Chapter 3 Flashcards

1
Q

Ethics are needed when

A

conflicts arise—the people need to choose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In business, conflicts may arise between:

A

employees
management
stakeholders
Litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four main areas of business ethics

A
  1. Equity
  2. Rights
  3. Honesty
  4. Exercise of Corporate Power
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

concerns the social impact of computer technology (hardware, software, and telecommunications).

A

Computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main computer ethics issues?

A

Privacy
Security—accuracy and confidentiality
Ownership of property
Environmental issues
Artificial intelligence
Unemployment and displacement
Misuse of computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

false statement or disclosure

A

False representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a fact must be substantial in
inducing someone to act

A

Material fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Legal Definition of fraud

A
  1. False representation
  2. Material Fact
  3. Intent to deceive must exist
  4. Justifiable reliance on misrepresentation
  5. Caused injury or loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enron, WorldCom, Adelphia
Underlying Problems

A
  1. Lack of Auditor Independence
  2. Lack of Director Independence
  3. Questionable Executive Compensation Schemes
  4. Inappropriate Accounting Practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sarbanes-Oxley Act of 2002 principal reforms pertain to

A

Creation of the Public Company Accounting Oversight Board (PCAOB)
Auditor independence—more separation between a firm’s attestation and non-auditing activities
Corporate governance and responsibility—audit committee members must be independent and the audit committee must oversee the external auditors
Disclosure requirements—increase issuer and management disclosure
New federal crimes for the destruction of or tampering with documents, securities fraud, and
actions against whistleblower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Committed by non-management personnel/employee
Usually consists of: an employee taking cash or other
assets for personal gain by circumventing a company’s
system of internal controls

A

Employee Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Perpetrated at levels of management above the
one to which internal control structure relates
Frequently involves using financial statements to
create an illusion that an entity is more healthy and prosperous than it actually is
Involves misappropriation of assets, it frequently is shrouded in a maze of complex business transaction

A

Management Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three categories of fraud schemes according to the
Association of Certified Fraud Examiners

A

A. fraudulent statements
B. corruption
C. asset misappropriation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Misstating the financial statements to make the copy
appear better than it is
Usually occurs as management fraud
May be tied to focus on short-term financial measures for success
May also be related to management bonus packages
being tied to financial statement

A

Fraudulent Statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of corruption

A

bribery
illegal gratuities
conflicts of interest
economic extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

indicative of corruption in business world
impacted accounting by requiring accurate
records and internal controls

A

Foreign Corrupt Practice Act of 1977

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Most common type of fraud and often occurs as
employee fraud
Examples:
making charges to expense accounts to cover theft of
asset (especially cash)
lapping: using customer’s check from one account to cover theft from a different account
transaction fraud: deleting, altering, or adding false transactions to steal assets

A

Asset Misappropriation

18
Q

Internal Control Objectives
According to AICPA SAS

A
  1. Safeguard assets of the firm
  2. Ensure accuracy and reliability of accounting records and information
  3. Promote efficiency of the firm’s operations
  4. Measure compliance with management’s prescribed policies and procedures
19
Q

Modifying Assumptions to the Internal Control Objectives

A
  1. Management Responsibility
  2. Reasonable Assurance
  3. Methods of Data Processing
20
Q

Limitations of Internal Controls

A

Possibility of honest errors
Circumvention via collusion
Management override
Changing conditions–especially in companies with high growth

21
Q

Exposures of Weak Internal
Controls (Risk)

A

Destruction of an asset
Theft of an asset
Corruption of information
Disruption of the information system

22
Q

Undesirable Events

A
  1. Access
  2. Fraud
  3. Errors
  4. Mischief
23
Q

Levels of Control

A
  1. Preventive
  2. Detective
  3. Corrective
24
Q

Five Internal Control
Components: SAS 78 / COSO

A
  1. Control environment
  2. Risk assessment
  3. Information and communication
  4. Monitoring
  5. Control activities
25
Integrity and ethics of management Organizational structure Role of the board of directors and the audit committee Management’s policies and philosophy Delegation of responsibility and authority Performance evaluation measures External influences—regulatory agencies Policies and practices managing human resource
The control environment
26
27
Identify, analyze and manage risks relevant to financial reporting
Risk Assessment
28
The AIS should produce high quality information which: identifies and records all valid transactions provides timely information in appropriate detail to permit proper classification and financial reporting accurately measures the financial value of transactions accurately records transactions in the time period in which they occurred
Information and Communication
29
The process for assessing the quality of internal control design and operation
Monitoring
30
Policies and procedures to ensure that the appropriate actions are taken in response to identified risks
Control Activities
31
Control activities fall into two distinct categories
1. IT Controls - relate specifically to the computer environment 2. Physical Controls - primarily pertain to human activities
32
Two Types of IT Controls
1. General Controls 2. Application Controls
33
pertain to the entity wide computer environment
General Controls
34
ensure the integrity of specific systems
Application Controls
35
Six Types of Physical Controls
Transaction Authorization Segregation of Duties Supervision Accounting Records Access Control Independent Verification
36
used to ensure that employees are carrying out only authorized transactions general (everyday procedures) or specific(non routine transactions) authorization
Transaction Authorization
37
In manual systems, separation between: ● authorizing and processing a transaction ● custody and record keeping of the asset ● subtasks In computerized systems, separation between: ● program coding ● program processing ● program maintenance
Segregation of Duties
38
a compensation for lack of segregation; some may be built into computer systems
Supervision
39
provide an audit trail
Accounting Records
40
help to safeguard assets by restricting physical access to them
Access Controls
41
reviewing batch totals or reconciling subsidiary accounts with control accounts
Independent Verification