AIS Chapter 5
AIS Chapter 5
An accounting information system grow more complex to meet the escalating needs for information,
companies face the growing risk that their systems may be compromised.
• Threats: Fire or excessive heat, floods, earthquakes, landslide, hurricanes, war and attacks of
terrorists.
• These disasters affect many companies at the same
• Terrorist attacks on the World Trade Center in New York City and on the Federal Building
in Oklahoma City destroyed or disrupted all the systems in those buildings,
• A flood in Chicago destroyed or damaged 400 data processing center.
• A flood in Lowa, buried the city's computer under eight feet of water
• Hurricanes and earthquakes have destroyed numerous computer systems and severed
communication lines
• The US Defense Science Board prediction:
• Attacks on information systems will soon be widespread.
• Attacks can even come from foreign countries
Based on one study, economic losses due to these threat is estimated to be $60 billion a year.
More than 60% of companies studied had significant software errors.
A bug in Burger King's software resulted in a $4.334,33 debit card charge for four
hamburgers. The cashier accidentally keyed in the $4.33 twice, resulting in the
overcharge.
Unintentional Acts
Threats: unintentional acts such as accidents or innocent errors and omissions,
Unintentional acts caused by human carelessness:
failure to follow established procedures,
poorly trained or supervised personnel.
Users lose or misplace data
User accidentally erase or alter files, data, programs.
Erroneous input,
Using an incorrect version of a program or the wrong data files.
Programmers make logic errors.
This is considered the greatest risk to information systems and causes the greatest
dollar losses.
The Computing Technology Industry Association estimates that human errors cause 80% of
security problems
Forrester Research estimates that employees unintentionally create legal, regulatory, or financial
risks in 25% of their outbound e-mails.
Here’s more . . .
In a recent three year period, the number of networks that were compromise rose to 700%.
Experts believe the actual number or incidents is six times higher than reported because
companies tend not to report security breaches.
Symantec estimates the hackers attack computers more than 8.6 millions times per day.
One computer-security company reported that in the cases of Chinese hackers, 94% of the
targeted companies didn't realize that their systems had been compromised until someone else told
them.
The median number of days between intrusion and detection is 416.
INTRODUCTION TO FRAUD
Fraud is any and all means a person uses to gain an unfair advantage over another person,
Fraudulent acts include:
Lies/false statements uttered with an intention to deceive
Suppression of the truth
Tricks and cunning
Violation of trust and confidence
Results: injury or loss on the part of the victim.
Is it fraud?
There must be a false representation, statements or a nondisclosure.
There must be a material fact, a substantial factor in inducing someone to act.
There must be intent to deceive.
The Misrepresentation must have resulted in justifiable reliance causing someone to act.
The deception must have caused injury or loss to the victim of the fraud.
Classification of FRAUD
Criminal case
Civil case
the definition is the same for both cases.
the difference is the burden of proof required
Criminal case: beyond reasonable doubt
Civil case: clear and convincing evidence
Knowledgeable Insiders
More likely to commit fraud.
Their understanding of the company's system and it's weaknesses enabled them to commit fraud.
They can cover their tracks.
Perpetuates of Fraud
Factor that characterized the perpetrators of Fraud:
Position in the organization
Gender
Age
Education
Collusion
Assets Misappropriation
Theft of company assets by employees.
This is the most common fraud scheme.
Let's look at some of the techniques used in this type of fraud.
Corruption
Bribery - involves giving, offering, soliciting, or receiving things of value to influence an official
in the performance of his or her lawful duties.
Illegal gratuities - involves giving, receiving, offering, or soliciting something of value
because of an official act that has been taken.
Economic extortion - is the use of force, threat (including economic sanctions) by an individual
or organization to obtain something of value
Conflict of interest - occurs when an employee acts on behalf of a third party during discharge of
his duties or has self- interest in the activity being performed.
Fraudulent Statements
Fraudulent financial reporting is the intentional or reckless conduct, whether by act or omission, that
results in materially misleading financial statements.
Fraudulent statements
Financial statements fraud is distinct from other types of fraud in that the individuals who commit
the fraud are not direct beneficiaries.
The company is the direct beneficiaries
The perpetrators are typically indirect beneficiaries.
Research Findings
White collar criminals tend to mirrors the general public in:
Education
Age
Religion
Marriage
Length of employment
Psychological makeup
More findings …
Perpetrators of computer fraud tend to be younger and possess more computer knowledge,
experience, and skills.
Hackers and computer fraud perks tend to be more motivated by:
Curiosity
A quest for knowledge
The desire to learn how things work
The challenge of beating the system
They may view their actions as a game rather than dishonest behavior.
Another motivation may be to gain stature in the hacking community.
Some see themselves as revolutionaries spreading a message of anarchy and freedom.
But a growing number want to profit financially. To do so, they may sell data to:
Spammers
Organized crime
Other hackers
The intelligence community
Some fraud perpetrators are disgruntled and unhappy with their jobs and are seeking revenge
against their employers.
Others are regarded as ideal, hard working employees in positions of trust.
Most have no prior criminal record.
In other words, they were good people who did bad things.
Factors that Contribute to Fraud
Pressure - Motivation or Incentive to fraud
Rationalization - Justification of Dishonest Actions
Opportunity - The Knowledge and Ability to Carry out Fraud.
Pressure
A pressure is a person's incentive or motivation for committing fraud.
Three types of pressures that lead to misappropriations are shown in the Employee Pressure
Triangle Financial
Employee
Pressure
EmotionalLifestyle Triangle
Financial Pressure
Financial pressures often motivate misappropriation frauds by employees.
Examples of such pressures include living beyond one's means, heavy financial losses, or high
personal debt.
Often, the perpetrator feels the pressure cannot be shared and believes fraud is the best way out of
a difficult situation.
Emotional Pressure
Many employee frauds are motivated by greed.
Some employees turn to fraud because they have strong feelings of resentment or believe
they have been treated unfairly.
They may feel their pay is too low, their contributions are not appreciated, or the company is
taking advantage of them.
Lifestyle.
The person may need funds to support a gambling habit or support a drug or alcohol addiction.
One young woman embezzled funds because her boyfriend threatened to leave her if she did not
provide him the money he needed to support his gambling and drug addictions.
Three types of organizational pressures that motivate management to misrepresent financial statements
are shown in the Financial Statement Pressure triangle.
Financial
FS
Pressure Triangle
Industry Conditions Management Characteristics
A prevalent financial pressure is a need to meet or exceed earnings expectations to keep a
stock price from falling.
Managers create significant pressure with unduly aggressive earnings forecasts or unrealistic
performance standards, incentive programs that motivate employees to falsify Financial results to
keep their jobs or to receive stock options and other incentive payments.
Industry conditions such as new regulatory requirements or significant market saturation with
declining margins can motivate fraud.
Opportunity
The condition or situation that allows a person or organization to commit and conceal a dishonest
act and convert it to personal gain.
As shown in the Opportunity triangle, opportunity is the condition or situation, including one
personal abilities, that allows a perpetrator to do three things:
Commit
Opportunity Triangle
Conceal Convert
OPPORTUNITY
Commit the fraud.
The theft of assets is the most common type of misappropriation.
Most instances of fraudulent financial reporting involve overstatements of assets or revenues,
understatements of liabilities, or failures to disclose information.
Conceal the fraud.
Concealing the fraud often takes more time and effort and leaves more evidence than
the actual theft or misrepresentation.
To prevent detection when assets are stolen or financial statements are overstated, perpetrators
must keep the accounting equation in balance by inflating other assets or decreasing
liabilities or equity.
Examples of concealment efforts:
Charge a stolen asset to an expense account or to an account receivable that is about to
be written off.
Create a ghost employee who receives an extra paycheck
Lapping
Convert the Proceeds
Unless the target of the theft is cash, then the stolen goods must be converted to cash or some
form that is beneficial to the perpetrator.
Checks can be converted through alterations, forged endorsements, etc
Non-cash assets can be sold (online auctions are a favorite forum) or returned to
the company for cash.
If the fraud is a financial statement fraud, then the gains received may include;
I got to keep my job
The value of my stock or stock option rose.
I got a raise, promotion, or bonus.
I got power.
There are many opportunities that enable fraud. Some of the most common are:
Lack of internal controls
Failure to enforce controls (the most prevalent reason)
Excessive trust in key employees
Incompetent supervisory personnel
Inattention to details
Inadequate staff
Rationalization
It is important to understand that fraudsters do not regard themselves as unprincipled.
In general, they regard themselves as highly principled individuals.
That view of themselves is important to them.
The only way they can commit their frauds and maintain their self image as principled
individuals is to create rationalizations that recast their actions as “morally acceptable”
behaviors.
These rationalizations takes many form, including:
I was just borrowing the money.
I wasn’t really hurting anyone. (corporation are often seen as non-persons, therefore crime
against them are not hurting “anyone”
Everybody does it.
I've worked hard for them for 35 years and been underpaid all that time. I wasn’t stealing; I
was only taking what was owned to me.
I didn’t take it for my self. I needed it to pay my child's medical bills.
Creators of worms and viruses often use rationalizations like:
The malicious code helped expose security flaws, so I did a good service.
It was an accident
It was not my fault - just an experiment that went bad.
It was the users fault because they didn’t keep their security up to date.
If the code didn’t alter or delete any of their files, then whats the problem?
CONCLUSION
Fraud occurs when:
People have perceived, non-shareable pressures;
The opportunity gateway is left open; and
They can rationalize their actions to reduce the moral impact in their minds (i.e., they
have low integrity).
Fraud is much less likely to occur when
There is low pressure, low opportunity, and high integrity.
Computer Fraud
Any fraud that requires computer technology to perpetrate it. Examples include;
Unauthorized theft, use, access, modification, copying, and destruction of software or data.
Theft of money covered by altering computer records.
Intent to illegally obtain information or tangible property illegally through the use of computers.
Theft or destruction of computer hardware.
Use or the conspiracy to use computer resources to commit a felony.
The rise of Computer Fraud -- it is estimated that computer fraud costs the United States somewhere
between $70 billion and $125 billion a year and still increasing.
Computer systems are particularly vulnerable to computer crimes for several reasons:
– Company databases can be huge and access privileges can be difficult to create and enforce.
– Consequently, individuals can steal, destroy, or alter massive amounts of data in very little time.
– Organizations often want employees, customers, suppliers, and others to have access to their system
from inside the organization and without. This access also creates vulnerability.
– Computer programs only need to be altered once, and they will operate that way until:
• The system is no longer in use; or
• Someone notices.
Input Fraud
The simplest and most common way to commit a fraud is to alter computer input.
Requires little computer skills.
Perpetrator only need to understand how the system operates
Can take a number of forms, including:
Disbursement frauds – the perpetrator causes a company to:
Pay too much for ordered goods; or
Pay for goods never ordered.
Inventory frauds
The perpetrator enters data into the system to show that stolen inventory has been scrapped.
Payroll frauds
Perpetrators may enter data to:
Increase their salaries
Create a fictitious employee
Retain a terminated employee on the records.
In the latter two instances, the perpetrator intercepts and cashes the resulting paychecks.
Cash receipt frauds
The perpetrator hides the theft by falsifying system input.
EXAMPLE: Cash of $200 is received. The perpetrator records a cash receipt of $150
and pockets the $50 difference.
Fictitious refund fraud
The perpetrator files for an undeserved refund, such as a tax refund.
Processor Fraud
Involves computer fraud committed through unauthorized system use.
Includes theft of computer time and services.
Incidents could involve employees:
Surfing the Internet;
Using the company computer to conduct personal business; or
Using the company computer to conduct a competing business.
Data Fraud
Involves:
Altering or damaging a company’s data files; or
Copying, using, or searching the data files without authorization.
Theft of data to be sold to people outside the organization. (identity theft)
In many cases, disgruntled employees have scrambled, altered, or destroyed data files.
Theft of data often occurs so that perpetrators can sell the data.
Most identity thefts occur when insiders in financial institutions, credit agencies, etc., steal and
sell financial information about individuals from their employer’s database.
Output Fraud
Involves stealing or misusing system output.
Unless properly safeguarded, screen output can easily be read from a remote location
using inexpensive electronic gear.
Output is usually displayed on a screen or printed on paper./ Printed output can easily be copied
and sold to outsiders.
This output is also subject to prying eyes and unauthorized copying.
Fraud perpetrators can use computers and peripheral devices to create counterfeit outputs, such as
checks.
Specific Techniques
Perpetrators have devised many methods to commit computer fraud and abuses. These includes:
Phishing
Piggybacking
Round-down technique
Social engineering
Software piracy
Spamming
Spyware
Keystroke loggers
DETER AND DETECT
Organizations must take every precaution to protect their information systems.
Certain measures can significantly decrease the potential for fraud and any resulting losses.
These measures include:
Make fraud less likely to occur
Create a culture that stresses integrity and commitment to ethical values and
competence.
Adopt an organizational structure, management philosophy, operating style,
and appetite for risk that minimizes the likelihood of fraud.
Require oversight from an active, involved, and independent audit committee.
Assign authority and responsibility for business objectives to specific departments and
individuals, encourage initiative in solving problems, and hold them accountable for
achieving those objectives.
Identify the events that lead to increased fraud risk, and take steps to prevent, avoid,
share, or accept that risk.
Develop a comprehensive set of security policies to guide the design and
implementation of specific control procedures, and communicate them effectively
to company employees.
Implement human resource policies for hiring, compensating, evaluating, counseling,
promoting, and discharging employees that send messages about the required level of
ethical behavior and integrity.
Effectively supervise employees, including monitoring their performance and
correcting their errors.
Train employees in integrity and ethical considerations, as well as security and fraud
prevention measures.
Require annual employee vacations, periodically rotate duties of key employees, and
require signed confidentiality agreements.
Implement formal and rigorous project development and acquisition controls, as well as
change management controls.
Increase the penalty for committing fraud by prosecuting fraud perpetrators more
vigorously.