IS 414 CH. 5 Flashcards
(29 cards)
What are the threats to Accounting Information Systems?
Natural & political disasters, Software errors and equipment malfunctions, unintentional acts, and intentional acts (computer crimes)
Natural & political disasters
fire or excessive heat
floods, earthquakes, landslides, hurricanes, tornadoes,etc
war and attacks by terrorists
Software errors and equipment malfunctions
hardware or software failure
operating system crashes
power outages & fluctuations
undetected data transmission error
Unintentional acts
accidents caused by human carelessness, failure to follow procedures
innocent errors and omissions
logic errors
lost, misplaced, or destroyed data
systems that do not meet company needs or handle tasks
Intentional acts (computer crimes)
sabotage
false use, unauthorized disclosure of data
financial statement fraud
corruption
computer fraud (attack, social engineering, malware, etc)
sabotage
an intentional act where the intent is to destroy a system or some of its components
fraud
any and all means a person uses to gain an unfair advantage over another person
For an act to be fraudulent
- False statement, representation, or disclosure
- A material fact, which is something that induces a person to act
- An intent to deceive
- A justifiable reliance; that is, the person relies on the misrepresentation to take an action
- An injury or loss suffered by the victim
white-collar crimes
businesspeople who commit fraud, they usually resort to trickery or cunning and their crimes usually involve a violation of trust or confidence
corruption
dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Ex: bribery, bid rigging
investment fraud
misrepresentation or leaving out facts in order to promote an investment that promises fantastic profits with little or no risk. Ex: ponsi scheme and securities fraud
misappropriation of assets
theft of company assets by employees
describe both the different types of fraud
misappropriation of assets (sometimes called employee fraud) and fraudulent financial reporting (sometimes called management fraud)
misappropriation of assets (steps)
is the absence of internal controls and/or the failure to enforce existing internal controls
- gains the trust of entity being defrauded
- uses trickery, cunning, or false misleading info
- conceals fraud by falsifying records or other info
- rarely terminates the fraud voluntarily
- sees how easy it is to get money, or has greed (self-perpetuating; if they stop, they’ll get caught)
- spend the money
- greedy, takes more money more often
- grows careless or overconfident
fraudulent financial reporting
intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements
Who perpetrates fraud?
white collar fraud - people like you & me
computer fraud - younger people with more computer experience
Fraud Triangle
pressure, opportunity, and rationalization
pressure
person’s incentive or motivation for committing fraud
opportunity
the condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to a person gain
- can hide in an expense account
- use lapping
- check kiting
lapping
concealing the theft of cash by means of series of delays in posting collections to account receivables
check kiting
creating cash using the lag between the time a check is deposited and the time it clears the bank
rationalizations
the excuse that fraud perpetrators use to justify their illegal behavior
computer fraud
any type of fraud that requires computer technology to perpetrate
input fraud
alter or falsify computer input