Accounting Information System
Accounting Information System
Computer Fraud
Learning Objectives
After studying this chapter, you should be able to:
1. Explain the threats faced by modern information
systems.
2. Define fraud and describe both the different types of
fraud and the process one follows to perpetuate a fraud.
3. Discuss who perpetrates fraud and why it occurs,
including the pressures, opportunities, and
rationalizations that are present in most frauds.
4. Define computer fraud and discuss the different
computer fraud classifications.
5. Explain how to prevent and detect computer fraud and
abuse.
Threats to AIS
Threats to AIS
1. Natural and political disasters—such as fires,
floods, earthquakes, hurricanes, tornadoes,
blizzards, wars, and attacks by terrorists—can
destroy an information system and cause many
companies to fail.
2. Software errors, operating system crashes,
hardware failures, power outages and
fluctuations, and undetected data transmission
errors constitute a second type of threat.
Threats to AIS
3. Unintentional acts such as accidents or innocent errors and
omissions, is the greatest risk to information systems and
causes the greatest financial losses. Unintentional acts are
caused by human carelessness, failure to follow established
procedures, and poorly trained or supervised personnel. Users
lose or misplace data and accidentally erase or alter files, data,
and programs. Computer operators and users enter the wrong
input or erroneous input, use the wrong version of a program
or the wrong data files, or misplace data files. Systems
analysts develop systems that do not meet company needs,
that leave them vulnerable to attack, or that are incapable of
handling their intended tasks. Programmers make logic errors.
Threats to AIS
4. Intentional act such as a computer crime, a fraud, or
sabotage, which is deliberate destruction or harm to a
system. Information systems are increasingly vulnerable to
attacks
Introduction to Fraud
Fraud is gaining an unfair advantage over another
person. Legally, for an act to be fraudulent there must
be:
1. A false statement, representation, or disclosure
2. A material fact, which is something that induces a
person to act
3. An intent to deceive
4. A justifiable reliance; that is, the person relies on the
misrepresentation to take an action
5. An injury or loss suffered by the victim
Introduction to Fraud
White-collar criminals - Typically, businesspeople
who commit fraud. White-collar criminals usually
resort to trickery or cunning, and their crimes usually
involve a violation of trust or confidence.
Corruption is dishonest conduct by those in power
and it often involves actions that are illegitimate,
immoral, or incompatible with ethical standards.
There are many types of corruption; examples
include bribery and bid rigging.
Introduction to Fraud
Investment fraud is misrepresenting or leaving out
facts in order to promote an investment that
promises fantastic profits with little or no risk.
Two types of frauds that are
important to businesses
1. Misappropriation of assets (sometimes called
employee fraud); and
2. Fraudulent financial reporting (sometimes
called management fraud).
Misappropriation of assets
Misappropriation of assets is the theft of
company assets by employees.
Fraud can also occur when a crisis arises and normal control
procedures are ignored.
Rationalizations
The excuse that fraud perpetrators use to justify
their illegal behavior.