Professional Documents
Culture Documents
Accounting Information Systems: 9 Edition
Accounting Information Systems: 9 Edition
Information
Systems
9th Edition
Marshall B. Romney
Paul John Steinbart
Chapter 9
The theft of
something
The conversion
to cash
The
concealment
©2003 Prentice Hall Business Publishing, 9-10
Accounting Information Systems, 9/e, Romney/Steinbart
The Fraud Process
What is lapping?
In a lapping scheme, the perpetrator
steals cash received from customer A
to pay its accounts receivable.
Funds received at a later date from
customer B are used to pay off
customer A’s balance, etc.
White-collar
criminals
Few differences
Significant General
differences public
Violent
criminals
Input Output
fraud Processor fraud fraud
Computer
instruction fraud
©2003 Prentice Hall Business Publishing, 9-30
Accounting Information Systems, 9/e, Romney/Steinbart
Computer Fraud and
Abuse Techniques
What are some of the more common
techniques to commit computer fraud?
– Cracking
– Data diddling
– Data leakage
– Denial of service attack
– Eavesdropping
– E-mail forgery and threats
©2003 Prentice Hall Business Publishing, 9-31
Accounting Information Systems, 9/e, Romney/Steinbart
Computer Fraud and
Abuse Techniques
– Hacking
– Internet misinformation and terrorism
– Logic time bomb
– Masquerading or impersonation
– Password cracking
– Piggybacking
– Round-down
– Salami technique
©2003 Prentice Hall Business Publishing, 9-32
Accounting Information Systems, 9/e, Romney/Steinbart
Computer Fraud and
Abuse Techniques
– Software piracy
– Scavenging
– Social engineering
– Superzapping
– Trap door
– Trojan horse
– Virus
– Worm
©2003 Prentice Hall Business Publishing, 9-33
Accounting Information Systems, 9/e, Romney/Steinbart
Learning Objective 4