Professional Documents
Culture Documents
ETHICAL ISSUES IN
BUSINESS
Ethical standards are derived from
societal mores and deep-rooted
personal beliefs about issues of right
and wrong that are not universally
agreed upon
Ethical guidance
Proportionality. The benefit from a decision must
outweigh the risks. Furthermore, there must be no
alternative decision that provides the same or
greater benefit with less risk.
Justice. The benefits of the decision should be
distributed fairly to those who share the risks.
Those who do not benefit should not carry the
burden of risk.
Minimize risk. Even if judged acceptable by the
principles, the decision should be implemented so
as to minimize all of the risks and avoid any
unnecessary risks
Privacy
Security (Accuracy and Confidentiality)
Ownership of Property
Equity in Access
Environmental Issues
Artificial Intelligence
Unemployment and Displacement
Misuse of Computers
FRAUD AND
ACCOUNTANTS
The passage of SOX has had a
tremendous impact on the external
auditors responsibilities for fraud
detection during a financial audit. It
requires the auditor to test controls
specifically intended to prevent or
detect fraud likely to result in a
material misstatement of the
financial statements
The Perpetrators of
Frauds
Fraud Losses
Organization
Fraud Losses
Fraud Losses
Fraud Losses
Fraud Losses
Fraud Schemes
Fraudulent Statements
Corruption
Asset misappropriation
Corruption
Bribery involves giving, offering,
soliciting, or receiving things of value
to influence an official in the
performance of his or her lawful
duties
illegal gratuity involves giving,
receiving, offering, or soliciting
something of value because of an
official act that has been taken
Asset Misappropriation
Skimming involves stealing cash from an
organization before it is recorded on the
organizations books and records
mailroom fraud, where an employee opening
the mail steals a customers check and
destroys the associated remittance advice
Computer Fraud
The theft, misuse, or misappropriation of assets
by altering computer-readable records and files.
The theft, misuse, or misappropriation of assets
by altering the logic of computer software.
The theft or illegal use of computer-readable
information.
The theft, corruption, illegal copying, or
intentional destruction of computer software.
The theft, misuse, or misappropriation of
computer hardware.
Fraud techniques
Masquerading involves a perpetrator gaining access to
the system from a remote site by pretending to be an
authorized user. This usually requires first gaining
authorized access to a password.
Piggybacking is a technique in which the perpetrator at
a remote site taps into the telecommunications lines and
latches onto an authorized user who is logging into the
system. Once in the system, the perpetrator can
masquerade as the authorized user. Hacking may involve
piggybacking or masquerading techniques.
Hackers are distinguished from other computer
criminals because their motives are not usually to
defraud for financial gain
Fraudulent Financial
Reporting
Managements characteristics and
influence over the control
environment
Industry conditions
Operating characteristics and
financial stability.
Misappropriation of
Assets
Response to Detected
Misstatements Due to Fraud
When the auditor has determined that
fraud exists but has had no material
effect on the financial statements, the
auditor should
Refer the matter to an appropriate level of
management at least one level above
those involved.
Be satisfied that implications for other
aspects of the audit have been adequately
considered.
Documentation
Requirements
Where risk factors are identified, the
documentation should include
(1) those risk factors identified and
(2) the auditors response to them
FRAUD DETECTION
TECHNIQUES
To find the trail in the masses of data, the
auditor first develops a fraud profile that
identifies the data characteristics that one
would expect to find in a specific type of
fraud scheme. This identification requires an
understanding of the enterprises processes
and internal controls (and their weaknesses).
Once the fraud profile is developed, ACL can
be used to manipulate the organizations
data to search for transactions that fit the
profile