Chapter 12 - Business Ethics, Fraud, and Fraud Detection Flashcards

1
Q

_____________ pertains to the principles of conduct that individuals use in making choices and guiding their behavior in situations that involve the concepts of right and wrong.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business ethics involves finding the answers to two questions:

A

(1) How do managers decide what is right in conducting their business? and (2) Once managers have recognized what is right, how do they achieve it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ethical issues in business can be divided into four areas: ___________________________.

A

equity, rights, honesty, and the exercise of corporate power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Implementing a new computer information system within an organization may cause some employees to lose their jobs, while those who remain enjoy the benefit of improved working conditions.
Seeking a balance between these consequences is the managers’ _____________________________.

A

ethical responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Implementing a new computer information system within an organization may cause some employees to lose their jobs, while those who remain enjoy the benefit of improved working conditions.
Seeking a balance between these consequences is the managers’ _____________________________.

A

ethical responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethical Issues in Business: Equity

A

Executive Salaries
Comparable Worth
Product Pricing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ethical Issues in Business: Rights

A

Corporate Due Process
Employee Health Screening
Employee Privacy
Sexual Harassment
Diversity
Equal Employment Opportunity
Whistleblowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethical Issues in Business: Honesty

A

Employee and Management Conflicts of Interest
Security of Organization Data and Records
Misleading Advertising
Questionable Business Practices in Foreign Countries
Accurate Reporting of Shareholder Interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ethical Issues in Business: Exercise of
Corporate Power

A

Political Action Committees
Workplace Safety
Product Safety
Environmental Issues
Divestment of Interests
Corporate Political Contributions
Downsizing and Plant Closures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the principle that says that the benefit from a decision must outweigh the risks. Furthermore, there must be no alternative decision that provides the same or greater benefit with less risk.

A

Proportionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is the principle that says the benefits of the decision should be distributed fairly to those who share
the risks. Those who do not benefit should not carry the burden of risk.

A

Justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is the principle that says that even if judged acceptable by the principles, the decision should be implemented so as to minimize all of the risks and avoid any unnecessary risks.

A

Minimize risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________________ is “the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology…. [This includes] concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves.”

A

Computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

three levels of computer ethics:

A

pop, para, and theoretical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______________ is simply the exposure to stories and reports found in the popular media regarding the good or bad ramifications of computer technology.

A

Pop computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____________ involves taking a real interest in computer ethics cases and acquiring some level of skill and knowledge in the field

A

Para computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____________________ is of interest to multidisciplinary researchers who apply the theories of philosophy, sociology, and psychology to computer science with the goal of bringing some new understanding to the field.

A

Theoretical computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____________________ is of interest to multidisciplinary researchers who apply the theories of philosophy, sociology, and psychology to computer science with the goal of bringing some new understanding to the field.

A

Theoretical computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

People desire to be in full control of what and how much information about themselves is available to others, and to whom it is available. This is the issue of ___________.

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The creation and maintenance of huge, shared databases make it necessary to protect people from the potential misuse of data. This raises the issue of _____________ in the personal information industry.

A

ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____________ is an attempt to avoid such undesirable events as a loss of confidentiality or data integrity

A

Computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

________________ attempt to prevent fraud and other misuse of computer systems; they act to protect and further the legitimate interests of the system’s constituencies

A

Security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

______________ denotes a false representation of a material fact made by one party to another party with the intent to deceive and induce the other party to justifiably rely on the fact to his or her detriment

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

According to common law, a fraudulent act must meet the following five conditions:

A
  1. False representation. There must be a false statement or a nondisclosure.
  2. Material fact. A fact must be a substantial factor in inducing someone to act.
  3. Intent. There must be the intent to deceive or the knowledge that one’s statement is
    false.
  4. Justifiable reliance. The misrepresentation must have been a substantial factor on
    which the injured party relied.
  5. Injury or loss. The deception must have caused injury or loss to the victim of the
    fraud.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In accounting literature, fraud is also commonly known ___________________________________.

A

as white-collar crime, defalcation, embezzlement, and irregularities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Auditors encounter fraud at two levels:

A

employee fraud and management fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

_____________________ is generally designed to directly convert cash or other assets to the employee’s personal benefit. Typically, the employee circumvents the company’s internal control system for personal gain.

A

Employee fraud, or fraud by non-management employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Employee fraud usually involves three steps:

A

(1) stealing something of value (an asset)
(2) converting the asset to a usable form (cash)
(3) concealing the crime to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

__________________ is more insidious than employee fraud because it often escapes detection until the organization has suffered irreparable damage or loss.

A

Management fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Management fraud typically contains three special characteristics:

A
  1. The fraud is perpetrated at levels of management above the one to which internal
    control structures generally relate.
  2. The fraud frequently involves using the financial statements to create an illusion that
    an entity is healthier and more prosperous than, in fact, it is.
  3. If the fraud involves misappropriation of assets, it frequently is shrouded in a maze
    of complex business transactions, often involving related third parties.
29
Q

The ___________ consists of three factors that contribute to or are associated with management and employee fraud.

A

fraud triangle

30
Q

The fraud triangle consists of three factors:

A

(1) situational pressure, which includes personal or job-related stresses that could coerce an individual to act dishonestly;
(2) opportunity, which involves direct access to assets and/or access to information that controls assets, and;
(3) ethics, which pertains to one’s character and degree of moral opposition to acts of dishonesty.

31
Q

The actual cost of fraud is, however, difficult to quantify for a number of reasons:

A

(1) not all fraud is detected;
(2) of that detected, not all is reported; (3) in many fraud cases, incomplete information is gathered; (4) information is not properly distributed to management or law enforcement authorities; and
(5) too often, business organizations decide to take no civil or
criminal action against the perpetrator(s) of fraud.

32
Q

Three broad categories of fraud schemes are defined:

A

fraudulent statements, corruption, and asset misappropriation.

33
Q

________________ are fraud schemes associated with management fraud. For example, misstating the cash account balance to cover the theft of cash is not financial statement fraud. On the other hand, understating liabilities to present a more favorable financial picture of the organization to drive up stock prices does fall under this classification.

A

Fraudulent statements

34
Q

The Underlying Problems involving Fraud:

A
  1. Lack of auditor independence
  2. Lack of director independence
  3. Questionable executive compensation schemes
  4. Inappropriate accounting practices.
35
Q

____________ involves giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties

A

Bribery

36
Q

An ___________ involves giving, receiving, offering, or soliciting something of value because of an official act that has been taken.

A

illegal gratuity

37
Q

A _________ occurs when an employee acts on behalf of a third party during the discharge of his or her duties or has self-interest in the activity being performed.

A

conflict of interest

38
Q

___________________ is the use (or threat) of force (including economic sanctions) by an individual or organization to obtain something of value.

A

Economic extortion

39
Q

_______________ involves stealing cash from an organization before it is recorded on the organization’s books and records. One example of this is an employee who accepts payment from a customer but does not record the sale.

A

Skimming

40
Q

_________________ is where an employee opening the mail steals a customer’s check and destroys the associated remittance advice

A

Mailroom fraud

41
Q

_________________ involves schemes where cash receipts are stolen from an organization after they have been recorded in the organization’s books and records.

A

Cash larceny

42
Q

_______________, also known as _______________, are perpetrated by employees who cause their employer to issue a payment to a false supplier or vendor by submitting invoices for fictitious goods or services, inflated invoices, or invoices for personal purchases.

A

Billing schemes, vendor fraud

43
Q

Three examples of billing scheme:

A
  1. shell company fraud
  2. pass-through fraud
  3. pay-and-return scheme
44
Q

A ______________ first requires that the perpetrator establish a false supplier on the books of the victim company. The fraudster then manufactures false purchase orders, receiving reports, and invoices in the name of the vendor and submits them to the accounting system, which creates the allusion of a legitimate transaction. Based on these documents, the system will set up an account payable and ultimately issue a check to the false supplier (the fraudster).

A

shell company fraud

45
Q

A _____________ is similar to the shell company fraud with the exception that a transaction actually takes place. Again, the perpetrator creates a false vendor and issues purchase orders to it for inventory or supplies. The false vendor then purchases the needed inventory from a legitimate vendor. The false vendor charges the victim company.

A

pass-through fraud

46
Q

A _______________ is a third form of vendor fraud. This typically involves a clerk with check writing authority who pays a vendor twice for the same products (inventory or supplies) received. The vendor, recognizing that its customer made a double payment, issues a reimbursement to the victim company, which the clerk intercepts and cashes.

A

pay-and-return scheme

47
Q

____________ involves forging or changing in some material way a check that the organization has written to a legitimate payee.

A

Check tampering

48
Q

_______________ is the distribution of fraudulent paychecks to existent
and/or nonexistent employees

A

Payroll fraud

49
Q

_________________ are schemes in which an employee makes a claim for reimbursement of fictitious or inflated business expenses.

A

Expense reimbursement frauds

50
Q

________________ are schemes that involve the direct theft of cash on
hand in the organization.

A

Thefts of cash

51
Q

__________________ involve the theft or misuse of the victim organization’s non cash assets.

A

Non cash fraud schemes

52
Q

___________________ is the first operational stage in the information system. The objective is to ensure that transaction data entering the system are valid, complete, and free from material errors. In many respects, this is the most important stage in
the system.

A

Data collection

53
Q

Two rules govern the design of data collection procedures:

A

relevance and efficiency

54
Q

Networked systems expose organizations to transaction frauds from remote locations. __________________________ are examples of such fraud techniques

A

Masquerading, piggybacking, and hacking

55
Q

_______________ involves a perpetrator gaining access to the system from a remote site by pretending to be an authorized user. This usually requires first gaining authorized access to a password.

A

Masquerading

56
Q

________________ is a technique in which the perpetrator at a remote site taps into the telecommunications lines and latches onto an authorized user who is logging into the system.

A

Piggybacking

56
Q

________________ is a technique in which the perpetrator at a remote site taps into the telecommunications lines and latches onto an authorized user who is logging into the system.

A

Piggybacking

57
Q

_______________ are distinguished from other computer criminals because their motives are not usually to defraud for financial gain. They are motivated primarily by the challenge of breaking into the system rather than the theft of assets

A

Hackers

58
Q

Program fraud includes the following techniques:

A

(1) creating illegal programs that can access data files to alter, delete, or insert values into accounting records; (2) destroying or corrupting a program’s logic using a computer virus; or (3) altering program logic to cause the application to process data incorrectly.

59
Q

__________________ is the misuse or theft of the firm’s computer resources. This often involves using the computer to conduct personal business.

A

Operations fraud

60
Q

___________________ includes altering, deleting, corrupting, destroying, or stealing an organization’s data. Because access to database files is an essential element of this fraud, it is often associated with transaction or program
fraud

A

Database management fraud

61
Q

__________________ is the process of compiling, arranging, formatting, and presenting information to users. Information may be an operational document such as a sales order, a structured report, or a message on a computer screen.

A

Information generation

62
Q

Regardless of physical form, useful information has the following characteristics:

A

relevance, timeliness, accuracy, completeness, and summarization

63
Q

A common form of fraud at the information generation stage is to steal, misdirect, or misuse computer output. One simple but effective technique called ___________ involves searching through the trash cans of the computer center for discarded output

A

scavenging

64
Q

_______________ involves listening to output transmissions over telecommunications lines

A

eavesdropping

65
Q

Risk factors that relate to fraudulent financial reporting are grouped according to the following classifications:

A
  • Management’s characteristics and influence over the control environment.
  • Industry conditions.
  • Operating characteristics and financial stability.
66
Q

In the case of financial fraud (management fraud), external auditors should look for the following kinds of common schemes:

A
  • Improper revenue recognition
  • Improper treatment of sales
  • Improper asset valuation
  • Improper deferral of costs and expenses
  • Improper recording of liabilities
  • Inadequate disclosures
67
Q

Two risk factors are related to misappropriation of assets:

A
  1. Susceptibility of assets to misappropriation.
  2. Controls.
68
Q

The __________________ is used extensively for consumer accounts. Total sales to customers for the period are itemized and billed at the period end. Customers are required to
pay only a minimum amount off the balance. The rest of the balance, plus interest, is carried forward to the next period.

A

balance forward method

69
Q

The ____________ is often used to manage trade accounts receivable (sales to other business organizations).

A

open invoice method

70
Q

The auditor’s judgments about the risk of material misstatements due to fraud may affect the audit in the following ways:

A
  • Engagement staffing and extent of supervision. The knowledge, skill, and ability of personnel assigned to the engagement should be commensurate with the assessment of the level of risk of the engagement.
  • Professional skepticism. Exercising professional skepticism involves maintaining an attitude that includes a questioning mind and critical assessment of audit evidence.
  • Nature, timing, and extent of procedures performed. Fraud risk factors that have control implications may limit the auditor’s ability to assess control risk below the maximum and thus reduce substantive testing.