Professional Documents
Culture Documents
Intro To Fraud Chapter 11 Kadayunan
Intro To Fraud Chapter 11 Kadayunan
Kadayunan,
Minatulhamida
“A l - f i t r a ” M .
• Understand the broad isseus per taining
to business ethics.
• Know why the subject of ethics is
impor tant to the study of accounting
information systems.
• Have a basic understanding of ethical
issues related to the use of information
t o t h e u s e o f i n f o r m a t i o n t e c h n o l o g y.
Objectives: • Understand what constitutes fraudulent
A f t e r s t u d y i n g b e h a v i o r.
t h i s c h a p t e r, • Be able to destinguish between
y o u s h o u l d ; management fraud and employee fraud.
• Be able to explain frau-motivating
forces.
• Be familiar with anti-fraud legislation.
and anti-fraud prefession in general.
What is Business Ethics
John F. Akers, the former chairman of the of the board and CEO of IBM
Corporation states: “Our ethical standards come out of the past-out of our
inheritance as a more surefootedly we can inculcate conduct in the future.”
Ethical issues in business can be divided into four areas: equity, rights,
honesty, and the exercise of corporate power.
The Role of Management in Maintaining the Ethical
Climate
• Organization managers must create and maintain an appropriate ethical
atmosphere; they must limit the opportunity and temptation for unethical
behavior science.
Ethical Development
• Behavioral stage theory suggest that we all go through several stages of
moral evolution before sttling on one level of ethical reasoning.
Making Ethical Decisions
• Busniess programs can teach students analytical techniques to use in
trying to understand and put into perspective a firm’s conflicting
responsibilities to itts employees, shareholders, customers, and the public.
Privacy
• Privacy is a matter of the restricted acess to persons or information about persons. Thion and maintenence of
huge, shared database makes it necessary to protect people from the potential misuse of data.
Security
• Computer security is an attempt to avoid such undesirable events as a loss of confidentiality or data integrity.
Ownership of Property
• Laws designed to preserve real property rights have been extended to cover is referred to as intellectual
property - that is, software.
Race
• While African Americans and Hispanics constitute about 20 percent of the U.S. population, they make up only 7
percent of management information systems (MIS) professionals.
Equity in Access
• Some barriers to access are intrinsic to the technology of information systems, but some are avoidble through
careful system design. Several factors, some which are not unique to information systems,canlimit access to
computing technology.
Evironmental Issues
• It may be more efficient or more comforting to have to have a hard copy in addition to the elactronic version.
However, paper comes from trees, a precious natural resources, an up in the landfills if not properly recycles.
Artificial Intelligence
• Because some of the way systems have been marketed, that is, as decision makers or replacements for experts,
some people rely on them significantly.
Unemployment and Displacement
• Many jobs have been and are being changed as a result of the availability of computer technology.
Misuse of Computers
• Computers can be misused in many ways. Copying proprietary software, using a company’s computer for
personal benefit, and snooping through other people’s files are just a few obvious examples.
Internal Control Responsibility
• Managers must establish and maintain a system of appropriate internal controls to ensure the integrity and
reliability of their data.
FRAUD AND ACCOUNTANTS
Fraud denotes a false representation of a material fact made by one party or another party with the intent to deceive
and induce the other party to justifiably rely on the fact to his or her detriment. According to common law, a
fraudulent ust meet the following five conditions:
1. False representation. There must be a false statement or a nondisclosure.
2. Material fact. A factt must be a substantial factor in inducing someone to act.
3. Intent. There must be the intent to deceive or the knowledge that one’s statement is false.
4. Justifiable reliance. The misneterpretation must have been substantial factor on which the injured party relied.
5. Injury or loss. The deception must have caused injury or loss to the victim of the fraud.
In the accounting literature, fraud is also commonly known as white-collar crime, defalcation, embezzlement and
irregularities. The auditor deals with fraud typically as two levels:
a) Employee Fraud - is generally designed to directly convert cash or other assets to the employee’s personal
benefit. Employee fraud usually involves the misappropriation of assets, which is a three-step process:
1) stealing something of value (an assets)
2) converting the asset to a usable form
3) concealing the crime to avoid detection
a) Management Fraud - also called performece fraud, which often involves deceptive practices to inflate earnings or
to forestall the recognition of ethier insolvency or a decline in earnings. Management fraud typically contains
three special characteristics:
FRAUD AND ACCOUNTANTS
1) The fraud is perpetrated at level of management above the one to which international control structures
generally relate.
2) The fraud frequently involves using the the financial statements to create an illlustrasion that an entity is more
healthy and prosperous othan it actually is.
3) If the fraud involves misappropriation af assets, it frequently is shroouded in a maze of complex business
transactions, often involving relatedhird parties.
According to one study by Doonald Cressey, people engage in fraudulent activities as a result of an interaction of
forces both within an invidual’s personality and in the external environment. The forces are classifed into three major
categories:
1. Situational Pressures
2. Opportunities
3. Personal Characteristics (integrity)
Questions for such checklist related to mamgement fraud, or financial fraud as it is somtimes called, might include the
following:
• Gender. While the demographic picture is changing, more men than women occupy position of authorithy in
business, which provides them greater access to assets.
• Position. Thoose in the highest position have the greatest access to company funds and assets.
• Education. Generally, those with more education occupy higher position in their organizations and therfore have
greater access to company funds and assets.
• Age. Older employees tend to occuppy higher-ranking positions and therefore generally have greater access to
company assets.
• Collusion. One reason for segregating occupational duties is to deny potential perpetrators the opportunity to
commit fraud. When individuals in crtical positions collude, they create opportunities to control or gain access to
assets that otherwise would not exist.
Thanks for
listening
Re p o r t e r