You are on page 1of 7

ACCOUNTING INFORMATION SYSTEM CHAPTER 3

ETHICAL ISSUES IN BUSINESS an object, land/real estate, intellectual property,


• Ethical standards are derived from societal mores or some other kind of property.
and deep-rooted personal beliefs about issues of • Security (Accuracy and Confidentiality)
right and wrong that are not universally agreed
• Computer security is an attempt to avoid such
upon.
undesirable events as a loss of confidentiality
• Often, we confuse ethical issues with legal issues. or data integrity.
• Ownership of Property
BUSINESS ETHICS
• Equity in Access
• Ethics are the principles of conduct that individuals
• Environmental Issues
use in making choices that guide their behavior in
situations involving the concepts of right and wrong. • Artificial Intelligence
• Business ethics pertains to the principles of • Unemployment and Displacement
conduct that individuals use in making choices and • Misuse of Computers
guiding their behavior in situations that involve the
concepts of right and wrong. SARBANES-OXLEY ACT AND ETHICAL ISSUES
• Making Ethical Decisions
• Ethical responsibility is the responsibility of • Sarbanes-Oxley Act (SOX) is the most significant
organization managers to seek a balance federal securities law, with provisions designed to
deal with specific problems relating to capital
between the risks and benefits to their
markets, corporate governance, and the auditing
constituents that result from their decisions.
profession.
• PROPORTIONALITY
• Section 406—Code of Ethics for Senior Financial
Officers
ETHICAL ISSUES IN BUSINESS
• CONFLICTS OF INTEREST
• FULL AND FAIR DISCLOSURES
• LEGAL COMPLIANCE
• INTERNAL REPORTING OF CODE
VIOLATIONS
• ACCOUNTABILITY

FRAUD AND ACCOUNTANTS


• The passage of SOX has had a tremendous impact
on the external auditor’s responsibilities for fraud
detection during a financial audit.
• The Statement on Auditing Standards (SAS) No.
99 is the current authoritative document that
defines fraud as an intentional act that results in a
material misstatement in financial statements.
• The objective of SAS 99 is to seamlessly blend the
auditor’s consideration of fraud into all phases of
the audit process.

DEFINITIONS OF FRAUD
• Fraud is the false representation of a material fact
COMPUTER ETHICS made by one party to another party, with the intent
• Computer ethics is the analysis of the nature and to deceive and induce the other party to justifiably
social impact of computer technology and the rely on the material fact to his or her detriment.
corresponding formulation and justification of • Employee fraud is the performance fraud by
policies for the ethical use of such technology. This nonmanagement employee generally designed to
includes details about software as well as hardware directly convert cash or other assets to the
and concerns about networks connecting employee’s personal benefit.
computers as well as computers themselves. • Management fraud is the performance fraud that
• A new problem or just a new twist on an old often uses deceptive practices to inflate earnings or
problem? to forestall the recognition of either insolvency or a
• Privacy decline in earnings.
• Privacy is full control of what and how much
information about an individual is available to THE FRAUD TRIANGLE
others and to whom it is available. • The fraud triangle is a triad of factors associated
• Ownership is the state or fact of exclusive with management and employee fraud: situational
rights and control over property, which may be pressure (includes personal or job-related stresses
ACCOUNTING INFORMATION SYSTEM CHAPTER 3
that could coerce an individual to act dishonestly); • Fraud Losses and the Collusion Effect
opportunity (involves direct access to assets and/ • One reason for segregating occupational
or access to information that controls assets); and duties is to deny potential perpetrators the
ethics (pertains to one’s character and degree of opportunity they need to commit fraud. When
moral opposition to acts of dishonesty). individuals in critical positions collude, they
create opportunities to control or gain access to
assets that otherwise would not exist.
• Fraud Losses by Gender
• Women are not fundamentally more honest
than men, but men occupy high corporate
positions in greater numbers than women. This
affords men greater access to assets.

LOSSES FROM FRAUD BY POSITION

FINANCIAL LOSSES FROM FRAUD

• The actual cost of fraud is, however, difficult to


quantify for a number of reasons:
• Not all fraud is detected.
• Of that detected, not all is reported.
• In many fraud cases, incomplete information is
gathered. THE PREPETRATORS OF FRAUDS
• Information is not properly distributed to
• Fraud Losses by Age
management or law enforcement authorities.
• Older employees tend to occupy higher-
• Too often, business organizations decide to
ranking positions and therefore generally have
take no civil or criminal action against the
greater access to company assets.
perpetrator(s) of fraud.
• Fraud Losses by Education
• In addition to the direct economic loss to the
• Generally, those with more education occupy
organization, indirect costs—including reduced
higher positions in their organizations and
productivity, the cost of legal action, increased
therefore have greater access to company
unemployment, and business disruption due to
funds and other assets.
investigation of the fraud—need to be considered.
• Conclusions to Be Drawn
DISTRIBUTION OF LOSSES
LOSSES FROM FRAUD BY AGE

THE PREPETRATORS OF FRAUDS


• Fraud Losses by Position within the Organization
• Individuals in the highest positions within an
organization are beyond the internal control
structure and have the greatest access to
company funds and assets.
ACCOUNTING INFORMATION SYSTEM CHAPTER 3
FRAUD SCHEMES
• Fraudulent Statements
• Fraudulent statements are statements
associated with management fraud. In this
class of fraud scheme, the financial statement
misrepresentation must itself bring direct or
indirect financial benefit to the perpetrator.
• THE UNDERLYING PROBLEMS
• SARBANES-OXLEY ACT AND FRAUD:
Public Company Accounting Oversight
Board (PCAOB), which is the federal
organization empowered to set auditing, quality FRAUD SCHEMES
control, and ethics standards; to inspect • Cash Larceny
registered accounting firms; to conduct • Cash larceny is theft of cash receipts from an
investigations; and to take disciplinary actions. organization after those receipts have been
• Corruption recorded in the organization’s books and
• Corruption involves an executive, a manager, records.
or an employee of the organization in collusion • Lapping is the use of customer checks,
with an outsider. received in payment of their accounts, to
• Bribery involves giving, offering, soliciting, or conceal cash previously stolen by an
receiving things of value to influence an official employee.
in the performance of his or her lawful duties. • Billing Schemes
• An illegal gratuity involves giving, receiving, • Billing schemes, also known as vendor
offering, or soliciting something of value fraud, are schemes under which an employee
because of an official act that has been taken. causes the employer to issue a payment to a
• A conflict of interest is an outline of false supplier or vendor by submitting invoices
procedures for dealing with actual or apparent for fictitious goods/services, inflated invoices,
conflicts of interest between personal and or invoices for personal purchases.
professional relationships. • A shell company is establishing a false vendor
• Economic extortion is the use (or threat) of on the company’s books, and then making false
force (including economic sanctions) by an purchase orders, receiving reports, and
individual or organization to obtain something invoices in the name of the vendor and
of value. The item of value could be a financial submitting them to the accounting system,
or economic asset, information, or cooperation creating the illusion of a legitimate transaction.
to obtain a favorable decision on some matter The system ultimately issues a check to the
under review. false vendor.
• Asset Misappropriation • A pass-through fraud is similar to shell
• Skimming company fraud except that a transaction
• Skimming involves stealing cash from an actually takes place. The perpetrator creates a
organization before it is recorded on the false vendor and issues purchase orders to it
organization’s books and records. Another for inventory or supplies. The false vendor
example is mail room fraud, in which an purchases the needed inventory from a
employee opening the mail steals a customer’s legitimate vendor, charges the victim company
check and destroys the associated remittance a much higher than market price for the items,
advice. and pockets the difference.
• A pay-and-return is a scheme under which a
LOSSES FROM FRAUD BY SHEME TYPE clerk with check writing authority pays a vendor
twice for the same products (inventory or
supplies) received and then intercepts and
cashes the overpayment returned by the
vendor.
• Check Tampering
• Check tampering involves forging, or
changing in some material way, a check that
was written to a legitimate payee.
• Payroll Fraud
• Payroll fraud is the distribution of fraudulent
paychecks to existent and/or nonexistent
employees.
• Expense Reimbursements
ACCOUNTING INFORMATION SYSTEM CHAPTER 3
• Expense reimbursement fraud involves
claiming reimbursement of fictitious or inflated INTERNAL CONTROL SHIELD
business expenses.
• Thefts of Cash
• Thefts of cash is the direct theft of cash on
hand in the organization.
• Noncash Misappropriations
• Noncash fraud is the theft or misuse of non-
cash assets (e.g., inventory, confidential
information).
• Computer Fraud
• Computer fraud involves theft, misuse, or
misappropriation of assets by altering
computer-readable records and files, or by
altering the logic of computer software; the
illegal use of computer-readable information; or
the intentional destruction of computer
software or hardware.

INTERNAL CONTROL CONCEPTS AND


TECHNIQUES
• The internal control system is a set of policies a
firm employs to safeguard the firm’s assets, ensure
accurate and reliable accounting records and
information, promote efficiency, and measure
compliance with established policies.
• Modifying Assumptions
• Management responsibility is the concept
under which the responsibility for the
establishment and maintenance of a system of PREVENTIVE, DETECTIVE, AND CORRECTIVE
internal control falls to management. CONTROLS
• Reasonable assurance is an assurance
provided by the internal control system that the
four broad objectives of internal control are met
in a cost-effective manner.
• METHODS OF DATA PROCESSING
• LIMITATIONS
• Control Weaknesses and Risks
• Control weaknesses increase the firm’s risk to
financial loss or injury from the threats.
• The Preventive-Detective-Corrective Internal
Control Model
• Preventive controls are passive techniques
designed to reduce the frequency of
occurrence of undesirable events.
• Detective controls are devices, techniques,
and procedures designed to identify and
expose undesirable events that elude
preventive controls.
INTERNAL CONTROL CONCEPTS AND
TECHNIQUES

• The Preventive-Detective-Corrective Internal


Control Model (continued)
• Corrective controls are actions taken to
reverse the effects of errors detected.
Statement on Auditing Standards (SAS) No.
109 is the current authoritative document for
specifying internal control objectives and
ACCOUNTING INFORMATION SYSTEM CHAPTER 3
techniques. It is based on the COSO SEGREGATION OF DUTIES OBJECTIVES
framework.
• Sarbanes-Oxley and Internal Control
• Committee of Sponsoring Organizations of
the Treadway Commission (COSO) is a joint
initiative of five private sector organizations and
is dedicated to providing thought leadership
through the development of frameworks and
guidance on enterprise risk management,
internal control, and fraud deterrence.

COSO INTERNAL CONTROL FRAMEWORK


• The Control Environment
• The control environment is the foundation of
internal control.
• Risk Assessment IT APPLICATION CONTROLS
• Risk assessment is the identification,
analysis, and management of risks relevant to • Input Controls
financial reporting. • Input controls are programmed procedures,
• Information and Communication often called edits, that perform tests on
• Monitoring transaction data to ensure that they are free
• Monitoring is the process by which the quality from errors.
of internal control design and operation can be • CHECK DIGIT: Transcription errors are the
assessed. type of errors that can corrupt a data code and
cause processing errors. Transposition
• Control Activities errors are errors that occur when digits are
• Control activities are the policies and transposed. A check digit is a method for
procedures to ensure that appropriate actions detecting data coding errors in which a control
are taken to deal with the organization’s risks. digit is added to the code when it is originally
• IT CONTROLS: General controls are controls designed to allow the integrity of the code to be
that pertain to entity-wide concerns such as established during subsequent processing.
controls over the data center, organization • MISSING DATA CHECK
databases, systems development, and • NUMERIC-ALPHABETIC CHECK
program maintenance. Application controls • LIMIT CHECK
are controls that ensure the integrity of specific • RANGE CHECK
systems. • REASONABLENESS CHECK
• PHYSICAL CONTROLS • VALIDITY CHECK
• Transaction authorization is a procedure to • Processing Controls
ensure that employees process only valid • Batch controls is an effective method of
transactions within the scope of their authority. managing high volumes of transaction data
through a system.
• Segregation of duties is the separation of • Run-to-run controls are controls that use
employee duties to minimize incompatible batch figures to monitor the batch as it moves
functions. from one programmed procedure to another.
• Supervision is a control activity involving the • Hash total is a control technique that uses
critical oversight of employees. nonfinancial data to keep track of the records in
• The accounting records of an organization a batch.
consist of documents, journals, or ledgers used
in transaction cycles.
BATCH CONTROL RECORDS
• Access controls are controls that ensure that
only authorized personnel have access to the
firm’s assets.
• Verification procedures are independent
checks of the accounting system to identify
errors and misrepresentations.
ACCOUNTING INFORMATION SYSTEM CHAPTER 3
RUN-TO-RUN CONTROLS GRANDFATHER-FATHER- SON APPROACH

BACKUP PROCESS IN BATCH SYSTEM USING


DIRECT ACCESS FILES

• Each record in a direct access file is assigned a


IT APPLICATION CONTROLS unique disk location or address that is determined
by its primary key value.
• Audit Trail Controls • The destructive update approach leaves no backup
• Audit trail controls ensures that every copy of the original master file.
transaction can be traced through each stage
of processing from its economic source to its DESTRUCTIVE UPDATE APPROACH
presentation in financial statements.
• TRANSACTION LOGS
• LOG OF AUTOMATIC TRANSACTIONS
• Master File Backup Controls

BACKUP PROCEDURES FOR BACTH SYSTEMS


GFS BACKUP TECHNIQUE USING DIRECT ACCESS FILES

• The grandfather-father-son (GFS) is a back-up


technique employed by systems that use
sequential master files (whether tape or disk). It is
an integral part of the master file update process.
• The systems designer determines the number of
backup master files needed for each application.
Two factors influence this decision: (1) the financial
significance of the system and (2) the degree of file
activity.
ACCOUNTING INFORMATION SYSTEM CHAPTER 3
BACKUP OF MASTER FILES IN A REAL-TIME
SYSTEM

• Real-time systems pose a more difficult problem


because transactions are being processed
continuously.

• Backup procedures are therefore scheduled at


prespecified intervals throughout the day (e.g.,
every 15 minutes).

You might also like