05 Computer Fraud
05 Computer Fraud
5-1
Learning Objectives
5-2
Common Threats to AIS
5-3
What Is Fraud?
5-4
Forms of Fraud
Misappropriation of assets
Theft of a companies assets.
Largest factors for theft of assets:
Absence of internal control system
Failure to enforce internal control system
5-5
Reasons for Fraudulent Financial Statements
5-6
Treadway Commission Actions to Reduce Fraud
5-7
Statement on Auditing Standards -SAS
#99
Auditors responsibility to detect fraud
Understand fraud
Discuss risks of material fraudulent statements
Among members of audit team
Obtain information
Look for fraud risk factors
Identify, assess, and respond to risk
Evaluate the results of audit tests
Determine impact of fraud on financial statements
Document and communicate findings
Incorporate a technological focus
5-8
The Fraud Triangle
Pressure
Opportunity
Rationalization
5-9
Pressure
• Motivation or incentive to commit fraud
Emotional Lifestyle
Pressure
Rationalization
5-12
Computer Fraud
Computer fraud is the use of computers, the
Internet, Internet devices, and Internet services to
defraud people or organizations of resources.
Any illegal act in which knowledge of
computer technology is necessary for:
Perpetration
Investigation
Prosecution
5-13
Rise of Computer Fraud
2. Many go undetected
5-14
Computer Fraud Classifications
Input Fraud
Alteration or falsifying input
Processor Fraud
Unauthorized system use
Data Fraud
Illegally using, copying, browsing, searching, or harming company data
Output Fraud
Stealing, copying, or misusing computer printouts or displayed information
5-15