Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
CHAPTER 2
CHAPTER 3
ETHICS AND FRAUD
1. Define ethics and computer ethics
2. Discuss computer ethics in regards with these concerns:
a. Privacy
b. Security
c. Ownership of property
d. Equity in access
e. Environment
f. Artificial intelligent
g. Unemployment and displacement
h. Misuse of computer
3. How a public company may display its code of ethics
4. SEC require the company to address the following concerns in its written code of ethics
in compliance with Section 406.Discuss
a. Conflicts of interest
b. Full and fair disclosure
c. Legal compliance
d. Accountability
5. Explain 5 conditions should be met to define fraud
6. Differentiate between employee frauds and management frauds
7. Explain fraud triangle
8. List any red flags questions used by auditors in evaluating any indicators of fraud cases
9. Describe 3 broad categories of fraud schemes
10. Why frauds cases still occur despite the laws and regulations implemented.
11. The SOX has been established to reform the regulation of public company auditing.
Discuss
12. Discuss 4 type of corruptions
13. Describe these types of fraud scheme
a. Skimming
b. Lapping
c. billing scheme
d. check tampering
e. payroll fraud
f. expense reimbursement
g. theft of cash
h. non-cash misappropriation
i. computer fraud
14. provide example of billing scheme
CHAPTER 3
INTERNAL CONTROL
1. List the objectives of internal control.
2. Explain 4 modifying assumptions about internal control objectives.
3. Explain 3 levels of internal control
4. Describe COSO Internal control Framework. Explain its five components
5. Explain 2 broad groups of IT controls
6. Discuss 6 categories of physical control activities.
7. Identify 3 accounting duties need to be segregated. Provide example.
8. Explain 3 objectives of segregation of duties.
9. What is check digit? Compare and contrast between transcription and transposition error
10. Explain these input controls. Provide example
a. Missing data check
b. Numeric-alphabetic check
c. Limit check
d. Range check
e. Reasonableness check
f. Validity check
11. Discuss three common processing controls
12. Master backup controls can be applied in general control or application control. Discuss
the master file backup controls in these 3 types of flat file system:
a. Batch processing using sequential files
b. Batch processing using direct access files
c. Real time processing systems
13. Suggest the controls to be applied in these output product and distribution
a. Output spooling
b. Print programs
c. Waste
d. Report distribution
e. End user controls