Professional Documents
Culture Documents
a computer or system.
The general model for accounting information systems, conceptually, the key stages of an information
system. Each stage in the model is a potential area of risk for certain types of computer fraud.
Data Collection objective is to ensure that transaction data entering the system are valid, complete, and
free from material errors.
Data Processing
2 classes of frauds:
Program Fraud - it involves stealing small amounts of assets from a large number of sources without
noticeably reducing the whole.
Operations Fraud is the misuse or theft of the firms computer resources. This often involves using the
computer to conduct personal business.
Database Management
- Database is the organizations physical repository for financial and non-financial data.
Database Management Frauds include altering, deleting, corrupting, destroying, or stealing data.
Ex: logic bomb malware that is triggered by a response to an event, such as launching an application or
when a specific date/time is reached.
Information Generation is the process of compiling, arranging, formatting, and presenting information to
users.
Useful information has the following characteristics:
Relevance, Timeliness, Accuracy, Completeness, and Summarization.
Frauds:
Scavenging securing information by searching trash barrels for copies of discarded computer listings or
carbon papers from multiple-part forms used in input.
Eavesdropping - listening to output transmissions over telecommunications lines.