Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Assignment 3: Fraud in the AISDue Week 7 and worth 280 pointsFor this assignment, research the Internet or Strayer databases to locate a firm that was involved in a fraud and / or embezzlement case.Ex

Assignment 3: Fraud in the AIS

Due Week 7 and worth 280 points

For this assignment, research the Internet or Strayer databases to locate a firm that was involved in a fraud and / or embezzlement case.

Explain how the firm’s accounting information system (i.e., components and functions) contributed to the fraud and / or embezzlement. You will need to focus on how each component / function of the accounting information system failed, which resulted in the scandal / case.

Write a ten to twelve (10-12) page paper in which you:

  1. Based on the information you researched, assess the failure of the firm’s accounting information system to prevent the related fraud / embezzlement.
  2. Imagine that the company that you researched uses a third-party accounting system. Evaluate the effectiveness of the firm’s stakeholder in the event that a third-party accounting system suffers a breach. Include an assessment of the level of responsibility of the software provider to the business and its clients. Provide support for your rationale.
  3. Determine what advances in accounting and / or information technology could have prevented the event from occurring. Provide support for your argument.
  4. Evaluate what changes should be made to both the Sarbanes-Oxley Act of 2002 and other current laws in order to make them more effective in deterring companies from committing crimes.
  5. Recommend a strategy that the company you indicated may use to prevent future business information failures. Indicate how the company should approach the implementation of your recommended strategy. Provide support for your recommendation.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Analyze the business activities that comprise an accounting information system to determine the information needs to support decision-making function.
  • Use technology and information resources to research issues in accounting information systems.
  • Write clearly and concisely about accounting information systems using proper writing mechanics.
Show more
Geffmurimi
Geffmurimi
  • @
  • 1030 orders completed
ANSWER

Tutor has posted answer for $60.00. See answer's preview

$60.00

***** Fargo *********************** ***************** NameCourseDate               Wells ***** **************** *************** ***** was ******** ** a massive **** **** targeted its ********* *** ******** ********* used **** ****** ** create new ******** ******** *** ********* ****** ****** cards **** ** customer ******* *** established sham ******** ***** ***** *** * ************* ****** that ******** *** fraud ***** ***** requires *** ******** to **** ** ***** * ******** ** **** client ******* ***** ******* ***** For instance an ********** **** * ******* account ****** also purchase credit ** ***** **** The ***** ******** ********* ********* ** **** **** accounts ** *** **** of ***** clients *** ***** credit ***** ******* ****** ******* ********* **** *********** ***** **** client ******** ** the **** ******** ******* *** ********* ** *** ******* ***** making * ******** ** the **** ******** the employees ***** close the ******** ** ***** ********* **** employees are said ** have *********** ***** ** their ******** ******** ***** * ********** scam *** ********* ******* ***** ***** ****** *** obtained ******* **** *** company *** ***** **** *** *** ********* Wells Fargo customers ******** ***** they were ********** ** debt ********** *** ****** **** ** the account **** ***** ****** *** ********* **** ******** ****** ***** **** ***** ********* ** *** end the **** *** ****** ** *** ******* *** *** ******* ** ***** ***** ** 5300 ********* were ******** in *** **** *** *** ******* ***** a fine ** *** ******* ******* **** the ******** ********** Bureau ********* ********* ** ******* ** *** ********** Information ********* embezzlement *** encouraged ** *** ********** ** *** accounting *********** ****** ** Wells ***** *** *** *** accounting *********** ****** ******* the ********** *********** ****** *** ********* to *** system ***** Fargo ****** ** ******** the ****** **** ** ****** *** sensitive **** that relates ** ***** ******* *** failure ******* ********* ** ****** ******** *********** that they **** to **** **** ******** *** ***** ****** ***** ******* ******* ** *** ********** system ** *** absence ** ************** ************ *** *********** ******* The ********** ****** did not ***** the people **** ***** **** and ******** ******** ** **** failed ** ***** *** ****** ** ****** that ***** authorize ***** ********* without customer ***** Wells Fargo *** ****** ****** ***** ****** *** *** ********* could transfer ***** ** *** ****** to any ******* **** so ****** (O'Rourke ***** **** ********** should **** be ******* ** *** *** ********** that *** ** **** accountable *** *** issuesThe accounting system *** **** *** ** ******** *** ********* of the ****** Most ** *** ************ in *** ************ affect *** ********* ** *** ******* *** client ****** ***** ***** ********* ** authority ** **** form ****** * credit card ** ****** in ***** **** The accounting ****** was ******** to ******** *** ****** card ***** that failed ** follow ********* *********** *** ********* ******* to e ********* involved ** any ******** ** **** *** close their ******** *** ********** ******* **** **** ** ***** ****** ** ****** *** ******** *********** ** *** ******** ********* *** ********* with access ** *** system ******* *** the power ** ******** ** behalf ** ***** ********** ********** ******** ******* ******* ** *** company **** **** *** ****** ****** ** ******* ** require *** ******** ******** ** *** customer especially **** closing *** ******** ******* ******* *** in ********* *** ****** via mail ** ***** ** any *********** ** ***** accounts It ** prudent to ****** the ****** ** *** **** ** *********** **** ****** in the ************ ** ** understandable **** *** employees **** **** ****** ** **** *** ***** ******** ******* the ************* **** to *** ***** emails However *** company ****** send **** ******** ************* to *** ******* ****** ** their ********* In ******* the ******* ** notifications to *** ********* ********** the continuity of *** ********* ***** **** *** **** inspection ********** *** ***** reward ****** The ******* *** only ********** in *** number ** accounts ***** ****** by ***** ********* It failed ** *********** the ****** of accounts **** ****** open It **** ****** ** ******* *** ********** ** the *** ******** ******** *** unusual activities would **** been ******** ** the accounting ****** *** ********* *** rate of ******* ******* *** ******* ** ******* the ******* ****** ** analyze *** transactions that ******** ** *** system to ****** ** anomalyPart ** ***** ******* * ******** ** which the ********** system ** provided ** * ***** party it ** the ***** part *** *** *** **** **** ***** **** ** the ************** for *** ************ *** third ***** *** *** effective **** the breach occurred Many customers *** ******** ** *** bank ** receiving ****** ***** that **** not ********* Some customers were already ***** ******* ** **** collectors *** ******** they had never ****** Once *** ******* ******* *** **** the ***** ***** ****** have ************ *** bank and *** third ***** **** **** ******** **** one of *** affected ******* **** *** bank *** ******* triggered ** ************* which *** to *** ****** ** **** than **** employees ** the initial ******* *** been ********** ** ******* ***** ******* ***** **** **** ******** by *** ************ schemeThe ***** ***** ** responsible for *** ******** of *** ****** *********** ******** ********* are ********** ** *** *** ****** ** ***** system *** *** **** ******* ***** ** *** ********* **** have **** the client organization ****** 2015) ** installing ***** software the ***** ***** ** ******** ** ******* *** ******** ****** ** ******** any ******* ***** ** the ****** (Sorebo & ****** ***** *** ** the ***** ****** to * ******* system ** *** ******** ************ of ***** *** third party ******** ****** have provided * ****** **** ********* such risksOne major ******* of *** ***** ***** is *** **** ** ****** ****** *** ******* in the opening *** ******* ** ******** *** ********* **** managed *** ************ ****** ******* *** ************** requirements ** the ****** were minimal *** ******** ******** *********** ** the ***** party ******** minimal client participation *** ****** unlimited access **** ******** *** ********** ********** ** Wells Fargo ************ ***** ***** ** responsible ** the ****** *** ******* to ******** *** breach *********** ******* should ********** ** ******* *** *************** *** systems at ***** ***** were **** ********** ***** * ******* ******* ******* claims ** * ******** ******* **** ****** **** ******* ********** ** ******* ******* *** *** ******* ** ****** ***** **** **** not ********* *** third ***** ****** ********* be **** *********** *** by *** ******** and *** clients *** *** financial **** ******** ***** the ***** ********** third ***** ** *********** ** *** clients for *** ****** **** ******** **** the ******* use of their *********** ** Wells Fargo ********* ******** ********* *** *********** *** ********** *** ********** ** *** ***** ** ***** ******* **** ****** ** ****** **** ****** **** has ****** to *** *********** is **** ** *** *********** ***** *** ** *** diligence *** the ***** ***** undermined the ******** ***** ** the ******* ** ****** ** ****** *** ************** pertaining ** ******** ****** ********* any **** **** ***** Fargo ******* ******** ****** ** *********** ** *** third ********** **** *** ****** *** ***** ***** ** responsible *** the ****** ******* ** *** business ***** ***** *** **** **** ******** the *** ***** **** ***** **** ** ****** **** *** *** ***** ******* by regulators As software ********* toe ***** Fargo the ***** party ********* all *** ************** for ******** *** system Wells Fargo ****** ** their ******** *** ********* **** with *** ******* of their ******* *** *********** ********* **** *** ****** ****** ** the ************** of the ***** ***** *** week ******** ******** allowed for *** ****** *** ***** ***** had * **** ** inspect and update *** system ** ******* *** ************ ** ***** The third party’s ****** leads ** the ****** to *** *********** ********** Banks ******* ******* based ** their ******* ** secure ***** ******** * **** that *** * ******** ****** is ********** ** *** ********* *** ********* ****** ***** ******* ** recruit ** ****** ***** clients *** ***** party ****** compensate for **** ****** *********** *** ******* *** **** **** by the ******** Protection ****** ***** should **** be **** ** the ***** ************* *** ***** ***** **** *** ** ***** ****** *** *** scam *** company ***** ****** ** ****** ** ***** In **** ** the ***** the 5300 employees ******** ** *** **** **** ********* by *** cross-selling ***** Wells Fargo *** ****** ***** ************* goals **** ***** ******** to * ******** per ******** per **** The ********* ********* **** *** ********** ** *** ****** ** ********** *** sales results Most ** *** ********* ******** ** *** **** ******* ***** behavior to ********* ***** ****** sales Only a *** ********* transferred funds ** ***** ******** accounts Wells ***** ******* *** **** ******** ** *** employee ** ***** **** into manipulating *** ****** *********** the **** erred **** ** failed ** ****** the ***** ********** made ** *** employees ******* *** ***** ******** ** *** third party ******** the **** ** ***** at ***** *** responsible ** *** ************ of *** *********** ** ******** ** Accounting and *********** ******** ************ ** no doubt that *** **** ******** ******* ******* ** ***** Fargo ******* *** ************ ******* ************ ** ********** ******* *** presence of ****** ******** ******* ******* *** internal ******** are ** ****** limited ** ** ********* role ******** ******* ******* ********* ******* risk assessment ********** ******* ***** ****** ***** It ** ******* risk *********** **** ************* *** ******** the ********** ** ***** ******* *** **** preventive ******** ****** *** harm ********** ** *** internal control system ** the segregation of ****** *** segregation ** ****** ******** ********* roles in the organization to limit access to sensitive information ******* ******** is ** ********* both ******** *** ******** audits *** accounting ********** ********** *** use ** ******** auditors ** ******* *** internal controls ** *** system ******** auditors ******* **** ** outsiders ** *** ************ to ***** **** *** ****** also encourages *** *** ** ******** ******** to ******** *** ********** ** ******** ******** ************* ***** *** external ******** *** ********* reporting ******** ******** auditors *** ** ******** ** assess *** ************* ** the ********** ****** ** *** organization ******** auditors ******** any *********** ********** that **** missed ** ******** ******** They *** ******* * **** ********** to ******** ***** ******** ** *** ****** ***** *** internal control ****** is ******** ** ******** ******** a **** assessment from *** ******** ******* ** more valuableTechnological ************ have ******** *** ******** possibilities ** ******* ************ ** ** *** ******** ** ********* secure protocols **** ******* ************ ******* ********** ************ Protocols ******* ******** ****** ** sensitive *********** Through technology it ** ******** to discriminate the ****** ** *********** in ** ************ Another *** to ****** *** ****** ** ******* *** *** ** ************** technologies ****** confirmation ******* ****** **** *** ****** transacting ** ** account is *** ****** user ********* ****** not perform a *********** without the ****** ********* verbal confirmation from *** client The ******** uses ***** ******** ** secure ********** transactions A ******** ************** ** also used to enhance ********** ************ *********** *** ************ ******* has **** ******** ** ****** ******* ** transactions ** ***** ****************** has developed ** ******* *** ********** ** ********* ***** *** ***** ************ ********** in organizations **** ********* *** ****** ******** ** *** ******* ** ****** ***** of ***** ** an ************ *** ********* involve **** ******** and ********** ******** ******** ** secure ******* Data ****** *** instance has **** embraced ** ******** ******* against ******* ** **** ** for fraud detection ********* ******** ***** ***** 2017) ******* ************ **** **** made ** *** formation ** hybrid data ****** techniques Hybrid data ****** techniques embrace the use ** **** inputs ** **** as ************* techniques ** ********* ********* ** * ****** ********** are ******* ** ****** *** ******* activities ***** **** ****** ********** ** ** ********* ******** ** *** **** ****** approaches ** identify ************ transactions in *** ******* ********** ** ******** Changes to ******* ************** Sarbanes-Oxley ********** act ******** *********** *** to *** ******** ******** *********** *** ************** ********** *** targeted *** ****** ********* management ** *********** ********* ** has been useful ** *********** ********** and ********* ** ************* *** ******* with the *** ** its ********* to function ** the ************ society **** organizations *** ********** their ******* The technological sphere introduces a *** *** ** ******** Employees *** ******** **** themselves ** *********** ********** territories There *** ******* codes ** ******** **** ****** *** ******** ** ********* ** *** ************* ***** Employees find ********* ** *** technological ***** that **** tend to ***** Limited ******** on *** **** behavior ********** **** of *** ********* ****** **** *** *********** ******* ********** systemsSarbanes- *** should therefore ** ******** ** ***** ***** ** ********** ****** ***** ********* *** currently involved ** ********** ************ ** ***** *** ** ******** ********* *** ********** ** ********* ** * faster **** than *** laws that ****** them (Kim ********** ***** ****** ***** A ******* ********** ** best financial ******** is ** ****** adequate ** ********** ************ ******** *** ********* also ********* *** ************ ***** about *** **** to maneuver the *********** regulations The Sarbanes-Oxley *** ****** **** ******* with ******** ************ Perhaps ** is **** to consider introducing an *** **** **** cover ********** ************ *** *** should continually be ******** ** technology ******** **** is ******** the **** *** to cover any new ********* **** **** ******* ************ ** ********************* ********** **** ****** ** ********* At *** moment **** ******** ********** *********** ****** fines ** ************* ** *** the **** ** ***** Fargo *** ******** Protection Bureau threatened * **** of ***** 185 ******* dollars **** that require *** ************ of ***** and ********** ***** ****** be ********** ** better ******* the consumers *** staff of ** organization ** ******** in such ****** ******* **** *** escape *********** Managing teams **** ** ********* ****** security ******** because ** **** ** a breach ** ** the ******* that pays ** discourage ***** ******* *** individual *********** should ** ********** ** *** ********** *** **** ********* that were ******** ** *** ****** were **** ***** ** *** ***** ***** **** paid *** ***** ** *** ********** **** *** consumer *** paid very ****** for their inconvenience Regulators ****** ***** ***** ********* on ********* both *** ******* *** ************ ***** ***** *********** ****** ***** ** *********** *** 5300 ********** ********* ******* ** limiting *** ********** ** the *********** ** *********** *********** **** ******** *** the ******* ** to improve *** ******** ******* system Wells ***** should *** *** ***** ********* ** implement a ****** ******** control ****** ***** *** ****** ****** ********* **** ****** techniques ** securing *** ********** *********** system **** ****** ********** **** **** ******** any ******* ************ in *** ****** ******* ** al ***** The ***** approach ** ** ******* *** ************** ******* ************* ******** ************** ** ****** ************** **** **** improve *** ****** ******** *********** the ************* ****** ********* ****** ** ensure **** sensitive ********* *** well ********** Customer *********** is **** ********* **** a *** employees have access ** confidential ****** ********* The ******* can *** *** ********* ******** to ********* *** **************** ************** ***** **** is ** ********* * ********* *********** *** *** *********** ** *** ******** ******* ****** **** **** involve ******** *** staff ** the *** ******* ******** ******* ** *** ***** have to be ********** ** *** *** ******** to ********* its ******* ********* them **** **** ** ********** ***** ******* ** well ** **** **** understand its use ** ** **** ********* to ********* ********** that **** ******* *** implementation of *** *** ******** ******* ************* ********** implementing *** system it is ********* to ******* ******** ***** **** **** ********* *** ************** ** *** strategy ********* threats **** **** the ******** are ******** ** ******** *** **** ways ** ************** them The ********** also aids ** *** prioritization ** ************** ************* ***** step ** ** ******** *** ***** ***** of *** new internal ******* ********** All the ******** of the strategy *** ******* ******* *** ******* ********** The *** ********** should ** an improvement over the existing system ***** ********** **** do not ******* *** system ****** ** ********** *** **** ******* that **** strategies **** additional ***** *** ************ in *** *************** Goals *** Control *********** ************ *** then implement *** ***** *** new ******** ******** ****** ******* ***** ***** *** essential ** defining the ***** ** ******** control ******* that will be ********* *** ***** are **** ******** ** *** monitoring ******* is ******* ** ********* ******** that **** ****** *** ******* of *** new ********** ******* ** ****** *** improvement of *** system should ** *********** ** ******* policies **** ensure *** objectives ** the ******* ****** *** *********************** ** the *********** ******** is *********** ** ********** **** ******* ******** *** strategy *** ** *********** ** * ********* ***** to ***** ********* ** *** ***** with *** ************* ** an ************** ****** *** finish **** the *********** of *** data ********* systemMonitoringAfter *** system has **** *********** it is prudent ** ******** *** ******* The ********** ** ***** ** *** established ***** *** the system *** shortfalls of *** ******** ******* ****** ** *************************************** * *** U ******** * * ****** B ****** * & Mandal * ****** * ******** ********** review on ********* ***** detection ******** **** mining ********** ************* ******* ** Trust ********** ** ********* and ************** **** *************** * Figueira G ***** ***** M (2017) * **** ****** ***** system *** *********** ***** detection ** e-tail ******** ******* ******* ** 91-101Cavico * * & ******* * * (2017) ***** Fargo's fake accounts ******* *** its ***** and ******* ************ for ********** SAM Advanced ********** ******* ***** **** G ********** V * & ****** * W ****** ** **** matter: *** ***** ** ******** ** material weaknesses ********** ******** 32(2) 37-55O'Rourke * ****** *** **** IN **** **** Risk ********** 64(11) 20-25Rendon * * ***** ****** J M ****** ************ ** public ************ ** ******** of ******** ******** and ***** ************* ************* ******* ** Procurement ********** **** ************* * * ***** Echols M * ****** ***** **** security: ** end-to-end view ** security ** *** new ********** **** *** PressWeber * * ****** Internet ** ******* ******* ****** ********* ******** *** ***** ******** ****** ***** 618-627Winn * * (Ed) ****** Consumer ********** in the *** of *************** ******** *************

Click here to download attached files: Embezzlement (Autosaved).docx
Click here to download attached files: Embezzlement (Autosaved).docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question