Ais Reviewer Chapter 4

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Chapter 4 – Ethics, Fraud, and Internal Control The Auditor’s Responsibilities

1. Understand Fraud
AIS Threats 2. Discuss the risks of material fraudulent
1. Natural and political disasters- such as fires, misstatements
floods, earthquakes, and attacks by terrorists can 3. Obtain information
destroy an information system and cause many 4. Identify, assess, and respond to risks
companies to fail. 5. Evaluate the results of their audit tests
2. Software errors - Operating system crashes, and 6. Document and communicate findings
undetected data transmission errors constitute a 7. Incorporate a technology focus
second type of threat.
3. Unintentional acts - Accidents or innocent, is the Who commits fraud?
greatest risk to information systems 1. Employees that are disgruntled and unhappy.
4. Intentional act - Computer crime, fraud, or 2. People that view fraud as a challenge and want to
sabotage, which is deliberate destruction. beat the system.
○ Sabotage - intentional act where the intent is to 3. People that are looking to make money from
destroy a system or some of its components. fraudulent activities.
4. Involved in organized crime.
Fraud
Legally, for an act to be fraudulent there must be: The Fraud Triangle
1. A false statement- representation, or disclosure 1. Pressure - financial pressures often motivate
2. A material fact- which is something that induces a misappropriation frauds by employees.
person to act 2. Emotional - many employee frauds are motivated
3. An intent to deceive by greed.
4. A justifiable reliance; that is, the person relies on 3. Lifestyle - the person may need funds to support a
the misrepresentation to take an action gambling habit or support a drug or alcohol addiction.
5. An injury or loss suffered by the victim
Opportunity- condition or situation that allows a
Corruption- dishonest conduct by those in power and person or organization to commit and conceal a
it often involves actions dishonest act and convert it to personal gain. It allows
one to do three things:
Investment Fraud- misrepresenting or leaving out 1. Commit the fraud - The theft of assets is the most
facts in order to promote an investment common type of misappropriation. Most instances of
Fraudulent Financial Reporting- intentional or fraudulent financial reporting involve overstatements
reckless conduct, that results in materially misleading of assets or
financial statements Revenues
2. Conceal the fraud - perpetrators must keep the
The Tread way Commission recommended four accounting equation in balance by inflating
actions to reduce fraudulent financial reporting: other assets.
1. Establish an organizational environment that 3. Convert the theft or misrepresentation to personal
contributes to the integrity of the financial reporting gain. In a misappropriation, fraud perpetrators who
process. do not steal cash or use the stolen assets personally
2. Identify and understand the factors that lead to must convert them
fraudulent financial reporting. to a spendable form.
3. Assess the risk of fraudulent financial reporting
within the company. Rationalizations-is the excuse that fraud perpetrators
4. Design and implement internal controls to provide use to justify their illegal behavior. In other words,
reasonable assurance of preventing fraudulent perpetrators rationalize that they are not being
financial reporting. dishonest, that honesty is not required of them, or
that they value what they take more than honesty
and integrity.

Computer Fraud- any fraud that requires computer


technology to perpetrate it.
Examples include:
➢Unauthorized theft
➢Theft of assets covered up by altering computer
records
➢Obtaining information or tangible property illegally
using computers

The number of incidents, the total dollar losses, and


the sophistication of the perpetrators and the
schemes used to commit computer fraud are
increasing rapidly for several
reasons:
1. Not everyone agrees on what constitutes computer
fraud.
2. Many instances of computer fraud go undetected.
3. A high percentage of frauds is not reported.
4. Many networks are not secure.
5. Internet sites offer step-by-step instructions on
how to perpetrate computer fraud and abuse.
6. Law enforcement cannot keep up with the growth
of computer fraud.
7. Calculating losses is difficult.

Computer Fraud Classifications


1. Input Fraud- simplest and most common way to
commit a computer fraud is to alter or falsify
computer input.
2. Processor Fraud- Processor fraud includes
unauthorized system use, including the theft of
computer time and services.
3. Computer Instructions Fraud- includes tampering
with company software, copying software illegally
4. Data Fraud- Illegally using, copying, browsing,
searching. The biggest cause of data breaches is
employee negligence.

Preventing Computer Crime and Fraud


1. Enlist top-management support
2. Increase employee awareness and education
3. Assess security policies and protect passwords
4. Implement controls

You might also like