CHAPTER Control 3: Ethics, Fraud, and Internal Key Terms Access controls: Controls that ensure that only authorized personnel have access to the firm’s assets. Accounting records: Document, ledger used in transaction cycles. journal, Computer ethics - Analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. Includes details about software as well as hardware and concerns about networks connecting computers as well as computers themselves. or Application controls: Application controls ensure the integrity of specific systems such as sales order processing, accounts payable, and payroll applications. Audit trail controls: Ensures that every transaction can be traced through each stage of processing from its economic source to its presentation in financial statements. Batch controls: Effective method of managing high volumes of transaction data through a system. Billing schemes: Schemes under which an employee causes the employer to issue a payment to a false supplier or vendor by submitting invoices for fictitious goods/services, inflated invoices, or invoices for personal purchases. Bribery: Giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties. Business ethics: Pertains to the principles of conduct that individuals use in making choices and guiding their behavior in situations that involve the concepts of right and wrong. Cash larceny: Theft of cash receipts from an organization after those receipts have been recorded in the organization’s books and records. Check digit: Method for detecting data coding errors in which a control digit is added to the code when it is originally designed to allow the integrity of the code to be established during subsequent processing. Check tampering: Forging, or changing in some material way, a check that was written to a legitimate payee. Committee of Sponsoring Organizations of the Treadway Commission: The Committee of Sponsoring Organizations of the Treadway Commission is a joint initiative to combat corporate fraud. COSO has established a common internal control model against which companies and organizations may assess their control Computer fraud Theft, misuse, or misappropriation of assets by altering computerreadable records and files, or by altering the logic of computer software; the illegal use of computer readable information; or the intentional destruction of computer software or hardware Conflict of interest - Outline of procedures for dealing with actual or apparent conflicts of interest between personal and professional relationships. Control activities - Policies and procedures to ensure that appropriate actions are taken to deal with the organization’s risks. Control environment - The foundation of internal control Control weaknesses - is a deficiency, or a combination of deficiencies, in internal control over financial reporting, such that there is a reasonable possibility that a material misstatement of the company's annual or interim financial statements will not be prevented or detected on a timely basis. Corrective controls - Actions taken to reverse the effects of errors detected Corruption - involves an executive, manager, or employee of the organization in collusion with an outsider. The ACFE study identifies four principal types of corruption: bribery, illegal gratuities, conflicts of interest, and economic extortion. Corruption accounts for about 10 percent of occupational fraud cases. Detective controls - Devices, techniques, and procedures designed to identify and expose undesirable events that elude preventive controls. Economic extortion - Use (or threat) of force (including economic sanctions) by an individual or organization to obtain something of value. The item of value could be a financial or economic asset, information, or cooperation to obtain a favorable decision on some matter under review. Employee fraud - Performance fraud by nonmanagement employee generally designed to directly convert cash or other assets to the employee’s personal benefit Ethical Responsibility - Responsibility of organization managers to seek a balance between the risks and benefits to their constituents that result from their decision. Ethics Principles of conduct that individuals use in making choices that guide their behavior in situations involving the concepts of right and wrong. Expense Reimbursement Frauds Claiming reimbursement of fictitious or inflated business expenses. Exposure Absence or weakness of a control. Fraud False representation of a material fact made by one party to another party, with the intent to deceive and induce the other party to justifiably rely on the material fact to his or her detriment. Fraud Triangle Triad of factors associated with management and employee fraud: situational pressure (includes personal or job-related stresses that could coerce an individual to act dishonestly); opportunity (involves direct access to assets and/or access to information that controls assets); and ethics (pertains to one's character and degree of moral opposition to acts of dishonesty). Fraudulent Statements Statements related to a material fact and known to be untrue or made with reckless indifference as to its truth or falsity. General Controls Controls that pertain to entitywide concerns such as controls over the data center, organization databases, systems development, and program maintenance. Grandfather-Father-Son A backup technique employed by systems that use sequential master files (whether tape or disk). It is an integral part of the master file update process. Hash Total Control technique that uses nonfinancial data to keep track of the records in a batch. Illegal Gratuity Giving, receiving, offering, or soliciting something of value because of an official act that has been taken. Input Controls Programmed procedures, often called edits, that perform tests on transaction data to ensure that they are free from errors. Internal Control System Policies a firm employs to safeguard the firm’s assets, ensure accurate and reliable accounting records and information, promote efficiency, and measure compliance with established policies. Lapping – Use of customer checks, received in payment of their accounts, to conceal cash previously stolen by an employee. Mail Room Fraud – Fraud committed when an employee opening the mail steals a customer’s check and destroys the associated remittance advice. Management Fraud – Performance fraud that often uses deceptive practices to inflate earnings or to forestall the recognition of either insolvency or a decline in earnings. Monitoring – Process by which the quality of internal control design and operation can be assessed. Non-cash Fraud – Schemes involve the theft or misuse of the victim organization’s non-cash assets (e.g., inventory, confidential information). Output Controls – are a combination of programmed routines and other procedures to ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Ownership – State or fact of exclusive rights and control over property, which may be an object, land/real estate, intellectual property, or some other kind of property. Pass-through Fraud – Similar to shell company except that a transaction actually takes place. The perpetrator creates a false vendor and issues purchase orders to it for inventory or supplies. The false vendor purchases the needed inventory from a legitimate vendor, charges the victim company a much higher than market price for the items, and pockets the difference. Pay-and-Return – Scheme under which a clerk with check writing authority pays a vendor twice for the same products (inventory or supplies) received, then intercepts and cashes the overpayment returned by the vendor. Payroll Fraud paychecks to employees. – Distribution of fraudulent existent and/or nonexistent Preventive controls - Passive techniques designed to reduce the frequency of occurrence of undesirable events. Privacy - Full control of what and how much information about an individual is available to others and to whom it is available. Processing controls - is an engineering mechanism that uses continuous monitoring of an industrial process' operational variables (e.g., temperature, pressure, chemical content) and algorithms and then uses that information to adjust variables to reach product output specifications and objectives. Public Company Accounting Oversight Board (PCAOB) - Federal organization empowered to set auditing, quality control, and ethics standards; to inspect registered accounting firms; to conduct investigations; and to take disciplinary actions. Reasonable assurance - Assurance provided by the internal control system that the four broad objectives of internal control are met in a costeffective manner. Risk assessment - Identification, analysis, and management of risks relevant to financial reporting. Run-to-run controls - : Controls that use batch figures to monitor the batch as it moves from one programmed procedure to another. Sarbanes-Oxley Act (SOX) - Most significant federal securities law, with provisions designed to deal with specific problems relating to capital markets, corporate governance, and the auditing profession. Security - Attempt to avoid such undesirable events as a loss of confidentiality or data integrity. Segregation of duties - Separation of employee duties to minimize incompatible functions. Shell company - Establishment of a false vendor on the company’s books, then manufacturing false purchase orders, receiving reports, and invoices in the name of the vendor and submitting them to the accounting system, creating the illusion of a legitimate transaction. The system ultimately issues a check to the false vendor. Skimming - stealing cash from an organization before it is recorded on the organization’s books and records. Spooling - direction of an application’s output to a magnetic disk file rather than to the printer directly Statement on Auditing Standards (SAS) No. 109 - the current authoritative document for specifying internal control objectives and techniques. Statement on Auditing Standards (SAS) No. 99, Consideration of Fraud in a Financial Statement Audit - authoritative document that defines fraud as an intentional act that results in a material misstatement in financial statements. Supervision - control activity involving the critical oversight of employees. Thefts of cash - direct theft of cash on hand in the organization. Transaction authorization - a procedure to ensure that employees process only valid transactions within the scope of their authority. Transcription errors - type of errors that can corrupt a data code and cause processing errors. Transposition errors - an error that occurs when digits are transposed. Vendor fraud - schemes under which an employee causes the employer to issue a payment to a false supplier or vendor by submitting invoices for fictitious goods/services, inflated invoices, or invoices for personal purchases Verification procedures - independent checks of the accounting system to identify errors and misrepresentations. REVIEW QUESTIONS 1.What is ethics? Ethics pertains to the principles of conduct that individuals use in making choices and guiding their behavior in situations that involve the concepts of right and wrong. 2.What is business ethics? Business ethics involves finding the answers to two questions: (1) How do managers decide what is right in conducting their business? and (2) once managers have recognized what is right, how do they achieve it? 3.What are the four areas of ethical business issues? Ethical issues in business can be divided into four areas: equity, rights, honesty and the exercise of corporate power. 4.What are the main issues to be addressed in a business code of ethics required by the Securities and Exchange Commission? The main issues to be addressed in business code ethics are conflict of interset, accountability, full and fair disclosure, legal compliance, and reporting of code violation. Proportionality, justice, minimize risk. 5.What are the three ethical principles that may provide some guidance for ethical responsibility? Proportionality, justice and minimize risk 6.What is computer ethics? Computer ethics is ‘‘the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. This concerns about software as well as hardware and concerns about networks connecting computers as well as the computers themselves.’’ 7.How do the three levels of computer ethics - pop, para, and theoretical - differ? Pop computer ethics is simply the exposure to stories and reports found in the popular media regarding the good or bad ramifications of computer technology. Para computer ethics involves taking a real interest in computer ethics cases and acquiring some level of skill and knowledge in the field. Theoretical computer ethics is of interest to multidisciplinary researchers who apply the theories of philosophy, sociology and psychology to computer science with the goal of bringing some new understanding to the field. 8.Are computer ethical issues new problems or just a new twist on an old problem? Some argue that all pertinent ethical issues have already been examined in some other domain. For example, the issue of property rights has been explored and has resulted in copyright, trade secret, and patent laws. Although computer programs are a new type of asset, many believe that these programs should be considered no differently from other forms of property. 9.What are the computer ethical issues regarding privacy? People desire to be in full control of what and how much information about themselves is available to others, and to whom it is available. This is the issue of privacy. The creation and maintenance of huge, shared databases make it necessary to protect people from the potential misuse of data. This raises the issue of ownership in the personal information industry. 10. What are the computer ethical issues regarding security? The ethical issues involving security arise from the emergence of shared, computerized databases that have the potential to cause irreparable harm to individuals by disseminating inaccurate information to authorized users, such as through incorrect credit reporting. The ethical issues regarding computer security center on unauthorized access to systems and databases. Individuals can be harmed by the dissemination of inaccurate information to authorized users, and/or accurate information to unauthorized users. Security can be used to protect systems and personal information, but it can also restrict legitimate access. 11. What are the computer ethical issues regarding ownership of property? Copyright laws have been invoked in an attempt to protect those who develop software from having it copied. However, many believe the copyright laws can cause more harm than good. Part of the problem lies in the uniqueness of software, its ease of dissemination, and possibility of exact replication. 12. What are the computer ethical issues regarding equity in access? Several factors, some of which are not unique to information systems, can limit access to computing technology. Economic status of the individual or the affluence of an organization. Culture also limits access, for example, when documentation is prepared in only one language or is poorly translated. Safety features, or the lack thereof. 13. What are the computer ethical issues regarding the environment? Production of printed documents using papers. However, paper comes from trees, which is considered as a precious natural resource, and ends up in landfills if not properly recycled. 14. What are the computer ethical issues regarding artificial intelligence? As decision makers or replacement for experts, some people rely on expert systems significantly. Both knowledge and domain experts must be concerned about their responsibility for faulty decisions, incomplete or inaccurate knowledge bases, and the role given to computers in the decision-making process. And because expert systems attempt to clone a manager's decision style, an individual's prejudices may implicitly or explicitly be included in the knowledge base. 15. What are the computer ethical issues regarding unemployment and displacement? In a new age of technology world, people are thoroughly dependent upon the computers for work done. In any field computer importance has increased day by day. Today, society adapts computers whole heartedly. Computers made a great change in today’s ways of living. In an organization, management may favor the use of technology for improving their product output, which may be the cause of elimination of jobs and employees. 16. What are the computer ethical issues regarding misuse of computers? Engaging in illegal activities through computers, doing crime, copying genuine software, using company’s computer for personal benefit by the employee, spying on others to check their personal’s data are few examples of misusing computers. 17. What is the objective of Statement on Auditing Standards No. 99? Objective of SAS 99 is to seamlessly blend the auditor's consideration of fraud into all phases of the audit process. It also requires the auditor to perform new steps such as a brainstorming during audit planning to assess the potential risk of material misstatement of the financial statements from fraud schemes. 18. What are the five conditions that constitute fraud under common law? A. False representation. There must be a false statement or a nondisclosure. B. Material Fact. A fact must be a substantial factor in inducing someone to act. C. Intent. Intent to deceive or the knowledge that one's statement is false. D. Justifiable reliance. Misrepresentation must have been a substantial factor on which the injured party relied. E. Injury or loss. Deception must have caused injury or loss to the victim of fraud. 19. Name the three fraud-motivating forces. The three fraud-motivating forces are: (1) Situational Pressure, (2) Opportunity, and (3) Ethics. 20. What is employee fraud? Employee fraud, or fraud by non management employees, is generally designed to directly convert cash or other assets to the employee’s personal benefit. Typically, the employee circumvents the company’s internal control system for personal gain. If a company has an effective system of internal control, defalcations or embezzlements can usually be prevented or detected. 21. What is management fraud? Management fraud is more insidious than employee fraud because it often escapes detection until the organization has suffered irreparable damage or loss. Management fraud usually does not involve the direct theft of assets. Top management may engage in fraudulent activities to drive up the market price of the company’s stock. This may be done to meet investor expectations or to take advantage of stock options that have been loaded into the manager’s compensation package. The Commission on Auditors’ Responsibilities calls this performance fraud, which often involves deceptive practices to inflate earnings or to forestall the recognition of either insolvency or a decline in earnings. Lower-level management fraud typically involves materially misstating financial data and internal reports to gain additional compensation, to garner a promotion, or to escape the penalty for poor performance. 22. What three forces constitute the triangle of fraud? The fraud triangle consists of three factors that contribute to or are associated with management and employee fraud. These are (1) situational pressure, which includes personal or job-related stresses that could coerce an individual to act dishonestly; (2) opportunity, which involves direct access to assets and/or access to information that controls assets, and; (3) ethics, which pertains to one’s character and degree of moral opposition to acts of dishonesty 23. How can external auditors attempt to uncover motivations for committing fraud? External auditors can use a checklist of red-flag items that may help to uncover motivations for committing fraud. It consists of the following types of questions: 1. Do key executives have unusually high personal debt? 2. Do key executives appear to be living beyond their means? 3. Do key executives engage in habitual gambling? 4. Do key executives appear to abuse alcohol or drugs? 5. Do any of the key executives appear to lack personal codes of ethics? 6. Are economic conditions unfavourable within the company’s industry? 7. Does the company use several different banks, none of which sees the company’s entire financial picture? 8. Do any key executives have close associations with suppliers? 9. Is the company experiencing a rapid turnover of key employees, either through resignation or termination? 10. Do one or two individuals dominate the company? 24. What is lapping? Use of customer checks, received in payment of their accounts, to conceal cash previously stolen by an employee. Lapping is usually detected when the employee leaves the organization or becomes sick and must take time off from work. Unless the fraud is perpetuated, the last customer to have funds diverted from his or her account will be billed again, and the lapping technique will be detected. Employers can deter lapping by periodically rotating employees into different jobs and forcing them to take scheduled vacations. 25. What is collusion? Collusion is when two or more parties unrightfully cooperate and involve themselves in a secret agreement for a purpose which is deceitful, illegal or fraudulent. It is also a form of plagiarism. They do this for the settlement that they made among themselves for deceiving, misleading, or defrauding others of their legal rights or to obtain an objective that is forbidden by law or to gain an unfair advantage. It is quite difficult to prevent and detect but one way in doing so is to structure the organization in such a way that collusion can only happen between two or more individuals with incompatible responsibilities and tasks for these responsibilities are done physically as well. 26. What is bribery? Bribery is the giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties. It defrauds the entity (business organization or government agency) of the right to honest and loyal services from those employed by it. 27. What is economic extortion? It is a kind of fraud where perpetrator (employee) is demanding the payment from a vendor to influence or make the decision of a company in favor of the vendor. 28. What is a conflict of interest? A conflict of interest occurs when an employee acts on behalf of a third party during the discharge of his or her duties or has self-interest in the activity being performed. Examples are bribery and illegal gratuities. 29. Define check tampering. A scheme in which an employer steals company funds by intercepting, forging or altering a check drawn on one of the organization's bank accounts. 30. What is billing (or vendor) fraud? It occurs when an employee submits personal, fake or inflated invoices for goods or services to the employer. 31. Define cash larceny. The intentional taking of an employer's cash without the consent and against the will of the employer. 32. What is skimming? Skimming involves stealing cash from an organization before it is recorded on the organization’s books and records. An example is mail room fraud in which an employee opening the mail steals a customer’s check and destroys the associated remittance advice. 33. What are the four broad objectives of internal control? The four broad objectives of internal control are: 1. To safeguard assets of the firm 2. To ensure the accuracy and reliability of accounting records and information 3. To promote efficiency in the firm’s operations 4. To measure compliance with management’s prescribed policies and procedures 34. What are the four modifying assumptions that guide designers and auditors of internal control systems? The four modifying assumptions are the following: 1. Management Responsibility 2. Reasonable Assurance 3. Methods of Data Processing 4. Limitations 35. Give an example of a preventive control Preventive controls attempt to deter or prevent undesirable events from occurring. They are proactive controls that help to prevent a loss. An example of preventive control is Segregation of Duties where duties are segregated among different people to reduce the risk of error or inappropriate action. Normally, responsibilities for authorizing transactions, recording transactions (accounting), and handling the related asset (custody) are divided. 36. Give an example of a detective control Detective controls attempt to detect undesirable acts. They provide evidence that a loss has occurred but do not prevent a loss from occurring. An example of detective control is Reviews of Performance where management compares information about current performance to budgets, forecasts, prior periods, or other benchmarks to measure the extent to which goals and objectives are being achieved and to identify unexpected results or unusual conditions that require follow-up. 37. Give an example of a corrective control An example of corrective control would be: Manual procedures to correct a batch that is not accepted because of an incorrect social security number. A clerical worker would need to investigate and determine either the correct hash total or the correct social security number that should be entered. A responsible party is then needed to read exception reports and follow up on anomalies. 38. What are management’s responsibilities under sections 302 and 404? Sec 302 Corporate Responsibility for Financial Reports: The act requires a company's CEO and CFO to personally certify that all records are complete and accurate. Specifically, they must confirm that they accept personal responsibility for all internal controls and have reviewed these controls in the past 90 days Sec 404 the Management Assessment of Internal Control final audit report shall have a report of management's assessment of internal control over financial reporting. Stress is on management's certification that appropriate internal controls are in place that can effectively detect or prevent errors or fraud that could result in material misstatements in the financial statements. 39. What are five internal control components described in the COSO framework? five objectives of an acceptable system of internal controls, which are 1. control environment 2. risk assessment 3. control activities 4. information and communication 5. monitoring activities 40. What are the six broad classes oh physical control activities defined by COSO? 1. Transaction authorization 2. Segregation of duties 3. Supervision 4. Accounting records 5. Access controls 6. Independent verification 41. What is the purpose of a valid vendor file? Prevents unauthorized purchases from unapproved vendors. 42. Give one example of an error that a check digit control detects. A check digit is a form of redundancy check used for error detection on identification numbers, such as bank account numbers, which are used in an application where they will at least sometimes be input manually. It is analogous to a binary parity bit used to check for errors in computer-generated data. 43. What are the primary objectives of a batch control? - The objective of batch control is to reconcile output produced by the system with the input originally entered into the system. This provides assurance that: a. All records in the batch are processed b. No records are processed more than once c. An audit trail of transactions is created from input through processing to the output stage of the system. 44. If all of the inputs have been validated before processing, then what purpose do run-to-run controls serve? - The run-to-run control is a control device to ensure that no records are lost, unprocessed, or processed more than once for each of the computer runs (processes) that the record must flow through. 45. What is the objective of a transaction log? - The system triggers some transactions internally. For example, when inventory drops below the reorder point, the system automatically generates a purchase requisition. The objective is to maintain an audit trail of these activities where all internally generated transactions must be placed in a transaction log. 46. How can spooling present an added exposure? - Spooling present an added exposure by the creation of an output file as an intermediate step in the printing process. 47. What is the purpose of a limit check? - Limit checks are used to identify field values that exceed an authorized limit. 48. What is the purpose of a range check? - It is to detect keystroke errors by data entry clerks. 49. What is a validity check? - A validity check compares actual field values against known acceptable values. This control is used to verify such things as transaction codes, state abbreviations, or employee job skill codes. If the value of the does not match one of the acceptable values, the record flagged as an error. 50. What information would a batch control record contain? - The control record contains relevant information about the batch, such as: A unique batch number A batch date A transaction code The number of records in the batch The total dollar value of a financial field The total of a unique nonfinancial field DISCUSSION QUESTIONS 1. Distinguish between ethical issues and legal issues. Ethical issues are typically derived from personal feelings and judgements of what is right and what is wrong. These feelings and beliefs are not typically universally agreed upon. Business ethics include principles of conduct that person will use in order to make choices of right and wrong and will answer two questions: how do managers decide what is right in conducting business? And once managers have recognized right, how is this achieved? Legal Issues, on the other hand, can derive from unethical judgement, but is seen as something that goes against legal standards. 2.Some argue against corporate involvement in socially responsible behavior because the costs incurred by such behavior place the organization at a disadvantage in a competitive market. Discuss the merits and flaws of this argument. Managers are hired to maximize the profits for their organization and shareholders. Hence, if they tend to indulge in activities which are more socially responsible like for example, paying higher wages to their workers and charging less for their products, this would lead to diminished profit for the company. Managers can devote their time and resources in achieving organization goals instead of being diverted by socially responsible activities. Companies may misuse the concept of CSR by engaging in what is known as greenwashing, where the firm talks and advertises about being socially responsible to the environment and people but in reality it is not actually executed. The costs of socially responsible behavior include those associated with environmental protection, improving worker safety, and affirmative action. In the short run, when one firm incurs these costs and its competitor does not, the latter has a competitive advantage over the former. However, the socially responsive firm can maximize its profitability in the long run by accruing goodwill in society and avoiding the negative effects of government regulations. 3.Although top management’s attitude toward ethics sets the tone for business practice, sometimes it is the role of lower-level managers to uphold a firm’s ethical standards. John, an operations-level manager, discovers that the company is illegally dumping toxic materials and is in violation of environmental regulations. John’s immediate supervisor is involved in the dumping. What action should John take? Normally, the resolution of an ethical problem on the job would involve consultation between the subordinate and the immediate supervisor. When the supervisor is part of the problem, the matter should be taken to the next higher-level person in the organization structure. 4.When a company has a strong internal control structure, stockholders can expect the elimination of fraud. Comment on the soundness of this statement. A strong internal control structure provides a very good shield against fraud. However, these shields are not 100 percent bulletproof, especially when employees collude and/or top management is involved. A strong internal control structure coupled with good employee morals and ethics is the best deterrence against fraud. 5.Distinguish between employee fraud and management fraud. Employee fraud is committed by non-management employees, and it is generally designed to directly convert cash and other assets for the employee's personal benefit. In cases of employee fraud, weak internal controls are usually present. Management frauds, however, are usually committed at a level above the one to which internal controls generally relate. These frauds are typically shrouded in a nexus of transactions and are difficult to disentangle. 6.The estimates of losses annually resulting from computer fraud vary widely. Why do you think obtaining a good estimate of this figure is difficult? The top management team of publicly traded organizations is often reluctant to publicly admit that they have been the victim of computer crime because of fear of public opinion regarding their internal control structure. Also, many organizations may not be fully aware of the extent of their damages due to computer fraud. 7.How has Sarbanes-Oxley Act had a significant impact on corporate governance? The Sarbanes-Oxley Act of 2002 (SOX) has had a significant impact on strategic management practices and strategies. The Sarbanes-Oxley Act (SOX), passed in 2002, was intended to prevent scandals such as the Enron accounting fraud. It tried to prevent fraud in accounting, increase people's confidence in the financial reports of public companies, and safeguard shareholders. It created new laws about internal financial reporting and new requirements for financial audits of public companies. One of the most important effects the law had was that it made boards more powerful than management. 8. Discuss the concept of exposure and explain why firms may tolerate some exposure. Exposure is the absence or the weakness of the internal control. Some firms may tolerate some exposure to determine control procedures that need to be developed so that they decrease risk to a level where management can accept the exposure to that risk. 9. If detective controls signal error flags, why shouldn’t these types of controls automatically make a correction in the identified error? Why are corrective controls necessary? Linking a corrective action to a detected error, as an automatic response, may result in an incorrect action that causes a worse problem than the original error. For this reason, error correction should be viewed as a separate control step that should be taken cautiously. Necessity of corrective control There are three types of internal controls: Preventive, Detective and Corrective controls. Corrective controls used to restore the process back to state prior to the harmful event. To understand the necessity of the corrective control, consider the following example. “Quantity = 5; Price = $10; Total = $500”. Corrective Controls takes some actions to reverse the all effects of the errors detected. 10. Discuss the non-accounting services that external auditors are no longer permitted to render audit clients Auditing firms that are also engaged by their clients to perform non-accounting services such as actuarial services, internal audit outsourcing services, and consulting, lack independence. They are essentially auditing their own work. They are no longer permitted since auditors may not bring to management's attention detected problems that may adversely affect their consulting fees. 11. Discuss whether a firm with fewer employees than there are incompatible tasks should rely more heavily on general authority than specific authority Small firms with fewer employees than there are incompatible tasks should rely more heavily on specific authority. More approvals of decision by management and increased supervision should be imposed in order to compensate some for the lack of separation of duties. 12. An organization’s internal audit department is usually considered an effective control mechanism for evaluation the organizations’ internal control structure. The Birch Company’s internal auditing function reports directly to the controller. Comment on the effectiveness of this organization structure. The Controller of an organization is the Chief financial Officer who is responsible for all the financial aspects like accounting, statements, payroll, etc. When an internal auditor directly reports to the CFO of the company, the situation creates a potential conflict as it undermines the internal auditor’s position. An internal auditor is expected to have an objective view which may not be possible when the boss is the controller of the company. 13. According to COSO, the proper segregation of functions is an effective internal control procedure. Comment on the exposure (if any) caused by combining the tasks of paycheck preparation and distribution to employees If a payroll employee were to prepare a paycheck for a nonexistent employee which is known as “ghost employee” fraud, and this employee also has the task of distributing the checks, then no one would be the wiser. On the other hand, of the checks go directly another person, who then distributes the paychecks, the extra check should be discovered. 14. Explain the five conditions necessary for an act to be considered fraudulent. 1. False representation- there must be a false statement or a nondisclosure 2. Material fact- a fact must be a substantial factor in inducing someone to act 3. Intent- there must be an intent to deceive or the knowledge that one’s statement is false 4. Justifiable reliance- the misrepresentation must have a substantial factor on which the injured party relied 5. Injury or loss- the deception must have caused injury or loss to the victim of the fraud 6. 15. Distinguish between exposure and risk. The absence or weakness of a control is called an exposure. Exposures, which are illustrated as holes in the control shield, increase the firm’s risk to financial loss or injury from undesirable events. A weakness in internal control may expose the firm to one or more of the following types of risks: 1. Destruction of assets (both physical assets and information). 2. Theft of assets. 3. Corruption of information or the information system. 4. Disruption of the information system. 5. 16. Explain characteristics of management fraud It often escapes detection until the organization has suffered irreparable damage or loss. Management fraud usually does not involve the direct theft of assets. There are three special characteristics of management fraud. 1. The fraud is perpetrated at levels of management above the one to which internal control structures generally relate. 2. The fraud frequently involves using the financial statements to create an illusion that an entity is healthier and more prosperous than, in fact, it is. 3. If the fraud involves misappropriation of assets, it frequently is shrouded in a maze of complex business transactions, often involving related third parties. 17. The text identifies a number of personal traits of managers and other employees that might help uncover fraudulent activity. Discuss three traits. The fraud triangle consists of three factors that contribute to or are associated with management and employee fraud. These are: 1. Situational pressure, which includes personal or jobrelated stresses that could coerce and individual to act dishonestly. 2. Opportunity, which involves direct access to assets and/or access to information that controls assets 3. Ethics, which pertains to one’s character and degree of moral opposition to acts of dishonesty. An individual with a high level of personal ethics, who is confronted with low pressure and limited opportunity to commit fraud is more likely to behave honestly than one with weaker personal ethics, who is under high pressure and exposed to greater fraud opportunities. 18. Give two examples of employee fraud and explain how the thefts might occur. An example is stealing the cash received from a customer while entering the transaction as paid. Another example could be taking company products and selling them elsewhere in exchange for cash. Employee fraud usually involves three steps: 1. Stealing something of value 2. Converting the asset to a usable form such as cash 3. Concealing the crime to avoid detection 19. Discuss the fraud schemes of bribery, illegal gratuities and economic extortion. Bribery involves giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties. It defrauds the entity of the right to be honest and loyal services from those employed by it. Illegal gratuities involve giving, receiving, offering, or soliciting something of value because of an official act that has been taken. This is similar to a bribe, but the transaction occurs after the fact. On the other hand, economic extortion is the use of force by an individual or organization to obtain something of value. The item of value could be a financial or economic asset, information, or cooperation to obtain a favorable decision on some matter under review. 20. Distinguish between skimming and cash larceny. Skimming involves stealing cash from an organization before it is recorded on the organization’s books and records while In Cash larceny, it involves schemes in which cash receipts are stolen from an organization after they have been recorded in the organization’s books and records. Additional information: Skimming may also be done to evade tax when the business owner does not record the sale and uses the cash from the customer directly for personal use. It is more difficult to detect as the act is performed before the cash receipt or sale is entered into the books. 21. Distinguish between shell company fraud and pass-through fraud Shell company fraud first requires that the perpetrator establish a false supplier on the victim company's book and then manufactures false purchase orders, receiving reports, and invoices in the name of the vendor and submitting them to the accounting system, creating the illusion of a legitimate transaction. While Pass-through fraud is similar to shell company fraud with the exception that a transaction actually takes place. Again, the perpetrator creates a false vendor and issues purchase orders to it for inventory or supplies. The false vendor then purchases the needed inventory from a legitimate vendor. The false vendor charges the victim company a much higher than market price for the items, but pays only the market price to the legitimate vendor. The difference is the profit that the perpetrator pockets. 22. Why are the computer ethics issues of privacy, security and property ownership of interest to accountants? Privacy is a concern because the nature of computer data files makes it possible for unauthorized individuals to obtain information without it being recognized as "missing" from its original location. Security is a concern because its absence makes control from a privacy viewpoint questionable. In addition lack of security may permit unauthorized changes to data, therefore distorting information that is reported. Property ownership raises issues of legitimacy of organizational software, valuation of assets, and questions of lost revenues. 23. A profile of fraud perpetrators prepared by the Association of Certified Fraud Examiners revealed that adult males with advances degrees commit a disproportionate amount of fraud. Explain these findings. According to the findings from the study provided by ACFE, adult males with advanced degrees commit a disproportionate amount of fraud, which is explained as follows: Gender. Women are not fundamentally more honest than men, but men occupy high corporate positions in greater numbers than women. This affords men greater access toassets. Age. Older employees tend to occupy higher-ranking positions and therefore generally have greater access to company assets. Education. Generally, those with more education occupy higher positions in their organizations and therefore have greater access to company funds and other assets. 24. Explain why collusion between employees and management in the commission of a fraud is difficult to both prevent and detect. It's harder to detect collusion between the employee and management because it is the duty of the management to detect and prevent fraud among their subordinates. It is also hard to prevent because of the opportunity to commit fraud by the management. 25. Because all fraud involves some form of financial misstatement, how is fraudulent statement fraud different? Fraudulent statement fraud is different because it involves in financial misstatements in order present a favorable financial statements and it benefits the organization rather than the company. 26. Explain the problems associated with lack of auditor independence. Auditing firms that are also engaged by their clients to perform non-accounting activities such as actuarial services, internal audit outsourcing services, and consulting, lack independence. The firms are essentially auditing their own work. The risk is that as auditors they will not bring to management’s attention detected problems that may adversely affect their consulting fees. For example, Enron’s auditors—Arthur Andersen—were also their internal auditors and their management consultants. 27. Explain the problems associated with lack of director independence. Many boards of directors are composed of individuals who are not independent. Examples of lack of independence are directors who have a personal relationship by serving on the boards of other directors’ companies; have a business trading relationship as key customers or suppliers of the company; have a financial relationship as primary stockholders or have received personal loans from the company; or have an operational relationship as employees of the company. A notorious example of corporate inbreeding is Adelphia Communications, a telecommunications company. Founded in 1952, it went public in 1986 and grew rapidly through a series of acquisitions. The founding family (John Rigas, CEO and chairman of the board; Timothy Rigas, CFO, Chief Administrative Officer, and chairman of the audit committee; Michael Rigas, Vice President for operation; and J.P. Rigas, Vice President for strategic planning) perpetrated the fraud. Between 1998 and May 2002, the Rigas family successfully disguised transactions, distorted the company’s financial picture, and engaged in embezzlement that resulted in a loss of more than $60 billion to shareholders.It is neither practical nor wise to establish a board of directors that is totally void of selfinterest, popular wisdom suggests that a healthier board of directors is one in which the majority of directors are independent outsiders, with the integrity and the qualifications to understand the company and objectively plan its course. 28. Explain the problems associated with questionable executive compensation schemes. A Thomson Financial survey revealed the strong belief that executives have abused stock-based compensation. The consensus is that fewer stock options should be offered than currently, is the practice. Excessive use of short-term stock options to compensate directors and executives may result in short-term thinking and strategies aimed at driving up stock prices at the expense of the firm’s long-term health. In extreme cases, financial statement misrepresentation has been the vehicle to achieve the stock price needed to exercise the option. As a case in point, Enron’s management was a firm believer in the use of stock options. Nearly every employee had some type of arrangement by which he or she could purchase shares at a discount or were granted options based on future share prices. At Enron’s headquarters in Houston, televisions were installed in the elevators so employees could track Enron’s (and their own portfolio’s) success. Before, the firm’s collapse, Enron executives added millions of dollars to their personal fortunes by exercising stock options. 29. Explain the problems associated with inappropriate accounting practices. The use of inappropriate accounting techniques is a characteristic common to many financial statement fraud schemes. Enron made elaborate use of special-purpose entities to hide liabilities through off-balance-sheet accounting. Special-purpose entities are legal, but their application in this case was clearly intended to deceive the market. Enron also employed income-inflating techniques. For example, when the company sold a contract to provide natural gas for a period of two years, they would recognize all future revenue in the period when the contract was sold. - A check digit is a control digit (or digits) that is added to the data code when it is originally assigned. This allows the integrity of the code to be established during subsequent processing. 30. Explain the purpose of the Public Company Accounting Oversight Board. SOX created a Public Company Accounting Oversight Board (PCAOB). The PCAOB is empowered to set auditing, quality control, and ethics standards; to inspect registered accounting firms; to conduct investigations; and to take disciplinary actions. 36. Does a hash total need to be based on a financial data field? Explain. - No, it does not need to be based on a financial data because hash total is the summation of a nonfinancial field to keep track of the records in a batch. Any numeric field, such us a customer’s account number, a purchase order number, or an inventory item number may be used to calculated a hash total. 31. Why is an independent audit committee important to a company? The audit committee is responsible for selecting and engaging an independent auditor, for ensuring that an annual audit is conducted, for reviewing the audit report, and for ensuring that deficiencies are addressed. Large organizations with complex accounting practices may need to create audit subcommittees that specialize in specific activities. 32. What are the key points of the “Issuer ad Management Disclosure” of the Sarbanes-Oxley Act? Public companies must report all offbalance-sheet transactions Annual reports filed with the SEC must include a statement by management asserting that it is responsible for creating and maintaining adequate internal controls and asserting to the effectiveness of those controls. Officer must certify that the company’ accounts “fairly present” the firm’s financial condition and results of operations Knowingly filing a false certification is a criminal offense 33. In this age of high technology and computerbased information systems, why are accountants concerned about physical (human) records? - They relate the physical controls to the human activities that trigger those tasks or utilize the results of those tasks. All systems need actual human control every once in a while. 34. What are the classes of transcription error? 1. Addition errors – occur when an extra digit or character is added to the code. 2. Truncation errors – occur when a digit or character is removed from the end of a code 3. Substitution errors – replacement of one digit in a code with another 35. What is the purpose of a check digit? 37. Explain the GFS background technique. Is it used for sequential files or direct access techniques? - Grandfather-father-son (GFS) is used for sequential master files. GFS background technique begins when current master file (the father) is processed against the transaction file to produce a new updated master file (the son). Note that the son is a physically different file from the father. With the next batch of transactions, the son becomes the current master file (the new father), and the original father becomes the backup file (grandfather). MULTIPLE QUESTIONS 1. An example of a control designed to validate a transaction at the point of data entry is a. b. c. d. e. recalculation of a batch total a record count a check digit checkpoints recalculation of hash total Justification: In Check digit, data codes are used extensively in transaction processing systems for representing such things as customer accounts, items of inventory, and general ledger accounts in the chart of accounts. If the data code of a particular transaction is entered incorrectly and goes undetected, then a transaction processing error will occur, such as posting to the wrong account. 2.Application controls are classified as a. b. c. d. e. Input, processing, and output Input, processing, output, and storage Input, processing, output, and control Input, processing, output, storage, and storage Collecting, sorting, summarizing, and reporting Justification: Input controls are programmed procedures (routines) that perform tests on transaction data to ensure that they are free from errors. After passing through the data input stage, transactions enter the processing stage of the system. Processing controls are programmed procedures and may be divided into three categories: batch controls, run-to-run controls, and audit trail controls. Output controls are a combination of programmed routines and other procedures to ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. 3.Which of the following is NOT an element of the fraud triangle? a. b. c. d. e. Ethics Justifiable reliance Situational pressure Opportunity All of the above are elements Justification: fraud triangle consists of three factors that contribute to or are associated with management and employee fraud. These are (1) situational pressure, which includes personal or job-related stresses that could coerce an individual to act dishonestly; (2) opportunity, which involves direct access to assets and/or access to information that controls assets, and; (3) ethics, which pertains to one’s character and degree of moral opposition to acts of dishonesty. Justifiable reliance is part of the five conditions of fraudulent act, in which the misrepresentation must have been a substantial factor on which the injured party relied. 4. How are transactions in real-time processing systems edited? a. In a separate computer run b. In online mode as transactions are entered c. During a backup procedure d. Not edited due to time constraints e. Editing transactions in real-time is not necessary C. Back-up of master file in a real-time processing system is considered difficult because transactions are processed in a continuous way where the backup process is scheduled at particular intervals. While processing, the current version of the master file gets destroyed from disk failure or it will get corrupted due to some programming error, from which the master file can be reconstructed to the current backup file stored in the disk. 5. In an automated payroll processing environment, a department manager substituted the time card for a terminated employee with a time card for a fictitious employee. The fictitious employee had the same pay rate and hours worked as the terminated employee. The best control technique to detect this action using employee identification numbers would be to use a a. Batch total b. Record count c. Hash total d. Subsequent check e. Final total C. Hash total is the addition of a non-financial field. It is used to maintain a track of the record. For example, a customer's account number of each transaction within a record can be added to obtain a hash total. Such hash total would not match if a perpetrator replaces a transaction with similar value could be detected. 6. Which of the following compensating control? a. Transaction authorization b. Supervision c. Accounting records d. Segregation of duties is often called B. Usually a good internal control means that the incompatible tasks are all allotted to different employees. But in the case of a small organization with fewer personnel, it may not be possible. In such a scenario, the management may choose to compensate for the lack of segregation of duties with close supervision. A manager may be asked to oversee the roles of various subordinates across different functions. Hence, called compensating control. 7. The underlying assumption of reasonable assurance regarding implementation of internal control means that a. Auditors are reasonably assured that fraud has not occurred in the period. b. Auditors reasonably assured that employee carelessness can weaken an internal control structure. c. Implementation of the control procedure should not have a significant adverse effect on efficiency or profitability d. Management's assertions about control effectiveness should provide auditors with reasonable assurance. e. A control applies reasonably well to all forms of computer technology. Justification: When a company chooses to incorporate a good internal control system, then the underlying assumption is that the cost of implementing such a procedure must not outweigh the benefits. In other words, the company should be able to meet the four objectives of having an internal control (safeguarding the assets, Accurate and reliable data, increase in efficiency and adherence to company policies) in a cost-effective manner. 8. Which of the following journal entries would a bookkeeper make to conceal the theft of cash receipts from customers in payment of their accounts? DR CR a. Miscellaneous expense Cash b. Petty cash Cash c. Cash Accounts Receivable d. Sales returns Accounts Receivable e. None of the above Justification: For making the journal entries, the shopkeeper should have an idea related to the goods sold. If the sales rectums are debited and accounts receivable are credited, then bookkeeper will face no difficulty related to the receipts. It is because the bookkeeper will get the cost of goods after knowing the sales rectums. 9. Which of the following is not an example of preventive control? a. Separation of responsibilities for the recording, custodial, and authorization functions b. Sound personnel practices c. Documentation of policies and procedures d. Password Authentication software and Hardware e. Sources documents for capturing sales data Justification: documentation of policies and procedures is a directive control. 10. Which of the following is NOT a segregation of duties violations? A a. The treasurer has the authority to sign checks but gives the signature block to the assistant treasurer to run the check-signing machine. b. The warehouse clerk, who has custodial responsibility over inventory in the warehouse, selects the vendor and authorizes purchases when inventories are low. c. The sales manager has the responsibility to approve credit and the authority to write off accounts. d. The department time clerk is given the undistributed payroll checks to mail to absent employees. No risk due to combination of tasks. The treasurer is responsible for having custody of the assets. The treasurer is not responsible for either authorizing or recording the transaction. By delegating the task signing, he checks to the assistant treasurer, no violation of the principle of the separation of functions occurs because the assistant treasurer does not authorize or record transaction either. 11. What name is given to computer programs that are used for checking the validity and accuracy of transaction data? B a. Operating System Program b. Edit Programs c. Compiler Programs d. Integrated Test Programs E. Interrogation Program Application uses routines for checking the validity and accuracy of the transaction data. Edit programs are the programs which are designed for performing the editing and modification functions or the deletion of the data. 12. An employee in the receiving department keyed in shipment from a remote terminal and inadvertently omitted the purchase order number. The best application control to detect this error would be a C a. Batch Total b. Missing Data Check c. Completeness Check d. Reasonableness Check e. Compatibility Test A completeness test checks that all data elements are entered before processing. An interactive system can be programmed to notify the user to enter the number before accepting the receiving report. 13. Which of the following controls would best prevent the lapping of accounts receivable A a. Segregate duties so that the clerk responsible for recording in the accounts receivable subsidiary ledger has no access to the general ledger. b. Request that customers review their monthly statements and report any unrecorded cash payments. c. Require customers to send payments directly to the company’s bank. d. Request that customers make checks payable to the company. In order to prevent lapping, the duties of the clerk responsible for recording the accounts receivable subsidiary ledger should be segregated from that of recording in the general ledger. Fraud is a malicious act committed by people to fulfill their personal benefits. Fraud can be committed by people inside or outside the organization. 14.) Ensuring that all material transactions processed by the information system are valid in accordance with management’s objectives is an example of Answer: A. Transaction Authorization Justification: An employee may be given the authority to initiate or approve any transaction. This is done in order to ensure that the transaction is valid and is in accordance with the policies and procedures of the organization. This is called transaction authorization. Hence, the correct option is a. 15.) Which of the following is an example of an input control? Answer: D. Performing a check digit test on a customer account number. Justification: Control are termed as a programmed procedure which performs the test related to the transaction ensuring the data is free from any of the error. It is also called as edits which are designed into the system at various points which depend on the processing whether it is real time or batch Input controls are placed in the real time system at the collection of the data stage for monitoring the data which are entered from the terminals. Historical transaction data must be error free for its efficient processing. 16.) Providing timely information about transactions in sufficient detail to permit proper classification and financial reporting is an example of Answer: C. Information and communication. Justification: An efficient accounting information system is used to initiate, classify and record the transactions related to the assets and liabilities. This timely, accurate and reliable information is very important to the management to make decisions. The details about how a transaction is initiated, how it is processed and how it is classified it required also from the audit perspective. 17.The fraud scheme that is similar to the concept of "borrowing from Peter to pay Paul" is Answer: C - Lapping is the practice of allocating one customer's payment to another customer's account. Hence, borrowing Peter's payment to pay Paul. 18.What is the process for posting to accounting records in a computer system? Answer: D - Accounting records in the computer based accounting system consist of a general ledger of each account which consists of beginning balance and month-to date total for all transactions. Computer system allows direct access for reviewing any of the account balance by using the monitor which provides current year-to-date data where master files gets updated according to the year-to-date files. 19. Which of the following benefits is least likely to result from a system of internal controls? Answer: B - No system can prevent two or more employees who have authority and control over the system to get together to commit fraud.