Chapter 3 Ethics, Fraud, and Internal Control: Accounting Information Systems, 7e
Chapter 3 Ethics, Fraud, and Internal Control: Accounting Information Systems, 7e
Ethics, Fraud, and Internal Control
James A. Hall
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Objectives for Chapter 3
management
stakeholders
Litigation
Once managers have recognized what is right, how do they achieve it?
oncerns the social impact of computer technology (hardware, software, and telecommunications).
Privacy
Security—accuracy and confidentiality
Ownership of property
Equity in access
Environmental issues
Artificial intelligence
Unemployment and displacement
Misuse of computer
Pressure Opportunity
No Fraud
Pressure Opportunity
Ethics
Fraud
Hall,Accounting Information Systems, 7e 8 Ethics
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
2008 ACFE Study of Fraud
Employee
Other results: higher losses due to men, employees acting in collusion, and
40% 70,000
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Enron, WorldCom, Adelphia
Underlying Problems
Lack of Auditor Independence: auditing firms also engaged by their clients to performnonaccountingactivities
Lack of Director Independence:directors who also serve on the boards of other companies, have a business trading
relationship, have a financial relationship as stockholders or have received personal loans, or have an operational
relationship as employees
Inappropriate Accounting Practices:a characteristic common to many financial statement fraud schemes
New federal crimes for the destruction of or tampering with documents, securities fraud,
and actions against whistleblowers
Usually consists of: an employee taking cash or other assets for personal gain
Perpetrated at levels of management above the one to which internal control structure
relates
Frequently involves using financial statements to create an illusion that an entity is more
business transactions
Examiners:
A. fraudulent statements
B. corruption
C. asset misappropriation
Misstating the financial statements to make the copy appear better than it is
statements
Examples:
bribery
illegal gratuities
conflicts of interest
economic extortion
Examples:
making charges to expense accounts to cover theft of asset (especially cash)
lapping: using customer’s check from one account to cover theft from a different account
Management Responsibility
The establishment and maintenance of a system of internal control is the responsibility of management.
Reasonable Assurance
The cost of achieving the objectives of internal control should not outweigh its benefits.
Management override
Destructionof an asset
Theftof an asset
Corruptionof information
Figure 3-3
The weaker the internal control structure, the higher the assessed level of risk; the higher the risk, the more
1. Control environment
2. Risk assessment
4. Monitoring
5. Control activities
Organizational structure
restructuring, downsizing
the transaction processing steps involved from the initiation of a transaction to its inclusion in
the financial statements[process]
the financial reporting process used to compile financial statements, disclosures, and
estimates[output]
The process for assessing the quality of internal control design and operation
Ongoing monitoring:
management reports which highlight trends and exceptions from normal performance
Policies and procedures to ensure that the appropriate actions are taken in
Transaction Authorization
Segregation of Duties
Supervision
Accounting Records
Access Control
Independent Verification
Transaction Authorization
used to ensure that employees are carrying out only authorized transactions
authorizations
Segregation of Duties
In manual systems, separation between:
authorizing and processing a transaction
subtasks
program processing
program maintenance
Supervision
a compensation for lack of segregation; some may be built into computer
systems
Accounting Records
provide an audit trail
Access Controls
help to safeguard assets by restricting physical access to them
Independent Verification
reviewing batch totals or reconciling subsidiary accounts with control accounts
Control
Control
Control General
Subsidiary
Journals Ta1
Objective 3 Ledgers Ledger
Figure 3-4
Transaction Authorization
The rules are often embedded within computer programs.
EDI/JIT: automated re-ordering of inventory without human intervention
Segregation of Duties
A computer program may perform many tasks that are deemed incompatible.
Thus the crucial need to separate program development, program operations, and
program maintenance.
Supervision
The ability to assess competent employees becomes more challenging due to
Accounting Records
ledger accounts and sometimes source documents are kept magnetically
no audit trail is readily apparent
Access Control
Data consolidation exposes the organization to computer fraud and excessive losses
from disaster.
Independent Verification
When tasks are performed by the computer rather than manually, the need for an