Study Document
Danske Bank's Money Laundering Scandal
Madinger (2006) points out that the net worth method is among the most common used in accounting forensics when it comes to detecting illegal income, such as by way of money laundering. The case of Danske Bank and its money … trillion dollars flowed is a prime example of a situation in which the net worth method could be applied to investigate this corporate fraud.
As Schwab (1961) states, the net worth theory rests upon the idea that if one’s net increase exceeds the income reported, the corporation … the foundation for proceeding into the next stage of investigation (Madinger, 2006).
This phase starts by looking at assets valued at cost without accounting for depreciation or appreciation. With Danske, “the Estonian branch generated 11 per cent of Danske’s total profits before tax that year, despite only … for depreciation or appreciation. With Danske, “the Estonian……
References
IRS. (2017). Retrieved from https://www.irs.gov/irm/part9/irm_09-005-009
Madlinger, J. (2006). Money laundering: A guide for criminal investigators. CRC Press.
Milne, R. & Winter, D. (2018). Danske: anatomy of a money laundering scandal. Retrieved from https://www.ft.com/content/519ad6ae-bcd8-11e8-94b2-17176fbf93f5
Schwab, R. D. (1961). The Civil Aspects of the Net Worth Method. Wm. & Mary L. Rev., 3, 65.
Study Document
Abstract
Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans … to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist on compliance, for identifying … following major kinds of information technology risks: availability, security, compliance, and performance risks. Security risks constitute accessing data without permission, including information leakage, fraud, endpoint security, and data privacy. This class also encompasses broad threats from external sources (e.g., viruses), and more focused attacks on particular users, … the reason for its occurrence").
The goal of user access control security is the optimization of productive computing time, guaranteeing data confidentiality, mitigating fraud……
References
Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.
Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.
Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.
Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.
Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.
Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).
Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.
Study Document
… If jail time is off the table for executives, that would be an odd choice. Sarbanes Oxley creates disincentives for esecutives to commit fraud, such as in Enron. The point of SOX was really to add extra regulatory teeth, added punishments for executives committing fraud, under the knowledge that most major fraud is committed with the approval of executives, or driven by them. Folks lower down don’t have the access, nor the equity-based compensation packages, … of executives, or driven by them. Folks lower down don’t have the access, nor the equity-based compensation packages, that would motivate or facilitate fraud without senior executive knowledge or initiation. As such, a law that takes jail time off the table would be pointless, as the incentives … executive knowledge or initiation. As such, a law that takes jail time off the table would be pointless, as the incentives to commit accounting fraud……
References
Jones, H. (2020) UK watchdog backs tougher Sarbanes-Oxley style rules for top companies. CNBC. Retrieved May 4, 2020 from https://www.cnbc.com/2020/03/09/reuters-america-uk-watchdog-backs-tougher-sarbanes-oxley-style-rules-for-top-companies.html
Study Document
… with people’s pension funds or 401(k)s, etc. (Schultz & Greenberg, 2009). White collar criminals tend to commit crime in finance—such as embezzlement—or corporate fraud, such as cooking the books like what they did at Enron (Eichenwald, 2005). Sutherland helped to show how white collar crime consists of ……
References
Eichenwald, K. (2005). Conspiracy of Fools. NY: Random House.
Rosoff, S., Pontell, H. & Tillman, R. (2003). Looting America. NY: Prentice Hall.
Schultz, K. & Greenbert, D. (2009). Bernie Madoff’s Billionaire Victims. Forbes. Retrieved from http://www.forbes.com/2009/03/12/madoff-guilty-plea-business-wall-street-celebrity-victims.html
Study Document
Financial Crimes, fraud, and Investigation
The banking sector is a critical part of a country’s economy. This is more so the case given that it is … U.S. economy. Criminal elements have, however, always found a way of manipulating the system to engage in theft, embezzlement, or other forms of fraud. The said criminal elements could either be employees of the firm, business collaborators, or outsiders working alone or in cahoots with bank employees.
… involving banks could be inclusive of, but they are not limited to; information and identity theft, insider trading, money laundering, electronic crime, and fraud. These could be perpetrated by both employees and their collaborators as well as by outsiders. From a micro perspective, good examples of insider … collaborators as well as by outsiders. From a micro perspective, good examples of insider (or insider-perpetrated) bank crimes are inclusive of general ledger fraud, account takeover, and……
References
Albrecht, W.S., Albrecht, C.C., Albrecht, C.O. & Zimbelman, M.F. (2008). Fraud Examination (3rd ed.). Mason, OH: Cengage Learning.
Dionne, B. (2020). Regions Bank Teller Accused of Stealing Customer Identities Faces Felony Charges. Retrieved https://www.wbrc.com/2020/01/30/regions-bank-teller-accused-stealing-customer-identities-facing-felony-charges/
Golden, T.W., Skalak, S.L. & Clayton, M.M. (2006). A Guide to Forensic Accounting Investigation. Hoboken, NJ: John Wiley & Sons.
Krancher, M., Riley, R. & Wells, T.J. (2010). Forensic Accounting and Fraud Examination. Hoboken, NJ: John Wiley & Sons.
Singleton, T.W., Singleton, A.J. & Bologna, R.J. (2006). Fraud Auditing and Forensic Accounting (3rd ed.). Hoboken, NJ: John Wiley & Sons.
Zagaris, B. (2010). International White Collar Crime: Cases and Materials. New York, NY: Cambridge University Press.
Study Document
Lifestyle Red Flags of fraud Perpetrators
Introduction
As the Association of Certified fraud Examiners (2010) points out, the average fraud perpetrator has—like David L. Miller—no prior fraud convictions. The offender is typically in the 30 to 45 years age range and is more likely to be male than female. Both … more likely to be male than female. Both of these characteristic profile traits fit Miller to a “t”. Moreover, four out of five fraud perpetrators are likely to work in the accounting department of an organization, again just like David L. Miller. And as the perpetrator ages so too does the level of fraud increase in terms of losses (Association of Certified fraud Examiners, 2010)—again just like with the case of David L. Miller. This paper will analyze the case of David L. Miller and show … of David L. Miller. This paper will analyze the case of David……
References
Association of Certified Fraud Examiners. (2010). Who is Most Likely to Commit Fraud at Your Company? Retrieved from https://www.acfe.com/press-release.aspx?id=1677
Friedrichs, D. (2009). Trusted Criminals: White Collar Crime In Contemporary Society. Cengage Learning.
US Attorney’s Office. (2019). Attorney Convicted of Embezzling Over $1.5 Million from Virginia Senator, Canadian Business, and Autism Organization. Retrieved from https://www.justice.gov/usao-edva/pr/attorney-convicted-embezzling-over-15-million-virginia-senator-canadian-business-and-0
Study Document
… stakeholder theory needs to be pursued instead of shareholder theory, and it will explain why starting with Friedman’s own words.
Without Deception or fraud
Friedman believed that if a corporation is doing right by shareholders, the rest will take care of itself. The problem is that times … by the Securities and Exchange Commission (SEC) (Reda, 2018). That is significant because Friedman qualified his statement with the words “without deception or fraud.” The reason corporate share buybacks were illegal prior to 1982 was precisely because it was viewed as a form of market manipulation—corporations propping … precisely the problems of what happens when corporations stop acting ethically. They become destroyers rather than supporters of communities. When they engage in fraud and deception they undermine their own sustainability, which is exactly what one is likely to see in the long run with companies like ……
References
Augustine. (n.d.). Commentaries on Sermon on the Mount. http://www.newadvent.org/fathers/16011.htm
Chen, J. (2019). Market Milestones as the Bull Market Turns 10. Retrieved from https://www.investopedia.com/market-milestones-as-the-bull-market-turns-10-4588903
Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html
Henrich, S. (2019). Unholy alliance. Retrieved from https://northmantrader.com/2019/11/30/unholy-alliance/
Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.
Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from https://fortune.com/2019/08/20/stock-buybacks-debt-financed/
Mullen, C. (2019). People want to buy \\\\\\'local\\\\\\' food, but they\\\\\\'re not sure what it means. Retrieved from https://www.bizjournals.com/bizwomen/news/latest-news/2019/05/people-want-to-buy-local-food-but-theyre-not-sure.html?page=all
Putka, G. (2019). Insiders are selling. Retrieved from https://www.washingtonpost.com/business/economy/company-insiders-are-selling-stock-during-buyback-programs-and-making-additional-profits-when-stock-prices-jump-and-its-legal/2019/11/06/fc592f58-e493-11e9-a331-2df12d56a80b_story.html
Study Document
… part of a settlement with the Securities and Exchange Commission (SEC). The settlement resulted from charges filed by the SEC relating to securities fraud when Musk’s public Tweet on Twitter about taking the company private and that he had “funding secured.” The statement was shown to be … soared, making shareholders happy and rich. However, when sell side analysts began to criticize Musk’s actions and pick apart the company’s revenues and accounting, short interest increased and the stock was hammered back down. In order to provide more incentive among shareholders to increase their purchases of … There should be more disclosure, not less. Yet, even with the roles having been split up since 2018, Tesla continues to practice questionable accounting methods that leave analysts and hedge fund managers baffled by what appear to be nothing more than accounting tricks to help keep the stock price up for one more……
References
Abels, P. B., & Martelli, J. T. (2013). CEO duality: how many hats are too many?. Corporate Governance: The international journal of business in society, 13(2), 135-147.
Dickins, D. (2010). CEO and COB duality: Does it matter. Internal Auditing, 25(4), 35-38.
Gaydos, R. (2018). Elon Musk may have violated Tesla’s conduct and ethics code after smoking up in podcast interview: report. Retrieved from https://www.foxnews.com/tech/elon-musk-may-have-violated-teslas-conduct-and-ethics-code-after-smoking-up-in-podcast-interview-report
Porter, J. (2018). Tesla has found a new chairperson to replace Elon Musk. Retrieved from https://www.theverge.com/2018/11/8/18074800/tesla-new-chair-2018-robyn-denholm-elon-musk
Yang, T., & Zhao, S. (2014). CEO duality and firm performance: Evidence from an exogenous shock to the competitive environment. Journal of Banking & Finance, 49, 534-552.
Study Document
… organization in order to assess and manage risk. It is not just a matter of the shipping department looking at suppliers or the accounting department looking at the audit review board. It is a matter of the various departments working together to discuss their plans and to … stand to improve. It lacks a proper assessment of reputation risk and fiduciary risk as it continues to face scandals like the 2016 fraud scandal and the current exploitative use of……
References
Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.
Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/
English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664
Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from https://global.theiia.org/about/about-the-iia/Public Documents/Sawyer_Award_2007.pdf
Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.
Lewis, M. (2010). The Big Short. NY: W. W. Norton.
Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.
Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610
Study Document
… succeeded at leading Johnson & Johnson for the past 8 years. Skilling failed in his leadership role at Enron and was jailed for fraud. Musk has seen a string of successes and failures during the course of his tenure as head of Tesla. This paper discusses their ……
References
Bromley, H. R. (2007). Are you a transformational leader?. Physician Executive, 33(6), 54.
Brown, M. E., & Treviño, L. K. (2014). Do role models matter? An investigation of role modeling as an antecedent of perceived ethical leadership. Journal of Business Ethics, 122(4), 587-598.
Chamers, M.M. (2014). An Integrative Theory of Leadership (4thed.). New York, NY: Psychology Press.
De Vries, M.F.K. (1998). Charisma in action: The transformational abilities of Virgin's Richard Branson and ABB's Percy Barnevik. Organizational Dynamics, 26(3), 7-21.
Healthcare Technology Report. (2019). Alex Gorsky is the all-American CEO. Retrieved from https://thehealthcaretechnologyreport.com/alex-gorsky-is-the-all-american-ceo/
Holmes, A. (2007). Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press.
Kameda, T., Ohtsubo, Y., & Takezawa, M. (1997). Centrality in sociocognitive networks and social influence: An illustration in a group decision-making context. Journal of personality and social psychology, 73(2), 296.
Kolodny, L. (2018). Elon Musk’s extreme micromanagement has wasted time and money at Tesla, insiders say. Retrieved from https://www.cnbc.com/2018/10/19/tesla-ceo-elon-musk-extreme-micro-manager.html
We have over 150,000+ study documents to help you.
Sign Up for FREE