Assignment Chap12

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7
At a glance
Powered by AI
Some of the key takeaways from the document include definitions of ethics, business ethics and computer ethics. It also discusses various ethical issues in business and with computers including privacy, security, ownership of property and access.

The four areas of ethical business issue discussed are equity, rights, honesty and exercise of corporate power.

The three ethical principles that may provide guidance for ethical responsibility according to the document are proportionality, justice and minimizing risk.

Shaira Lei S.J.

Garin

BSA-3B

May 13, 2015

BA 73 IT Auditing

Chapter 12
Review Questions
1. What is ethics?
Ethics pertains to the principles of conduct that individuals use in making
choices and guiding their behavior in situations that involve the concepts of
right and wrong.
2. What is business ethics?
Business ethics involves finding answers to the following:
How do managers decide what is right in conducting in business?
Once managers have recognized what is right, how so they achieve it?
3. What are the four areas of ethical business issue?
The four areas of ethical business issue are equity, rights, honesty and exercise
of corporate power.
4. What are the main issues to be addressed in the business code of ethics
required by the Securities and Exchange Commission?
Conflicts of interest, full and fair disclosures, legal compliance, internal
reporting of code variations and accountability.
5. What are three ethical principles that may provide some guidance for ethical
responsibility?
The three ethical principles that may provide some guidance for ethical
responsibility are proportionality, justice and minimize risk.
6. What is computer ethics?
Computer ethics is the analysis of the nature and social impact of computer
technology and the corresponding formulation and justification of policies for
the ethical use of such technology.

7. How do three levels of computer ethics pop, para, and theoretical differ?
Pop computer ethics is simply the exposure to stories and reports found in the
popular media regarding the good or bad ramifications of computer
technology. Para computer ethics involves taking real interest in computer
ethics cases and acquiring some level of skill and knowledge in the field.
Theoretical computer ethics is of interest of multidisciplinary researchers who
apply the theories of philosophy, sociology, and psychology to computer
science with the goal of bringing some new understanding to the field.
8. Are computer ethical issues new problems or just a new twist on old
problems?
Computer ethical issues are considered to be new problems by those groups
that feel the intellectual property is not the same as real property. However,
the other groups feel that the same generic principles should apply. No
agreement between these two groups has been reached.
9. What are the computer ethical issues regarding privacy?
Privacy is a concern because the nature of the computer data files makes it
possible for an unauthorized individuals to obtain information without it
being recognized as a missing from its original location.
10. What are the computer ethical issues regarding security?
Security is a concern because its absence makes control from a privacy
viewpoint questionable. In addition, lack of security may permit unauthorized
changes to data, therefore distorting the information that is reported.
11. What are the computer ethical issues regarding ownership of property?
Property ownership raises issues of legitimacy of organizational software,
valuation of assets and questions lost of revenues.
12. What are the computer ethical issues regarding equity in access?
Some barriers to access are intrinsic to the technology of information, but
some are avoidable through careful system design. Some factors can limit
access to the computing technology. The economic status of the individual or

the affluence of an organization will determine the ability to obtain


information technology.
13. What are the computer ethical issues regarding the environment?
Computers with high-speed printers allow for the production of printed
documents faster than ever before. However, paper comes from trees, a
precious natural resource, and ends up in landfills if not properly recycled.
14. What are the computer ethical issues regarding artificial intelligence?
A new set of social and ethical issues has risen out of the popularity of expert
system. Because if the the way these systems have been marketed, that is, as
decision makers or replacement for experts , some people rely in them
significantly.
15. What are the computer ethical issues regarding unemployment and
displacement?
The nature of most job is changing as a result of computer technology. In
many cases, certain occupations are becoming rare. The issue is whether the
employers should assume the responsibility of retaining employees.
16. What are the computer ethical issues regarding misuse of computers?
He ethical issue regarding the misuse of computers are the copying of
proprietary software using a companys computer for personal benefit and
snooping through other peoples files.
17. What is the objective of Statement on Auditing Standards No. 99?
The objective of SAS No. 99 is to seamlessly blend the auditors consideration
of fraud into all phases of the audit process.
18. What are the five conditions that constitute fraud under common law?

False representation
Material fact
Intent
Justifiable reliance

Injury or loss

19. Name the three fraud-motivating forces.


Situational pressure
Opportunity
Ethics
20.What is employee fraud?
Employee fraud or fraud by non-management employees is generally designed
to directly convert cash or other assets to the employees personal benefit.
21. What is management fraud?
Management fraud is more insidious than employee fraud because it often
escapes detection until organization has suffered irreparable damage or loss.
22. What three forces constitute the triangle of fraud?

Situational pressure
Opportunity
Ethics

23. How external auditors attempt to uncover motivations for committing fraud?
External auditors attempt to uncover motivations for committing fraud by
using a red flag checklist. Consisting of the following types of questions:
Do key executives have unusually high personal debt?
Do key executives appear to be living beyond their means?
Do key executives engage in habitual gambling?
Do key executives appear to abuse alcohol or drugs?
Do any of the key executives appear to lack personal codes of ethics?
Are economic conditions unfavorable within the companys industry?
Do one or two individuals dominate the company?
24. What is lapping?
Lapping is the use of customer checks, received in payment of their accounts,
to conceal cash previously stolen by an employee.
25. What is collusion?
Collusion involves creating opportunities to control or gain access to assets
that otherwise would not exist.

26. What is bribery?


Bribery involves giving, offering, soliciting or receiving things of value to
influence an official in the performance of his lawful duties.
27. What is economic extortion?
Economic extortion is the use of force by an individual or organization to
obtain something of value.
28.What s conflict of interest?
Conflict of interest occurs when an employee acts on behalf of a third party
during the discharge of his or her duties or has self-interest in the activity
being performed.
29. What is computer fraud and what types of activities does it include?
Computer fraud includes the theft, misuse or misappropriation of assets by:
Altering computer-readable records and files
Altering the logic of computer software
Illegal use of computer-readable information
Illegal copying or intentional destruction of computer software
30.At which stage of the general accounting model is it easiest to commit
computer fraud?
31. Define check tampering.
Check tampering involves forging of changing in some material way a check
that the organization has written to a legitimate payee.
32. What is billing (or vendor) fraud?
Billing or vendor fraud are perpetrated by employees who cause their
employer to issue a payment to a false supplier or vendor by submitting
invoices for fictitious goods or services, inflated invoices or invoices for
personal purchases.

33. Define cash larceny?


Cash larceny involves schemes where cash receipts are stolen from an
organization after they have been recorded in the organizations books and
records.
34. What is skimming?

Skimming involves stealing cash from an organization before it is recorded on


the organizations books and records.

You might also like