ACC 571 Course Great Wisdom / tutorialrank.com ACC 571 Course Great Wisdom / tutorialrank.com | Page 3
Assess the three procedures that are effective in identifying
breakdowns in internal controls due to override and collusion. Choose
which of three would be most difficult for the external auditor to
detect. Explain your answer.
Compare and contrast earnings management and fraud, and give your
opinion of how external auditors can determine if management is
deliberately managing their earnings.
"IT Systems Controls and Data Recovery" Please respond
to the following:
Evaluate the two major approaches for testing IT system controls. Of
the two approaches, give your opinion on which you believe provides
the most assurance that fraud has not occurred in an organization.
Provide support for your rationale.
Evaluate the effectiveness of computer functions that are used to
recover deleted files, and identify software packages that are
commonly used to restore deleted files. If the software fails to recover
the deleted files, explain what recommendations you would make to
the organization.
ACC578
"Fraud Detection Applications" Please respond to the
following:
You have been hired by XYZ Company to automate its frauddetection process. Analyze the process of fraud detection automation.
Based on your analysis, propose an automation plan to XYZ and
include recommended tools and process steps. Support your proposal
with examples.
You have decided to commit fraud in a company that has an
automated fraud-detection process. Develop a scheme that is likely to
be undetected by the automated process.