Accounting Information Systems_Chapter 4
Accounting Information Systems_Chapter 4
Learning Objectives:
After studying this chapter, you should:
Understand broad issues pertaining to business ethics
Have a basic understanding of ethical issues related to the use
of information technology
Be able to distinguish between management fraud and
employee fraud
Be familiar with common types of fraud schemes
Be familiar with common types of the COSO internal control
framework
Understand the objectives and application of both physical and
IT control activities
ETHICAL ISSUES IN BUSINESS
Fraud is a false representation of a material fact made by one party to another party
with the intent to deceive and to induce the other party to rely on the fact to his or her
detriment. Many times, alleged fraud is just poor management decisions or adverse
business conditions.
Legally, for an act to be fraudulent there must be:
1. A false statement, representation, or disclosure.
2. A material fact, which is something that induces a person to act.
3. An intent to deceive.
4. A justified reliance; that is, the person relies on the misrepresentation to take an action.
5. An injury or loss suffered by a victim.
FRAUD AND ACCOUNTANTS
Corruption is dishonest conduct by those holding power and it often involves actions that
are illegitimate, immoral, or incompatible with ethical standards. There are many types of
corruption; examples include bribery and bid rigging.
Two types of frauds that are important to businesses are misappropriation of assets
(sometimes called employee fraud) and fraudulent financial reporting (sometimes called
management fraud). These two types of fraud are now discussed in greater depth.
FRAUD AND ACCOUNTANTS
In a misrepresentation, fraud
perpetrators who do not steal cash or
use the stolen assets personally must
convert them to a spendable form.
Corruption involves collusion with an outside entity. The four principal types
of corruption include:
Bribery: Offering, giving, or receiving things of value to influence an
official in the performance of his/her lawful duties (before the fact).
Illegal Gratuities: Offering, giving, requesting, or receiving something of
value because of an official act that has been taken (after the fact).
Conflicts of Interest: When an employee acts on the behalf of a third
party during the discharge of duties or has self-interest in the activity
being performed.
Economic Extortion: Threat or use of force (including economic
sanctions) by an individual or organization to obtain something of value.
Asset Misappropriation
Asset Misappropriation is the most common form of fraud, the CFE found
85 percent of fraud cases to be asset misappropriations. Transactions
involving the case, checking accounts, inventory, supplies, equipment,
and information are the most vulnerable assets. Examples of asset
misappropriation schemes include:
Charges to expense accounts.
Lapping: an employee who has access to customer checks and to
accounts receivable records steals some money, and then uses the
next check that comes in to cover the last amount stolen (so that the
customers never notice). This can continue until the employee leaves
the company or takes a vacation, or is switched to another position.
Asset Misappropriation
Examples include:
Unauthorized theft, use, access, modification, copying, or destruction of
software, hardware, or data.
Theft of assets covered up by altering computer records.
Obtaining information or tangible or tangible property illegally using
computers.
Computer Fraud
Input fraud
The simplest and most common way to commit a computer fraud is to alter or falsify computer
input. It requires little skill; perpetrators need only understand how the system operates so they can
cover their tracks.
Processor fraud
Processor fraud unauthorized system use, including the theft or computer time and services.
Data fraud
Illegally using, copying, browsing, searching, or harming company data constitutes, data
fraud. The biggest cause of data breaches is employee negligence.
Output fraud
Unless properly safeguarded, displayed or printed output can be stolen, copied, or
misused. It was showed that some monitors emit television-like signals that, with the help of
some inexpensive electronic gear can be displayed on a television screen.
Fraud perpetrators use computers to forge authentic-looking outputs, such as
paycheck.
A fraud perpetrator can scan a company paycheck, use desktop publishing software
to erase the payee and amount, and print fictitious paycheck.
Computer assets are vulnerable to theft or destruction at each phase of the
accounting information system.
Data Collection: This phase of the system is most vulnerable because it is very
easy to change data as it is being entered into the system. Fraudulent
transactions or dollar amounts can be keyed into the system and thefts can
thus be covered up. Data must be valid, complete, free from material errors,
relevant, and efficiently collected.
Masquerading is an unauthorized user entering the system as an authorized
user.
Piggybacking is tapping into the telecommunication lines and latching onto
an authorized user who is logging into the system. Once inside, the perpetrator
can go their own way.
Data Processing: Frauds can be a program or operation fraud.
Program fraud includes altering programs to allow illegal access,
introduce a virus, or alter a program’s logic to cause incorrect data
processing.
Operation fraud is the misuse of company computer resources, for
example, for personal use or personal business.
Database Management: Fraud at this phase of the system involves
altering, destroying, or stealing the company's data either in storing,
retrieving, or deleting tasks.
Information Generation: Frauds here involves misrepresentation, theft, or
misuse of the computer output, either on-screen or in hard copy. It can also
involve scavenging (searching through the trash cans of a company for
discarded outputs) or eavesdropping (listening to electronic transmissions).
The information must have the following characteristics:
Relevance: It affects the employee’s decisions regarding the task at hand.
Timeliness: It can be no older than the time period of the action that it supports.
Accuracy: It must be free of material errors.
Completeness: No essential piece of information is missing.
Summarization: Information is aggregate in accordance with the user’s needs.
Internal Control Concepts and Procedures
Robert Simons, a Harvard business professor, has espoused four levers of control to help
management reconcile the conflict between creativity and controls.
1. A belief system describes how a company creates value, helps employees understand
management’s vision, communications company core values, and inspires employees to
live by those values.
2. A boundary system helps employees act ethically by setting boundaries an employee
behavior. Instead of telling employees exactly what to do, they are encouraged to
creatively solve problems and meet customer needs while meeting minimum performance
standards, shunning off-limit activities, and avoiding actions that might damage their
reputation.
3. A diagnostic control systems measures, monitors, and compares actual company progress
to budgets and performance goals. Feedback helps management adjust and fine-tune
inputs and processes so future outputs more closely match goals.
4. An Interactive control system helps managers to focus subordinates’ attention on key
strategic issues and to be more involved in their decisions. Interactive system data are
interpreted and discussed In face-to-face meetings of superiors, subordinates, and peers.
Auditing and Auditing Standards
Control Activities are the policies and procedures used to ensure that
appropriate actions are taken to deal with the identified risks. There are
two categories, computer controls, and physical controls.
Computer Controls can be categorized into two groups: general
controls and application controls.
General Controls pertain to pervasive, entitywide concerns such as
access and approval, such as human resources and project
management.
Application Controls pertain to the details of specific systems, such as
payroll.
Control Activities
After SOX was passed, the SEC mandated that management must:
Base its evaluation on a recognized control framework
Disclose all material internal control weaknesses
Conclude that a company does not have effective financial reporting internal
controls if there are material weaknesses.
Control Frameworks
The Information Systems Audit and Control Association (ISACA) developed the Control
Objectives for Information and Related Technology (COBIT) framework.
COBIT consolidates control standards from many different sources into a single
framework that allows:
1. Management to benchmark security and control practices of IT environments.
2. Users to be assured that adequate IT security and controls exist, and
3. Auditors to substantiate their internal control opinions and to adhere on IT security
and control matters.
The COBIT 5 framework describes best practices for the effective governance and
management of IT. COBIT 5 is based on the following five key principles of IT governance
and management. These principles help organizations build an effective governance
and management framework that protects stakeholders’ investments and produces the
best possible information system.
COBIT Framework
1. Meeting stakeholders need. COBIT 5 helps users customize business processes and
procedures to create an information system that adds value to its stakeholders. It also
allows the company to create the proper balance between risk and reward.
2. Covering the enterprise end-to-end. COBIT 5 does not focus on the IT operations, it
integrates all IT functions and processes into a companywide functions and
processes.
3. Applying a single, integrated framework. COBIT 5 can be aligned at a high level with
other standards and frameworks so that an overarching framework for IT governance
and management is created.
4. Enabling a holistic approach. COBIT 5 provides a holistic approach that results in
effective governance and management of all IT functions in the company.
5. Separating governance from management. COBIT 5 distinguished between
governance and management.
COSO’s internal control framework
In 1992, COSO issued Internal Control – Integrated Framework (IC), which is widely accepted
as the authority on internal controls and is incorporated into policies, rules, and regulations
used to control business activities.
In 2013, the IC framework was updated to better deal with current business processes and
technological advancement. For example, in 1992, very few businesses used the internet, sent
e-mail, or stored their data in the cloud.
The revised IC framework also provides users with more precise guidance on how to
implement and document the framework. Many new examples have been added to clarify
framework concepts and make the framework easier to understand and use.
COSO’s Enterprise Risk Management
Framework
To improve the risk management process, COSO developed a second control framework called Enterprise
Risk Management – Integrated Framework (ERM).
ERM is the process the board of directors and management use to set strategy, identify events that may
affect the entity, assess and manage risk, and provide reasonable assurance that the company achieve its
objectives and goals.