Chapter 3 Ais
Chapter 3 Ais
CHAPTER 3:
INTRODUCTION TO THE NEEED FOR A
CODE OF ETHICS AND INTERNAL CONTROL
GROUP 3
WHAT IS
STEWARDSHIP?
- Is the careful and responsible oversight and use of
the assets entrusted to management. This requires
that management maintain systems which allow it
to demonstrate that it has appropriately used these
funds and assets.
ACCOUNTING-RELATED FRAUD
Management
Fraud
conducted by one or more top‐level managers within
the company, is usually in the form of fraudulent
financial reporting. Oftentimes, the chief executive
officer (CEO) or chief financial officer (CFO) conducts
fraud by misstating the financial statements through
elaborate schemes or complex transactions.
THE NATURE OF MANAGEMENT FRAUD
Employee
Fraud
Is conducted by non management
employees. This usually means that an
employee steals cash or assets for
personal gain.
THE NATURE OF EMPLOYEE FRAUD
Cash receipts theft. This occurs when an employee steals cash from
the company. An example would be the theft of checks collected
from customers.
THE NATURE OF EMPLOYEE FRAUD
Payroll fraud. This occurs when an employee submits a false or inflated timecard.
Expense account fraud. This occurs when an employee submits false travel or
entertainment expenses or charges an expense account to cover the theft of cash.
THE NATURE OF EMPLOYEE FRAUD
SKIMMING LARCENY COLLUSION
where the organization’s cash Stealing the company’s cash occurs when two or more
is stolen before it is entered after it has been recorded in people work together to
into the accounting records. the accounting records. commit a fraud.
THE NATURE OF CUSTOMER FRAUD
Customer
Fraud
Customer fraud occurs when a customer improperly
obtains cash or property from a company or avoids a
liability through deception. Although customer fraud
may affect any company, it is an especially common
problem for retail firms and companies that sell goods
through Internet‐based commerce.
THE NATURE OF CUSTOMER FRAUD
EXAMPLES OF CUSTOMER FRAUD
Credit card fraud and check fraud involve the customer’s use of
stolen or fraudulent credit cards and checks.
Vendor
Fraud
Vendor fraud occurs when vendors obtain payments to
which they are not entitled. Unethical vendors may
intentionally submit duplicate or incorrect invoices,
send shipments in which the quantities are short, or
send lower‐ quality goods than ordered. Vendor fraud
may also be perpetrated through collusion.
THE NATURE OF CUSTOMER FRAUD
VENDOR AUDITS
Involve the examination of vendor records in support of
amounts charged to the company.
THE NATURE OF COMPUTER FRAUD
Computer
Fraud
Computer fraud is the use of computers, the
Internet, Internet devices, and Internet services
to defraud people or organizations of resources.
THE NATURE OF CUSTOMER FRAUD
INDUSTRIAL ESPIONAGE
The theft of proprietary company
information, by digging through the
trash of the intended target
company.
THE NATURE OF CUSTOMER FRAUD
SOFTWARE PIRACY
The unlawful copying of software
programs.
INTERNAL SOURCES OF INTERNAL FRAUD
INTERNAL SOURCES
OF INTERNAL FRAUD
When an employee of an organization
attempts to conduct fraud through
the misuse of a computer‐ based
system, it is called internal computer
fraud.
INTERNAL SOURCES OF INTERNAL FRAUD
Trap Door Alteration - is a valid programming tool that is misused to commit fraud. As
programmers write software applications, they may allow for unusual or unique ways to
enter the program to test small portions, or modules, of the system.
EXTERNAL SOURCES OF COMPUTER FRAUD
EXTERNAL SOURCES
OF COMPUTER FRAUD
External computer frauds are
conducted by someone outside the
company who has gained
unauthorized access to the computer.
INTERNAL SOURCES OF INTERNAL FRAUD
Hacking is the term commonly used for computer network break‐ins. Hacking may be
undertaken for various reasons, including industrial espionage, credit card theft from
online databases, destruction or alteration of data, or merely thrill‐seeking.
AUTHORIZATION
refers to an approval, or endorsement,
from a responsible person or
department in the organization that
has been sanctioned by top
management.
CONTROL ACTIVITIES
AUTHORIZATION