Plutonium and internet start-up company that has been founded at the outset of the technology boom was developing the technological devices necessary to support the swiftly expanding number of users. Plutonium bought an expensive and complex invoicing system to automate the billing of sites accounts using a credit card to integrate the system. Jonathan, the supervisor of operations department, was given the fake credit card to assist fix corrupted accounts made by the kick off and integration.
Chris a staff of Plutonium, who very knowledgeable and trusted was given the fake credit card amount.
Chris was using the credit-based card to access websites that have pirated software and music. After an FBI investigation, Frank was aware and put into probation. Jonathan was asked to write a warning letter to Chris. Several months later, Jonathan noticed a big change in Chris’s behavior. He was making uncommon purchases, just like Palm Pilots, MP3 Players. The initially element of the fraud triangle is pressure. Every fraud perpetrator confronts some kind of identified pressure.
Many pressures require a financial will need, although nonfinancial pressures, including the need to record financial effects better than actual performance, frustration with operate, or even a problem to the fatigue system, can also motivate fraud. Financial challenges often motivate misappropriation scams by personnel. Common demands such as living beyond a person’s means, avarice, high financial debt, unrecognized performance and limited pay may lead employees to scams. Chris had several perceived pressures to commit scams.
He contains a family to back up and this individual earned little wages compared to other who may have his expertise. Chris could have a student loan and other debt he must pay in addition to caring for his relatives. That could have got caused him a lot of pressure. The second element of the fraud triangle is identified opportunity. “The opportunity to make and cover up fraud if a company features unclear procedures and methods, fails to train and tension corporate credibility, and does not prosecute those who perpetrate fraudulence. (Romney 129).
The opportunity for fraud is created when employees receive access to data and beneficial information. In the case of Chris, he had the opportunity to dedicate fraud because he has the expertise in technology. He provides the phony mastercard given to him by his manager and he was able to use that without the familiarity with his director or co-office workers. The third component of fraud triangular is justification. Rationalization enables perpetrators to justify their particular illegal tendencies. For example , a fraudster can easily rationalize by saying, “I only got what they owed me. And also the rules tend not to apply to me.
Perpetrators justify that they are not being dishonest, that honesty is usually not required of them, or that they can value the actual take a lot more than honesty and integrity. “Some perpetrators justify that they are certainly not hurting a true person, yet a faceless and mysterious computer system or perhaps an corriente company that wont miss the bucks. (Romney 130). Christ could have thought that all he was underpaid and by applying these bank cards he was certainly not hurting any person. He might also have used deficiency of underpayment while justification when you use the company’s credit cards for personal gain.
one particular