SlideShare a Scribd company logo
1 of 17
Oleh : Bambang Setiawan, S.Kom
01/01/2017Information System UIN Suska Riau
2
• Data collection frauds involve entering
falsified data into the system by
deleting, altering or creating a
transaction.
• Masquerading involves gaining remote
access by pretending to be an
authorized user. Piggybacking involves
latching onto an authorized user in the
system. Hacking involves both schemes
motivated by the challenge of trying to3 01/01/2017Information System UIN Suska Riau
• Data processing: A series of actions or steps
performed on data to verify, organize,
transform, integrate, and extract data in an
appropriate output form for subsequent use.
Methods of processing must be rigorously
documented to ensure the utility and integrity
of the data.
• Data processing frauds are in two classes:
• Program fraud includes creating illegal
programs or destroying, corrupting or
altering computer logic to cause data to be
CONTINUE
...
01/01/2017Information System UIN Suska Riau
4
 Database management fraud involves altering,
deleting, corrupting, destroying, or stealing an
organization’s data.
 Often associated with transaction or program
fraud and disgruntled employees who may copy,
sell or destroy data.
01/01/2017Information System UIN Suska Riau
5
CONTINUE
...
 Information generation fraud involves stealing,
misdirecting or misusing computer output.
 Useful information has: relevance,
timeliness, accuracy, completeness and
summarization.
 Scavenging involves searching for discarded
output.
 Eavesdropping involves listening to output
transmissions over telecommunication lines.01/01/2017Information System UIN Suska Riau
6
• Description and characteristics of fraud
• Professional skepticism
• Engagement personnel discussion
• Obtaining audit evidence and information
• Identifying risks
• Assessing the identified risks
• Responding to the
assessment
• Evaluating audit evidence
and information
• Communicating possible
fraud
• Documenting consideration
of fraud
o Auditor also required to assess risk factors
related to fraudulent financial reporting and
misappropriation of assets. 01/01/2017Information System UIN Suska Riau
7
 Risk factors:
 Management’s characteristics and
influence over the control
environment, industry conditions and
operating characteristics and
financial stability.
 Common schemes:
 Improper revenue recognition or
treatment of sales.
 Improper asset valuation or deferral
of costs and expenses.
 Improper recording of liabilities.
 Inadequate disclosures. 01/01/2017Information System UIN Suska Riau
8
Risk factors:
Susceptibility of assets to
misappropriation and controls.
Common schemes:
Personal purchases or ghost employees.
Fictitious expenses or altered payee.
Pass-through vendors.
Theft of cash (or inventory).
Lapping.
01/01/2017Information System UIN Suska Riau
9
Judgments about the risk of material
misstatements may affect the audit in
regards to:
Engagement staffing, extent of
supervision, professional
skepticism, nature, timing, extent
of procedures performed.
01/01/2017Information System UIN Suska Riau
10
Risk of material misstatement due to
fraud always exists. Auditor:
 may determine currently planned
audit procedures are sufficient to
respond to risk factors.
 may determine to extend audit and
modify planned procedures.
 may conclude procedures cannot be
modified sufficiently to address
CONTINUE
...
01/01/2017Information System UIN Suska Riau
11
01/01/2017Information System UIN Suska Riau
12
Auditors will enter a much expanded arena of
procedures to detect fraud as they implement SAS no.
99. The new standard aims to have the auditor’s
consideration of fraud seamlessly blended into the
audit process and continually updated until the
audit’s completion. SAS no. 99 describes a process in
which the auditor
1) gathers information needed to identify risks of
material misstatement due to fraud,
2) assesses these risks after taking into account an
evaluation of the entity’s programs and controls and
01/01/2017Information System UIN Suska Riau
13CONTINUE
...
If no material effect: Refer matter to
management and ensure implications to other
aspects of audit have been addressed.
If effect is material or undeterminable:
 Consider implications for other aspects
of the audit.
 Discuss with senior management and audit
committee.
 Attempt to determine if material effect.
 Suggest client consult with legal
counsel.
01/01/2017Information System UIN Suska Riau
14
Working papers document criteria used
for assessing fraud risk:
 Where risk factors are identified,
documentation should include.
 those risk factors identified and
 auditor’s response to them.
CONTINUE
...
01/01/2017Information System UIN Suska Riau
15
Payroll fraud:
 Use expression builder to test for
excessive hours worked.
 Use duplicate function to test for
duplicate payments.
 Use join function to link payroll
and employee files to test for non-
existent employees.
01/01/2017Information System UIN Suska Riau
16CONTINUE
...
Lapping Accounts Receivable:
 Use expression builder to locate and
investigate invoices whose Remittance
Amount is less than the Invoice
Amount.
 Calculate the amounts carried forward
and use the duplicates command to
search for carry-forward amounts that
are the same.
01/01/2017Information System UIN Suska Riau
17

More Related Content

What's hot

MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
Jan Wong
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
Yaser Alrefai
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Jason Glass, CFA, CISSP
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
Paul Stabile
 

What's hot (20)

MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
HSN Risk Assessment Report
HSN Risk Assessment ReportHSN Risk Assessment Report
HSN Risk Assessment Report
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defense
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity Plans
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 

Viewers also liked

horário dos jogos copa das confederações
horário dos jogos copa das confederaçõeshorário dos jogos copa das confederações
horário dos jogos copa das confederações
Karlla Costa
 
OnePager Upcyclick
OnePager UpcyclickOnePager Upcyclick
OnePager Upcyclick
Rosa Durá
 
GLORIAALEXANDERRESUME sales resume
GLORIAALEXANDERRESUME  sales resumeGLORIAALEXANDERRESUME  sales resume
GLORIAALEXANDERRESUME sales resume
gloria alexander
 

Viewers also liked (16)

Slideshare
SlideshareSlideshare
Slideshare
 
Tiferet Parlor Meeting Slides
Tiferet Parlor Meeting SlidesTiferet Parlor Meeting Slides
Tiferet Parlor Meeting Slides
 
horário dos jogos copa das confederações
horário dos jogos copa das confederaçõeshorário dos jogos copa das confederações
horário dos jogos copa das confederações
 
Doc2
Doc2Doc2
Doc2
 
Nmn cv page1 2012
Nmn cv page1 2012Nmn cv page1 2012
Nmn cv page1 2012
 
Peritoneo y Topografía abdominal
Peritoneo y Topografía abdominalPeritoneo y Topografía abdominal
Peritoneo y Topografía abdominal
 
567292326631244
567292326631244567292326631244
567292326631244
 
Trabalho da carol
Trabalho da carolTrabalho da carol
Trabalho da carol
 
Carte Rallye MGD
Carte Rallye MGDCarte Rallye MGD
Carte Rallye MGD
 
BUAT NPIK-TEKSTIL
BUAT NPIK-TEKSTILBUAT NPIK-TEKSTIL
BUAT NPIK-TEKSTIL
 
OnePager Upcyclick
OnePager UpcyclickOnePager Upcyclick
OnePager Upcyclick
 
Who we are
Who we areWho we are
Who we are
 
Handmade christmas cards
Handmade christmas cardsHandmade christmas cards
Handmade christmas cards
 
GLORIAALEXANDERRESUME sales resume
GLORIAALEXANDERRESUME  sales resumeGLORIAALEXANDERRESUME  sales resume
GLORIAALEXANDERRESUME sales resume
 
RESUME-1
RESUME-1RESUME-1
RESUME-1
 
Asdfghh
AsdfghhAsdfghh
Asdfghh
 

Similar to General Model for Accounting Information Systems by Hall

FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.ppt
ssusere1a0f0
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
yaseraljohani
 

Similar to General Model for Accounting Information Systems by Hall (20)

GROUP 11 - FRAUD AUDITING.pptx
GROUP 11 - FRAUD AUDITING.pptxGROUP 11 - FRAUD AUDITING.pptx
GROUP 11 - FRAUD AUDITING.pptx
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.ppt
 
Finance Internal_Controls presentation ppt
Finance Internal_Controls presentation pptFinance Internal_Controls presentation ppt
Finance Internal_Controls presentation ppt
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.ppt
 
FIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.pptFIN-Internal_Controls_Primer_Presentation.ppt
FIN-Internal_Controls_Primer_Presentation.ppt
 
Risk Based Supervision file
Risk Based Supervision fileRisk Based Supervision file
Risk Based Supervision file
 
Ch 1 notes the is an accountants perspective
Ch 1 notes the is an accountants perspectiveCh 1 notes the is an accountants perspective
Ch 1 notes the is an accountants perspective
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
 
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
 
MIES.pdf
MIES.pdfMIES.pdf
MIES.pdf
 
vertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISAvertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISA
 
chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
1.pdf
1.pdf1.pdf
1.pdf
 
The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention The Importance of Internal Controls in Fraud Prevention
The Importance of Internal Controls in Fraud Prevention
 

Recently uploaded

Indian Call girl in Dubai 0508644382 Dubai Call girls
Indian Call girl in Dubai 0508644382 Dubai Call girlsIndian Call girl in Dubai 0508644382 Dubai Call girls
Indian Call girl in Dubai 0508644382 Dubai Call girls
Monica Sydney
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
ZurliaSoop
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
dollysharma2066
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Smartinfologiks
 
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
Health
 

Recently uploaded (15)

Supply Chain Location Decision and Management
Supply Chain Location Decision and ManagementSupply Chain Location Decision and Management
Supply Chain Location Decision and Management
 
Indian Call girl in Dubai 0508644382 Dubai Call girls
Indian Call girl in Dubai 0508644382 Dubai Call girlsIndian Call girl in Dubai 0508644382 Dubai Call girls
Indian Call girl in Dubai 0508644382 Dubai Call girls
 
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
 
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDCCARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
 
How to structure your pitch - B4i template
How to structure your pitch - B4i templateHow to structure your pitch - B4i template
How to structure your pitch - B4i template
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
 
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSESEXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsail
 
How Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxHow Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptx
 
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
 

General Model for Accounting Information Systems by Hall

  • 1. Oleh : Bambang Setiawan, S.Kom
  • 3. • Data collection frauds involve entering falsified data into the system by deleting, altering or creating a transaction. • Masquerading involves gaining remote access by pretending to be an authorized user. Piggybacking involves latching onto an authorized user in the system. Hacking involves both schemes motivated by the challenge of trying to3 01/01/2017Information System UIN Suska Riau
  • 4. • Data processing: A series of actions or steps performed on data to verify, organize, transform, integrate, and extract data in an appropriate output form for subsequent use. Methods of processing must be rigorously documented to ensure the utility and integrity of the data. • Data processing frauds are in two classes: • Program fraud includes creating illegal programs or destroying, corrupting or altering computer logic to cause data to be CONTINUE ... 01/01/2017Information System UIN Suska Riau 4
  • 5.  Database management fraud involves altering, deleting, corrupting, destroying, or stealing an organization’s data.  Often associated with transaction or program fraud and disgruntled employees who may copy, sell or destroy data. 01/01/2017Information System UIN Suska Riau 5
  • 6. CONTINUE ...  Information generation fraud involves stealing, misdirecting or misusing computer output.  Useful information has: relevance, timeliness, accuracy, completeness and summarization.  Scavenging involves searching for discarded output.  Eavesdropping involves listening to output transmissions over telecommunication lines.01/01/2017Information System UIN Suska Riau 6
  • 7. • Description and characteristics of fraud • Professional skepticism • Engagement personnel discussion • Obtaining audit evidence and information • Identifying risks • Assessing the identified risks • Responding to the assessment • Evaluating audit evidence and information • Communicating possible fraud • Documenting consideration of fraud o Auditor also required to assess risk factors related to fraudulent financial reporting and misappropriation of assets. 01/01/2017Information System UIN Suska Riau 7
  • 8.  Risk factors:  Management’s characteristics and influence over the control environment, industry conditions and operating characteristics and financial stability.  Common schemes:  Improper revenue recognition or treatment of sales.  Improper asset valuation or deferral of costs and expenses.  Improper recording of liabilities.  Inadequate disclosures. 01/01/2017Information System UIN Suska Riau 8
  • 9. Risk factors: Susceptibility of assets to misappropriation and controls. Common schemes: Personal purchases or ghost employees. Fictitious expenses or altered payee. Pass-through vendors. Theft of cash (or inventory). Lapping. 01/01/2017Information System UIN Suska Riau 9
  • 10. Judgments about the risk of material misstatements may affect the audit in regards to: Engagement staffing, extent of supervision, professional skepticism, nature, timing, extent of procedures performed. 01/01/2017Information System UIN Suska Riau 10
  • 11. Risk of material misstatement due to fraud always exists. Auditor:  may determine currently planned audit procedures are sufficient to respond to risk factors.  may determine to extend audit and modify planned procedures.  may conclude procedures cannot be modified sufficiently to address CONTINUE ... 01/01/2017Information System UIN Suska Riau 11
  • 12. 01/01/2017Information System UIN Suska Riau 12 Auditors will enter a much expanded arena of procedures to detect fraud as they implement SAS no. 99. The new standard aims to have the auditor’s consideration of fraud seamlessly blended into the audit process and continually updated until the audit’s completion. SAS no. 99 describes a process in which the auditor 1) gathers information needed to identify risks of material misstatement due to fraud, 2) assesses these risks after taking into account an evaluation of the entity’s programs and controls and
  • 13. 01/01/2017Information System UIN Suska Riau 13CONTINUE ... If no material effect: Refer matter to management and ensure implications to other aspects of audit have been addressed. If effect is material or undeterminable:  Consider implications for other aspects of the audit.  Discuss with senior management and audit committee.  Attempt to determine if material effect.  Suggest client consult with legal counsel.
  • 14. 01/01/2017Information System UIN Suska Riau 14 Working papers document criteria used for assessing fraud risk:  Where risk factors are identified, documentation should include.  those risk factors identified and  auditor’s response to them. CONTINUE ...
  • 15. 01/01/2017Information System UIN Suska Riau 15 Payroll fraud:  Use expression builder to test for excessive hours worked.  Use duplicate function to test for duplicate payments.  Use join function to link payroll and employee files to test for non- existent employees.
  • 16. 01/01/2017Information System UIN Suska Riau 16CONTINUE ... Lapping Accounts Receivable:  Use expression builder to locate and investigate invoices whose Remittance Amount is less than the Invoice Amount.  Calculate the amounts carried forward and use the duplicates command to search for carry-forward amounts that are the same.