This case series focuses on a fictitious company, Fairview Inc., a software-as-a-service company, that utilizes a travel expense reimbursement process for its sales and information technology employees who travel to customer locations. The Audit Committee would like to change its audit approach of t...
This case series focuses on a fictitious company, Fairview Inc., a software-as-a-service company, that utilizes a travel expense reimbursement process for its sales and information technology employees who travel to customer locations. The Audit Committee would like to change its audit approach of t...
This case series focuses on a fictitious company, Fairview Inc., a software-as-a-service company, that utilizes a travel expense reimbursement process for its sales and information technology employees who travel to customer locations. The Audit Committee would like to change its audit approach of t...
This case series focuses on a fictitious company, Fairview Inc., a software-as-a-service company, that utilizes a travel expense reimbursement process for its sales and information technology employees who travel to customer locations. The Audit Committee would like to change its audit approach of t...
This is a five-part case in which students are asked to assume the role of an auditor for Digital Assets Inc., a company that allows its customers to pay invoices in bitcoin, a common cryptocurrency that makes up approximately 50% of the market cap of all cryptocurrencies (as of May 2021).
EY has...
This case asks students to consider cybersecurity risks and their potential impact on the financial statements and to learn more about best practices for password policies to help mitigate cybersecurity threats. Students are asked to perform manual audit procedures on a sample of user names and pass...
This case asks students perform select cybersecurity audit procedures on actual Enron Corporation emails (approximately 27,000), preserved by federal investigators, to look for employee violations of hypothetical company policies. The case is offered in Alteryx, which is a powerful tool for both ETL...
This case is designed to have students perform a cybersecurity penetration test of password strengths at Blue Yarrow Unicorns. Students are provided with over 5,100 usernames, hashed passwords and job unit descriptors of Blue Yarrow's employees. Using a dictionary of nearly 2 million plain text comp...
This case asks students to perform descriptive and text analyses on purchasing card data for BioPhirma, an innovative, global health care leader, to assess compliance with policies and to help investigate a whistle-blower tip about possible fraud being committed through purchasing card transactions....
For the purposes of this case, an organization has been hacked and received an email containing a riddle that needs to be solved within the hour. If the organization fails to solve the riddle, the hacker is threatening to release all of the organization’s sales data. The hacker typically enters syst...
This case asks students to research emerging data and technology topics to gain understanding of the topics and to determine any potential impact on the accounting profession. Students document and present their research and are graded by their peers using a provided rubric. A list of possible topic...
Students will work with a structured data set of several thousand cash, sales, accounts receivable and cost of goods sold subledger transactions for the first two years of operations of TechWear, a start-up company that manufactures and sells upper-end, high-tech sportswear. Students will gain insig...