principle of separating duties remains the same; the only difference is that the computer, not a human, performs the function. For example, gas stations are now equipped with pumps that allow customers to insert a credit card to pay for their gas. In such cases, the computer performs both the custody of the "cash" and the recording function. In addition to improving internal controls, these machines actually improve the process of serving the customer by increasing convenience and eliminating lines to pay for the gas.
In a system that incorporates an effective separation of duties, it should be difficult for any single employee to commit embezzlement successfully. Detecting fraud where two or more people are in collusion to ovemde te preventive aspect of the internal control system is more difficult. When two or more people work together, is much it easier for perpetrators to con the fraud. For example, two women employed b a credit card company colluded to steal funds. One woman was authorized to set up credit card accounts, the other to write of unpaid accounts of less than $1.000. The first woman created a new account for each of them using fictitious data. When the amounts outstanding neared the $1.000 limit, the woman in collections wrote them off The first woman would then create two new cards. and the process would be repeated. The women were caught when the jilted boyfriend of one of them sought revenge. He called the credit card and disclosed the fraudulent scheme. company Employees can collude with other employees or they can collude with the com- pany's customers or vendors. The most frequent forms of employee/vendor collusion include billing at inflated prices, performing substandard work and receiving full pay- ment. payment for nonperformance. duplicate billings. and improperly funneling more work to, or purchasing more goods from, colluding company. The most frequent a forms of employee/customer collusion include unauthorized loans or insurance pay ments, receipt of assets or services at unauthorized discount prices. forgiveness of amounts owed, and unauthorized extension of due dates
Segregation of Systems Duties
In a highly integrated in system. procedures once performed by separate indi viduals are combined. Therefore, any person who has unrestricted access to the com puter its programs. and live data could have the opportunity to perpetrate and conceal fraud To combat this threat, organizations must implement control procedures such as the effective segregation of systems duties within the information system function. Authority and responsibility must be divided clearly among the following functions:
1 systems administration. Systems administrators are responsible for ensuring that the different parts of an information system operate smoothly and efficiently.
2 Network management. Network managers ensure that all applicable devices are linked to the organization's intemal and external networks and that the networks operate continuously and p 3 Security management. Security management ensures that all aspects of the system are secure and protected from all internal and external threats.
4 Change management. These individuals manage all changes to an organiza tion's information system to ensure they are made smoothly and efficiently and to prevent errors and fraud
5 users. Users record transactions. authorize data to be processed, and use sys tem output.
6 systems analysis. Systems analysts help users determine their information needs and then design an information system to meet those needs.
7 Programming. Programmers take the design provided by systems analysts and create an information system by writing the computer programs.
8 Computer operations. Computer operators run the software the com on pany's computers. They ensure that data are input properly and correctly processed and needed output is produced.
9 Information system library. The information system librarian maintains cus- tody of corporate databases, files, and programs in a separate storage area called the information system library