法務(wù)會計

出版時間:2009-3  出版社:東北財經(jīng)大學(xué)出版社有限責(zé)任公司  作者:(美)霍普伍德 等著,張?zhí)K彤 改編  頁數(shù):417  
Tag標(biāo)簽:無  

前言

法務(wù)會計是一門涉及將會計資料用于法庭作證或辯論,以解決有關(guān)法律問題的科學(xué)。法務(wù)會計最初產(chǎn)生于20世紀(jì)40年代的美國。21世紀(jì)初以來,隨法務(wù)會計師在協(xié)助莢國政府調(diào)查"安然"、"世通"等大公司財務(wù)丑聞中獨特作用的發(fā)揮,法務(wù)會計受到美國政府的廣泛重視。法務(wù)會計師被人們稱為能夠看到數(shù)字背后"貓膩"的"警犬",贏得了人們的廣泛尊敬與贊許。近年來,法務(wù)會計在美國、英國、加拿大、澳大利亞等西方發(fā)達(dá)國家得到了快速的發(fā)展,法務(wù)會計被人們認(rèn)為是本世紀(jì)最為熱門的行業(yè)之一。目前,在包括"四人"在內(nèi)的100家頂尖的會計師事務(wù)所中,有超過75%的會計師事務(wù)所提供了法務(wù)會計的服務(wù)。  近年來,商業(yè)欺詐與職務(wù)犯罪已經(jīng)成為困擾各國經(jīng)濟(jì)的一大問題。盡管欺詐舞弊造成的損失尚無確切的統(tǒng)計數(shù)字,但是據(jù)美國注冊舞弊審核師協(xié)會2008年反映職務(wù)欺詐與濫用的wells報告,2007年,美國由于職務(wù)欺詐與濫用帶來的損失估計占到了國內(nèi)生產(chǎn)總值的7%,達(dá)到9940億美元。而更為重要和令人擔(dān)憂的是這些欺詐還在不斷蔓延和擴(kuò)大。在我國,反商業(yè)欺詐也受到了政府的高度重視。2005年3月20日,國務(wù)院辦公廳發(fā)布了《關(guān)于開展打擊商業(yè)欺詐專項行動的通知》,其中在"探索建立反商業(yè)欺詐長效機(jī)制"方面,提出了"加強(qiáng)綜合監(jiān)管"的任務(wù)。2007年7月8日,中國最高人民法院、最高人民檢察院聯(lián)合發(fā)布了《關(guān)于辦理受賄刑事案件適用法律若干問題的意見》,明確了"收受干股""期權(quán)尋租"等10種市場經(jīng)濟(jì)條件下的新類型受賄刑事案件法律適用問題的具體意見,進(jìn)一步彰顯了我國反腐敗反商業(yè)賄賂的決心與勇氣。而法務(wù)會計所提供的一套理論和技術(shù)方法,.正是對商業(yè)欺詐與舞弊進(jìn)行預(yù)防、識別、發(fā)現(xiàn)與調(diào)查所必不可少的手段。  近些年來,隨著涉及財務(wù)問題的貪污腐敗、商業(yè)賄賂、財務(wù)舞弊、職務(wù)犯罪、白領(lǐng)犯罪、洗黑錢等經(jīng)濟(jì)犯罪的大量出現(xiàn),我國對法務(wù)會計理論與實務(wù)的研究、法務(wù)會計的教育與培訓(xùn)、法務(wù)會計調(diào)查與訴訟支持業(yè)務(wù)的提供已經(jīng)有了越來越強(qiáng)烈的需求。據(jù)了解,我國的公安、檢察、法院、律師事務(wù)所、審計部門以及黨的紀(jì)律檢查部門對法務(wù)會計人才以及法務(wù)會計服務(wù)活動都有了強(qiáng)烈的需求,他們迫切需要既懂法,又掌握會計審計的技術(shù)方法,能查賬,會審計,知曉訴訟程序,掌握證據(jù)規(guī)則的復(fù)合型人才。為了滿足社會對法務(wù)會計人才的需求,我國的一些高等院校(包括中國政法大學(xué)、復(fù)旦大學(xué)、中國計量學(xué)院、云南財經(jīng)大學(xué)、渤海大學(xué)、浙江財經(jīng)學(xué)院等)相繼創(chuàng)辦了法務(wù)(司法)會計專業(yè)或面向在校會計學(xué)或法學(xué)專業(yè)的學(xué)生開設(shè)了法務(wù)會計課程,受到了廣泛的歡迎。目前,我國的法務(wù)會計教育尚在起步時期,相關(guān)的教學(xué)研究與教材建設(shè)也處于嘗試與摸索之中。我國的法務(wù)會計的教學(xué)與培訓(xùn)急需一批能夠與國際法務(wù)會計教育接軌,全面涵蓋法務(wù)會計學(xué)科所涉及的各個領(lǐng)域,簡潔實用。能夠滿足各教學(xué)環(huán)節(jié)需要的高水平的教科書。

內(nèi)容概要

本書具有如下顯著特點:    1.全面涵蓋了法務(wù)會計學(xué)科所涉及的各個相關(guān)領(lǐng)域的內(nèi)容。本書不像其他同類型書籍那樣主要討論審計與財務(wù)報表問題,而是將焦點集中在大量發(fā)生的民事或刑事會計舞弊及其相關(guān)活動上.從虛假的商業(yè)估價和雇主舞弊到信息安全和反恐。    2.針對非會計專業(yè)人士的需要.提供了會計信息系統(tǒng)和審計學(xué)的基礎(chǔ)性的知識內(nèi)容。    3.全面覆蓋了與會計相關(guān)的刑事司法系統(tǒng)的內(nèi)容,包括法證科學(xué)、有組織犯罪、訴訟支持和專家證人。

作者簡介

威廉姆·S.霍普伍德,威廉姆·S.霍普伍德是佛羅里達(dá)大西洋大學(xué)會計學(xué)教授,曾獲佛羅里達(dá)大學(xué)會計學(xué)碩士和博士學(xué)位。他曾先后擔(dān)任伊利諾伊大學(xué)厄巴納一香檳分校副教授、佛羅里達(dá)州立大學(xué)教授以及休斯敦大學(xué)阿瑟·安德森席位教授。他在The Accoun6ngReview、Journal ofAccounting Research和其他主要會計期刊上發(fā)表了大量文章。

書籍目錄

PART ONE ACCOUNTING AND LEGAL FUNDAMENTALS FOR FORENSIC ACCOUNTING   Chapter 1 Introduction to Forensic Accounting      What Is Forensic Accounting?      The Forensic Accountant        Knowledge and Skills of the Forensic Accountant      Opportunities in Forensic Accounting      Forensic Accounting Organizations      Organization of This Book      Summary     Glossary     Review Questions   Chapter 2 The Forensic Accounting Legal Environment       Roadmap to the Legal System      Civil and Criminal Procedures        The Legal System and Jurisdiction        Investigations and Trials      Common-Law Crimes        Larceny        Burglary        Conspiracy        Embezzlement        Fraud (False Pretenses)        Robbery        Extortion      Arson        Solicitation      Aiding and Abetting      Federal Financial Crimes: The United States Code and Acts of Congress        18 USC 96: Racketeer Influenced and Corrupt      Organizations Act (RICO)        15 USC 78dd: Foreign Corrupt Practices Act (FCPA) of 1977       The Sarbanes-Oxley (SOX) Act of 2002        Federal Computer Intrusions Laws      Summary      Glossary      Review Questions      Discussion Questions      Bill of Rights    Chapter 3 The Sarbanes-Oxley Act of 2002      Introduction      Overview, Enforcement, and Rules and    Regulations        The SEC and the Sarbanes-Oxley Act      The Sarbanes-Oxley Act        Title 1--Public Company Accounting Oversight Board      Title 2--Auditor Independence        Title 3--Corporate Responsibility        Title 4--Enhanced Financial Disclosures        Title 5--Analyst Conflicts of lnterest        Titles 6 and 7--Commission Resources and duthority and Studies and Reports        Title 8--Corporate and Criminal Fraud Accountability        Title 9--White-Collar Crime Penalty  Enhancements        Title 10--Corporate Tax Returns        Title 11--Corporate Fraud and Accountability SOX Rules, Regulations, and Standards      Sarbanes-Oxley Compliance        The Federal Criminal Sentencing Guidelines        The COSO Reports        The COBIT Standard        ISO 27002        Comparison of the Various Models for Control Practices      SOX 404 Compliance with Small Public    Companies        Special Characteristics of Small Public Companies        How Small Public Companies Can Compensate for Their Size       ……PART WTO FORENSIC ACCOUNTING TOOLSAND TECHNIQUES  Chapter4 Forensic Science and Information  Chapter5 Information Security  Chapter6 Forensic Auditing and InvestigationPART THREE FORENSIC ACCOUNTING APPLICATIONS  Chapter7 Financial Statement Fraud  Chapter8 Employee Vendor and Other Fraud against the Organization  Chapter9 Tax fraud  Chapter10 Bankruptcy Divorce and Identity Theft    Chapter11 Organized Crime and Terrorism Investigations  Chapter12 Business Valuation  Chapter13 Dispute Resolution and Litigation Services

章節(jié)摘錄

Great care and discipline must be exercised,for any mistakes are likely to lead to irre- versible loss of evidence. Step 1:Size Up the Situation In sizing up the situation.ask questions such as these:What type of incident is being inves. tigated?who are the likely perpetrators.and how sophisticated are they?which computers were likely used or affected?When did the incident probably happen?The answers to each of these questions should be recorded in the forensic professional's notes.   How the questions are answered will affect how the investigator proceeds.The serious- ness of the matter and the sophistication of the perpetrator(s)will have the largest impact on the approach taken.If the matter is already known to be serious、consideration should be given to immediately restricting access to the suspected computers and relevant areas, and the issue should be discussed、Uith law enforcement authorities.who could bring in criminalists to process the crime scene.The forensic professional should never contami- nate a likely police crime scene.Of course.the forensic accountant or computer forensic specialist could already be a member of law enforcement,in which case the investigation will proceed after processing the crime scene if necessary.   The degree of the perpetrator's sophistication is important because it suggests possible countermeasures that she could have put in place.Some possible countermeasures are physical booby traps inside the computer,software.based self-destruct systems,and encryption.The more sophisticated the perpetrators,the more likely it is that these coun- termeasures are in place.The likelihood of countermeasures affects the degree of sophisti. cation applied to the investigation.As a general rule,the most sophisticated available investigatory methods should be used unless there is good reason to believe that unsophis. ticated perpetrators are involved. Step 2:Log Every Detail The forensic professional should keep an accurate log of every step followed.It should contain precise details,including names,dates,times,and computer serial numbers. Step 3:Conduct the Initial Survey In conducting the initial survey,the forensic professional must immediately secure the site. including any offices and computers that could be relevant to the investigation.It is als0 necessary to secure any computer servers,video security camera recordings,computerized phone records,centralized e-mail databases,relevant paper files,and so on.The objective in securing the site is to restrict access to it to those participating in the investigation;it is especially important to deny access to possible suspects.   Any relevant computers and the immediate sites around them should be photographed. Items of possible interest,such as sticky notes containing passwords,computer disks and so on,should be photographed individually with number cards placed next to them.Eacb item should logged in the forensic specialist's notebook with the date.time,and item num- ber.In situations judged to be serious enough,all investigators should wear plastic gloves during the on.site investigation to avoid damaging possible evidence.   Items collected should be placed into tamper-proof evidence bags.These bags contm various features including serialized control numbers.removable receipts With control numbers,tamper-proof seals,and chain-of-custody listings. Step 4:Assess the Possibility ofOngoing UndesirableActivity If at the time of the investigation the computer could stiu be involved in some crime 0t other actMtV of interest.

圖書封面

圖書標(biāo)簽Tags

評論、評分、閱讀與下載


    法務(wù)會計 PDF格式下載


用戶評論 (總計8條)

 
 

  •   快遞人員現(xiàn)在都不簽字確認(rèn)了,應(yīng)該是因為貨到付款的原因吧,書慢慢適應(yīng),全英文的,有挑戰(zhàn)
  •   還沒看,但是正品
  •   幫老板買的,挺滿意
  •   不是什么雙語的,是全英文的
  •   不錯,就是看起來有點吃力
  •   當(dāng)時沒看那么多,哪知道全是英文的,所以浪費我的郵費,服務(wù)態(tài)度很好,
  •   有兩章,編者刪掉了。不過,閱讀起來,并不影響對于法務(wù)會計的理解。
  •   講的很詳細(xì),是一本好教材
 

250萬本中文圖書簡介、評論、評分,PDF格式免費下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號-7