Академический Документы
Профессиональный Документы
Культура Документы
BUSINESS
ETHICAL STANDARDS
2.Rights
3. Honesty
Ethical Responsibility
2. Justice
3. Minimize risk
COMPUTER ETHICS
- the analysis of the nature and
social impact of computer
technology and the corresponding
formulation and justification of
policies for the ethical use of such
technology
Three Level of Computer Ethics
1. Pop
2. Para
3. Theoretical
A fundamental question arising is
whether computers PRESENT
NEW ETHICAL PROBLEMS or just
CREATE NWE TWISTS ON OLD
PROBLEMS.
PRIVACY
People desire to be in full control
of what and how much
information about themselves is
available to others, and to whom
it is available.
SECURITY (ACCURACY AND
CONFIDENTIALITY)
Computer security
False representation
Material fact
Intent
Justifiable reliance
Injury or loss
FRAUD AT TWO LEVELS:
1. Employee Fraud
2. Management Fraud
CHARACTERISTICS OF MANAGEMENT FRAUD
situational pressure
opportunity
ethics
Ethics
Pressure Opportunity
No Fraud
Fraud
Pressure Opportunity
Ethics
RED-FLAG CHECKLIST
Do key executives have unusually high personal debt?
Do key executives appear to be living beyond their means?
Do key executives engage in habitual gambling?
Do key executives appear to abuse alcohol or drugs?
Are economic conditions unfavourable within the companys
industry?
Does the company use several different banks, none of which sees
the companys entire financial picture?
Do any key executives have close associations with suppliers?
Is the company experiencing a rapid turnover of key employees,
either through resignation or termination?
Do one or two individuals dominate the company?
PERPETRATORS OF FRAUD
Position within the organization
Collusion with others
Gender
Age
Education
FRAUD LOSSES BY POSITION
WITHIN THE ORGANIZATION
Position Percent of Frauds Loss
Owner/Executive 23 $834,000
Manager 37 150,000
Employee 40 70,000
FRAUD LOSSES AND THE
COLLUSION EFFECT
Perpetrator Loss
Two or more(36%) $500,000
One(64%) 115,500
FRAUD LOSSES BY GENDER
Gender Loss
Male(59%) $250,000
Female(41%) 110,000
FRAUD LOSSES BY AGE
Fraudulent Statements
Corruption
Asset Misappropriation
1. FRAUDULENT STATEMENTS
The Underlying Problems
2. Auditor independence
Nine functions:
1. Bookkeeping or other services related to accounting or financial
statement.
2. Financial information systems design and implementation
3. Appraisal or valuation services, fairness opinions, or contribution-in-kind reports
4. Actuarial services
5. Internal audit outsourcing services
6. Management functions or human resources
7. Broker or dealer, investment adviser, or investment banking services
8. Legal services and expert services unrelated to the audit
9. Any other service that the PCAOB determines is impermissible
REFORMS
3. Corporate governance and responsibility
Cash Larceny(Lapping)
Billing Schemes
Shell Company
Pass-through
Pay-and-return
Check Tampering
Payroll Fraud
Expense reimbursement
Thefts of Cash
Non-cash missappropriation
COMPUTER FRAUD
theft, misuse, or missappropriation of assets by altering computer-readable
records and files
theft, misuse, or missappropriation of assets by altering the logic of computer
software
theft or illegal use of computer-readable information
theft, corruption, illegal copying, or intentional destruction of computer
software
theft, misuse, or missappropriation of computer hardware
Data Collection
Data Processing
> Program Fraud
> Operations Fraud
Database Management
Information Generation
(relevance, timeliness, accuracy, completeness,
summarization)
AUDITORS REPONSIBILITY
OF DETECTING FRAUD
SAS NO. 99 CONSIDERATION OF FRAUD
IN A FINANCIAL STATEMENT AUDIT
1. Description and Characteristics of Audit
2. Professional Skepticism
5. Identifying Risk
8.
Evaluating Audit Evidence and Information
o Industry Conditions
Inadequate Disclosures
2. Misappropriation of Assets
o Susceptibility of Assets to Misappropriation
o Controls
Asset Misappropriation Common Schemes:
Personal Purchases
Ghost Employees
Fictitious Expenses
Altered Payee
Lapping
Auditor's Response to Assessed Risk
2. Payroll fraud
Overpayment Payments to
of employees nonexistent
employees