Podcast
Questions and Answers
Which of the following is NOT a category of AIS threats?
Which of the following is NOT a category of AIS threats?
A "cookie" is a type of malicious software designed to steal personal information.
A "cookie" is a type of malicious software designed to steal personal information.
False (B)
Define "fraud" in the context of information systems.
Define "fraud" in the context of information systems.
Fraud is any act involving a false statement, material fact, intent to deceive, justifiable reliance, and resultant injury or loss, used to gain an unfair advantage.
A deliberate act intended to destroy a system or its components is called ______.
A deliberate act intended to destroy a system or its components is called ______.
Signup and view all the answers
Match the following terms to their corresponding definitions:
Match the following terms to their corresponding definitions:
Signup and view all the answers
Which of these is NOT a requirement for an act to be considered fraudulent?
Which of these is NOT a requirement for an act to be considered fraudulent?
Signup and view all the answers
White-collar criminals are typically involved in non-violent crimes that exploit confidence or trust.
White-collar criminals are typically involved in non-violent crimes that exploit confidence or trust.
Signup and view all the answers
What is "corruption" in the context of information systems?
What is "corruption" in the context of information systems?
Signup and view all the answers
Which of the following is NOT a step in the auditor’s process of responding to the risk of fraudulent financial reporting?
Which of the following is NOT a step in the auditor’s process of responding to the risk of fraudulent financial reporting?
Signup and view all the answers
The majority of fraud perpetrators are professionals with prior criminal records.
The majority of fraud perpetrators are professionals with prior criminal records.
Signup and view all the answers
What are the three main ways auditors gather evidence for fraud risk factors?
What are the three main ways auditors gather evidence for fraud risk factors?
Signup and view all the answers
Auditors must ______ whether identified misstatements indicate the presence of fraud and determine its impact on the financial statements and the audit.
Auditors must ______ whether identified misstatements indicate the presence of fraud and determine its impact on the financial statements and the audit.
Signup and view all the answers
Match the following types of fraud perpetrators to their motivations:
Match the following types of fraud perpetrators to their motivations:
Signup and view all the answers
Which type of fraud involves altering or falsifying computer input?
Which type of fraud involves altering or falsifying computer input?
Signup and view all the answers
Processor fraud involves unauthorized use of computer systems and theft of services.
Processor fraud involves unauthorized use of computer systems and theft of services.
Signup and view all the answers
What is the biggest cause of data breaches?
What is the biggest cause of data breaches?
Signup and view all the answers
Output fraud can occur when displayed or printed outputs are not properly __________.
Output fraud can occur when displayed or printed outputs are not properly __________.
Signup and view all the answers
Which category of computer fraud includes tampering with company software?
Which category of computer fraud includes tampering with company software?
Signup and view all the answers
Deleting files permanently removes them from the system.
Deleting files permanently removes them from the system.
Signup and view all the answers
What is an example of output fraud?
What is an example of output fraud?
Signup and view all the answers
Match the types of fraud with their definitions:
Match the types of fraud with their definitions:
Signup and view all the answers
What are the three conditions present when fraud occurs according to the Fraud Triangle?
What are the three conditions present when fraud occurs according to the Fraud Triangle?
Signup and view all the answers
Cyber-criminals typically conduct isolated attacks rather than organized fraud schemes.
Cyber-criminals typically conduct isolated attacks rather than organized fraud schemes.
Signup and view all the answers
Name one method that fraud perpetrators use to conceal theft.
Name one method that fraud perpetrators use to conceal theft.
Signup and view all the answers
One common type of misappropriation in fraud is the theft of ______.
One common type of misappropriation in fraud is the theft of ______.
Signup and view all the answers
What does 'kiting' involve in the context of fraud?
What does 'kiting' involve in the context of fraud?
Signup and view all the answers
Match the following types of fraud with their descriptions:
Match the following types of fraud with their descriptions:
Signup and view all the answers
What is considered a pressure condition for committing fraud?
What is considered a pressure condition for committing fraud?
Signup and view all the answers
The lack of coordination between international law enforcement helps cyber-criminals hide their money.
The lack of coordination between international law enforcement helps cyber-criminals hide their money.
Signup and view all the answers
Which of the following is a type of fraud that involves misrepresenting facts to promote an investment?
Which of the following is a type of fraud that involves misrepresenting facts to promote an investment?
Signup and view all the answers
Employee fraud is another term for fraudulent financial reporting.
Employee fraud is another term for fraudulent financial reporting.
Signup and view all the answers
What common factor contributes significantly to misappropriations within companies?
What common factor contributes significantly to misappropriations within companies?
Signup and view all the answers
Which of the following is NOT a method to increase the difficulty of committing fraud?
Which of the following is NOT a method to increase the difficulty of committing fraud?
Signup and view all the answers
Fraudulent financial reporting may involve _______ the books early.
Fraudulent financial reporting may involve _______ the books early.
Signup and view all the answers
What is the purpose of the Treadway Commission's recommendations?
What is the purpose of the Treadway Commission's recommendations?
Signup and view all the answers
Implementing proper segregation of duties can help deter fraud.
Implementing proper segregation of duties can help deter fraud.
Signup and view all the answers
Match the types of fraud to their descriptions:
Match the types of fraud to their descriptions:
Signup and view all the answers
What is one benefit of conducting both internal and external audits?
What is one benefit of conducting both internal and external audits?
Signup and view all the answers
The system should authenticate the person and their right to perform the __________ before allowing the transaction.
The system should authenticate the person and their right to perform the __________ before allowing the transaction.
Signup and view all the answers
All fraudulent schemes have the same underlying motives.
All fraudulent schemes have the same underlying motives.
Signup and view all the answers
Name one example of fraudulent financial reporting activity.
Name one example of fraudulent financial reporting activity.
Signup and view all the answers
Match the following actions with their purpose in fraud prevention:
Match the following actions with their purpose in fraud prevention:
Signup and view all the answers
Which of the following is an effective way to motivate employees to report fraud?
Which of the following is an effective way to motivate employees to report fraud?
Signup and view all the answers
Using properly designed documents and records is essential for processing transactions.
Using properly designed documents and records is essential for processing transactions.
Signup and view all the answers
Name one method to safeguard assets and records.
Name one method to safeguard assets and records.
Signup and view all the answers
Signup and view all the answers
Flashcards
Computer Fraud
Computer Fraud
Deliberate acts to gain an unfair advantage using computers.
AIS Threats
AIS Threats
Factors that can harm accounting information systems including natural disasters and human error.
Software Errors
Software Errors
Mistakes in software that can lead to failures or data loss.
Unintentional Acts
Unintentional Acts
Signup and view all the flashcards
Fraud Requirements
Fraud Requirements
Signup and view all the flashcards
White-Collar Criminals
White-Collar Criminals
Signup and view all the flashcards
Corruption
Corruption
Signup and view all the flashcards
Cookies
Cookies
Signup and view all the flashcards
Internal Controls
Internal Controls
Signup and view all the flashcards
SAS No. 99
SAS No. 99
Signup and view all the flashcards
Fraud Risk Factors
Fraud Risk Factors
Signup and view all the flashcards
Assessing Risks
Assessing Risks
Signup and view all the flashcards
Communication of Findings
Communication of Findings
Signup and view all the flashcards
Perpetrators of Fraud
Perpetrators of Fraud
Signup and view all the flashcards
Malicious Software
Malicious Software
Signup and view all the flashcards
Fraud Evolution
Fraud Evolution
Signup and view all the flashcards
Investment Fraud
Investment Fraud
Signup and view all the flashcards
Misappropriation of Assets
Misappropriation of Assets
Signup and view all the flashcards
Fraudulent Financial Reporting
Fraudulent Financial Reporting
Signup and view all the flashcards
Treadway Commission
Treadway Commission
Signup and view all the flashcards
Cook the Books
Cook the Books
Signup and view all the flashcards
Risk Assessment
Risk Assessment
Signup and view all the flashcards
Self-Perpetuating Fraud
Self-Perpetuating Fraud
Signup and view all the flashcards
Cyber-criminals
Cyber-criminals
Signup and view all the flashcards
Fraud Triangle
Fraud Triangle
Signup and view all the flashcards
Pressure
Pressure
Signup and view all the flashcards
Opportunity
Opportunity
Signup and view all the flashcards
Lapping
Lapping
Signup and view all the flashcards
Kiting
Kiting
Signup and view all the flashcards
Rationalization
Rationalization
Signup and view all the flashcards
Conceal
Conceal
Signup and view all the flashcards
Input Fraud
Input Fraud
Signup and view all the flashcards
Processor Fraud
Processor Fraud
Signup and view all the flashcards
Computer Instructions Fraud
Computer Instructions Fraud
Signup and view all the flashcards
Data Fraud
Data Fraud
Signup and view all the flashcards
Output Fraud
Output Fraud
Signup and view all the flashcards
Fraud Perpetrators
Fraud Perpetrators
Signup and view all the flashcards
Web Resources for Fraud
Web Resources for Fraud
Signup and view all the flashcards
Employee Negligence
Employee Negligence
Signup and view all the flashcards
Segregation of Duties
Segregation of Duties
Signup and view all the flashcards
Fraud Risk Assessment
Fraud Risk Assessment
Signup and view all the flashcards
Audit Trail
Audit Trail
Signup and view all the flashcards
Fraud Detection Software
Fraud Detection Software
Signup and view all the flashcards
Whistleblower Rewards
Whistleblower Rewards
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Physical Security
Physical Security
Signup and view all the flashcards
Study Notes
Accounting Information Systems (AIS) Chapter 5 - Computer Fraud
-
AIS Threats: Natural disasters (fires, floods, etc.), software/hardware malfunctions, power outages, unintentional acts (human error), and intentional acts (computer crimes).
-
Computer Crimes: Intentional acts that aim to harm or destroy a system or its components.
-
Cookies: Text files created by websites and stored on a visitor's hard drive. They store information about the user.
-
Fraud: Any means a person uses to gain an unfair advantage over another.
-
Elements of Fraud: A false statement, concerning a material fact, with intent to deceive, justifiable reliance leading to action, and an injury or loss resulting from the deception.
White-Collar Criminals
- Often businesspeople who commit fraud. Usually involve trickery or cunning, violating trust. Knowledge of the system and resources are common traits.
Corruption
- Dishonest conduct by people in power, often involving actions that are illegitimate or unethical.
Types of Fraud in Business
-
Misappropriation of Assets (Employee Fraud): Theft of company assets by employees. Usually stems from a lack of proper internal controls or their enforcement. Perpetrators often gain trust, use trickery, conceal fraud (falsifying records), continue the activities (through greed or need), and spend the funds ill-gotten.
-
Fraudsulent Financial Reporting (Management Fraud): Intentional or reckless misrepresentation in financial statements; aim to mislead investors or stakeholders. National Commission on Fraudulent Financial Reporting (Treadway Commission) found that most schemes involve inflating revenues, holding the books open, and delaying current expenses.
Who Perpetrates Fraud and Why?
-
Often disgruntled or unhappy employees seeking revenge.
-
May lack a criminal record and be valued members of the community, but be motivated by curiosity, the desire to learn, or for gain in a hacking community.
-
May view the action as a "game" rather than dishonesty.
-
Sometimes are malicious actors, criminals looking for ways to monetize their activities, by selling data, spamming, or creating malware.
The Fraud Triangle
- Pressure: Incentives for committing fraud
- Opportunity: Conditions that allow the fraudulent act to occur
- Rationalization: Justifications to mask unethical behavior
- Many rationalizations involve self-serving justifications.
- Other forms include financial hardship, poor personal relationships, and feelings of lack of recognition.
Computer Fraud Classifications
-
Input Fraud: Altering input data—a common and simple form of computer fraud.
-
Process Fraud: Unauthorized use of computer systems or tampering with software is part of process fraud.
-
Data Fraud: Unlawful, unauthorized copying, storage, or use of company data. Employee negligence is a frequent factor.
-
Output Fraud: Obtaining and using falsified reports or documents from computer systems.
Preventing and Detecting Fraud
- Establishing a strong internal control system.
- Segregation of duties between authorization, recording, and custody.
- Monitoring system activities for suspicious activity or errors.
- Implementing fraud risk assessment programs.
- Creating an audit trail. - Detecting and preventing fraud (reporting channels & internal audits).
- Encouraging whistleblowing (and protecting whistleblowers).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the various threats to Accounting Information Systems (AIS) and the nature of fraud within information systems. This quiz covers definitions, examples, and auditor processes related to fraud and security risks. Perfect for students studying information systems or finance.