Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.

Slides:



Advertisements
Similar presentations
Chapter 4 Risk Assessment McGraw-Hill/Irwin
Advertisements

Chapter 14 Fraud Risk Assessment.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Copyright © 2015 Pearson Education, Inc. Computer Fraud Chapter
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Auditing Computer-Based Information Systems
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 9-1 Accounting Information Systems 9 th Edition Marshall.
Auditing Computer-Based Information Systems
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11 By arens et.al.,.
Chapter 6-1 The Islamic University of Gaza Accounting Information System Ethics, Fraud and Internal Control Dr. Hisham Madi.
McGraw-Hill/Irwin ©2007 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Management Fraud and Audit Risk "It takes 20 years to build a.
Management Fraud and Audit Risk
Accounting Information Systems Chapter Outlines
SAS 99: Consideration of Fraud in a Financial Statement Audit Based upon AICPA 2003 overview available at
Learning Objectives LO6 Explain the auditing standards related to external, internal, and governmental auditors’ responsibilities to detect and report.
Internal Controls, Fraud and Abuse Awareness presented by South Texas College Business Office Financial Information Services Connecting And Leading.
Chapter 6 Audit Responsibilities and Objectives
Chapter 4 Risk Assessment.
Deck 4 Accounting Information Systems Romney and Steinbart
Review for Midterm Exam Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Computer Crime and Information Technology Security
Fraud & Internal Control Frank M. Klaus, CPA. Fraud Definition  Fraud is the misappropriation of assets for the benefit of an individual.  “Willful.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
ETHICS, FRAUD AND INTERNAL CONTROL Pertemuan_5 Mata kuliah : CSP402, IT GOVERNANCE Tahun Akademik : 2012/2013 Outlines the roles of Information Technology.
Chapter 3 Ethics, Fraud, and Internal Control Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part.
Chapter 5 Internal Control over Financial Reporting
RTI, Nagpur 1 Day 1` Session I. 2RTI, Nagpur Why Fraud Audit? Fraud audit received powerful impetus from increased fraudulent activities both within corporate.
Fraud and Forensic Auditing Chapter Ten. Definition of Fraud “…any act involving the use of deception to obtain an illegal advantage.” (ISACA Irregularities.
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
Case 6.3 WorldCom Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill.
Chapter 10 Identifying and preventing fraud Qiang Jiang School of Business Sichuan University, China
Chapter 4 Risk Assessment McGraw-Hill/Irwin
Chapter 3 Ethics, Fraud, and Internal Control Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
Chapter 14 Internal Control and the Prevention of Fraud.
Forensic and Investigative Accounting Chapter 3 Fraudulent Financial Reporting © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Chapter 11: Financial Statement Fraud © 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Fraud and Forensic Auditing Pertemuan 23-24
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Chapter 3-Auditing Computer-based Information Systems.
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
Presented By: W. Andrew Powell, CPA Principal Halt, Buzas & Powell, Ltd.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
1 Chapter 2 Corporate Governance and Ethics. 2 Introduction Companies need strong corporate governance and sound ethical practices: Scandals cause the.
Fraud Examination, 3E Chapter 14: Fraud Against Organizations COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
Types of fraud Fraudulent Financial Reporting—An intentional misstatement or omission of amounts or disclosures with the intent to deceive users. Most.
Internal Control Procedures
South Texas College Fraud Awareness and Internal Controls
Errors, Fraud, Risk Management, and Internal Controls
Henri Teittinen Aling with the textbook: Romney & Steinbart (2012)
Computer Fraud Chapter 5.
Management Fraud and Audit Risk
Chapter 12: Fraud Schemes & Fraud Detection
CCP 420: FRAUD DETECTION AND MANAGEMENT
Accounting Information Systems & Computer Fraud
Presentation transcript:

Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1

Learning Objectives  Explain the threats faced by modern information systems.  Define fraud and describe the process one follows to perpetuate a fraud.  Discuss who perpetrates fraud and why it occurs, including:  the pressures, opportunities, and rationalizations that are present in most frauds.  Define computer fraud and discuss the different computer fraud classifications.  Explain how to prevent and detect computer fraud and abuse. Copyright © 2012 Pearson Education 5-2

Common Threats to AIS  Natural Disasters and Terrorist Threats  Software Errors and/or Equipment Malfunction  Unintentional Acts (Human Error)  Intentional Acts (Computer Crimes) Copyright © 2012 Pearson Education 5-3

What Is Fraud?  Gaining an unfair advantage over another person  A false statement, representation, or disclosure  A material fact that induces a person to act  An intent to deceive  A justifiable reliance on the fraudulent fact in which a person takes action  An injury or loss suffered by the victim  Individuals who commit fraud are referred to as white- collar criminals. Copyright © 2012 Pearson Education 5-4

Forms of Fraud  Misappropriation of assets  Theft of a companies assets.  Largest factors for theft of assets:  Absence of internal control system  Failure to enforce internal control system  Fraudulent financial reporting  “…intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements” (The Treadway Commission). Copyright © 2012 Pearson Education 5-5

Reasons for Fraudulent Financial Statements 1.Deceive investors or creditors 2.Increase a company’s stock price 3.Meet cash flow needs 4.Hide company losses or other problems Copyright © 2012 Pearson Education 5-6

Treadway Commission Actions to Reduce Fraud 1.Establish environment which supports the integrity of the financial reporting process. 2.Identification of factors that lead to fraud. 3.Assess the risk of fraud within the company. 4.Design and implement internal controls to provide assurance that fraud is being prevented. Copyright © 2012 Pearson Education 5-7

SAS #99  Auditors responsibility to detect fraud  Understand fraud  Discuss risks of material fraudulent statements  Among members of audit team  Obtain information  Look for fraud risk factors  Identify, assess, and respond to risk  Evaluate the results of audit tests  Determine impact of fraud on financial statements  Document and communicate findings  See Chapter 3  Incorporate a technological focus Copyright © 2012 Pearson Education 5-8

The Fraud Triangle PressureOpportunityRationalization Copyright © 2012 Pearson Education 5-9

Pressure Motivation or incentive to commit fraud Types: 1.Employee Financial Emotional Lifestyle 2.Financial Industry conditions Management characteristics Copyright © 2012 Pearson Education 5-10

Opportunity Condition or situation that allows a person or organization to: 1.Commit the fraud 2.Conceal the fraud Lapping Kiting 3.Convert the theft or misrepresentation to personal gain Copyright © 2012 Pearson Education 5-11

Rationalizations Justification of illegal behavior 1.Justification I am not being dishonest. 2.Attitude I don’t need to be honest. 3.Lack of personal integrity Theft is valued higher than honesty or integrity. Copyright © 2012 Pearson Education 5-12

Computer Fraud  Any illegal act in which knowledge of computer technology is necessary for:  Perpetration  Investigation  Prosecution Copyright © 2012 Pearson Education 5-13

Rise of Computer Fraud 1.Definition is not agreed on 2.Many go undetected 3.High percentage is not reported 4.Lack of network security 5.Step-by-step guides are easily available 6.Law enforcement is overburdened 7.Difficulty calculating loss Copyright © 2012 Pearson Education 5-14

Computer Fraud Classifications  Input Fraud  Alteration or falsifying input  Processor Fraud  Unauthorized system use  Computer Instructions Fraud  Modifying software, illegal copying of software, using software in an unauthorized manner, creating software to undergo unauthorized activities  Data Fraud  Illegally using, copying, browsing, searching, or harming company data  Output Fraud  Stealing, copying, or misusing computer printouts or displayed information Copyright © 2012 Pearson Education 5-15