Accounting Information Systems (AIS) Overview
Accounting Information Systems (AIS) Overview
Fraud
Ethics
Ethics
Fraud Schemes
Fraudulent statements - are associated with management
fraud. Whereas all fraud involves some form of financial
statements, to meet the definition under this class of
fraud scheme the statement itself must bring direct or
indirect financial benefit to the perpetuator.
The underlying problems:
1. Lack of auditor independence
2. Lack of director independence
3. Questionable executive compensation schemes
4. Inappropriate accounting practices
Corruption
- Involves and executive, manager, or employee of the
organization in collusion with an outsider.
Bribery
- Involves giving, offering, soliciting, or receiving things
of value to influence an official in the performance of
his or her lawful duties.
Illegal gratuity
- Involves giving, receiving, offering, or soliciting
something of value because of an official act that has
been taken.
Conflict of interest
- occurs when an employee acts on behalf of a third
party during the discharge of his or her duties or has
self-interest in the activity being performed.
Economic extortion
- is the use (or threat) of force (including economic
sanctions) by an individual or organization to obtain
something of value.
Asset misappropriation
- assets are either directly or indirectly diverted to the
perpetuator’s benefit.
Types of asset misappropriation schemes
Skimming
- involves stealing cash from an organization before it is recorded
on the organization’s books and records.
Cash Larceny
- Involves schemes in which cash receipts are stolen from an
organization after they have been recorded in the organization’s
books and records.
Billing Schemes
- Also known as vendor fraud, are perpetuated by employee who
causes their employer to issue a payment to a false suppliers or
vendor by submitting invoices for fictitious goods or services,
inflated invoices, or invoices for personal purchases.
Examples of billing scheme
1) Shell company fraud - first requires that the
perpetuator establish a false supplier on the books
of the victim company.
2) Pass through fraud - is similar to the shell
company fraud with the exception that a
transaction actually takes place.
3) Pay-and-return - typically involves a clerk with
checkwriting authority who pays a vendor twice for
the same products (inventory or supplies) received.
Check Tampering
- Involves forging or changing in some material way a
check that the organization has written to a
legitimate payee.
Payroll fraud
- Is a distribution of fraudulent paychecks to existent
and/or nonexistent employees.
Expense reimbursements
- Are schemes in which an employee makes a claim for
reimbursement fictitious or inflated business
expenses.
Thefts of cash
- Are schemes that involve the direct theft of cash
on hand in the organization.
Non-cash misappropriations
- Involve the theft or misuse of the victim
organization’s non-cash assets.
Computer fraud
- Fraudulent statements, corruption, and asset
misappropriations.
Internal Control Concepts and Techniques
Internal Control System - comprises policies,
practices, and procedures employed by the
organization to achieve four (4) objectives:
1) To safeguard assets of the firm.
2) To ensure the accuracy and reliability of
accounting records and information.
3) To promote efficiency in the firm’s
operations.
4) To measure compliance with management’s
prescribed policies and procedures.
Modifying Assumptions
1) Management responsibility – is the establishment and
maintenance of a system of internal control.
2) Reasonable assurance - the cost of achieving improved
control should not outweigh its benefits.
3) Methods of data processing - the control techniques used
to achieve the four objectives vary with different types of
technology.
4) Limitations:
- possibility of error-no system is perfect
- circumvention
- management override
Illustration 3-3: INTERNAL CONTROL SHIELD
Exposure - is the absence or weakness of a control
Types of risks
1) Destruction of assets (both physical assets and
information)
2) Theft of assets
3) Corruption of information or the information
system
4) Disruption of the information system
Illustration 3-4: THE PREVENTIVE, DETECTIVE, AND CORRECTIVE INTERNAL CONTROL MODEL
Preventive Controls
- are passive techniques designed to reduce the frequency
of occurrence of undesirable events.
Defective Controls
- are devices, techniques, and procedures designed to identify
and expose undesirable events that elude preventive
controls.
Corrective Controls
- are actions taken to reverse the effects of errors detected in
the previous step.
SAS78/COSO Internal Control Framework
1) Control environment - is the foundation for
the other four components. It sets the tone
for the organization and influences the
control awareness of its management and
employees.
2) Risk assessment - to identify, analyze, and
manage risks relevant to financial reporting.
3) Information and communication
Accounting information system - consists of
the records and methods used to initiate,
identify, analyze, classify, and record the
organization’s transactions and to account for
the related assets and liabilities.
4) Monitoring
- is the process by which the quality of internal
control design and operation can be assessed.
5) Control activities
- are the policies and procedures used to ensure that
appropriate actions are taken to deal with the
organization’s identified risks.
1) IT controls - relate specifically to the computer
environment.
a) General controls - pertain to entity-wide
concerns such as controls over the data center.
b) Application controls - ensure the integrity of
specific systems such as sales order processing,
accounts payable, and payroll applications.
5) Control activities
2) Physical control – relates primarily to the
human activities employed in accounting
system.
End of LESSON 3
End of MODULE 1