople
Employees at remote locations
branches or satellite offices away from the primary business site