b). Accountants and auditors should have a profound understanding of computer fraud- Yes/ No
c). There is a need for physical security to be improved in an organizations computer room- Yes/ No
d). There is a need to restrict access to computers that are used in computing in an accounting environment- Yes/ No
e). There is a need for controls that will only ensure that only authorized individuals can log into computers that are used in accounting- Yes/ No
f). A password approach will ensure that security of computer systems used in accounting is bolstered- Yes/ No
g). Use of magnetically encoded cards for accessing computer systems will play a major role in addressing the problem of computer fraud in the accounting environment- Yes/No
h). Use of hand geometry, matching of signatures and matching of voiceprints to enhance the security of computer systems Yes/ No
What are the characteristics of computerized accounting systems in your company?
What are the special features of computerized accounting systems that make them more susceptible to crime?
Deliberate misrepresentation of financial statements- Yes/No
Individuals with authority overriding an organizations internal controls-Yes/No
Intentional distortion of accounting records- Yes/No
Misapplication of accounting principles- Yes/No
Falsification of business transactions- Yes/No
Perpetrators do their best to conceal irregularities that stem from their deeds- Yes/No
What are the special characteristics of computerized accounting systems that make them more susceptible to crime?
High levels of Connectivity- Yes/No
Concentrated data-Yes/No
Positions of trust-Yes/No
What are the characteristics of individuals who are likely to commit fraud in an accounting environment?
a). Employees who are in positions of responsibility in data processing- Yes/No
b). Employees who are in positions of responsibility in accounting departments- Yes/ No
c). Employees with a low level of personal integrity-Yes/No
d). Employees with a high level of personal integrity- Yes/ No
e). Employees who are exposed to high levels of opportunities to commit computer fraud- Yes/No
f). Employees who are exposed to low levels of opportunities to commit computer fraud- Yes/No
g). Employees who are exposed to high levels of pressure to commit computer fraud- Yes/No
h). Employees who are exposed to low levels of pressure to commit computer fraud- Yes/No
Is computer aided fraud detection used in your companys accounting environment?
a). Does data mining computer fraud detection technique get used in your company?- Yes/No
b). Does ratio analysis computer fraud detection technique get used in your company? - Yes/No
c). Does computer forensics get used in your company to detect computer fraud in the accounting environment- Yes/No
What information technology crime laws are in existence in UAE?
a). Do you know of any information technology crime laws in UAE? Yes/No
b). Do you know a maximum of three information technology crime laws in UAE?- Yes/No
c). Do you know a minimum of three information technology crime laws in UAE?- Yes/No
How can computer fraud in your companys accounting environment be prevented?
Cite this page
Questions on Computing Fraud in Accounting - Paper Example. (2021, Jun 14). Retrieved from https://midtermguru.com/essays/questions-on-computing-fraud-in-accounting-paper-example
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Annotated Bibliography on Project Managment
- Responses to Observation Letters on Personal Safety of Social Workers
- Analysis of Internal and External Environment of a Company - Paper Example
- Rational Strategic Planning - Essay Example
- Paper Example on Safety and Quality Outcome
- Paper Example on Leadership Style and Organizational Culture
- Entrepreneurial Leadership and Management: Keys to Business Success - Essay Sample