IS 414 CH. 5 Flashcards

1
Q

What are the threats to Accounting Information Systems?

A

Natural & political disasters, Software errors and equipment malfunctions, unintentional acts, and intentional acts (computer crimes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Natural & political disasters

A

fire or excessive heat
floods, earthquakes, landslides, hurricanes, tornadoes,etc
war and attacks by terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software errors and equipment malfunctions

A

hardware or software failure
operating system crashes
power outages & fluctuations
undetected data transmission error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unintentional acts

A

accidents caused by human carelessness, failure to follow procedures
innocent errors and omissions
logic errors
lost, misplaced, or destroyed data
systems that do not meet company needs or handle tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intentional acts (computer crimes)

A

sabotage
false use, unauthorized disclosure of data
financial statement fraud
corruption
computer fraud (attack, social engineering, malware, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sabotage

A

an intentional act where the intent is to destroy a system or some of its components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

fraud

A

any and all means a person uses to gain an unfair advantage over another person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For an act to be fraudulent

A
  1. False statement, representation, or disclosure
  2. A material fact, which is something that induces a person to act
  3. An intent to deceive
  4. A justifiable reliance; that is, the person relies on the misrepresentation to take an action
  5. An injury or loss suffered by the victim
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

white-collar crimes

A

businesspeople who commit fraud, they usually resort to trickery or cunning and their crimes usually involve a violation of trust or confidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

corruption

A

dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Ex: bribery, bid rigging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

investment fraud

A

misrepresentation or leaving out facts in order to promote an investment that promises fantastic profits with little or no risk. Ex: ponsi scheme and securities fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

misappropriation of assets

A

theft of company assets by employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

describe both the different types of fraud

A

misappropriation of assets (sometimes called employee fraud) and fraudulent financial reporting (sometimes called management fraud)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

misappropriation of assets (steps)

A

is the absence of internal controls and/or the failure to enforce existing internal controls

  • gains the trust of entity being defrauded
  • uses trickery, cunning, or false misleading info
  • conceals fraud by falsifying records or other info
  • rarely terminates the fraud voluntarily
  • sees how easy it is to get money, or has greed (self-perpetuating; if they stop, they’ll get caught)
  • spend the money
  • greedy, takes more money more often
  • grows careless or overconfident
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

fraudulent financial reporting

A

intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who perpetrates fraud?

A

white collar fraud - people like you & me

computer fraud - younger people with more computer experience

17
Q

Fraud Triangle

A

pressure, opportunity, and rationalization

18
Q

pressure

A

person’s incentive or motivation for committing fraud

19
Q

opportunity

A

the condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to a person gain

  • can hide in an expense account
  • use lapping
  • check kiting
20
Q

lapping

A

concealing the theft of cash by means of series of delays in posting collections to account receivables

21
Q

check kiting

A

creating cash using the lag between the time a check is deposited and the time it clears the bank

22
Q

rationalizations

A

the excuse that fraud perpetrators use to justify their illegal behavior

23
Q

computer fraud

A

any type of fraud that requires computer technology to perpetrate

24
Q

input fraud

A

alter or falsify computer input

25
Q

processor fraud

A

unauthorized system use, including the theft of computer time and services

26
Q

computer instruction fraud

A

includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity

27
Q

data fraud

A

illegally using, copying, browsing, searching, or harming company data

28
Q

output fraud

A

unless properly safeguarded, displayed or printed output can be stolen, copied, or misused

29
Q

Preventing and detecting fraud

A

the prevent fraud organizations must create a climate that makes fraud less likely, increases the difficulty of committing it, improves detection methods, and reduces the amount lost if a fraud occurs