Free Essay

Acct 571: Computer Fraud Case

In:

Submitted By Rosa0729
Words 1093
Pages 5
Accounting 571: Advanced Accounting Information Systems | Computer Fraud | | By | [Type the author name] | 9/14/2013 |

DeVry University’s Keller Graduate School of Management |

A University of Oklahoma student was charged with computer fraud on May 16, 2013 by the Cleveland County District Court. The University of Oklahoma student, Roja Osman Hamad, is accused of improperly changing his grades. Roja Hamad now faces five counts of computer fraud. Mr. Hamad was a former student employee of the university’s information technology department. This is where Mr. Hamad was able to access the university’s computer system to change six faculty member’s passwords without the faculty member’s permission. University official’s state, Roja Hamad broke into the university’s computer system and changed his grades. Roja Hamad fits the majority of the profile of the average fraud perpetrator. According to the ACFE, the average fraud perpetrator has no prior fraud charges or convictions and is more likely to be male rather than female. The ACFE states that the offender is commonly between the ages of 31-45. Even though Mr. Hamad is only 24 years old, he possessed the knowledge to commit the fraud. Since Roja Hamad was a student employee of the university, he was probably a trusted employee. As a trusted employee of the University, this gave Hamad an opportunity to perpetuate the fraud. Lack of proper internal controls, failure to enforce controls, and incompetent management personnel enabled Hamad to commit the fraud. The three elements of the opportunity triangle are commit, conceal, and convert. Commit refers to the theft or misappropriation of an asset. Conceal is when the perpetrator hides the fraud. Convert refers to when a fraud perpetuator converts the property to another form. Roja Hamad was able to commit the fraud due to a lack of proper internal control systems. He was able to conceal the perpetuated fraud since the six faculty members never realized that their passwords were changed. Hamad could easily access the university’s computer system undetected since he changed faculty’s passwords. When Hamad perpetuated the fraud against the University, he was able to change his grades to improve his GPA. This allowed Hamad to log-in to the computer system as one of the faculty. Roja Hamad was motivated to change his grades due to the pressure to increase his Grade Point Average (GPA). If Hamad was not doing well in some of his classes, he could access the university’s computer system with the faculty passwords and change his grades from anything below an A to an A. If Hamad was almost failing a class during the semester, Hamad was able to change some of the grades to reflect a better score during each semester. Hamad may have felt the pressures from his family to do well and graduate with a high GPA. Hamad could have also been upset with the University. This would have caused him to resent the University. Hamad may have perpetuated the fraud as a challenge to see if he could beat the system. Some of the red flags that the university should have discovered were Hamad’s behavior may have changed. This change could have been resentment for the university or even resentment of the faculty. If Hamad had perpetuated the fraud to try and beat the system, Hamad may have been paranoid with everyone around him. This would have resulted from his fear of being caught. Other behavioral changes can include being “easily annoyed at reasonable questioning, providing unreasonable responses to questions, and rewriting records under the guise of neatness in presentation.” (ACFE, 2011) The university should have noticed that faculty’s passwords were logging into the computer system at odd times, odd frequencies, or an unusual amount of times. Many times organizations do not want to prosecute white collar criminals due to the negative public exposure of the fraud. The consumer and investor may lose faith in an organization that is susceptible to fraud. By not reporting the white collar crime, the company will not have to fear the negative reputation for the company. Many times, the organization does not report the white-collar crime due to it does not know it was a victim of fraud. Even though the University reported Hamad’s fraud, many organizations still do not report white collar crimes. If an organization fails to report a white-collar crime committed against their organization, this will open the door for more white-collar criminals to perpetuate frauds against them. Most criminals will manipulate an organizations internal control system if they know that the organization will not prosecute. Law enforcement officials could encourage more prosecutions of white-collar crimes if they would require companies to report and prosecute fraud. This would hold the organizations responsible if they know that a fraud committed. If every organization were to prosecute all perpetuated frauds, this would send a message that any type of fraud will not be tolerated. Another way law enforcement officials could encourage more prosecution would be to make the white-collar criminal prosecutions private. This would help the organization not worry about the negative publicity that would arise from the fraud. The University could have prevented Hamad from accessing the university’s computer system by having a strong internal control system and by separation of duties. There were many things the University could have done to prevent the fraud. The University should have trained all employees in integrity and ethical behavior. All employees of the university should have also been trained in security and fraud prevention methods. The security and fraud prevention methods should include the faculty keeping their computer passwords private and secure. If the faculty gave Hamad their passwords for the university’s computer system, this would have caused the internal control systems integrity to be compromised. Other internal controls the University could have used include “installing fraud detection software, employ a computer security officer, use intrusion detection software, and monitor system activities.” (ACFE, 2011) The University should develop a culture that stresses integrity. They should implement a policy that discusses what the university expects from the students and faculty. The policy should send a message that the university does not tolerate unethical

REFERENCES

Sillas, Allen (2013, May 29). University of Oklahoma student Charged With Computer Fraud in Grade-Changing Case Retrieved by http://newsok.com/university-of-oklahoma-student-charged-with-computer-fraud-in-grade-changing-case/article/3836621

Association of Certified Fraud Examiners (2011). Fundamentals of Computer Crime and Internet Fraud Retrieved by http://www.acfe.com/uploadedFiles/Shared_Content/Products/Self-Study_CPE/fundamentals-of-computer-and-internet-fraud-2011-chapter-excerpt.pdf

Similar Documents

Premium Essay

Skimming Devices in Gas Pumps Ais Breach

...Skimming Devices in Gas Pumps Lori Markey Acct 571 15 March 2014 ABSTRACT This paper explores fraudulent activity committed by using gas pumps to steal financial information from victims. Furthermore, the paper attempts to answer a variety of questions as presented on Page 143 of our text book. Such as the control issues that were breached and how the fraudsters meet the profile of the average perpetrator. Additionally, I will explore elements of the fraud triangle, red flags for fraud, and problems with prosecuting criminals. Skimming Devices in Gas Pumps In March 2013, four men Garegin Spartalyan, Aram Martirosian, Hayk Dzhandzhapanyn, and Davit Kudugulyan were charged with 426 counts of money laundering, criminal possession of stolen property, grand larceny, criminal possession of a forgery device, and criminal possession of forged instruments (Vance, 2014). The men are from Las Vegas, Nevada except Hayk who hails from California (Vance, 2014). The four along with nine other accomplices were accused of stealing victims banking information and PINS by using skimming machines at gas stations in Texas, Georgia, and Tennessee. The skimming device is put inside the pump with a universal to open the front and only takes between 5 – 10 minutes to install/remove (biggs, 2014). The skimmers that were used connect into the line between the card reader and pump computer to read the PIN input and the magnetic strip and store the information locally (biggs, 2014)...

Words: 1768 - Pages: 8

Premium Essay

Accg100 Lecture Notes Student Version

...Accg100 Accounting 1A Lecture Notes Semester 2, 2012 1 Table of Contents Lecture Notes Week 1: Introduction to Accounting, Ethics, Business Entities, Financial Statements Week 2: Accounting for Transactions –Part 1 Week 3: Accounting for Transactions –Part 2 Week 4: Accounting for Adjustments- Part 1 Week 5: Accounting for Adjustments- Part 2 Week 6: Completion of Accounting Cycle Accounting Systems Revision Chapters 1 – 4 Week 8: Accounting for Retailers Week 9: Accounting for Inventories Week 10: Non-Current Assets Week 11: Cash Management and Control Week 12: Accounting for Receivables Week 13: Revision Tutorial Exercises Terminology Page 3 14 27 42 53 64 70 80 86 97 111 123 134 149 150 168 2 Lecture Notes Week 1 Introduction to Accounting, Ethics, Business Entities, Financial Statements Required Readings: HEM : Chapters 1 and 2 All required readings m ust be com pleted before attending class 3 What is Accounting? The process of ________________________________and ___________ economic information to assist users to make _____________. Users of Accounting Information The users are internal and external decision makers. Internal: External: Management Accounting Providing information to management to help them ____, ______ and ____________. Users are ________. Financial Accounting Reporting information to ________users to help them make decisions about the entity’s __________ and ____________. The reports produced for the external users...

Words: 17996 - Pages: 72

Premium Essay

Kkswmddkmdkemwekdemkedmkdemkmdkmdkew

...MODERN DATABASE MANAGEMENT / JfFFREY A. HOFFER . Warehousing Success 426 Data Warehouse Architectures 428 Generic Two-Level Architecture 428 Independent Data Mart Data Warehousing Environment 426 429 C O NTENTS Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach Logical Data Mart and Real-Time Data Warehouse Architecture 432 Three-Layer Data Architecture 435 Role of the Enterprise Data Model 435 Role of Metadata 436 Some Characteristics of Data Warehouse Data Status Versus Event Data 437 Transient Versus Periodic Data 438 An Example of Transient and Periodic Data 438 Transient Data 438 Periodic Data 439 Other Data VVarehouse Changes 440 The Reconciled Data Layer 441 Characteristics of Data after ETL 441 The ETL Process 442 Extract 442 Cleanse 444 Load and Index 446 Data Transformation 447 Data Transformation Functions 448 Record-Level Functions 448 Field-Level Functions 449 More Complex Transformations 451 Tools to Support Data Reconciliation 451 Data Quality Tools 451 Data Conversion Tools 452 Data Cleansing Tools 452 Selecting Tools 452 The Derived Data Layer 452 Characteristics of Derived Data 452 The Star Schema 453 Fact Tables and Dimension Tables 453 Example Star Schema 454 Surrogate Key 455 Grain of Fact Table 456 Duration of the Database 456 Size of the Fact Table 457 Modeling Date and Time 458 Variations of the Star Schema 458 Multiple Fact Tables 458 Factless Fact Tables...

Words: 80097 - Pages: 321

Premium Essay

Form

...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...

Words: 149595 - Pages: 599

Premium Essay

Management Accounting

...Handbook of Management Accounting Research Volume 3 Edited by CHRISTOPHER S. CHAPMAN Imperial College London, UK ANTHONY G. HOPWOOD University of Oxford, UK MICHAEL D. SHIELDS Michigan State University, USA AMSTERDAM – BOSTON – HEIDELBERG – LONDON – NEW YORK – OXFORD PARIS – SAN DIEGO – SAN FRANCISCO – SINGAPORE – SYDNEY – TOKYO Elsevier The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, UK First edition 2009 Copyright © 2009 Elsevier Ltd. All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone ( 44) (0) 1865 843830; fax ( 44) (0) 1865 853333; email: permissions@elsevier.com. Alternatively visit the Science and Technology Books website at www.elsevierdirect.com/rights for further information Notice No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data A catalog record for...

Words: 187223 - Pages: 749

Premium Essay

Sap Sd

...KAPIL SHARMA AND ASHUTOSH MUTSADDI Configuring SAP ERP Sales and Distribution ® SERIOUS SKILLS. Configuring SAP ERP Sales and Distribution ® Kapil Sharma Ashutosh Mutsaddi Acquisitions Editor: Agatha Kim Development Editor: Laurene Sorensen Technical Editor: Dheeraj Oswal Production Editor: Liz Britten Copy Editor: Kim Wimpsett Editorial Manager: Pete Gaughan Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President and Publisher: Neil Edde Book Designer: Franz Baumhackl Compositor: Craig Johnson, Happenstance Type-O-Rama Proofreader: Word One, New York Indexer: Ted Laux Project Coordinator, Cover: Lynsey Stanford Cover Designer: Ryan Sneed Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-40473-7 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken,...

Words: 176656 - Pages: 707

Free Essay

Applied Soa

...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright  2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...

Words: 218699 - Pages: 875