Start Date
16-8-2018 12:00 AM
Description
Fraud examination has played an important role in the business environment. We examine the Fraud Diamond (FD) framework and apply it to the risk management of computer fraud. This FD framework implies but does not formalize interrelationships between four fraud risk categories called “Incentive, Capability, Opportunity, and Rationalization.†Prior research has shown that most frauds are perpetrated by people in positions of trust in the accounting, and Information Technology (IT) functions. We use accounting literature of fraud assessment and apply it to computer fraud within companies. This research seeks expand on human-centered information systems security. With the growing digitalization of accounting records, audit procedures, and important human resources information, we are interested in finding how to keep these electronic assets safe. We recognize the need for organizations to understand an employee’s propensity to commit fraud to properly safe-guard digital assets, put proper protocols in place, and improve current organization policies.
Recommended Citation
Jiang, Randi and Lee, Jae Ung, "Assessing Fraud Risks in IT Security" (2018). AMCIS 2018 Proceedings. 19.
https://aisel.aisnet.org/amcis2018/Security/Presentations/19
Assessing Fraud Risks in IT Security
Fraud examination has played an important role in the business environment. We examine the Fraud Diamond (FD) framework and apply it to the risk management of computer fraud. This FD framework implies but does not formalize interrelationships between four fraud risk categories called “Incentive, Capability, Opportunity, and Rationalization.†Prior research has shown that most frauds are perpetrated by people in positions of trust in the accounting, and Information Technology (IT) functions. We use accounting literature of fraud assessment and apply it to computer fraud within companies. This research seeks expand on human-centered information systems security. With the growing digitalization of accounting records, audit procedures, and important human resources information, we are interested in finding how to keep these electronic assets safe. We recognize the need for organizations to understand an employee’s propensity to commit fraud to properly safe-guard digital assets, put proper protocols in place, and improve current organization policies.