Ais Chapter 4
Ais Chapter 4
Chapter 4
Ethics, Fraud, an Internal
Control
53
ACCOUNTING INFORMATION SYSTEM
Description: This chapter discusses the different ethical issues that faces business organization
when it comes to the use of information technology as well as the different internal
controls that can be used to mitigate the effects of those ethical issues and fraud.
Learning Objectives:
2. Define fraud and describe both the different types of fraud and the process one follows to
perpetuate a fraud.
3. Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and
rationalizations that are present in most frauds.
4. Define computer fraud and discuss the different computer fraud classifications. 5. Explain
how to prevent and detect computer fraud and abuse.
Lesson proper:
Introduction
As accounting information systems (AIS) grow more complex to meet our escalating
needs for information, companies face the growing risk that their systems may be compromised.
Recent surveys show that 67% of companies had a security breach, over 45% were targeted by
organized crime, and 60% reported financial losses. The four types of AIS threats a company faces
are summarized in Table 4.1
54
ACCOUNTING INFORMATION SYSTEM
THREATS EXAMPLES
Natural and Fire or excessive heat
political Floods, earthquakes, landslides, hurricanes, tornadoes.
disasters blizzards, snowstorms, and freezing rain
War and attacks by terrorists
Software Hardware or software failure
errors and Software errors or bugs
equipment Operating system crashes
malfunctions Power outages and fluctuations
Undetected data transmission errors
Unintentional Accidents caused by human carelessness, failure to follow
acts established procedures, and poorly trained or supervised
personnel
Innocent errors or omissions
Lost, erroneous, destroyed, or misplaced data
Logic errors
Systems that do not meet company needs or cannot handle
intended task
International Sabotage
acts Misrepresentation, false use, or unauthorized disclosure of
(computer data Misappropriation of assets
crimes) Financial statement fraud
Corruption
Computer fraud-attacks, social engineering, malware, etc.
AIS Threats
● Terrorist attacks on the World Trade Center in New York City and on the Federal Building
in Oklahoma City destroyed or disrupted all the systems in those buildings.
● A flood in Chicago destroyed or damaged 400 data processing centers. A flood in Des
Moines, Iowa, buried the city’s computer under eight feet of water. Hurricanes and
earthquakes have destroyed numerous computer systems and severed communication
lines. Other systems were damaged by falling debris, water from ruptured sprinkler
systems, and dust.
55
ACCOUNTING INFORMATION SYSTEM
● A very valid concern for everyone is what is going to happen when cyber-attacks are
militarized; that is, the transition from disruptive to destructive attacks. Example is Case
4.1
● Over 50 million people in the Northeast were left without power when an
industrial control system in part of the grid failed. Some areas were powerless for
four days, and damages from the outage ran close to $10 billion.
56
ACCOUNTING INFORMATION SYSTEM
● A bug in Burger King’s software resulted in a $4,334.33 debit card charge for
four hamburgers. The cashier accidentally keyed in the $4.33 charge twice,
resulting in the overcharge.
A third type of threat, unintentional acts such as accidents or innocent errors and
omissions, is the greatest risk to information systems and causes the greatest dollar
losses. The Computing Technology Industry Association estimates that human errors
cause 80% of security problems. Forrester Research estimates that employees
unintentionally create legal, regulatory, or financial risks in 25% of their outbound e-
mails.
● A data entry clerk at Mizuho Securities mistakenly keyed in a sale for 610,000
shares of J-Com for 1 yen instead of the sale of 1 share for 610,000 yen. The error
cost the company $250 million.
57
ACCOUNTING INFORMATION SYSTEM
● Jefferson County, West Virginia, released a new online search tool that exposed
the personal information of 1.6 million people.
58
ACCOUNTING INFORMATION SYSTEM
● A hacker stole 1.5 million credit and debit card numbers from Global Payments,
resulting in an $84 million loss and a 90% drop in profits in the quarter following
disclosure.
● The activist hacker group called Anonymous played Santa Claus one Christmas,
indicating they were “granting wishes to people who are less fortunate than
most.” They were inundated with requests for iPads, iPhones, pizzas, and
hundreds of other things. They hacked into banks and sent over $1 million worth
of virtual credit cards to people.
Cyber thieves have stolen more than $1 trillion worth of intellectual property
from businesses worldwide. General Alexander, director of the National Security Agency,
called cyber theft “the greatest transfer of wealth in history.”
Introduction to Fraud
Fraud is gaining an unfair advantage over another person. Legally, for an act to
be fraudulent there must be:
Annual economic losses resulting from fraudulent activity each year are
staggering. It is rare for a week to go by without the national or local press reporting
another fraud of some kind. These frauds range from a multimillion-dollar fraud that
captures the attention of the nation to an employee defrauding a local company out of
a small sum of money.
59
ACCOUNTING INFORMATION SYSTEM
● Owner/executive frauds took much longer to detect and were more than three
times as costly as manager-perpetrated frauds and more than nine times as costly
as employee frauds.
● More than 85% of the perpetrators had never been charged or convicted of
fraud.
● Small businesses, with fewer and less effective internal controls, were more
vulnerable to fraud than large businesses.
Most fraud perpetrators are knowledgeable insiders with the requisite access,
skills, and resources. Because employees understand a company’s system and its
weaknesses, they are better able to commit and conceal a fraud. The controls used to
protect corporate assets make it more difficult for an outsider to steal from a company.
Fraud perpetrators are often referred to as white-collar criminals. White-collar criminals
- Typically, businesspeople who commit fraud. White-collar criminals usually resort to
trickery or cunning, and their crimes usually involve a violation of trust or confidence.
60
ACCOUNTING INFORMATION SYSTEM
● A bank vice president approved $1 billion in bad loans in exchange for $585,000
in kickbacks. The loans cost the bank $800 million and helped trigger its collapse.
● In a recent survey of 3,500 adults, half said they would take company property
when they left and were more likely to steal e-data than assets. More than 25%
said they would take customer data, including contact information. Many
employees did not believe taking company data is equivalent to stealing. The
most significant contributing factor in most misappropriations is the absence of
internal controls and/or the failure to enforce existing internal controls. A typical
misappropriation has the following important elements or characteristics.
The perpetrator:
● Sees how easy it is to get extra money; need or greed impels the person to
continue. Some frauds are self-perpetuating; if perpetrators stop, their actions
are discovered.
● Spends the ill-gotten gains. Rarely does the perpetrator save or invest the
money. Some perpetrators come to depend on the “extra” income, and others
adopt a lifestyle that requires even greater amounts of money. For these reasons,
there are no small frauds— only large ones that are detected early.
● Gets greedy and takes ever-larger amounts of money at intervals that are more
frequent, exposing the perpetrator to greater scrutiny and increasing the chances
the fraud is discovered. The sheer magnitude of some frauds leads to their
detection. For example, the accountant at an auto repair shop, a lifelong friend
of the shop’s owner, embezzled ever larger sums of money over a seven-year
period. In the last year of the fraud, the embezzler took over $200,000. Facing
bankruptcy, the owner eventually laid off the accountant and had his wife take
61
ACCOUNTING INFORMATION SYSTEM
over the bookkeeping. When the company immediately began doing better, the
wife hired a fraud expert who investigated and uncovered the fraud.
● Grows careless or overconfident as time passes. If the size of the fraud does
not lead to its discovery, the perpetrator eventually makes a mistake that does
lead to the discovery
Through the years, many highly publicized financial statement frauds have
occurred. In each case, misrepresented financial statements led to huge financial losses
and a number of bankruptcies. The most frequent “cook the books” schemes involve
fictitiously inflating revenues, holding the books open (recognizing revenues before they
are earned), closing the books early (delaying current expenses to a later period),
overstating inventories or fixed assets, and concealing losses and liabilities.
2. Identify and understand the factors that lead to fraudulent financial reporting.
The ACFE found that an asset misappropriation is 17 times more likely than
fraudulent financial reporting but that the amounts involved are much smaller. As a
result, auditors and management are more concerned with fraudulent financial
reporting even though they are more likely to encounter misappropriations.
62
ACCOUNTING INFORMATION SYSTEM
● Obtain information. The audit team gathers evidence by looking for fraud risk
factors; testing company records; and asking management, the audit committee
of the board of directors, and others whether they know of past or current fraud.
Because many frauds involve revenue recognition, special care is exercised in
examining revenue accounts.
● Identify, assess, and respond to risks. The evidence is used to identify, assess,
and respond to fraud risks by varying the nature, timing, and extent of audit
procedures and by evaluating carefully the risk of management overriding
internal controls.
● Evaluate the results of their audit tests. Auditors must evaluate whether
identified misstatements indicate the presence of fraud and determine its impact
on the financial statements and the audit.
63
ACCOUNTING INFORMATION SYSTEM
Some fraud perpetrators are disgruntled and unhappy with their jobs and seek
revenge against employers. Others are dedicated, hard-working, and trusted employees.
Most have no previous criminal record; they were honest, valued, and respected
members of their community. In other words, they were good people who did bad
things.
Computer fraud perpetrators are typically younger and possess more computer
experience and skills. Some are motivated by curiosity, a quest for knowledge, the desire
to learn how things work, and the challenge of beating the system. Some view their
actions as a game rather than as dishonest behavior. Others commit computer fraud to
gain stature in the hacking community.
A large and growing number of computer fraud perpetrators are more predatory
in nature and seek to turn their actions into money. These fraud perpetrators are more
like the blue collar criminals that look to prey on others by robbing them. The difference
is that they use a computer instead of a gun.
Many first-time fraud perpetrators that are not caught, or that are caught but not
prosecuted, move from being “unintentional” fraudsters to “serial” fraudsters.
Malicious software is a big business and a huge profit engine for the criminal
underground, especially for digitally savvy hackers in Eastern Europe. They break into
financial accounts and steal money. They sell data to spammers, organized crime,
hackers, and the intelligence community. They market malware, such as virus-producing
software, to others. Some work with organized crime. A recently convicted hacker was
paid $150 for every 1,000 computers he infected with his adware and earned hundreds
of thousands of dollars a year.
Cyber-criminals are a top FBI priority because they have moved from isolated and
uncoordinated attacks to organized fraud schemes targeted at specific individuals and
businesses. They use online payment companies to launder their ill-gotten gains. To hide
their money, they take advantage of the lack of coordination between international law
enforcement organizations.
For most predatory fraud perpetrators, all the fraudster needs is an opportunity
and the criminal mind-set that allows him/her to commit the fraud. For most first-time
fraud perpetrators, three conditions are present when fraud occurs: a pressure, an
opportunity, and a rationalization. This is referred to as the fraud triangle, and is the
middle triangle in Figure 4.2
64
ACCOUNTING INFORMATION SYSTEM
Pressures
65
ACCOUNTING INFORMATION SYSTEM
Some people commit fraud to keep pace with other family members or win a
“who has the most or best” competition. A plastic surgeon, making $800,000 a year,
defrauded his clinic of $200,000 to compete in the family “game” of financial one-
upmanship. Other people commit fraud due to some combination of greed, ego, pride,
or ambition that causes them to believe that no matter how much they have, it is never
enough.
Other people commit fraud due to some combination of greed, ego, pride, or
ambition that causes them to believe that no matter how much they have, it is never
enough.
A third type of employee pressure is a person’s lifestyle. The person may need
funds to support a gambling habit or support a drug or alcohol addiction. One young
woman embezzled funds because her boyfriend threatened to leave her if she did not
provide him the money he needed to support his gambling and drug addictions. Three
types of organizational pressures that motivate management to misrepresent financial
statements are shown in the Financial Statement Pressure triangle in Figure 4.2 and
summarized in Table 4.3.
66
ACCOUNTING INFORMATION SYSTEM
Opportunity
1. Commit the fraud. The theft of assets is the most common type of
misappropriation. Most instances of fraudulent financial reporting involve
overstatements of assets or revenues, understatements of liabilities, or failures
to disclose information.
2. Conceal the fraud. To prevent detection when assets are stolen or financial
statements are overstated, perpetrators must keep the accounting equation in
balance by inflating other assets or decreasing liabilities or equity. Concealment
often takes more effort and time and leaves behind more evidence than the theft
or misrepresentation. Taking cash requires only a few seconds; altering records
to hide the theft is more challenging and time-consuming. One way for an
employee to hide a theft of company assets is to charge the stolen item to an
expense account
An individual, for his own personal gain or on behalf of a company, can hide the
theft of cash using a check-kiting scheme. In check kiting, cash is created using
the lag between the time a check is deposited and the time it clears the bank.
Suppose an individual or a company opens accounts in banks A, B, and C. The
perpetrator “creates” cash by depositing a $1,000 check from bank B in bank C
and withdrawing the funds. If it takes two days for the check to clear bank B, he
has created $1,000 for two days. After two days, the perpetrator deposits a
$1,000 check from bank A in bank B to cover the created $1,000 for two more
days. At the appropriate time, $1,000 is deposited from bank C in bank A. The
scheme continues—writing checks and making deposits as needed to keep the
67
ACCOUNTING INFORMATION SYSTEM
Electronic banking systems make kiting harder because the time between a
fraudster depositing the check in one bank and the check being presented to the
other bank for payment is shortened.
68
ACCOUNTING INFORMATION SYSTEM
Rationalizations
A rationalization is the excuse that fraud perpetrators use to justify their
illegal behavior. In other words, perpetrators rationalize that they are not being
dishonest, that honesty is not required of them, or that they value what they take
more than honesty and integrity. Some perpetrators rationalize that they are not
hurting a real person, but a faceless and nameless computer system or an
impersonal company that will not miss the money.
Computer Fraud
69
ACCOUNTING INFORMATION SYSTEM
● People who break into corporate databases can steal, destroy, or alter
massive amounts of data in very little time, often leaving little evidence.
One bank lost $10 million in a just a few minutes.
● Computer fraud can be much more difficult to detect than other types
of fraud.
● Some organizations grant employees, customers, and suppliers access
to their system. The number and variety of these access points
significantly increase the risks.
● Computer programs need to be modified illegally only once for them to
operate improperly for as long as they are in use.
● Personal computers (PCs) are vulnerable. It is difficult to control
physical access to each PC that accesses a network and PCs and their data
can be lost, stolen, or misplaced. Also, PC users are generally less aware
of the importance of security and control. The more legitimate users there
are, the greater the risk of an attack on the network.
● Computer systems face a number of unique challenges: reliability,
equipment failure, dependency on power, damage from water or fire,
vulnerability to electromagnetic interference and interruption, and
eavesdropping.
70
ACCOUNTING INFORMATION SYSTEM
4. Many networks are not secure. Dan Farmer, who wrote SATAN (a
network security testing tool), tested 2,200 high-profile websites at
government institutions, banks, and newspapers. Only three sites
detected and contacted him.
71
ACCOUNTING INFORMATION SYSTEM
Input Fraud The simplest and most common way to commit a computer
fraud is to alter or falsify computer input. It requires little skill; perpetrators need
only understand how the system operates so they can cover their tracks. For
example:
● A man opened a bank account in New York and had blank bank deposit
slips printed that were similar to those available in bank lobbies, except
that his account number was encoded on them. He replaced the deposit
slips in the bank lobby with his forged ones. For three days, bank deposits
using the forged slips went into his account. The perpetrator withdrew
the money and disappeared. He was never found.
● A man used desktop publishing to prepare bills for office supplies that
were never ordered or delivered and mailed them to local companies. The
72
ACCOUNTING INFORMATION SYSTEM
invoices were for less than $300, an amount that often does not require
purchase orders or approvals. A high percentage of the companies paid
the bills.
● Railroad employees entered data to scrap over 200 railroad cars. They
removed the cars from the railway system, repainted them, and sold
them.
73
ACCOUNTING INFORMATION SYSTEM
it is more frequent because of the many web pages that tell users how to create
them.
Data Fraud
74
ACCOUNTING INFORMATION SYSTEM
data and remove it without being detected. In today’s world, you can even buy
wristwatches with a USB port and internal memory.
75
ACCOUNTING INFORMATION SYSTEM
Implement Controls
76