Professional Documents
Culture Documents
Business Ethics
Ethics pertains to the principles of conduct that individuals use in making choices and guiding their
behavior in situations that involve the concepts of right and wrong.
Justice. The benefits of the decision should be distributed fairly to those who share the risks. Those
who do not benefit should not carry the burden of risk.
Minimize risk. Even if judged acceptable by the principles, the decision should be implemented so as
to minimize all of the risks and avoid any unnecessary risks.
Computer Ethics
Computer ethics is “the analysis of the nature and social impact of computer technology and the
corresponding formulation and justification of policies for the ethical use of such technology… [This
includes] concerns about software as well as hardware and concerns about networks connecting
computers as well as computers themselves.
Employee fraud
Is generally designed to directly convert cash or other assets to the employee’s personal benefit
Management fraud
This does not involve the direct theft of assets. Top management may engage in fraudulent
activities to drive up the market price of the company’s stock. This may be done to meet investor
expectations or to take advantage of stock options that have been loaded into the manager’s
compensation package.
Fraud Schemes
1. Fraudulent Statements
The Underlying Problems.
o Lack of Auditor Independence.
o Lack of Director Independence.
o Questionable Executive Compensation Schemes.
o Inappropriate Accounting Practices.
2. Corruption
Bribery.
Involves giving, offering, soliciting, or receiving things of value to influence an official in the
performance of his or her lawful duties.
Illegal Gratuities.
An illegal gratuity involves giving, receiving, offering, or soliciting something of value
because of an official act that has been taken. This is similar to a bribe, but the transaction
occurs after the fact.
Conflicts of Interest.
Occurs when an employee acts on behalf of a third party during the discharge of his or her
duties or has self-interest in the activity being performed.
Economic Extortion.
Economic extortion is the use (or threat) of force (including economic sanctions) by an
individual or organization to obtain something of value.
3. Asset Misappropriation
Charges to Expense Accounts.
The theft of an asset creates an imbalance in the basic accounting equation (assets =
equities), by charging the asset to an expense account and reduce equity by the same
amount
Lapping.
Lapping involves the use of customer checks, received in payment of their accounts, to
conceal cash previously stolen by an employee.
Transaction Fraud.
Transaction fraud involves deleting, altering, or adding false transactions to divert assets
to the perpetrator.
Computer Fraud Schemes.
It involves technical fraud targeting the computer where AIS systems rely.
o Program Fraud
(1) Creating illegal programs that can access data files to alter, delete, or insert
values into accounting records
(2) Destroying or corrupting a program’s logic using a computer virus; or
(3) Altering program logic to cause the application to process data incorrectly.
o Operations fraud
It is the misuse or theft of the firm’s computer resources. This often involves
using the computer to conduct personal business.
o Eavesdropping
This involves listening to output transmissions over telecommunications lines.
Modifying Assumptions
1. Management Responsibility.
2. Reasonable Assurance.
3. Methods of Data Processing.
4. Limitations.