Professional Documents
Culture Documents
Course Lecturer:
MAYLIA PRAMONO SARI, S.E., M.Si.
Arranged by:
Amelya Wiji Puspita (7211421191)
Nethania Ardelia R. Siahaan (7211421214)
Ridho Satrio Utomo (7211421215)
Maria Putri Kallisia (7211421217)
Amanda Yudhanti Wibowo (7211421222)
ACCOUNTING MAJOR
FACULTY OF ECONOMICS
UNIVERSITAS NEGERI SEMARANG
2022
A. INTRODUCTION TO FRAUD
Fraud is gaining an unfair advantage over another person. Legally, for an act to be
fraudulent there must be:
1. A false statement, representation, or disclosure
2. A material fact
(which is something that induces a person to act)
3. An intent to deceive
4. A justifiable reliance
(that is, the person relies on the misrepresentation to take an action)
5. An injury or loss suffered by the victim
Most fraud perpetrators are knowledgeable insiders with the requisite access, skills,
and resources. Because employees understand a company’s system and its weaknesses,
they are better able to commit and conceal a fraud. The controls used to protect corporate
assets make it more difficult for an outsider to steal from a company. Fraud perpetrators
are often referred to as white-collar criminals.
There are several types of fraud, including:
1. Corruption is dishonest conduct by those in power and it often involves actions
that are illegitimate, immoral, or incompatible with ethical standards. There are
many types of corruption; examples include bribery and bid rigging.
2. Investment fraud is misrepresenting or leaving out facts in order to promote an
investment that promises fantastic profits with little or no risk. There are many
types of investment fraud; examples include Ponzi schemes and securities fraud.
a. MISAPPROPRIATION OF ASSETS
Misappropriation of assets is the theft of company assets by employees. The most
significant contributing factor in most misappropriations is the absence of internal
controls and/or the failure to enforce existing internal controls.
A typical misappropriation has the following important elements or characteristics.
The perpetrator:
1. Gains the trust or confidence of the entity being defrauded.
2. Uses trickery, cunning, or false or misleading information to commit fraud.
3. Conceals the fraud by falsifying records or other information.
4. Rarely terminates the fraud voluntarily.
5. Sees how easy it is to get extra money; need or greed impels the person to
continue. Some frauds are self-perpetuating; if perpetrators stop, their actions are
discovered.
6. Spends the ill-gotten gains.
Rarely does the perpetrator save or invest the money. Some perpetrators come to
depend on the “extra” income, and others adopt a lifestyle that requires even
greater amounts of money. For these reasons, there are no small frauds, only large
ones that are detected early.
7. Gets greedy and takes ever-larger amounts of money at intervals that are
more frequent, exposing the perpetrator to greater scrutiny and increasing
the chances the fraud is discovered.
8. Grows careless or overconfident as time passes.
If the size of the fraud does not lead to its discovery, the perpetrator eventually
makes a mistake that does lead to the discovery.
The ACFE found that an asset misappropriation is 17 times more likely than
fraudulent financial reporting but that the amounts involved are much smaller. As a
result, auditors and management are more concerned with fraudulent financial
reporting even though they are more likely to encounter misappropriations. The
following section discusses an auditors’ responsibility for detecting material fraud.
C. COMPUTER FRAUD
Computer fraud is any fraud that requires computer technology to perpetrate it. Examples
include:
Unauthorized theft, use, access, modification, copying, or destruction of software,
hardware, or data
Theft of assets covered up by altering computer records
Obtaining information or tangible property illegally using computer
2. PROCESSOR FRAUD
Processor fraud includes unauthorized system use, including the theft of
computer time and services. For example: An insurance company installed
software to detect abnormal system activity and found that employees were
using company computers to run an illegal gambling website.
5. OUTPUT FRAUD
Unless properly safeguarded, displayed or printed output can be stolen,
copied, or misused. A Dutch engineer showed that some monitors emit
television-like signals that, with the help of some inexpensive electronic gear,
can be displayed on a television screen. Under ideal conditions, the signals
can be picked up from monitors two miles away. One engineer set up
equipment in the basement of an apartment building and read a monitor on
the eighth floor. Fraud perpetrators use computers to forge authentic-looking
outputs, such as a paycheck. A fraud perpetrator can scan a company
paycheck, use desktop publishing software to erase the payee and amount,
and print fictitious paychecks. Losses to check fraud in the United States total
more than $20 billion a year.
b. MALWARE
It is any software intentionally designed to cause disruption or harm to a
computer, server, client, or computer network, leak private information, gain
unauthorized access to information or systems, deprive users access to
information or which unknowingly interferes with the user’s computer security
and privacy. Most malware is the result of installation or injection by a remote
attacker. It is spread using several approaches, including shared access to files, e-
mail attachments, and remote access vulnerabilities. (There are 75 million unique
pieces of malware in the database of McAfee, a leading cyber security company.
It is estimated that more than 15 million new malware samples are created each
calendar year). Examples are :
1. Computer virus is a segment of self-replicating, executable code that
attaches itself to a file or program. During its replication phase, the virus
spreads to other systems when the infected file or program is downloaded or
opened by the recipient. Newer viruses can mutate each time they infect a
computer, making them more difficult to detect and destroy.
2. Computer worm is a self-replicating computer program similar to a virus,
with some exceptions
A virus is a segment of code hidden in or attached to a host program or
executable file, whereas a worm is a stand-alone program.
A virus requires a human to do something (run a program, open a file,
etc.) to replicate itself, whereas a worm does not and actively seeks to
send copies of itself to other network devices.
Worms harm networks (if only by consuming bandwidth), whereas
viruses infect or corrupt files or data on a targeted computer
3. Spyware software secretly monitors and collects personal information about
users and sends it to someone else. The information is gathered by logging
keystrokes, monitoring websites visited, and scanning documents on the
computer’s hard drive.
4. Trojan horse is a set of malicious computer instructions in an authorized and
otherwise properly functioning program.
5. Bluebugging is taking control of someone else’s phone to make or listen to
calls, send or read text messages, connect to the Internet, forward the victim’s
calls, and call numbers that charge fees. These attacks will become more
popular as phones are used to pay for items purchased. When a hacker wants
something, all he will have to do is bluebug a nearby phone and make a
purchase.