Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
fraud
|
any means used to achieve an unfair advantage over another person
|
|
1. false statement
2. about a material fact 3. intent to deceive 4. victim relied on fact 5. victim suffered an injury/loss |
legal qualifications for fraud (5)
|
|
misappropriation of assets
|
employee fraud, theft of company assets for personal gain
|
|
fraudulent financial reporting
|
misstating financial health of a company by intentionally misstating the amounts and disclosures in financial statements to deceive users
|
|
1. misappropriation of assets
2. fraudulent financial reporting |
two types of fraud
|
|
Treadway Commission
|
NationL commission on fraudulent financial reporting
|
|
1. create organizational environment - integrity
2. understand factors that contribute 3. assess likelihood of fraudulent financial reporting 4. design/implement internal controls - reasonable assurance |
4 things companies can d to minimize fraudulent financial reporting
|
|
1. pressure
2. opportunity 3. rationalization |
3 conditions that allow fraud to occur
|
|
pressure
|
motivation or incentive for fraudster to commit crime
|
|
opportunity
|
opening/gateway that allows the fraudster to 1. commit the crime 2. conceal the crime
|
|
kiting
|
creating cash by taking advantage of the time lag between when checks are cashed and when they clear the bank
|
|
lapping
|
employee steals payment from customer A, uses customer B's money to credit customer A, use customer C to credit customer B, etc.
|
|
rationalization
|
justification for committing a crime
|
|
computer fraud
|
any crime where knowledge of computer technology is essential in either committing, investigating or prosecuting the crime
|
|
1. input fraud
2. processor fraud 3. computer instructions fraud 4. data fraud 5. output fraud |
5 types of computer fraud
|
|
input fraud
|
easiest and simplest type of fraud to perpetrate; alter system input. Just have to understand how the system operates
|
|
processor fraud
|
fraud resulting from authorized use of the system (shopping online on company computer)
|
|
computer instructions fraud
|
tampering with the software that runs company computer systems (computer virus/worm)
|
|
data fraud
|
copying/altering/viewing company data files without authorization
|
|
output fraud
|
misusing system output (creating false paychecks)
|