Verified Document

Fraud Investigation Report Questionnaire

Related Topics:

Fraud Investigation The Interview Process Q1. Using private industry as a potential background for developing your fraud prevention and detection strategy, what type of external resource(s) would you recommend be established as soon as possible and included in the company’s marketing brochures as a value-added differentiating service with regards to reporting potential fraud that may be occurring in the asset disposition process? Keep in mind, this is not a SEC or a Securities Act situation.

One important source of value differentiation from other fraud investigative organizations can be the approach used by the emerging company. One such an approach is the SPEC (scope, plan, execute, close) model (Parulkar, 2010). The beginning of this method involves first determining the scope, or ascertaining the resources needed to complete actual job. This is followed by planning the investigation, executing the fact-finding exploration, and finally closing the investigation (Parulkar, 2010). While the sequential process may seem a simple one, marketing this method as a systematic approach may be useful. It is also useful to have a highly diversified fraud investigation team. Members of the team may include legal staff to determine what compliance measures are needed; forensic accountants; IT experts; and field investigators (Parulkar, 2010).

Particularly in today’s online-dominated world, where more and more legal documents and procedures are now performed online, having personnel who can evaluate online evidence to be credible or dubious in value is key. Having a diversified team is also useful as a way of connecting the organization to diverse external contacts outside the organization which may be helpful in researching various types of fraudulent practices. Given the rise of online technology, methods of fraud are continually changing and, sadly, growing more difficult to detect. It is very important for a private organization...

While this is challenging for a small investigative organization, having external contacts in the industry and engaging in regular environmental scanning is one way to do so.
Providing customers with assurance that evidence will be secured and stored in a secure and credible fashion is also a critical component of fraud investigation. “Depending on the case, investigators must ensure that they obtain copies of credit statements, emails, bank accounts, phone records, social media posts, etc. The crime scene is often virtual” (Giacalone, 2015, par.10). For example, conducting research online is one way to check the fair market value of assets in an objective fashion .Clients of the investigating firm should be assured of the competence of all personnel in researching fraud using online tools. Members of the firm should also be in contact with clients, keeping them abreast of developments, through the use of online technology.

Q2. Assume after implementing the external resource described in #1 above, it comes to your attention that Bob, a member of the Jones’ family, may be improperly benefitting from the disposition of his late Dad’s assets by selling certain assets for significantly less than fair market value before the formal auction of tangible assets. Per other family members, Bob has been acting very strange since his Dad’s passing. Large bags have appeared under his eyes, Bob has been very short and flown off the handle in just about every discussion or phone call with the other family members, and Bob is suddenly driving a brand-new Porsche after driving an old used Toyota for the last 15 years.

The interview process should begin not with Bob, but with his family members who might have insight into his financial situation, his ethics, and other pertinent information. Ideally, they should be family members who…

Sources used in this document:

References

Giacalone, J. (2015). Four basic steps in a fraud investigation. LexisNexis. Retrieved from: http://blogs.lexisnexis.com/public-safety/2015/06/fraud-investigation-basic-steps/

Investigation. (2016). Association of Certified Fraud Examiners, Inc. Retrieved from: http://www.acfe.com/uploadedfiles/acfe_website/content/review/examreview/02-inv- interview-theory.pdf

Parulkar, N (2010). Investigate fraud with these best practices. Computer Weekly. Retrieved from: https://www.computerweekly.com/tip/Investigate-fraud-with-these-best-practices


Cite this Document:
Copy Bibliography Citation

Related Documents

Fraud in Local Government
Words: 2101 Length: 8 Document Type: Essay

Fraud in local government is a critical issue that undermines the integrity of public institutions, erodes public trust, and results in significant financial losses. It encompasses a range of illicit activities including bribery, corruption, embezzlement, and procurement fraud. Across the globe, local governments grapple with the task of curtailing these malpractices, which unfortunately can be deeply ingrained in the political and administrative frameworks of municipalities (Graycar & Sidebottom,

Fraud and Abuse Case Healthcare Fraud and
Words: 2218 Length: 8 Document Type: Essay

Fraud and Abuse Case Healthcare fraud and abuse continues to threaten the country, costing the facility billions of dollars per year. Brodeur, (2007) stated that fraud is something difficult to understand because it is a contagious issue. Healthcare fraud and abuse according to Brosman & Roper (2007) is the most profitable thing one can take part in if he/she is a crook, it avoid all channels and legal procedures, in nutshell,

Fraud Audit and Investigation Define
Words: 681 Length: 2 Document Type: Essay

During this process you would want to collect any kind of financial information that will be relevant for the completing the audit. Once this takes place, you would want to establish a follow up interview with key personnel in the company. The idea is compare and analyze what you are being told by executives with actual documentation. Where, you would look for inconsistencies when comparing what the person is

Fraud and Forensic Accounting Investigation
Words: 531 Length: 2 Document Type: Case Study

Fraud and Forensic Evidence Fraud to Trial Process The case study presents a very interesting criminal act, the use of re-directing payers to a mock PayPal, an online payment processing company, where the criminals were then able to capture the PayPal username and their corresponding passwords to access their PayPal accounts. This unusual activity was noticed by a PayPal fraud investigator who noticed there were several accounts that were being opened under

Fraud and Abuse
Words: 443 Length: 2 Document Type: Term Paper

Fraud and Abuse United States v. Greber -- 3rd Circuit, 1985 Facts: Dr. Greber's company, Cardio-Med, supplied Holter monitors, a device worn by patients that records heartbeats for later interpretation. Investigations showed that Cardio-Med billed Medicare and gave a portion of each payment to the prescribing physician, under the heading, "interpretation fees," even when Dr. Greber actually did the interpretation of the data. It was found that the fixed percentage paid to the

Purposes and Differences Between Incident Reports and Logs and Narrative...
Words: 1533 Length: 5 Document Type: Term Paper

logs and narrative-only reports is commonplace in a number of public and private sectors, including law enforcement and health care where they are used to codify different types of events for different purposes. Irrespective of the setting and purpose, though, these types of written records can play a vital role in keeping track of important events and establishing accountability for future analysis or investigation. To gain some fresh insights

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now