Describe what fraud is and how it could be conducted

Assignment Help Basic Computer Science
Reference no: EM13992479

In APA style with proper citation and references complete the following in a 3 page paper:

In conversations with PVSS, you have talked about the long-term strategic goals and plans for expansion. You also know about the rumors of the past, and during an informal conversation with the media content and design manager, the subject of the leaked CD came up. It is obvious that the manager is still upset by the allegations. The topic of fraud came up, and the manager would like to know how this could be tracked if proper controls are in place.

Using the online library, Internet, and all course materials, research fraud and auditing fraud. In a report of 2-3 pages for the manager, complete the following:

  • Describe what fraud is and how it could be conducted.
  • How would an audit attempt to detect that fraud has taken place?
  • Deliberate the previous leak, and offer your opinion about the root cause.
  • Could it be traced back to PVSS? (Note: this is pure speculation on your part.)
  • Play devil's advocate as both an employee who could have leaked the CD and an auditor in an effort to track and catch the employee.

Grading Rubric:

Discussion Topic

Points

A description about fraud and how it takes place

40

A description about how an auditor can detect fraud

30

A discussion about the leaked CD from the perpetrator point of view

20

A discussion about the leaked CD from the auditor point of view

20

Quality of writing:

  • Grammar
  • APA format
  • Use at least 2 credible sources

15

 

Reference no: EM13992479

Questions Cloud

Compute the voltage drops across the resistor and capacitor : Compute the charge on the capacitor just before the switch is thrown from position 2 back to position 1. Compute the voltage drops across the resistor and across the capacitor at the instant described in part (a).
Determine the work and the heat transfer in the process : A piston/cylinder arrangement contains water of quality x = 0.7 in the initial volume of 0.1 m3, where the piston applies a constant pressure of 200 kPa. The system is now heated to a final temperature of 200°C. Determine the work and the heat tr..
Draw a dependency diagram to show functional dependencies : This assessment item is designed to test your understanding of more advanced database design, your ability to use an iterative approach to modelling, and to examine data problems due to redundancy.
Operate business solutions : After the success of the company's first two months, Santana Rey continues to operate Business Solutions. The November 30, 2015, unadjusted trial balance of Business Solutions (reflecting its transactions for October and November of 2015) follows.
Describe what fraud is and how it could be conducted : In conversations with PVSS, you have talked about the long-term strategic goals and plans for expansion.
What was snos ositionin strate : Identify, describe and define the marketing terms of consumers - Write a consumer profile of the target segments.
Estimate the percentage of an employee salary : Estimate the percentage of an employee's salary that must be contributed to the pension plan if it is to remain solvent. (Hint: Do all calculations in real rather than nominal dollars.)
Will sheet rust through within in the scratched condition : Under these conditions it is estimated that the current consumed at the tinned surface by the oxygen-reduction reaction is 2 X 18" A m-1. Will the sheet rust through within 5 years in the scratched condition? The density of steel is 7.87Mgm-3. Ass..
Explain the results of the improvements you recommended : Post:Name the product and the associated password management protocol you selected. Analyse the good and bad practices of this protocol.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write dissolve method for three color components

It does this by incrementing (by 1) all three color components (using the above accessor and mutator methods) as well as the alpha component value. Write down dissolve method.

  Future applications will change manufacturing industry

Prepare a response which explains the future applications which will change manufacturing industry, judiciary, and field of sports. Explain at least one application for each field.

  The preferred method of interacting with a computer

Graphical User Interface (GUI) became the preferred method of interacting with a computer system. Beginning with the Xerox-developed GUI in 1970, GUI-based platforms have evolved from the Apple Macintosh to the Microsoft Windows operating syste..

  Write a program that reads in an integer value

Write a program that reads in an integer value for n and then sums the integers from n to 2*n if n is nonnegative, or from 2*n to n if n is negative. Write the code in two versions: one using only for loops and the other using only while loops.

  Design and implement modified des cipher

Design and implement Modified DES cipher as mentioned below and observe the Avalanche effect. The number of rounds allowed from one to five only. Observe the Avalanche effect by c hanging the bits of the plain text.

  Software engineering code of ethics

1. "Software Engineering Code of Ethics and Professional Practice" Please respond to the following:•Describe one of the eight principles of the ACM Software Engineering Code of Ethics and Professional Practice and explain why the principle is impo..

  Explain reasoning and support it with estimated calculations

What can you speculate regarding the time required to perform the transfer in each scenario?

  A bar code reader is to be used by which type of system

One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is intent to illegally obtain information or tangible property through the use of computers.

  Standard voice telephone lines

1. Standard voice telephone lines, such as those found in residences, limit bandwidth to: A. 300 Hz B. 3,400 HzC. 8,000 Hz D. 20,000 Hz

  What makes unix so portable

1-13 - UNIX is highly portable. What is portability ? What makes UNIX so portable ? Why is portability important ?3-13 - Why do you suppose progessional programmers find the consistencey and elegance of UNIX so appealing ?

  Prevent the computer intrusion described in case

1. What should the Connecticut Company have done to prevent the computer intrusion described in this case? What should it have done to detect this computer intrusion?

  Given two stringsa and bcreate a bigger string made char a

Given two strings, A and B, create a bigger string made of the first char of A, the first char of B, the second char of A, the second char of B, and so on. Any leftover chars go at the end of the result

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd