1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What are the 5 Fraud Criteria?
A false statement, representation, or disclosure is made
The fact is a material fact and induces a person to act
The fact was made with the INTENT TO DECEIVE(most difficult to prove)
A justifiable reliance on the fraudulent fact in which a person takes action
An injury or loss suffered by the victim
Explain the Fraud Triangle.
Opportunity: the employee has the ability to commit or conceal fraud
Pressure: The employee is incentivized to alleviate personal or employment pressures
Employee Pressures → Financial, lifestyle, emotional
Financial Statement Pressures → Financial, Industry conditions, Management Characteristics
Rationalization: Employee feels as if the decision to commit fraud is ok or convince themselves its not actually fraud → attitude, justification, lack of personal integrity
What are the two forms of fraud?
misappropriation of assets
Fraudulent financial reporting
Define misappropriation of assets.
theft of a companies assets
usually due to an absence of internal control systems, or failure to enforce the internal control system
Define fraudulent financial reporting.
intentional or reckless conduct, resulting in materially misleading financial statements
Define the two examples of cash theft concealment.
Lapping - concealing the theft of cash through delays in posting collections to accounts receivable - applying payments received to different customer balances
Kiting - Creating cash using the lag time between when a check is deposited and the time it clears the bank
What are and are not the responsibility of auditors to detect and report fraud?
Auditors should perform audit procedures to identify potential fraud and report it to company management, but they do not have to detect all material fraud or report it to the SEC.
What are the 4 types of computer fraud?
Input fraud
Processor fraud
computer instructions fraud
output/data fraud
Define Input Fraud.
Alteration or falsifying input of data in the AIS, where you are authorized to access/input the data AS PART OF YOUR RESPONSIBILITIES.
Define Processor Fraud.
UNAUTHORIZED SYSTEM USE like using work computers for non-work activities, or using access you accidentally are granted.
Define Computer Instructions fraud.
Modyfying software to do unintended things
Define Output Fraud.
Stealing, copying, or misusing AIS reports or displayed information