Title: FRAUD%20EXAMINATION%20ALBRECHT%20
1FRAUD EXAMINATIONALBRECHT ALBRECHT
- Theft and Concealment Investigation Methods
2Review Fraud Triangle
3Discuss Inquiry Methods
4Review the Target Approach to Theft Investigation
5Comment on Properly Performed Surveillance
6Describe How to Construct a Vulnerability Chart
7Discuss Surveillance Covert Operations, Define
8When do you use undercover operations?
9When do you use undercover operations?
10Define Invigilation
11Comment On Invigilation
12Review the Concepts of Physical Evidence
13What is the value of a good document to the fraud
examiner?
14Match the Following Concepts
Uniquely Marked, Make Copy, Store Original
Safely, Use Copies in Investigation
Chain of Custody
Originals Preferred, Sometimes a Copy Can Be Used
Marking Evidence
Carefully Maintain Record of Every Movement or
Examination
Organization of Evidence
Rules Concerning Originals
Organization Key to Retrieving Maintaining a
Database
15What information should be stored in the database?
16When can a photocopy be used as evidence?
17Discuss Documentary Evidence
18Complete the Chart on Discovery Sampling
19Review How to Use a Random Number Table
20What conclusions can an Auditor/Examiner draw?
21Match Discuss Regarding Sampling
Documentation
Representational
Errors
Methods Sources
Sampling Risk
Misrepresentation
Non-sampling Risk
Fraud Signals
Computer Searches
Fraud or Not
22What are the hard to obtain documentary evidences?
23Review Discuss the Questions that Arise with
Disputed Documents
24When do you use a documentary expert?