Pindi Yulinar Rosita - 008201905023 - Session 5
Pindi Yulinar Rosita - 008201905023 - Session 5
Pindi Yulinar Rosita - 008201905023 - Session 5
008201905023
Session 5
Chapter 5 : FRAUD
The four types of AIS threats a company faces are:
- Natural and political disasters.
Such as fires, floods and earthquakes can destroy an information system an cause many
companies to fail.
- Unintentional acts.
The greatest risk to information systems and causes the greatest dollar losses. Human errors
cause 80% of security problems. Unintentional acts are caused by human carelessness, failure to
follow established procedures and poorly trained or supervised personnel.
- Intentional acts.
An intentional act is a computer crime, a fraud of sabotage.
Sabotage: deliberate destruction or harm to a system.
Cookie: a text file created by a web site and stored on a visitor’s hard drive. Cookies store
information about who the user is and what the user has done on the site.
Fraud: any and all means a person uses to gain an unfair advantage over another person. Legally,
for an act to be fraudulent there must be :
White-collar criminals: typically, businesspeople who commit fraud. They usually resort to tricke
Corruption: dishonest conduct by those in power, which often involves actions that are
illegitimate, immoral or incompatible with ethical standards. ry or cunning and their crimes usually
involve a violation of trust or confidence.
Investment fraud: misrepresenting or leaving out facts in order to promote an investment that
promises fantastic profits with little or no risk.
Misappropriation of assets: theft of company assets by employees.
The most significant contributing factor in most misappropriations is the absence of internal
controls and/or the failure to enforce existing internal controls.
Fraudulent financial reporting: intentional or reckless conduct, whether by act of omission, that
results in materially misleading financial statements.
The fraud triangle
1. Pressure : a person’s incentive or motivation for committing fraud.
2. Oppurtunities : the condition or situation that allows a person or organization to commit
and conceal a dishonest act and covert it to personal gain.
3. Rationalization: the excuse that fraud perpetrators use to justify their illegal behavior.
Computer fraud: any type of fraud that requires computer technology to perpetrate. Computer
fraud can be categorized using data processing model.
Input fraud: the simplest and most common way to commit a computer fraud is to alter or falsify
computer input. Perpetrators need only understand how the system operated so they can cover their
tracks.
Processor fraud: unauthorized system use, including the theft of computer time and service.
Computer instructions fraud: tampering with company software, copying software illegally,
using software in an unauthorized manner, and developing software to carry out an unauthorized
activity.
Data fraud: illegally using, copying, searching or harming company data constitutes data fraud.
Output fraud: unless properly safeguarded, displayed or printed output can be stolen, copied or
misused.
Hiring and Firing Practices: Effective hiring and firing practices include:
o Screen potential employees using a thorough background checks and written
tests that evaluate integrity.
o Remove fired employees from all sensitive jobs and deny them access to the
computer system to avoid sabotage.
How will prosecuting the case impact the future success of the business?
What effect will adverse publicity have upon the company's well being? Can the
publicity increase the incidence of fraud by exposing company weaknesses?
If charges are not made, what message does that send to other employees?
Will not exposing the crime subject the company to civil liabilities?
5.3 Discuss the following statement by Roswell Steffen, a convicted embezzler: “For every
foolproof system, there is a method for beating it.” Do you believe a completely
secure computer system is possible? Explain. If internal controls are less than 100%
effective, why should they be employed at all?
Answer
The old saying "where there is a will, there is a way" applies to committing fraud and to
breaking into a computer system. It is possible to institute sufficient controls in a system
so that it is very difficult to perpetrate the fraud or break into the computer system, but
most experts would agree that it just isn't possible to design a system that is 100% secure
from every threat. There is bound to be someone who will think of a way of breaking into
the system that designers did not anticipate and did not control against.
If there were a way to make a foolproof system, it would be highly likely that it would
be too cost prohibitive to employ.
Though internal controls can't eliminate all system threats, controls can:
Like many fraud perpetrators, David Miller was not much different than the
general public in terms of education, values, religion, marriage, and
psychological makeup.
Most fraud perpetrators spend all that they steal. Few invest it. Miller was
no exception.
i. How does he differ?
Miller was not disgruntled and unhappy, nor was he seeking to get even
with his employer.
The wealth and extravagant spending in relation to Miller's salary was the primary red flag
that most companies never questioned. Consider that on his $130,000 a year salary he was
able to afford two Mercedes-Benz sedans; a lavish suburban house; a condominium at
Myrtle beach; expensive suits; tailored and monogrammed shirts; diamond, sapphire, ruby,
and emerald rings for his wife; and a new car for his father- in-law.
5. Why do companies hesitate to prosecute white-collar criminals?
Lack of expertise. Many law enforcement officers, lawyers, and judges lack
the skills necessary to investigate, prosecute and evaluate fraud, especially
computer fraud.
Failure to report and prosecute a fraud also means that the perpetrator
goes free and can repeat his or her actions at another company, as
David Miller did. If the perpetrator does not have to pay the
consequences of his actions, she is more likely to repeat them because
she "got away with it" and was not punished.
How could law enforcement officials encourage more prosecution?
To encourage more fraud prosecution, law enforcement officials
must take actions to solve each of the problems mentioned above. In
addition, they must encourage more effective reporting of such
crimes. The public should be educated to recognize and report fraud
as a serious offense.
6. What could the victimized companies have done to prevent Miller’s embezzlement?
Not much is said in the case about how Miller committed many of the frauds. In each of
the frauds, it is likely that the theft of cash could have been prevented by tighter controls
over access to cash and blank checks and to the means of writing and signing checks.
Some could have been prevented or at least detected by better control over monthly
bank statements and their reconciliation.
In retrospect, Miller was given too much trust and authority and that led to a breakdown
of internal controls. However, companies have to trust their top level employees, such as
the CFO. Even though this trust is necessary, a greater separation of duties and more
supervision of Miller's work would have made it more difficult for him to perpetrate the
frauds.