Fraud Investigation
The extensive use of ICT in today's business implies that evidence is extremely likely to be available for verification and confirmation as to an occurrence of a fraud. Evidence collected on ICT systems could well be used to sustain the occurrence of a fraud case. IT auditors tend to be better equipped with specialized knowledge on the behaviors of IT systems, and it is only a matter of whether an IT auditor is able to detect the fraud. To this extent, IT audits may either initiate or assist a fraud investigation through one or more of the following activities:
• Generation and/or reconciliation of report
• Identification/retrieval of evidence and missing records on computer system
• Conducting of computer forensics analysis
While an IT auditor may not be competent in conducting computer forensics analysis, the auditor should be aware of its methodology and capability
Typically, occupational frauds fall into one of three major categories:6
Asset misappropriation—Any scheme that involves the theft or misuse of an organization's assets, e.g., use of software and software licenses purchased by the company for personal use or financial gain
Corruption—Any scheme in which a person uses his/her influence in a business transaction to obtain an unauthorized benefit contrary to that person's duty to his/her employer, e.g., awarding outsourcing IT equipment maintenance services to the vendor that provides cash and/or gifts
 
Fraud Investigation
The extensive use of ICT in today's business implies that evidence is extremely likely to be available for verification and confirmation as to an occurrence of a fraud. Evidence collected on ICT systems could well be used to sustain the occurrence of a fraud case. IT auditors tend to be better equipped with specialized knowledge on the behaviors of IT systems, and it is only a matter of whether an IT auditor is able to detect the fraud. To this extent, IT audits may either initiate or assist a fraud investigation through one or more of the following activities:
• Generation and/or reconciliation of report
• Identification/retrieval of evidence and missing records on computer system
• Conducting of computer forensics analysis
While an IT auditor may not be competent in conducting computer forensics analysis, the auditor should be aware of its methodology and capability
Typically, occupational frauds fall into one of three major categories:6
Asset misappropriation—Any scheme that involves the theft or misuse of an organization's assets, e.g., use of software and software licenses purchased by the company for personal use or financial gain
Corruption—Any scheme in which a person uses his/her influence in a business transaction to obtain an unauthorized benefit contrary to that person's duty to his/her employer, e.g., awarding outsourcing IT equipment maintenance services to the vendor that provides cash and/or gifts
การแปล กรุณารอสักครู่..
