Page 420 - Introduction to Business
P. 420

394     PART 4  Accounting


                                        A key reason for having ethical guidelines is not to provide a cookbook solution to
                                     every practice-related problem, but to aid in the decision-making process for situa-
                                     tions that involve ethical questions. Businesspeople will encounter novel situations
                                     in their jobs and will need ethical guidelines to handle them effectively. Ethics codes
                                     are necessary to provide such guidance. To aid its 100,000 members in resolving
                                     ethical dilemmas, the Institute of Management Accountants recently established an
                                     ethics hotline. Ethics counselors offer confidential advice, solace, and comfort to
                                     management accountants who may have no other place to turn for help.

                                        reality      How would you describe your values? Have you ever been confronted
                                      CH ECK         with an ethical dilemma in the workplace?


             Computer Crime


             LEARNING OBJECTIVE 5
             List a few examples of computer crime.

                                     Lack of ethics naturally manifests itself in undesirable behavior. The latest technol-
        computer crime The use of computers  ogy is often used to commit crimes. Computer crime involves the use of comput-
        to perpetrate or facilitate illegal activity   ers to perpetrate or facilitate illegal activity. The average computer crime has been
                                     estimated to cost $600,000, while the average white-collar crime is estimated to cost
                                     only $23,500. The average armed robbery is estimated to cost even less, only $250.
                                     To make matters worse, statistics show that the higher the dollar amount of a crime,
                                     the lower its probability of prosecution.
                                        The increased use of the computer to maintain financial records has led to more
                                     opportunities for computer crime. Estimates of computer fraud losses are several
                                     billion dollars per year. One of the most highly publicized crimes was the Equity
                                     Funding fraud, in which nonexistent insurance policy records were added to the
                                     customer master file of the firm. Allegedly, this was done by carrying out “unsched-
                                     uled” file updating that was not part of the normal data-processing operations.
                                        A second well-known computer crime concerned Pacific Telephone. The perpe-
                                     trator was able to manipulate the system by taking advantage of the following sys-
                                     tem shortcomings:

                                          Account numbers and passwords that were shown on printouts were not
                                            adequately controlled.
                                          Equipment was allowed to be shipped to locations not normally used by the
                                            firm.
                                          Computerized purchasing procedures were available to personnel who had
                                            no need to know the procedures.
                                        The online computer system of the state of Colorado was used to make unau-
                                     thorized modifications to the driving records of persons convicted of violations.
                                     The modifications were made to enhance the insurability of the persons involved.
                                     The online computer system of the University of Southern California (USC) was
                                     used to make unauthorized changes to course grades. At both places, the state of
                                     Colorado and USC, unauthorized modifications were made by authorized opera-
                                     tors, not by the persons whose records were changed.
                                        The rail firm Penn Central Railroad once discovered that nearly 400 railcars had
                                     been “misplaced.” The computer system had been modified in such a way that
                                     missing railcars would go unnoticed.
                                        reality      Do you know anyone who has been a victim of computer crime? Has
                                      CH ECK         your computer ever been infected by a computer virus?


                 Copyright 2010 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
   415   416   417   418   419   420   421   422   423   424   425