AlphaCo: A Teaching Case on Information Technology Audit and Security
نویسندگان
چکیده
Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial Journal of Digital Forensics, Security and Law, Vol. 1(1) 46 and non-financial data. Thus, understanding IT related risks and instituting internal control mechanisms that minimize them have become important and created an urgent need for professionals who are equipped with IT audit and security skills and knowledge. However, there is severe shortage of teaching cases that can be used in courses aimed at training such professionals. This teaching case begins to address this gap by fostering classroom discussions around IT audit and security issues. It revolves around a hacking incident that compromised online order processing systems of AlphaCo and led to some fraudulent activity. The hacking incident raises a series of questions about IT security vulnerabilities, internal control deficiencies, integrity of financial statements, and independent auditors’ assessment of fraud in the context of the Sarbanes-Oxley Act. The case places students in the roles of executives, IT managers, and auditors and encourages them to discuss several important questions: how and why did the hacking incident happen; what harm did it cause to the firm; how can the firm prevent such hacking incidents in the future; if they do happen, how can the firm detect hacking incidents and fraud sooner; how do auditors assess the impact of such incidents in the context of a financial statement audit; and whether the management and auditors have responsibility in detecting and publicly reporting fraud? The case also facilitates the teaching of relevant conceptual frameworks such as COSO (Committee of Sponsoring Organizations of the Treadway Commission) and COBIT (Control Objectives for Information and related Technology).
منابع مشابه
Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملThe hybrid approach based on genetic algorithm and neural network to predict financial fraud in banks
Audit has become an essential topic in the world because there is much evidence about deliberate manipulations in the reports. One of the concerns in the field of audit is discovery and search of the financial statements and the high volume of bulk data. This study tried to suggest the appropriate method to detect these frauds due to the data which has been available and a proposed algorithm. R...
متن کاملThe hybrid approach based on genetic algorithm and neural network to predict financial fraud in banks
Audit has become an essential topic in the world because there is much evidence about deliberate manipulations in the reports. One of the concerns in the field of audit is discovery and search of the financial statements and the high volume of bulk data. This study tried to suggest the appropriate method to detect these frauds due to the data which has been available and a proposed algorithm. R...
متن کاملInformation Systems Audit Trails; An Australian Government Survey
Journal of Research and Practice in Information Technology, Vol. 34, No. 1, February 2002 47 Information Systems Audit Trails; An Australian Government Survey Caroline Allinson Manager Information Security, Information Management Division, Queensland Police Service, GPO Box 1440, BRISBANE Qld 4001, Australia. and Information Security Research Centre (ISRC), Queensland University of Technology, ...
متن کاملInformation Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI
The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. However, the managerial aspects of information security often remain challenging, especially in emerging technological contexts, and management executives lack an understanding o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JDFSL
دوره 1 شماره
صفحات -
تاریخ انتشار 2006