Chap 4 AIS
Chap 4 AIS
AIS Threats
1. Natural and political disasters— such as fires, floods, earthquakes, hurricanes, tornadoes, blizzards, wars, and attacks
by terrorists—can destroy an information system and cause many companies to fail.
2. Software errors - Operating system crashes, hardware failures, power outages and fluctuations, and undetected data
transmission errors constitute a second type of threat.
3. Unintentional acts- Accidents or innocent errors and omissions, is the greatest risk to information systems and causes
the greatest dollar losses.
4. Intentional act- Computer crime, fraud, or sabotage, which is deliberate destruction or harm to a system.
* Sabotage-An intentional act where the intent is to destroy a system or some of its components.
Fraud
Investment Fraud - Misrepresenting or leaving out facts in order to promote an investment that promises fantastic
profits with little or no risk.
The Perpetrator:
• Gains the trust or confidence of the entity being defrauded.
• Uses trickery, cunning, or false or misleading information to commit fraud.
• Conceals the fraud by falsifying records or other information.
• Rarely terminates the fraud voluntarily.
• Sees how easy it is to get extra money; need or greed impels the person to continue.
• Spends the ill-gotten gains.
• Gets greedy and takes ever-larger amounts of money at intervals that are more frequent, exposing the
perpetrator to greater scrutiny and increasing the chances the fraud is discovered.
• Grows careless or overconfident as time passes.
Fraudulent Financial Reporting - Intentional or reckless conduct, whether by act or omission, that results in materially
misleading financial statements (National Commission on Fraudulent Financial Reporting).
The Treadway Commission recommended four actions to reduce fraudulent financial reporting:
1. Establish an organizational environment that contributes to the integrity of the financial reporting process.
2. Identify and understand the factors that lead to fraudulent financial reporting.
3. Assess the risk of fraudulent financial reporting within the company.
4. Design and implement internal controls to provide reasonable assurance of preventing fraudulent financial
Reporting.
The Auditor’s Responsibilities
1. Understand Fraud
2. Discuss the risks of material fraudulent misstatements
3. Obtain information
3. Convert the theft or misrepresentation to personal gain. In a misappropriation, fraud perpetrators who do not steal
cash or use the stolen assets personally must convert them to a spendable form.
A rationalization is the excuse that fraud perpetrators use to justify their illegal behavior. In other words,
perpetrators rationalize that they are not being dishonest, that honesty is not required of them, or that they
value what they take more than honesty and integrity.
The most frequent rationalizations include the following:
1. I am only “borrowing” it, and I will repay my “loan.”
2. You would understand if you knew how badly I needed it.
3. What I did was not that serious.
4. It was for a good cause (the Robin Hood syndrome: robbing the rich to give to the poor).
5. In my very important position of trust, I am above the rules.
6. Everyone else is doing it.
7. No one will ever know.
8. The company owes it to me; I am taking no more than is rightfully mine.
Computer Fraud
It is any fraud that requires computer technology to perpetrate it. Examples include:
➢Unauthorized theft, use, access, modification, copying, or destruction of software, hardware, or data