John Martin, a highly skilled computer technician with a masters degree in computer science took a low

Question:

John Martin, a highly skilled computer technician with a masters degree in computer science took a low profile evening job as a janitor at Kent Manufacturing Company. Since the position was low level no security clearance or background check was necessary. While working at nights, John snooped through offices for confidential information regarding system operations, internal controls, and the financial thresholds for transaction that would trigger special reviews. He observed employees who were working late type in their passwords and managed to install a Trojan Horse virus onto the system to capture the IDs and passwords of other employees. During the course of several weeks John obtained the necessary IDs and passwords to set himself up in the system as a supplier, a customer, and systems administrator, which gave him access to most of the accounting system’s functions.
As a customer, John ordered inventory which was shipped to a rented building and later sold. As system administrator he approved his credit sales orders and falsified his customer payment records to make it appear that the goods had been paid for. He also generated purchase orders to himself and created false receiving reports and supplier invoices as part of a vendor fraud scheme. He was thus able to fool the system into setting up accounts payable to himself and writing checks in payment of inventory items that the company never received.
John was careful to ensure that all his transaction fell below the financial thresholds that triggered special reviews. Nevertheless, his fraud schemes cost Kent Manufacturing approximately $100,000 per month and went undetected for 1 ½ years. John, however, became over confident and careless in his life style. Working late one evening, the internal auditor observed John arriving for work in an expensive sports car that seemed out of place for a poorly paid janitor. The auditor initiated an investigation that exposed john’s activities. He was arrested and charged with computer fraud.
Required:
a. What controls weaknesses allowed John to perpetrate these frauds?
b. Explain the controls that should be in places to reduce the risk of fraud.
Accounts Payable
Accounts payable (AP) are bills to be paid as part of the normal course of business.This is a standard accounting term, one of the most common liabilities, which normally appears in the balance sheet listing of liabilities. Businesses receive...
Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question
Question Posted: