All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
financial investigation and forensic accounting
Questions and Answers of
Financial Investigation And Forensic Accounting
Describe how an initial TCP/IP connection is made.
Identify the following IP addresses with the organization that owns them.a. 207.246 .6 .128b. 209.3 .112 .1c. 164.58 .120 .10d. 211.213 .248 .213
What are the main advantages of adopting the OSI model throughout the world?
Using the general search engines Google and Altavista and the meta search engine Dogpile, look up the term leptospirosis. Print out the top three websites returned by the search engines and comment
Use the Address Resolution Protocol (ARP) utility in Windows to identify the MAC address on a PC. Print out the results and identify the MAC address on the print out.
Incident Response Report. On June 30, 2004, Hank Law, webmaster at the MacVee Software Company located in Hyattsville, Maryland, detected suspicious activity on its web server. After checking, he
Attack! Attack! White Florist is a large distributor of flowers on the U.S. East Coast. The company has a web server farm where customers can bulk order flowers online. Two days before Christmas, one
Finding Ports of Call. Netstat shows you the ports that are open on your computer. It also allows you to detect any unauthorized programs that might be running on your computer's ports and collecting
Where's the Teeth in Ethics? HP executives admitted that outside investigators had used a technique called "pretexting," or posing as someone else to obtain phone records of reporters and board
Transfer it Here. Viria Ventures is a venture capital firm run by Henry J. Kyler and Larry Wills (LW). Viria is thinly funded without a track record, and as a consequence the investment opportunities
Footnote Number 27. Morgan Stanley's Prime Brokerage Division provides financial and administrative services to numerous hedge funds. As a consultant to Morgan Stanley and its Information Technology
Forensic Audits. Present arguments that you believe a forensic audit will never become an accepted fraud detection practice.
LinkedIn. Select a student team and develop a LinkedIn page (http://www.linkedin.com/ ns). The LinkedIn page can be based on a fictitious or real person. The purpose of the LinkedIn page is to
Profiling. Go to the FBI website (http://www, fbi.gov) and find a description of a financial fraud. The FBI site provides numerous descriptions of financial fraud cases that they have prosecuted.
What is a cybercrime?
Discuss the reasons a forensic accountant may need to know about viruses, denial of service attacks, forging e-mail, and unauthorized computer access.
What is the best way to prevent attackers from exploiting well-known bugs to gain access into a web server?
Why are all these hacker tools and techniques so readily available on the web?N.J. Stat. AnN. §2A:38A-1 - §2A:38A-6 and §2C:2023 - §2C:20-32; N.M. StAT. ANN. §30-45-1 - §30-45-7; N.Y. Penal Law
If social engineering is the reason that confidential financial information was revealed, what needs to be done to prevent this from occurring in the future?
Discuss the problems that may be created for the forensic investigator if "unauthorized access" is legislatively viewed as a property crime.
Explain why the OECD's recommendation No. 3 may not be effective in deterring \(\mathbb{I P}\) spoofing.
What provisions in the Patriot Act have been enacted to make it easier to apprehend cybercriminals?
Discuss whether it would be better to contact federal or state law enforcement officials if an Alaskan business has become the victim of a cybercrime.
Discuss how it might be possible to detect whether a message is hidden in a digital photo.
Compare the computer crime-related statutes that have been enacted in the states of:a) Nevada;b) Alaska.
Unauthorized Access. Ted Munice has recently been fired. He had been the payroll accountant at Texas Shipping in Galveston, Texas. The systems administrator had determined that someone had logged
Computer Fraud? Marcie Lewis and Fred Cisco worked as accounting mangers atSave-LotFood Stores. The Company distributes stock options to its 10,000 employees as part of their compensation package.
Cybercrimes and Cybercrimes. The recommendations from the Council of Europe's Convention on Cybercrime contain some of the most recent descriptions of cybercrimes.a. Review the Convention in Appendix
In-flight Crime. Nicole Freedman, a U.S. citizen, was on an Air India flight from New York to London on May 15, 2003. Midway over the Atlantic, she used an airplane phone to execute the transfer of
Cyber Skill Set. List two organizations that could help an accountant develop the basic skill set listed in the chapter section, Guidelines for Cybercrime Management. These may be training
Backdoors. Your consulting firm, Higher Associates, installed an online ordering system for Lotus Flower shops two months ago. On Monday, you have received a frantic call from Mark Wellmen, the owner
Sniffing Around. Many times sniffers are used to collect and analyze data going across a network. Sniffing software can be used to collect passwords and other confidential information. Sniffers are
Hot Tip. Dan Wilmer, a small businessman, was facing a cash crunch in business operations at his company Always-Behind-You Trailer Sales. He is desperate to locate a source of short-term financing or
The U.S. government is highly concerned that critical infrastructures in the United States are vulnerable to a cyber attack from criminal gangs, terrorists, or hostile governments. Assume you are
Make a list of valuable digital assets and describe why they have value. TRADING CENTER BENS WAS RELEASED AFTER THE MARKET CLOSE WATCH SORX.PE LIKE A BASE TRADING ALERT! TRE ATERT IN C Stonebridge
Are all monopolies illegal in the United States?
What does geographic area have to do with alleged violations of the antitrust laws? Can there be a monopoly in part of a city?
What is predatory pricing?
Why is it difficult to determine a company's average variable costs?
How is graphic analysis used to estimate cost behavior patterns?
What is the high-low method?
For what is regression analysis used?
For what is correlation analysis used?
What is \(r\) squared?
What is the coefficient of nondetermination?
Can regression/correlation analysis prove causation? If not, why not?
What role can accountants fill in a Federal False Claim Act suit?
A travel agency had its highest operating costs in June \((\$ 26,250)\), and its lowest operating costs in November \((\$ 21,750)\). The agency sold 1,500 tickets in June and 900 tickets in
The Shannon Valley manufacturing plant used regression-correlation to evaluate cost behavior. Using sample data for 20 weeks, the controller regressed prime production costs against the number of
An expert is analyzing the cost behavior patterns of the defendant in an antitrust dispute. The expert plans to use the information to prepare a damage estimate. The expert analyzed 30 months of cost
The Movietown Movie Theater Company operates movie theaters in 15 different towns throughout the Midwest, including Harborview, a small city of 250,000 people with a major state university. In
A whistle-blower in her allegations made in a qui tam suit, alleged that her former employer fired her because she told the company that it was "padding the bills" to the federal government for the
Jamestown Electric has a contract with an agency of the federal government to provide electrical power to the agency for a five-year period. The contract stipulates, in part, that the power will be
Up North Marina is and has been the only marina on Lake Woodward for the last 20 years. There have been numerous efforts to open other marinas during this time period. Each attempt, however, was
Visit the Internet page of the Justice Department's Antitrust Division and read the highlights. Summarize a recently released antitrust case against a defendant.
Access the Internal page of the Taxpayers Against Fraud (TAF), the Federal False Claims Legal Center. Describe the TAF's resources, especially the Qui Tam Attorney Network.
Using the Internet, read about the history of the Qui Tam provision on the Ashcraft \(\&\) Geral site,
What are the rules of evidence? Where are they found? Are expert opinions evidence?
Is taking judicial notice the same as a stipulation? Explain.
What is the difference between direct and circumstantial evidence? Which is better?
When may relevant evidence be inadmissible in a court of law?
What is a privileged communication?
Are these items admissible?a. Offer of compromiseb. Settlement offerc. Plea-bargainingd. Plea of nolo contenderee. Liability insurance
What is the attorney-client privilege?
What is the accountant-client privilege? When is it honored? \({ }^{137}\) T.W. Golden, S.L. Skalak, and M.M. Clayton, A Guide To Forensic Accounting Investigation (Hoboken, N.J.: John Wiley \& Sons,
Who is the holder of the privileged communication?
What are some exceptions to the privileged communication rule?
Under what circumstances are communications between taxpayers and tax practitioners protected by federal tax law?
What is the work product rule? Does it apply to accountants?
Can communications between an accountant and a client be protected under the attorneyclient privilege? Does the attorney work product rule apply to accountants?
What is the hearsay exception for business records?
What is the hearsay exception for commercial publications?
Can market reports be admitted under the hearsay evidence exception?
What is the hearsay exception for learned treatises?
What is the hearsay exception for public records?
Explain Fed. Rul. of Evidence 803 (18). Why must expert witnesses be careful here?
What is the authentication requirement?
How may computer records be authenticated?
What is demonstrative evidence? When can demonstrative evidence be introduced at trial?
What are some special evidence rules for criminal matters?
Define the residuum rule.
What is a chronological database?
What are fingerprints in the modern courtroom?
What are the AICPA's 2005 top 10 technology issues?
Explain electronic imaging.
What is drill-down functionality?
What is Benford's Law and when is the technique useful?
What are the odds that these numbers will be the first digit in a particular number?a. Oneb. Twoc. Fourd. Nine
What is Digital Analysis Tests and Statistics (DATAS) and when is this technique useful?
What is data warehousing/mining and how is it used?
Explain the difference between data extraction and data investigation. What are some tools for doing both?
How did Gene Morse find the WorldCom cooked books?
How must computer evidence be handled?
Can anything be done to retrieve lost e-mails and files?
What steps must be taken to preserve the integrity of evidence?
Using the Internet for definitions and illustrations, describe:a. Peripheral witnessb. Hostile witnessc. Percipient witness
Explore Internet examples of the laboratory analysis of physical and electronic evidence.
Find information about the Sahlen and Associates fraud on the Internet. What happened to the auditors in this case?
Go to the AICPA Internet site and list the current top 10 technology issues.
Prepare a paper on sophisticated courtrooms throughout the United States.
Showing 100 - 200
of 1257
1
2
3
4
5
6
7
8
9
10
11
12
13