Abstract: | This two‐part case allows for maximum student engagement through preparation, in‐class discussion, and through a Part B case that is part of the Teaching Note. Through this case, students work to identify possible fraud schemes, plan an investigation, and perform horizontal analysis calculations. Students will learn about the concept of ethical hacking, red flag identification, internal control weaknesses, and investigation considerations for fraud schemes. Further, in‐class planning for next steps and investigation can occur, providing an opportunity for group work and in‐depth learning. This case offers flexibility for instructors in that it can be covered over one class or multiple classes, or can be assigned as an independent or group assignment. This teaching note provides an overview of the case along with guidance for teaching this case. |