Verified Document

Fraud Investigation Report Questionnaire

Related Topics:

Fraud Investigation The Interview Process Q1. Using private industry as a potential background for developing your fraud prevention and detection strategy, what type of external resource(s) would you recommend be established as soon as possible and included in the company’s marketing brochures as a value-added differentiating service with regards to reporting potential fraud that may be occurring in the asset disposition process? Keep in mind, this is not a SEC or a Securities Act situation.

One important source of value differentiation from other fraud investigative organizations can be the approach used by the emerging company. One such an approach is the SPEC (scope, plan, execute, close) model (Parulkar, 2010). The beginning of this method involves first determining the scope, or ascertaining the resources needed to complete actual job. This is followed by planning the investigation, executing the fact-finding exploration, and finally closing the investigation (Parulkar, 2010). While the sequential process may seem a simple one, marketing this method as a systematic approach may be useful. It is also useful to have a highly diversified fraud investigation team. Members of the team may include legal staff to determine what compliance measures are needed; forensic accountants; IT experts; and field investigators (Parulkar, 2010).

Particularly in today’s online-dominated world, where more and more legal documents and procedures are now performed online, having personnel who can evaluate online evidence to be credible or dubious in value is key. Having a diversified team is also useful as a way of connecting the organization to diverse external contacts outside the organization which may be helpful in researching various types of fraudulent practices. Given the rise of online technology, methods of fraud are continually changing and, sadly, growing more difficult to detect. It is very important for a private organization...

While this is challenging for a small investigative organization, having external contacts in the industry and engaging in regular environmental scanning is one way to do so.
Providing customers with assurance that evidence will be secured and stored in a secure and credible fashion is also a critical component of fraud investigation. “Depending on the case, investigators must ensure that they obtain copies of credit statements, emails, bank accounts, phone records, social media posts, etc. The crime scene is often virtual” (Giacalone, 2015, par.10). For example, conducting research online is one way to check the fair market value of assets in an objective fashion .Clients of the investigating firm should be assured of the competence of all personnel in researching fraud using online tools. Members of the firm should also be in contact with clients, keeping them abreast of developments, through the use of online technology.

Q2. Assume after implementing the external resource described in #1 above, it comes to your attention that Bob, a member of the Jones’ family, may be improperly benefitting from the disposition of his late Dad’s assets by selling certain assets for significantly less than fair market value before the formal auction of tangible assets. Per other family members, Bob has been acting very strange since his Dad’s passing. Large bags have appeared under his eyes, Bob has been very short and flown off the handle in just about every discussion or phone call with the other family members, and Bob is suddenly driving a brand-new Porsche after driving an old used Toyota for the last 15 years.

The interview process should begin not with Bob, but with his family members who might have insight into his financial situation, his ethics, and other pertinent information. Ideally, they should be family members who…

Sources used in this document:

References

Giacalone, J. (2015). Four basic steps in a fraud investigation. LexisNexis. Retrieved from: http://blogs.lexisnexis.com/public-safety/2015/06/fraud-investigation-basic-steps/

Investigation. (2016). Association of Certified Fraud Examiners, Inc. Retrieved from: http://www.acfe.com/uploadedfiles/acfe_website/content/review/examreview/02-inv- interview-theory.pdf

Parulkar, N (2010). Investigate fraud with these best practices. Computer Weekly. Retrieved from: https://www.computerweekly.com/tip/Investigate-fraud-with-these-best-practices


Cite this Document:
Copy Bibliography Citation

Related Documents

Fraud and Forensic Accounting Investigation
Words: 531 Length: 2 Document Type: Case Study

Fraud and Forensic Evidence Fraud to Trial Process The case study presents a very interesting criminal act, the use of re-directing payers to a mock PayPal, an online payment processing company, where the criminals were then able to capture the PayPal username and their corresponding passwords to access their PayPal accounts. This unusual activity was noticed by a PayPal fraud investigator who noticed there were several accounts that were being opened under

Insurance Fraud
Words: 11287 Length: 35 Document Type: Term Paper

Insurance Fraud After tax evasion, insurance fraud is considered the highest-ranked among white-collar crimes. The original concept of insurance, as a for-profit endeavor, was to collect funds from a large number of people to pay for damages and accidents that involved a small percentage of the population that paid premiums. Insurance fraud is an ever-growing problem. Solving or eliminating this problem requires the resources and knowledge of individuals or associations with

Mortgage Fraud
Words: 13949 Length: 38 Document Type: Term Paper

Mortgage Fraud If a rash of armed bank robberies swept across America next year, and if in these robberies criminals absconded with $30 billion dollars, one may be certain that a public panic would ensue. The banking system would likely be changed forever. If thousands of armed thugs went rampaging across the nation forcing people out of their homes, into the streets, and then destroying the properties, leaving the occupants homeless

How to Address Healthcare Fraud in Your Agency
Words: 849 Length: 2 Document Type: Essay

Miscoding on the Billing Forms Discussion Board The fundamental basis for auditing Medicare and Medicaid billing is that the services provided are confidential, patient privacy must be protected, and the written word of the provider is the record of service provision upon which a review must be initiated (Harris, 2007). Auditing, however, must extend beyond the written record to establish that the services were actually provided to the patient or client

Fraud Within Corporations
Words: 1237 Length: 4 Document Type: Research Paper

cross examine the accounting fraud scandal that took place at Xerox, the main intention of this analysis is to know the causes and the effects of the scandal as well as the need of a good practice in business ethics, corporate management and the general oversight. Xerox was able to utilize a creative technique of accounting to give false presentation of its assets and liabilities, they also deceive the

Fraud In Local Government
Words: 1020 Length: 4 Document Type: Essay

Introduction Fraud in local government is a serious and pervasive issue that can undermine public trust, waste taxpayer funds, and damage the integrity of public institutions. This illicit activity can take various forms, ranging from embezzlement and kickbacks to bribery and conflicts of interest. Local governments are particularly vulnerable to fraud due to a combination of factors, including: Limited resources: Local governments often operate with tight budgets and limited staff,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now