Tom apply computer forensic and other techniques

Assignment Help Operation Management
Reference no: EM131715881

Jackson company manufacturers pet supplies for birds and cats. Its’s top-level staff includes two accountants, a technology coordinator, a production manager, a warehouse manager, an office manager, two sales managers, two assistants, and the CEO. The company’s main offices and manufacturing plant in Los Angeles consist of an office building, a plant building, and two small warehouses. All buildings are connected via underground fiber optic cable. The servers, hubs and routers are stored in the main office building.

The brain behind the IT network include three server machines, named Washington, Jefferson, and Adams. The Adams server hosts the Mixta accounting system, which processes all internal and external accounting transactions in real time.

A recent audit by a regional accounting firm discovered six customer accounts that could not be traced back to real people. The auditors confirmations had been returned in the mail, marked “Undeliverable” and with “Invalid Address” stamps. To make things worse, all six accounts had been written off for nonpayment of amounts ranging from $4,200 to $7,000. The discovery was a complete surprise to Sandra Winger, the credit manager, because she always reviewed and personally approved all write-offs over $2,500. She was sure that she had not approved any of these.

Sandra called in Tom Surefoot, a local forensic accountant to investigate. She was sure that fraud was involved, and she strongly suspected that Betty Blanco, one of the office managers had somehow gotten into the accounting system and set up the phony customer accounts and had probably sold off the written-off accounts on the gray market. Sandra was furious.

“I don’t care how much it cost,” Sandra told Tom. “I want you to catch that woman. I’m not going to let her get away with me like that.”

How could Tom apply computer forensic and other techniques to determine whether or not Betty Blanco should be a suspect? Case Question 41 Chapter 11 - Forensic Accounting and Fraud Examination 2nd Edition.

Reference no: EM131715881

Questions Cloud

Explain potential employee needs that can lead to improved : Make sure your plan includes the following: Identify and explain the potential employee needs that can lead to improved organizational effectiveness.
Continue to manufacture coal to export to other countries : Should the United States continue to manufacture coal to export to other countries?
Changes in the labor market : Historically, the introduction of technology has caused profound changes in the labor market and, temporarily at least, displaced people from jobs.
Calculate the bonus earned by each manager : Calculate the bonus earned by each manager for each 6-month period and for the year 2010. What was the purpose of the change
Tom apply computer forensic and other techniques : How could Tom apply computer forensic and other techniques to determine whether or not Betty Blanco should be a suspect?
Example of a real world application : For each of the architectural styles (4 architecture styles), give an example of a real world application whose software design might incorporate that style.
Describe the class rank of west point graduates : A military science teacher wanted to know if there was a relationship between the class rank of West Point graduates and their military rank in the service.
Can a system ever be completely decoupled : Can a system ever be completely "decoupled"? That is, can the degree of coupling be reduced so much that there is no coupling between components?
Contemporary moral issue in our society : Choose a contemporary moral issue in our society and apply the ethical principle of Utilitarianism to approve and be in favor of this moral issue.

Reviews

Write a Review

Operation Management Questions & Answers

  Is south koreas currency stable

What are the legal risks of an American company starting a business venture in South Korea? What are the limits on corporate political activity in South Korea? Is South Korea's currency stable?

  Outcome of conducting a market opportunity analysis

What is the outcome of conducting a market opportunity analysis? Examine two components of the MOA and assess how each contributes to an effective IMC. Incorporate concepts and examples from this week’s lecture in your post.

  What is situational crime prevention

What is situational crime prevention?

  Employer computer-use policy permits employees

Assume that an employer’s computer-use policy permits employees to use their company-owned laptops for personal emails and web searches, business.

  Narrowed down to three locations

A location analysis has been narrowed down to three locations. The management needs to select the best location. The critical success factors, their weights, and the ratings for each location are shown below:

  What is the difference between ethics and business ethics

Explain what is meant by "sustainable business practices," and using that explanation, provide three examples of companies that pursue sustainability strategies. What is the essence of the theory of corporate social responsibility (CSR)? How does the..

  Describe the factors that influence value chain coordination

Why are financial risks a key concern of SMEs considering international trade? Describe the two basic ways that companies can create value. What role does the value chain play in these methods? What is coordination? Describe the factors that influenc..

  More heavily involved in the consumer protection laws

Class, this week we get more heavily involved in the consumer protection laws and maybe we will even get into discussing whether or not they are effective. The best (or worst) part of this threaded discussion is that we will see that the warnings whi..

  Study key aspects of global management and working

What are some examples of learning from creative arts to study key aspects of global management and working? How could dance/music help to challenge our ideas of the Other? How can poetry provide a window into learning about experiences that are ofte..

  Performance available in the event of breach of contract

When is specific performance available in the event of a breach of contract?

  Compute the ctr for the campaign

You are a brand manager for a new toy marketing company. You have sent an email blast to 10,000 customers. Each email contains two links that could be opened by a recipient, both of which would lead to your product website. You are informed that the ..

  Phases included in the IT Governance deployment plan

Discuss the phases included in the IT Governance deployment plan. Who are the stakeholders that need to be involved and in which phases should they be involved?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd