{"id":3807,"date":"2020-09-19T04:00:37","date_gmt":"2020-09-19T08:00:37","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5121fall16\/?p=3123"},"modified":"2018-12-07T12:12:07","modified_gmt":"2018-12-07T17:12:07","slug":"week-3-wrap-up-fraud-p2p-controls","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/2020\/09\/19\/week-3-wrap-up-fraud-p2p-controls\/","title":{"rendered":"Week 3 Wrap-up:  Fraud, P2P Controls"},"content":{"rendered":"<p>Great discussion this week. \u00a0You raised all the important points but let me share my thoughts.<\/p>\n<p><strong>Q1<\/strong>: &#8216;Assertions&#8217; are important to who? \u00a0You shared many good scenarios and examples. \u00a0In my view, assertions are important to anyone who uses information provided by a company. \u00a0Whether those relying on the information are inside or\u00a0outside the company, unless assertions \/ controls are in place they can&#8217;t count on the information. \u00a0We&#8217;ve talked mostly about financial information, but the veracity of non-financial information also requires assertions \/ controls.<\/p>\n<p><strong>Q2<\/strong>: \u00a0Which\u00a0dimension of Management Assertions do you believe is the most important? \u00a0In my view, all the dimensions are of some value. \u00a0The industry and type of business can significantly impact the varying risk associated with each dimension.<\/p>\n<p><strong>Q3<\/strong>: Have you ever\u00a0been victim of fraud? \u00a0 Thanks for sharing your own personal and some cases emotional stories. \u00a0I hope you agree with me that fraud is real in our world today and adequate controls are necessary \u00a0to address the risks. \u00a0The fraud triangle is a effective tool for analyzing risk scenarios &#8211; especially those of high risk.<\/p>\n<p><strong>Q4<\/strong>:\u00a0Which step of the P2P\u00a0is the most vulnerable? \u00a0Risks exist in every step of the process. \u00a0However, I believe the early and payment steps are the most vulnerable. \u00a0The vulnerability exists because the early steps relate to the value of the transaction and the payment step is where the $$ changes hands. \u00a0Because of the wide variety of different P2P scenarios, it&#8217;s a challenge to identify all the risks and effectively put controls in place to address.<\/p>\n<p>I trust from our discussions in class and these questions, how important assertions and their related controls are. \u00a0We&#8217;ll be exploring for the remainder of class risks and related controls in various processes and scenarios.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Great discussion this week. \u00a0You raised all the important points but let me share my thoughts. Q1: &#8216;Assertions&#8217; are important to who? \u00a0You shared many good scenarios and examples. \u00a0In my view, assertions are important to anyone who uses information provided by a company. \u00a0Whether those relying on the information are inside or\u00a0outside the company, [&hellip;]<\/p>\n","protected":false},"author":22812,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715219],"tags":[],"class_list":{"0":"post-3807","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-03-it-administrative-controls","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/posts\/3807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/users\/22812"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/comments?post=3807"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/posts\/3807\/revisions"}],"predecessor-version":[{"id":4933,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/posts\/3807\/revisions\/4933"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/media?parent=3807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/categories?post=3807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/tags?post=3807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}