Deck 4 Accounting Information Systems Romney and Steinbart

Slides:



Advertisements
Similar presentations
Database Design Using the REA Data Model
Advertisements

FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Copyright © 2015 Pearson Education, Inc. Computer Fraud Chapter
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Fraud Auditing Chapter 11.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Chapter 6-1 The Islamic University of Gaza Accounting Information System Ethics, Fraud and Internal Control Dr. Hisham Madi.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Technology Review-II Professor Martin Professor Xiong CSUS
Chapter 4 Billing Schemes.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Database Design Using the REA Data Model
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 138 C HAPTER 15 Database Design Using the REA Data Model.
Review for Midterm Exam Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Security Issues with Vendors, Employees, and Customers Chapter 10.
Database Design Using the REA Data Model
Fraud & Internal Control Frank M. Klaus, CPA. Fraud Definition  Fraud is the misappropriation of assets for the benefit of an individual.  “Willful.
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
Chapter 16: Audit of Cash Balances
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
9 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 9.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 96 C HAPTER 17 Special Topics in REA Modeling for the.
1 Chapter 6 Merchandising Operations and Internal Control Adapted from Financial Accounting 4e by Porter and Norton.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 14 Internal Control and the Prevention of Fraud.
Chapter 4 Billing Schemes.
Chapter 12 Inventories and Cost of Goods Sold McGraw-Hill/Irwin
Chapter 1 The Role of Accounting in Starting a Business © 2009 The McGraw-Hill Companies, Inc.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Exam Preparation 26 Oct, 8h00-11h00 HP2. 2 Bloom’s Taxonomy: 3.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
1 Chapter 2 Corporate Governance and Ethics. 2 Introduction Companies need strong corporate governance and sound ethical practices: Scandals cause the.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
Chapter 9 Non-Cash Assets.
Chapter 4 The Revenue Cycle 1.
Introduction to Transaction Processing
Part I: Purchases and Cash Disbursements Procedures
Chapter 9 Non-Cash Assets.
Henri Teittinen Aling with the textbook: Romney & Steinbart (2012)
Database Design Using the REA Data Model
Computer Fraud Chapter 5.
Chapter 12: Fraud Schemes & Fraud Detection
CCP 420: FRAUD DETECTION AND MANAGEMENT
2019/8/2 Topic 13 : Frauds 2019/8/2 Week 1.
Presentation transcript:

Deck 4 Accounting Information Systems Romney and Steinbart Linda Batch May 2012

Contents Learning Objectives Review of the Components of a Transaction (REA) Chapter Quiz Questions Review the answers to Problem 17.4 and 17.6 Review Power Points for Chapters 5 Microsoft Access – Continue with the database exercise

Homework from Last Week Problem 17.4 and 17.6 – hand in at the beginning of the next class Chapter 17 pp. 492 to 502 – Read again Chapter 17 quiz questions Read Chapter 5 pp. 121 to 135 (whole chapter) Read Chapter 6 pp. 149 to 167 (whole chapter)

Moving on to: Steps in Developing a Database (REA) Step 1: Identify the events about which management wants to collect and store information Step 2: Identify the resources and agents affected by each event The Events Resources and Agents are Entities Each entity will be represented by a different table in a relational database Step 3: Determine the cardinalities of the relationships between entities

Identify the events of interest to management Step 1 - Event Identify the events of interest to management A solid understanding about the activities performed in each business cycle (give / get relationships) Revenue Cycle: Take customer orders (neither give nor get) Fill customer orders (give) - sale Bill customers (neither give nor get) Collect payment from customers (get)

Step 2 – Resources and Agents Identify resources and agents What economic resource is reduced by the give event What economic resource is acquired by the get event What economic resource is affected by a commitment give inventory (or product), get cash employee gives the inventory to the customer employee gets the cash from the customer

Rules for Structuring Relationships Every event must be linked to at least one resource entity Every event entity must be linked to at least one other event entity Every event entity must be linked to at least two agent entities Order the event entities from top to bottom in the order that they occur

Step 3 – How are Data Cardinalities Represented on a REA Diagram? Relationship type is based on maximum cardinality: One-to-One: One-to-Many: Many-to-Many: These relationships are not arbitrary but must reflect the organization’s business policies (pg. 505)

Problem 17.4 Sue’s Gallery only purchases finished paintings (it never commissions artists). It pays each artist 50% of the agreed price at the time of purchase, and the remainder after the painting is sold. All purchases are paid by check from Sue’s main checking account. Draw an REA Diagram, complete with cardinalities, of the gallery’s expenditure cycle. Identify Resources, Events and Agents and note this is the Expenditure Cycle

Problem 17.4 Build up the REA Diagram Resources Events Agents Artwork Cash Purchase paintings Pay Artists Artists Gallery buyer Gallery seller

Problem 17.4

Problem 17.6 Provide an example (in terms of companies with which you are familiar) for each of the business situations described by the following relationship cardinalities: (a) A company may receive multiple cash payments on a single sale or a company may receive one payment for several sales. This scenario could take place between any vendor and any customer. The vendor is allowing customers to make multiple payments on a single invoice and is allowing customers to pay for multiple invoices with a single payment.

Problem 17.6 (b) A sale can include multiple items, but an item can be included in only one sale. This type of arrangement would involve individual items like art work or automobiles. (c) In this scenario, some inventory purchases can be paid for with multiple payments, while at times a single disbursement may pay for multiple purchases. This scenario represents a revolving credit plan offered by suppliers. (d) In this scenario, inventory purchases are to be paid for with a single payment. For example, a vendor sends a monthly bill for merchandise delivered to a customer. The supplier does not accept or allow installment payments. This is typical for many business to business transactions that involve low-priced items.

Problem 17.6 (e) In this scenario, a single purchase of inventory is paid for with multiple payments. For example, a car dealership makes installment payments for cars delivered from the manufacturer. (f) In this scenario, each sale must be preceded by one and only one order. The fact that both the order and sales events are recorded implies that there is probably a time lag between taking the customer’s order and filling that order, so that the selling organization needs to be able to track the status of orders. An internet sale is an example of this type of scenario. When a customer places an order with Amazon.com, there is a time lag between the time the order is sent by the customer and the time Amazon fills the order.

Problem 17.6 (g) In this scenario, each sale can be comprised of multiple orders and each order can be associated with multiple sales. Thus, we have here a situation where the selling company batches orders and only ships periodically – e.g., with restaurants, suppliers may take orders daily but fill them only on Mondays and Thursdays. Moreover, suppliers may occasionally run out of some items, requiring multiple deliveries (sales) to fill a specific order. (h) Payment upfront for a single sale similar to the way DELL sells computers; i.e., no installment payments are allowed, the customer must pay in full in advance (prior to shipment).

Problem 17.6 (i) In this scenario, a sale can include multiple inventory items. Also, a single inventory item can be included in multiple sales. For example, Wal-Mart customers can purchase many inventory items such as detergent, tires, and clothing items. These mass-produced inventory items can also be sold to many customers. Therefore, a sale can include a box of detergent, a set of tires, and a sweatshirt. By the same token, the same brand of detergent can be included in many different sales. (j) Sales need not be preceded by orders, but any orders are associated with only one sale (filled individually, not batched). An example is a hardware store in which some sales are made to walk-in customers (sales without preceding orders), but which also allows contractors to place orders by phone, fax, or over the Internet in advance and then pick up the order later.

Chapter 5 – Computer Fraud Learning Objectives Explain the threats faced by modern information systems. Define fraud and describe the process one follows to perpetuate a fraud. Discuss who perpetrates fraud and why it occurs, including: the pressures, opportunities, and rationalizations that are present in most frauds. Define computer fraud and discuss the different computer fraud classifications. Explain how to prevent and detect computer fraud and abuse.

Threats to AIS Natural Disasters and Terrorist Threats Software Errors and/or Equipment Malfunction Unintentional Acts (Human Error) Intentional Acts (Computer Crimes)

What is Fraud Gaining an unfair advantage over another person Individuals who commit fraud are referred to as white-collar criminals. Legally for an act to be fraudulent there must be: A false statement, representation, or disclosure A material fact that induces a person to act An intent to deceive A justifiable reliance on the fraudulent fact in which a person takes action An injury or loss suffered by the victim

Forms of Fraud Misappropriation of assets Theft of a companies assets. Largest factors for theft of assets: Absence of internal control system Failure to enforce internal control system Fraudulent financial reporting “…intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements” (The Treadway Commission).

Reasons for Fraudulent F/S Deceive investors or creditors Increase a company’s stock price Meet cash flow needs Hide company losses or other problems The Association of Certified Fraud Examiners found that an asset misappropriation is 17 times more likely than fraudulent financial reporting but the amounts involved are much lower.

SAS #99 – The Auditors Responsibility to Detect Fraud SAS – Statement on Auditing Standards Auditors responsibility to detect fraud Understand fraud Discuss risks of material fraudulent statements Among members of audit team Obtain information Look for fraud risk factors Identify, assess, and respond to risk Evaluate the results of audit tests Determine impact of fraud on financial statements Document and communicate findings Incorporate a technological focus

Who Perpetuates Fraud and Why? Very little difference between the general public and those that perpetuate white collar crime Most have no prior criminal history Most are upstanding citizens in the community A growing number of computer fraud perpetuators seek monetary gain from their actions Malicious software is big business Cyber-criminals are at top FBI priority because they have moved from isolated and uncoordinated attacks to organized fraud schemes targeting individuals and businesses.

The Fraud Triangle - Pressure Opportunity Rationalization Employee Financial Emotional Lifestyle Financial Reporting Industry Conditions Mgmt Characteristics Employee Pressure Triangle Financial Statement Pressure Triangle

The Fraud Triangle - Opportunity Pressure Opportunity Rationalization Condition or situation that allows a person or organization to: Commit the fraud Conceal the fraud Lapping Kiting Convert the theft or misrepresentation to personal gain Opportunity Commit Conceal Convert

The Fraud Triangle - Rationalization Pressure Opportunity Rationalization Justification of illegal behavior: Justification I am not being dishonest. Attitude I don’t need to be honest. Lack of personal integrity Theft is valued higher than honesty or integrity. Rationalization Justification Attitude Lack of Peronal Integrity

Fraud Triangle Summary Usually all three elements need to exist before an employee will perpetuate a fraud Fraud can be prevented by eliminating one or more fraud triangle elements Pressure Opportunity Rationalization

Computer Fraud - Classifications Input Fraud Alteration or falsifying input Processor Fraud Unauthorized system use Computer Instructions Fraud Modifying software, illegal copying of software, using software in an unauthorized manner, creating software to undergo unauthorized activities Data Fraud Illegally using, copying, browsing, searching, or harming company data Output Fraud Stealing, copying, or misusing computer printouts or displayed information

Preventing and Detecting Fraud and Abuse Table 5-5 pg.134 Make Fraud Less Likely to Occur Organizational Culture Adopt an organizational structure, management style, operating style, and risk appetite that minimizes the risk of fraud Active involved independent audit committee Train employees on ethical considerations Increase the Difficulty of Committing Fraud Develop a strong system of internal controls Segregate the functions of authorization, recording, and custody Proper segregation of duties between functions System access to authorized personnel

Preventing and Detecting Fraud and Abuse Table 5-5 pg.134 Improve Detection Methods Create an audit trail of individual transactions Conduct periodic internal and external audits Install fraud detection software Implement a fraud detection hotline Reduce Fraud Losses Maintain adequate insurance Develop comprehensive fraud contingency, disaster recovery, and business continuity plans Store backup copies of program and data files in a secure off-site location Use software to monitor system activity and recover from fraud

Homework TBD