You are on page 1of 7

Reviewer:  Justice- the benefits of the decision should be

distributed fairly to those who share risks. This


Ethics Fraud and Internal Control
who do not benefit should not carry the burden
Ethical Issues in Business:
of risk
 Business Ethics  Minimize risk- even if judged acceptable by the
 Computer Ethics principles, the decision should be implemented
 Sarbanes-Oxley Act and Ethical Issues so as to minimize all the risks and avoid any
unnecessary risks.
Ethical Issues in Business
Computer Ethics- the analysis of the nature and
Ethical Standards- are derived from societal mores and social impact of computer technology and the
deep-rooted personal beliefs about issues of right and corresponding formulation and justification of
wrong that are not universally agreed upon policies for ethical use of such technology.
Ethics- pertains to the principles of conduct that Computer Ethics:
individuals use in situations that involve the concepts of
right and wrong Three level of computer ethics
 Pop- simply the exposure to stories
Business Ethics- it involves in finding the answers to two and reports found in the popular
questions media regarding the good and bad
1. How do managers decide what is right in ramifications of computer
conducting their business? technology
2. Once managers have recognized what is right,
how do they achieve it?  Para- involves taking a real interest
in computer ethics cases and
Ethical Issues in business can be divided into four areas: acquiring some level of skill and
 Equity knowledge in the field
 Rights
 Honesty
 Theoretical -interest to multi-
Table 3-1 ETHICAL ISSUES IN BUSINESS disciplinary researchers who apply
the theories of philosophy,
sociology, and psychology to
computer science with the goal of
bringing some new understanding
to the field

Privacy- people desire to be in full control of what and


how much information about themselves is available

Security (Accuracy and Confidentiality)- security


systems attempt to prevent fraud and other misuse of
Making Ethical Decision computer systems, they act to protect and further the
legitimate interests of the system’s constituencies
o business organization have conflicting
responsibilities to their employees, shareholder, Ownership of Property- copyright laws have been
customers, and the public. invoked in an attempt to protect those who develop
o Every major decision has consequences that software from having it copied
potentially harm or benefit these constituents Equity in Access- some barriers to access are intrinsic to
Proportionality- the benefit from a decision must the technology of information systems, but some are
outweigh the risks avoidable through careful system design
Environmental Issues: Employee fraud- fraud by non-management employees.
Generally designed to directly convert cash or other
Computers with high-speed printers allow for the
assets to the employee’s personal benefit
production of printed documents faster than ever
before. Management Fraud- is more insidious. It often escapes
detection until the organization has suffered irreparable
-it may be more efficient and more comforting to have a
damage or loss
hardcopy in addition to the electronic version. However,
paper comes from trees, precious natural resources, THREE SPECIAL CHARACTERISTICS OF FRAUD
and ends up in land fills if not properly recycled.
1. The fraud is perpetrated at levels of
Unemployment and Displacement- many jobs have management above the one to which internal
been and are being changed as a result of the control structures generally relate
availability of computer technology. People unable or 2. The fraud frequently involves using the financial
unprepared to change are displaced statements to create an illusion that an entity is
healthier and more prosperous than it is.
Misuse of Computers- examples are
3. Involves misappropriation of assets, it
 Copying of proprietary software frequently is shrouded in a maze of complex
 Using company for personal benefit business transactions, often involving third
 Snooping through people’s files parties

SARBANES-OXLEY ACT and ETHICAL ISSUES Fraud Triangle- consists of three factors that contribute
to or are associated with management and employee
o Named after Senator Paul Sarbanes, D-Md., and fraud:
Congressman Michael Oxley, R-Ohio.
o Also called SarbOx or SOX 1. Situational pressure- includes personal or job-
o Became law on July 30, 2002 related stresses that could coerce an individual
o Federal law that established sweeping auditing to act dishonestly
and financial regulations for public companies. 2. Opportunity- involves direct access to assets
o It helps protect shareholders, employees and and/or access to information that controls
assets
the public from accounting errors and
3. Ethics- pertains to one’s character and degree
fraudulent financial practices
of moral opposition to acts of dishonesty
Fraud and Accountants

Fraud- false representation of a material fact made by


one party to another party with the intent to deceive
and induce the other party to justifiably rely on the fact
to his/her detriment

o Aka. White-collar crime, defalcation,


embezzlement, and irregularities

5 Conditions of Fraud:

o False representation
o Material Fact
o Intent
o Justifiable reliance
o Injury/loss

LEVELS OF FRAUD:
The Underlying Problems

o Lack of auditor independence


o Auditing firms that are also engaged by
their clients to perform non-accounting
activities
o Ex. Enron’s auditors-Arthur Andersen-
were also their internal auditors and
their management consultants

o Lack of Director Independence


o Directors who have a personal
relationship
 By serving on the boards of
other director’s companies
 Have a business trading
relationship as key customers
or suppliers of the company
 Have a financial relationship as
primary stockholders or have
received personal loans from
the company
 Have an operational
relationship as employees of
the company
o Questionable Executive Compensation
Schemes
o Fewer stock options should be offered
than currently is the practice
o Inappropriate Accounting Practices
o Use of special-purpose entities to hide
Fraud Schemes: liabilities through off-balance-sheet
1. Fraudulent Statements- this type of fraud accounting
scheme, the statement itself must bring direct 2. Corruption- involves an executive, manager, or
or indirect financial benefit to the perpetrator employee of the organization in collusion with
o For example- misstating the cash account an outsider
balance to cover the theft of cash is NOT - Collusion meaning:
financial statement fraud. On the other hand, secret or illegal
understating liabilities to present a more cooperation or
favorable financial picture of the organization to conspiracy, especially in
drive up stock prices DOES FALL to this order to cheat or
classification. deceive others.

4 principal types:

o Bribery- involves giving, offering, soliciting, or


receiving things of value to influence an official
in the performance of his or her lawful duties
o Illegal gratuities – involves giving, receiving, o Expense Reimbursements- are schemes
offering, or soliciting something of value in which an employee makes a claim for
because of an official act that has been taken reimbursement of fictitious or inflated
o Conflicts of interest – occurs when an business expenses.
employee acts on behalf of a third party during o For example, a company sales
discharge of his or her duties or has self-interest person files false expenses
in the activity being performed reports, claiming meals,
o Economic extortion- is the use (or threat) of lodging, and travel that never
force (including economic sanctions) by an occurred
individual or organization to obtain something o Theft of cash- are schemes that involve
of value the direct theft of cash on hand in the
organization
o Non-cash misappropriations- schemes
that involve the theft of misuse of the
victim organization’s non-cash assets.
o One example of this is a
warehouse clerk who steals
inventory from a ware-house or
3. Asset Misappropriation- assets are either storeroom
directly or indirectly diverted to the
Computer Fraud- computers lie in the heart of modern
perpetrator’s benefit
accounting information systems, and the topic of
Examples:
computer fraud is of importance to auditors
o Skimming- involves stealing of cash
from the organization before it is Internal Control Concepts and Techniques
recorded on the organization’s books
a. To safeguard assets of the firm
and records
b. To ensure the accuracy and reliability of
o Cash larceny- involves schemes in
accounting records and information
which cash receipts are stolen from an
c. To promote the efficiency in the firm’s
organization after they have been
operations
recorded in the organization’s books
d. To measure compliance with
and records.
management’s prescribed policies and
o Billing schemes- a.k.a vendor fraud, are
procedures
perpetrated by employees who causes
their employer to issue a false supplier Modifying Assumptions
or vendor by submitting invoices for
o Management responsibility-the establishment
fictitious goods and services, inflated
and maintenance of a system of internal control
invoices, or invoices for personal
is the responsibility of the management.
purchases
o Reasonable assurance- the cost of achieving
o SHELL COMPANY
the objective of internal controls should not
o PASS THROUGH FRAUD
outweigh its benefits
o PAY-AND-RETURN
o Methods of data processing- The techniques of
o Check tampering -Involves forging or
achieving the objectives will vary with different
changing in some material way a check
types of technology
that the organization has written to a
o Limitations- the techniques of achieving the
legitimate payee
objectives will vary with the different types of
o Payroll- the distribution of fraudulent
technology
paychecks to existent and or non-
existent employees LIMITATIONS OF INTERNAL CONTROLS
 Possibility of honest errors o These are actions taken to reverse the
 Circumvention via collusion effects of errors detected in the
 Management override previous step
 Changing condition—especially in companies
SAS 78/ COSO
with high growth
Describes the relationship between the firm’s…
Exposures of Weak Internal Controls (Risk)
o Internal control structure
 Destruction of asset
o Auditor’s assessment of risk
 Theft of an asset
o The planning of audit procedures
 Corruption of information
 Disruption of the information System “The weaker the internal control structure, the higher
the assessed level of risk; the higher the risk, the more
auditor procedures applied in the audit”

5 INTERNAL CONTROL COMPONENTS SAS 78/COSO

1. Control environment
o Integrity and ethics of
management
o Organizational structure
o Role of the board of directors
and the audit committee
o Management’s policies and
philosophy
o Delegation of responsibility and
authority
o Performance evaluation
measures
o External influences- regulatory
agencies
o Policies and practices managing
human resources
2. Risk assessment
o Identify, analyze and manage
The Preventive-Detective-Corrective Internal Control risks relevant to financial
Model reporting:
o Changes in external
o Preventive controls
environment
o It forces compliance with prescribed or
o Risky foreign markets
desired actions and thus screen out
o Significant and rapid
aberrant (departing from an accepted
growth that strain
standard) events
internal controls
o Detective Controls
o New product lines
o These are devices, techniques, and
o Restructuring,
procedures designed to identify and
downsizing
expose undesirable events that elude
o Changes in accounting
preventive controls
o Corrective Controls policies
3. Information and communication
a. The AIS should produce high a. Examples: controls over sales order
quality information which processing, accounts payable, and
i. Identifies and records all payroll applications
valid transactions
Six Types of Physical Controls
ii. Provides timely
information in 1. Transaction Authorization
appropriate detail to o Used to ensure that employees are carrying out
permit proper only authorized transactions
classification and o General (everyday procedures) or specific (non-
financial reporting routine transactions) authorizations
iii. Accurately measures the o The rules are often embedded within computer
financial transactions programs.
iv. Accurately records o EDI/JIT: Automated re-ordering of
transactions in the time inventory without human intervention
period in which they (Basis: Instructional material 2)
occurred 2. Segregation of Duties
4. Monitoring- the process for assessing  A computer program may perform many
the quality of internal control design tasks that are deemed incompatible. Thus
and operation the crucial need to separate program
a. Ongoing monitoring: development, program operations, and
i. Computer modules program development
integrated into routine o In manual systems, separation between
operations o Authorizing and processing a
ii. Management reports transaction
which highlight trends o Custody and record-keeping of the
and exception from
asset
normal performance
o Subtask
5. Control Activities- policies and
3. Supervision
procedures to ensure that the
o The ability to asses competent
appropriate actions are taken in
employees becomes more challenging
response to identified risks
due to the greater technical knowledge
a. Fall into 2 distinct categories:
required
i. IT Controls- relate
o A compensation for lack of segregation;
specifically to the
some may be built into computer
computer environment
systems
ii. Physical controls-
o An underlying assumption of
primarily pertain to
supervision control is that the firm
human activities
employs competent and trustworthy
TWO TYPES OF IT CONTROLS: personnel. The competent and
trustworthy employee assumption
1. General Control- pertain to the entity-wide
promotes supervisory efficiency
computer environment
4. Accounting records
a. Examples: controls over data center,
o The accounting records of an
organization databases, systems
organization consist of source
development, and program
documents, journals, and ledgers. These
maintenance
records capture the economic essence
2. Application controls- ensure the integrity of
of transactions and provide and audit
specific systems
trail of economic events
o Audit trail
5. Access Controls
o Data consolidation exposes the
organization to computer fraud and
excessive losses from disaster
o Help to safeguard assets by restricting
physical access to them
6. Independent Verification
o When tasks are performed by the
computer rather than manually, the
need for an independent check is not
necessary. However the program
themselves are checked.
o Reviewing batch totals or reconciling
subsidiary accounts with control
accounts
o Through independent verification
procedures, management can access:
i. The performance of individuals
ii. The integrity of the transaction
processing system
iii. The correctness of data
contained in accounting records

You might also like