Chapter 3: Ethics, Fraud, And Internal Control Flashcards

1
Q

Ethics

A

Pertains to the principles of conduct that individuals use in making choices and guiding their behavior in situations that involve the concept of right and wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Ethics

A

Involves finding the answers to 2 questions. How do managers decide what is right in conducting business? And how do they achieve what is right?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer Ethics

A

Is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Privacy

A

People desire to be in full control of what and how much information about themselves is available to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security

A

Is an attempt to avoid such undesirable events as a loss of confidentiality or data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fraud

A

Denotes a false representation of a material fact made by one party to another party with the intent to deceive the other party to justifiably rely on the fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False Representation

A

There must be a false statement or a non disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Material Fact

A

A fact must be a substantial factor in inducing someone to act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intent

A

There must be the intent to deceive or the knowledge that one’s statement is false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Justifiable Reliance

A

The misrepresentation must have been a substantial fact on which the injured party relied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Injury or Loss

A

The deception must have caused injury or loss to the victim of the fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Employee Fraud

A

Is generally designed to directly convert cash or other assets to the employee’s personal benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Management Fraud

A

Usually does not involve the direct theft of assets. Is usually done by top management where internal controls can’t detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fraud Triangle

A

Consists of situational pressure, opportunity, and ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fraudulent Statements

A

Are associated with management fraud. The financial statement misrepresentation must bring direct or indirect financial benefit to the perpetrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Corruption

A

Involves an executive, manager or employee of the organization in collusion with an outsider. 10% of occupational fraud cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bribery

A

Involves giving, offering, or soliciting things of value to influence an official in the performance of their lawful duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Illegal Gratuity

A

Involves giving or receiving something of value because of an official act that has been taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Conflict of Interest

A

Occurs when an employee acts on behalf of a third party during the discharge of their duties or has self interest in the activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Economic Extortion

A

Is the use of force by an individual or organization to obtain something of value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Skimming

A

Involves stealing cash from an organization before it is recorded on the organization’s books and records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cash Larceny

A

Involves schemes in which cash receipts are stolen from an organization after they have been recorded in the organization’s books and records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Lapping

A

In which the cash receipts clerk first steals and cashes a check from customer A and makes up the difference from customer B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Vendor Fraud

A

Are perpetrated by employees who cause their employer to issue a payment to a false supplier by submitting invoices for goods and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Shell Company
First requires that the perpetrator establish a false supplier in the books of the victim company. Them by issuing false invoices creates payments to this false supplier
26
Pass Through Fraud
Is similar to a shell company fraud with the exception that a transaction has taken place. Inventory is purchased from a legitimate supplier then the place is inflated by a fake supplier before being sold to the victim company
27
Pay and Return
Involves a clerk with check writing authority who intentionally pays a vendor twice for the same invoice. The supplier reimburses one of the checks and the employee takes the cash
28
Check Tampering
Involves forging or changing in some material way a check that the organization has written to a legitimate payee.
29
Payroll Fraud
Is the distribution of fraudulent paychecks
30
Expense Reimbursement Fraud
Involves false or inflated expense reimbursements
31
Non Cash Misappropriations
Involve the theft of non cash assets like inventory or information
32
Internal Control System
Consists of policies, practices, and procedures to achieve objectives
33
Management Responsibility
The establishment and maintenance of a system of internal control is the responsibility of management
34
Reasonable Assurance
Cost of achieving objectives should not outweigh the benefits
35
Methods of Processing
Control techniques vary with different types of technology
36
Limitations of Internal Control
Possibility of error, circumvention, management override, and changing conditions
37
Exposure
The absence or weakness of a control
38
Preventive Controls
Are passive techniques designed to reduce undesirable events by forcing compliance with prescribed or desired actions
39
Detective Controls
Are designed to identify undesirable events that elude preventive controls
40
Corrective Controls
Are actions taken to reserve the effects of errors detected
41
Sox Section 302
Requires management to certify organization's internal on a quarterly and annual basis
42
Sox Section 404
Requires management to assess internal control effectiveness
43
Control Environment
Set the tone for the organization and influences control awareness
44
Risk Assessment
To identify, analyze, and manage financial reporting risks
45
Monitoring
Is the process by which the quality of internal control design and operations can be assessed
46
Control Activities
Are policies and procedures to ensure appropriate actions are taken to deal with identified risks
47
Transaction Authorization
Is to ensure all material transactions processes are valid
48
Segregation of Duties
Designed to minimize incompatible functions including separating transaction authorization and asset custody and record keeping
49
Supervision
Is a compensating control in organizations too small for sufficient segregation of duties
50
Accounting Records
Consist of source documents, journals, and ledgers which provide an audit trial
51
Access Controls
Ensure that only authorized personnel have access to firm assets
52
Independent Verification Procedures
Are checks to identify errors and misrepresentations
53
Check Digit
Is a control digit that is added to the data code when originally assigned
54
Missing Data Check
Identifies blank or incomplete input fields
55
Numeric Alphabetic Check
Indemnified data in the wrong form
56
Limit checks
Identify fields that exceed authorized limits
57
Range Checks
Verify that all amours fall within an acceptable range
58
Reasonableness Checks
Verify that amounts that have based limit and range checks are reasonable
59
Validity Checks
Compares actual fields against acceptable values
60
Processing Controls
Are programmed procedures to ensure an applications logic is functioning properly
61
Batch Controls
Manage the flow of high volume transactions and reconcile system output with original input
62
Audit Trail Controls
Ensure every transaction can be traced through each stage to processing from source to financial statements
63
Grandfather Father Son Backup
Used with systems that use sequential master files
64
Destructive Update
Approach leaves no backup copy and requires a special recovery program if data is destroyed or corrupted
65
Output Controls
Are procedures to ensure output is not lost, misdirected or corrupted and that privacy is not violated