Fraud Examination (5th Edition) - Chapter 7-Solved 100% Correct
The fraud triangle plus inquiry paradigm is an effective way to understand the various types of investigative methods. - ANSWER-True One advantage of using a vulnerability chart is that it forces investigators to consider all aspects of a fraud. - ANSWER-True Electronic surveillance if often of limited value in the investigation of employee fraud because of concerns regarding employees' privacy rights - ANSWER-True Surveillance is a theft investigation technique that relies on the examination of documents - ANSWER-False. Surveillance is a technique for investigating theft that relies on watching and recording activities of individuals, not studying documents Mobile observation is usually much more risky than stationary surveillance - ANSWER-True During invigilation, no controls are imposed on any activity - ANSWER-False. During invigilation, strict controls are imposed on activities being studied. Surveillance logs should always be drafted before an investigation begins - ANSWER-False. Not only are undercover operations both legal and valid, but they are also inexpensive - ANSWER-False. Undercover operations are extremely expensive. Investigation of fraud should only take place when predication has first been established. - ANSWER-True If possible, when using theft act investigation methods, interviewing the prime suspects should happen last - ANSWER-True
Written for
- Institution
- Fraud
- Course
- Fraud
Document information
- Uploaded on
- October 26, 2023
- Number of pages
- 2
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- fraud examination
-
fraud examination 5th edition chapter 7 solved
Also available in package deal