ABSTRACT

After examining how financial statement fraud is perpetrated and the Red Flags most frequently associated with it, we now turn to examining a high-risk area: procurement. This chapter introduces the reader to the nuts and bolts of the procurement process, including its vulnerabilities and controls.