Exam 16: Ethics, fraud and Computer Crime
Exam 1: Systems Fundamentals57 Questions
Exam 2: Systems Characteristics and Considerations58 Questions
Exam 3: Database Concepts I60 Questions
Exam 4: Database Concepts II58 Questions
Exam 5: XBRL Reporting60 Questions
Exam 6: System Mapping and Documentation60 Questions
Exam 7: Internal Controls I60 Questions
Exam 8: Internal Controls II59 Questions
Exam 9: Transaction Cycle The Revenue Cycle58 Questions
Exam 10: Transaction Cycle The Expenditure Cycle59 Questions
Exam 11: Transaction Cycle The Production Cycle60 Questions
Exam 12: Transaction Cycle The HR Management and Payroll Cycle60 Questions
Exam 13: Transaction Cycle The General Ledger and Financial Reporting Cycle60 Questions
Exam 14: Systems Development60 Questions
Exam 15: Auditing of Accounting Information Systems60 Questions
Exam 16: Ethics, fraud and Computer Crime58 Questions
Select questions type
A bank teller is experiencing pressure at home,with mortgage payments rapidly approaching and credit cards nearing their limit.The teller has the opportunity to 'borrow' some of the bank's cash to place a bet on a 'sure thing' at the Saturday races with the intention of returning the cash to the bank on Monday morning.This is an example of: (i)Pressure for fraud (ii)Opportunity for fraud.
(Multiple Choice)
4.7/5
(42)
An individual's perceived ability to carry out the fraud and conceal the fraudulent activity is referred to as:
(Multiple Choice)
4.7/5
(41)
Which principle is the foundation for phishing and social engineering?
(Multiple Choice)
4.8/5
(35)
There are three risk factors known as the 'fraud triangle' that are generally present when a fraud is committed.Which of the following is not one of them?
(Multiple Choice)
4.8/5
(36)
Which of the following is not a type of Consequentialist theory?
(Multiple Choice)
4.9/5
(29)
People are more likely to provide personal information to someone on the phone who purports to be a police officer or other authority figure.This is referred to as the:
(Multiple Choice)
4.9/5
(38)
Which of the following statements regarding Kantianism is not true?
(Multiple Choice)
4.9/5
(37)
When submitting their online registration form,a pop-up dialogue box appears in the customers' Internet browser asking them to confirm the submission of information.This is an example of:
(Multiple Choice)
4.8/5
(32)
The implicit rules that guide us in our everyday behaviour,thoughts and actions are collectively termed:
(Multiple Choice)
4.9/5
(42)
Which of the following factors is the most important one in addressing internet access issues in Australia?
(Multiple Choice)
4.8/5
(29)
Which of the following is not a stage in ethical decision making?
(Multiple Choice)
4.8/5
(33)
Which of the following is not one of the seven recurring behavioural patterns and related principles identified by Stajano and Wilson?
(Multiple Choice)
4.9/5
(29)
Consumer profiling is less likely to be able to gather information regarding:
(Multiple Choice)
4.9/5
(45)
Which of the following controls can ensure that all software is properly licensed in an organisation?
(Multiple Choice)
4.9/5
(34)
Showing 41 - 58 of 58
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)