Professional Documents
Culture Documents
m3 Ethics, Fraud & Internal Control
m3 Ethics, Fraud & Internal Control
z
Ethics, Fraud,
and Internal
Control
James A. Hall, Accounting Information Systems, 10th Edition. © 2019
Cengage. All Rights Reserved. May not be scanned, copied or duplicated,
or posted to a publicly accessible website, in whole or in part.
2
z
Learning Objectives
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
3
z
Ethical Issues in Business
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
4
z
BUSINESS ETHICS
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
5
z
Ethical Issues in Business
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
6
z
COMPUTER ETHICS
▪ Computer ethics is the analysis of the nature and social
impact of computer technology and the corresponding
formulation and justification of policies for the ethical use of
such technology. This includes details about software as well
as hardware and concerns about networks connecting
computers as well as computers themselves.
▪ Privacy
• Privacy is full control of what and how much information about an
individual is available to others and to whom it is available.
z
COMPUTER ETHICS (continued)
▪ Ownership of Property
▪ Equity in Access
▪ Environmental Issues
▪ Artificial Intelligence
▪ Misuse of Computers
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
8
z
SARBANES-OXLEY ACT AND
ETHICAL ISSUES
▪ Sarbanes-Oxley Act (SOX) is the most significant federal
securities law, with provisions designed to deal with specific
problems relating to capital markets, corporate governance, and
the auditing profession.
• CONFLICTS OF INTEREST
• LEGAL COMPLIANCE
• ACCOUNTABILITY
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
9
z
Fraud and Accountants
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
10
z
DEFINITIONS OF FRAUD
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
11
z
THE FRAUD TRIANGLE (J. Hall)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
12
z
Fraud Triangle
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
13
z
The Fraud Triangle (ACFE)
▪ The fraud triangle is a model for
explaining the factors that
cause someone to commit
occupational fraud. It consists
of three components which,
together, lead to fraudulent
behavior:
▪ 1. Perceived unshareable
financial need
▪ 2. Perceived opportunity
▪ 3. Rationalization
https://www.acfe.com/fraud-triangle.aspx
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
14
z
The Fraud Diamond (Wolfe & Hermanson)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
15
z
FINANCIAL LOSSES FROM
FRAUD
▪ The actual cost of fraud is, however, difficult to quantify for a
number of reasons:
▪ Not all fraud is detected.
▪ Of that detected, not all is reported.
▪ In many fraud cases, incomplete information is gathered.
▪ Information is not properly distributed to management or law
enforcement authorities.
▪ Too often, business organizations decide to take no civil or criminal
action against the perpetrator(s) of fraud.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
16
z
Distribution of Losses
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
17
z
THE PERPETRATORS OF
FRAUDS
▪ Fraud Losses by Position within the Organization
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
18
z
Losses from Fraud by Position
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
19
z
Losses from Fraud by Collusion
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
20
z
Losses from Fraud by Gender
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
21
z
THE PERPETRATORS OF
FRAUDS (continued)
▪ Conclusions to Be Drawn
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
22
z
Losses from Fraud by Age
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
23
z
Losses from Fraud by Education
Level
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
24
z
FRAUD SCHEMES
▪ Fraudulent Statements
▪ Fraudulent statements are statements associated with
management fraud. In this class of fraud scheme, the financial
statement misrepresentation must itself bring direct or indirect
financial benefit to the perpetrator.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
25
z
FRAUD SCHEMES (continued)
▪ Corruption
▪ Corruption involves an executive, a manager, or an employee
of the organization in collusion with an outsider.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
26
z
FRAUD SCHEMES (continued)
▪ Corruption (continued)
▪ Asset Misappropriation
▪ Skimming
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
27
z
Losses from Fraud by Scheme
Type
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
28
z
Losses from Asset Misappropriation
Schemes
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
29
z
FRAUD SCHEMES (continued)
▪ Cash Larceny
▪ Cash larceny is theft of cash receipts from an organization after
those receipts have been recorded in the organization’s books
and records.
▪ Billing Schemes
▪ Billing schemes, also known as vendor fraud, are schemes
under which an employee causes the employer to issue a
payment to a false supplier or vendor by submitting invoices for
fictitious goods/services, inflated invoices, or invoices for
personal purchases.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
30
z
FRAUD SCHEMES (continued)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
31
z
FRAUD SCHEMES (continued)
▪ Check Tampering
▪ Payroll Fraud
▪ Expense Reimbursements
▪ Expense reimbursement fraud involves claiming
reimbursement of fictitious or inflated business expenses.
▪ Thefts of Cash
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
32
z
FRAUD SCHEMES (continued)
▪ Noncash Misappropriations
▪ Noncash fraud is the theft or misuse of non-cash assets (e.g.,
inventory, confidential information).
▪ Computer Fraud
▪ Computer fraud involves theft, misuse, or misappropriation of
assets by altering computer-readable records and files, or by
altering the logic of computer software; the illegal use of
computer-readable information; or the intentional destruction of
computer software or hardware.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
33
(ACFE).
THE FRAUD TREE.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
34
z
Internal Control Concepts and
Techniques
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
35
z
Internal Control Concepts and
Techniques (continued)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
36
z
Internal Control Shield
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
37
z
Preventive, Detective, and
Corrective Controls
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
38
z
Internal Control Concepts and
Techniques (continued)
▪ The Preventive-Detective-Corrective Internal Control Model
(continued)
▪ Corrective controls are actions taken to reverse the effects of errors
detected. Statement on Auditing Standards (SAS) No. 109 is the
current authoritative document for specifying internal control objectives
and techniques. It is based on the COSO framework.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
39
z
COSO INTERNAL CONTROL
FRAMEWORK
▪ Risk Assessment
▪ Risk assessment is the identification, analysis, and
management of risks relevant to financial reporting.
▪ Monitoring
• Monitoring is the process by which the quality of internal control
design and operation can be assessed.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
40
z
COSO INTERNAL CONTROL
FRAMEWORK (continued)
▪ Control Activities
▪ Control activities are the policies and procedures to ensure that
appropriate actions are taken to deal with the organization’s risks.
▪ PHYSICAL CONTROLS
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
41
z
COSO INTERNAL CONTROL
FRAMEWORK (continued)
▪ Control Activities (continued)
▪ Segregation of duties is the separation of employee duties to
minimize incompatible functions.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
42
z
Segregation of Duties Objectives
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
43
z
IT APPLICATION CONTROLS
▪ Input Controls
▪ Input controls are programmed procedures, often called edits, that
perform tests on transaction data to ensure that they are free from
errors.
▪ CHECK DIGIT: Transcription errors are the type of errors that can
corrupt a data code and cause processing errors. Transposition errors
are errors that occur when digits are transposed. A check digit is a
method for detecting data coding errors in which a control digit is added
to the code when it is originally designed to allow the integrity of the
code to be established during subsequent processing.
• MISSING DATA CHECK
• NUMERIC-ALPHABETIC CHECK
• LIMIT CHECK
▪ RANGE CHECK
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
44
z
IT APPLICATION CONTROLS
(continued)
▪ REASONABLENESS CHECK
▪ VALIDITY CHECK
▪ Processing Controls
▪ Batch controls is an effective method of managing high volumes of
transaction data through a system.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
45
z
Batch Control Record
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
46
z Run-to-Run Controls
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
47
z
IT APPLICATION CONTROLS
(continued)
• TRANSACTION LOGS
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
48
z
Transaction Log to Preserve the
Audit Trail
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
49
z
GFS BACKUP TECHNIQUE
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
50
z
Grandfather-Father-Son Approach
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
51
z
BACKUP PROCESS IN BATCH
SYSTEM USING DIRECT ACCESS
FILES
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
52
z
Destructive Update Approach
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
53
z
Backup Procedures for Batch
Systems Using Direct Access Files
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
54
z
BACKUP OF MASTER FILES IN A
REAL-TIME SYSTEM
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
55
z
Backup Procedures for Real-Time
Processing System
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
56
z
OUTPUT CONTROLS
• PRINT PROGRAMS
• WASTE
• REPORT DISTRIBUTION
• END-USER CONTROLS
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
57
z
Stages in the Output Process
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.