2) Computer ethics-what are the main issues? 3) 2 level of fraud: employee fraud management fraud 4) Fraud scheme Fraudulent statement Corruption Asset misappropriation 5) Internal control objectives-AICPA 6) Modifying assumptions to IC objectives 7) Limitation of IC 8) Exposures of weak IC 9) 5 IC components COSO model, SAS78 Control environment Risk assessment Information and communication Monitoring Control activities-IT controls -Physical controls