Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
22 views54 pages

Lecture 2 Accounting System and Fraud Detection

The document outlines the importance of accounting systems, internal controls, and fraud prevention techniques. It emphasizes the need for organizations to create a culture of honesty, implement preventive measures, and utilize fraud detection and investigation methods. Additionally, it discusses the legal actions that can be taken following fraud incidents and the characteristics of an effective fraud report.

Uploaded by

kelvinizimbura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views54 pages

Lecture 2 Accounting System and Fraud Detection

The document outlines the importance of accounting systems, internal controls, and fraud prevention techniques. It emphasizes the need for organizations to create a culture of honesty, implement preventive measures, and utilize fraud detection and investigation methods. Additionally, it discusses the legal actions that can be taken following fraud incidents and the characteristics of an effective fraud report.

Uploaded by

kelvinizimbura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 54

Prevention

Lecture 3
Presented by Mr. Zuberi O.
Outline
• Accounting Systems & Internal Controls
◦ Introduction
◦ ITGCs
◦ Application controls
◦ COSO Controls
• Preventing Fraud
• Potential red flags and Fraud detection
techniques
• Fraud Auditing/Investigations
• Fraud Report
Activity....

Accounting System could be:


◦ Manual
◦ Computerized

Impacts of computerized processing


system impacts the audit examination.
Issues Introduced in a
Computerized Environment
1. Input errors
2. Systematic vs. random processing
errors
3. Lack of an audit trail
4. Inappropriate access to computer files
and programs
5. Reduced human involvement in
processing transactions

Mod H-4
Impact of Computerized Processing on the
Evaluation of Internal Control

Phase Effect(s)
Effect(s)
Understanding Understand and document controls
related to computerized processing of
transactions
Assessment Consider controls related to
computerized processing of transactions
in preliminary assessment of control risk

Testing Identify , test, and evaluate degree of


compliance of controls related to
computerized processing of transactions

Mod H-5
Types of Computer Controls
General Controls
Relate to all applications of a computerized
processing system (pervasive)
Deficiencies will affect processing of various types
of transactions
Automated Application Controls
Relate to specific business activities
Directly address management
assertions

Mod H-6
Categories of General Controls
1. Hardware controls
2. Program development controls
3. Program change controls
4. Computer operations controls
5. Access to programs and data controls

Mod H-7
Hardware Controls

Provide reasonable assurance that data are not


altered or modified as transmitted through
system
“Built into” equipment by computer
manufacturer
Examples
◦ Parity check
◦ Preventative maintenance on equipment

Mod H-8
Program Development Controls
• Acquisition and development of new
programs is properly authorized and
conducted with organization policies
• Appropriate users participate in process
• Programs and software are tested and
validated prior to use
• Programs and software have appropriate
documentation

Mod H-9
Mod H-10
Program Change Controls
• Modifications to existing programs are
properly authorized and conducted with
entity policies
• Appropriate users participate in process
• Programs are tested and validated prior to
use
• Programs have appropriate
documentation
• Additional controls related to “emergency”
change requests and migrating new
programs into operations

Mod H-11
Computer Operations Controls
• Relate to processing of transactions and
backup and recovery of data
• Processing environments
0
Batch processing: Similar transactions
collected and processed simultaneously
◦ Real-time processing: Transactions
processed as they occur without delay

Mod H-12
Examples of Computer Operations
Controls
• Methods of resolving processing failures
• Separation of duties
◦ Systems analysts
◦ Programmers
◦ Computer operators
• Files and data
◦ Labels to ensure use of appropriate file
◦ Storage in remote, protected locations (disaster
recovery)
◦ Grandfather-father-son

Mod H-13
Access to Programs and Data
Controls
• Relate to restricting use of programs and
data to authorized users
• Examples
0
Passwords
◦ Automatic terminal logoff
◦ Review access rights and compare to usage
(through logs)
◦ Report and communicate security breaches

Mod H-14
General Controls and Assertions

Assertion Explanation Examples


Accuracy Ensure accuracy of data • Hardware controls
and testing computer • Program development
programs prior to controls
implementation • Program change
controls
• Computer operations
controls
Occurrence Restricting • Computer operations
inappropriate access controls
reduces probability of • Access to programs and
fictitious transactions data controls

Mod H-15
Application Controls:
1. Input Controls
• Provide reasonable assurance that
input is properly authorized and
accurately entered for processing
◦ All transactions input
◦ Transactions input once and only once
◦ Transactions input accurately

Mod H-16
Examples of Input Controls

• Valid character
Data entry and tests
formatting
• Valid sign tests
Authorization and • Missing data tests
approval controls • Sequence tests
Check digits • Limits and
reasonableness
Record counts tests
Batch totals • Error correction
and resubmission
Hash totals

Mod H-17
Summary of Input Controls
All Transactions
transactions entered only
Input
entered once
accurate
Data entry and formatting X

C heck digits X

R ecord counts X X

B atch totals X X X

Hash totals X X X

Valid character test X

Valid sign tests X

Missing data tests X

Mod H-18
Summary of Input Controls
(Continued)

All Transactions
transactions entered only
Input
entered once
accurate
Sequence tests X
X
Limit and reasonableness
t ests
Error correction and X
r esubmission

Mod H-19
Processing Controls
• Provide reasonable assurance that
◦ Transactions are processed accurately
◦ All transactions are processed
◦ Transactions are processed once and only once
• Examples
◦ Test processing accuracy of programs
◦ File and operator controls
◦ Run-to-run totals
◦ Control total reports
◦ Limit and reasonableness tests
◦ Error correction and resubmission

Mod H-20
Output Controls
• Provide reasonable assurance that
◦ Output reflects accurate processing
0
Only authorized persons receive output or
have access to files generated from processing
• Examples
◦ Review of output for reasonableness
◦ Control total reports
◦ Master file changes
◦ Output distribution limited to appropriate
person(s)

Mod H-21
Computer Abuse/Fraud
• Use of computer technology by
perpetrator to achieve gains at the
expense of a victim
• Controls
◦ Preventative: Stop fraud from entering system
◦ Detective: Identify fraud when it enters
system
◦ Damage-limiting: Reduce monetary impacts of
fraud and control to specified levels

Mod H-22
Section II

FIGHTING FRAUD
Learning Objectives
• Become familiar with the different ways that
organizations can fight fraud.
• Understand the importance of fraud prevention.
• Understand how to create a culture of honesty and high
ethics.
• Understand why hiring the right kind of employees can
greatly reduce the risk of fraud.
• Understand how to assess and mitigate the risk of
fraud.
• Know different ways to investigate fraud
• Be familiar with legal actions to take once fraud is
discovered
Learning Objectives
• Understand the importance of early fraud
detection.

• Understand different approaches to fraud


investigation.
• Be familiar with the different options for
legal action that can be taken once fraud
has occurred.
How Organizations
Fight Fraud
Organizations fight fraud by
implementing:

1. Fraud prevention Remember this ...

2. Early fraud detection There are four fraud-fighting activities that organi¬
zations can use: (1) fraud prevention, (2) proactive
3. Fraud investigation fraud detection methods, (3) fraud investigation
once fraud is suspected, and (4) legal follow-up
4. Follow-up legal action of fraud perpetrators. Many organizations focus
and/or resolution on the last two, which are the most costly and
least effective. An overview of these four fraud¬
fighting activities is given in this chapter.
Fraud Prevention

• Fraud prevention is the most cost-


effective way to reduce fraud

• Involves two fundamental activities:

0
Sustain a culture of honesty and high
ethics
◦ Assess the risks for fraud, develop concrete
responses to mitigate the risks, and
eliminate the opportunities for fraud
Fraud Prevention

Sustain a Culture of Honesty & High


Ethics
Five critical elements:
1. Have top management model appropriate
behavior
2. Hire the right kind of employees
3. Communicate expectations and require
periodic written acceptance to the
expectations
4. Create a positive work environment
5. Enforce policies for handling fraud
Fraud Prevention

• Tone at the Top (Proper Modeling)


• Research on Why People Lie
◦ Have fear of punishment or adverse
consequences
◦ Have a habit of lying
◦ Seen others lie or have had negative modeling
◦ Feel if they tell the truth they won’t get what
they want
Fraud Prevention

Employees

Proactive hiring procedures


include:

Background investigations
References
Tests for honesty
Fraud Prevention

• Communicating Expectations

I . Identify and codify appropriate values


and ethics

2. Training employees in fraud awareness

3. Communicating consistent expectations


about punishment of violators
Fraud Prevention

Environment

• Fraud occurs less frequently


when employees have
◦ Positive feelings about an
organization
◦ A sense of ownership in the
organization
Fraud Prevention

• Proper Handling of Fraud and Fraud


Perpetrators

• Ensure that

◦ Facts are investigated thoroughly


◦ Firm and consistent actions are taken against
perpetrators
◦ Risks and controls are assessed and improved
◦ Communication and training are ongoing
Fraud Prevention

Eliminate Fraud Opportunities

Organizations should:
1. Identify and measure fraud risks
2. Implement preventative and detective
controls
3. Create widespread monitoring by
employees
4. Have internal and external auditors
Early Fraud Detection

• Three Primary Ways to


Detect Fraud
Remember this ...
1. By chance
Fraud detection involves activities to determine
whether or not it is likely that fraud is occurring.
2. By providing “whistle¬
Fraud detection allows companies to identify
blowing” systems suspicions or predications of fraud. Historically,
most frauds were caught by chance. In recent
3. By data mining years, two major proactive fraud detection devel¬
opments have occurred: (1) installing hotlines or
whistle-blower systems and encouraging employ¬
ees and others to report any suspicious activity
they see and (2) mining various databases look¬
ing for unusual trends, numbers, relationships,
or other anomalies that could indicate fraud.
Early Fraud Detection
• Whistle-blowing Systems
0
A reporting hotline or online system that
allows others to call in or submit an
anonymous tip of a fraud suspicion

• Examples:
◦ Internal systems/hotlines
◦ The Association of Certified Fraud Examiners
◦ Allegience
Early Fraud Detection
• Mining Company Databases
◦ Mining databases for suspicious
trends, numbers, and other
anomalies.
Fraud Investigation
• Fraud investigation should occur only if a
predication of fraud exists.

• Predication refers to the circumstances,


taken as a whole, that would lead a
reasonable, prudent professional to
believe a fraud has occurred, is occurring,
or will incur.
Fraud Investigation
Considerations before
investigating fraud:

◦ Need management’s
approval

◦ Pursued only when


predication exists

◦ Investigators rely heavily on


interviews
Fraud Investigation
• Testimonial Evidence
◦ Evidence gathered from individuals

• Techniques:

◦ Interviewing

◦ Interrogation

◦ Honesty tests
Fraud Investigation
• Documentary Evidence
• Gathered from paper, computers, and other written or
printed sources
• Techniques:
◦ Document examination
◦ Data mining
◦ Public records searches
◦ Audits
◦ Computer searches
◦ Net worth calculations
◦ Financial statement analysis
◦ Corporate databases
◦ E-mail servers
Fraud Investigation
• Physical Evidence
◦ Fingerprints
◦ Tire marks
◦ Weapons
◦ Stolen property
◦ Identification numbers
◦ Marks on stolen objects
◦ Other tangible evidence
• Techniques:
◦ Forensic analysis by
experts
Fraud Investigation
Personal Observation

◦ Evidence that is sensed (seen, heard, felt, etc.)


by the investigators

Techniques:
◦ Invigilation
◦ Surveillance

Covert operations
Fraud Investigation
• The Fraud Element Triangle: Theft Act
• Catch perpetrators in the embezzlement act
or to gather information about the actual
theft acts

• The Fraud Element Triangle: Concealment


• Focus on records, documents, computer
programs and servers, and other places
where perpetrators conceal or hide their
dishonest acts
Fraud Investigation

conversion

perpetrators spent or used


their stolen assets.
Conducting a Fraud Investigation

1. Undertaken only to “establish the truth”


2. Experienced and objective investigators
3. Confidentiality
4. Need to know
5. Evidence independently corroborated
6. No questionable investigative techniques
7. Fair and objective communication
Follow-Up Legal Action
• Organizations face the options to...

◦ take no legal action


◦ pursue civil remedies, and/or
◦ pursue criminal action against the
perpetrators
Follow-Up Legal Action
• No Legal Action

• What are consequences of taking no legal


action?
Follow-Up Legal Action
• Civil Action
◦ To recover money or other assets taken

• Quite rare with employee fraud - most of


the money is spent
• More common when other organizations
are involved

May sue the auditors or others with


“deep pockets”
Follow-Up Legal Action
• Criminal Action

0
Only be brought by law enforcement agencies
◦ Usually involve fines, prison terms, or both

More difficult to get a criminal conviction


than a judgment in a civil case
Fraud Report
• Once the investigation is completed, a fraud
report is prepared.
• This report includes all findings, conclusions,
recommendations, and corrective actions
taken.
• The report indicates all pertinent facts
uncovered relative to the who, what, where,
when, how, and why of the fraud. It also
includes recommendations for control
improvements that will minimize exposure
to similar occurrences in the future.
Characteristics of a good Fraud
report
◦ Objective
◦ Factual
◦ Unbiased
◦ Free from distortion
◦ general tone of the fraud report is neither
accusatory nor conclusive as to guilt.
◦ It should not contain recommendations for
disciplinary or legal action against anyone
suspected
DIY

• Appendix 10B of chapter 10 details


about the fraud report
ANY QUESTIONS

THANKS

You might also like