Professional Documents
Culture Documents
Diskusi Kuliah Ke 3.1
Diskusi Kuliah Ke 3.1
Tommie W. Singleton, Ph.D., Somewhere in the career of the IT auditor, he/ 2. TOE IN THE WATER
CISA, CITP, CMA, CPA, is she will come across a piece of evidence of a One theory of fraud suggests that fraudsters
an associate professor of fraud (and possibly not realize it is related to a begin their slippery slope into crime with a
information systems (IS) at fraud), discover a fraud or be asked to assist in a “test.”3 That is, they put together a fraudulent
the University of Alabama at fraud investigation. Thus, one of the basic sets of transaction or event and “float” it out into the
Birmingham (USA), a Marshall knowledge the IT auditor needs is some essential entity’s environment to see if they can get away
IS Scholar and a director information about fraud detection. This article with the fraud. If that first instance gets noticed,
of the Forensic Accounting attempts to identify some of the most important the fraudster usually has a predetermined “excuse”
Program. Prior to obtaining his facts about fraud that are particularly applicable for why it happened, often the “oops, I made a
doctorate in accountancy from to the IT audit function. It is not intended to mistake” defense. If it goes unnoticed, the fraudster
the University of Mississippi be an exhaustive list, but rather five things that usually proceeds to the third item in this list.
(USA) in 1995, Singleton was would assist IT auditors in fulfilling their duties The IT auditor needs to be aware that if
president of a small, value- related to fraud in everyday tasks. These five are he/she finds an unexplained anomaly or variance,
added dealer of accounting not ranked in any particular order. and goes to the party responsible, and that person
IS using microcomputers. says “oops,” there is some probability, no matter
Singleton is also a scholar- 1. Professional Skepticism how small, that it is a “test” transaction. The IT
in-residence for IT audit One of the first things with which IT auditors auditor should exercise due diligence in obtaining
and forensic accounting at need to get comfortable is the realistic view of the independent verification where feasible and
Carr Riggs Ingram, a large scope of fraud. According to the Association of should obtain it before approaching the party
regional public accounting Certified Fraud Examiners (ACFE), the total loss responsible for the transaction, where feasible—
firm in the southeastern US. In from fraud in any one year in the US is between especially where circumstances increase suspicion.
1999, the Alabama Society of 5 and 7 percent of gross revenues, with the latest For example, in one fraud case, the auditor came
CPAs awarded Singleton the statistic estimating total losses in the US economy to the responsible party and asked why a certain
1998-1999 Innovative User of at almost US $1 billion.1 One element of fraud account amount was exactly double what it should
Technology Award. Singleton that seems to occur frequently is the shock from have been. The accounting clerk stuttered, having
is the ISACA academic the victim’s stakeholders that it happened to been surprised, and the auditor himself gave the
advocate at the University their entity. These facts are raision d’être for an person an opportunity to use the “oops” defense,
of Alabama at Birmingham. antifraud program and/or fraud audit for any as he said to her, “You must have accidentally
His articles on fraud, IT/IS, IT entity. So, the conclusion is twofold: Fraud double paid the vendor.” In reality, it was a fraud
auditing and IT governance has a vast scope, and it can happen anywhere. scheme and not an overpayment.
have appeared in numerous Therefore, it is important to be consistent with
publications, including the professional skepticism. 3. ESCALATION OF THE CRIME
ISACA Journal. Also, the fraudster (white-collar criminal) is Most fraudsters who get caught tend to escalate
usually someone that is least suspected. In fact, their crime. This is substantiated by a variety of
fraudsters frequently do not look like crooks at facts. ACFE’s regular Report to the Nation (RTTN),
all. Statistical profiles of white-collar criminals published in 1996, 2002, 2004, 2006 and 2008
describe them as tending to be tenured at the (the 2010 version is currently being conducted),
entity, in a trusted position because they earned shows that, of the three main categories of
the trust of management, and relatively well fraud, there is an overlap in percentages because
educated.2 Again, professional skepticism is fraudsters were conducting frauds in more than one
necessary to prevent one from being fooled, and, broad category. In one year, more than 4 percent
even then, there is a chance a fraudster can get of all frauds discovered and resolved included
away with a crime. asset misappropriation, corruption and financial
statement schemes by the fraudster.