Ethics, fraud, and internal control
24 important questions on Ethics, fraud, and internal control
What is ethical responsibility?
Which principles give guidance to ethical responsibility?
Justice: The benefits of the decision should be distributed fairly to those who share the risk. Those who do not benefit should not carry the burden of risk.
Minimize risk: Even if judged by the principles, the decision should be implemented so as to minimize all of the risks and avoid any unnecessary risks.
What is computer ethics?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What is pop, para and theoretical computer ethics?
Para computer ethics involves taking a real interest in computer ethics and acquiring some level of skill and knowledge in the field. Students should achieve this level of understanding.
The third level, theoretical computer ethics, is of interest to multi-disciplinary researchers who apply the theories of philosophy, sociology, and psychology to computer science with the goal of bringing some new understanding to the field.
What is section 406 of SOX?
How can a public company disclose its code of ethics and which issues should it address?
Conflicts of interest.
Full and fair disclosures.
Legal compliance.
Internal reporting of code violations.
Accountability.
Why is it difficult to quantify the actual costs of fraud?
2) of that detected, not all is reported,
3) in many fraud cases, incomplete information is gathered,
4) information is not properly distributed to management or law enforcement authorities, and
5) too often business organizations decide to take no civil or criminal action against the perpetrator(s) of fraud.
What are fraud statements?
1) Lack of auditor independence.
2) Lack of director independence.
3) Questionable executive compensation schemes.
4) Inappropriate accounting practices.
How does SOX address the problems of fraud?
1) the creation of an accounting oversight board
2) auditor independence
3) corporate governance and responsibility
4) disclosure requirements
5) penalties for fraud and other violations.
What is transaction fraud?
What are computer fraud schemes?
The theft, misuse, or misappropriation of assets by altering computer-readable records and files.
The theft, misuse, or misappropriation of assets by altering the logic of computer software.
The theft or illegal use of computer-readable information.
The theft, corruption, illegal copying, or intentional destruction of computer
software.
The theft, misuse or misappropriation of computer hardware.
Which four stages are there in the computer model?
Which three examples of transaction frauds from remote locations are there?
What is program fraud?
- creating illegal programs that can access data files to alter, delete or insert values into accounting records
- destroying or corrupting a program’s logic using a computer virus
What is operations fraud?
involve using the computer to conduct personal business.
What is database management fraud?
What characteristics has useful information?
Relevance: the contents of a report or document must serve a purpose.
Timelines: the age of information is critical factor in determining its usefulness.
Accuracy: information must be free from material errors.
Completeness: no piece of information essential to a decision or task should be
missing.
Summarization: information should be aggregated in accordance with a user’s needs.
What is exposure and what could the firm be exposed to?
Destruction of assets (both physical assets and information).
Theft of assets.
Corruption of information or the information system.
Disruption of the information system.
What are preventive controls?
What are detective controls?
What are corrective controls?
What is stated in SAS no. 78?
What is SOX section 302?
What are the control activities?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding