Premium Essay

Computer Fraud

In: Business and Management

Submitted By eabasta
Words 821
Pages 4
During the last hundred years mankind has witnessed and been part of a dynamic evolution. Changes, modifications, and inventions that have occurred have been part of what has enabled humans to communicate in a more immediate manner, this has been particularly ideal in our work environment . Information technology has been an essential part of this process. As there are huge benefits obtained from technology there have also been issues that have derived from it, such as ethical ones. Several acts have been established in order to have the ability to control those pitfalls identified. Mankind has acknowledged that technology is an ideal part of our work lives as well as our personal lives and has been able to identify and establish boundaries within these to ensure the overall protection of one.
CHANGE

There was a time in which in order to send another person a memo or a letter it was sent by transporting it with a carriage and horse, patiently one would await a response from the other party which could at times take weeks or months depending on how far the other party was. That changed when motorized vehicles were invented, it was now faster to send and receive those responses, and one would still patiently await the other’s response. We then had airplanes a much faster method of transporting our said information. Nowadays, there is no such thing as waiting patiently for a response! We have electronic mail! With which as soon as we hit the “send” button we expect a reply, within a few minutes of waiting one grows impatient. Technology has allowed to be in touch with one another across the globe in a simultaneous and immediate manner in the same way it has been an enabler to have expectations of immediate responses.
BENEFITS AND ISSUES

The evolvement of information technology has allowed us to have information at our fingertips, at a touch of a…...

Similar Documents

Premium Essay

Fraud

...entity and its attributes. It uses a dictionary if data, entity and attributes, respectively, designed for information generation in the organization. Since all the information system use the dictionary, there is common understanding of terms and terminology in the organization brining clarity in the communication and a similar understanding an even of the organization. The MIS calls for a systemization of the business operation for an affective system design. A well designed system with a focus on the manger makes an impact on the managerial efficiency. The fund of information motivates an enlightened manger to use a variety of tools of the management. It helps him to resort to such exercises as experimentation and modeling. The use of computers enables him to use the tools techniques which are impossible to use manually. The ready-made packages make this task simpler. The impact is on the managerial ability to perform. It improves the decision making ability considerably. Planning, organizing, staffing, coordinating, directing and controlling are the various Steps in a management process. All the steps prior to a control are necessary but are not necessarily self-assuring the results unless it is followed by a strong control mechanism. The management experts have viewed these steps as Management Control System. They postulate the hypothesis that unless a control is exercised on the process, the goals will not be achieved. They advocate a system of effective control to......

Words: 1935 - Pages: 8

Premium Essay

Fraud

...As is mentioned in the “The CPA Journal”, “many studies suggest fraud is more likely to occur when someone has an incentive (pressure) to commit fraud, weak controls or oversight provide an opportunity for the person to commit fraud, and the person can rationalize the fraudulent behavior (attitude).” This is known as the fraud triangle. There are two types of fraud: fraudulent financial reporting and misappropriation of assets. For the first one, this kind of frauds came from the top management. Most of the pressures are the decline in earnings, which may influence the financing as well as the stock price. Moreover, the top management is afraid to get fired. At the same time, since the financial statement include many significant judgments or estimates, which maybe the opportunity for the top management to commit frauds. For the attitude, the top management displays a significant disregard for the financial report process. These factors will increase the risk of fraud. Secondly, misappropriation of assets, this kind of frauds came from the employees, such frauds like this may not have a great impact on the company. The employees with much more financial pressures when the economic situation getting bad. Moreover, the weak internal controls are the major source of opportunity to the employees; the examples include the inadequacy of the assignment of responsibility. And for the rationalization, the top management displays a significant disregard for controls and ethical......

Words: 799 - Pages: 4

Free Essay

Acct 571: Computer Fraud Case

...Systems | Computer Fraud | | By | [Type the author name] | 9/14/2013 | DeVry University’s Keller Graduate School of Management | A University of Oklahoma student was charged with computer fraud on May 16, 2013 by the Cleveland County District Court. The University of Oklahoma student, Roja Osman Hamad, is accused of improperly changing his grades. Roja Hamad now faces five counts of computer fraud. Mr. Hamad was a former student employee of the university’s information technology department. This is where Mr. Hamad was able to access the university’s computer system to change six faculty member’s passwords without the faculty member’s permission. University official’s state, Roja Hamad broke into the university’s computer system and changed his grades. Roja Hamad fits the majority of the profile of the average fraud perpetrator. According to the ACFE, the average fraud perpetrator has no prior fraud charges or convictions and is more likely to be male rather than female. The ACFE states that the offender is commonly between the ages of 31-45. Even though Mr. Hamad is only 24 years old, he possessed the knowledge to commit the fraud. Since Roja Hamad was a student employee of the university, he was probably a trusted employee. As a trusted employee of the University, this gave Hamad an opportunity to perpetuate the fraud. Lack of proper internal controls, failure to enforce controls, and incompetent management personnel enabled Hamad to commit the fraud.......

Words: 1093 - Pages: 5

Premium Essay

How to Use a New Computer Audit to Prevent and Detect Fraud

...Information Systems Audit and Control Association. All rights reserved. www.isaca.org. How to Use a New Computer Audit Fraud Prevention and Detection Tool By Richard B. Lanza, CPA, PMP W hile occupational fraud takes various forms, the result is always the same: the numbers generated by fraud cannot hold up to the unfailing logic of the accounting equation. If executives add false sales and accounts receivable to increase the organization’s revenue, profits and cash will be out of kilter. The advancement of technology has allowed for this “accounting equation” to be systematized into computer logic and applied to company data.1 Results of this logic could take the form of a simple matching of the human resource file to the accounts payable vendor master file. On the other side of the coin, it could be an advanced neural network application focused on detecting money laundering schemes. Whether it is simple or advanced, data analysis provides many benefits in the prevention and detection of fraud. On one hand, the fraud examiner gains insight on 100 percent of an organization’s transaction data vs. more limited manual methods of selection. Further, this approach can generally be completed in less time than manual procedures, given the automation of the work. Examiners also gain improved business intelligence as the generated reports often lead to conclusions beyond whether just fraud occurred. Such new insights can lead to suggested process improvements to the......

Words: 2941 - Pages: 12

Premium Essay

Computer Fraud

...How Computer Fraud and Abuse Evolved Before 1984 there was little that could be done about computer fraud. In 1984 the Counterfeit Access Device and Computer Fraud and Abuse Act was the first legislation on computer fraud. The act made it a misdemeanor to illegally retrieve financial and credit information by computer. Also, the act made it illegal to cause harm to other computer systems. Around this time, what constitutes computer crime was still an ongoing discussion. As a Federal Act, only half of the states passed similar statues. (History of Computer Crime) The Computer Fraud and Abuse Act can be violated in two ways, either by an outsider trespasses into a computer or by someone on the inside who exceed their given authorization and go beyond their standard expectation. The first person who was charged for violating the Computer Fraud and Abuse Act was Robert T. Morris Jr. He caused harm to many universities and government computers by releasing a worm and was the creator of the first computer virus. He argued that he had only just exceeded his authorized access and not accessed the computers without authorization. To exceed authorization defined by the Computer Fraud and Abuse Act as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter." The court found Morris guilty of acting without authorization. (Computer Fraud and Abuse Act (CFAA)) As the......

Words: 1018 - Pages: 5

Free Essay

Fraud

...Olympus Accounting Fraud ACTG 6100 Professor Mark Jobe Feb. 18, 2014 Inhwa Kim M01243678 The Olympus has a pretty strong position in the camera market. This company is popular because they made the world’s first DSLR (Digital Single-Lens Reflex). Many camera users who are located in all around the world prefer the Olympus. Also, the Olympus is popular because the company made the medical devices, endoscope which is able to watch inside the organ of human body. The Olympus, which is one of the popular camera and medical devices companies, had been troubled due to a financial scandal. On August 2011, Michael Woodford, the formal president, was separated from the Olympus because of the difference in business line despite thirty years at the company. He expressed concern about possible inappropriate acquisitions and large payments to financial advisors with the chairman of Olympus and an executive vice president. He claimed that the Olympus paid an unusual fee abnormally while buying Gyrus, which is a maker of the British medical devices. After arguing this problem, he was dismissed on Oct 14, 2011. Also, in the same year, the Olympus spent about 687 million dollars as advisory fee to the Cayman Islands and another in New York. These two companies are unknown. Thomson Reuters reported that the fee of 687 million dollars, equal to 31 percent of the Gyrus acquisition price, was paid to a middle-man, whereas this is usually 1 or 2 percent. The......

Words: 1074 - Pages: 5

Free Essay

Computer Crime: Pornography, Fraud, Hacking and Gambling

...Chapter 22 COMPUTER CRIME: PORNOGRAPHY, FRAUD, HACKING AND GAMBLING CHAPTER SUMMARY The Internet, a relatively recent phenomenon, has caused a change in how laws may or may not apply to formerly traditional situations. Furthermore, the Internet has allowed criminals to perpetrate crimes that could not exist but for cyberspace. Chapter 22 examines computer crime and the statutes enacted to combat this growing problem as well as the erosion of our personal privacy. Freedom of speech, online gambling and cybermedicine issues are also examined in light of contemporary applications and influences resulting from the Internet. CHAPTER OUTLINE I. COMPUTER CRIME AND CYBERCRIME A. Definitions 1. Computer crime consists of crimes involving: • Computers • Computer systems • Computer applications. 2. Cybercrime consists of computer crime that takes place in cyberspace 3. The Internet facilitates a number of opportunities for crimes to occur. 4. Typical cybercrime abuses include: • Hacking • Spreading of viruses • Fraud • IP theft • Appropriation of trade secrets • Defamation B. The USA Patriot Act, 2001 1. The USA Patriot Act provided significant new powers to federal law enforcement agencies. ...

Words: 4504 - Pages: 19

Premium Essay

Accounting Fraud at Satyam Computers

...Accounting Fraud at Satyam Computers March 04, 2011 BACKGROUND Satyam Computers Services Limited was a consulting and an Information Technology (IT) services company founded by Ramalingam Raju in 1988. It was India’s fourth largest company in India’s IT industry, offering a variety of IT services to many types of businesses. Its network spanned over 46 countries, across 6 continents and employed over 20,000 IT professionals. On 7th January 2009, Satyam scandal was publicly announced and Ramalingam Raju confessed and notified SEBI (Securities and Exchange Board of India), which is the Indian equivalent of SEC, of having falsified the account. Raju confessed that Satyam’s balance sheet of 30 September 2008 contained inflated figures for cash and bank balances of Rs 5,040 crores (US$ 1.04 billion) [as against Rs 5,361 crores (US$ 1.1 billion) reflected in the books], an accrued interest of Rs. 376 crores (US$ 77.46 million) which was non-existent, an understated liability of Rs. 1,230 crores (US$ 253.38 million) on account of funds which were arranged by himself and an overstated debtors’ position of Rs. 490 crores (US$ 100.94 million) [as against Rs. 2,651 crores (US$ 546.11 million) in the books]. REASON FOR FRAUD Deriving high stock values allows the promoters to enjoy benefits allowing them to buy real wealth outside the company and thereby giving them opportunity to derive money to acquire large stakes in other firms on another hand. This could be the reason......

Words: 953 - Pages: 4

Premium Essay

Fraud Fraud

...The Anonymous Caller Recognizing It's a Fraud and Evaluating What to Do[1] Learning Objectives • After completing and discussing this case you should be able to • Appreciate real-world pressures for meeting financial expectations • Distinguish financial statement fraud from aggressive accounting • Identify alternative actions when confronted with suspected financial statement fraud • Develop arguments to resist or prevent inappropriate accounting techniques It was 9:30 A.M. on a Monday morning, one like a thousand others in the Naked City. I was sipping my cup of coffee, pondering Jake van der Kamp’s rant in the South China Morning Post when the call came through. "Hi Dr. Westland, do you have a minute?" "Sure," the professor replied. "I am one of your former students, but if you don't mind, I would prefer to remain anonymous. I think it is best for both of us if I not reveal my name or company to you. I am concerned that the senior executives of the company where I serve as controller just provided our local bank fraudulently misstated financial statements. I need some fast advice about what to do. Currently, I am on my car phone and need help evaluating my next step before I head to my office this morning. May I briefly describe what's going on and get some input from you?" she asked. "Go ahead, let me see if there is some way I can help," responded Dr. Westland. "I am the controller of a small start-up......

Words: 1453 - Pages: 6

Premium Essay

Fraud

...and accounting fraud by the managers of the company. It disappoints many stakeholders as after the financial crisis in 1997, many efforts have been initiated and implemented to strengthen the business control and foundation of the company. One of the important lessons learned from the financial crisis in 1997 is the weaknesses in the governance of the company such as too much power is given to a single person in managing the company, weak internal control and poor work of the directors that leads to the failure of the company. Due to this, a total regulatory and governance were embarked all over the world. Just to name a few, in the US, the Sarbanese Oxley Act was established, while in the UK the Code of Corporate Governance was extensively revised to stop all these corporate diseases from spreading and becoming a cancer for the global business community. However, all this effort has seemed fruitless as after the heavy debate and discussion and huge struggle by the regulator and market administrator, these corporate scandals are still returning but with more scaring facts. 1.1 What do we mean by Fraud and Misconduct • Fraud is a broad concept that generally refers to “any intentional act committed to secure an unfair or unlawful gain” • Misconduct is also a broad concept and generally refers to “violations of laws, regulations, policies or market expectations of ethical business conduct” Together, they fall into the following categories of fraud schemes......

Words: 3562 - Pages: 15

Free Essay

Computer Fraud

...CHAPTER 5 COMPUTER FRAUD SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 5.1 Do you agree that the most effective way to obtain adequate system security is to rely on the integrity of company employees? Why or why not? Does this seem ironic? What should a company do to ensure the integrity of its employees? The statement is ironic because employees represent both the greatest control strength and the greatest control weakness. Honest, skilled employees are the most effective fraud deterrent. However, when fraud occurs, it often involves an employee in a position of trust. As many as 90% of computer frauds are insider jobs by employees. Employers can do the following to maintain the integrity of their employees. (NOTE: Answers are introduced in this chapter and covered in more depth in Chapter 7) • Human Resource Policies. Implement human resource policies for hiring, compensating, evaluating, counseling, promoting, and discharging employees that send messages about the required level of ethical behavior and integrity • Hiring and Firing Practices: Effective hiring and firing practices include: o Screen potential employees using a thorough background checks and written tests that evaluate integrity. o o Remove fired employees from all sensitive jobs and deny them access to the computer system to avoid sabotage. • Managing Disgruntled Employees: Some employees who commit a fraud are disgruntled and they are seeking revenge or "justice" for......

Words: 355 - Pages: 2

Free Essay

Fraud

...prison in the Satyam fraud case. The court also imposed a fine of Rs 5 crore on Ramalinga Raju, the Satyam Computer Services Ltd's founder and former chairman, and his brother B Rama Raju and Rs 20-25 lakh each on the remaining accused. HT presents a lowdown of the country's biggest-ever corporate accounting scandal . What is the Satyam scam about? It is about corporate governance and fraudulent auditing practices allegedly in connivance with auditors and chartered accountants. The company misrepresented its accounts both to its board, stock exchanges, regulators, investors and all other stakeholders. Is this an accounting fraud, a market manipulation/fraud or both? It is a fraud, which misled the market and other stakeholders by lying about the company’s financial health. Even basic facts such as revenues, operating profits, interest liabilities and cash balances were grossly inflated to show the company in good health. Who is to blame here? The promoters? The promoters are primary culprits, although it is almost impossible to misrepresent such facts without the connivance of the auditors and some executive board members. Independent directors, it seems, were kept in the dark about the actual books of accounts. What about the auditors? The role of external third party auditors, who were tasked to ensure that no financial bungling is undertaken to carry out promoters’ interest or hide facts, have also been brought to question. Anatomy of a fraud 1.......

Words: 3344 - Pages: 14

Premium Essay

Fraud

...Fraud is a serious problem for most businesses today and often technology compounds the problem. In addition, the role of the independent auditor in the detection of fraud is often questioned. (http://www.swlearning.com/accounting/hall/ais_4e/study_notes/ch03.pdf) Fraud is dishonest activity causing actual or potential financial loss to any person or entity including theft of money or other property by employees or persons and where deception is used at the time, immediately before or immediately following the activity. (http://about.curtin.edu.au/definitions-impact.cfm) * Types of Fraud (http://www.auditsol.com.au/media/Fraudw.pdf) 1. Employee fraud Is internal or employee frauds are when fraud is committed against the company or organization a person is working for. Internal frauds can include: * payment fraud Payment fraud is any fraud that involves falsely creating or diverting payments. Payment fraud can include: * creating bogus customer records and bank accounts so that false payments can be generated * intercepting and altering payee details and amounts on cheques and Payable Orders, then attempting to cash them * creating false payment and financial information to support fraudulent claims for benefits * processing false claims by accomplices for benefits, grants or repayments self authorizing payments to oneself. * procurement fraud Procurement fraud is any fraud relating to a company purchasing goods,...

Words: 4690 - Pages: 19

Premium Essay

Fraud

...Fraud is defined as the, “intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right” (Fraud, n.d.). However, not all fraud is intentional. According to Kranacher, Riley & Wells (2011), there are four elements to fraud: a material false statement, knowledge that the statement was false when it was spoken, reliance on the false statement by the victim, and damages resulting from the victim’s reliance on the false statements (pp. 2-3). Negligence within a company, also referred to as unintentional fraud, implies a party not living up to minimal standards of care (Kranacher, Riley & Wells, 2011, p. 61). When an employee commits an honest mistake without the intention of deceiving the employer or gaining an advantage over others is considered negligence. Negligence has five legal elements: duty, breach, cause in fact, proximate case, and damages (Kranacher, Riley & Wells, 2011, p. 61). All elements need to be present for negligence to be considered. In 2001, Enron became the center of one of the biggest fraud scandals of the decade. The executive officers Kenneth Lay, Andrew Fasto, Jeffrey Skilling including the accounting firm Arthur Andersen committed the biggest financial fraud against its employees and stakeholders. Enron’s officers drove the company into bankruptcy causing thousands of employees to lose their jobs as well several billions of dollars in lost retirement accounts (Kranacher, Riley & Wells...

Words: 1036 - Pages: 5

Premium Essay

Computer Fraud

...customers, the arrest confirmed the occurrence of the second public fraud in less than two months that victimized the institution. However, the latest one involved a highly rank white-collar who was able to breach the information system of the company. The following paper will present a summary of the case, including the characteristic of the perpetrator, the detective methods that were used, and the effects on the stakeholders. We will also try to classify the fraud based upon the data processing model, assess the types of controls that were in place at the time of the violations, suggest the type of corrective controls that should be adopted, and evaluate the punishment that must serve as deterrent to similar acts. At 35 years old, Gary foster of Englewood Cliffs, New Jersey has been working for Citigroup since 1999. When he left voluntarily in January of 2011, Foster was the vice president of the treasury finance department in charge of funding loans and other business-to-business transactions inside Citigroup. Bank records show that between May 2009 through December 2010, Foster caused approximately over nineteen million of dollars to be wired from Citigroup’s account to his personal bank account at Chase. With a degree in finance from Rutger University and a yearly salary of about one-hundred-thousand dollars, Foster is the ideal example of the white-collar criminal that Romney defines in those terms: “Fraud perpetrators look just like you and me.” (Romney, 2012,......

Words: 1221 - Pages: 5

└ Cameras & Photography | Play Movie | Tsurezure Children