5 Computer Fraud 课件(共15张PPT) 《会计信息系统英文版》同步教学(人民大学版)

资源下载
  1. 二一教育资源

5 Computer Fraud 课件(共15张PPT) 《会计信息系统英文版》同步教学(人民大学版)

资源简介

(共15张PPT)
Chapter 5Computer Fraud5-Learning ObjectivesExplain the threats faced by modern information systems.Define fraud and describe the process one follows to perpetuate a fraud.Discuss who perpetrates fraud and why it occurs, including:the pressures, opportunities, and rationalizations that are present in most frauds.Define computer fraud and discuss the different computer fraud classifications.Explain how to prevent and detect computer fraud and abuse.5-Common Threats to AISNatural Disasters and Terrorist ThreatsSoftware Errors and/or Equipment MalfunctionUnintentional Acts (Human Error)Intentional Acts (Computer Crimes)5-What Is Fraud Gaining an unfair advantage over another personA false statement, representation, or disclosureA material fact that induces a person to actAn intent to deceiveA justifiable reliance on the fraudulent fact in which a person takes actionAn injury or loss suffered by the victimIndividuals who commit fraud are referred to as white-collar criminals.5-Forms of FraudMisappropriation of assetsTheft of a companies assets.Largest factors for theft of assets:Absence of internal control systemFailure to enforce internal control systemFraudulent financial reporting“…intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements” (The Treadway Commission).5-Reasons for Fraudulent Financial StatementsDeceive investors or creditorsIncrease a company’s stock priceMeet cash flow needsHide company losses or other problems5-Treadway Commission Actions to Reduce FraudEstablish environment which supports the integrity of the financial reporting process.Identification of factors that lead to fraud.Assess the risk of fraud within the company.Design and implement internal controls to provide assurance that fraud is being prevented.5-SAS #99Auditors responsibility to detect fraudUnderstand fraudDiscuss risks of material fraudulent statementsAmong members of audit teamObtain informationLook for fraud risk factorsIdentify, assess, and respond to riskEvaluate the results of audit testsDetermine impact of fraud on financial statementsDocument and communicate findingsSee Chapter 3Incorporate a technological focus5-The Fraud Triangle5-Three conditions that are present when Fraud occurs.PressureMotivation or incentive to commit fraudTypes:EmployeeFinancialEmotionalLifestyleFinancialIndustry conditionsManagement characteristics5-OpportunityCondition or situation that allows a person or organization to:Commit the fraudConceal the fraudLappingKitingConvert the theft or misrepresentation to personal gain5-RationalizationsJustification of illegal behaviorJustificationI am not being dishonest.AttitudeI don’t need to be honest.Lack of personal integrityTheft is valued higher than honesty or integrity.5-Computer FraudAny illegal act in which knowledge of computer technology is necessary for:PerpetrationInvestigationProsecution5-Rise of Computer FraudDefinition is not agreed onMany go undetectedHigh percentage is not reportedLack of network securityStep-by-step guides are easily availableLaw enforcement is overburdenedDifficulty calculating loss5-Computer Fraud ClassificationsInput FraudAlteration or falsifying inputProcessor FraudUnauthorized system useComputer Instructions FraudModifying software, illegal copying of software, using software in an unauthorized manner, creating software to undergo unauthorized activitiesData FraudIllegally using, copying, browsing, searching, or harming company dataOutput FraudStealing, copying, or misusing computer printouts or displayed information5-

展开更多......

收起↑

资源预览