Fraud watch!
Article Abstract:
An accountant concludes that fraud is commonplace occurrence and recounts the cases of fraud that he has encountered. These include a forged check, a fraudulent foreign payment, an amended payment, fictitious sick pay, a fraudulent invoice, employee theft, fictitious invoices made by a company's trusted accountant, altered stock figures, fraudulent self-billing and employee theft. These experiences have taught the accountant that fraud can often be detected using routine procedures, that sound management and common sense can offset inadequate formal controls, and that poor records should always be verified. He has learned other valuable lessons, including the importance of locking up check books, checking bank statements, paying attention to documents being signed and educating staff about potential dangers.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1998
User Contributions:
Comment about this article or add new information about this topic:
Countering computer fraud: what computer frauds have been committed in the UK?
Article Abstract:
The results of a Information Technology Group report on computer fraud in Great Britain are discussed. Major trends in the area of computer fraud include: an increase in the number of frauds associated with input, and a decrease in the number of frauds associated with misuse of computer resources. Most computer frauds were discovered through internal control systems, although about one-third were discovered by accident. A roughly equal number of computer frauds were committed by clerical and supervisory employees who occupied trusted positions. Respondents in over half of all companies surveyed believed themselves to have been victims of fraud or open to fraud in the future. The main problem in any computer fraud investigation is determining how the fraud initially occurred.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1987
User Contributions:
Comment about this article or add new information about this topic:
Security matters
Article Abstract:
Companies do not spend enough effort in maintaining the security of computer software and data. A survey in Great Britain found that only 29% of International Business Machines mainframe installations use any commercially-available security software. The security risks include: natural disasters; deliberate actions such as sabotage; equipment failures; and human error. The accidental destruction of data is more common that external breaches of security. An effective security system should include: on-line monitoring of computer access activities; limited access to a specific group of terminals; and systems to prevent unauthorized program use.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1988
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: What managers should know about computer security. How to value a small business. A guide to the corporate audit report
- Abstracts: Start-ups. Franchising has its dark side
- Abstracts: Hard times. Accounting and its prospects. Where on earth to next?
- Abstracts: Structure and agency in management accounting research: a response to Boland's interpretive act. Management accounting and the workplace in the United States and Great Britain
- Abstracts: How to avoid D&O liability losses. Financing your primary liability coverage cost-effectively. D&O liability - new protection