CHAPTER 3 Flashcards

(47 cards)

1
Q

pertains to the principles of conduct that individuals use in making choices and guiding their behavior in situations that involve the concepts of right and wrong

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Four areas of ethical issues in business

A

equity, rights, honesty and the exercise of corporate power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The benefit from a decision must outweigh the risks. Furthermore, there must be no alternative decision that provides the same or greater benefit with less risk.

A

PROPORTIONALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The benefits of the decision should be distributed fairly to those who share the risks. Those who do not benefit should not carry the burden of risk

A

Justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Even if judged acceptable by the principles, the decision should be implemented so as to minimize all of the risks and avoid any unnecessary risks.

A

Minimize risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology

A

Computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the most significant securities law since the Securities and Exchange Commission (SEC)

A

Sarbanes-Oxley Act (SOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

denotes a false representation of a material fact made by one party to another party with the intent to deceive and induce the other party to justifiably rely on the fact to his or her detriment.

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

generally designed to directly convert cash or other assets to the employee’s personal benefit.

A

Employee fraud, or fraud by nonmanagement employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is more insidious than employee fraud because it often escapes detection until the
organization has suffered irreparable damage or loss

A

Management fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 factors of fraud triangle

A

rationalization, opportunity, ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

empowered to set auditing, quality control, and ethics standards; to inspect registered accounting firms; to conduct investigations; and to take disciplinary actions

A

Public Company Accounting Oversight Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

involves an executive, manager, or employee of the organization in collusion with an outsider

A

Corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

involves giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties.

A

Bribery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

involves giving, receiving, offering, or soliciting something of value because of an official act that has been taken. This is similar to a bribe, but the transaction occurs after the fact

A

illegal gratuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

occurs when an employee acts on behalf of a third party during the discharge of his or her duties or has self-interest in the activity being performed.

A

conflict of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is the use (or threat) of force (including economic sanctions) by an individual or organization to obtain something of value.

A

Economic extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

involves stealing cash from an organization before it is recorded on the organization’s books and records.

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

an employee opening the mail steals a customer’s check and destroys the associated remittance advice.

A

mail room fraud

20
Q

involves schemes in which cash receipts are stolen from an organization after they have
been recorded in the organization’s books and records.

21
Q

are perpetrated by employees who causes their employer to issue a payment to a false supplier or vendor by submitting invoices for fictitious goods or services, inflated invoices, or invoices for personal purchases

A

Billing schemes, also known as vendor fraud

22
Q

requires that the perpetrator establish a false supplier on the books of the victim company. The fraudster then manufactures false purchase orders, receiving reports, and invoices in the name of the vendor and submits them to the accounting system, which creates the allusion of a legitimate transaction

A

shell company fraud

23
Q

is similar to the shell company fraud with the exception that a transaction actually takes place.

A

pass through fraud

24
Q

is a third form of vendor fraud. This typically involves a clerk with check writing authority who pays a vendor twice for the same products (inventory or supplies) received.

A

pay-and-return scheme

25
involves forging or changing in some material way a check that the organization has written to a legitimate payee
Check tampering
26
is the distribution of fraudulent paychecks to existent and/or nonexistent employees
Payroll fraud
27
are schemes in which an employee makes a claim for reimbursement of fictitious or inflated business expenses.
Expense reimbursement frauds
28
are schemes that involve the direct theft of cash on hand in the organization
Thefts of cash
29
involve the theft or misuse of the victim organization’s non-cash assets.
Non-cash fraud schemes
30
This concept holds that the establishment and maintenance of a system of internal control is a
management responsibility
31
The internal control system should provide ______ that the four broad objectives of internal control are met in a cost-effective manner.
reasonable assurance
32
are passive techniques designed to reduce the frequency of occurrence of undesirable events.
Preventive controls
33
form the second line of defense. These are devices, techniques, and procedures designed to identify and expose undesirable events that elude preventive controls
Detective controls
34
are actions taken to reverse the effects of errors detected in the previous step.
Corrective controls
35
Five components of COSO framework
Control Environment Risk Assessment Information and Communication Monitoring Control Activities
36
is the foundation for the other four control components, sets the tone for the organization and influences the control awareness of its management and employees.
control environment
37
Organizations must perform a ______ to identify, analyze, and manage risks relevant to financial reporting.
risk assessment
38
is the process by which the quality of internal control design and operation can be assessed.
Monitoring
39
are the policies and procedures used to ensure that appropriate actions are taken to deal with the organization’s identified risks.
Control activities
40
pertain to entity-wide concerns such as controls over the data center, organization databases, systems development, and program maintenance.
General controls
41
ensure the integrity of specific systems such as sales order processing, accounts payable, and payroll applications
Application controls
42
This class of controls relates primarily to the human activities employed in accounting systems.
PHYSICAL CONTROLS
43
ensure that all material transactions processed by the information system are valid and in accordance with management’s objectives.
transaction authorization
44
can take many forms, depending on the specific duties to be controlled
Segregation of duties
45
consist of source documents, journals, and ledgers
accounting records
46
ensure that only authorized personnel have access to the firm’s assets.
access controls
47
are independent checks of the accounting system to identify errors and misrepresentations.
Verification procedures