Topic 3.1 Fraud And AIS Flashcards

1
Q

What are the threats to AIS?

A

Natural and political disaster
Software errors and equipment malfunctions
Unintentional acts
Intentional acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operating system crashes are examples of

A

Software errors and equipment malfunctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is fraud?

A

Any means of a person uses to gain an unfair advantage over another person e.g

  • a false statement, representation, or disclosure
  • a material fact, which induces a victim to act
  • an intent to deceive
  • victim relied on the misrepresentation
  • injury or loss was suffered by the victim

Fraud is a white collar crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two categories of fraud

A

Misappropriation of assets

Fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is misappropriation of assets

A

Theft to a company’s assets which can include physical assets e.g cash and inventory and digital assets e.g customer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is fraudulent financial reporting

A

Cooking the books e.g booking fictitious revenue, overstating assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some reasons for fraudulent financial statements

A

1) deceive investors or creditors
2) increase a company’s stock price
3) meet cash flow needs
4) hide company losses or other problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some of the auditors responsibilities

A
  • Understand fraud
  • Discus the risks of material fraudulent misstatements
  • Obtain information
  • Identify, assess, and respond to risks
  • Evaluate the results of their audit tests
  • Document and communicate findings
  • Incorporate a technology focus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Conditions for fraud (fraud triangle)

A

1) pressure
- financial
- lifestyle
- emotional
2) opportunities
- commit
- conceal
- convert to personal gain
3) rationalisations
- justify behaviour
- attitude that rules don’t apply to them
- lack personal integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is computer fraud

A

An illegal act in which a knowledge of computer technology is necessary for:

Perpetration
Investigation
Persecution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the computer fraud classifications

A

Input fraud
- alteration or falsifying input
Processor fraud
- unauthorised system use
Computer instructions fraud
- modifying software, illegal copying of software, using software in an unauthorised manner
Data fraud
- illegally using, copying, browsing, searching, or harming company data
Output fraud
- stealing, copying, or misusing computer printouts or displayed information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reasons for the rise of computer fraud

A

1) definition is not agreed on
2) many go undetected
3) high percentage is not reported
4) lack of network security
5) step by step guides are easily available
6) law enforcement is over burdened
7) difficulties calculating loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ways to prevent and detect fraud

A

1) make fraud less likely to occur
2) make it difficult to commit
3) improve detection
4) reduce fraud losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of threat poses the greatest risk on information systems?

A

Unintentional acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intentional or reckless conduct that results in materially misleading financial statements is called

A

Fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAS No . 99 requires that auditors

A

Plan audits based on an analysis of fraud risk

17
Q

Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft

A

Lapping