Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
anti trust laws |
regulate trade and commerce by making it illegal for businesses to compete in unfair ways -created to prohibit the formation and continuation of monopolies except when in the best interest of the public |
|
role of accountants in anti trust litigation |
whether the defendant has engaged in predatory pricing -after liability is proved in an anti trust case, then the forensic accountant will be asked to estimate damages |
|
predatory pricing |
determine whether a company prices its products or service below average variable cost and if so,predatory pricing is present |
|
cost behavior estimation methods |
experience-working knowledge of a firm's accounting system will provide some knowledge of the nature of cost behavior in the firm;s accounting system, |
|
account analysis |
involves use of judgement to classify each general ledger account as fixed variable or mixed -subjective method of estimating cost behavior |
|
scatter plot |
historical data to estimate cost behavior cost data is plotted against volume data |
|
high-low method |
the highest and lowest costs are identifies along with their related volume levels variable cost = change in cost / change in units |
|
fixed cost = cost - (units * variable cost) |
total cost = fixed cost+ variable cost * numbers of units |
|
regression/correlation analysis |
most powerful method for estimating cost is regression analysis -regression measures the nature of the association between the variables i.e. does a change in one variable cause a change in the second variable -correlation measures the strength of the association between the variables i.e. is there a relationship? |
|
r square |
coefficient of determination strong relationship between cost and volume of activity allows for predication of accurate costs using the cost function equation relationship > .8 is reliable <.5 not reliable |
|
standard error of the estimate |
indicates the variability of the data in the regression calculations. the greater the variability of the data, the less precision that result from estimates made from the regression data. |
|
association vs causation |
correlation analysis shows the degree of association between variables, but it does not prove causation |
|
federal false claims act |
passed to protect the government from the unscrupulous acts of a few government contractors that intentionally or carelessly overcharge the government for goods or services -filed on behalf of the US Government -the US dept of justice evaluates the claims and decides whether to intervene in the case |
|
Under the federal false claims act, no proof of intent to defraud is required. A person knowingly with respect to information if the person has: |
-actual knowledge of information -acts in deliberate ignorance of the truth or falsity of the information -acts in reckless disregard of the truth or falsity of the information "preponderance of the evidence" (lower hurdle than beyond reasonable doubt) |
|
intellectual property |
includes copyrights, patents, trademarks, trade secrets, business processes and other intangible rights that are conveyed to owners via laws and regulations |
|
enforcing intellectual property rights |
unlike tangible assets, intellectual property may be taken and used without the owner even knowing about it for some time -like damages in tangible assets, intellectual property damages may include lost sales and lost profits -in addition, there may be other damages such as loss of reputation, lost company value and lost customers |
|
common issues in proving or defending patent infringement |
-the Georgia-pacific factors: these are 15 factors that the court considered in measuring damages in the georgia-pacific patent infringement case -these rules have been widely adopted in many other similar patent infringement cases by courts -the 25% rule: used by the courts to assess damages in patent infringement cases, but federal courts are no longer using this rule in cases |
|
common issues in proving or defending patent infringement |
-cost of next best alternative refers to the application of opportunity cost to measure damages in a patent infringement case -running royalty v upfront payments refers to the need to evaluate the total royalty package in assessing damages |
|
common issues in proving or defending patent infringement |
-cost of designing around: its legal to design around a patent, in doing so the new inventor must be careful not to infringe on any part of the patent or other intellectual property item covered by the patent |
|
common issues in proving or defending patent infringement |
anti trust issues- patent laws and other intellectual property laws and regulations are designed to provide a limited "monopoly" to those holding the rights to patents, copyrights, trademarks, etc. |
|
why is it difficult to enact cybercrime |
-technologies continually changing -no clear definitions of terms -for international laws, the trans-border access to computer data and differences in laws has made it nearly impossible |
|
why is there need for international cyber laws? |
-theft or destruction of proprietary data -forgery of financial documents -theft of money from bank accounts -unlawful use of computer/information resources |
|
considerations in estimating loss |
1. losses of responding 2. conducting a damage assessment 3. restoring the system to its previous condition 4. loss of revenue or costs incurred due to the interruption |
|
USA Patriot Act of 2001 |
the USA Patriot Act has strengthened U.S. cyber laws and expanded cybercrime definitions -amendment of interest to forensics accountants and fraud examiners -sec 212 emergency disclosures by communications providers and the 2002 enactment the cyber security enhancement act -allows ISPs to disclose information if...there is a need to protect their rights and property, they believe a serious crime is involved, information is requested by a forensic investigator |
|
KSAs for fighting cybercrime |
-ability to build an internet audit trail -skills needed to collect "usable" courtroom electronic evidence -knowledge base to use in recommending or reviewing Internet security policies -ability to place a valuation on any incurred losses from attacks -technical familiarity with the internet, web servers, firewalls, and general attack methodologies |
|
critical infrastructures |
systems that would cause catastrophic impact if they were comprimised or shut down |