期刊文献+

The usage of technology in preventing and detecting fraud

The usage of technology in preventing and detecting fraud
下载PDF
导出
摘要 Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsible for detection, determination of fraud and use of anti-fraud programs. With rapid developments in information, communication and technology, it is no surprise that companies grow and secure IT system, but with the development of technology was developed and fraud schemes. Detection or not the auditor of the fraud, not fulfilling his work reflects you, or not drafting of a plan audit standards and procedures, but he has to do with personal ability auditor, to analyze the findings during the audit, use of tests, the natural limitations of internal control and the fact that most of the findings of the auditor of nature are more persuasive than effective. When you conduct an audit, auditor has a professional skeptic attitude that considers the risk of circumvention of control procedures by management and recognizes that simple fact, the audit procedures that are effective in connection with the discovery of errors, are not suitable for detection and identification fraud. This requires from the auditor to establish a procedure for considering the risk of fraud, in order to detect the exact appearance not as a result of fraud. A particular impact has The Model of Fraud Detection Strategy, as an 8 steps model for identifying fraud, using IT to collect, define and analyze the data and anomalies that highlight indicators of fraud.
机构地区 Faculty of Economics
出处 《Chinese Business Review》 2010年第9期22-30,共9页 中国经济评论(英文版)
关键词 FRAUD TECHNOLOGY skeptic attitude 使用技术 反欺诈 预防 审计人员 检测模型 侦查 程序使用 信息通信技术
  • 相关文献

参考文献10

  • 1ACFE. (2007). Report to the nation on occupational, fraud and abuse. (Inter Business Issues, August).
  • 2Albrecht, W. S. & Willingham, J. J.. (1993). The auditor's responsibility to detect and report errors and irregularities. Evaluation of SAS No. 53.
  • 3Albrecht, W. S., Wernz, G. W. & Williams, T. L.. (1995). Fraud." Bringing light to the dark side of business. New York: Irwin Professional Publishing, 56-59,118-119.
  • 4American Institute of Certified Public Accountants (AICPA). (1993). The expectation gap standards issues, research opportunities. New York: Amer Inst of Certified Public.
  • 5Association of Fraud Examiners. (2007). Fraud examiners manual. Association of Certified Fraud Examiners, Inc.
  • 6Bologna, G. J. & Linquist, R. J.. (1995). Fraud auditing andforensic accounting. New York: John Wiley & Sons. Dominique, G.. (2009, July/August). Fraud--IT internal audit can make a difference.
  • 7Elliot, R. K. & Willinham, J. J.. (1980). Management fraud: Detection and deterrence. New York: Terocelli Books, Inc., 4.
  • 8IT Governance Institute. (2007). COBIT 4.1.
  • 9KPMG. (2004). Managing the business risk of fraud: A practical guide. Retrieved from http://en.wikipedia.org/wiki/Data Analysis Techniques for Fraud_Detection.
  • 10The Auditing Standards Board. (2002). Consideration offraud in afinancial statement audit. SAS 99, American Institute of Certified Public Accountants.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部