download

4838 Wilkinson Apps pp 203-241 8/9/99 10:04 AM Page 206
CD–206
•
APPENDIX 7.2
A Certified Fraud Examiner (CFE) is often contacted
to conduct a scientific fraud investigation. The CFE’s first
step is to gather and analyze the relevant data to determine whether predication is sufficient to proceed further. Sufficient predication is the basis for creating a
hypothesis of a specific fraud. That is, the CFE, based on
an evaluation of the initial fraud indicators, decides
whether enough evidence exists to proceed further. The
next step is to test the hypothesis by gathering sufficient
evidence through interviews, document examinations,
and observation. At the conclusion of evidence gathering, the CFE prepares a written report that does or does
not support the allegation of fraud or is inconclusive. If
warranted, the case is turned over to an attorney, who
works closely with the CFE to prosecute the case.
Fraud and Computer Crime Prevention Safeguards
With the massive number of cases of insider theft, fraud,
embezzlement, and other crimes reported in the media,
management should take proper action to prevent, detect, and deter these risk exposures. Firms should establish and enforce strong soft controls, including a written
code of professional conduct, ethics, and personnel
policies. Ethical principles should receive increased attention throughout the organization. Sound personnel
policies and controls, such as reference checks on employment applications, should be enforced. The corporate audit committee should be independent of
management and should closely monitor stakeholders’
interests. A properly developed internal audit function,
adequately staffed, can significantly reduce the probability of fraud and other computer crimes. Internal auditors should complete training courses on fraud and
computer crime, such as those offered by the Association of Certified Fraud Examiners of Austin, Texas. In addition, internal auditors and other accountants involved
in the audit function should be encouraged to become
Certified Fraud Examiners. A CFE is trained in criminology, legal elements of fraud, interrogation and investigative matters, and financial fraud.
Respondents to KPMG’s 1998 Fraud Survey have documented policies and procedures they follow for dealing
with fraud. The reported safeguards and controls and the
percentage of responding firms reporting them are as
follows.*
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
A corporate code of conduct (75%)
Reference checks on new employees (65%)
Employment contracts (48%)
Review and improvement of internal controls (47%)
Fraud audit (42%)
Ethics training (41%)
Training courses in fraud prevention and detection
(31%)
Surveillance equipment (30%)
Increased focus of senior management on the problem (29%)
Enhanced surveillance equipment (27%)
Code of sanctions against suppliers/contractors (26%)
Increased role of audit committee (16%)
Surveillance of electronic correspondence (15%)
Increased budget for internal audit (13%)
Staff rotation policy (11%)
Increased budget for security department (9%)
Although such crimes can never be eliminated, organizations that adopt the above safeguards can dramatically reduce their vulnerability.
*http://www.us.KPMG.com, p. 1.
APPENDIX 7.2
COMPUTER VIRUSES AND RELATED RISKS
A potentially significant risk exposure to information
stored on microcomputers and local-area networks
(LANs) is a computer virus. More than 17,000 computer
virus strains have been documented, and new ones appear daily. Most viruses have static or unchanging structures that render them relatively easy to detect and
destroy with the use of anti-virus software. Anti-virus software checks for, finds, and removes most types of viruses.
A computer virus is a computer program that copies
or attaches itself to a program file and causes either the
display of prankish messages or the destruction of data,
such as erasing all the files on a hard disk. Most com-
puter viruses attach themselves to either executable or
document program files.
Currently, macro viruses, which attach to document
files of word processing software packages, such as Microsoft Word, are the fastest growing viruses with thousands of documented strains. These viruses are easy to
write and easy to spread; they usually enter a PC via
e-mail attachments received from the Internet. They,
along with other types of viruses, can also be introduced
into a microcomputer or a LAN when an infected floppy
disk is copied onto a hard disk. Once attached to an executable or document file, a computer virus can remain