Professional Documents
Culture Documents
Computer Ethics
Is the analysis of the nature and social impact of computer technology
& the corresponding formulation and justification of policies for the
ethical use of such technology.
Computer Security
Is an attempt to avoid such undesirable events as a loss of
confidentiality or data integrity.
Equity in Access
Some barriers to access are intrinsic to the technology of information
systems but some are available through careful system design.
Environmental Issues
Some barriers to access are intrinsic to the technology of information
systems but some are available through careful system design.
FRAUD
Denotes a false representation of a material fact made by one
party to another party with the intent to deceive and induce the
other party to justifiably rely on the fact of his or her detriment.
5 conditions to meet:
1. False representation- false statement or disclosure
2. Material fact- a fact must be substantial in inducing someone to act.
3. Intent to deceive- must exist
4. The misrepresentation must have resulted in justifiable reliance upon
information , which caused someone to act.
5. The misrepresentation must have cause Injury or Loss.
EMPLOYEE FRAUD
Fraud by non-management employees, is generally designed to
directly convert cash or other assets to the employees personal
benefit.
Employee fraud usually involves 3 steps:
1. Stealing something of value
2. Converting the asset to a usable outweigh its benefits.
3. Concealing the crime to avoid detections.
MANAGEMENT FRAUD
It is more insidious than employee fraud because it often escapes
detection until the organization has suffered irreparable damage or
loss.
2008 ACFE Study of Fraud
Loss due to fraud equal to 7% of revenuesapproximately $994 billion
Loss by position within the company:
Other results: higher losses due to men, employees acting in collusion, and employees
with advance degrees
Enron, WorldCom, Adelphia Underlying Problems
Lack of Auditor Independence: auditing firms also engaged by their clients to perform non-
accounting activities
Lack of Director Independence: directors who also serve on the boards of other companies,
have a business trading relationship, have a financial relationship as stockholders or have
received personal loans, or have an operational relationship as employees
New federal crimes for the destruction of or tampering with documents, securities
fraud, and actions against whistleblowers
FRAUD SCHEMES
Three categories of fraud schemes according to the Association of
Certified Fraud Examiners:
A. fraudulent statements
B. corruption
C. asset misappropriation
A. FRAUDULENT STATEMENTS
Misstating the financial statements to make the copy appear better
than it is
Usually occurs as management fraud
May be tied to focus on short-term financial measures for success
May also be related to management bonus packages being tied
to financial statements
B. CORRUPTION
Examples:
bribery
illegal gratuities
conflicts of interest
economic extortion
Reasonable Assurance
The cost of achieving the objectives of internal control should not outweigh its
benefits.