SlideShare a Scribd company logo
1 of 17
Oleh : Bambang Setiawan, S.Kom
01/01/2017Information System UIN Suska Riau
2
• Data collection frauds involve entering
falsified data into the system by
deleting, altering or creating a
transaction.
• Masquerading involves gaining remote
access by pretending to be an
authorized user. Piggybacking involves
latching onto an authorized user in the
system. Hacking involves both schemes
motivated by the challenge of trying to3 01/01/2017Information System UIN Suska Riau
• Data processing: A series of actions or steps
performed on data to verify, organize,
transform, integrate, and extract data in an
appropriate output form for subsequent use.
Methods of processing must be rigorously
documented to ensure the utility and integrity
of the data.
• Data processing frauds are in two classes:
• Program fraud includes creating illegal
programs or destroying, corrupting or
altering computer logic to cause data to be
CONTINUE
...
01/01/2017Information System UIN Suska Riau
4
 Database management fraud involves altering,
deleting, corrupting, destroying, or stealing an
organization’s data.
 Often associated with transaction or program
fraud and disgruntled employees who may copy,
sell or destroy data.
01/01/2017Information System UIN Suska Riau
5
CONTINUE
...
 Information generation fraud involves stealing,
misdirecting or misusing computer output.
 Useful information has: relevance,
timeliness, accuracy, completeness and
summarization.
 Scavenging involves searching for discarded
output.
 Eavesdropping involves listening to output
transmissions over telecommunication lines.01/01/2017Information System UIN Suska Riau
6
• Description and characteristics of fraud
• Professional skepticism
• Engagement personnel discussion
• Obtaining audit evidence and information
• Identifying risks
• Assessing the identified risks
• Responding to the
assessment
• Evaluating audit evidence
and information
• Communicating possible
fraud
• Documenting consideration
of fraud
o Auditor also required to assess risk factors
related to fraudulent financial reporting and
misappropriation of assets. 01/01/2017Information System UIN Suska Riau
7
 Risk factors:
 Management’s characteristics and
influence over the control
environment, industry conditions and
operating characteristics and
financial stability.
 Common schemes:
 Improper revenue recognition or
treatment of sales.
 Improper asset valuation or deferral
of costs and expenses.
 Improper recording of liabilities.
 Inadequate disclosures. 01/01/2017Information System UIN Suska Riau
8
Risk factors:
Susceptibility of assets to
misappropriation and controls.
Common schemes:
Personal purchases or ghost employees.
Fictitious expenses or altered payee.
Pass-through vendors.
Theft of cash (or inventory).
Lapping.
01/01/2017Information System UIN Suska Riau
9
Judgments about the risk of material
misstatements may affect the audit in
regards to:
Engagement staffing, extent of
supervision, professional
skepticism, nature, timing, extent
of procedures performed.
01/01/2017Information System UIN Suska Riau
10
Risk of material misstatement due to
fraud always exists. Auditor:
 may determine currently planned
audit procedures are sufficient to
respond to risk factors.
 may determine to extend audit and
modify planned procedures.
 may conclude procedures cannot be
modified sufficiently to address
CONTINUE
...
01/01/2017Information System UIN Suska Riau
11
01/01/2017Information System UIN Suska Riau
12
Auditors will enter a much expanded arena of
procedures to detect fraud as they implement SAS no.
99. The new standard aims to have the auditor’s
consideration of fraud seamlessly blended into the
audit process and continually updated until the
audit’s completion. SAS no. 99 describes a process in
which the auditor
1) gathers information needed to identify risks of
material misstatement due to fraud,
2) assesses these risks after taking into account an
evaluation of the entity’s programs and controls and
01/01/2017Information System UIN Suska Riau
13CONTINUE
...
If no material effect: Refer matter to
management and ensure implications to other
aspects of audit have been addressed.
If effect is material or undeterminable:
 Consider implications for other aspects
of the audit.
 Discuss with senior management and audit
committee.
 Attempt to determine if material effect.
 Suggest client consult with legal
counsel.
01/01/2017Information System UIN Suska Riau
14
Working papers document criteria used
for assessing fraud risk:
 Where risk factors are identified,
documentation should include.
 those risk factors identified and
 auditor’s response to them.
CONTINUE
...
01/01/2017Information System UIN Suska Riau
15
Payroll fraud:
 Use expression builder to test for
excessive hours worked.
 Use duplicate function to test for
duplicate payments.
 Use join function to link payroll
and employee files to test for non-
existent employees.
01/01/2017Information System UIN Suska Riau
16CONTINUE
...
Lapping Accounts Receivable:
 Use expression builder to locate and
investigate invoices whose Remittance
Amount is less than the Invoice
Amount.
 Calculate the amounts carried forward
and use the duplicates command to
search for carry-forward amounts that
are the same.
01/01/2017Information System UIN Suska Riau
17

More Related Content

What's hot

MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system securityJan Wong
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)Jan Wong
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?ObserveIT
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanResilient Systems
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
HSN Risk Assessment Report
HSN Risk Assessment ReportHSN Risk Assessment Report
HSN Risk Assessment ReportBelinda Edwards
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case StudyPraveen Vackayil
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementDevOps.com
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defensekajal kumari
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansJason Glass, CFA, CISSP
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceJTLeekley
 
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Sharique Rizvi
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementEC-Council
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochurePaul Stabile
 

What's hot (20)

MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
HSN Risk Assessment Report
HSN Risk Assessment ReportHSN Risk Assessment Report
HSN Risk Assessment Report
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defense
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity Plans
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 

Viewers also liked (16)

Slideshare
SlideshareSlideshare
Slideshare
 
Tiferet Parlor Meeting Slides
Tiferet Parlor Meeting SlidesTiferet Parlor Meeting Slides
Tiferet Parlor Meeting Slides
 
horário dos jogos copa das confederações
horário dos jogos copa das confederaçõeshorário dos jogos copa das confederações
horário dos jogos copa das confederações
 
Doc2
Doc2Doc2
Doc2
 
Nmn cv page1 2012
Nmn cv page1 2012Nmn cv page1 2012
Nmn cv page1 2012
 
Peritoneo y Topografía abdominal
Peritoneo y Topografía abdominalPeritoneo y Topografía abdominal
Peritoneo y Topografía abdominal
 
567292326631244
567292326631244567292326631244
567292326631244
 
Trabalho da carol
Trabalho da carolTrabalho da carol
Trabalho da carol
 
Carte Rallye MGD
Carte Rallye MGDCarte Rallye MGD
Carte Rallye MGD
 
BUAT NPIK-TEKSTIL
BUAT NPIK-TEKSTILBUAT NPIK-TEKSTIL
BUAT NPIK-TEKSTIL
 
OnePager Upcyclick
OnePager UpcyclickOnePager Upcyclick
OnePager Upcyclick
 
Who we are
Who we areWho we are
Who we are
 
Handmade christmas cards
Handmade christmas cardsHandmade christmas cards
Handmade christmas cards
 
GLORIAALEXANDERRESUME sales resume
GLORIAALEXANDERRESUME  sales resumeGLORIAALEXANDERRESUME  sales resume
GLORIAALEXANDERRESUME sales resume
 
RESUME-1
RESUME-1RESUME-1
RESUME-1
 
Asdfghh
AsdfghhAsdfghh
Asdfghh
 

Similar to General Model for Accounting Information Systems by Hall

GROUP 11 - FRAUD AUDITING.pptx
GROUP 11 - FRAUD AUDITING.pptxGROUP 11 - FRAUD AUDITING.pptx
GROUP 11 - FRAUD AUDITING.pptxnasyhrp1
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptbm6tkbry4q
 
Finance Internal_Controls presentation ppt
Finance Internal_Controls presentation pptFinance Internal_Controls presentation ppt
Finance Internal_Controls presentation pptbm6tkbry4q
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptKinhDoanhKhoaKinhTe
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptssusere1a0f0
 
Risk Based Supervision file
Risk Based Supervision fileRisk Based Supervision file
Risk Based Supervision fileVithyea You
 
Ch 1 notes the is an accountants perspective
Ch 1 notes the is an accountants perspectiveCh 1 notes the is an accountants perspective
Ch 1 notes the is an accountants perspectiveBernadette Ramos
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrainInfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfSA Consultants UAE
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringJim Kaplan CIA CFE
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
vertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISAvertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISAarjunnegi34
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention Rea & Associates
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 

Similar to General Model for Accounting Information Systems by Hall (20)

GROUP 11 - FRAUD AUDITING.pptx
GROUP 11 - FRAUD AUDITING.pptxGROUP 11 - FRAUD AUDITING.pptx
GROUP 11 - FRAUD AUDITING.pptx
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.ppt
 
Finance Internal_Controls presentation ppt
Finance Internal_Controls presentation pptFinance Internal_Controls presentation ppt
Finance Internal_Controls presentation ppt
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.ppt
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.ppt
 
Risk Based Supervision file
Risk Based Supervision fileRisk Based Supervision file
Risk Based Supervision file
 
Ch 1 notes the is an accountants perspective
Ch 1 notes the is an accountants perspectiveCh 1 notes the is an accountants perspective
Ch 1 notes the is an accountants perspective
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
MIES.pdf
MIES.pdfMIES.pdf
MIES.pdf
 
vertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISAvertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISA
 
chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
1.pdf
1.pdf1.pdf
1.pdf
 
The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual serviceanilsa9823
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Paymentanilsa9823
 
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...aditipandeya
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...anilsa9823
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 
call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666nishakur201
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...aditipandeya
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...anilsa9823
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 

Recently uploaded (16)

CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
 
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 
call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 

General Model for Accounting Information Systems by Hall

  • 1. Oleh : Bambang Setiawan, S.Kom
  • 3. • Data collection frauds involve entering falsified data into the system by deleting, altering or creating a transaction. • Masquerading involves gaining remote access by pretending to be an authorized user. Piggybacking involves latching onto an authorized user in the system. Hacking involves both schemes motivated by the challenge of trying to3 01/01/2017Information System UIN Suska Riau
  • 4. • Data processing: A series of actions or steps performed on data to verify, organize, transform, integrate, and extract data in an appropriate output form for subsequent use. Methods of processing must be rigorously documented to ensure the utility and integrity of the data. • Data processing frauds are in two classes: • Program fraud includes creating illegal programs or destroying, corrupting or altering computer logic to cause data to be CONTINUE ... 01/01/2017Information System UIN Suska Riau 4
  • 5.  Database management fraud involves altering, deleting, corrupting, destroying, or stealing an organization’s data.  Often associated with transaction or program fraud and disgruntled employees who may copy, sell or destroy data. 01/01/2017Information System UIN Suska Riau 5
  • 6. CONTINUE ...  Information generation fraud involves stealing, misdirecting or misusing computer output.  Useful information has: relevance, timeliness, accuracy, completeness and summarization.  Scavenging involves searching for discarded output.  Eavesdropping involves listening to output transmissions over telecommunication lines.01/01/2017Information System UIN Suska Riau 6
  • 7. • Description and characteristics of fraud • Professional skepticism • Engagement personnel discussion • Obtaining audit evidence and information • Identifying risks • Assessing the identified risks • Responding to the assessment • Evaluating audit evidence and information • Communicating possible fraud • Documenting consideration of fraud o Auditor also required to assess risk factors related to fraudulent financial reporting and misappropriation of assets. 01/01/2017Information System UIN Suska Riau 7
  • 8.  Risk factors:  Management’s characteristics and influence over the control environment, industry conditions and operating characteristics and financial stability.  Common schemes:  Improper revenue recognition or treatment of sales.  Improper asset valuation or deferral of costs and expenses.  Improper recording of liabilities.  Inadequate disclosures. 01/01/2017Information System UIN Suska Riau 8
  • 9. Risk factors: Susceptibility of assets to misappropriation and controls. Common schemes: Personal purchases or ghost employees. Fictitious expenses or altered payee. Pass-through vendors. Theft of cash (or inventory). Lapping. 01/01/2017Information System UIN Suska Riau 9
  • 10. Judgments about the risk of material misstatements may affect the audit in regards to: Engagement staffing, extent of supervision, professional skepticism, nature, timing, extent of procedures performed. 01/01/2017Information System UIN Suska Riau 10
  • 11. Risk of material misstatement due to fraud always exists. Auditor:  may determine currently planned audit procedures are sufficient to respond to risk factors.  may determine to extend audit and modify planned procedures.  may conclude procedures cannot be modified sufficiently to address CONTINUE ... 01/01/2017Information System UIN Suska Riau 11
  • 12. 01/01/2017Information System UIN Suska Riau 12 Auditors will enter a much expanded arena of procedures to detect fraud as they implement SAS no. 99. The new standard aims to have the auditor’s consideration of fraud seamlessly blended into the audit process and continually updated until the audit’s completion. SAS no. 99 describes a process in which the auditor 1) gathers information needed to identify risks of material misstatement due to fraud, 2) assesses these risks after taking into account an evaluation of the entity’s programs and controls and
  • 13. 01/01/2017Information System UIN Suska Riau 13CONTINUE ... If no material effect: Refer matter to management and ensure implications to other aspects of audit have been addressed. If effect is material or undeterminable:  Consider implications for other aspects of the audit.  Discuss with senior management and audit committee.  Attempt to determine if material effect.  Suggest client consult with legal counsel.
  • 14. 01/01/2017Information System UIN Suska Riau 14 Working papers document criteria used for assessing fraud risk:  Where risk factors are identified, documentation should include.  those risk factors identified and  auditor’s response to them. CONTINUE ...
  • 15. 01/01/2017Information System UIN Suska Riau 15 Payroll fraud:  Use expression builder to test for excessive hours worked.  Use duplicate function to test for duplicate payments.  Use join function to link payroll and employee files to test for non- existent employees.
  • 16. 01/01/2017Information System UIN Suska Riau 16CONTINUE ... Lapping Accounts Receivable:  Use expression builder to locate and investigate invoices whose Remittance Amount is less than the Invoice Amount.  Calculate the amounts carried forward and use the duplicates command to search for carry-forward amounts that are the same.