Litigation Exposure in Identifying and Investigating Fraud Risks

In: Business and Management

Submitted By souljaeternal
Words 2824
Pages 12
Litigation Exposure in Identifying & Investigating Fraud Risk
In the backlash of fraud and failed auditing, a more stringent standard for auditors was enacted in hopes to avoid the failures of the early 2000s. The Sarbanes-Oxley Act and statements of auditing standards such as SAS 99 were put into place to accomplish this goal. Yet, with more stringent standards comes a heightened public expectation that may increase the potential litigation auditors face. In the world of auditing, a very important aspect that should always concern an auditing firm is the risk of litigation exposure that a firm may encounter in performing an audit. Here, we will look at the guidelines advocated by Statement on Auditing Standard No. 99 in the context of several scenarios to see how the procedures promoted by it may increase the risk of litigation exposure that a firm faces in the event that fraud goes undetected. Statement on Auditing Standard no. 99 requires, as part of planning the audit, that there be a discussion among the audit team members to consider how and where the entity's financial statements might be susceptible to material misstatement due to fraud and to reinforce the importance of adopting an appropriate mindset of professional skepticism. SAS 99 instructs auditors to identify general and specific fraud risks that might be present in a client’s company. While this initial identification of areas where potential fraud risks exist is of great importance for the auditor to reveal actual fraud, taking these actions may actually be detrimental in that they may increase the liability of an auditor being found negligent in cases where fraud goes undetected in spite of the fact that, based on liability laws, taking actions that increase the quality of an audit should reduce liability in the event of an audit failure. Furthermore, as a precursor to further…...

Similar Documents

Lufthansa’s Exposure to Currency Risk

...LUFTHANSA’S EXPOSURE TO CURRENCY RISK |If Karl Marx could see what the foreign exchange market is doing to the world’s captains of industry, he would | |surely be laughing. Not only do they put up with labor problems, competition, deregulation, and rapid changes in | |technology—no, that is not enough. Add currency volatility to that list in the last few years. And it’s so bad | |that a successful corporate executive of one of the world’s prestige airlines can put on a multimillion dollar | |currency speculation, and win—and still get lambasted by his critics. It’s enough to make a capitalist cry. | Intermarket, 1985 It was February 14, 1986, and Herr Heinz Ruhnau, Chairman of Lufthansa (Germany) was summoned to meet with Lufthansa’s board. The board’s task was to determine if Herr Ruhnau’s term of office should be terminated. Herr Ruhnau had already been summoned by Germany’s transportation minister to explain his supposed speculative management of Lufthansa’s exposure in the purchase of Boeing aircraft. In January 1985 Lufthansa, under the chairmanship of Herr Heinz Ruhnau, purchased twenty 737 jets from Boeing (U.S.). The agreed upon price was $500,000,000, payable in U.S. dollars on delivery of the aircraft in one year, in January 1986. The U.S. dollar had been rising steadily and rapidly since 1980, and was approximately DM3.2/$ in January 1985. If the dollar were to continue to rise, the cost of the jet aircraft to Lufthansa would rise......

Words: 2163 - Pages: 9

Identifying Potential Risk, Response, and Recovery

...Assignment 2: Identifying Potential Risk, Response, and Recovery Emory Evans August 26, 2012 Dr. Robert Whale CIS 333 There are a myriad of potential threats and vulnerabilities that leave a system open to malicious attack, anytime you have a computer network that connects to the internet there is a potential for malicious attack so it is important that you know the vulnerabilities of a system to protect it from potential threats and malicious attacks. “A vulnerability is any weakness in a system that makes it possible for a threat to cause harm.” (Kim & Solomon, 2012, p. 96). There are several common vulnerabilities that exist within the seven domains of an IT infrastructure for example there is the lack of awareness or concern for security policy vulnerability in the User Domain as well as intentional malicious activity ( Kim & Solomon, 2012). Within the Workstation Domain there exists unauthorized user access, weakness in installed software, and malicious software introduced vulnerabilities, unauthorized network access, transmitting private data unencrypted, spreading malicious software, exposure and unauthorized access of internal resources to the public, introduction of malicious software, loss of productivity due to internet access, denial of service attacks, brute-force attacks on access and private data are all examples of vulnerabilities within the seven domains of IT infrastructure which are User, Workstation, LAN...

Words: 705 - Pages: 3

Curbing Fraud Through Risk Assessments

...Curbing Fraud Through Risk Assessments Abstract The purpose of this paper is to discuss the psychology behind why people commit fraud and how a risk assessment can be used to mitigate fraud and risk towards a given organization. The risk assessments portion of the paper will discuss areas such as a process for an effective fraud risk assessment which includes defining a risk scope, risk treatments (acceptance, avoidance, transfer, mitigate, or a combination approach), and most importantly risk monitoring and review through controls. The paper then discusses in detail the importance of proper risk modeling then finished with an analysis on an actual fraudulent activity around the abuses with SNAP benefits. Risk Assessments: Merriam-Webster defines fraud as the “intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right.” Some type of fraud scheme or business exploit is in the news headlines every day. Anything from employees stealing money out of cash register to multibillion dollar pyramid schemes is seeming becoming a common segment on the news right next to this week’s weather forecast. The opportunity for a common person or company to fall victim to fraud is paramount. Often times a business simply doesn’t know where their most susceptible operations reside. This limitation causes billions of dollars of fraud to commence every year, and often times the company won’t know they aren’t being scammed until......

Words: 3549 - Pages: 15

Fraud Prevention and Management Recommendations

...Fraud Prevention and Management Recommendations The purpose of this Fraud Prevention Plan is to set out the approach to dealing with fraud risk within our organization. In order to prevent the types of frauds that have already occurred within our organization it will be necessary to create “a culture of honesty, openness, and assistance…..fraud prevention is where the big savings occur” (Albrecht, Albrecht, Albrecht, & Zimbelman, 2012, p.103). What is required is the implementation of a comprehensive hiring, fraud, and ethics training program with strong controls, with punitive treatment of fraud offenders. “Research confirms that anyone can commit fraud. Fraud perpetrators usually can’t be distinguished from other people on the basis of demographic or psychological characteristics.” (Albrecht et al. 2012, p. 33). The value of an effective fraud prevention program requires several components. The lack of fraud prevention leads to enormous risk. The corporation will need to install processes and controls to ensure that honest people are hired. When candidates are going through our interview process they will need to be thoroughly vetted on the accuracy of their work history, education, and stated accomplishments. In addition to the standard practiced of contacting references provided by the candidate, these referenced individuals will be asked to provide additional references. The result of checking references provided by the initial reference will in many......

Words: 2662 - Pages: 11

Olympic Games Risk Exposures

...Olympic Games bring many risks to the host as well. For London, the first and the greatest risk it facing is its weather. When we talk about London, we would mention its weather inevitably. The weather of London is so changeable that even the experts cannot forecast the weather accurately. According to statistic, in July and August, there is only 6.4 hours’ sunshine on average in London. That is to say, it has a great possibility to be rainy during the competitions, which will bring bad influence to both audience and athletes. Another risk is from the terrorists. Alan West, Minister of British security, said that the safety challenge London facing is the greatest since the World War II. During the Olympic, there were 15000 athletes, 14000 coaches and 20000 reporters coming to London, which largely increased the risk of terrorist attack. What’s more, in July 2005——the second day after London was chosen to be the host city of 2012 Olympic Games , there was a suicide booming happening in London, which caused the death of 52 passengers. So London should pay more attention on the security during the Games. Besides these risks, there are still many other risks London faced with, such as management risk which includes financial risk, business operational risk, responsibility risk, etc. London should be sure that what they supply to the citizens and tourists have good quality and the sponsors of the Games won’t break their contract. So many risk London is faced with......

Words: 340 - Pages: 2

Identifying Potential Risk, Response and Recovery

...Assignment 2 Identifying Potential Risk, Response and Recovery Karen Raglin Professor West Networking Security Fundamentals March 3, 2013 I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. You have requested that I develop a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization. With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software. As a company you also want to set personal security policies for online behavior. There also needs to be an antivirus installed on the network like Norton or Symantec which blocks threats targeting the vulnerabilities. Your firewall, which is your first line of defense, is susceptible to two common types of attacks. First there are attacks against the firewall itself with the purpose of the attacker being to take control of the firewalls functionality and then launching a DoS attack. The second type of attack against firewalls is an attack on the LAN side of the firewall. These attacks circumvent the rules and policies of the firewall to gain access to the devices that are supposed to......

Words: 1277 - Pages: 6

The Risks and Benefits of Sun Exposure

...Running head: THE RISKS AND BENEFITS OF SUN EXPOSURE 1 The Risks and Benefits of Sun Exposure An Informative Essay THE RISKS AND BENEFITS OF SUN EXPOSURE 2 The Risks and Benefits of Sun Exposure Tanned skin never used to be desirable. To look at people now one would never believe that statement. In the 1900s it was considered a sign of the lower class. Tanned skin was a direct result of manual labor, of having to work to provide either for ones’ family or their own livelihood. It could also be construed as a sign of poverty. Only the wealthy were untanned as they had servants or maids and work hands that did manual labor for them. In the 1920s tanning became popular with the wealthy, when Coco Chanel, the famous fashion designer, took a vacation to the Riviera. She returned with a deep tan. Tanning then became all the rage and became to be known as a symbol of wealth and leisure (Longe, J, 2011 p2160). Today, tanning is still considered fashionable. People pursue it for cosmetic reasons as well as for competitive reasons. Bodybuilders tan, as it defines the cut of muscles and makes them stand out. (All about Suntans and Tanning 2013). In beauty competitions contestants tan to look healthy. Skin is most associated with healthy outdoor activities and vacationing in sunny locations. The reality is that the tan color which results on the skin from exposure to the sun, is actually the skins’ reaction to damage......

Words: 1902 - Pages: 8

Fraud Risk Assessment

...The focus on fraud from a business perspective has significantly increased over the last decade. Every business, company or entity is subject to fraud risk; there is no immunity when it comes to fraud. There has been much legislation passed by the government and many new guidelines required by different accounting agencies. The Implementation or addition of an internal audit department has been wide spread. External audit independence, corporate governance and most recently the use of a fraud risk assessment have been a few recent developments of such new legislation and rules set forth. Businesses as well as the public were skeptical of the changes but admitted something had to be done. “The fraud triangle, developed by Donald R. Cressey, tells us that there are three interrelated elements that enable someone to commit fraud: the non-sharable financial need that drives a person to want to commit the fraud, the opportunity that enables him to commit the fraud, and the ability to rationalize the fraudulent behavior. The vulnerability that an organization has to those capable of overcoming these three elements is fraud risk,” (Wells, 2011). A fraud risk assessment is a process designed to proactively assess and correct these vulnerabilities to both internal and external fraud to defend against and reduce the chances of fraud. The objective of a fraud risk assessment is to identify and address these vulnerabilities to reduce that risk of fraud. In a 2008 study by the......

Words: 1260 - Pages: 6

Fx Risk Exposures

...FX risk exposures FX risk is the possibility of loss due to an unexpected movement in an exchange rate. It is faced when a party decides to exchange currencies and exists for the period between this decision and when the trade is made in the FX market. Foreign currency assets, for example an investment in US stocks by AMP, are exposed to the risk of an appreciation of the AUD whereas holders of foreign currency liabilities (such as an Australian bank that has issued securities in a foreign currency) face the risk of a depreciation of the domestic currency since such a movement would increase the domestic currency’s value of the liabilities. Importers have to pay in the foreign currency and so face the risk of a depreciation in the AUD, since this increases the AUD cost of the foreign currency in which the imported items are sold. Whereas exporters face the risk an appreciation in the AUD since this would reduce the AUD value of the foreign currency earnings. Hedging with forward contracts A forward FX contract is an agreement to exchange currencies at a future settlement. The amounts to be exchanged are set by the forward exchange rate. This rate provides the hedge because it removes the risk of an adverse movement in the exchange rate prior to settlement. It also removes the benefit of a favourable exchange rate movement. To illustrate, suppose AMP decided to return next month USD20m to its Australian clients being the proceeds from maturing bonds. AMP can ensure......

Words: 346 - Pages: 2

An Analysis of the Impact of Risk Exposure to the Performance of Banks in Nigeria

... AN ANALYSIS OF THE IMPACT OF RISK EXPOSURE TO THE PERFORMANCE OF BANKS IN NIGERIA CERTIFICATION I certify that this research work was carried out by MR ABOYARIN SALAMI TUNDE with Matriculation No.; 109025160 of the Department of Finance, Faculty of Business Administration, University of Lagos, Akoka, Lagos. __________________________ ______________ DR. LEKAN OBADEMI DATE _______________________ ____________ PROF. W. IYIEGBUNIWE DATE HOD DEPARTMENT OF FINANCE _______________________ ____________ EXTERNAL EXAMINER DATE DEDICATION This project work is dedicated to the Glory of ALMIGHTY ALLAH (SWT) to Him I say as always; ALHAMDULILAHI ROBIL ALAMIN!!! Special dedication also goes to the memory of my late father; Alhaji R.S.A Aboyarin. I pray his soul finds forgiveness and mercy before Allah (Amin. ACKNOWLEDGEMENT CHAPTER ONE 1.0: INTRODUCTION AND BACKGROUND TO THE STUDY Banks are germane to economic development through the financial services they provide. Their intermediation role can be said to be a catalyst for economic growth and development. The efficient and effective performance of the banking industry over time is an index of financial stability in any nation. The extent to which a bank extends credit to the public for productive activities accelerates the pace of a nation’s economic growth and its long-term......

Words: 14126 - Pages: 57

Child Predators: Does Technology Increase Exposure and Risk?

...Child Predators: Does Technology Increase Exposure and Risk? Child Predators: Does Technology Increase Exposure and Risk? Introduction Child predators, or a person who preys upon minors for self-gratification often in a sexual manner, has been a known social issue before computers were invented. With the increased availability of computer based technology, including social networking, people have begun to demand more laws and regulations in regards to sex offenders ability access online technology and communication tools (Wynton, 2011). The availability of computer based communication has allowed for the world to interact with others in a way that is not like that of telegraph or telephone. Does the increase of technology create more predators or does it just give a medium for predators to expand and reach their potential victims? As with many things that are linked to technology, the exposure and the knowledge that is needed to prevent the increase of child predators online is reliant on multiple factors. These factors include access to online environments, increased preventative technology, knowledge of children and their risks online, and the need for social responsibility for web developers, parents, and children. The expansion of technology does not guarantee more predators will emerge but it does give new mediums and victims that may not have been available previously, creating a need for changes in both the virtual and real worlds that people reside in.......

Words: 2804 - Pages: 12

Encountering Risks and Reducing Exposure

...Traditional Litigation: Encountering Risks and Reducing Exposure When dealing with traditional litigation, a business or organization will risk scrutiny of the company’s image or brand, and clearly suffers monetary costs, which can affect the entity’s bottom line. Reflecting on the traditional litigation system, dependent on the type of trial, for example, a civil trial, the burden of proof is rested upon the plaintiff. The plaintiff must present truthful evidence or proof to a judge or jury against the defendant. Thus, the strength of the plaintiff’s credible facts and truth must be supportive of the plaintiff’s claim and proven stronger than the defendant’s defense. Considering the requirements to support a case (plaintiff or defendant), research and costs will rise. The initial course of the discovery process is a difficult factor in itself and has several disadvantages for each party involved. It is expensive, time consuming, and for the most part, a burden in effort to gather relevant evidence to make or strengthen the plaintiff and/or prosecutors case. On the other hand, for the defendant, the discovery process could reveal implicating evidence causing a weak defense or no defense by any means. As an advantage however, both parties, through the discovery process, are given the opportunity to civilly research, view, and gather relevant evidence and information related to the case, which supplies an advantage for each or either party to identify the strengths and......

Words: 930 - Pages: 4

Risk-Based Auditing, Strategic Prompts, and Auditor Sensitivity to the Strategic Risk of Fraud

...Risk-Based Auditing, Strategic Prompts, and Auditor Sensitivity to the Strategic Risk of Fraud ACC650M Auditing Principles January 30th, 2015 a. What is the issue being addressed in the paper? This paper are focus on the risk-based auditing. As the paper mentioned that Risk-based auditing is a way to guide auditor to devote more audit resources to account that may take more misstated. On the contrary, fewer resources to those are focused on the less misstated. Kendall Bowlin expect to guide effective and efficient audits. In the other words, the inaccurate assess misstatement risk may result in misallocated of audit resources and undetected misstatement. In additional, Kendall Bowlin seemingly consider that the low risk accounts may also caused high risk of fraud, because of managers and auditors (business operating and audit strategy) allocated audit resources to high risk accounts. That means if the audit resource concentrate on high risk accounts, it may create opportunities for intention people to manipulation low risk accounts. The study’s purpose is to demonstrate the potential threat with risk-based auditing that lead auditors allocate resources among accounting with different of non-strategic risk and account specific misstatement risk, and use prompting strategic for auditors to reduces this threat. There are two important ways of prompting auditors in the paper. The first one is auditors allocate limited pools of resources among client accounts......

Words: 934 - Pages: 4

Is351 Identifying It Project Risks

...IS351_Identifying_IT_Project_Risks The five potential risks for this new project that I think they may encounter is Positive Risk, Resistance to change by employees/students, Fraud, identity theft, hacking or phishing, Accidental wrong information and Accessibility. The first one I call a positive risk (this is referred to as the risk that we initiate ourselves because we see a potential opportunity, along with a potential for failure.). It’s the process of teaching the students and or teachers how to use the program. This is positive because the program is supporting them to take control of their own human resource information. This will help after the program reduces the number of HR employees needed. There can be some risks because it has to do with the fact that the program is online. Not everyone has the savvy computer skills to find their way around the website such as older employees. They may never have used a computer for tasks other then word processing or spreadsheets. Then for those personnel with weaker computer skills who might be hesitant to use the program. To help improve efficiency the Human Resource will need to set up training or conferences where the employees and students will be taught step by step how to access, use and manage the new system. As well, there will be a role out phase, where there will be Human Resource staff on hand to help out when needed. For those people who still have concern, there will always be someone in HR who can help at......

Words: 1021 - Pages: 5

Fraud

...actions and preventive measures to curb these scandals. 1. Introduction In the recent years, the public and business community have been surprised with the exposure of many corporate scandals and accounting fraud by the managers of the company. It disappoints many stakeholders as after the financial crisis in 1997, many efforts have been initiated and implemented to strengthen the business control and foundation of the company. One of the important lessons learned from the financial crisis in 1997 is the weaknesses in the governance of the company such as too much power is given to a single person in managing the company, weak internal control and poor work of the directors that leads to the failure of the company. Due to this, a total regulatory and governance were embarked all over the world. Just to name a few, in the US, the Sarbanese Oxley Act was established, while in the UK the Code of Corporate Governance was extensively revised to stop all these corporate diseases from spreading and becoming a cancer for the global business community. However, all this effort has seemed fruitless as after the heavy debate and discussion and huge struggle by the regulator and market administrator, these corporate scandals are still returning but with more scaring facts. 1.1 What do we mean by Fraud and Misconduct • Fraud is a broad concept that generally refers to “any intentional act committed to secure an unfair or unlawful gain” • Misconduct is also a broad......

Words: 3562 - Pages: 15