You are on page 1of 9

‭MODULE 3‬

‭ thics-‬‭pertains to the principles of‬


E i‭nvoked in an attempt to protect those‬
‭conduct that individuals use in‬ ‭who develop software from having it‬
‭making choices and guiding their‬ ‭copied.‬
‭behavior in situations that involve the‬ ‭Equity in Access-‬‭Some barriers to‬
‭concepts of right and wrong.‬ ‭access are intrinsic to the technology‬
‭Ethical issues in business can be‬ ‭of information systems, but some are‬
‭divided into four areas:‬ ‭avoidable through careful system‬
‭1.‬ ‭equity,‬ ‭design.‬
‭2.‬ ‭rights,‬ ‭Environmental Issues-‬‭Computers‬
‭3.‬ ‭honesty, and the‬ ‭with high-speed printers allow for the‬
‭4.‬ ‭exercise of corporate power.‬ ‭production of printed documents‬
‭faster than‬
‭ roportionality-‬‭The benefit from a‬
P ‭ever before.‬
‭decision must outweigh the risks.‬ ‭Artificial Intelligence-‬‭A new set of‬
‭Privacy-‬‭People desire to be in full‬ ‭social and ethical issues has arisen out‬
‭control of what and how much‬ ‭of the popularity of expert systems.‬
‭information about themselves is‬ ‭Unemployment and Displacement-‬
‭available to others, and to whom it is‬ ‭Many jobs have been and are being‬
‭available.‬ ‭changed as a result of the availability‬
‭Computer security-‬‭is an attempt to‬ ‭of computer technology. People‬
‭avoid such undesirable events as a‬ ‭unable or unprepared to change are‬
‭loss of confidentiality or data‬ ‭displaced.‬
‭integrity.‬ ‭Misuse of Computers-‬‭Computers‬
‭Security systems-‬‭attempt to prevent‬ ‭can be misused in many ways.‬
‭fraud and other misuse of computer‬ ‭Copying proprietary software, using a‬
‭systems; they act to protect and‬ ‭company’s computer for personal‬
‭further the legitimate interests of the‬ ‭benefit, and snooping through other‬
‭system’s constituencies.‬ ‭people’s files are just a few obvious‬
‭Laws-‬‭designed to preserve real‬ ‭examples.‬
‭property rights have been extended to‬ ‭1. False representation.‬‭There must‬
‭cover what is referred to as‬ ‭be a false statement or a‬
‭intellectual property, that is, software.‬ ‭nondisclosure.‬
‭Copyright laws-‬‭have been‬ ‭2. Material fact‬‭. A fact must be a‬
‭substantial factor in inducing‬
‭someone to act.‬
‭MODULE 3‬

3‭ . Intent.‬‭There must be the intent to‬ ‭ anagement fraud typically‬


M
‭deceive or the knowledge that one’s‬ ‭contains three special‬
‭statement is false.‬ ‭characteristics:‬
‭4. Justifiable reliance.‬‭The‬ ‭1. The fraud is perpetrated at levels of‬
‭misrepresentation must have been a‬ ‭management above the one to which‬
‭substantial factor on which‬ ‭internal control structures generally‬
‭the injured party relied.‬ ‭relate.‬
‭5. Injury or loss.‬‭The deception must‬ ‭2. The fraud frequently involves using‬
‭have caused injury or loss to the‬ ‭the financial statements to create an‬
‭victim of the fraud.‬ ‭illusion that an entity is healthier and‬
‭Fraud-‬‭in the business environment‬ ‭more prosperous than, in fact, it is.‬
‭has a more specialized meaning. It is‬ ‭3. If the fraud involves‬
‭an intentional deception, mis‬ ‭misappropriation of assets, it‬
‭appropriation of a company’s assets,‬ ‭frequently is shrouded in a maze of‬
‭or manipulation of its financial data to‬ ‭complex business transactions, often‬
‭the advantage of the perpetrator.‬ ‭involving related third parties.‬
‭Employee fraud, or fraud by non‬ ‭The Fraud Triangle-‬‭The fraud‬
‭management employees-‬‭is generally‬ ‭triangle consists of three factors that‬
‭designed to directly convert cash or‬ ‭contribute to or are associated with‬
‭other assets to the employee’s‬ ‭management and employee fraud.‬
‭personal benefit.‬ ‭These are‬
‭Employee fraud usually involves‬ ‭(1) situational pressure, which‬
‭three steps‬‭:‬ ‭includes personal or job-related‬
‭(1) stealing something of value (an‬ ‭stresses that could coerce an‬
‭asset), (2) converting the asset to a‬ ‭individual to act dishonestly;‬
‭usable form (cash), and‬ ‭(2) opportunity, which involves direct‬
‭(3) concealing the crime to avoid‬ ‭access to assets and/or access to‬
‭detection.‬ ‭information that‬
‭The third step is often the most‬ ‭controls assets, and;‬
‭difficult.‬ ‭(3) ethics, which pertains to one’s‬
‭Management fraud-‬‭is more‬ ‭character and degree of moral‬
‭insidious than employee fraud‬ ‭opposition to acts of dishonesty.‬
‭because it often escapes‬ ‭Fraudulent statements-‬‭are‬
‭detection until the organization has‬ ‭associated with management fraud.‬
‭suffered irreparable damage or loss.‬ ‭Whereas all fraud involves some form‬
‭MODULE 3‬

o‭ f financial misstatement, to meet the‬ a‭ n official in the performance of his‬


‭definition under this class of fraud‬ ‭or her lawful duties.‬
‭scheme the statement itself must bring‬ ‭illegal gratuity-‬‭involves giving,‬
‭direct or indirect financial benefit to‬ ‭receiving, offering, or soliciting‬
‭the perpetrator.‬ ‭something of value because of an‬
‭1.Lack of Auditor Independence.‬ ‭official act that has been taken.‬
‭Auditing firms that are also engaged‬ ‭conflict of interest-‬‭occurs when an‬
‭by their clients to perform non‬ ‭employee acts on behalf of a third‬
‭accounting activities such as actuarial‬ ‭party during the discharge of his or‬
‭services, internal audit outsourcing‬ ‭her duties or has self-interest in the‬
‭services, and consulting, lack‬ ‭activity being performed.‬
‭independence.‬ ‭Economic extortion-‬‭is the use (or‬
‭2.Lack of Director Independence.‬ ‭threat) of force (including economic‬
‭Many boards of directors are‬ ‭sanctions) by an individual or‬
‭composed of individuals who are not‬ ‭organization to obtain something of‬
‭in dependent.‬ ‭value.‬
‭3. Questionable Executive‬ ‭asset misappropriation-‬‭in which‬
‭Compensation Schemes.‬ ‭assets are either directly or indirectly‬
‭A Thomson Financial survey revealed‬ ‭diverted to the perpetrator’s benefit.‬
‭the strong belief that executives have‬ ‭Transactions-‬‭involving cash,‬
‭abused stock-based compensation‬ ‭checking accounts, inventory,‬
‭4. Inappropriate Accounting‬ ‭supplies, equipment, and information‬
‭Practices.‬ ‭are the most vulnerable to abuse.‬
‭The use of inappropriate accounting‬ ‭Skimming-‬‭involves stealing cash‬
‭techniques is a characteristic common‬ ‭from an organization before it is‬
‭to many financial statement fraud‬ ‭recorded on the‬
‭schemes.‬ ‭organization’s books and records.‬
‭Corruption-‬‭involves an executive,‬ ‭Cash larceny-‬‭involves schemes in‬
‭manager, or employee of the‬ ‭which cash receipts are stolen from an‬
‭organization in collusion with an out‬ ‭organization after they have been‬
‭sider.‬ ‭recorded in the organization’s books‬
‭Bribery-‬‭involves giving, offering,‬ ‭and records.‬
‭soliciting, or receiving things of value‬ ‭lapping-‬‭in which the cash receipts‬
‭to influence‬ ‭clerk first steals and cashes a check‬
‭from Customer.‬
‭MODULE 3‬

‭ illing schemes-‬‭also known as‬


B ‭ hefts of cash are schemes-‬‭that‬
T
‭vendor fraud, are perpetrated by‬ ‭involve the direct theft of cash on‬
‭employees who causes their employer‬ ‭hand in the organization.‬
‭to issue a payment to a false supplier‬ ‭Non-cash fraud schemes-‬‭involve‬
‭or vendor by submitting invoices for‬ ‭the theft or misuse of the victim‬
‭fictitious goods or services, inflated‬ ‭organization’s non-cash assets.‬
‭invoices, or invoices for personal‬ ‭Computer Fraud-‬‭Because‬
‭purchases.‬ ‭computers lie at the heart of modern‬
‭shell company fraud-‬‭first requires‬ ‭accounting information systems, the‬
‭that the perpetrator establish a false‬ ‭topic of computer fraud is of‬
‭supplier on the‬ ‭importance to auditors.‬
‭books of the victim company.‬ ‭With a backdrop of ethics and fraud in‬
‭pass through fraud-‬‭is similar to the‬ ‭place, let’s now examine internal‬
‭shell company fraud with the‬ ‭control concepts and techniques for‬
‭exception that a‬ ‭dealing with these problems. The‬
‭transaction actually takes place.‬ ‭internal control system comprises‬
‭pay-and-return scheme-‬‭is a third‬ ‭policies, practices, and procedures‬
‭form of vendor fraud. This typically‬ ‭employed by the organization to‬
‭involves a clerk‬ ‭achieve four broad objectives:‬
‭with check writing authority who pays‬ ‭1. To safeguard assets of the firm.‬
‭a vendor twice for the same products‬ ‭2. To ensure the accuracy and‬
‭(inventory or supplies) received.‬ ‭reliability of accounting records and‬
‭Check tampering-‬‭involves forging‬ ‭information.‬
‭or changing in some material way a‬ ‭3. To promote efficiency in the firm’s‬
‭check that the organization has‬ ‭operations.‬
‭written to a legitimate payee.‬ ‭4. To measure compliance with‬
‭Payroll fraud-‬‭is the distribution of‬ ‭management’s prescribed policies and‬
‭fraudulent paychecks to existent‬ ‭procedures.‬
‭and/or nonexistent employees.‬
‭Expense reimbursement frauds-‬‭are‬ ‭ odifying Assumptions-‬‭Inherent in‬
M
‭schemes in which an employee makes‬ ‭these control objectives are four‬
‭a claim for reimbursement of‬ ‭modifying assumptions that guide‬
‭fictitious or inflated business‬ ‭designers and auditors of internal‬
‭expenses.‬ ‭controls.‬
‭MODULE 3‬

‭ anagement Responsibility-‬‭This‬
M ‭ anagement is in a position to‬
m
‭concept holds that the establishment‬ ‭override control procedures by‬
‭and maintenance of a system of‬ ‭personally distorting‬
‭internal control is a management‬ ‭transactions or by directing a‬
‭responsibility.‬ ‭subordinate to do so, and‬
‭Reasonable Assurance-‬‭The internal‬ ‭(4) changing conditions—conditions‬
‭control system should provide‬ ‭may change over time so that existing‬
‭reasonable‬ ‭controls may become ineffectual.‬
‭assurance that the four broad‬ ‭Preventive controls-‬‭are passive‬
‭objectives of internal control are met‬ ‭techniques designed to reduce the‬
‭in a cost-effective‬ ‭frequency of occurrence of‬
‭manner. This means that no system of‬ ‭undesirable events.‬
‭internal control is perfect and the cost‬ ‭Detective controls-‬‭form the second‬
‭of achieving improved control should‬ ‭line of defense. These are devices,‬
‭not outweigh its benefits.‬ ‭techniques, and procedures designed‬
‭Method of data processing-‬‭Internal‬ ‭to identify and expose undesirable‬
‭controls should achieve the four broad‬ ‭events that elude preventive controls.‬
‭objectives regardless of the data‬ ‭Corrective controls-‬‭are actions‬
‭processing method used. The control‬ ‭taken to reverse the effects of‬
‭techniques used to achieve these‬ ‭errors detected in the previous step.‬
‭objectives will, however, vary with‬ ‭The SAS 78/COSO framework‬
‭different types of technology.‬ ‭consists of five components:‬‭the‬
‭control environment, risk assessment,‬
‭ imitations- Every system of internal‬
L ‭information and communication,‬
‭control has limitations on its‬ ‭monitoring, and control activities.‬
‭effectiveness.‬ ‭control environment-‬‭is the‬
‭These include‬ ‭foundation for the other four control‬
‭(1) the possibility of error—no system‬ ‭components. The‬
‭is perfect,‬ ‭control environment sets the tone for‬
‭(2) circumvention—personnel may‬ ‭the organization and influences the‬
‭circumvent the system through‬ ‭control awareness of its management‬
‭collusion or other means,‬ ‭and employees.‬
‭(3) management override—‬
I‭ mportant elements of the control‬
‭environment are:‬
‭MODULE 3‬

•‭ The integrity and ethical values of‬ p‭ ressures on the firm.‬


‭management.‬ ‭• New personnel who have a different‬
‭• The structure of the organization.‬ ‭or inadequate understanding of‬
‭• The participation of the‬ ‭internal control.‬
‭organization’s board of directors and‬ ‭• New or reengineered information‬
‭the audit committee, if one exists.‬ ‭systems that affect transaction‬
‭• Management’s philosophy and‬ ‭processing.‬
‭operating style.‬ ‭• Significant and rapid growth that‬
‭• The procedures for delegating‬ ‭strains existing internal controls.‬
‭responsibility and authority.‬ ‭• The implementation of new‬
‭• Management’s methods for‬ ‭technology into the production‬
‭assessing performance.‬ ‭process or information‬
‭• External influences, such as‬ ‭system that impacts transaction‬
‭examinations by regulatory agencies.‬ ‭processing.‬
‭• The organization’s policies and‬ ‭• The introduction of new product‬
‭practices for managing its human‬ ‭lines or activities with which the‬
‭resources.‬ ‭organization has‬
‭little experience.‬
‭ AS 78/COSO‬‭requires that auditors‬
S ‭• Organizational restructuring‬
‭obtain sufficient knowledge to assess‬ ‭resulting in the reduction and/or‬
‭the attitude and awareness of the‬ ‭reallocation of‬
‭organization’s management, board of‬ ‭personnel such that business‬
‭directors, and owners regarding‬ ‭operations and transaction processing‬
‭internal control.‬ ‭are affected.‬
‭• Entering into foreign markets that‬
‭ isk Assessment-‬‭Organizations‬
R ‭may impact operations (that is, the‬
‭must perform a risk assessment to‬ ‭risks‬
‭identify, analyze, and manage risks‬ ‭associated with foreign currency‬
‭relevant to financial reporting.‬ ‭transactions).‬
‭• Adoption of a new accounting‬
‭ isks can arise or change from‬
R ‭principle that impacts the preparation‬
‭circumstances such as:‬ ‭of financial‬
‭• Changes in the operating‬ ‭statements.‬
‭environment that impose new or‬
‭changed competitive‬
‭MODULE 3‬

‭ AS 78/COSO‬‭requires that auditors‬


S •‭ Accurately measure the financial‬
‭obtain sufficient knowledge of the‬ ‭value of transactions so their effects‬
‭organization’s risk assessment‬ ‭can be‬
‭procedures to understand how‬ ‭recorded in financial statements.‬
‭management identifies, prioritizes,‬ ‭• Accurately record transactions in the‬
‭and manages the risks related to‬ ‭time period in which they occurred.‬
‭financial reporting.‬
‭ AS 78/COSO‬‭requires that auditors‬
S
I‭ nformation and Communication-‬ ‭obtain sufficient knowledge of the‬
‭The accounting information system‬ ‭organization’s‬
‭consists of the records and methods‬ ‭information system to understand:‬
‭used to initiate,‬ ‭• The classes of transactions that are‬
‭identify, analyze, classify, and record‬ ‭material to the financial statements‬
‭the organization’s transactions and to‬ ‭and how‬
‭account for the related assets and‬ ‭those transactions are initiated.‬
‭liabilities.‬ ‭• The accounting records and accounts‬
‭The quality of information the‬ ‭that are used in the processing of‬
‭accounting information system‬ ‭material transactions.‬
‭generates impacts‬ ‭• The transaction processing steps‬
‭management’s ability to take actions‬ ‭involved from the initiation of a‬
‭and make decisions in connection‬ ‭transaction to its‬
‭with the‬ ‭inclusion in the financial statements.‬
‭organization’s operations and to‬ ‭• The financial reporting process used‬
‭prepare reliable financial statements.‬ ‭to prepare financial statements,‬
‭disclosures, and accounting estimates.‬
‭ n effective accounting information‬
A
‭system will:‬ ‭ onitoring-‬‭Management must‬
M
‭• Identify and record all valid‬ ‭determine that internal controls are‬
‭financial transactions.‬ ‭functioning as intended.‬
‭• Provide timely information about‬ ‭Monitoring-‬‭is the process by which‬
‭transactions in sufficient detail to‬ ‭the quality of internal control design‬
‭permit proper‬ ‭and operation can be assessed. This‬
‭classification and financial reporting.‬ ‭may be accomplished by separate‬
‭procedures or by ongoing activities.‬
‭MODULE 3‬

-‭ An organization’s internal auditors‬ ‭ ‬ g‭ eneral controls and‬



‭may monitor the entity’s activities in‬ ‭●‬ ‭application controls.‬
‭separate procedures. They gather‬
‭evidence of control adequacy by‬ ‭ eneral controls-‬‭pertain to entity-‬
G
‭testing controls and then‬ ‭wide concerns such as controls over‬
‭communicate control strengths and‬ ‭the data center, organization‬
‭weaknesses to management. As part‬ ‭databases, systems‬
‭of this process, internal auditors make‬ ‭development, and program‬
‭specific recommendations for‬ ‭maintenance.‬
‭improvements to controls.‬ ‭Application controls-‬‭ensure the‬
‭integrity of specific systems such as‬
-‭ Ongoing monitoring may be‬ ‭sales order processing, accounts‬
‭achieved by integrating special‬ ‭payable, and payroll applications.‬
‭computer modules into the‬ ‭Physical control-‬‭This class of‬
‭information system that capture key‬ ‭controls relates primarily to the‬
‭data and/or permit tests of controls to‬ ‭human activities‬
‭be conducted as part of routine‬ ‭employed in accounting systems.‬
‭operations. Embedded modules thus‬
‭allow management and auditors to‬ ‭ ur discussion will address the‬
O
‭maintain constant surveillance over‬ ‭issues pertaining to six categories of‬
‭the functioning of internal controls.‬ ‭physical control activities:‬
‭Control activities-‬‭are the policies‬ ‭●‬ ‭transaction authorization,‬
‭and procedures used to ensure that‬ ‭●‬ ‭segregation of duties,‬
‭appropriate actions are taken to deal‬ ‭●‬ ‭supervision,‬
‭with the organization’s identified‬ ‭●‬ ‭accounting‬
‭risks.‬ ‭●‬ ‭records,‬
‭Control activities can be grouped‬ ‭●‬ ‭access control, and‬
‭into two distinct categories:‬ ‭●‬ ‭independent verification.‬
‭information technology (IT) controls‬
‭and physical‬ ‭ ransaction Authorization-‬‭The‬
T
‭controls.‬ ‭purpose of transaction authorization is‬
‭to ensure that‬
I‭ T controls-‬‭relate specifically to the‬ ‭all material transactions processed by‬
‭computer environment.‬ ‭the information system are valid and‬
‭They fall into two broad groups:‬ ‭in accordance with management’s‬
‭MODULE 3‬

o‭ bjectives. Authorizations may be‬ (‭ 3) the correctness‬


‭general or specific. General authority‬ ‭of data contained in accounting‬
‭is granted to operations personnel to‬ ‭records.‬
‭perform day-to-day operations.‬
‭Segregation of duties-‬‭One of the‬ ‭ xamples of independent‬
E
‭most important control activities is the‬ ‭verifications include:‬
‭segregation of employee duties to‬ ‭• Reconciling batch totals at points‬
‭minimize incompatible functions.‬ ‭during transaction processing.‬
‭Supervision-‬‭Implementing adequate‬ ‭• Comparing physical assets with‬
‭segregation of duties requires that a‬ ‭accounting records.‬
‭firm employ a sufficiently large‬ ‭• Reconciling subsidiary accounts‬
‭number of employees.‬ ‭with control accounts.‬
‭Accounting records-‬‭The accounting‬ ‭• Reviewing management reports‬
‭records of an organization consist of‬ ‭(both computer and manually‬
‭source‬ ‭generated) that‬
‭documents, journals, and ledgers.‬ ‭summarize business activity‬
‭audit trail-‬‭enables the auditor to‬
‭trace any transaction through all‬
‭phases of its processing from the‬
‭initiation of the event to the financial‬
‭statements.‬
‭access controls-‬‭is to ensure that only‬
‭authorized personnel have access to‬
‭the firm’s assets.‬
‭Independent Verification-‬
‭procedures are independent checks of‬
‭the accounting system to identify‬
‭errors and misrepresentations.‬

‭ hrough independent verification‬


T
‭procedures, management can assess‬
‭(1) the performance of‬
‭individuals,‬
‭(2) the integrity of the transaction‬
‭processing system, and‬

You might also like