Sie sind auf Seite 1von 6

Chapter 3: Ethics, Fraud, and Internal Control implemented so as to minimize all of the risks

and avoid any unnecessary risks


Objectives for Chapter 3

 Broad issues pertaining to business ethics Computer Ethics


 Ethical issues related to the use of information
technology  analysis of the nature and social impact of computer
 Distinguish between management fraud and employee technology and the corresponding formulation and
fraud justification of policies for the ethical use of such
 Common types of fraud schemes technology.… [This includes] concerns about software
 Key features of SAS 78 / COSO internal control as well as hardware and concerns about networks
framework connecting computers as well as computers
 Objects and application of physical controls themselves.

Ethics Three Levels of Computer Ethics

 pertains to the principles of conduct that individuals  Pop computer ethics is simply the exposure to stories
use in making choices and guiding their behavior in and reports found in the popular media regarding the
situations that involve the concepts of right and wrong good or bad ramifications of computer technology
Business Ethics  Para computer ethics involves taking a real interest in
computer ethics cases and acquiring some level of skill
Why should we be concerned about ethics in the business and knowledge in the field
world?  Theoretical Computer Ethics, is of interest to
 Ethics are needed when conflicts arise—the need to multidisciplinary researchers who apply the theories of
choose philosophy, sociology, and psychology to computer
 In business, conflicts may arise between: science with the goal of bringing some new
 employees understanding to the field
 management
 stakeholders
 Litigation Computer Ethics…
Business ethics involves finding the answers to two concerns the social impact of computer technology
questions: (hardware, software, and telecommunications).
 How do managers decide on what is right in conducting
their business? What are the main computer ethics issues?
 Once managers have recognized what is right, how do  Privacy
they achieve it?  Security—accuracy and confidentiality
 Ownership of property
 Equity in access
Four Main Areas of Business Ethics  Environmental issues
 Artificial intelligence
 Unemployment and displacement
 Misuse of computer

Security (Accuracy and Confidentiality)

 Computer security is an attempt to avoid such


undesirable events as a loss of confidentiality or data
integrity.

Sarbanes-Oxley Act of 2002

Its principal reforms pertain to:


 Creation of the Public Company Accounting
Oversight Board (PCAOB)
 Auditor independence—more separation
Ethical Responsibility between a firm’s attestation and non-auditing
activities
 Corporate governance and responsibility—
 Seeking a balance between these consequences audit committee members must be
 PROPORTIONALITY independent and the audit committee must
 Justice. The benefits of the decision should be oversee the external auditors
distributed fairly to those who share the risks.  Disclosure requirements—increase issuer and
Those who do not benefit should not carry the management disclosure
burden of risk.  New federal crimes for the destruction of or
tampering with documents, securities fraud,
 Minimize risk. Even if judged acceptable by and actions against whistleblowers
the principles, the decision should be
Section 406—Code of Ethics for Senior Financial  Frequently involves using financial statements to
create an illusion that an entity is more healthy and
Officers SOX prosperous than it actually is
 Involves misappropriation of assets, it frequently is
 Conflicts Of Interest
shrouded in a maze of complex business transactions
 Full And Fair Disclosures
 Legal Compliance
 Internal Reporting Of Code Violations Fraud Triangle
 Accountability
 Situational Pressure, which includes personal or
job-related stresses that could coerce an
Legal Definition of Fraud individual to act dishonestly
 Opportunity, which involves direct access to
 False representation - false statement or assets and/or access to information that controls
disclosure assets
 Material fact - a fact must be substantial in  Ethics, which pertains to one’s character and
inducing someone to act degree of moral opposition to acts of dishonesty
 Intent to deceive must exist
Fraud Losses
 The misrepresentation must have resulted in
justifiable reliance upon information, which  Position. Individuals in the highest positions within an
caused someone to act organization are beyond the internal control structure
 The misrepresentation must have caused and have the greatest access to company funds and
injury or loss assets.
 Gender. Women are not fundamentally more honest
than men, but men occupy high corporate positions in
greater numbers than women. This affords men
Fraud in Accounting Literature greater access to assets.
 Age. Older employees tend to occupy higher-ranking
 fraud is also commonly known as white-collar positions and therefore generally have greater access
crime, defalcation, embezzlement, and to company assets.
irregularities. Auditors encounter fraud at two  Education. Generally, those with more education
levels: employee fraud and management fraud. occupy higher positions in their organizations and
therefore have greater access to company funds and
other assets.
Factors that Contribute to Fraud  Collusion. One reason for segregating occupational
duties is to deny potential perpetrators the
opportunity they need to commit fraud. When
individuals in critical positions collude, they create
opportunities to control or gain access to assets that
otherwise would not exist. FRA

Fraud Schemes

Three categories of fraud schemes according to the


Association of Certified Fraud Examiners:
A. fraudulent statements
B. corruption
C. asset misappropriation
Employee Fraud

 Committed by non-management personnel A. Fraudulent Statements


 Usually consists of: an employee taking cash or
other assets for personal gain by circumventing a  Misstating the financial statements to make the
company’s system of internal controls copy appear better than it is
 Three Steps:  Usually occurs as management fraud
 stealing something of value (an asset)  May be tied to focus on short-term financial
 converting the asset to a usable form (cash) measures for success
 concealing the crime to avoid detection
 May also be related to management bonus
packages being tied to financial statements
Management Fraud Special Characteristics

 Perpetrated at levels of management above the one to


which internal control structure relates
Enron, WorldCom, Adelphia Underlying Problems Cash Larceny
 Lack of Auditor Independence: auditing firms also  involves schemes in which cash receipts are stolen
engaged by their clients to perform nonaccounting from an organization after they have been recorded in
activities
 Lack of Director Independence: directors who also the organization’s books and records.
serve on the boards of other companies, have a  Lapping, in which the cash receipts clerk first steals and
business trading relationship, have a financial cashes a check from Customer A. To conceal the
relationship as stockholders or have received personal accounting imbalance caused by the loss of the asset,
loans, or have an operational relationship as
employees Customer A’s account is not credited. Later (the next
 Questionable Executive Compensation Schemes: short- billing period), the employee uses a check received
term stock options as compensation result in short- from Customer B and applies it to Customer A’s
term strategies aimed at driving up stock prices at the account. Funds received in the next period from
expense of the firm’s long-term health.
 Inappropriate Accounting Practices: a characteristic Customer C are then applied to the account of
common to many financial statement fraud schemes. Customer B, and so on.
 Enron made elaborate use of special purpose
entities
 WorldCom transferred transmission line costs Billing Schemes/ Vendor Fraud
from current expense accounts to capital
accounts  perpetrated by employees who causes their
employer to issue a payment to a false supplier or
vendor by submitting invoices for fictitious goods
B. Corruption or services, inflated invoices, or invoices for
personal purchases. Three examples of billing
 Examples:
scheme are presented here.
 bribery
 Shell Company Fraud first requires that the
 illegal gratuities
 conflicts of interest perpetrator establish a false supplier on the books
 economic extortion of the victim company. The fraudster then
 Foreign Corrupt Practice Act of 1977: manufactures false purchase orders, receiving
 indicative of corruption in business world reports, and invoices in the name of the vendor
 impacted accounting by requiring accurate and submits them to the accounting system,
records and internal controls which creates the allusion of a legitimate
 involves an executive, manager, or employee of the transaction. Based on these documents, the
organization in collusion with an outsider. system will set up an account payable and
 Four Principal Types:
ultimately issue a check to the false supplier (the
 Bribery involves giving, offering, soliciting, or
fraudster). This sort of fraud may continue for
receiving things of value to influence an
official in the performance of his or her lawful years before it is detected.
duties  A Pass Through Fraud is similar to the shell
 Illegal Gratuity involves giving, receiving, company fraud with the exception that a
offering, or soliciting something of value transaction actually takes place. Again, the
because of an official act that has been taken perpetrator creates a false vendor and issues
 Conflict Of Interest occurs when an employee purchase orders to it for inventory or supplies.
acts on behalf of a third party during the The false vendor then purchases the needed
discharge of his or her duties or has self- inventory from a legitimate vendor. The false
interest in the activity being performed
vendor charges the victim company a much higher
 Economic Extortion is the use (or threat) of
than market price for the items, but pays only the
force (including economic sanctions) by an
individual or organization to obtain something market price to the legitimate vendor. The
of value difference is the profit that the perpetrator
pockets.
C. Asset Misappropriation  A Pay-and-return Scheme is a third form of
vendor fraud. This typically involves a clerk with
 Most common type of fraud and often occurs as checkwriting authority who pays a vendor twice
employee fraud for the same products (inventory or supplies)
 Examples:
 making charges to expense accounts to cover
received. The vendor, recognizing that its
theft of asset (especially cash) customer made a double payment, issues a
 lapping: using customer’s check from one reimbursement to the victim company, which the
account to cover theft from a different clerk intercepts and cashes.
account
 transaction fraud: deleting, altering, or adding
false transactions to steal assets Check Tampering
Skimming
 involves forging or changing in some material way
 involves stealing cash from an organization before a check that the organization has written to a
it is recorded on the organization’s books and legitimate payee. One example of this is an
records. employee who steals an outgoing check to a
 Mail Room Fraud in which an employee opening vendor, forges the payee’s signature, and cashes
the mail steals a customer’s check and destroys the check. A variation on this is an employee who
the associated remittance advice
steals blank checks from the victim company Data Collection Fraud
makes them out to himself or an accomplice.
 This aspect of the system is the most vulnerable
because it is relatively easy to change data as it is being
entered into the system.
Payroll Fraud  Also, the GIGO (garbage in, garbage out) principle
reminds us that if the input data is inaccurate,
 the distribution of fraudulent paychecks to existent processing will result in inaccurate output.
and/or nonexistent employees. For example, a
supervisor keeps an employee on the payroll who has
left the organization. Each week, the supervisor Data Processing Fraud
continues to submit time cards to the payroll
department as if the employee were still working for
Program Frauds
the victim organization. The fraud works best in
 altering programs to allow illegal access to and/or
organizations in which the supervisor is responsible for
manipulation of data files
distributing paychecks to employees. The supervisor
 destroying programs with a virus
may intercept the paycheck, forge the former
employee’s signature, and cash it. Another example of Operations Frauds
payroll fraud is to inflate the hours worked on an  misuse of company computer resources, such as using
employee time card so that he or she will receive a the computer for personal business
larger than deserved paycheck. This type of fraud often
involves collusion with the supervisor or timekeeper.
Database Management Fraud

Expense Reimbursements  Altering, deleting, corrupting, destroying, or stealing an


organization’s data
 schemes in which an employee makes a claim for  Oftentimes conducted by disgruntled or ex-employee
reimbursement of fictitious or inflated business
expenses. For example, a company salesperson
files false expense reports, claiming meals, Information Generation Fraud
lodging, and travel that never occurred.
Stealing, misdirecting, or misusing computer output

Thefts of Cash
Scavenging
 searching through the trash cans on the computer
 schemes that involve the direct theft of cash on
center for discarded output (the output should be
hand in the organization. An example of this is an shredded, but frequently is not)
employee who makes false entries on a cash
register, such as voiding a sale, to conceal the Internal Control Objectives According to AICPA SAS
fraudulent removal of cash. Another example is a
bank employee who steals cash from the vault. 1. Safeguard assets of the firm
2. Ensure accuracy and reliability of accounting
records and information
3. Promote efficiency of the firm’s operations
4. Measure compliance with management’s
Non-Cash Misappropriations prescribed policies and procedures

 involve the theft or misuse of the victim


organization’s non-cash assets. One example of Modifying Assumptions to the Internal Control
this is a warehouse clerk who steals inventory Objectives
from a warehouse or storeroom. Another
example is a customer services clerk who sells  Management Responsibility
confidential customer information to a third The establishment and maintenance of a system of internal
party. control is the responsibility of management.
 Reasonable Assurance
The cost of achieving the objectives of internal control should
Computer Fraud Schemes not outweigh its benefits.
 Methods of Data Processing
 Theft, misuse, or misappropriation of assets by altering
computer-readable records and files The techniques of achieving the objectives will vary with
 Theft, misuse, or misappropriation of assets by altering different types of technology.
logic of computer software
 Theft or illegal use of computer-readable information Limitations of Internal Controls
 Theft, corruption, illegal copying or intentional
destruction of software  Possibility of honest errors
 Theft, misuse, or misappropriation of computer  Circumvention via collusion
hardware  Management override
 Changing conditions--especially in companies with high 1: The Control Environment
growth
 Integrity and ethics of management
 Organizational structure
Exposure and Risk  Role of the board of directors and the audit committee
 Management’s policies and philosophy
 Delegation of responsibility and authority
 The absence or weakness of a control is called an  Performance evaluation measures
exposure  External influences—regulatory agencies
 Policies and practices managing human resources

Exposures of Weak Internal Controls (Risk) 2: Risk Assessment

 Destruction of an asset  Identify, analyze and manage risks relevant to financial


reporting:
 Theft of an asset
 changes in external environment
 Corruption of information  risky foreign markets
 Disruption of the information system  significant and rapid growth that strain
internal controls
 new product lines
 restructuring, downsizing
The Preventive–Detective–Corrective Internal  changes in accounting policies
Control Model 3: Information and Communication
 Preventive controls are passive techniques  The AIS should produce high quality information which:
designed to reduce the frequency of occurrence  identifies and records all valid transactions
of undesirable events. Preventive controls force  provides timely information in appropriate
compliance with prescribed or desired actions and detail to permit proper classification and
financial reporting
thus screen out aberrant events.  accurately measures the financial value of
 Detective controls form the second line of transactions
defense. These are devices, techniques, and  accurately records transactions in the time
procedures designed to identify and expose period in which they occurred
 Auditors must obtain sufficient knowledge of the IS to
undesirable events that elude preventive controls.
understand:
Detective controls reveal specific types of errors  the classes of transactions that are material
by comparing actual occurrences to pre-  how these transactions are initiated
established standards. [input]
 Corrective controls are actions taken to reverse  the associated accounting records
and accounts used in processing
the effects of errors detected in the previous step. [input]
There is an important distinction between  the transaction processing steps involved from
detective controls and corrective controls. the initiation of a transaction to its inclusion in
Detective controls identify anomalies and draw the financial statements [process]
 the financial reporting process used to
attention to them; corrective controls actually fix
compile financial statements, disclosures, and
the problem. estimates [output]

SAS 78 / COSO 4: Monitoring


Describes the relationship between the firm’s… The process for assessing the quality of internal control design
 internal control structure, and operation
 auditor’s assessment of risk, and
[This is feedback in the general AIS model.]
 the planning of audit procedures
 Separate procedures—test of controls by internal
How do these three interrelate? auditors
 Ongoing monitoring:
The weaker the internal control structure, the higher the assessed  computer modules integrated into routine
level of risk; the higher the risk, the more auditor operations
procedures applied in the audit.  management reports which highlight trends
and exceptions from normal performance

Five Internal Control Components: SAS 78 / COSO 5: Control Activities


1. Control environment  Policies and procedures to ensure that the appropriate
2. Risk assessment actions are taken in response to identified risks
 Fall into two distinct categories:
3. Information and communication  IT controls—relate specifically to the
computer environment
4. Monitoring
 Physical controls—primarily pertain to human
5. Control activities activities
Two Types of IT Controls  Thus the crucial need to separate program
development, program operations, and program
 General controls—pertain to the entitywide maintenance.
computer environment  Physical Controls in IT Contexts
 Examples: controls over the data center,
organization databases, systems Supervision
development, and program maintenance  The ability to assess competent employees becomes
 Application controls—ensure the integrity of more challenging due to the greater technical
specific systems knowledge required.
 Examples: controls over sales order  Physical Controls in IT Contexts
processing, accounts payable, and payroll
applications Accounting Records
 ledger accounts and sometimes source documents are
kept magnetically
Six Types of Physical Controls  no audit trail is readily apparent
 Physical Controls in IT Contexts
 Transaction Authorization
 Segregation of Duties Access Control
 Data consolidation exposes the organization to
 Supervision
computer fraud and excessive losses from disaster.
 Accounting Records  Physical Controls in IT Contexts
 Access Control
 Independent Verification Independent Verification
 When tasks are performed by the computer rather
than manually, the need for an independent check is
Physical Controls not necessary.
 However, the programs themselves are checked.
Transaction Authorization
 used to ensure that employees are carrying out only
authorized transactions
 general (everyday procedures) or specific (non-routine
transactions) authorizations

Segregation of Duties
 In manual systems, separation between:
 authorizing and processing a transaction
 custody and recordkeeping of the asset
 subtasks
 In computerized systems, separation between:
 program coding
 program processing
 program maintenance

Supervision
 a compensation for lack of segregation; some may be
built into computer systems

Accounting Records
 provide an audit trail

Access Controls
 help to safeguard assets by restricting physical access
to them

Independent Verification
 reviewing batch totals or reconciling subsidiary
accounts with control accounts
Physical Controls in IT Contexts

Transaction Authorization

 The rules are often embedded within computer


programs.
 EDI/JIT: automated re-ordering of inventory
without human intervention

Segregation of Duties
 A computer program may perform many tasks that are
deemed incompatible.

Das könnte Ihnen auch gefallen