Computer Fraud Chapter 5.

Slides:



Advertisements
Similar presentations
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Advertisements

Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Copyright © 2015 Pearson Education, Inc. Computer Fraud Chapter
Computer Fraud Chapter 5.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
Computer Fraud Chapter 5.
Chapter 16 General Ledger and Reporting System Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 16-1.
General Ledger and Reporting System
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Auditing Computer-Based Information Systems
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
9 - 1 Computer-Based Information Systems Control.
Chapter 6-1 The Islamic University of Gaza Accounting Information System Ethics, Fraud and Internal Control Dr. Hisham Madi.
Learning Objectives LO1 Distinguish between management and auditor’s responsibilities regarding an auditee organization’s internal controls. LO2 Explain.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Accounting Information Systems Chapter Outlines
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Chapter 14 The Production Cycle Copyright © 2012 Pearson Education.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Deck 4 Accounting Information Systems Romney and Steinbart
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Review for Midterm Exam Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Fraud & Internal Control Frank M. Klaus, CPA. Fraud Definition  Fraud is the misappropriation of assets for the benefit of an individual.  “Willful.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Information Systems Controls Lecture 5 (Chapter 6, 7 & 8)
Chapter 5 Internal Control over Financial Reporting
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
Computer Security Management: Assessment and Forensics Session 8.
Chapter 3 Ethics, Fraud, and Internal Control Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
Copyright © 2007 Pearson Education Canada 5-1 Chapter 5: Audit Responsibilities and Objectives.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Fraud and Forensic Auditing Pertemuan 23-24
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Chapter 3-Auditing Computer-based Information Systems.
Presented By: W. Andrew Powell, CPA Principal Halt, Buzas & Powell, Ltd.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Copyright © 2016 by McGraw-Hill Education Chapter 5 Fraud, Internal Control, and Cash PowerPoint Author: Brandy Mackintosh, CA.
1 Chapter 2 Corporate Governance and Ethics. 2 Introduction Companies need strong corporate governance and sound ethical practices: Scandals cause the.
1. F1 Section D: Specific functions of accounting & internal financial control D1. Accounting & finance functions within business D3. Internal financial.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
Internal Control Procedures
Errors, Fraud, Risk Management, and Internal Controls
Henri Teittinen Aling with the textbook: Romney & Steinbart (2012)
Computer Fraud Chapter 5.
Defining Internal Control
Systems Design Chapter 6.
INFORMATION SYSTEMS SECURITY and CONTROL
CCP 420: FRAUD DETECTION AND MANAGEMENT
Accounting Information Systems & Computer Fraud
Presentation transcript:

Computer Fraud Chapter 5

Learning Objectives Explain the threats faced by modern information systems. Define fraud and describe both the different types of fraud and the process one follows to perpetuate a fraud. Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds. Define computer fraud and discuss the different computer fraud classifications. Explain how to prevent and detect computer fraud and abuse.

Threats to AIS Table 5-1 Integrative case on page 148 Natural and Political disasters Software errors and equipment malfunctions Unintentional acts Intentional acts This is a good chapter that can be applied to current events locally, nationally, or internationally as many times in the news there are headlines that relate to computer fraud, computer errors, or some sort of natural or political disaster that has an impact on the accounting information system. Do a quick search on Google for computer fraud or computer error and see if you can categorize some of those news articles in the four different threats to AIS. Natural disasters that often occur in the United States can be flooding from storms or hurricanes, the threat of tornadoes, and earthquakes. That is why many of the companies that do business on the Internet will have facilities that have redundancies in different parts of the United States and the world. For example, Google is headquartered in Silicon Valley but has many server farm locations around the world to ensure that the Web site is always up and running (http://www.google.com/about/datacenters/inside/locations/index.html). Could you imagine that if an earthquake hit Silicon Valley and a popular Internet company did not have this policy in place and their Web site went down? This would be a great risk to those companies with a loss of revenues. Software errors which are often called software bugs can cause damage to a companies ability to conduct business, have an impact on customer satisfaction, and damage an organizations reputation. Equipment malfunctions are another reason that companies such as Google have server farms located all over the world. If a server goes down in one location, the data can be rerouted to another server that is up and running. Unintentional acts are caused by human error. As humans, we make honest mistakes. That is why its important as an accountant to pay attention to details, check your work, and have good controls in place (we will discuss this in subsequent chapters). Intentional acts include computer crime, fraud, or intentional sabotage on an information system. A great resource to find out more information about intentional acts is a blog written by Brian Krebs who was a writer for the Washington Post (http://krebsonsecurity.com/)

AIS Threats Pages 150-152 This is a good chapter that can be applied to current events locally, nationally, or internationally as many times in the news there are headlines that relate to computer fraud, computer errors, or some sort of natural or political disaster that has an impact on the accounting information system. Do a quick search on Google for computer fraud or computer error and see if you can categorize some of those news articles in the four different threats to AIS. Natural disasters that often occur in the United States can be flooding from storms or hurricanes, the threat of tornadoes, and earthquakes. That is why many of the companies that do business on the Internet will have facilities that have redundancies in different parts of the United States and the world. For example, Google is headquartered in Silicon Valley but has many server farm locations around the world to ensure that the Web site is always up and running (http://www.google.com/about/datacenters/inside/locations/index.html). Could you imagine that if an earthquake hit Silicon Valley and a popular Internet company did not have this policy in place and their Web site went down? This would be a great risk to those companies with a loss of revenues. Software errors which are often called software bugs can cause damage to a companies ability to conduct business, have an impact on customer satisfaction, and damage an organizations reputation. Equipment malfunctions are another reason that companies such as Google have server farms located all over the world. If a server goes down in one location, the data can be rerouted to another server that is up and running. Unintentional acts are caused by human error. As humans, we make honest mistakes. That is why its important as an accountant to pay attention to details, check your work, and have good controls in place (we will discuss this in subsequent chapters). Intentional acts include computer crime, fraud, or intentional sabotage on an information system. A great resource to find out more information about intentional acts is a blog written by Brian Krebs who was a writer for the Washington Post (http://krebsonsecurity.com/)

Focus 5-1 Electronic Warfare Stuxnet 60 Minutes This is a good chapter that can be applied to current events locally, nationally, or internationally as many times in the news there are headlines that relate to computer fraud, computer errors, or some sort of natural or political disaster that has an impact on the accounting information system. Do a quick search on Google for computer fraud or computer error and see if you can categorize some of those news articles in the four different threats to AIS. Natural disasters that often occur in the United States can be flooding from storms or hurricanes, the threat of tornadoes, and earthquakes. That is why many of the companies that do business on the Internet will have facilities that have redundancies in different parts of the United States and the world. For example, Google is headquartered in Silicon Valley but has many server farm locations around the world to ensure that the Web site is always up and running (http://www.google.com/about/datacenters/inside/locations/index.html). Could you imagine that if an earthquake hit Silicon Valley and a popular Internet company did not have this policy in place and their Web site went down? This would be a great risk to those companies with a loss of revenues. Software errors which are often called software bugs can cause damage to a companies ability to conduct business, have an impact on customer satisfaction, and damage an organizations reputation. Equipment malfunctions are another reason that companies such as Google have server farms located all over the world. If a server goes down in one location, the data can be rerouted to another server that is up and running. Unintentional acts are caused by human error. As humans, we make honest mistakes. That is why its important as an accountant to pay attention to details, check your work, and have good controls in place (we will discuss this in subsequent chapters). Intentional acts include computer crime, fraud, or intentional sabotage on an information system. A great resource to find out more information about intentional acts is a blog written by Brian Krebs who was a writer for the Washington Post (http://krebsonsecurity.com/)

Fraud Any means a person uses to gain an unfair advantage over another person; includes: A false statement, representation, or disclosure A material fact, which induces a victim to act An intent to deceive Victim relied on the misrepresentation Injury or loss was suffered by the victim The ACME estimates ….. Page 152 Fraud is white collar crime Scanning the headlines or doing a simple Google search can show many news articles at your local or regional level as well as national and international fraud. Because fraud is often perpetrated by knowledgeable insiders, it is important for accountants to maintain the highest level of professional ethics.

Two Categories of Fraud Misappropriation of assets page 153 Theft of company assets which can include physical assets (e.g., cash, inventory) and digital assets (e.g., intellectual property such as protected trade secrets, customer data) Fraudulent financial reporting page 154 “cooking the books” (e.g.,booking fictitious revenue, overstating assets, etc.)

Conditions for Fraud These three conditions must be present for fraud to occur: Pressure Employee Financial Lifestyle Emotional Financial Statement Management Industry conditions Opportunity to: Commit Conceal Convert to personal gain Rationalize Justify behavior Attitude that rules don’t apply Lack personal integrity From your accounting coursework in your program, it is important to understand why internal controls are so important. In this book we will cover many internal controls that will prevent and detect these two categories of fraud. In your financial accounting coursework, it is important to understand why transactions should be recorded correctly and in the proper time period. Inappropriate transactions recorded in the accounting system can be indicators of covering up misappropriation of assets or management’s intent to “cook the books”. That is why for fraud to occur there must be: Pressure or incentive to commit the fraud Opportunity to commit the fraud Rationalization of the person committing the fraud as to why it’s ok that they committed the fraud With articles that you find in the news on fraud, see if you can identify the pressure, opportunity, and rationalization as to how the person committed the fraud and why they did it.

Fraud Triangle Figure 5-1 in the text is a good visualization of the Fraud Triangle and the detailed components of the two major types of pressure, the 3 C’s needed for opportunity and types of rationalization. It is noted that committing a fraud requires that all three components to occur: opportunity to commit the fraud, conceal the fraud, and then convert it.

Computer Fraud If a computer is used to commit fraud it is called computer fraud. See “The rise in computer fraud” in page 160; Cyber sleuths in page 161 Computer fraud is classified as: Input Processor Computer instruction Data Output Using the data processing diagram model that we discussed in Chapter 2, computer fraud is classified using this structure: From the processing cycle of the DP model, it would include processor and computer instruction fraud. The best way to learn about the computer fraud classifications is to talk about stories that occurred within these classifications. The book does a good job at describing many stories within these classifications. If you are a movie fan, there are many movies out there that use computer fraud as a storyline in the plot. For example, the movie “Office Space” is about a group of guys at a company that are unhappy with the company management. They change the computer code (computer instruction fraud) to divert fractions of pennies to an account that they own. You will have to watch the movie yourself to see if you can identify the components of fraud. A good example of output fraud is someone stealing the company trash to examine the reports generated and placed in the trash from a computer system. That is why many companies now have shredding policies. Although not a complete list here are some favorites (you can find many more just by going to the Web and looking for movies with fraud in the plot): Office Space Catch Me If You Can The Informant!

Preventing and Detecting Fraud 1. Make Fraud Less Likely to Occur Organizational Systems Create a culture of integrity Adopt structure that minimizes fraud, create governance (e.g., Board of Directors) Assign authority for business objectives and hold them accountable for achieving those objectives, effective supervision and monitoring of employees Communicate policies Develop security policies to guide and design specific control procedures Implement change management controls and project development acquisition controls Table 5-5 is a long list for students to remember, it may be simpler to break the list down into categories that would be general for the organization and those that are specific from a systems perspective These details are discussed more in Chapters 7 through 10 in the text

Preventing and Detecting Fraud 2. Make It Difficulty to Commit Organizational Systems Develop strong internal controls Segregate accounting functions Use properly designed forms Require independent checks and reconciliations of data Restrict access System authentication Implement computer controls over input, processing, storage and output of data Use encryption Fix software bugs and update systems regularly Destroy hard drives when disposing of computers

Preventing and Detecting Fraud 3. Improve Detection Organizational Systems Assess fraud risk External and internal audits Fraud hotline Audit trail of transactions through the system Install fraud detection software Monitor system activities (user and error logs, intrusion detection)

Preventing and Detecting Fraud 4. Reduce Fraud Losses Organizational Systems Insurance Business continuity and disaster recovery plan Store backup copies of program and data files in secure, off-site location Monitor system activity

Key Terms Sabotage Cookie Fraud White-collar criminals Corruption Investment fraud Misappropriation of assets Fraudulent financial reporting Pressure Opportunity rationalization Lapping Check kiting Computer fraud