Accounting Information Systems - Chapter 3-4
Accounting Information Systems - Chapter 3-4
Techniques
Learning Objectives:
Prepare and use data flow diagrams to understand, evaluate, and
document information systems.
Prepare and use flowcharts to understand, evaluate, and document
information systems.
Prepare and use business process diagrams to understand, evaluate, and
document information systems.
Why Document Systems?
Corruption is dishonest conduct by those holding power and it often involves actions that
are illegitimate, immoral, or incompatible with ethical standards. There are many types of
corruption; examples include bribery and bid rigging.
Two types of frauds that are important to businesses are misappropriation of assets
(sometimes called employee fraud) and fraudulent financial reporting (sometimes called
management fraud). These two types of fraud are now discussed in greater depth.
Fraud
In a misrepresentation, fraud
perpetrators who do not steal cash or
use the stolen assets personally must
convert them to a spendable form.
Examples include:
Unauthorized theft, use, access, modification, copying, or destruction of
software, hardware, or data.
Theft of assets covered up by altering computer records.
Obtaining information or tangible or tangible property illegally using
computers.
Computer Fraud
Input fraud
The simplest and most common way to commit a computer fraud is to alter or falsify computer
input. It requires little skill; perpetrators need only understand how the system operates so they can
cover their tracks.
Processor fraud
Processor fraud unauthorized system use, including the theft or computer time and services.
Data fraud
Illegally using, copying, browsing, searching, or harming company data constitutes, data
fraud. The biggest cause of data breaches is employee negligence.
Output fraud
Unless properly safeguarded, displayed or printed output can be stolen, copied, or
misused. It was showed that some monitors emit television-like signals that, with the help of
some inexpensive electronic gear can be displayed on a television screen.
Fraud perpetrators use computers to forge authentic-looking outputs, such as
paycheck.
A fraud perpetrator can scan a company paycheck, use desktop publishing software
to erase the payee and amount, and print fictitious paycheck.