Chapter 14 Internal Control, Corporate Governance, and Ethics.

Slides:



Advertisements
Similar presentations
Fraud and Internal Control Presented by Andy Harper Pugh & Company, P.C. April 28, 2011.
Advertisements

FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
Fraudulent Financial Reporting and Forensic Accounting Presented by: Victor Hieken, UHY Advisors Jeffrey Streif, UHY Advisors.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Fraud Auditing Chapter 11.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Ethical issues in Accounting & Finance
1 Fraud Management’s Responsibility Auditor’s Consideration.
Chapter 6-1 The Islamic University of Gaza Accounting Information System Ethics, Fraud and Internal Control Dr. Hisham Madi.
McGraw-Hill/Irwin ©2007 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Management Fraud and Audit Risk "It takes 20 years to build a.
Management Fraud and Audit Risk
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
SAS 99: Consideration of Fraud in a Financial Statement Audit Based upon AICPA 2003 overview available at
Presented By: Donna Denker, CPA Donna Denker & Associates.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Ethics in Finance PGDM-Session 7.
Chapter 4 Risk Assessment.
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
ETHICS, FRAUD AND INTERNAL CONTROL Pertemuan_5 Mata kuliah : CSP402, IT GOVERNANCE Tahun Akademik : 2012/2013 Outlines the roles of Information Technology.
Chapter 10 Incentive Issues IDIS 364 – Spring 2007.
04. Internal Control Over Transactions Pertemuan Matakuliah: Manajemen Kinerja Sistem Komputer Tahun: Feb
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Case 6.3 WorldCom Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill.
Ethics in Finance.
Computer Security Management: Assessment and Forensics Session 8.
Ensuring the Integrity of Financial Information Ensuring the Integrity of Financial Information C H A P T E R 5.
Ethics, Fraud, and Internal Control
The Audit as a Management Tool Vermont State Auditor’s Office – April 2009.
Chapter 3 Ethics, Fraud, and Internal Control Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
Chapter 14 Internal Control and the Prevention of Fraud.
Forensic and Investigative Accounting Chapter 3 Fraudulent Financial Reporting © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
Learning Objectives LO1 Differentiate among frauds, errors, and illegal acts that might occur in an organization. LO2 Explain the auditing standards related.
Assessing Financial Statement Risks and Internal Controls
Chapter 10 Auditing the Revenue Process McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Case 6.5 Qwest Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill.
Managerial Accounting: An Introduction To Concepts, Methods, And Uses Chapter 14 Incentive Issues Maher, Stickney and Weil.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
© 2003 by the AICPA SAS 99: Consideration of Fraud in a Financial Statement Audit.
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Experience perspective // CPAs & ADVISORS CLUB FINANCIAL MANAGEMENT BEST PRACTICES Presented by Rick Wittgren, CPA, partner.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
1 Chapter 2 Corporate Governance and Ethics. 2 Introduction Companies need strong corporate governance and sound ethical practices: Scandals cause the.
Fraud Examination, 3E Chapter 14: Fraud Against Organizations COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Types of fraud Fraudulent Financial Reporting—An intentional misstatement or omission of amounts or disclosures with the intent to deceive users. Most.
Internal Control Procedures
My Notes.
Audit Planning and Analytical Procedures
Professor Eric Carstensen
Chapter 12: Fraud Schemes & Fraud Detection
2019/8/2 Topic 13 : Frauds 2019/8/2 Week 1.
Presentation transcript:

Chapter 14 Internal Control, Corporate Governance, and Ethics

Introduction Reasons for increased risk of fraud:  The size of corporations  Globalization  Reduced stability in the workforce  Reduction in corporate loyalty  Increased computerization of accounting systems  Growing reliance on the Internet

Fraud Defined as a knowingly false representation of a material fact made by a party with the intent to deceive and induce another party to justifiably rely on the representation to his or her detriment.

Fraudulent Financial Reporting Intentional misstatement of or omission of material, very significant information from a company’s financial statements.

Management Fraud Typically the result of pressure on management to report good operating results. Commonly involves  improper revenue recognition  overstating assets  understating liabilities

Misappropriation of Assets  Involves the theft of a company’s assets.  Usually committed by lower-level employees.  Usually involves small amounts that do not impact the financial statements.  Usually involves cash, inventory, fixed assets.  Kiting  Lapping  Expense Accounts

The Fraud Triangle Situational Pressures & Incentives Opportunities Personal Characteristics & Attitudes

Internal Control Internal Control: The policies and procedures that provide reasonable assurance that a company’s goals and objectives will be achieved. Comprised of five elements: 1. The control environment. 2. Risk assessment 3. Control activities 4. Information and communication 5. Monitoring

Control Activities  Segregation of Duties  Transaction Authorization  Safeguarding of Assets  Independent Reviews of Work

The Impact of Information Technology on Internal Control Threats in an E-Information Technology- Intensive Environment Internet-based business False Web sites posing as selling agents Insider perpetrators Perpetrators intercepting credit card information, messages, company data Perpetrators sending false messages Data destruction, viruses, rerouting messages, altering data Fictitious customers posing as legitimate customers Denial-of-service attacks

Corporate Governance Embodied in the processes that companies use to promote:  Corporate fairness  Complete and accurate financial disclosures  Management accountability

The Need for Ethics  Ethics Programs  Codes of Ethics  Purposes of codes of ethics  Writing codes of ethics  Responding to Ethics Violations

End of Chapter 14