/
Chapter 5 Chapter 5

Chapter 5 - PowerPoint Presentation

natalia-silvester
natalia-silvester . @natalia-silvester
Follow
363 views
Uploaded On 2016-06-15

Chapter 5 - PPT Presentation

Computer Fraud Copyright 2012 Pearson Education 5 1 Learning Objectives Explain the threats faced by modern information systems Define fraud and describe the process one follows to perpetuate a fraud ID: 363968

copyright fraud pearson 2012 fraud copyright 2012 pearson education computer financial software fraudulent copying illegal commit company internal person

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Chapter 5" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Chapter 5

Computer Fraud

Copyright © 2012 Pearson Education

5-

1Slide2

Learning Objectives

Explain the threats faced by modern information systems.

Define fraud and describe the process one follows to perpetuate a fraud.Discuss who perpetrates fraud and why it occurs, including:the pressures, opportunities, and rationalizations that are present in most frauds.

Define computer fraud and discuss the different computer fraud classifications.

Explain how to prevent and detect computer fraud and abuse.

Copyright © 2012 Pearson Education

5-

2Slide3

Common Threats to AIS

Natural Disasters and Terrorist ThreatsSoftware Errors and/or Equipment Malfunction

Unintentional Acts (Human Error)Intentional Acts (Computer Crimes)

Copyright © 2012 Pearson Education

5-

3Slide4

What Is Fraud?

Gaining an unfair advantage over another personA false statement, representation, or disclosure

A material fact that induces a person to actAn intent to deceiveA justifiable reliance on the fraudulent fact in which a person takes actionAn injury or loss suffered by the victim

Individuals who commit fraud are referred to as white-collar criminals.

Copyright © 2012 Pearson Education

5-

4Slide5

Forms of Fraud

Misappropriation of assetsTheft of a companies assets.

Largest factors for theft of assets:Absence of internal control systemFailure to enforce internal control systemFraudulent financial reporting“…intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements” (The Treadway Commission).

Copyright © 2012 Pearson Education

5-

5Slide6

Reasons for Fraudulent Financial Statements

Deceive investors or creditors

Increase a company’s stock priceMeet cash flow needs

Hide company losses or other problems

Copyright © 2012 Pearson Education

5-

6Slide7

Treadway Commission Actions to Reduce Fraud

Establish environment which supports the integrity of the financial reporting process.

Identification of factors that lead to fraud.

Assess the risk of fraud within the company.

Design and implement internal controls to provide assurance that fraud is being prevented.

Copyright © 2012 Pearson Education

5-

7Slide8

SAS #99

Auditors responsibility to detect fraudUnderstand fraud

Discuss risks of material fraudulent statementsAmong members of audit teamObtain informationLook for fraud risk factorsIdentify, assess, and respond to risk

Evaluate the results of audit tests

Determine impact of fraud on financial statements

Document and communicate findings

See Chapter 3Incorporate a technological focus

Copyright © 2012 Pearson Education

5-

8Slide9

The Fraud Triangle

Copyright © 2012 Pearson Education

5-

9

Three conditions that are present when Fraud occurs.Slide10

Pressure

Motivation or incentive to commit fraud

Types:

Employee

Financial

Emotional

Lifestyle

Financial

Industry conditions

Management characteristics

Copyright © 2012 Pearson Education

5-

10Slide11

Opportunity

Condition or situation that allows a person or organization to:

Commit the fraud

Conceal the fraud

Lapping

Kiting

Convert the theft or misrepresentation to personal gain

Copyright © 2012 Pearson Education

5-

11Slide12

Rationalizations

Justification of illegal behavior

Justification

I am not being dishonest.

Attitude

I don’t need to be honest.

Lack of personal integrity

Theft is valued higher than honesty or integrity.

Copyright © 2012 Pearson Education

5-

12Slide13

Computer Fraud

Any illegal act in which knowledge of computer technology is necessary for:Perpetration

InvestigationProsecution

Copyright © 2012 Pearson Education

5-

13Slide14

Rise of Computer Fraud

Definition is not agreed on

Many go undetectedHigh percentage is not reported

Lack of network security

Step-by-step guides are easily available

Law enforcement is overburdened

Difficulty calculating loss

Copyright © 2012 Pearson Education

5-

14Slide15

Computer Fraud Classifications

Input FraudAlteration or falsifying input

Processor FraudUnauthorized system useComputer Instructions Fraud

Modifying software, illegal copying of software, using software in an unauthorized manner, creating software to undergo unauthorized activities

Data Fraud

Illegally using, copying, browsing, searching, or harming company data

Output FraudStealing, copying, or misusing computer printouts or displayed information

Copyright © 2012 Pearson Education

5-

15