Professional Documents
Culture Documents
AIS Threats
or
Characteristics
of
the
Inadequate salary/income
Bad investments
Tax avoidance
Emotional
Greed
Unrecognized performance
Job dissatisfaction
Power or control
Pride or ambition
Frustration
Non-conformity
Envy, resentment
Arrogance, dominance
Non-rules oriented
Lifestyle
Family/peer pressure
2. Opportunity
Is the condition or situation, including ones
personal abilities that allow perpetrator to do
three things:
and
B. Other Factors
a. Large, unusual,
transactions
or
complex
1. Justification
2. Attitude
c. Related-party transactions
d. Accounting
department
understaffed and overworked
e. Incompetent personnel
changing
with
to
accounting
and
stress
COMPUTER FRAUD
If a computer is used to commit fraud it
is called computer fraud.The U.S.
Department of Justice defines computer
fraud as any illegal act for which
knowledge of computer technology is
essential for its perpetration, investigation;
or prosecution.
Computer
systems
are
particularly
vulnerable to computer crimes for
several reasons:
of
Input Fraud
The simplest and most common
way to commit a fraud is to alter
computer input. It requires little
computer skills; perpetrator only needs
to understand how the system operates
so they can cover their tracks.
Processor fraud
Involves
computer
fraud
committed through unauthorized system
use. It includes theft of computer time
and services.
Computer instruction fraud
Involves tampering with the
software that processes company data.
It may include modifying the software,
making illegal copies, using it in an
unauthorized manner, or developing a
software program or module to carry out
an unauthorized activity. Computer
instruction fraud used to be one of the
least common types of frauds because it
required specialized knowledge.
Output fraud
Involves stealing or misusing
system
output.
Unless
properly
safeguarded, screen output can easily
be read from a remote location using
inexpensive electronic gear. This output
is also subject to prying eyes and
unauthorized copying.
PREVENTING AND DETECTING COMPUTER
FRAUD
1. Make fraud less likely to occur
2. Increase the difficulty of committing
fraud - By designing strong internal
controls, segregating duties
3. Improve detection methods - By
creating an audit trail
4. Reduce Fraud Losses - By maintaining
adequate insurance, developing disaster
recovery plans, backing up
Key Terms
Data fraud
Involves altering or damaging a
companys data files; or copying, using,
or searching the data files without
authorization.
materially
misleading
financial
statements.
Pressure- is the persons incentive or
motivation for committing fraud.
Opportunity- condition or situation that
allows a person or organization to
commit and conceal a dishonest act and
convert it to personal gain.
Lapping- is concealing the theft of cash
by means of a series of delays in
posting
collections
to
accounts
receivable.
Check-kiting scheme- creating cash
using the lag between the time a check
is deposited and the time it clears the
bank.
Rationalization- The excuse that fraud
perpetrators use to justify their illegal
behavior.
Computer Fraud- any type of fraud that
requires
computer
technology to
perpetrate.
Economic espionage- the theft of
information and intellectual property
Masquerading or impersonation is
pretending to be an authorized user to access
a system.