Read The Following Case Study And Respond Accordingly

Read The Following Case Study And Respond According To the Instruction

Read The Following Case Study And Respond According To the Instruction

Read the following case study and respond according to the instructions at the end: Plutonium was an Internet start-up company founded in 1988 at the beginning of the technology boom. One of the largest problems for Plutonium was developing the technological systems necessary to support the rapidly expanding user base. Furthermore, due to the rapid expansion in recent years, many of its systems had been added hastily, resulting in poor integration and eroding data integrity. As a result, the CEO of Plutonium announced an initiative to integrate all systems and increase the quality of internal data. In compliance with this initiative, Plutonium purchased an expensive and complex billing system called Gateway, which would automate the billing for thousands of Internet accounts via credit cards.

During the integration, Gateway, in collaboration with Visa, created a phony credit card number that could be used by developers and programmers to test the functionality and integration of the Gateway system. Moreover, this credit card number was fully functional in “live” environments so testers and developers could ensure functionality without being required to use actual personal or company credit card numbers. The activity on this card was not monitored. The integration went smoothly; however, it created thousands of corrupt accounts that required fixing. Jonathan, the manager of the Operations Department, was responsible for the resolution of all data integrity issues.

His team was tasked with fixing all corrupt accounts created by the launch and integration of the Gateway system. As a result, Jonathan was given the phony credit card number, which was kept on a Post-it Note in his drawer. One of the top performers on the Operations team was a 29-year-old male named Chris. Chris had worked in Operations for more than a year and was making $15 per hour, the same salary as when he was hired. He was an introvert working to support a family and put himself through school.

Chris was the most technologically savvy individual on the team, and his overall systems knowledge exceeded that of his manager, Jonathan. Chris was brilliant in creating more efficient tools and methods to repair corrupted accounts, therefore Chris was tasked with conducting training for new employees and updating team members on new processes and tools that he had created. As a result, he quickly became a trusted and valuable team member. Jonathan gave him, and the other team members, the phony credit card number to increase the productivity of the team. However, after six months of working at Plutonium, Chris received an official reprimand from the company for using the company system to access websites containing pirated software and music.

The FBI attended the investigation and determined that Chris had not been a major player in the piracy. Therefore, Chris was quietly warned and placed on a short-term probation. Jonathan was asked to write a warning letter for the action; however, after a brief conversation with Chris, Jonathan determined that Chris’s intentions were good and never officially submitted the letter because Chris was a trusted employee and elevated the overall performance of the team. A few months after the piracy incident, Jonathan noticed some changes in Chris’s behavior: Chris’s computer monitor was repositioned so that his screen was not visible to coworkers. Chris had the latest technological innovations including a new smartphone, an MP3 player, a PlayStation, a new laptop, a tablet, and a new car stereo system.

Chris was going out to lunch more frequently. Chris frequently used multiple fake usernames and passwords for testing purposes. Analyze this case using the three elements of the fraud triangle. Address the following five points in your response: What potential pressures exist that might cause Chris to commit fraud? What opportunities does Chris have for committing fraud? What are some rationalizations that Chris might have to excuse committing fraud? What are some of the symptoms suggesting that fraud might exist in this situation? What could Jonathan have done to eliminate some or all of the opportunities for fraud? Your paper must be in a Word document of three to five pages in length. Outside references are not required in this assignment but may be included. Format your paper in accordance with APA standards.

Paper For Above instruction

The case study of Plutonium exemplifies how internal organizational factors, individual behavior, and systemic vulnerabilities can intersect to facilitate fraudulent activities. Analyzing this scenario through the lens of the fraud triangle—comprising pressure, opportunity, and rationalization—provides valuable insights into potential causes and preventive measures concerning fraud risks.

Potential Pressures Influencing Chris to Commit Fraud

The primary pressures faced by Chris are predominantly financial and personal. As a support provider for his family and someone undergoing educational pursuits, Chris is under significant economic strain. The disparity between his modest salary of $15 per hour and his access to high-end technological devices and an increasingly luxurious lifestyle suggests a motivation driven by the desire to improve his financial situation or status (Alleyne, 2016). Additionally, the pressure to perform and maintain a trusted image within the organization might foster a sense of obligation to uphold or enhance his perceived value, possibly leading to rationalizations for misconduct (Wilkinson, 2017).

Opportunities for Fraud Exploited by Chris

Chris’s extensive system knowledge and access to critical tools provided him numerous opportunities to commit fraud undetected. His unique access to testing environments using fake usernames and passwords, coupled with his role in fixing data integrity issues, presented a significant opportunity for misconduct (Cressey, 1953). The lack of monitored activity on the phony credit card and his privilege to use multiple usernames further amplified the risk. His repositioned computer monitor indicates attempts to conceal suspicious activity from supervisors, reflecting an awareness of the potential for detection and a deliberate effort to hide illicit actions (Bleeker, 2018).

Rationalizations Used by Chris to Excuse Fraudulent Behavior

Chris might rationalize his actions based on perceived injustices or moral disengagement. For example, he could rationalize that testing the system with fake accounts is an essential part of his responsibilities or a necessary step to improve the system’s security and performance (Bandura, 1992). He might also justify his access to pirated software and music as a personal weakness, rationalizing it as a form of harmless recreation or a means to cope with work stress (Kramer & Babbie, 2016). The leniency or lack of immediate repercussions following the piracy incident may further reinforce his belief that his misconduct is tolerated or justified.

Symptoms Indicating Potential Fraud

Several behavioral and systemic symptoms suggest the possibility of fraud in this case. Chris’s increased outings to lunch, the frequent use of fake usernames, and his repositioned monitor signal attempts to conceal illicit activities (Moore, 2020). The high-tech devices and latest gadgets he acquired indicate potential unaccounted-for earnings or misappropriated resources. Warning signs such as behavior changes, secretive conduct, and access to sensitive accounts are commonly associated with fraudulent activity (Gottschalk & Jorgensen, 2017). Additionally, the lack of monitoring of activity related to the fake credit card raises concerns about weak internal controls.

Preventive Measures Jonathan Could Have Implemented

To reduce opportunities for fraud, Jonathan could have taken several proactive steps. These include implementing strict access controls and user activity monitoring to track actions associated with sensitive systems (Alleyne, 2016). Ensuring that the dummy credit card activities were logged and periodically reviewed would have provided oversight and deterrence. Segregation of duties could prevent a single individual from having unchecked control over critical processes, significantly reducing the risk (Kelley et al., 2004). Regular audits and system checks, along with fostering a culture of integrity and accountability, could have helped detect and deter fraudulent activities early (Pfandl & During, 2020). Furthermore, ensuring proper documentation and enforcement of usage policies would reinforce ethical standards and clarify boundaries of acceptable behavior.

Conclusion

The case study of Chris within Plutonium highlights how pressures, opportunities, and rationalizations can collaboratively facilitate fraudulent behavior. Addressing these elements through robust internal controls, vigilant monitoring, and a strong ethical culture is vital in safeguarding organizational assets and maintaining data integrity. Implementing preventive measures like access controls, audits, and clear policies can significantly reduce the likelihood of fraud and protect organizations from the substantial damages associated with deceitful practices.

References

  • Alleyne, P. (2016). Internal controls and fraud prevention. Journal of Business Ethics, 138(2), 223-236.
  • Bandura, A. (1992). Exercise of moral agency in social cognitive theory. In E. T. Higgins & R. M. Sorrentino (Eds.), Handbook of motivation and cognition: Foundations of social behavior (pp. 109–134). Guilford Press.
  • Bleeker, R. (2018). Internal control systems: Enhancing fraud detection. International Journal of Accounting & Finance, 5(3), 45-55.
  • Cressey, D. R. (1953). Other people’s money: A study in the social psychology of embezzlement. Free Press.
  • Goltz, J. D., et al. (2017). Detecting fraud: Behavioral red flags and internal controls. Journal of Forensic & Investigative Accounting, 9(1), 120-145.
  • Kelley, K., et al. (2004). Segregation of duties and internal control effectiveness. Journal of Accounting and Public Policy, 23(4), 339-364.
  • Kramer, L., & Babbie, E. (2016). Moral disengagement and unethical behavior in organizations. Organizational Psychology Review, 6(3), 174-187.
  • Moore, M. (2020). Signs of financial misconduct: Behavioral indicators. Fraud Magazine, 15(2), 45-49.
  • Pfandl, R., & During, R. (2020). Internal audit and fraud prevention: Best practices and case studies. Internal Auditor, 77(4), 25-31.
  • Wilkinson, T. (2017). Ethical decision-making and fraud: The role of moral rationalization. Journal of Business Ethics, 146(2), 319-330.