We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKenia Witt
Modified about 1 year ago
Copyright © 2015 Pearson Education, Inc. Computer Fraud Chapter 5 5-1
Copyright © 2015 Pearson Education, Inc. Learning Objectives Explain the threats faced by modern information systems. Define fraud and describe both the different types of fraud and the process one follows to perpetuate a fraud. Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds. Define computer fraud and discuss the different computer fraud classifications. Explain how to prevent and detect computer fraud and abuse. 5-2
Copyright © 2015 Pearson Education, Inc. Threats to AIS Natural and Political disasters Software errors and equipment malfunctions Unintentional acts Intentional acts 5-3
Copyright © 2015 Pearson Education, Inc. Fraud Any means a person uses to gain an unfair advantage over another person; includes: ▫A false statement, representation, or disclosure ▫A material fact, which induces a victim to act ▫An intent to deceive ▫Victim relied on the misrepresentation ▫Injury or loss was suffered by the victim Fraud is white collar crime 5-4
Copyright © 2015 Pearson Education, Inc. Two Categories of Fraud Misappropriation of assets ▫Theft of company assets which can include physical assets (e.g., cash, inventory) and digital assets (e.g., intellectual property such as protected trade secrets, customer data) Fraudulent financial reporting ▫“cooking the books” (e.g.,booking fictitious revenue, overstating assets, etc.) 5-5
Copyright © 2015 Pearson Education, Inc. Conditions for Fraud These three conditions must be present for fraud to occur: Pressure ▫Employee Financial Lifestyle Emotional ▫Financial Statement Financial Management Industry conditions Opportunity to: ▫Commit ▫Conceal ▫Convert to personal gain Rationalize ▫Justify behavior ▫Attitude that rules don’t apply ▫Lack personal integrity 5-6
Copyright © 2015 Pearson Education, Inc. Fraud Triangle 5-7
Copyright © 2015 Pearson Education, Inc. Computer Fraud If a computer is used to commit fraud it is called computer fraud. Computer fraud is classified as: ▫Input ▫Processor ▫Computer instruction ▫Data ▫Output 5-8
Copyright © 2015 Pearson Education, Inc. Preventing and Detecting Fraud 1. Make Fraud Less Likely to Occur OrganizationalSystems Create a culture of integrity Adopt structure that minimizes fraud, create governance (e.g., Board of Directors) Assign authority for business objectives and hold them accountable for achieving those objectives, effective supervision and monitoring of employees Communicate policies Develop security policies to guide and design specific control procedures Implement change management controls and project development acquisition controls 5-9
Copyright © 2015 Pearson Education, Inc. Preventing and Detecting Fraud 2. Make It Difficulty to Commit OrganizationalSystems Develop strong internal controls Segregate accounting functions Use properly designed forms Require independent checks and reconciliations of data Restrict access System authentication Implement computer controls over input, processing, storage and output of data Use encryption Fix software bugs and update systems regularly Destroy hard drives when disposing of computers 5-10
Copyright © 2015 Pearson Education, Inc. Preventing and Detecting Fraud 3. Improve Detection OrganizationalSystems Assess fraud risk External and internal audits Fraud hotline Audit trail of transactions through the system Install fraud detection software Monitor system activities (user and error logs, intrusion detection) 5-11
Copyright © 2015 Pearson Education, Inc. Preventing and Detecting Fraud 4. Reduce Fraud Losses OrganizationalSystems Insurance Business continuity and disaster recovery plan Store backup copies of program and data files in secure, off-site location Monitor system activity 5-12
Copyright © 2015 Pearson Education, Inc. Key Terms Sabotage Cookie Fraud White-collar criminals Corruption Investment fraud Misappropriation of assets Fraudulent financial reporting Pressure Opportunity rationalization Lapping Check kiting Computer fraud 5-13
Copyright © Pearson Education Limited Computer Fraud Chapter
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Copyright © 2015 Pearson Education, Inc. Computer Fraud Chapter
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Copyright © 2015 Pearson Education, Inc. Auditing Computer-Based Information Systems Chapter
Deck 4 Accounting Information Systems Romney and Steinbart Linda Batch May 2012.
Chapter 11 Auditing Computer-Based Information Systems Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 11-1.
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
Chapter 3-Auditing Computer-based Information Systems.
Computer Security Management: Assessment and Forensics Session 8.
1 Chapter 2 Corporate Governance and Ethics. 2 Introduction Companies need strong corporate governance and sound ethical practices: Scandals cause the.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Chapter 16 General Ledger and Reporting System Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 16-1.
2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Auditing Computer Systems Dr. Yan Xiong College of Business CSU Sacramento 9/11/03.
Copyright © 2015 Pearson Education, Inc. Control and Accounting Information Systems Chapter
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Chapter Chapter 10-2 Chapter 10: Computer Controls for Organizations and Accounting Information Systems Introduction Enterprise Level Controls General.
Chapter 6-1 The Islamic University of Gaza Accounting Information System Ethics, Fraud and Internal Control Dr. Hisham Madi.
9 - 1 Computer-Based Information Systems Control.
Copyright © Pearson Education Limited Control and Accounting Information Systems Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Learning Objectives LO1 Distinguish between management and auditor’s responsibilities regarding an auditee organization’s internal controls. LO2 Explain.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT WHO COMMITS FRAUD AND WHY CHAPTER 2.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Chapter 16 General Ledger and Reporting System Copyright © 2012 Pearson Education 16-1.
Ensuring the Integrity of Financial Information Ensuring the Integrity of Financial Information C H A P T E R 5.
Review for Midterm Exam Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Accounting Information Systems Chapter Outlines Romney and Steinbart.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Presented By: W. Andrew Powell, CPA Principal Halt, Buzas & Powell, Ltd.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 Cash Larceny Chapter 3. 2 Pop Quiz What is the difference between larceny and skimming?
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Fraud, Ethics, and Controls.
Information Systems Controls Lecture 5 (Chapter 6, 7 & 8)
Fraud and Forensic Auditing Pertemuan Matakuliah: F0174 / Audit Laporan Keuangan Berbasis Komputer Tahun: 2008.
CJ 125 UNIT TWO SKIMMING AND LARCENY. REVIEW THREE MAJOR CATEGORIES OF FRAUD WHAT ARE THEY?
© 2017 SlidePlayer.com Inc. All rights reserved.