Professional Documents
Culture Documents
05 Ge
05 Ge
Computer Fraud
Copyright 2012 Pearson Education
5-1
Learning Objectives
Explain the threats faced by modern information
systems.
Define fraud and describe the process one follows to
perpetuate a fraud.
Discuss who perpetrates fraud and why it occurs,
including:
the pressures, opportunities, and rationalizations that
are present in most frauds.
Define computer fraud and discuss the different
computer fraud classifications.
Explain how to prevent and detect computer fraud and
abuse.
Copyright 2012 Pearson Education
5-2
5-3
What Is Fraud?
Gaining an unfair advantage over another person
An intent to deceive
5-4
Forms of Fraud
Misappropriation of assets
5-5
2.
3.
4.
5-6
2.
3.
4.
5-7
SAS #99
Auditors responsibility to detect fraud
Understand fraud
Obtain information
Look for fraud risk factors
5-8
5-9
Pressure
Motivation or incentive to
commit fraud
Types:
1.Employee
Financial
Emotional
Lifestyle
2.Financial
Industry conditions
Management
characteristics
5-10
Opportunity
1.Commit the
fraud
2.Conceal the
fraud
Lapping
Kiting
3.Convert the
theft or
misrepresentatio
n to personal
gain
Copyright 2012 Pearson Education
5-11
Rationalizations
1.Justification
I am not being
dishonest.
2.Attitude
I dont need to
be honest.
3.Lack of personal
integrity
Theft is valued
higher than
honesty or
integrity.
5-12
Computer Fraud
Any illegal act in which knowledge of computer
technology is necessary for:
Perpetration
Investigation
Prosecution
5-13
2.
Many go undetected
3.
4.
5.
6.
7.
5-14
Input Fraud
Processor Fraud
Data Fraud
Output Fraud
5-15