You are on page 1of 1

Chapter 3

1) Business ethics-why we need?


2) Computer ethics-what are the main issues?
3) 2 level of fraud:
 employee fraud
 management fraud
4) Fraud scheme
 Fraudulent statement
 Corruption
 Asset misappropriation
5) Internal control objectives-AICPA
6) Modifying assumptions to IC objectives
7) Limitation of IC
8) Exposures of weak IC
9) 5 IC components COSO model, SAS78
 Control environment
 Risk assessment
 Information and communication
 Monitoring
 Control activities-IT controls
-Physical controls

You might also like