CHAPTER 3 Flashcards

1
Q

pertains to the principles of conduct that individuals use in making choices and guiding their behavior in situations that involve the concepts of right and wrong

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Four areas of ethical issues in business

A

equity, rights, honesty and the exercise of corporate power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The benefit from a decision must outweigh the risks. Furthermore, there must be no alternative decision that provides the same or greater benefit with less risk.

A

PROPORTIONALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The benefits of the decision should be distributed fairly to those who share the risks. Those who do not benefit should not carry the burden of risk

A

Justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Even if judged acceptable by the principles, the decision should be implemented so as to minimize all of the risks and avoid any unnecessary risks.

A

Minimize risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology

A

Computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the most significant securities law since the Securities and Exchange Commission (SEC)

A

Sarbanes-Oxley Act (SOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

denotes a false representation of a material fact made by one party to another party with the intent to deceive and induce the other party to justifiably rely on the fact to his or her detriment.

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

generally designed to directly convert cash or other assets to the employee’s personal benefit.

A

Employee fraud, or fraud by nonmanagement employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is more insidious than employee fraud because it often escapes detection until the
organization has suffered irreparable damage or loss

A

Management fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 factors of fraud triangle

A

rationalization, opportunity, ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

empowered to set auditing, quality control, and ethics standards; to inspect registered accounting firms; to conduct investigations; and to take disciplinary actions

A

Public Company Accounting Oversight Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

involves an executive, manager, or employee of the organization in collusion with an outsider

A

Corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

involves giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties.

A

Bribery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

involves giving, receiving, offering, or soliciting something of value because of an official act that has been taken. This is similar to a bribe, but the transaction occurs after the fact

A

illegal gratuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

occurs when an employee acts on behalf of a third party during the discharge of his or her duties or has self-interest in the activity being performed.

A

conflict of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is the use (or threat) of force (including economic sanctions) by an individual or organization to obtain something of value.

A

Economic extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

involves stealing cash from an organization before it is recorded on the organization’s books and records.

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

an employee opening the mail steals a customer’s check and destroys the associated remittance advice.

A

mail room fraud

20
Q

involves schemes in which cash receipts are stolen from an organization after they have
been recorded in the organization’s books and records.

A

Cash larceny

21
Q

are perpetrated by employees who causes their employer to issue a payment to a false supplier or vendor by submitting invoices for fictitious goods or services, inflated invoices, or invoices for personal purchases

A

Billing schemes, also known as vendor fraud

22
Q

requires that the perpetrator establish a false supplier on the books of the victim company. The fraudster then manufactures false purchase orders, receiving reports, and invoices in the name of the vendor and submits them to the accounting system, which creates the allusion of a legitimate transaction

A

shell company fraud

23
Q

is similar to the shell company fraud with the exception that a transaction actually takes place.

A

pass through fraud

24
Q

is a third form of vendor fraud. This typically involves a clerk with check writing authority who pays a vendor twice for the same products (inventory or supplies) received.

A

pay-and-return scheme

25
Q

involves forging or changing in some material way a check that the organization has written to a legitimate payee

A

Check tampering

26
Q

is the distribution of fraudulent paychecks to existent and/or nonexistent employees

A

Payroll fraud

27
Q

are schemes in which an employee makes a claim for reimbursement of fictitious or inflated business expenses.

A

Expense reimbursement frauds

28
Q

are schemes that involve the direct theft of cash on hand in the organization

A

Thefts of cash

29
Q

involve the theft or misuse of the victim organization’s non-cash assets.

A

Non-cash fraud schemes

30
Q

This concept holds that the establishment and maintenance of a system of internal control is a

A

management responsibility

31
Q

The internal control system should provide ______ that the four broad objectives of internal control are met in a cost-effective manner.

A

reasonable assurance

32
Q

are passive techniques designed to reduce the frequency of occurrence of undesirable events.

A

Preventive controls

33
Q

form the second line of defense. These are devices, techniques, and procedures designed to identify and expose undesirable events that elude preventive controls

A

Detective controls

34
Q

are actions taken to reverse the effects of errors detected in the previous step.

A

Corrective controls

35
Q

Five components of COSO framework

A

Control Environment
Risk Assessment
Information and Communication
Monitoring
Control Activities

36
Q

is the foundation for the other four control components, sets the tone for the organization and influences the control awareness of its management and
employees.

A

control environment

37
Q

Organizations must perform a ______ to identify, analyze, and manage risks relevant to financial reporting.

A

risk assessment

38
Q

is the process by which the quality of internal control design and operation can be assessed.

A

Monitoring

39
Q

are the policies and procedures used to ensure that appropriate actions are taken to deal
with the organization’s identified risks.

A

Control activities

40
Q

pertain to entity-wide concerns such
as controls over the data center, organization databases, systems development, and program maintenance.

A

General controls

41
Q

ensure the integrity of specific systems such as sales order processing, accounts payable, and payroll applications

A

Application controls

42
Q

This class of controls relates primarily to the human activities employed in accounting systems.

A

PHYSICAL CONTROLS

43
Q

ensure that all material transactions processed by the information system are valid and in accordance with management’s objectives.

A

transaction authorization

44
Q

can take many forms, depending
on the specific duties to be controlled

A

Segregation of duties

45
Q

consist of source documents, journals, and ledgers

A

accounting records

46
Q

ensure that only authorized personnel have
access to the firm’s assets.

A

access controls

47
Q

are independent checks of the accounting system to identify errors and misrepresentations.

A

Verification procedures