1 computer fraud and security uaa – acct 316 accounting information systems dr. fred barbee

97
1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Upload: lesley-kennedy

Post on 22-Dec-2015

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

1

Computer Fraud and Security

UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Page 2: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Computer Fraud and Security

Page 3: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

3

What’s an Oxymoron???

Page 4: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

4

Interesting Oxymorons

Advanced BASIC

Airline food

Government organization

Sanitary landfill

Page 5: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

5

Scarey Oxymorons

Computer security

Business Ethics

Page 6: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

6

Blatant Oxymorons

Microsoft Works

Page 7: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

7

Introduction

Business Ethics

Page 8: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

8

Ethics

“Our ethical standards come out of the past – out of our inheritance as a people; religions, philosophical, historical. And the more we know of that past, the more sure-footedly we can inculcate ethical conduct in the future.”

John Akers, Former Chairman of the Board and CE0 of IBM

Page 9: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

9

Business Ethics

Ethics pertains to the principles of conduct that individuals use in making choices, and

guiding their behavior

in situations that involve the concepts of right and wrong.

Page 10: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 11: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

11

Introduction

Fraud

Page 12: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

12

What is Fraud

Fraud is any and all means a person uses to gain an unfair advantage over another person.

Page 13: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

13

In the Business Environment

Fraud is intentional deception,misappropriation of a company’s

assets, or manipulation of its financial data

to the advantage of the perpetrator.

Page 14: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

14

Common Law Definition

Intentional deception, such as the misrepresentation, concealment, or nondisclosure of a material fact,

that results in injury to another.

Page 15: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

15

Fraud

Business fraud typically comes at two levels:Employee fraud

Management fraud

Page 16: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

16

Characteristics of Employee Fraud

Designed to directly convert cash or other assets to personal benefit.

Typically circumvents the firm’s internal control system for personal gain.

Usually involves three steps which the text refers to as “the Fraud Process.”

Page 17: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

17

Characteristics of Management Fraud

Fraud is perpetrated at levels of management above the one which internal control structures typically target.

Usually involves using the financial statements to create the illusion that the firm is doing better than it really is.

Page 18: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

18

Characteristics of Management Fraud

If the fraud involves misappropriation of assets, it frequently is shrouded in a maze of complex business transactions, often involving third parties.

Page 19: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

19

Fraudulent Financial Reporting

The Treadway Commission

Page 20: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

20

The Studies . . .

Report of the National Commission on Fraudulent Financial Reporting (1981-1986)

Fraudulent Financial Reporting: 1987-1997 – An analysis of U.S. Public Companies

Page 21: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

21

The Findings . . .

Top senior executives were frequently involved.CEO 72% of cases

CFO 43% of cases

CEO/CFO 83% of cases

Page 22: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

22

The Findings . . .

Most audit committees only met about once a year (or the firm had no audit committee).

Boards of Directors dominated by “insider” and “gray” directors

Page 23: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

23

The Findings . . .

Family relationships among directors and/or officers were fairly common.

Page 24: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

24

Fraudulent Financial Reporting

Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.

Page 25: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

25

Committee Recommendations

1. Establish an organizational environment that contributes to the integrity of the financial reporting process.

2. Identify and understand the factors that lead to fraudulent financial reporting.

Page 26: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

26

Committee Recommendations

3. Assess the risk of fraudulent financial reporting within the company.

4. Design and implement internal controls to provide reasonable assurance that fraudulent financial reporting is prevented.

Page 27: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

27

Let’s Take a Slight Detour

Page 28: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

28

What are the Common Law Requirements for Fraud?

Page 29: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

29

Common Law Requirements

1. There must be a false statement or a nondisclosure

2. A fact must be a substantial factor in inducing someone to act

3. There must be intent to deceive

Page 30: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

30

Common Law Requirements

4. The misrepresentation must have resulted in justifiable reliance upon information, which caused someone to act.

5. The misrepresentation must have caused injury or loss.

Page 31: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

31

Is Fraud a Problem?

Page 32: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

ACFE 2002 Report to the Nation

Occupational Fraud and Abuse

Page 33: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 34: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 35: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 36: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 37: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 38: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 39: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

At the Sources of Fraud

Page 40: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 41: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 42: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 43: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 44: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 45: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

At the Duration of the schemes

Page 46: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 47: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 48: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

How Were They Detected?

Page 49: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 50: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Fraud Prevention Measures

Page 51: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 52: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 53: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

53

Now, Back to the Text

The Fraud Process

Page 54: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 55: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

55

Computer Fraud and Security

Why Fraud Occurs

Page 56: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Pressure (Real or Perceived)

The Fraud Triangle(Why Good People Do The Wrong Thing)

Page 57: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Table 9-1 Pressures that Can Lead to Fraud

Page 58: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

58

Situational Pressures

The Treadway Commission

Page 59: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

59

Situational Pressures

Sudden decreases in revenue or market share.

Unrealistic budget pressures, particularly for short-term results.

Page 60: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

60

Situational Pressures

Financial pressure resulting from bonus plans that depend on short-term economic performance.

Page 61: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Pressure (Real or Perceived)

Opportunities, Consequences,

Likelihood of Detection (Real or perceived)

The Fraud Triangle(Why Good People Do The Wrong Thing)

Page 62: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Table 9-2 Perceived Opportunities

Page 63: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

63

Opportunities

The Treadway Commission

Page 64: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

64

Opportunities

Absence of a board of directors or audit committees.

Weak, or nonexistent, internal controls

Unusual or complex transactions

Page 65: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

65

Opportunities

Accounting estimates requiring significant subjective judgment by management.

Ineffective internal audit staffs

Page 66: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

The Fraud Triangle(Why Good People Do The Wrong Thing)

Pressure (Real or Perceived)

Rationalization (Just this one time)

(I will pay it back!)

Opportunities, Consequences,

Likelihood of Detection (Real or perceived)

Page 67: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

67

Rationalizations

You would understand it if you knew how badly I needed it.

What I did was not that serious.

It was for a good cause.

No one will ever know.

Page 68: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

68

Rationalizations

I occupy a very important position of trust. I am above the rules.

Everyone else is doing it, so it cannot be that wrong.

The company owes it to me, and I’m taking no more than is rightfully mine.

Page 69: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Fraud or Honesty?

Page 70: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Fraud Motivating ForcesSituational Pressures

Opportunities

Personal Characteristics (integrity)

(High)

(High)

(Low)

(Low)

(Low)

High

No Fraud

Fraud

Page 71: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

71

Computer Fraud and Security

Computer Fraud

Page 72: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

72

Computer Fraud . . .

Computer fraud is any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution.

Page 73: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

73

Computer Fraud . . .

Unauthorized theft, use, access, modification, copying, and destruction of software or data.

Theft of money by altering computer records or the theft of computer time.

Page 74: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

74

Computer Fraud . . .

Theft or destruction of computer hardware.

Use or the conspiracy to use computer resources to commit a felony

Intent to illegally obtain information or tangible property through the use of computers.

Page 75: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

75

Computer Fraud Classifications

Page 76: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

Computer Fraud Classifications

Page 77: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

78

Preventing and Detecting Computer Fraud

Make Fraud Less Likely to Occur

Page 78: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

79

Fraud Prevention . . .

Use proper hiring and firing practices.

Manage disgruntled employees

Train employees in security and fraud prevention measures

Page 79: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

80

Fraud Prevention . . .

Manage and track software licenses

Require signed confidentiality agreements

Page 80: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

81

Preventing and Detecting Computer Fraud

Increasing the difficulty of committing fraud

Page 81: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

82

Fraud Prevention . . .

Develop a strong system of internal controls

Segregate duties

Require vacations and rotate duties.

Page 82: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

83

Fraud Prevention . . .

Restrict access to computer equipment and data files

Encrypt data and programs

Protect telephone lines

Page 83: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

84

Fraud Prevention . . .

Protect the system from viruses

Control sensitive data

Control laptop computers

Monitor hacker information

Page 84: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

85

Preventing and Detecting Computer Fraud

Improve detection methods

Page 85: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

86

Fraud Prevention . . .

Conduct frequent audits

Use a computer security officer

Set up a fraud hot line

Use computer consultants

Page 86: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

87

Fraud Prevention . . .

Monitor system activities

Use forensic accountants

Use fraud detection software

Page 87: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

88

Preventing and Detecting Computer Fraud

Other

Page 88: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

89

Fraud Prevention . . .

Reduce Fraud Losses

Prosecute and Incarcerate Fraud Perpetrators

Page 89: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

90

Preventing and Detecting Computer Fraud

2002 Wells Report Survey Data

Page 90: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee
Page 91: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

92

Fraud Prevention . . .

Strong internal controls (1.62)

Background checks on new employees (3.70)

Regular fraud audits (3.97)

Established fraud policies (4.08)

Page 92: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

93

Fraud Prevention . . .

Willingness to prosecute (4.47)

Ethics training (4.86)

Anonymous fraud reporting mechanisms (5.02)

Workplace surveillance (6.07)

Page 93: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

94

Preventing and Detecting Computer Fraud

Survey Data 1996

Page 94: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

95

Fraud Prevention . . .

Establish a corporate code of conduct (75%)

Reference checks on all new employees (65%)

Employment contracts (48%)

Page 95: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

96

Fraud Prevention . . .

Review and improve internal controls (47%)

Perform fraud audit (42%)

Ethics training (41%)

Training in fraud prevention and detection (31%)

Page 96: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

97

Fraud Prevention . . .

Surveillance equipment (30%)

Increased focus of senior management on the problem (29%)

Code of sanctions against suppliers/contractors (26%).

Page 97: 1 Computer Fraud and Security UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee

98

Fraud Prevention . . .

Increased role of audit committee (16%)

Staff rotation policy (11%)