StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biggest threats to the Assets and Inventory of Companies - Essay Example

Cite this document
Summary
It is important for corporations to have security measures in place to protect themselves from theft and fraud. Companies often invest millions of dollars in security measures to protect themselves from criminals. The problem is that often the biggest threats to the assets and inventory of companies comes from within…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Biggest threats to the Assets and Inventory of Companies
Read Text Preview

Extract of sample "Biggest threats to the Assets and Inventory of Companies"

It is important for corporations to have security measures in place to protect themselves from theft and fraud. Companies often invest millions of dollars in security measures to protect themselves from criminals. The problem is that often the biggest threats to the assets and inventory of companies comes from within. It is estimated that in the United States a third of its employees have stolen from their employers (Wells, 2001). The asset that is most targeted by employees is cash due to the fact that cash is the most valuable and liquid asset a person can get their hands on.

It is imperative for companies to have accounting control mechanisms in place to prevent employee theft. A good mechanism that can be used to prevent theft is the fraud tree. The fraud tree can be described as asset misappropriation schemes that are used by employees to target the assets of a company. The two major asset types included in the fraud tree are cash and inventory. Nearly 90% of the frauds occurring in the corporate world are associated with the cash account of the company (Wells, 2001).

The major types of cash misappropriation schemes are larceny, fraudulent disbursements and skimming. In term of inventory and assets frauds the most commonly used schemes are misuse and larceny. In the article Enemies Within a fraud scheme example that was described was an account receivable employee that stole over $200,000 in cash from a company. The reason that the accounting clerk was able to steal money was because his job function included collection of cash and accounting receivable posting.

This fraud could have easily been prevented by the accounting department of the company by creating a clear separation of duties. The account receivable clerk should have never been allowed to deal with any actual cash transactions. A different employee should have been responsible for the collection of cash payments. Five different subcategories of the fraudulent disbursement branch are billing, payroll, expense disbursement, check tampering, and register disbursement schemes. A billing scheme can be defined as a fraud that attacks the payment system of the firm (Worrels, 2010).

The billing scheme involves creating a false entity to which the employee stealing the money sends the payment. The scheme is hard to detect at times because the money being misappropriate seems like a legitimate business expense. The second step of the scheme is creating a false invoice. The last step of scheme is to obtain approval for the payment of the invoice. The mastermind for these types is typically a person working within the accounting department or person in a position of power such as a manager.

A second common fraudulent disbursement scheme is a payroll scheme. A payroll scheme occurs when a company pays for an employee that does not exist. The employee that does not exist is often referred to as a ghost employee. Companies that are involved in money laundering often use this scheme to create false expenses and the fake payroll is cash out by the person running the scheme. These schemes often occur more often than people think. I once had a family member that was victim of such a scheme.

He was unemployed and went to the unemployment office to ask for benefits after his benefits ran out. When he went to the office the system reflected that he had been working for two years consecutively at a company he worked about 2 years before. The office started an investigation which revealed that the company was running a payroll scheme using employees that had previously worked for the company. A third type of fraudulent disbursement scheme is the expense reimbursement scheme. The Association of Certified Fraud Examiners (ACFE) defines an expense reimbursement scheme as any scheme in which an employee makes a claim for reimbursement of fictitious or inflated business expenses (Theiia, 2011).

The employee can apply the scheme by asking for reimbursement of expenses that never occurred or which they used for personal use instead of official business. The fourth type of fraudulent disbursement scheme is register reimbursement. This is the oldest trick in the book which often occurs in businesses that make lots of cash transactions such as bars. The bartender when the boss is not looking dips his hands into the cash register and takes a personal tip from the owner’s money. This scheme is bad for business because the employee that enters into this type of behavior often does it on a recurrent basis.

The last type of fraudulent disbursement scheme is check tampering. This scheme involves a person in a high position such as the owner or manager making a check to in their name for personal use and claiming in the accounting books that the check was made for business expenses. The scheme can sometimes be carried out by a low level employee as well that have access to the accounting system of the company. References Theiia.org (2011). Disbursement Schemes Made Easy. The Institute of Internal Auditors.

Retrieved July 7, 2011 from http://www.theiia.org/intAuditor/fraud-findings/2009/disbursement-schemes-made-easy/ Wells, J. (2001). Enemies Within. Journal of Accountancy. Retrieved July 7, 2011 from http://www.journalofaccountancy.com/Issues/2001/Dec/EnemiesWithin Worrels.net (2010). Billing Schemes – Cash Fraud. Retrieved July 7, 2011 from http://www.worrells.net.au/Fraud%20Awareness/cash_billing_schemes.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biggest threats to the Assets and Inventory of Companies Essay”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1427269-accpaper
(Biggest Threats to the Assets and Inventory of Companies Essay)
https://studentshare.org/finance-accounting/1427269-accpaper.
“Biggest Threats to the Assets and Inventory of Companies Essay”, n.d. https://studentshare.org/finance-accounting/1427269-accpaper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biggest threats to the Assets and Inventory of Companies

Financial Statement Analysis of British Airways

The debt-to-assets and debt-to-equity ratios... The company enjoys higher liquidity enhancing the ability of the air carrier to pay off its immediate obligation by its current assets.... Another ratio is the turnover ratio which shows to what the extent the company uses its assets to produce revenue....
12 Pages (3000 words) Essay

Financial Performance of BAE Systems

It was established in 1999 upon the merger of Marconi Electronic Systems and British Aerospace to be the third largest global defense company. Cobham is better than BAE in using their assets to generate sales.... The threats of terrorism have significantly boost defense systems spending especially for countries like United States....
9 Pages (2250 words) Research Paper

Investment on BHP

This implies that the cash flow was in proportion to the assets of the company which tells us that the share price increase in the market can be justified.... The stable cash flow from the years also tells us that the current liabilities are in control, which is within the limits of the company's assets and cash flows.... Renowned for its continuous developing structure and operations, is known as one of the Australia's oldest and biggest companies and was listed NYSE and LSE....
13 Pages (3250 words) Essay

Foreign Exchange Market Analysis

Accessing all information of the company involves checking all the dimensions of the business such as financial performance, legal and tax compliance, contracts, property and rights and all assets and liabilities within a specified period of time (Miller, 1992).... Consider the possibility of transferring losses from the old company to the newly acquired business, the practice of moving the business assets allows the newly acquired management to differentiate assets that they can develop from long term and short term losses....
6 Pages (1500 words) Essay

Competitive Position and Performance of Soft Drinks Industry

The overall analysis of the soft drink industry has examined the competitive performance of three major organisations such as Nichols Plc, A.... G.... Barr Plc… The study has demonstrated the effect of external environmental factors on the performance of organisations in the UK soft drink market....
29 Pages (7250 words) Essay

British Airways in Harvard Style

Another ratio is the turnover ratio which shows to what extent the company uses its assets to produce revenue.... This paper "British Airways in Harvard Style” assesses the financial performance of British Airways in 2006 by looking at the firm's profitability, leverage, efficiency, liquidity, and investor ratios....
12 Pages (3000 words) Assignment

Arguments for Accounting Recognition of Intangible Assets

It has become conventional knowledge, firstly: that in present business realities point to the fact that companies rely heavily on intangibles to drive value creation; and secondly, that there is progressive reliance on measures other than net income in determining performance output of a business.... The paper "Arguments for Accounting Recognition of Intangible assets" discusses that with the view towards simplicity, feasibility, and propriety, Garten's insight appears to address squarely the needs of stakeholders....
9 Pages (2250 words) Research Paper

Strategic Business Analysis on Google

The former part takes care of the strengths and weaknesses of the firm through an analysis of its resources and competitive capabilities; whereas the latter one examines the opportunities and threats that the firm is prone to, using tools and techniques of environmental and competitive analysis....
34 Pages (8500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us