Chapter 8 Flashcards

1
Q

list the AIS threats

A
  • natural and political disasters
  • software errors
  • unintentional acts
  • intentional acts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

for an act to be fraudulent there must be

A
  • false statement, representation, disclosure
  • a material fact
  • intent to deceive
  • justifiable reliance
  • injury or loss suffered by victim
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

corruption

A

dishonest conduct by those in power and often involves actions that are illegitimate, immoral, or incompatible with ethical standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

investment fraud

A

mispresenting or leaving out facts in order to promote an investment that promises fantastic profits with little to no risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

misappropriation of assets

A

theft of company assets by employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

fraudulent financial reporting

A

intentional or reckless conduct that results in materially misleading financial statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ways to detect fraud

A

understand fraud, improve internal controls based on analysis of fraud risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

fraud triangle

A

pressure, opportunity, and rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

list the pressures

A

financial, emotional, lifestyle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

list opportunities

A

commit, conceal, convert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

rationalizaions

A

justification, attitude, lack of personal integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

computer fraud classification

A

input fraud, processor fraud, computer instructions fraud, data fraud, output fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

input fraud

A

alter or falsify computer input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

processor fraud

A

unauthorized system use, including theft of computer time and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

computer instructions fraud

A

tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data fraud

A

illegally using, copying, browsing, searching, or harming company data

17
Q

output fraud

A

displayed or printed output can be stolen, copied, or misused

18
Q

to prevent fraud ….

A

organizations must create a climate that makes fraud less likely, increases the difficulty of committing it, improves detection methods, and reduced amount lost if a fraud occurs

19
Q

segregation of duties

A

no single employee be given too much responsibility over business transactions or processes

20
Q

effective segregation of accounting duties is achieved when the following functions are separated

A

authorization, recording, custody