SlideShare a Scribd company logo
Habib Ullah Qamar
Govt. college of Commerce Gujranwala
4/5/2016
 ACFE classification format. Three broad
categories of fraud schemes are defined
 Fraudulent statements : Fraudulent statements
are associated with management fraud
 Corruption : Corruption involves an executive,
manager, or employee of the organization in
collusion with an outsider.
 Asset misappropriation: The most common form
of fraud scheme involves some type of asset
misappropriation. 92% of the frauds included in
the ACFE study fall in this category.
 All fraud involves some form of financial
misstatement, to meet the definition under this
class of fraud scheme the statement itself must
bring direct or indirect financial benefit to the
perpetrator.
 For example, misstating the cash account
balance to cover the theft of cash is not financial
statement fraud.
 Fraudulent statements account for only 8 percent
of the fraud cases covered in the ACFE fraud
study
 The median loss due to this type of fraud scheme
is significantly higher than losses from
corruption and asset misappropriation.
 Lack of Auditor Independence. A There might be
two cases one if an auditor is hired from outside
world by the clients and secondly if auditor is
also a manager and performs some other
services too like actuarial services, internal audit
outsourcing services, and consulting.
 In both cases they will lack independence as their
performance will adversely affect their consulting
fees. For example, Enron’s auditors—Arthur
Andersen—were also their internal auditors and
their management consultants.
 Lack of Director Independence. Many boards of
directors are composed of individuals who are
not independent. Examples of lack of
independence are directors who have a personal
relationship by serving on the boards of other
directors’ companies; have a business trading
relationship as key customers or suppliers of the
company; have a financial relationship as primary
stockholders or have received personal loans
from the company; or have an operational
relationship as employees of the company.
 Adelphia Company : $60billion Fraud
 Questionable Executive Compensation
Schemes. A Thomson Financial survey
observed that executives have abused stock-
based compensation. The consensus is that
fewer stock options should be offered than
currently is the practice. Excessive use of
short-term stock options to compensate
directors and executives may result in short-
term thinking and strategies aimed at driving
up stock prices at the expense of the firm’s
long-term health.
 Inappropriate Accounting Practices. The use of
inappropriate accounting techniques is a
characteristic common to many financial
statement fraud schemes.
 Enron made elaborate use of special-purpose
entities (SPEs) to hide liabilities through off-
balance-sheet accounting. SPEs are legal, but
their application in this case was clearly intended
to deceive the market. Enron also employed
income-inflating techniques. For example, when
the company sold a contract to provide natural
gas for a period of two years, they would
recognize all the future revenue in the period
when the contract was sold.
 The SOX act establishes a framework to
modernize and reform the error and of public
company auditing.
 Its principal reforms includes
1. the creation of an accounting oversight
board
2. auditor independence
3. corporate governance and responsibility
4. disclosure requirements
5. penalties for fraud and other violations
 Corruption involves an executive, manager,
or employee of the organization in collusion
with an outsider.
 The ACFE study identifies four principal types
of corruption: bribery, illegal gratuities,
conflicts of interest, and economic extortion.
 Corruption accounts for about 10% of
occupational fraud cases.
 Bribery: giving, offering, soliciting, or receiving things of
value to influence an official in the performance of his or
her lawful duties.
 An illegal gratuity involves giving, receiving, offering, or
soliciting something of value because of an official act that
has been taken. This is similar to a bribe, but the
transaction occurs after the fact.
 A conflict of interest occurs when an employee acts on
behalf of a third party during the discharge of his or her
duties or has self-interest in the activity being performed.
 Economic extortion is the use (or threat) of force
(including economic sanctions) by an individual or
organization to obtain something of value. The item of
value could be a financial or economic asset, information,
or cooperation to obtain a favorable decision on some
matter under review.
 The most common form of fraud scheme
 92% of the frauds included in the ACFE study fall
in this category.
 Assets can be misappropriated either directly or
indirectly for the perpetrator’s benefit.
 Certain assets are more susceptible than others
to misappropriation.
 Transactions involving cash, checking accounts,
inventory, supplies, equipment, and information
are the most vulnerable to abuse.
 Examples of fraud schemes involving asset
misappropriation are described in the following
sections
 The theft of an asset creates an imbalance in
the basic accounting equation (assets =
equities), which the criminal must adjust if
the theft is to go undetected.
 The most common way to conceal the
imbalance is to charge the asset to an
expense account and reduce equity by the
same amount.
 For example, the theft of $20,000 cash could
be charged to a miscellaneous operating
expense account.
 Lapping involves the use of customer checks,
received in payment of their accounts, to conceal
cash previously stolen by an employee. For example,
the employee first steals and cashes Customer A’s
check for $500.
 Customer A’s account is not credited.
 Later (the next billing period), the employee uses a
$500 check received from Customer B and applies
this to Customer A’s account.
 Employees involved in this sort of fraud often
rationalize that they are simply borrowing the cash
and plan to repay it at some future date.
 Lapping is usually detected when the employee leaves
the organization or becomes sick and must take time
off work.
 Transaction fraud involves deleting, altering, or
adding false transactions to divert assets to the
perpetrator.
 This technique may be used to ship inventories to the
perpetrator in response to a fraudulent sales
transaction or to disburse cash in payment of a false
liability.
 A common type of transaction fraud involves the
distribution of fraudulent paychecks to nonexistent
employees.
 For example, a supervisor keeps an employee who
has left the organization on the payroll. Each week,
the supervisor continues to submit time cards to the
payroll department just as if the employee were still
working.
 Because computers lie at the heart of most
organizations’ accounting information systems
today.
 No one knows the true extent of business losses each
year due to computer fraud, but estimates reaching
$100 billion per year give some indication of the
problem’s magnitude.
 One reason for uncertainty in loss estimates is that
computer fraud is not well defined.
 For example, we saw in the ethics section of this
chapter that some people do not view copying
commercial computer software to be unethical.
 On the other side of this issue, software vendors
consider this a criminal act.
 The theft, misuse, or misappropriation of assets
by altering computer-readable records and files.
 The theft, misuse, or misappropriation of assets
by altering the logic of computer software.
 The theft or illegal use of computer-readable
information.
 The theft, corruption, illegal copying, or
intentional destruction of computer software.
 The theft, misuse, or misappropriation of
computer hardware.
Lecture 15  fraud schemes - james a. hall book chapter 3
 The simplest way to perpetrate a computer fraud
is at the data collection or data entry stage. This
is the computer equivalent of the transaction
fraud.
 The fraudulent act involves falsifying data as it
enters the system. This can be to delete, alter, or
add a transaction.
 For example, to commit payroll fraud, the
perpetrator may insert a fraudulent payroll
transaction along with other legitimate
transactions.
 change the Hours Worked field in an otherwise
legitimate payroll transaction to increase the
amount of the paycheck
 Data processing frauds fall into two classes:
program fraud and operations fraud.
 Program fraud : creating illegal programs that
can access data files to alter, delete, or insert
values into accounting records;
 Destroying or corrupting a program’s logic using
a computer virus
 Altering program logic to cause the application
to process data incorrectly.
 Operations fraud is the misuse or theft of the
firm’s computer resources. This often involves
using the computer to conduct personal
business.
 Database management fraud includes
altering, deleting, corrupting, destroying, or
stealing an organization’s data.
 Because access to database files is an
essential element of this fraud, it is usually
associated with transaction or program fraud.
 The most common technique is to access the
database from a remote site and browse the
files for useful information that can be
copied and sold to competitors.
 A common form of fraud at the information
generation stage is to steal, misdirect, or misuse
computer output.
 One simple but effective technique called scavenging
involves searching through the trash of the computer
center for discarded output
 Another form of fraud called eavesdropping involves
listening to output transmissions over
telecommunications lines. Technologies are readily
available that enable perpetrators to intercept
messages being sent over unprotected telephone
lines and microwave channels.
 Data encryption can, however, render useless any
data captured through eavesdropping.
 Accounting information Systesm : Chapter 3
James A Hall
 http://www.fraudessentials.com/people-
who-commit-fraud/
 https://en.wikipedia.org/wiki/Fraud
 Fraud Schemes
 Statement
 Corruption
 Asset Misappropriation
 Computer Frauds
See you again in sha ALLAH
4/5/2016

More Related Content

PPT
Introduction to Transaction Processing Chapter No. 2
PPT
James hall ch 3
PPT
The Revenue Cycle
PPTX
Lecture 21 expenditure cycle part i - accounting information systesm james ...
PPT
James hall ch 6
PPT
AIS-CHAPTER-1.ppt
PPT
James hall ch 2
PPT
Cash Flow Statement
Introduction to Transaction Processing Chapter No. 2
James hall ch 3
The Revenue Cycle
Lecture 21 expenditure cycle part i - accounting information systesm james ...
James hall ch 6
AIS-CHAPTER-1.ppt
James hall ch 2
Cash Flow Statement

What's hot (20)

PPT
James hall ch 5
PPTX
Chapter 2 internal control
PDF
FCPA Overview.pptx
PPTX
Accounting principle
PPTX
Finance for non finance
PPTX
Auditing in Computerized Environment
PPT
James hall ch 1
PPT
James hall ch 4
PPTX
Chapter 4 cash flow statement
PPTX
Auditing the expenditure cycle
PPTX
Chapter 5:Recognizing the symptoms of fraud
PDF
Ebook audit case study
PPTX
Chapter 1 - The Information System: An Accountant's Perspective
PPTX
Ethics in finance and accounting With examples
PPTX
Computer in accounting
PPT
INTERNAL CONTROLS & INTERNAL AUDIT.ppt
PPTX
Financial Statement
PPTX
Auditing Chapter 1
PPTX
Creative Accounting
James hall ch 5
Chapter 2 internal control
FCPA Overview.pptx
Accounting principle
Finance for non finance
Auditing in Computerized Environment
James hall ch 1
James hall ch 4
Chapter 4 cash flow statement
Auditing the expenditure cycle
Chapter 5:Recognizing the symptoms of fraud
Ebook audit case study
Chapter 1 - The Information System: An Accountant's Perspective
Ethics in finance and accounting With examples
Computer in accounting
INTERNAL CONTROLS & INTERNAL AUDIT.ppt
Financial Statement
Auditing Chapter 1
Creative Accounting
Ad

Viewers also liked (20)

PPT
Ethical hacking a licence to hack
PPT
Reflective Audio Journaling
PPTX
The Strategy of Journaling
PPTX
Cyber crime journal by central detective training school
PPT
Linux Vulnerabilities
PPTX
Journaling Across the Curriculum
PPT
10135 a 09
PPTX
Chapter 3 security part i auditing operating systems and networks
PDF
Do journaling filesystems guarantee against corruption after a power failure (1)
PPT
Hacking A Web Site And Secure Web Server Techniques Used
PPT
Ethical_Hacking_ppt
PPT
Journaling And Reflective Practice
PDF
Top Ten Web Hacking Techniques (2008)
PDF
Hacking in shadows By - Raghav Bisht
PDF
Ethical Hacking Certification Path You Should Follow
PPT
Ethical Hacking
PPTX
Ethical hacking
PPTX
Ethical Hacking
PDF
Hacking the Web
Ethical hacking a licence to hack
Reflective Audio Journaling
The Strategy of Journaling
Cyber crime journal by central detective training school
Linux Vulnerabilities
Journaling Across the Curriculum
10135 a 09
Chapter 3 security part i auditing operating systems and networks
Do journaling filesystems guarantee against corruption after a power failure (1)
Hacking A Web Site And Secure Web Server Techniques Used
Ethical_Hacking_ppt
Journaling And Reflective Practice
Top Ten Web Hacking Techniques (2008)
Hacking in shadows By - Raghav Bisht
Ethical Hacking Certification Path You Should Follow
Ethical Hacking
Ethical hacking
Ethical Hacking
Hacking the Web
Ad

Similar to Lecture 15 fraud schemes - james a. hall book chapter 3 (20)

PPT
Presentation on fraud prevention, detection & control
DOCX
The following article is related to deterring employee fraud within .docx
PDF
FORENSIC AUDIT.pdf hhhhdhdhdhdhdhddhddhddhhdd
PPT
jameshallch3-150219114845-conversion-gate01(1).ppt
PPTX
Summary presentation Highliths
PDF
Juan Monteverde_ The Common Forms of Corporate Fraud and Their Impact on Busi...
PPTX
Business risk, control systems and risk of fraud whitin bison hospitality ltd
PPT
accounting information system Ethics_Frauds.ppt
PPTX
Workshop_on_Forensic_Audit.PPTX
PDF
Tackling Corporate Fraud
PPT
Auditing for Internal Fraud
PDF
What Makes Corporate Fraud Investigations Challenging: Dealing with Complex F...
PPTX
Understanding & Managing Fraud Rrisk
PPT
Accounting Information Systems by James A. Hall 6th ed ch03
PPTX
forensic-accounting-Lec-19-whistle-Blowing.pptx
PDF
Protecting Your Organization Against Check and ACH Fraud
PPTX
Lecture 14 fraud and accountant - james a. hall book chapter 3
PDF
Setting Up and Managing an Anonymous Fraud Hotline
PPT
Cdic 2009 fraud audit pairat 4
PPT
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Presentation on fraud prevention, detection & control
The following article is related to deterring employee fraud within .docx
FORENSIC AUDIT.pdf hhhhdhdhdhdhdhddhddhddhhdd
jameshallch3-150219114845-conversion-gate01(1).ppt
Summary presentation Highliths
Juan Monteverde_ The Common Forms of Corporate Fraud and Their Impact on Busi...
Business risk, control systems and risk of fraud whitin bison hospitality ltd
accounting information system Ethics_Frauds.ppt
Workshop_on_Forensic_Audit.PPTX
Tackling Corporate Fraud
Auditing for Internal Fraud
What Makes Corporate Fraud Investigations Challenging: Dealing with Complex F...
Understanding & Managing Fraud Rrisk
Accounting Information Systems by James A. Hall 6th ed ch03
forensic-accounting-Lec-19-whistle-Blowing.pptx
Protecting Your Organization Against Check and ACH Fraud
Lecture 14 fraud and accountant - james a. hall book chapter 3
Setting Up and Managing an Anonymous Fraud Hotline
Cdic 2009 fraud audit pairat 4
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...

More from Habib Ullah Qamar (20)

PPTX
Guidance and counselling
PPTX
Educational technology and tv radio simulation
PPTX
Lecture 1 ECommerce an Introduction for Master classes UOS
PPTX
Computer manged learning and problems code 8620 bed
PPTX
Computer assisted instructions B.Ed course cose 8620
PPTX
Computer Assisted Instructions AIOU MA Education MED code 855
PPTX
Ict lecture 1 An introduction to information and Communication technology and...
PPTX
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
PPTX
Lecture 3 e-cmmerce , business models and concpets-chapter 2
PPTX
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
PPTX
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
PPTX
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
PPTX
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
PPTX
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
PPTX
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
PPTX
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
PPTX
Lecture 3 e-cmmerce , business models and concpets-chapter 2
PPTX
Lecture 2 e-cmmerce , types of e-commerces-an introduction
PPTX
Lecture 1 e-cmmerce , an introduction
PPTX
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...
Guidance and counselling
Educational technology and tv radio simulation
Lecture 1 ECommerce an Introduction for Master classes UOS
Computer manged learning and problems code 8620 bed
Computer assisted instructions B.Ed course cose 8620
Computer Assisted Instructions AIOU MA Education MED code 855
Ict lecture 1 An introduction to information and Communication technology and...
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 2 e-cmmerce , types of e-commerces-an introduction
Lecture 1 e-cmmerce , an introduction
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...

Recently uploaded (20)

PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Types and Its function , kingdom of life
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
master seminar digital applications in india
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Business Ethics Teaching Materials for college
PDF
Classroom Observation Tools for Teachers
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Supply Chain Operations Speaking Notes -ICLT Program
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Types and Its function , kingdom of life
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
master seminar digital applications in india
O7-L3 Supply Chain Operations - ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Structure & Organelles in detailed.
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Business Ethics Teaching Materials for college
Classroom Observation Tools for Teachers
human mycosis Human fungal infections are called human mycosis..pptx
Anesthesia in Laparoscopic Surgery in India
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf

Lecture 15 fraud schemes - james a. hall book chapter 3

  • 1. Habib Ullah Qamar Govt. college of Commerce Gujranwala 4/5/2016
  • 2.  ACFE classification format. Three broad categories of fraud schemes are defined  Fraudulent statements : Fraudulent statements are associated with management fraud  Corruption : Corruption involves an executive, manager, or employee of the organization in collusion with an outsider.  Asset misappropriation: The most common form of fraud scheme involves some type of asset misappropriation. 92% of the frauds included in the ACFE study fall in this category.
  • 3.  All fraud involves some form of financial misstatement, to meet the definition under this class of fraud scheme the statement itself must bring direct or indirect financial benefit to the perpetrator.  For example, misstating the cash account balance to cover the theft of cash is not financial statement fraud.  Fraudulent statements account for only 8 percent of the fraud cases covered in the ACFE fraud study  The median loss due to this type of fraud scheme is significantly higher than losses from corruption and asset misappropriation.
  • 4.  Lack of Auditor Independence. A There might be two cases one if an auditor is hired from outside world by the clients and secondly if auditor is also a manager and performs some other services too like actuarial services, internal audit outsourcing services, and consulting.  In both cases they will lack independence as their performance will adversely affect their consulting fees. For example, Enron’s auditors—Arthur Andersen—were also their internal auditors and their management consultants.
  • 5.  Lack of Director Independence. Many boards of directors are composed of individuals who are not independent. Examples of lack of independence are directors who have a personal relationship by serving on the boards of other directors’ companies; have a business trading relationship as key customers or suppliers of the company; have a financial relationship as primary stockholders or have received personal loans from the company; or have an operational relationship as employees of the company.  Adelphia Company : $60billion Fraud
  • 6.  Questionable Executive Compensation Schemes. A Thomson Financial survey observed that executives have abused stock- based compensation. The consensus is that fewer stock options should be offered than currently is the practice. Excessive use of short-term stock options to compensate directors and executives may result in short- term thinking and strategies aimed at driving up stock prices at the expense of the firm’s long-term health.
  • 7.  Inappropriate Accounting Practices. The use of inappropriate accounting techniques is a characteristic common to many financial statement fraud schemes.  Enron made elaborate use of special-purpose entities (SPEs) to hide liabilities through off- balance-sheet accounting. SPEs are legal, but their application in this case was clearly intended to deceive the market. Enron also employed income-inflating techniques. For example, when the company sold a contract to provide natural gas for a period of two years, they would recognize all the future revenue in the period when the contract was sold.
  • 8.  The SOX act establishes a framework to modernize and reform the error and of public company auditing.  Its principal reforms includes 1. the creation of an accounting oversight board 2. auditor independence 3. corporate governance and responsibility 4. disclosure requirements 5. penalties for fraud and other violations
  • 9.  Corruption involves an executive, manager, or employee of the organization in collusion with an outsider.  The ACFE study identifies four principal types of corruption: bribery, illegal gratuities, conflicts of interest, and economic extortion.  Corruption accounts for about 10% of occupational fraud cases.
  • 10.  Bribery: giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties.  An illegal gratuity involves giving, receiving, offering, or soliciting something of value because of an official act that has been taken. This is similar to a bribe, but the transaction occurs after the fact.  A conflict of interest occurs when an employee acts on behalf of a third party during the discharge of his or her duties or has self-interest in the activity being performed.  Economic extortion is the use (or threat) of force (including economic sanctions) by an individual or organization to obtain something of value. The item of value could be a financial or economic asset, information, or cooperation to obtain a favorable decision on some matter under review.
  • 11.  The most common form of fraud scheme  92% of the frauds included in the ACFE study fall in this category.  Assets can be misappropriated either directly or indirectly for the perpetrator’s benefit.  Certain assets are more susceptible than others to misappropriation.  Transactions involving cash, checking accounts, inventory, supplies, equipment, and information are the most vulnerable to abuse.  Examples of fraud schemes involving asset misappropriation are described in the following sections
  • 12.  The theft of an asset creates an imbalance in the basic accounting equation (assets = equities), which the criminal must adjust if the theft is to go undetected.  The most common way to conceal the imbalance is to charge the asset to an expense account and reduce equity by the same amount.  For example, the theft of $20,000 cash could be charged to a miscellaneous operating expense account.
  • 13.  Lapping involves the use of customer checks, received in payment of their accounts, to conceal cash previously stolen by an employee. For example, the employee first steals and cashes Customer A’s check for $500.  Customer A’s account is not credited.  Later (the next billing period), the employee uses a $500 check received from Customer B and applies this to Customer A’s account.  Employees involved in this sort of fraud often rationalize that they are simply borrowing the cash and plan to repay it at some future date.  Lapping is usually detected when the employee leaves the organization or becomes sick and must take time off work.
  • 14.  Transaction fraud involves deleting, altering, or adding false transactions to divert assets to the perpetrator.  This technique may be used to ship inventories to the perpetrator in response to a fraudulent sales transaction or to disburse cash in payment of a false liability.  A common type of transaction fraud involves the distribution of fraudulent paychecks to nonexistent employees.  For example, a supervisor keeps an employee who has left the organization on the payroll. Each week, the supervisor continues to submit time cards to the payroll department just as if the employee were still working.
  • 15.  Because computers lie at the heart of most organizations’ accounting information systems today.  No one knows the true extent of business losses each year due to computer fraud, but estimates reaching $100 billion per year give some indication of the problem’s magnitude.  One reason for uncertainty in loss estimates is that computer fraud is not well defined.  For example, we saw in the ethics section of this chapter that some people do not view copying commercial computer software to be unethical.  On the other side of this issue, software vendors consider this a criminal act.
  • 16.  The theft, misuse, or misappropriation of assets by altering computer-readable records and files.  The theft, misuse, or misappropriation of assets by altering the logic of computer software.  The theft or illegal use of computer-readable information.  The theft, corruption, illegal copying, or intentional destruction of computer software.  The theft, misuse, or misappropriation of computer hardware.
  • 18.  The simplest way to perpetrate a computer fraud is at the data collection or data entry stage. This is the computer equivalent of the transaction fraud.  The fraudulent act involves falsifying data as it enters the system. This can be to delete, alter, or add a transaction.  For example, to commit payroll fraud, the perpetrator may insert a fraudulent payroll transaction along with other legitimate transactions.  change the Hours Worked field in an otherwise legitimate payroll transaction to increase the amount of the paycheck
  • 19.  Data processing frauds fall into two classes: program fraud and operations fraud.  Program fraud : creating illegal programs that can access data files to alter, delete, or insert values into accounting records;  Destroying or corrupting a program’s logic using a computer virus  Altering program logic to cause the application to process data incorrectly.  Operations fraud is the misuse or theft of the firm’s computer resources. This often involves using the computer to conduct personal business.
  • 20.  Database management fraud includes altering, deleting, corrupting, destroying, or stealing an organization’s data.  Because access to database files is an essential element of this fraud, it is usually associated with transaction or program fraud.  The most common technique is to access the database from a remote site and browse the files for useful information that can be copied and sold to competitors.
  • 21.  A common form of fraud at the information generation stage is to steal, misdirect, or misuse computer output.  One simple but effective technique called scavenging involves searching through the trash of the computer center for discarded output  Another form of fraud called eavesdropping involves listening to output transmissions over telecommunications lines. Technologies are readily available that enable perpetrators to intercept messages being sent over unprotected telephone lines and microwave channels.  Data encryption can, however, render useless any data captured through eavesdropping.
  • 22.  Accounting information Systesm : Chapter 3 James A Hall  http://www.fraudessentials.com/people- who-commit-fraud/  https://en.wikipedia.org/wiki/Fraud
  • 23.  Fraud Schemes  Statement  Corruption  Asset Misappropriation  Computer Frauds
  • 24. See you again in sha ALLAH 4/5/2016