Chapter 3 Flashcards

1
Q

Ethics are needed when

A

conflicts arise—the people need to choose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In business, conflicts may arise between:

A

employees
management
stakeholders
Litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four main areas of business ethics

A
  1. Equity
  2. Rights
  3. Honesty
  4. Exercise of Corporate Power
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

concerns the social impact of computer technology (hardware, software, and telecommunications).

A

Computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main computer ethics issues?

A

Privacy
Security—accuracy and confidentiality
Ownership of property
Environmental issues
Artificial intelligence
Unemployment and displacement
Misuse of computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

false statement or disclosure

A

False representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a fact must be substantial in
inducing someone to act

A

Material fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Legal Definition of fraud

A
  1. False representation
  2. Material Fact
  3. Intent to deceive must exist
  4. Justifiable reliance on misrepresentation
  5. Caused injury or loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enron, WorldCom, Adelphia
Underlying Problems

A
  1. Lack of Auditor Independence
  2. Lack of Director Independence
  3. Questionable Executive Compensation Schemes
  4. Inappropriate Accounting Practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sarbanes-Oxley Act of 2002 principal reforms pertain to

A

Creation of the Public Company Accounting Oversight Board (PCAOB)
Auditor independence—more separation between a firm’s attestation and non-auditing activities
Corporate governance and responsibility—audit committee members must be independent and the audit committee must oversee the external auditors
Disclosure requirements—increase issuer and management disclosure
New federal crimes for the destruction of or tampering with documents, securities fraud, and
actions against whistleblower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Committed by non-management personnel/employee
Usually consists of: an employee taking cash or other
assets for personal gain by circumventing a company’s
system of internal controls

A

Employee Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Perpetrated at levels of management above the
one to which internal control structure relates
Frequently involves using financial statements to
create an illusion that an entity is more healthy and prosperous than it actually is
Involves misappropriation of assets, it frequently is shrouded in a maze of complex business transaction

A

Management Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three categories of fraud schemes according to the
Association of Certified Fraud Examiners

A

A. fraudulent statements
B. corruption
C. asset misappropriation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Misstating the financial statements to make the copy
appear better than it is
Usually occurs as management fraud
May be tied to focus on short-term financial measures for success
May also be related to management bonus packages
being tied to financial statement

A

Fraudulent Statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of corruption

A

bribery
illegal gratuities
conflicts of interest
economic extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

indicative of corruption in business world
impacted accounting by requiring accurate
records and internal controls

A

Foreign Corrupt Practice Act of 1977

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Most common type of fraud and often occurs as
employee fraud
Examples:
making charges to expense accounts to cover theft of
asset (especially cash)
lapping: using customer’s check from one account to cover theft from a different account
transaction fraud: deleting, altering, or adding false transactions to steal assets

A

Asset Misappropriation

18
Q

Internal Control Objectives
According to AICPA SAS

A
  1. Safeguard assets of the firm
  2. Ensure accuracy and reliability of accounting records and information
  3. Promote efficiency of the firm’s operations
  4. Measure compliance with management’s prescribed policies and procedures
19
Q

Modifying Assumptions to the Internal Control Objectives

A
  1. Management Responsibility
  2. Reasonable Assurance
  3. Methods of Data Processing
20
Q

Limitations of Internal Controls

A

Possibility of honest errors
Circumvention via collusion
Management override
Changing conditions–especially in companies with high growth

21
Q

Exposures of Weak Internal
Controls (Risk)

A

Destruction of an asset
Theft of an asset
Corruption of information
Disruption of the information system

22
Q

Undesirable Events

A
  1. Access
  2. Fraud
  3. Errors
  4. Mischief
23
Q

Levels of Control

A
  1. Preventive
  2. Detective
  3. Corrective
24
Q

Five Internal Control
Components: SAS 78 / COSO

A
  1. Control environment
  2. Risk assessment
  3. Information and communication
  4. Monitoring
  5. Control activities
25
Q

Integrity and ethics of management
Organizational structure
Role of the board of directors and the audit committee
Management’s policies and philosophy
Delegation of responsibility and authority
Performance evaluation measures
External influences—regulatory agencies
Policies and practices managing human resource

A

The control environment

27
Q

Identify, analyze and manage risks relevant to financial reporting

A

Risk Assessment

28
Q

The AIS should produce high quality information
which:
identifies and records all valid transactions
provides timely information in appropriate detail to
permit proper classification and financial reporting
accurately measures the financial value of transactions
accurately records transactions in the time period in which they occurred

A

Information and Communication

29
Q

The process for assessing the quality of internal control
design and operation

A

Monitoring

30
Q

Policies and procedures to ensure that the appropriate
actions are taken in response to identified risks

A

Control Activities

31
Q

Control activities fall into two distinct categories

A
  1. IT Controls - relate specifically to the computer environment
  2. Physical Controls - primarily pertain to human activities
32
Q

Two Types of IT Controls

A
  1. General Controls
  2. Application Controls
33
Q

pertain to the entity wide
computer environment

A

General Controls

34
Q

ensure the integrity of
specific systems

A

Application Controls

35
Q

Six Types of Physical Controls

A

Transaction Authorization
Segregation of Duties
Supervision
Accounting Records
Access Control
Independent Verification

36
Q

used to ensure that employees are carrying out only authorized transactions
general (everyday procedures) or specific(non routine transactions) authorization

A

Transaction Authorization

37
Q

In manual systems, separation between:
● authorizing and processing a transaction
● custody and record keeping of the asset
● subtasks
In computerized systems, separation between:
● program coding
● program processing
● program maintenance

A

Segregation of Duties

38
Q

a compensation for lack of segregation; some may
be built into computer systems

A

Supervision

39
Q

provide an audit trail

A

Accounting Records

40
Q

help to safeguard assets by restricting physical
access to them

A

Access Controls

41
Q

reviewing batch totals or reconciling subsidiary
accounts with control accounts

A

Independent Verification