Professional Documents
Culture Documents
Review Questions:
1. What is ethics?
Response: Ethics pertains to the principles of conduct that individuals
use in making choices and guiding their behavior in situations that
involve the concepts of right and wrong.
2. What is business ethics?
Response: Business ethics involves finding the answers to two
questions:
(1) How do managers decide what is right in conducting their business?
(2) Once managers have recognized what is right, how do they achieve
it?
3. What are the four areas of ethical business issues?
Response: equity, rights, honesty, and the exercise of corporate power
4. What are the main issues to be addressed in a business code of
ethics required by the Securities and Exchange Commission?
Response: conflicts of interest, full and fair disclosures, legal
compliance, internal reporting of code violations, and accountability
5. What are three ethical principles that may provide some
guidance for ethical responsibility?
Response: proportionality, justice, and minimization of risk
1
6. What is computer ethics?
Response: Computer ethics is “the analysis of the nature and social
impact of computer technology and the corresponding formulation and
justification of policies for the ethical use of such technology..
7. How do the three levels of computer ethics—pop, para, and
theoretical—differ?
Response: The lowest level of computer ethics—pop—merely reflects
the exposure to stories and reports regarding the ramifications of
computer technology, such as computer viruses (bad ramifications) and
educational enhancements for handicapped individuals (good
ramifications).
The next level—para—requires a little more involvement in learning
about computer ethics cases and acquiring some skill and knowledge in
ethics issues.
The third level— theoretical—involves application of the theories of
philosophy, sociology, and psychology to computer science with the
hope that new understanding in the field can be achieved.
8. Are computer ethical issues new problems, or just a new twist
on old problems?
Response: Computer ethical issues are considered to be new problems
by those groups that feel that intellectual property is not the same as real
property. However, other groups feel that the same generic principles
should apply. No agreement between these two groups has been reached.
9. What are the computer ethical issues regarding privacy?
2
Response: People desire to be in full control of what and how much
information about themselves is available to others, and to whom it is
available. This is the issue of privacy.
The creation and maintenance of huge, shared databases make it
necessary to protect people from the potential misuse of data. This raises
the issue of ownership in the personal information industry. Should the
privacy of individuals be protected through policies and systems? What
information about oneself does the individual own? Should firms that
are unrelated to individuals buy and sell information about these
individuals without their permission?
10. What are the computer ethical issues regarding security?
Response: Computer security is an attempt to avoid such undesirable
events as a loss of confidentiality or data integrity.
Security systems attempt to prevent fraud and other misuse of computer
systems; they act to protect and further the legitimate interests of the
system’s constituencies. The ethical issues involving security arise from
the emergence of shared, computerized databases that have the potential
to cause irreparable harm to individuals by disseminating inaccurate
information to authorized users, such as through incorrect credit
reporting. There is a similar danger in disseminating accurate
information to persons unauthorized to receive it. However, increasing
security can actually cause other problems. For example, security can be
used both to protect personal property and to undermine freedom of
access to data, which may have an injurious effect on some individuals.
3
11. What are the computer ethical issues regarding ownership of
property?
Response: Laws designed to preserve real property rights have been
extended to cover what is referred to as intellectual property, that is,
software.
The question here becomes what can an individual (or organization)
own? Ideas? Media? Source code? Object code? A related question is
whether or not owners and users should be constrained in their use of or
access to software. This includes making copies or placing software on a
network to permit multiple access. Some believe that copyright laws can
cause more harm than good. For example, the League for Programming
Freedom argues that copyrights for software fly in the face of the
original intent of the law. It feels that the best interests of computer users
are served when industry standards emerge; copyright laws work to
disallow this. Part of the problem arises out of the uniqueness of
software, its ease of dissemination, and the possibility of exact
replication. Does software fit with the current categories and
conventions regarding ownership?
12. What are the computer ethical issues regarding equity in access?
Response: Some barriers to access (security systems) are intrinsic to
the technology of information systems, but some are avoidable
through careful system design.
Factors that can limit access to computing technology include: financial
cost, cultural barriers, and physical limitations (blindness, paralysis, and
pregnancy). How can hardware and software be designed with
consideration for differences in physical and cognitive skills? What is
4
the cost involved with providing equity in access? To what groups of
society should equity in access become a priority?
13. What are the computer ethical issues regarding the
environment?
Response: Increased computing and the low cost of fast-speed
printers have caused many users to print out more hard copies of
documents than is really necessary.
Because paper is not usually considered a high-cost item, most firms
have not looked at this as a cost/benefit issue; however, perhaps they
should from an environmental viewpoint. Also, of growing importance
is the issue that disposal of obsolete computer hardware creates
environmental risks and concerns.
14. What are the computer ethical issues regarding artificial
intelligence?
Response: One issue is the responsibility for the completeness and
accuracy of a knowledge base, as well as its maintenance to reflect
changes.
Further, where does the knowledge come from? This issue becomes of
particular importance when expert systems replace the tasks of middle
managers, many of whom may have been used during the knowledge
acquisition phase. Thus, an important issue is who owns the coded
expertise. Also, what are the legal ramifications if an expert system
makes an error or if a decision made by an expert system is not
followed?
5
15. What are the computer ethical issues regarding unemployment
and displacement?
Response: The nature of most jobs is changing as a result of computer
technology. In many cases, certain occupations are becoming rare. The
issue is whether employers should assume the responsibility of
retraining employees.
16. What are the computer ethical issues regarding misuse of
computers?
Response: The computer ethical issues regarding misuse of computers
are the copying of proprietary software, using a company’s computer for
personal benefit, and snooping through other people’s files.
Should employees be allowed to do personal work on the company
computer after work hours? Does this additional use impinge on the
rights of the software company? If the employee does not have to buy
hardware and/or software for him or herself, then an ethical issue arises
regarding potential lost profits to the industries selling these products.
17. What is the objective of Statement on Auditing Standards No.
99?
Response: The objective of SAS 99 is to seamlessly blend the auditor’s
consideration of fraud into all phases of the audit process. In addition,
SAS 99 requires the auditor to perform new steps such as a
brainstorming during audit planning to assess the potential risk of
material misstatement of the financial statements from fraud schemes.
18. What are the five conditions that constitute fraud under
common law?
6
Response:
a. false representation
b. material fact
c. intent
d. justifiable reliance
e. injury or loss
19. Name the three fraud-motivating forces?
Response:
a. situational pressure. opportunities. ethics.
20. What is employee fraud?
Response:
Employee fraud is an act committed by nonmanagement employees. It
is generally designed to directly convert cash or other assets to the
employee’s personal benefit.
Employee fraud usually involves three
steps: (1) stealing something of value (an asset),
(2) converting the asset to a usable form (cash), and
(3) concealing the crime to avoid detection
21. What is management fraud?
Response: Management fraud is committed by managers who are not
subject to the same controls as employees.
7
This fraud more insidious than employee fraud because it often escapes
detection until the organization has suffered irreparable damage or loss.
Management fraud typically contains three special characteristics:
1. The fraud is perpetrated at levels of management above the one to
which internal control structures generally relate.
2. The fraud frequently involves using the financial statements to create
an illusion that an entity is healthier and more prosperous than, in fact, it
is.
3. If the fraud involves misappropriation of assets, it frequently is
shrouded in a maze of complex business transactions, often involving
related third parties.
22. What three forces constitute the triangle of fraud?
Response: a. situational pressures.
b. available opportunities.
C. ethics (personal characteristics).
23. How can external auditors attempt to uncover motivations for
committing fraud?
Response: Research by forensic experts and academics has shown that
the auditor’s evaluation of fraud is enhanced when the fraud triangle
factors are considered.
Obviously, matters of ethics and personal stress do not lend themselves
to easy observation and analysis. To provide insight into these factors,
auditors often use a red-flag checklist consisting of the following types
of questions:
8
Do key executives have unusually high personal debt?
Do key executives appear to be living beyond their means?
Do key executives engage in habitual gambling?
Do key executives appear to abuse alcohol or drugs?
Do any of the key executives appear to lack personal codes of ethics?
Are economic conditions unfavorable within the company’s industry?
Does the company use several different banks, none of which sees the
company’s entire financial picture?
Do any key executives have close associations with suppliers?
Is the company experiencing a rapid turnover of key employees, either
through resignation or termination?
Do one or two individuals dominate the company?
24. What is lapping?
Response: Lapping involves a cash receipts clerk stealing customer
payments that are in the form of checks, by cashing the check him/
herself.
Many employees view this as borrowing, since they plan to repay it
some day. Lapping of accounts receivable works as follows: Period 1:
Cashier receives $1000 from ABC Company and keeps it. Period 2:
Cashier receives $1000 from XYZ Company and credits ABC
Company’s accounts receivable account. Period 3: Cashier receives
$1000 from JKL Company and credits XYZ Company’s accounts
receivable account. At any given time, accounts receivable is overstated
9
by $1000, as well as cash. The employee keeps “lapping” the accounts,
so a customer will not receive a delinquent bill notice.
10
Response: Economic extortion is the use (or threat) of force (including
economic sanctions) by an individual or organization to obtain
something of value.
The item of value could be a financial or economic asset, information,
or cooperation to obtain a favorable decision on some matter under
review.
Multiple choice
1. Management can expect various benefits to follow from implementing
a system of strong internal control. Which of the following benefits is
least likely to occur?
b. Prevention of employee collusion to commit fraud.
13
4. To conceal the theft of cash receipts from customers in payment of
their accounts, which of the following journal entries should the
bookkeeper make?
d. DR: Sales Return, CR: Accounts Receivable.
5. .Which of the following controls would best prevent the lapping of
accounts receivable?
a. Segregate duties so that the clerk responsible for recording in the
accounts receivable subsidiary ledger has no access to the general
ledger.
An edit run is the first run; it detects most data entry errors.
The sort run sequences the transaction records according to its
primary key
field and possibly a secondary key field.
Once the data are sorted, the update program posts the transactions
to the
appropriate corresponding records in the master file.
During a sequential update, each record is copied from the original
master file to the new master file regardless of whether the balance is
affected.
18
11. What are the key features of a POS system?
A point of sale system immediately records both cash and
credit
transactions and inventory information. The sales journal, accounts
receivable,
and inventory accounts may be updated in real-time, or a transaction file
may be
used to later update a master file.
A point of sale system immediately records both cash and
credit
transactions and inventory information. The sales journal, accounts
receivable,
and inventory accounts may be updated in real-time, or a transaction file
may be
used to later update a master file.
Response: A point of sale system immediately records both
cash and credit transactions and inventory information. The sales
journal, accounts receivable, and inventory accounts may be updated in
real-time, or a transaction file may be used to later update a master file.
12. How is the primary key critical in preserving the audit trail?
Response: The primary key provides the link between the magnetic
records stored on a computer disk and the physical source documents
and business events that they represent.
13. What are the advantages of real-time processing?
Response: Multilevel security employs programmed techniques
that permit simultaneous access to a central system by many users with
different access privileges but prevents them from obtaining
information for which they lack authorization.
19
14. Why does billing receive a copy of the sales order when the order
is approved but does not bill until the goods are shipped?
Response: The billing department’s receipt of the sales order occurs in
most instances before the goods are actually shipped; thus, the economic
event is not complete.
15. Why was EDI devised?
Response: EDI was devised to expedite routine transactions between
manufacturers and wholesalers, and between wholesalers and retailers.
An added benefit is the reduction of clerical errors.
16. What types of unique control problems are created by the use of
PC accounting systems?
Response: Instance, one employee may have the responsibility for
entering all transaction data, including sales orders, cash receipts,
invoices, and
disbursements.
17. In a manual system, after which event in the sales process should
the customer be billed?
Response: billing occurs after the product is shipped to the customer.
18. what is bill of lading?
Response: A bill of lading is form of contract between the seller and the
shipping company
20
19. What document initiates the billing process? (carrier) to
transport goods to the customers?
Response: The billing process is initiated by the shipping notice, which
signals the shipment of the goods to the buyer.
20. where in the cash receipts process does supervision play an
important role?
Response: Supervision plays an important role in the mail room ,which
point of risk in most cash receipts systems.
Multiple choice
1. C
2. B
3. C
4. B
5. C
6. C
7. D
8. A
9. C
10. A
21
chapter 5 Expenditure cycle
Multiple choice
b .1
a .2
c .3
b .4
d .5
c .6
d .7
d .8
c .9
c .10
26
27