Chapter 12 - Business Ethics, Fraud, and Fraud Detection Flashcards
_____________ pertains to the principles of conduct that individuals use in making choices and guiding their behavior in situations that involve the concepts of right and wrong.
Ethics
Business ethics involves finding the answers to two questions:
(1) How do managers decide what is right in conducting their business? and (2) Once managers have recognized what is right, how do they achieve it?
Ethical issues in business can be divided into four areas: ___________________________.
equity, rights, honesty, and the exercise of corporate power.
Implementing a new computer information system within an organization may cause some employees to lose their jobs, while those who remain enjoy the benefit of improved working conditions.
Seeking a balance between these consequences is the managers’ _____________________________.
ethical responsibility
Implementing a new computer information system within an organization may cause some employees to lose their jobs, while those who remain enjoy the benefit of improved working conditions.
Seeking a balance between these consequences is the managers’ _____________________________.
ethical responsibility
Ethical Issues in Business: Equity
Executive Salaries
Comparable Worth
Product Pricing
Ethical Issues in Business: Rights
Corporate Due Process
Employee Health Screening
Employee Privacy
Sexual Harassment
Diversity
Equal Employment Opportunity
Whistleblowing
Ethical Issues in Business: Honesty
Employee and Management Conflicts of Interest
Security of Organization Data and Records
Misleading Advertising
Questionable Business Practices in Foreign Countries
Accurate Reporting of Shareholder Interests
Ethical Issues in Business: Exercise of
Corporate Power
Political Action Committees
Workplace Safety
Product Safety
Environmental Issues
Divestment of Interests
Corporate Political Contributions
Downsizing and Plant Closures
This is the principle that says that the benefit from a decision must outweigh the risks. Furthermore, there must be no alternative decision that provides the same or greater benefit with less risk.
Proportionality
This is the principle that says the benefits of the decision should be distributed fairly to those who share
the risks. Those who do not benefit should not carry the burden of risk.
Justice
This is the principle that says that even if judged acceptable by the principles, the decision should be implemented so as to minimize all of the risks and avoid any unnecessary risks.
Minimize risk
__________________ is “the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology…. [This includes] concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves.”
Computer ethics
three levels of computer ethics:
pop, para, and theoretical
_______________ is simply the exposure to stories and reports found in the popular media regarding the good or bad ramifications of computer technology.
Pop computer ethics
_____________ involves taking a real interest in computer ethics cases and acquiring some level of skill and knowledge in the field
Para computer ethics
____________________ is of interest to multidisciplinary researchers who apply the theories of philosophy, sociology, and psychology to computer science with the goal of bringing some new understanding to the field.
Theoretical computer ethics
____________________ is of interest to multidisciplinary researchers who apply the theories of philosophy, sociology, and psychology to computer science with the goal of bringing some new understanding to the field.
Theoretical computer ethics
People desire to be in full control of what and how much information about themselves is available to others, and to whom it is available. This is the issue of ___________.
privacy
The creation and maintenance of huge, shared databases make it necessary to protect people from the potential misuse of data. This raises the issue of _____________ in the personal information industry.
ownership
____________ is an attempt to avoid such undesirable events as a loss of confidentiality or data integrity
Computer security
________________ attempt to prevent fraud and other misuse of computer systems; they act to protect and further the legitimate interests of the system’s constituencies
Security systems
______________ denotes a false representation of a material fact made by one party to another party with the intent to deceive and induce the other party to justifiably rely on the fact to his or her detriment
Fraud
According to common law, a fraudulent act must meet the following five conditions:
- False representation. There must be a false statement or a nondisclosure.
- Material fact. A fact must be a substantial factor in inducing someone to act.
- Intent. There must be the intent to deceive or the knowledge that one’s statement is
false. - Justifiable reliance. The misrepresentation must have been a substantial factor on
which the injured party relied. - Injury or loss. The deception must have caused injury or loss to the victim of the
fraud.
In accounting literature, fraud is also commonly known ___________________________________.
as white-collar crime, defalcation, embezzlement, and irregularities.
Auditors encounter fraud at two levels:
employee fraud and management fraud.
_____________________ is generally designed to directly convert cash or other assets to the employee’s personal benefit. Typically, the employee circumvents the company’s internal control system for personal gain.
Employee fraud, or fraud by non-management employees
Employee fraud usually involves three steps:
(1) stealing something of value (an asset)
(2) converting the asset to a usable form (cash)
(3) concealing the crime to avoid detection
__________________ is more insidious than employee fraud because it often escapes detection until the organization has suffered irreparable damage or loss.
Management fraud