Professional Documents
Culture Documents
“COMPUTER FRAUD”
(MARSHALL ROMNEY, CH 5 + CH 6)
- ADRIAN CAESAR PRABOWO ( 1411000267 )
- DEVY TIUR NAOMI ( 1411000412 )
- PRYANKA ICHSAN HADI ( 1411000283 )
- SARAH SAUSAN SUYONOPUTRI ( 1411000262 )
- YETI NURZAIROH ( 1411000184 )
Why we have to learn about Computer Fraud?
1. The impact of computer fraud and abuse techniques will influence the business process in the company,
for example, unauthorized theft, use, use, access, modification, copying, or destruction of software,
hardware, and/or data.
2. Computer fraud can be much more difficult to detect than other types of fraud.
3. Some organizations grant employees, customers, and suppliers access to their systems, therefore it will
increase computer fraud risk.
4. Distributed computer networks make data available to many users, and these networks are harder to
control than centralized mainframe systems.
Who involved in Computer Fraud and Abuse Techniques?
Internal
Customers Suppliers
1. Theft of a valuable 1.The Perpetrators ( employee ) steal/theft the company valuable assets
asset such as cash, inventory & equipment
2. The Perpetrators convert the asset they have stolen by sell the assets or
convert them into cash. In cases of falsified financial statement,
perpetrators convert their actions to personal gain through indirect benefits;
that is, they keep their jobs, their stock rises, they receive pay raises and
2. Conversion of assets promotions, or they gain power and influence.
into cash/ 3.The Perpetrators cover their crime with manipulation such manipulating
mispresentation to accounting records, etc.
personal gain
5. Require independent checks on performance, such as reconciliation of two independent sets of records, where
practical,
6. Encrypt stored and transmitted data and programs to protect them from unauthorized access and use,
7. Implement computer-based controls over data input, computer processing, data storage, data transmission, and
information output.
How to prevent Computer Fraud?
1. Increase the penalty for committing fraud by prosecuting fraud perpetrators more vigorously,
2. Create an organizational culture that stresses integrity and commitment to ethical value and competence,
3. Adopt an organizational culture, management philosophy, operating style, and risk appetite that minimize the
likelihood of fraud,
4. Train employees in integrity and ethical considerations, as well as security and fraud prevention measures,
5. Identify the events that lead to increased fraud risk, and take steps to prevent, avoid, share, or accept that risk,
6. Effectively supervise employees, including monitoring their performance ad correcting their errors,
What is Computer Fraud ?
Computer Fraud is any fraud that requires computer technology to perpetrate it. Examples Include :
• Unauthorized theft, use, access, modification, copying, or destruction of software, hardware, or data
• Theft of assets covered up by altering computer records
• Obtaining information or tangible property illegally using computers
Types of Computer Fraud
1. Computer Fraud only occur in the companies that using computer systems in their business process,
2. Computer Fraud is more likely done by person who have more computer experience and skills,
4. Computer Fraud occur when perpetrators have the situation of Fraud Triangle (Pressure, Opportunities,
and Rationalization),
5. Companies have to prevent and detect computer fraud by make fraud less to occur, increase the
difficulty of committing fraud, improve detection method, and reduce fraud losses in order to make the
business process runs well.
Sources
Romney, Marshall B., Steinbart, Paul John. (2015). Accounting Information Systems (Global Edition) (13th). Harlow,
England: Pearson Education Limited.
http://hanafebriani16.blogspot.co.id/2013/12/penjelasan-chapter-5-computer-fraud.html