{"id":1216,"date":"2019-04-03T09:00:39","date_gmt":"2019-04-03T06:00:39","guid":{"rendered":"https:\/\/teolupus.com\/?p=1216"},"modified":"2023-10-26T10:53:53","modified_gmt":"2023-10-26T07:53:53","slug":"risk-assessment-principle-8","status":"publish","type":"post","link":"https:\/\/teolupus.com\/en\/risk-assessment-principle-8\/","title":{"rendered":"Assessing Fraud Risk: Principle 8 Focus Points"},"content":{"rendered":"\r\n<p><span style=\"font-weight: 400;\">The organization also considers the potential for fraud when assessing risks to achieving objectives.<\/span><\/p>\r\n<h2><b>Focus Points:<\/b><\/h2>\r\n<p><span style=\"font-weight: 400;\">The following focal points highlight essential aspects of activities, reporting, and compliance objectives:<\/span><\/p>\r\n<h3><strong>Evaluates Various Types of Cheating<\/strong><\/h3>\r\n<p><span style=\"font-weight: 400;\">Fraud assessment considers fraudulent reporting, potential asset losses, and fraud resulting from the various ways fraud and abuse can occur.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Risk assessment involves management assessing risks related to fraudulent reporting and protecting the organization&#8217;s assets. In addition, management evaluates potential corruption issues that directly impact the ability of the organization&#8217;s personnel and external service providers to achieve the organization&#8217;s objectives.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">When assessing risks that impede achieving financial reporting objectives, organizations typically evaluate the potential for fraud in the following areas.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fraudulent Financial Reporting: An intentional act designed to deceive users of external financial reports, which may result in the omission or misrepresentation of material information in those financial reports.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fraudulent Non-Financial Reporting: An intentional act designed to deceive users of non-financial reports, including sustainability reporting, occupational health and safety, or employment activities, which may result in reporting less than the desired level of accuracy.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Misappropriation of Assets: Theft of an organization&#8217;s assets with the effect of causing the omission or misrepresentation of material information in external financial reports.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Illegal Acts: Violations of laws or regulations that may have a material effect, directly or indirectly, on external financial reporting.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">As part of the risk assessment process, the organization should identify the various ways fraudulent reporting may occur, considering the following.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Management misbehavior,<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The degree of estimates and judgments made in external reporting,<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fraud patterns and scenarios that are common in the markets and sectors in which the organization operates,<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Geographical regions in which the organization operates,<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incentives that may motivate fraudulent behavior<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The nature of the technology and management&#8217;s ability to manipulate information,<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unusual and complex transactions that are under significant management influence,<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Potential schemes to circumvent existing control actions and vulnerability to management breaches of internal control.<\/span><\/li>\r\n<\/ul>\r\n<p><b>Protection of Assets:<\/b><span style=\"font-weight: 400;\"> It means protecting assets against unauthorized and malicious acquisition, use, or disposal. Improper use of an organization&#8217;s assets may be for the benefit of an individual or group. Unauthorized acquisition, use, and disposal of assets. It may be linked to activities such as illegal marketing, theft of assets, theft of intellectual property rights, buying and selling securities outside stock exchange trading hours, and money laundering. Protecting assets is generally linked to operational purposes, although certain aspects may also be relevant to other purposes.<\/span><\/p>\r\n<p><b>Corruption: <\/b><span style=\"font-weight: 400;\">In addition to assessing risks related to asset protection and fraudulent reporting, management also evaluates possible acts of corruption within the organization.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Corruption generally relates to the compliance category of objectives but can also affect the organization&#8217;s control environment, which affects its external financial reporting objectives.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">When assessing possible fraud, the organization cannot be expected to directly manage the actions of personnel in third-party organizations, including outsourced activities, customers, suppliers, or consultants. However, depending on the level of risk assessed within this component, management may stipulate expected levels of performance and standards of behavior through contractual relationships and develop control actions that provide oversight over third-party actions. If necessary, management responds to unusual actions detected in others.<\/span><\/p>\r\n<p><b>Management Violations: <\/b><span style=\"font-weight: 400;\">Management breaches of internal control refer to overriding an organization&#8217;s rules for an illegitimate purpose, including personal gain or overstating the organization&#8217;s financial or compliance status. For example, a manager improperly overrides internal control by approving a sales transaction that a manager who has properly checked has kept on hold for credit to allow a large quantity of goods to be shipped to a customer with poor credit to increase revenue. Acts of infringement are often not documented or disclosed because the goal is to cover up these acts.<\/span><\/p>\r\n<h3><strong>Evaluate Incentive and Pressure Elements<\/strong><\/h3>\r\n<p><span style=\"font-weight: 400;\">In fraud risk assessment, incentive and pressure factors are taken into account.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Incentives and Pressures: Risk assessment involves considering behaviors, pretexts, and opportunities that lead to fraud. Where there is a loss of assets, fraudulent reporting, or corruption, there are often incentives, pressures, and opportunities to access those assets, as well as behavior and excuses that claim the action is justified. Incentives and pressures often arise from and are linked to the control environment, as noted in Principle 5 (Ensuring Accountability). As part of assessing fraud risk, the organization also considers possible incentives and pressures and their potential impact on fraud risk.<\/span><\/p>\r\n<h3><strong>Evaluates Opportunities<\/strong><\/h3>\r\n<p><span style=\"font-weight: 400;\">Fraud risk assessment evaluates opportunities for unauthorized acquisition, use, or disposition of assets, falsification of the organization&#8217;s reporting records, or other improper acts.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Opportunity: Opportunity represents the possibility of acquiring, using, or disposing of assets, which may be accompanied by changing the entity&#8217;s records. Those who engage in inappropriate actions often also believe these actions cannot be detected. Opportunities arise from poor control and monitoring actions, inadequate oversight, and management violating internal controls. For example, situations that increase the likelihood of an asset loss or fraudulent reporting include:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A complex or inconsistent organizational structure<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">High turnover rates of employees in accounting, operations, risk management, internal audit, or technology staff<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ineffective design or poor execution of control actions<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ineffective technology systems<\/span><\/li>\r\n<\/ul>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evaluates Behaviors and Excuses<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">The fraud risk assessment also considers how management and other personnel may participate in or justify improper actions.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">The behaviors and excuses of individuals who engage in inappropriate behavior or attempt to justify their inappropriate behavior may include the following.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A person who describes his use of resources as \u201cborrowing\u201d or intends to repay the stolen money in full<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A person who feels that the organization owes him money because he is dissatisfied with his job (whether due to salary, work environment, managers&#8217; behavior, etc.)<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A person who does not understand or care about the consequences of inappropriate behavior or accepted concepts of decency and trust<\/span><\/li>\r\n<\/ul>\r\n<h2><b>Resources for <\/b><b>Internal Control Article <\/b><\/h2>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dr. Davut Pehlivanl\u0131, Current Internal Audit Practices, Beta 2010<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prof. Dr. Nejat Bozkurt, Accounting Audit, Alfa 1998<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prof.Dr.Nejat Bozkurt, T\u00dcRMOB Independent Audit Training Lecture Notes, 2012<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dr.\u00d6zg\u00fcr \u00c7at\u0131kka\u015f, KGK, Marmara University. Corporate Governance Lecture Notes, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u0130SMMMO-Practical Information for Internal Audit in SMEs, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Internal Audit Institute, www.tide.org.tr<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alp Buluch, Article, Internal Control, Hurses, 19 March 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Commercial Code No. 6102<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">International Internal Auditing Standards, www.theiia.org<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">www.coso.orgTreadway Commission Supporting Institutions Committee, Internal Control-Integrated Framework, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public Financial Management and Control Law<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public Internal Control Standards<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public Internal Control Guide<\/span><\/li>\r\n<\/ul>\r\n","protected":false},"excerpt":{"rendered":"<p>The organization also considers the potential for fraud when assessing risks to achieving objectives. Focus Points: The following focal points highlight essential aspects of activities, reporting, and compliance objectives: Evaluates&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1444,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[845],"tags":[],"class_list":{"0":"post-1216","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-insights"},"_links":{"self":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/comments?post=1216"}],"version-history":[{"count":0,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1216\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media\/1444"}],"wp:attachment":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media?parent=1216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/categories?post=1216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/tags?post=1216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}