Unit 9: Electronic Fraud Professor Thomas Genovese.

Slides:



Advertisements
Similar presentations
OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Advertisements

An Internal Control Overview
Ethics, Privacy and Information Security
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Internal Controls Becoming Compliant. Design & Implementation of Internal Controls. Design: Need to show that a framework is in place to establish internal.
Auditing Concepts.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
The Islamic University of Gaza
ACCT 100 Chapter 7 Internal Control and Cash Internal Control and Managing Cash 2 Objectives of the Chapter 1. Introduce the internal control to safeguard.
1 © Copyright Doug Hillman 2000 Internal Control and Cash.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FORENSIC ACCOUNTING - BA124 - Fall 2007Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention n Shenanigan.
FORENSIC ACCOUNTING - BA Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention.
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
Copyright © 2007 Prentice-Hall. All rights reserved 1 Internal Control & Cash Chapter 8.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Cash and Financial Investments. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Internal Control Over --Cash Receipts.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
©2008 Pearson Prentice Hall. All rights reserved. 4-1 Internal Control & Cash Chapter 4.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Securing Information Systems
Chapter 10 Cash and Financial Investments McGraw-Hill/Irwin
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
Transaction Processing and the Internal Control Process Small Business Information Systems Professor Barry Floyd.
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
Fraud, Internal Control, and Cash
Where’s the Money Going? 10 Things You Should Know about Internal Controls and Fraud Donna S. Brown, CPA Bob Powell, CPA November 12, 2010.
FORENSIC ACCOUNTING - BA Today’s Topics n E-Commerce Fraud n Cash Flow Shenanigans n Metrics Shenanigans.
Chapter 5 Internal Control over Financial Reporting
Chapter 2 Conflict of interest. SEC guiding principles not in book Independence in fact Independence in appearance Auditors are not independent if relationships.
BusinessAllstars.com 1 BusinessAllstars.com Presents Copyright © 2004 by Gainbridge Associates All right reserved This material may not be used or reproduced.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Chapter 10 – Cash Control and Banking
Internal Control and Cash
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Spiceland | Thomas | Herrmann Financial Accounting Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
1 Chapter 6 Merchandising Operations and Internal Control Adapted from Financial Accounting 4e by Porter and Norton.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Internal Controls and Fraud Convery Describe an Internal Controls System and its elements Identify specific Internal Control issues in a NPO Consider.
Ensuring the Integrity of Financial Information Ensuring the Integrity of Financial Information C H A P T E R 5.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
Fraud Examination, 3E Chapter 17: Fraud in E-Commerce COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Fraud, Ethics, and Controls.
Other Types of Fraud FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15.
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Spiceland | Thomas | Herrmann Financial Accounting Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Operations 104 Class 6—Fraud.
Copyright © 2016 by McGraw-Hill Education Chapter 5 Fraud, Internal Control, and Cash PowerPoint Author: Brandy Mackintosh, CA.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud in E-Commerce Chapter 17.
Auditing Concepts.
Incentives / Pressure GREED Personal financial trouble
Accounts Receivable, Accounts Payable & Cash
MIE Conference Session: Telling your Financial Story
Cash and Financial Investments
Defining Internal Control
Internal controls 01-Nov-2017.
CCP 420: FRAUD DETECTION AND MANAGEMENT
Presentation transcript:

Unit 9: Electronic Fraud Professor Thomas Genovese

Learning Objectives 1.Understand e-commerce fraud risk. 2.Take measures to prevent e-commerce fraud. 3.Detect e-business fraud.

E-commerce Fraud Risk Pressures Dramatic growth, which has created tremendous cash flow needs. Merger or acquisition activity, which creates pressures to “improve the reported financial results.” Borrowing or issuing stock, additional pressures to “cook the books.” New products, which require intensive and expensive marketing and for which an existing market does not yet exist. Unproven or flawed business models, with tremendous cash flow pressures.

E-commerce Fraud Risk - Opportunities New and innovative technologies. Complex information systems that make installing controls difficult. Complex information systems that make installing controls difficult. The transfer of large amounts of information. Removal of personal contact. Lack of “brick-and-mortar” and other physical facilities. Inability to distinguish large and/or established companies from new and/or smaller companies.  Electronic transfer of funds.  Compromised privacy.

E-commerce Fraud Risk- Rationalization Decreases in the personal contact between customer and supplier. Transactions between anonymous or unknown buyers and sellers. False notion that traditional methods of accounting no longer apply.

E-commerce Fraud Risk Risks Inside an Organization:  Data theft  Social engineering  Sniffing  Wartrapping  Vandalism  Employee laptops

E-commerce Fraud Risk Risks Outside an Organization:  Computer viruses  Spyware  Phishing  Spoofing  Falsified identity  Database query (SQL) injections  Bust-out  and Web visits

E-commerce Fraud Prevention How to reduce pressures and eliminate rationalizations in e-business? Security Through Obscurity: Keeping security holes, encryption algorithms, and processes secret in an effort to confuse hackers.

E-commerce Fraud Prevention Reduce opportunities through appropriate internal controls. Elements: (1) The control environment (2) Risk assessment (3) Control activities or procedures (4) Information and communication (5) Monitoring

E-commerce Fraud Prevention Components of the control environment: Integrity and Ethical Values Board of Directors and Audit Committee Participation Management’s Philosophy and Operating Style Human Resources Policies and Practices

E-commerce Fraud Prevention Risk Assessment Identifies the risks of doing business with e-business partners. Focuses on the control environment of business partners. Identifies the risks involved in electronic exchange of information and money. Intrusion detection.

E-commerce Fraud Prevention Control Activities Adequate separation of duties Proper authorization of transactions and activities Adequate documents and records Physical control over assets and records Independent checks on performance

E-commerce Fraud Prevention Adequate Separation of Duties (who authorizes? – who executes?) Adequate Separation of Duties (who authorizes? – who executes?) Proper Authorizations ( Passwords, Firewalls, Digital signatures, Biometrics) Proper Authorizations ( Passwords, Firewalls, Digital signatures, Biometrics) Additional controls of Electronic Documents and Records (sales invoices, purchase orders, subsidiary records, sales journals, employee time cards, checks). Additional controls of Electronic Documents and Records (sales invoices, purchase orders, subsidiary records, sales journals, employee time cards, checks). Physical Control over Assets and Records (IT equipment, Programs, Data Files) Physical Control over Assets and Records (IT equipment, Programs, Data Files) Independent Checks on Performance (including partners) Independent Checks on Performance (including partners)

E-commerce Fraud Detection Data-driven Fraud Detection 1.Understand the business or operations of the organization. 2.Identify what frauds can occur in the operation. 3.Determine the symptoms that the most likely frauds would generate. 4.Use databases and information systems to search for those symptoms.

E-commerce Fraud Detection Data-driven Fraud Detection: 5.Analyze the results. 6.Investigate the symptoms to determine if they are being caused by actual fraud or by other factors.

That’s All Folks! Good luck in your academic, professional and personal endeavors! Good luck in your academic, professional and personal endeavors!