0% found this document useful (0 votes)
219 views12 pages

Romney Ais13 PPT 05

Uploaded by

Meta Dwi Maretta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
219 views12 pages

Romney Ais13 PPT 05

Uploaded by

Meta Dwi Maretta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Computer Fraud

Chapter 5

Copyright © 2015 Pearson Education, Inc.


5-1
Threats to AIS

• Natural and Political disasters

• Software errors and equipment malfunctions

• Unintentional acts

• Intentional acts

Copyright © 2015 Pearson Education, Inc.


5-2
Fraud
• Any means a person uses to gain an unfair
advantage over another person; includes:
▫ A false statement, representation, or disclosure
▫ A material fact, which induces a victim to act
▫ An intent to deceive
▫ Victim relied on the misrepresentation
▫ Injury or loss was suffered by the victim

Fraud is white collar crime

Copyright © 2015 Pearson Education, Inc.


5-3
Two Categories of Fraud

• Misappropriation of assets
▫ Theft of company assets which can include
physical assets (e.g., cash, inventory) and digital
assets (e.g., intellectual property such as protected
trade secrets, customer data)
• Fraudulent financial reporting
▫ “cooking the books” (e.g.,booking fictitious
revenue, overstating assets, etc.)

Copyright © 2015 Pearson Education, Inc.


5-4
Conditions for Fraud

These three conditions must be


present for fraud to occur:
• Pressure • Opportunity to:
▫ Employee ▫ Commit
 Financial ▫ Conceal
 Lifestyle ▫ Convert to personal gain
 Emotional
▫ Financial Statement • Rationalize
 Financial
▫ Justify behavior
 Management
▫ Attitude that rules don’t apply
 Industry conditions
▫ Lack personal integrity

Copyright © 2015 Pearson Education, Inc.


5-5
Fraud Triangle

Copyright © 2015 Pearson Education, Inc.


5-6
Computer Fraud

• If a computer is used to commit fraud it is called


computer fraud.
• Computer fraud is classified as:
▫ Input
▫ Processor
▫ Computer instruction
▫ Data
▫ Output

Copyright © 2015 Pearson Education, Inc.


5-7
Preventing and Detecting Fraud
1. Make Fraud Less Likely to Occur
Organizational Systems

• Create a culture of integrity • Develop security policies to


• Adopt structure that guide and design specific
minimizes fraud, create control procedures
governance (e.g., Board of • Implement change
Directors) management controls and
• Assign authority for business project development
objectives and hold them acquisition controls
accountable for achieving
those objectives, effective
supervision and monitoring of
employees
• Communicate policies
Copyright © 2015 Pearson Education, Inc.
5-8
Preventing and Detecting Fraud
2. Make It Difficulty to Commit

Organizational Systems
• Develop strong internal • Restrict access
controls • System authentication
• Segregate accounting • Implement computer controls
functions over input, processing, storage
• Use properly designed forms and output of data
• Require independent checks • Use encryption
and reconciliations of data • Fix software bugs and update
systems regularly
• Destroy hard drives when
disposing of computers
Copyright © 2015 Pearson Education, Inc.
5-9
Preventing and Detecting Fraud
3. Improve Detection

Organizational Systems
• Assess fraud risk • Audit trail of transactions
• External and internal audits through the system
• Fraud hotline • Install fraud detection
software
• Monitor system activities (user
and error logs, intrusion
detection)

Copyright © 2015 Pearson Education, Inc.


5-10
Preventing and Detecting Fraud
4. Reduce Fraud Losses

Organizational Systems
• Insurance • Store backup copies of
• Business continuity and program and data files in
disaster recovery plan secure, off-site location
• Monitor system activity

Copyright © 2015 Pearson Education, Inc.


5-11
Key Terms

• Sabotage • Pressure
• Cookie • Opportunity
• Fraud • rationalization
• White-collar criminals • Lapping
• Corruption • Check kiting
• Investment fraud • Computer fraud
• Misappropriation of assets
• Fraudulent financial reporting

Copyright © 2015 Pearson Education, Inc.


5-12

You might also like