Tải bản đầy đủ (.ppt) (169 trang)

Accounting information systems 11e romney steinbart chapter 05

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.82 MB, 169 trang )

C

HAPTER 5

Computer Fraud and Abuse

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

1 of 175


INTRODUCTION
• Questions to be addressed in this chapter:
– What is fraud, and how are frauds
perpetrated?
– Who perpetrates fraud and why?
– What is computer fraud, and what forms does
it take?
– What approaches and techniques are used to
commit computer fraud?

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart


2 of 175


INTRODUCTION
• Information systems are becoming
increasingly more complex and society is
becoming increasingly more dependent on
these systems.
– Companies also face a growing risk of these
systems being compromised.
– Recent surveys indicate 67% of companies
suffered a security breach in the last year with
almost 60% reporting financial losses.
© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

3 of 175


INTRODUCTION


Include:
– Fire or excessive heat
– Floods
– Earthquakes
– High winds

disasters
– War and terrorist attack
When a natural or political disaster
strikes, many companies can be
affected at the same time.
– Example: Bombing of the
World Trade Center in NY.
The Defense Science Board has
predicted that attacks on
information systems by foreign
countries, espionage agents, and
terrorists will soon be widespread.

• Companies face four types of threats to
their information systems:
– Natural and political




© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

4 of 175


• Include:

– Hardware or software
failures
– Software errors or bugs
– Operating system
crashes
– Power outages and
fluctuations
Natural and political disasters– Undetected data
transmission errors
Software errors and equipment
• Estimated annual economic
malfunction
losses due to software
bugs = $60 billion.
• 60% of companies studied
had significant software
errors in previous year.

INTRODUCTION

• Companies face four types of threats to
their information systems:



© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart


5 of 175


INTRODUCTION


Include
– Accidents caused by:
• Human carelessness
• Failure to follow established
procedures
– Natural and political disasters
• Poorly trained or supervised
– Software errors and equipment
personnel malfunction
– Unintentional acts– Innocent errors or omissions
– Lost, destroyed, or misplaced data
– Logic errors
– Systems that do not meet needs or
are incapable of performing intended
tasks
• Information Systems Security Assn.
estimates 65% of security problems are
caused
bySystems,
human
© 2008 Prentice Hall Business Publishing
Accounting
Information

11/e error.
Romney/Steinbart
6 of 175

• Companies face four types of threats to
their information systems:


• Include:
INTRODUCTION
– Sabotage
– Computer fraud
– Misrepresentation, false use, or
unauthorized disclosure of data
– Misappropriation of assets
Natural and political
disasters
– Financial
statement fraud
Information
systems
are increasingly
Software errors •and
equipment
malfunction
vulnerable to these malicious attacks.

• Companies face four types of threats to
their information systems:



– Unintentional acts
– Intentional acts (computer crime)

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

7 of 175


INTRODUCTION
• In this chapter we’ll discuss:
– The fraud process
– Why fraud occurs
– Approaches to computer fraud
– Specific techniques used to commit computer
fraud
– Ways companies can deter and detect
computer fraud

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

8 of 175



INTRODUCTION
• In this chapter we’ll discuss:
– The fraud process
– Why fraud occurs
– Approaches to computer fraud
– Specific techniques used to commit computer
fraud
– Ways companies can deter and detect
computer fraud

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

9 of 175




The definition is the same whether it is a
criminal or civil fraud case.
– The only difference is the burden of
proof required.
• Criminal case: beyond a
Fraud is any and all means
a person

reasonable
doubt.uses to
• Civil
gain an unfair advantage
over
another
person.
case:
preponderance
of the
evidence OR clear and convincing
In most cases, to be considered
evidence. fraudulent, an

THE FRAUD PROCESS




act must involve:

– A false statement (oral or in writing)
– About a material fact
– Knowledge that the statement was false when it was
uttered (which implies an intent to deceive)
– A victim relies on the statement
– And suffers injury or loss as a result
© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e


Romney/Steinbart

10 of 175


THE FRAUD PROCESS
• Because fraudsters don’t make journal entries to
record their frauds, we can only estimate the
amount of losses caused by fraudulent acts:
– The Association of Certified Fraud Examiners (ACFE)
estimates that total fraud losses in the United States
run around 6% of annual revenues or approximately
$660 billion in 2004.
• More than we spend on education and roads in a year.
• Six times what we pay for the criminal justice system.

– Income tax fraud (the difference between what
taxpayers owe and what they pay to the government)
is estimated to be over $200 billion per year.
– Fraud in the healthcare industry is estimated to
exceed $100 billion a year.
© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

11 of 175



THE FRAUD PROCESS
• Fraud against companies may be committed by
an employee or an external party.
– Former and current employees (called
knowledgeable insiders) are much more likely than
non-employees to perpetrate frauds (and big ones)
against companies.
• Largely owing to their understanding of the company’s
systems and its weaknesses, which enables them to commit
the fraud and cover their tracks.

– Organizations must utilize controls to make it difficult
for both insiders and outsiders to steal from the
company.

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

12 of 175


THE FRAUD PROCESS
• Fraud perpetrators are often referred to as
white-collar criminals.
– Distinguishes them from violent criminals,
although some white-collar crime can

ultimately have violent outcomes, such as:
• Perpetrators or their victims committing suicide.
• Healthcare patients killed because of alteration of
information, etc., that can result in their deaths.

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

13 of 175


THE FRAUD PROCESS
• Three types of occupational fraud:
– Misappropriation of assets




Involves theft, embezzlement, or misuse of
company assets for personal gain.
Examples include billing schemes, check
tampering, skimming, and theft of inventory.
In the 2004 Report to the Nation on Occupational
Fraud and Abuse, 92.7% of occupational frauds
involved asset misappropriation at a median cost
of $93,000.


© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

15 of 175


THE FRAUD PROCESS
• Three types of occupational fraud:
– Misappropriation of assets
– Corruption





Corruption involves the wrongful use of a
position, contrary to the responsibilities of
that position, to procure a benefit.
Examples include kickback schemes and
conflict of interest schemes.
About 30.1% of occupational frauds include
corruption schemes at a median cost of
$250,000.

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e


Romney/Steinbart

16 of 175


THE FRAUD PROCESS
• Three types of occupational fraud:
– Misappropriation of assets
– Corruption
– Fraudulent statements


Financial statement fraud involves misstating the financial condition of
an entity by intentionally misstating amounts or disclosures in order to
deceive users.
• Financial statements can be misstated as a result of intentional efforts
to deceive or as a result of undetected asset misappropriations that
are so large that they cause misstatement.
• About 7.9% of occupational frauds involve fraudulent statements at a
median cost of $1 million. (The median pales in comparison to the
maximum
cost.)Publishing
© 2008
Prentice Hall Business
Accounting Information Systems, 11/e
Romney/Steinbart
17 of 175



THE FRAUD PROCESS


A typical employee fraud has a number of important elements or
characteristics:
– The fraud perpetrator must gain the trust or confidence of the
person or company being defrauded in order to commit and
conceal the fraud.
– Instead of using a gun, knife, or physical force, fraudsters use
weapons of deceit and misinformation.
– Frauds tend to start as the result of a perceived need on the part
of the employee and then escalate from need to greed. Most
fraudsters can’t stop once they get started, and their frauds grow
in size.
– The fraudsters often grow careless or overconfident over time.
– Fraudsters tend to spend what they steal. Very few save it.
– In time, the sheer magnitude of the frauds may lead to detection.
– The most significant contributing factor in most employee frauds
is the absence of internal controls and/or the failure to enforce
existing controls.

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

18 of 175



THE FRAUD PROCESS
• The National Commission on Fraudulent
Financial Reporting (aka, the Treadway
Commission) defined fraudulent financial
reporting as intentional or reckless conduct,
whether by act or omission, that results in
materially misleading financial statements.
• Financial statements can be falsified to:





Deceive investors and creditors
Cause a company’s stock price to rise
Meet cash flow needs
Hide company losses and problems

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

19 of 175


THE FRAUD PROCESS
• Fraudulent financial reporting is of great
concern to independent auditors, because

undetected frauds lead to half of the
lawsuits against auditors.
• In the case of Enron, a financial statement
fraud led to the total elimination of Arthur
Andersen, a premiere international public
accounting firm.
© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

20 of 175


THE FRAUD PROCESS
• Common approaches to “cooking the
books” include:
– Recording fictitious revenues
– Recording revenues prematurely
– Recording expenses in later periods
– Overstating inventories or fixed assets
(WorldCom)
– Concealing losses and liabilities

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart


21 of 175


THE FRAUD PROCESS
• The Treadway Commission recommended four
actions to reduce the possibility of fraudulent
financial reporting:
– Establish an organizational environment that
contributes to the integrity of the financial reporting
process.
– Identify and understand the factors that lead to
fraudulent financial reporting.
– Assess the risk of fraudulent financial reporting within
the company.
– Design and implement internal controls to provide
reasonable assurance that fraudulent financial
reporting is prevented.
© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

22 of 175


THE FRAUD PROCESS
• SAS 99: The Auditor’s Responsibility to
Detect Fraud

– In 1997, SAS-82, Consideration of Fraud in a
Financial Statement Audit, was issued to
clarify the auditor’s responsibility to detect
fraud.

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

23 of 175


THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud





Auditors can’t effectively audit something they don’t
understand.
SAS-99 also indicated that auditors are not lawyers and “do not
make legal determinations of whether fraud has occurred.”
The external auditor’s interest specifically relates to acts that
result in a material misstatement of the financial statements.
Note that SAS-99 relates to external auditors. Internal auditors

will have a more extensive interest in fraud than just those that
impact financial statements.

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

24 of 175


THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
– Discuss the risks of material fraudulent
misstatements


While planning the audit, members of the audit team
should discuss how and where the company’s financial
statements might be susceptible to fraud.

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart


25 of 175




The audit team must gather evidence about the existence of
fraud by:
– Looking for fraud risk factors
– Testing company records
• A –revision
to SAS-82, SAS-99, was issued in
Asking management, the audit committee, and others if they
December
2002.
requires
auditors
to:
know of any
past orSAS-99
current fraud
or of fraud
risks the
organizationfraud
faces.
– Understand
• –Special
carethe
needs
to of
bematerial

exercisedfraudulent
in examining
revenue
Discuss
risks
misstatements
accounts, since they are particularly popular fraud targets.

THE FRAUD PROCESS

– Obtain information

© 2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

26 of 175


×