Information Technology and Fraud – ACCT 660

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 07/28/2020

Course Description

This course explores how information technology may be utilized as a tool to prevent and detect fraud.


ACCT 511 and ACCT 531 and (BMAL 590 or Meets BMAL590 / 27 hrs in BUSI with a score of 3)


The purpose of this course is to expose the student to the relationship between information technology and fraud as it relates to fraudulent financial reporting in the business environment.  The course will require that the student consider how information technology has historically been used to perpetrate fraud in specific companies.  In addition, methods of using technology to analyze historical data in order to detect fraud will be discussed.  This course is intended to provide an overview of these topics in order to prepare the accounting professional for a career in forensic accounting.

Measurable Learning Outcomes

Upon successful completion of this course, the student will be able to:

  1. Explain how information technology has been used in the past to perpetrate fraud.
  2. Identify tests on financial statement data using database or spreadsheet software in order to help in the identification of fraud.
  3. Research current issues in the relationship between information technology and fraud.
  4. Apply a biblical worldview to the investigation of fraud using analytics.

Course Assignment

Textbook readings and lecture presentations

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.

Discussion Board Forums (4)

Discussion boards are collaborative learning experiences. Therefore, the student is required to provide a thread in response to the provided prompt for each forum. Each thread must be at least 750 words and demonstrate course-related knowledge supported by at least 3 scholarly references. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be 250 words and be supported by at least 2 references.

Reading Outlines (2)

The student will prepare a reading outline for each chapter of the textbook as weekly readings are completed. The outlines may utilize sentences, phrases, diagrams, and other useful information from the text. The objective of the outlines is to highlight and document key concepts from the reading that are useful for future use. The outlines must be detailed and must include substantive content from the text. Each chapter’s outline must be at least 1 page and double-spaced.

Individual Research Project

Each student will choose a company on which to focus his or her research. The company must be one in which fraud has occurred in the last 10 years as a result of the use of information technology. Information technology must have been used, at least partly, in the commission of the fraud.

Part 1 of the research project requires that the student provide an in-depth background of the company and the fraud itself, including how it was discovered and who was involved. At least 5 resources must be utilized for this section of the research project. Acceptable sources include news articles, government websites, and similar publications, due to the nature of the content being discussed, and Part 1 must be at least 2,000 words.

Part 2 of the research project requires that the student provide a discussion of what he or she might have done to detect or investigate the fraud identified, and how the biblical worldview impacts the approach to the case. At least 5 resources must be utilized for this section of the research project, which may include scholarly resources, the textbook, and Scripture, and Part 2 must be at least 2,000 words.