Computer Fraud Copyright 2012 Pearson Education 5 1 Learning Objectives Explain the threats faced by modern information systems Define fraud and describe the process one follows to perpetuate a fraud ID: 363968
Download Presentation The PPT/PDF document "Chapter 5" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Chapter 5
Computer Fraud
Copyright © 2012 Pearson Education
5-
1Slide2
Learning Objectives
Explain the threats faced by modern information systems.
Define fraud and describe the process one follows to perpetuate a fraud.Discuss who perpetrates fraud and why it occurs, including:the pressures, opportunities, and rationalizations that are present in most frauds.
Define computer fraud and discuss the different computer fraud classifications.
Explain how to prevent and detect computer fraud and abuse.
Copyright © 2012 Pearson Education
5-
2Slide3
Common Threats to AIS
Natural Disasters and Terrorist ThreatsSoftware Errors and/or Equipment Malfunction
Unintentional Acts (Human Error)Intentional Acts (Computer Crimes)
Copyright © 2012 Pearson Education
5-
3Slide4
What Is Fraud?
Gaining an unfair advantage over another personA false statement, representation, or disclosure
A material fact that induces a person to actAn intent to deceiveA justifiable reliance on the fraudulent fact in which a person takes actionAn injury or loss suffered by the victim
Individuals who commit fraud are referred to as white-collar criminals.
Copyright © 2012 Pearson Education
5-
4Slide5
Forms of Fraud
Misappropriation of assetsTheft of a companies assets.
Largest factors for theft of assets:Absence of internal control systemFailure to enforce internal control systemFraudulent financial reporting“…intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements” (The Treadway Commission).
Copyright © 2012 Pearson Education
5-
5Slide6
Reasons for Fraudulent Financial Statements
Deceive investors or creditors
Increase a company’s stock priceMeet cash flow needs
Hide company losses or other problems
Copyright © 2012 Pearson Education
5-
6Slide7
Treadway Commission Actions to Reduce Fraud
Establish environment which supports the integrity of the financial reporting process.
Identification of factors that lead to fraud.
Assess the risk of fraud within the company.
Design and implement internal controls to provide assurance that fraud is being prevented.
Copyright © 2012 Pearson Education
5-
7Slide8
SAS #99
Auditors responsibility to detect fraudUnderstand fraud
Discuss risks of material fraudulent statementsAmong members of audit teamObtain informationLook for fraud risk factorsIdentify, assess, and respond to risk
Evaluate the results of audit tests
Determine impact of fraud on financial statements
Document and communicate findings
See Chapter 3Incorporate a technological focus
Copyright © 2012 Pearson Education
5-
8Slide9
The Fraud Triangle
Copyright © 2012 Pearson Education
5-
9
Three conditions that are present when Fraud occurs.Slide10
Pressure
Motivation or incentive to commit fraud
Types:
Employee
Financial
Emotional
Lifestyle
Financial
Industry conditions
Management characteristics
Copyright © 2012 Pearson Education
5-
10Slide11
Opportunity
Condition or situation that allows a person or organization to:
Commit the fraud
Conceal the fraud
Lapping
Kiting
Convert the theft or misrepresentation to personal gain
Copyright © 2012 Pearson Education
5-
11Slide12
Rationalizations
Justification of illegal behavior
Justification
I am not being dishonest.
Attitude
I don’t need to be honest.
Lack of personal integrity
Theft is valued higher than honesty or integrity.
Copyright © 2012 Pearson Education
5-
12Slide13
Computer Fraud
Any illegal act in which knowledge of computer technology is necessary for:Perpetration
InvestigationProsecution
Copyright © 2012 Pearson Education
5-
13Slide14
Rise of Computer Fraud
Definition is not agreed on
Many go undetectedHigh percentage is not reported
Lack of network security
Step-by-step guides are easily available
Law enforcement is overburdened
Difficulty calculating loss
Copyright © 2012 Pearson Education
5-
14Slide15
Computer Fraud Classifications
Input FraudAlteration or falsifying input
Processor FraudUnauthorized system useComputer Instructions Fraud
Modifying software, illegal copying of software, using software in an unauthorized manner, creating software to undergo unauthorized activities
Data Fraud
Illegally using, copying, browsing, searching, or harming company data
Output FraudStealing, copying, or misusing computer printouts or displayed information
Copyright © 2012 Pearson Education
5-
15