For each of the following situations involving computer fraud, briefly describe the following: a. A control procedure

Question:

For each of the following situations involving computer fraud, briefly describe the following:

a. A control procedure that would have been effective in preventing or detecting the fraud.

b. An audit procedure that would have detected the fraud.


Computer Frauds

a. A computer programmer added a module to the payroll program that started with an "IF" statement to identify his employee number. If it were his record, the program was instructed to multiply computed pay by 1.5, thus increasing the programmer's pay by 50%.

b. A state health and social services department made support payments to needy residents. A resident could be input into the system only on the recommendation of a supervising caseworker. Some caseworkers entered fictitious residents on the system and had support payments sent to authorized addresses. The caseworkers then cashed the support payments and eventually transferred the cash to their own accounts.

c. A student posed as a newspaper reporter doing a story on a phone company's data processing center. After leaving the center, he noticed a data processing manual that had been discarded. He took the manual home and learned the access code to the company's parts-repair system. He could then log on and have repair parts delivered to a specific location. Later he picked up the parts, which he sold back to the company and to other customers.

d. A manufacturing company required all its hourly workers to sign in by passing their personal identification cards across an automated time clock that captured the data and transmitted it to the computer for subsequent processing. An employee who worked the first shift arranged with her brother, who worked the second shift, to use her card to sign out when he completed his work shift. The employee thus generated pay for 16 hours per day, one-half at overtime rates.

The employee and her brother split the additional pay.

e. A disgruntled programmer often came to the office in the evenings to copy confidential client data such as customer lists, discounts, and so forth onto magnetic tapes, which he sold to competitors at handsome prices.


Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Auditing a business risk appraoch

ISBN: 978-0324375589

6th Edition

Authors: larry e. rittenberg, bradley j. schwieger, karla m. johnston

Question Posted: