Professional Documents
Culture Documents
Accounting Information
Accounting Information
Natural Disasters and Terrorist Threats Establish environment which supports the integrity of the
Software Errors and/or Equipment Malfunction financial reporting process.
Unintentional Acts (Human Error) Identification of factors that lead to fraud
Intentional Acts (Computer Crimes) Assess the risk of fraud within the company
Design and implement internal controls to provide assurance
FRAUD: individuals who commit fraud are referred to as white-collar
that fraud is being prevented.
criminals.
SAS #99:
Gaining an unfair advantage over another person.
o A false statement, representation, or disclosure Auditors Responsibility to detect fraud
o A material fact that induces a person to act o Understand fraud
o An intent to deceive o Discuss risk of material fraudulent statements
o A justifiable reliance on the fraudulent fact in which a Among members of audit team
person takes action o Obtain Information
o An injury or loss suffered by the victim Look for fraud risk factors
o Identify, assess, and respond to risk
Forms of Fraud: o Evaluate the results of audit tests
Misappropriation of Assets Determine impact of fraud on financial
o Theft of a companies assets statements
o Largest factors for theft of assets o Document and communicate findings
Absence of internal control system See chapter 3
Failure to enforce internal control system o Incorporate a technological focus
o Fraudulent Financial Reporting
FRAUD TRIANGLE:
“intentional or reckless conduct, whether by act
or omission, that results in materially misleading Pressure- motivation or incentive to commit fraud
financial statements” (The Treadway o Types:
Commission) Employee
Financial
Reasons for Fraudulent Financial Statements
Emotional
Deceive investors or creditors Lifestyle
Increase a company’s stock price Financial
Meet cash flow needs Industry Conditions
Hide company losses or other problems Management Characteristics
Opportunity- condition or situation that allows a person or Computer Instructions Fraud- modifying software, illegal
organization to: copying of software, using software in an unauthorized
o Commit the fraud manner, creating software to undergo unauthorized activities.
o Conceal the fraud Data Fraud- illegally using, copying, browsing, searching, or
Lapping harming company data.
Kiting Output Fraud- stealing, copying, or misusing computer
o Convert the theft or misrepresentation to personal gain printouts or displayed information.
Rationalizations- justification of illegal behavior
COMPUTER ATTACKS AND ABUSE:
o Justification
I am not being dishonest Hacking- unauthorized access, modification, or use of a
o Attitude computer system or other electronic device.
I don’t need to be honest Social Engineering- techniques, usually psychological tricks,
o Lack of Personal Integrity to gain access to sensitive data or information
Theft is valued higher than honesty or integrity o Used to gain access to secure systems or locations
Malware- any software which can be used to do harm.
Computer Fraud: any illegal act in which knowledge of computer
technology is necessary for: Types of Computer Attacks: