Fraud and Forensic Auditing Chapter Ten. Definition of Fraud “…any act involving the use of deception to obtain an illegal advantage.” (ISACA Irregularities.

Slides:



Advertisements
Similar presentations
Chapter 4 Risk Assessment McGraw-Hill/Irwin
Advertisements

©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
FRAUD AWARENESS Lindiwe Ndlela Chief Financial Officer.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Sarbanes-Oxley Act. 2 What Is It? Act passed by Congress in response to the recent and continuing corporate scandals. Signed into law July 30, Established.
Fraud Auditing Chapter 11.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11 By arens et.al.,.
Introduction to Fraud Examination. 2 Discipline of Fraud Examination Resolving allegations of fraud from tips, complaints or accounting clues Forensic.
Indiana State University Forensic Accounting By Dr. Thomas D. Harris.
Forensic and Investigative Accounting
Management Fraud and Audit Risk
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fighting Fraud: An Overview CHAPTER 3.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Copyright © 2016 South-Western/Cengage Learning THE AUDITOR’S RESPONSIBILITIES REGARDING FRAUD AND MECHANISMS TO ADDRESS FRAUD: REGULATION AND CORPORATE.
Introduction to Fraud Examination
Do’s and Don’ts From a Credit Union Perspective Handling Internal Fraud Investigations Mike Mossel – RSM McGladrey, Inc June 15, 2011 – ACUIA Conference.
KHALID AZIZ Fraud Auditing KHALID AZIZ JOIN KHALID AZIZ ECONOMICS OF ICMAP, ICAP, MA-ECONOMICS, B.COM. FINANCIAL.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Chapter 2 The Financial Statement Auditing Environment McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 4 Risk Assessment.
Internal Auditing and Outsourcing
A CASE RELATED TO CORPORATE SPY WORK. Dates back to 6 th century. Unethical and illegal method of collecting information related to- * Corporate strategies.
Kpmg. The Fourth Asian Roundtable on Corporate Governance Shareholder Rights and the Equitable Treatment of Shareholders Deepankar Sanwalka KPMG “Tools.
AUDIT RESPONSIBILITIES AND OBJECTIVES
Fraud & Internal Control Frank M. Klaus, CPA. Fraud Definition  Fraud is the misappropriation of assets for the benefit of an individual.  “Willful.
HROFFICE USER CONFERENCE 2005 Creating an Effective Ethics and Compliance Program Ascentis User Group September, 2005.
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
Auditing Responsibilities & Objectives Chapter 5 Responsibilities & Objectives Chapter 5.
Presentation CIFAL PRESENTATION Date: 13 JUNE 2012 Place : Durban.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Chapter 9 Auditing for Fraud
ETHICS, FRAUD AND INTERNAL CONTROL Pertemuan_5 Mata kuliah : CSP402, IT GOVERNANCE Tahun Akademik : 2012/2013 Outlines the roles of Information Technology.
04. Internal Control Over Transactions Pertemuan Matakuliah: Manajemen Kinerja Sistem Komputer Tahun: Feb
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
Chapter 10 Identifying and preventing fraud Qiang Jiang School of Business Sichuan University, China
Chapter 4 Risk Assessment McGraw-Hill/Irwin
Spiceland | Thomas | Herrmann Financial Accounting Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Computer Security Management: Assessment and Forensics Session 8.
Chapter 3 Ethics, Fraud, and Internal Control Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
Chapter 1 Introduction to Fraud Examination. 2 Learning Objectives Understand the fraud theory approach. Define occupational fraud. Define fraud. Define.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Considering the Risk of Fraud
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
Presented By: W. Andrew Powell, CPA Principal Halt, Buzas & Powell, Ltd.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
1 Chapter 2 Corporate Governance and Ethics. 2 Introduction Companies need strong corporate governance and sound ethical practices: Scandals cause the.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
South Texas College Fraud Awareness and Fraud Surveys
Types of fraud Fraudulent Financial Reporting—An intentional misstatement or omission of amounts or disclosures with the intent to deceive users. Most.
Internal Control Procedures
South Texas College Fraud Awareness and Internal Controls
ACC 556 GUIDE Marvelous Learning / acc556guide.com
Fraud Auditing Chapter 11.
Chapter 12: Fraud Schemes & Fraud Detection
CCP 420: FRAUD DETECTION AND MANAGEMENT
2019/8/2 Topic 13 : Frauds 2019/8/2 Week 1.
Presentation transcript:

Fraud and Forensic Auditing Chapter Ten

Definition of Fraud “…any act involving the use of deception to obtain an illegal advantage.” (ISACA Irregularities and Illegal Acts Guideline 30)

Why Fraud Occurs PressureRationalization Opportunity Fraud Triangle

Major Fraud Studies The COSO Studies (1987, 1999) 1998 KPMG Fraud Study 2002 Wells Report

Characteristics of Fraud 2002 Cost: $600 billion Problematic industries: Computer Manufacturing Financial services

3 Categories of Fraud (See Figure 10-4) Asset misappropriation (85.7%) Corruption (12.8%) Fraudulent financial statements (5.1%, but highest dollar amount) See Figure 10-4

Responsibilities to Detect Fraud Corporate Positive security model a necessity Corporate fraud policy Ethical tone at the top Policies on computer use and abuse Network security policy

Fraud in Malaysia Fraud appears to be more rampant in the manufacturing, construction, engineering and consumer products industries Value: RM 63.5 milliom Motivation: Greed/lifestyle (62%), personal financial pressure (39%) Perpetrators: Management, Non-management employees, Customers, Suppliers and Service provider Types of fraud: Theft of physical asset (83%) and theft of funds (77%) Source: KPMG 2011 Fraud Report

Red Flags not to be missed Excessive secrecy about a function, its operations and its financial results. When questions are asked, answers are always stalled and withheld. There is excessive pressures on employees to tamper with result to meet high expectation of the business Increases in profitability fail to lead to increased cash flows Senior managers receive large bonuses linked to meeting targets Complex/unusual payment methods A remote operation not effectively monitored by head office Source: KPMG Analysis

Employees behavioural red flags Refuses and does not seek promotion Rarely takes holidays Does not or will not produce records/information or on request Unreliable and prone to mistakes Surrounded by “favourites” or people who do not challenge them Persistent rumours of personal bad habits/addiction/vices Bullies or intimidates colleagues Vendor/suppliers will only deals with this individual Lifestyle seems excessive for income Seems stressed and under pressures Source: KPMG Analysis

Auditor’s Responsibility-SAS 99 Supersedes SAS 82 Effective December 15, 2002 Incorporates the fraud triangle and requires audit team to consider the fraud triangle Professional skepticism Expanded team discussions, brainstorming Revenue recognition Technology

Sarbanes-Oxley Act of 2002 Public Oversight Board established Increased audit committee responsibilities Specifically prohibited activities 8 nonaudit services now prohibited by company also performing the audit Criminal sanctions Whistleblower protection

Forensic Auditing Investigating known or suspected fraud Computer forensics The use of computer technology to investigate fraud

Conducting the Forensic Investigation Gathering evidence Rules of Evidence must be carefully followed Chain of custody critical Interviewing personnel Invigilation Indirect methods of proof

Prosecution Must establish chain of custody Must prove 4 elements of fraud exist: Misrepresentation of a material fact Intent to defraud Justifiable reliance Resulting in an injury

Tools of Computer Forensics Screwdriver and pliers Disk imaging software Hash calculation utility Search utilities File and data recovery tools File viewing utilities Password cracking software Digital camera