Ch11 - 12 Etika Bisnis, Skema Fraud Dan Pendeteksinya
Ch11 - 12 Etika Bisnis, Skema Fraud Dan Pendeteksinya
Ch11 - 12 Etika Bisnis, Skema Fraud Dan Pendeteksinya
Introduction to Business
Ethics and Fraud
Ethical Development
Ø Most people develop a personal code of ethics from
family, formal education, and personal experience
Ø Go through stages of moral evolution [Figure 11-2]
Ethical Principles
Ø Proportionality: Benefits of a decision must outweigh the
risks. Choose least risky option.
Ø Justice: Distribute benefits of decision fairly to those who
share risks. Those who do not benefit should not carry any
risk
Ø Minimize Risk: Minimize all risks.
IT Auditing & Assurance, 2e, Hall & Singleton
COMPUTER ETHICS
The analysis of the nature and social impact
of computer technology and the
corresponding formulation and justification
of policies for the ethical use of such
technology.
Levels of Computer Ethics
q POP: the exposure to stories and reports in popular media
q PARA: taking a real interest in computer ethics cases and
acquiring some level of skill and knowledge
q THEORETICAL: multi-disciplinary researchers who apply the
theories of philosophy, sociology, and psychology to computer
science, intending to bring some new understanding to the field.
That is, ethics research.
1. False representation
2. Material fact
3. Intent
4. Justifiable reliance
5. Injury or loss
Ø Financial fraud
1. Does not involve direct theft of assets
2. Often objective is to obtain higher stock price (i.e., financial fraud)
3. Typically involves misstating financial data to gain additional
compensation, promotion, or escape penalty for poor performance
4. Often escapes detection until irreparable harm has been done
5. Usually, perpetrator is executive management
Ø Corruption fraud
1. Bribery, etc.
Ø Employee Theft
1) Theft of asset
2) Conversion of asset (to cash, to
fraudster)
3) Concealment of fraud
Ø Financial fraud
1. Does not involve direct theft of assets
2. Often objective is to obtain higher stock price (i.e., financial fraud)
3. Typically involves misstating financial data to gain additional
compensation, promotion, or escape penalty for poor performance
4. Often escapes detection until irreparable harm has been done
5. Usually, perpetrator is executive management
Ø Corruption fraud
1. Bribery, etc.
Ø Payroll fraud
q Test for excessive hours worked
q Test for duplicate payments
q Tests for non-existent employee
Ø Lapping A.R.