Artifact II - Computer Risk - Master of Accountancy Whitney Milford

advertisement
Running head: COMPUTER RISKS
1
The Risks of Using Computers in Accounting
Whitney Milford
MACC541 – Accounting Systems and Analysis
September 21, 2013
Professor Bill Sawatski
Southwestern College Professional Studies
COMPUTER RISKS
2
Abstract
The purpose of this paper is to discuss the risks of doing business on computers and what
can be done to prevent theft and fraud. Computers are becoming a necessity in businesses all
across the world. With the growth in computer use, the number of computer crimes is also
growing. Hackers are getting smarter in the ways that they can get into a company’s computer
system to download and steal information. They use this information to make false documents
and purchases. The company may not catch the attack until after several purchases have been
made and billions of dollars are stolen every year because of this. Not all computer crimes come
from an outside source; sometimes the crime is taking place right under the company’s nose. An
employee can set up false information in the accounting information system and send money to
false accounts that they can pick up later to deposit in their own accounts. This can be hard to
catch without levels of management set up or without the proper supervision. Authorized
transactions and separation of duties need to be in place in order to avoid being a victim of
computer fraud.
COMPUTER RISKS
3
The Risks of Using Computers in Accounting
Computers have become a major part of everyday life for almost all businesses in the
world. Over time, technology has grown to make work easier by making computers more and
more advanced in what they can accomplish. In order for these computers to accomplish the
work that they do, they have to have data input telling them the necessary information needed to
complete the job. For accounting information systems, this data is confidential and could be
detrimental to a company if it were to get in the wrong hands. It is important for companies to
have virus protection on their computers and strong passwords to try and avoid leaking any
private information. There are many ways that people break into a company’s computer system
by committing computer fraud and having poor ethical values. The best way to prevent fraud is
by “taking immediate and vigorous action if fraud is detected. [This] is not only necessary to
prevent future losses but also helps deter other frauds” (ACPO - Fraud Prevention). There are
some controls that can be put in to place to try to prevent computer fraud from occurring but
there is always the chance of fraud taking place.
Computer Crime and Fraud
Computer crime or computer fraud is committed when “someone manipulates a computer
or computer data, by whatever method, to dishonestly obtain money, property, or some other
advantage-or cause significant loss” (Simkin, Rose, & Norman, 2012, p. 343). Computers are
being broken into every day including laptops, home computers, and offices. By hacking into
computers, criminals can find all sorts of personal information that can be used to commit fraud.
They can find passwords to bank accounts and other important web sites. If purchases are made
COMPUTER RISKS
4
online using a credit card, they are able to find the card number and can use it whenever they
want. Because of these types of attacks “billions of dollars are lost every year” (FBI — Cyber
Crime). There are many ways that computer crimes can take place that range in severity.
Examples of Computer Crimes
The most common types of computer crimes or fraud that take place in the financial field
are fraudulent financial reporting and misappropriation of assets. One would think that most
computer crimes come from an outside source. Many times, though, the crime is being
committed from within the company itself. These two types of fraud are prime examples.
Fraudulent financial reporting takes place when someone in management or a higher-ranking
position falsely records data to misdirect investors, accountants, auditors, and other people
looking at the company’s books (Simkin et al, 344). By misrepresenting the company’s financial
information, investors might make decisions that they wouldn’t have otherwise and whoever
committed the fraud is probably making money off of the transactions.
Misappropriation of assets is similar to fraudulent financial reporting. Some examples of
misappropriation are “skimming, larceny, payroll tampering, and check tampering” (Simkin et
al, 344). All these things are usually committed by someone that works for the company. The
accounts payable clerk could set up a false vendor and have false invoices created for that
vendor. When it comes time to pay the bills, the check would be written and then sent to a fake
address where the employee would go to pick it up. The same could be done with creating a fake
employee and having the paycheck sent to the false address.
COMPUTER RISKS
5
Other types of computer crimes include phishing or hacking. Unlike fraudulent financial
reporting and misappropriation of assets, these types of crimes aren’t restricted to the financial
field and can take place on any computer at any time. When someone commits the crime of
phishing, an email or a pop-up link is sent to a computer and tricks the recipient into sending
money or buying something when there really isn’t anything to buy. When hacking into
someone’s computer, the hacker is breaking in and illegally obtaining private information that
could result in identity theft and fraudulent purchases (Cyber Crime | What is CyberCrime &
Types of Cyber Crime). These two types of computer crime are very common and are sometimes
hard to prevent.
Preventing Computer Crime and Fraud
With all the different types of computer crimes and ways of committing them it is hard to
find a system that will block everything; although, there are some precautions that can be put in
place to help deter computer fraud. One of the smaller controls that can be set up is to have a
secure network that is password protected (Cyber Crime | What is CyberCrime & Types of Cyber
Crime). This will slow down computer hackers and might send out a red flag if any suspicious
activity takes place. Another small way to prevent being a victim of a computer crime is to limit
the amount of personal information you give out publicly (FBI — Cyber Crime). The more
information that is readily available for a computer criminal, the easier it will be for them to
commit fraud. This is much harder to do if the fraud is being committed by someone within the
company and other controls will have to be set up.
COMPUTER RISKS
6
One of the best ways of preventing fraud that is taking place within a company is having
separation of duties. If an employee is taking care of multiple jobs within the company it makes
it much easier for them to cover up their crime. If the duties were separated out, someone would
be more likely to catch the fraud down the line before the final transaction takes place. The
writer of ACPO – Fraud Prevention outlines the objectives of individuals within a company that
will help in reducing fraud, these include:
“[A] clear definition of the responsibilities of individuals for
resources, activities, objectives and targets. This includes defining
levels of authority. This is a preventive measure which sets a limit
on the amounts which may be authorized by individual officers. To
be effective, checks need to be made to ensure that transactions
have been properly authorized;
Establishing clear reporting lines and the most effective spans of
command to allow adequate supervision;
Separation of duties to avoid opportunities for abuse. This is also
largely a preventive measure which ensures that the key functions
and controls over a process are not all carried out by the same
member of staff, e.g. ordering goods should be kept separate from
receipt of goods; similarly authorization and payment of invoices;
and
Avoiding undue reliance on any one individual”
If these measures are followed, the chance of fraud taking place would be greatly reduced. The
different levels of the company would be monitored and only authorized transactions would take
place. Creating a false vendor or a false employee, like in the example provided earlier, would
not occur because the information would have to be approved before it was entered into the
system.
COMPUTER RISKS
7
Conclusion
Computer crimes happen every day and are basically inevitable. These crimes can occur
at any time from an outside source or even from within the company. Hackers can get into the
system and download private information that they can use to make fraudulent purchases. Top
management or anyone who works with the financial books can “cook the books” to make them
look better or to hide fraudulent activity. This hurts investors and makes the company look like
they are doing better than they actually are. In the years to follow, the company will have to
continue to cook the books to stay ahead of where they were the year before. Employees are also
able to commit fraud against the company by setting up fake records and having money sent out
to those accounts. The best way to prevent these things from happening is to have different levels
of authority and to be constantly monitoring what is going in and out of the company. By doing
this, there is less chance that money is being pushed around behind the scenes.
COMPUTER RISKS
8
References
ACPO - Fraud Prevention. (n.d.). ACPO - Fraud Prevention. Retrieved September 18, 2013,
from http://www.fraud-stoppers.info/prevention/businesses.html.
Cyber Crime | What is CyberCrime & Types of Cyber Crime. (n.d.). Crime Stoppers | Prevent
and Stop Crime in Your Neighborhood. Retrieved September 18, 2013, from
http://www.c-s-i.org/cyber-crime/.
FBI — Cyber Crime. (n.d.). FBI — Homepage. Retrieved September 18, 2013, from
http://www.fbi.gov/about-us/investigate/cyber.
Simkin, Mark G., Rose, Jacob M., & Norman, Carolyn S. (2012). Core concepts of accounting
information systems (12th ed.). Hoboken, New Jersey: John Wiley & Sons, Inc.
Download