Comp Audit Lesson 1 Ethics Fraud and Internal Control
Comp Audit Lesson 1 Ethics Fraud and Internal Control
Comp Audit Lesson 1 Ethics Fraud and Internal Control
Fraud, and
Internal Control
Broad issues pertaining to business ethics
Ethics in accounting information systems
Ethical issues in information technology
Management fraud and employee fraud
Common fraud techniques in manual and computer-
based systems
The expectations gap between financial statements users
and auditors’ abilities
Implications of computer technology on the internal
control structure
Why should we be concerned about ethics in
the business world?
Ethics are needed when conflicts arise--the need to
choose
In business, conflicts may arise between:
employees
management
stakeholders
Litigation
concerns the social impact of computer technology
(hardware, software, and telecommunications).
Oxygen Fuel
Spark
Situational
Available Pressures
Opportunities an employee is
poor internal experiencing
controls financial difficulties
Personal Characteristics
personal morals of individual employees
Committed by non-management personnel
Usually consists of: an employee taking cash
or other assets for personal gain by
circumventing a company’s system of
internal controls
It is perpetrated at levels of management
above the one to which internal control
structure relates.
It frequently involves using the financial statements
to create an illusion that an entity is more healthy
and prosperous than it actually is.
If it involves misappropriation of assets, it frequently
is shrouded in a maze of complex business
transactions.
Three categories of fraud schemes according
to the Association of Certified Fraud
Examiners:
A. fraudulent statements
B. corruption
C. asset misappropriation
Misstatingthe financial statements to make
the copy appear better than it is
Usually occurs as management fraud
May be tied to focus on short-term financial
measures for success
May also be related to management bonus
packages being tied to financial statements
Examples:
bribery
illegal gratuities
conflicts of interest
economic extortion
Examples:
making charges to expense accounts to cover theft of
asset (especially cash)
lapping: using customer’s check from one account to
cover theft from a different account
transaction fraud: deleting, altering, or adding false
transactions to steal assets
Theft, misuse, or misappropriation of assets by
altering computer data
Theft, misuse, or misappropriation of assets by
altering software programming
Theft or illegal use of computer
data/information
Theft, corruption, illegal copying or
destruction of software or hardware
Theft, misuse, or misappropriation of
computer hardware
Using the general IS model, explain how fraud can
occur at the different stages of information
processing?
This phase of the system is most vulnerable
because it is very easy to change data as it is
being entered into the system.
Also, GIGO (garbage in, garbage out) reminds us
that if the input data is inaccurate, processing
will result in inaccurate output.
Program Frauds
altering programs to allow illegal
access to and/or manipulation of
data files
destroying programs with a virus
Operations Frauds
misuseof company computer
resources, such as using the
computer for personal business
Altering, deleting, corrupting, destroying, or
stealing an organization’s data
Oftentimes conducted by disgruntled or ex-
employee
Stealing, misdirecting, or misusing computer
output
Scavenging
searching through the trash cans on the
computer center for discarded output (the
output should be shredded, but frequently is
not)
1. Safeguard assets of the firm
2. Ensure accuracy and reliability of accounting
records and information
3. Promote efficiency of the firm’s operations
4. Measure compliance with management’s
prescribed policies and procedures
Management Responsibility
The establishment and maintenance of a system of
internal control is the responsibility of
management.
Reasonable Assurance
The cost of achieving the objectives of internal
control should not outweigh its benefits.
Methods of Data Processing
The techniques of achieving the objectives will vary
with different types of technology.
Possibilityof honest errors
Circumvention via collusion
Management override
Changing conditions--especially in companies
with high growth
Destruction of an asset
Theft of an asset
Corruption of information
Disruption of the information system
Auditors are guided by the
Custody Recording