Reference no: EM132400201
For this assignment, research the Internet or Strayer databases to locate a firm that was involved in a fraud and / or embezzlement case.
Explain how the firm's accounting information system (i.e., components and functions) contributed to the fraud and / or embezzlement. You will need to focus on how each component / function of the accounting information system failed, which resulted in the scandal / case.
Write a ten to twelve (10-12) page paper in which you:
1. Based on the information you researched, assess the failure of the firm's accounting information system to prevent the related fraud / embezzlement.
2. Imagine that the company that you researched uses a third-party accounting system. Evaluate the effectiveness of the firm's stakeholder in the event that a third-party accounting system suffers a breach. Include an assessment of the level of responsibility of the software provider to the business and its clients. Provide support for your rationale.
3. Determine what advances in accounting and / or information technology could have prevented the event from occurring. Provide support for your argument.
4. Evaluate what changes should be made to both the Sarbanes-Oxley Act of 2002 and other current laws in order to make them more effective in deterring companies from committing crimes
5. Recommend a strategy that the company you indicated may use to prevent future business information failures. Indicate how the company should approach the implementation of your recommended strategy. Provide support for your recommendation.
6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
External vs. Embedded vs. Inline CSS
: External vs. Embedded vs. Inline CSS. Attaching a style to an HTML document can be made using external style sheets
|
How each control will support the associated policy
: Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy
|
What amounts relative to income taxes the company report
: What amounts relative to income taxes does the company report in its: Income statement, balance sheet and statement of cash flows
|
Social cause might present to your employees
: Evaluate any ethical challenges this social cause might present to your employees. Analyze the key strengths, weaknesses, opportunities, and threats (SWOT).
|
Explain how the firm accounting information system
: Explain how the firm's accounting information system (i.e., components and functions) contributed to the fraud and / or embezzlement.
|
Public sector case study
: In May 2013, Edward Snowden, a National Security Agency (NSA) contractor, met a journalist and leaked thousands of documents detailing
|
What is the most popular example of round robin
: Describe what is/are Round Robin Protocols? What is the most popular example of round robin?
|
Access the administrative-physical and technical controls
: You will access the administrative, physical, and technical controls of the particular company then determine which one of these administrative,
|
Develop risk management framework
: If Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company?
|