Brennan, Niamh M. and McGrath, Mary [2007] Financial Statement Fraud: Inciden...Prof Niamh M. Brennan
This paper studies 14 companies which were subject to an official investigation arising from the publication of fraudulent financial statements. The research found senior management to be responsible for most fraud. Recording false sales was the most common method of financial statement fraud. Meeting external forecasts emerged as the primary motivation. Management discovered most fraud, although the discovery was split between incumbent and new management.
This literature review is organized in five sections. Firstly, we begin with general ideas and continue with the origin of the fraudulent. Secondly, we discuss the struggle of the phenomena, insisting on the available mechanisms. Finally, we’ll discuss the link between audit and fraud.
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsIOSR Journals
This paper examined fraud prevention, mitigation and management practices. The respondents were 294 persons drawn from business owners, accountants, investors, bankers, and managers in Port Harcourt. The spearman’s rank order correlation coefficient statistical tool of the statistical package for social sciences (SPSS) was used to test the hypotheses. Results indicated that there is a significant relationship between internal control system and reduction in the manipulation of records; and there is a significant relationship between internal auditing and the prevention of assets defalcations.It was concluded that businesses operate in a risky environment where errors and irregularities which may result into fraud can occur. Fraud is an act of deception which is perpetrated by someone in authority for the illegal acquisition of the assets of an organization that he or she is entrusted to take care of. Thus, efficient and effective internal control system with adequate internal auditing should be provided to prevent, mitigate and manage all forms of fraudulent activities in organizations. In the lightof our findings from the study, we recommendedthat the management of firms should have mechanisms for theproper documentations of their assets, and that the management of organizations should provide mechanisms to safeguard all their physical assets.
This presentation is an overview of Fraud Risk Management in Indian companies and the role of the Board of Directors in the context of the newly enacted Companies Act, 2013.
The ever increasing regulations and expansion of organisations across the globe into new markets exposed the organisations to greater regulatory and compliance risks. To Know More : https://www2.deloitte.com/in/en/pages/audit/articles/internal-audit.html
Brennan, Niamh M. and McGrath, Mary [2007] Financial Statement Fraud: Inciden...Prof Niamh M. Brennan
This paper studies 14 companies which were subject to an official investigation arising from the publication of fraudulent financial statements. The research found senior management to be responsible for most fraud. Recording false sales was the most common method of financial statement fraud. Meeting external forecasts emerged as the primary motivation. Management discovered most fraud, although the discovery was split between incumbent and new management.
This literature review is organized in five sections. Firstly, we begin with general ideas and continue with the origin of the fraudulent. Secondly, we discuss the struggle of the phenomena, insisting on the available mechanisms. Finally, we’ll discuss the link between audit and fraud.
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsIOSR Journals
This paper examined fraud prevention, mitigation and management practices. The respondents were 294 persons drawn from business owners, accountants, investors, bankers, and managers in Port Harcourt. The spearman’s rank order correlation coefficient statistical tool of the statistical package for social sciences (SPSS) was used to test the hypotheses. Results indicated that there is a significant relationship between internal control system and reduction in the manipulation of records; and there is a significant relationship between internal auditing and the prevention of assets defalcations.It was concluded that businesses operate in a risky environment where errors and irregularities which may result into fraud can occur. Fraud is an act of deception which is perpetrated by someone in authority for the illegal acquisition of the assets of an organization that he or she is entrusted to take care of. Thus, efficient and effective internal control system with adequate internal auditing should be provided to prevent, mitigate and manage all forms of fraudulent activities in organizations. In the lightof our findings from the study, we recommendedthat the management of firms should have mechanisms for theproper documentations of their assets, and that the management of organizations should provide mechanisms to safeguard all their physical assets.
This presentation is an overview of Fraud Risk Management in Indian companies and the role of the Board of Directors in the context of the newly enacted Companies Act, 2013.
The ever increasing regulations and expansion of organisations across the globe into new markets exposed the organisations to greater regulatory and compliance risks. To Know More : https://www2.deloitte.com/in/en/pages/audit/articles/internal-audit.html
Fraud Risk Management | Fraud Risk Assessment - EY IndiaErnst & Young
Check out the edition of fraud risk management & fraud risk assessment understanding the client's organizational structure & business environment. For more details, visit http://bit.ly/1RtohKr.
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
This presentation details recent frauds in the Indian retail Industry. It discusses the perpetrators of such fraud (customers, employees and top management) and stages in the value chain most susceptible to fraud (Property acquisition, merchandise sourcing, third party vendors, accounting books).
Binary Scam Watch Monitor controls Credit Card Fraud (Overcharging): The classic and most vile tactic is to overcharge your credit card. The better brokers have a very strong compliance department which forbids this, but some of the shady ones like Optionmint, Zenith Options, Cedar Finance, safe24options, Traderxp, Optimarkets, XPMarkets, Amber Options, Regal Options or Interactive Option will over charge you left and right.
This presentation explains how you can prevent and deter fraud in your nonprofit organization, why some employees commit fraud and how to spot behavioral "red flags," what to do if you discover fraud in your organization, and common fraud schemes to watch for.
Fundamental controlling tool of fraud prevention and detection designed for company owners and top management. Protect at work and in business those honest against those unfair.
www.forensicline.eu
Fraud Risk Management | Fraud Risk Assessment - EY IndiaErnst & Young
Check out the edition of fraud risk management & fraud risk assessment understanding the client's organizational structure & business environment. For more details, visit http://bit.ly/1RtohKr.
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
This presentation details recent frauds in the Indian retail Industry. It discusses the perpetrators of such fraud (customers, employees and top management) and stages in the value chain most susceptible to fraud (Property acquisition, merchandise sourcing, third party vendors, accounting books).
Binary Scam Watch Monitor controls Credit Card Fraud (Overcharging): The classic and most vile tactic is to overcharge your credit card. The better brokers have a very strong compliance department which forbids this, but some of the shady ones like Optionmint, Zenith Options, Cedar Finance, safe24options, Traderxp, Optimarkets, XPMarkets, Amber Options, Regal Options or Interactive Option will over charge you left and right.
This presentation explains how you can prevent and deter fraud in your nonprofit organization, why some employees commit fraud and how to spot behavioral "red flags," what to do if you discover fraud in your organization, and common fraud schemes to watch for.
Fundamental controlling tool of fraud prevention and detection designed for company owners and top management. Protect at work and in business those honest against those unfair.
www.forensicline.eu
Running head AN EMPIRICAL STUDY ON ACCOUNTING AND AUDITING ENFO.docxjoellemurphey
Running head: AN EMPIRICAL STUDY ON ACCOUNTING AND AUDITING ENFORCEMENT RELEASES CASES
An Empirical Study on Accounting and Auditing Enforcement Releases Cases
Xin Tan
Southeast Missouri State University
Author Note
This paper was submitted in partial fulfillment of the requirements of the degree of Masters in Business Administration
AN EMPIRICAL STUDY ON ACCOUNTING AND AUDITING ENFORCEMENT RELEASES CASES
31
Abstract
The objective of the paper is to provide an empirical study about the characteristics of accounting fraud and fraudulent financial reporting occurrences, including violation length, industry, audit tenure and violation types. To do so, I collected Accounting and Auditing Enforcement Releases (AAERs) issued by the Securities and Exchange Commission (SEC) for accounting fraud committed by companies during 2009-2011, which provides a fraud sample consisting of 66 companies. I analyzed each incident and explore key company characteristics in instances of fraudulent reporting in AAERs.
APPLIED RESEARCH ACCEPTANCE SHEET
An Empirical Study on Accounting and Auditing Enforcement Releases Cases
Submitted by Xin Tan in partial fulfillment of the requirements for the degree of Masters in Business Administration.
Accepted on behalf of the Faculty of the School of Graduate Studies and Research by the Applied Research Project Committee.
(Date)
Advisor/Chair (Name,Ph.D.)
______________________________ (Date)
MBA Coordinator (Name, Ph.D.)
CONTENTS
ABSTRACT.............................................................. .............................. ……………. i
ACCEPTANCE PAGE.............................................. ………………… ii
CONTENTS....................................... …………....................................... …………iii
INTRODUCTION…………………………………………………….…...1
LITERATURE REVIEW……………………………………………….....3
METHOD…………………………………………………….……………… 4
RESEARCH DESIGN AND RESULT………………………………...… 5
CONCLUSION………………………………………………………….....15
LIMITATION…………………………………………………..... .... …...... 16
REFERENCES…………………………………………………………. …18
APPENDIX …………………………………………………………. ……. 20
I. Introduction
While the United States experienced an unprecedented storm of accounting fraud, like Enron and WorldCom, around the beginning of twenty-first century, it is still unclear to what extent the typical fraud profile has changed in recent years. In the last decade, the accounting industry has made a variety of legislative and regulatory changes because of accounting fraud, such as the Sarbanes-Oxley Act of 2002. This act was enacted as a reaction to major accounting scandals and it enhanced standards for all U.S. public companies boards, management and public accounting firms. Fraudulent financial reporting can have significant consequences for companies, stockholde ...
The following article is related to deterring employee fraud within .docxssuser454af01
The following article is related to deterring employee fraud within organizations and answers some related questions. After reading the case, answer the following questions:
Read the article the following article:
Wells, J. T. (2004, December). Small business, big losses.
Journal of Accountancy,
198
(6), 42-47. Retrieved from Business Source Complete database.
Section:FRAUD
Audits and hotlines stack up as the bestcrime busters in a new ACFE study.
Occupational fraud has become--at least so far--the crime of the 21st century. It is a widespread phenomenon that affects practically every organization. The frauds in the 2004 Report to the Nation on Occupational Fraud and Abuse, from the Association of Certified Fraud Examiners, caused over $761 million in total losses, with a disproportionate percentage committed against small businesses--almost half of the frauds in the study took place in businesses with fewer than 100 employees. Not surprisingly such businesses are less likely to be audited or employ antifraud measures than the larger ones.
Several broad conclusions can be drawn from the 2004 report. First, though the losses have been stable over the years, the fact that in one year alone they are approaching $660 billion is cause for concern. Dishonest executives and employees are plying essentially the same schemes with the same results. Second, although large financial statement frauds receive the most attention, they are relatively uncommon compared to asset misappropriations and corruption. Third, small businesses remain the most vulnerable to occupational fraud because of three factors: They are the least likely to have an audit, a hotline or adequate internal controls. Fourth, audits--both internal and external--although excellent prevention devices are not the most effective means of detecting frauds. Fifth, hotlines and other reporting mechanisms are a vital part of any organization's prevention efforts but should go beyond employees to vendors and customers, too. Finally, occupational fraud cannot be eliminated but organizations that use both hotlines and auditors can greatly reduce these costly crimes.
Occupational fraud schemes can be as simple as pilferage of company supplies or as complex as sophisticated financial statement frauds. This article summarizes some of the key findings of certified fraud examiners (CFEs) in cases they investigated. Internal and external auditors and CPAs advising small business clients will learn of the most effective antifraud measures.
MEASURING THE COST OF FRAUD
Determining the true cost of occupational fraud is an impossible task. Because fraud is a crime based on concealment, organizations often do not know when they are being victimized. Many frauds never are detected or are caught only after they have gone on for several years. Many of those are never reported or prosecuted. In fact, there is no agency or organization that is specifically charged with gathering comprehensive fraud-relat.
Assignment 1 Foreign Source Income Rules (Client Letter)Due Wee.docxtrippettjettie
Assignment 1: Foreign Source Income Rules (Client Letter)
Due Week 2 and worth 160 points
You are a CPA working as a tax professional engaged to provide tax advice to a client with operations in the United States and internationally. The client has specifically requested information on strategies that she can use to minimize the tax effects of foreign sourced income.
Use your text, the Internet, and / or Strayer Learning Resource Center to research the various rules regarding source rules for income and deductions.
Write a one to two (1-2) page paper in which you:
1. Create a letter to communicate to your client about the source rules for income and deductions and the conditions under which income received in foreign countries may or may not be taxed in the U.S.
2. Present a proposal to the client as to how to reduce the U.S. tax impact from income received from outside the U.S. Provide details to support your proposal.
3. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
4. Format your assignment according to the following formatting requirements:
·
a. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
b. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page is not included in the required page length.
c. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.
The specific course learning outcomes associated with this assignment are:
· Analyze the source rules reach of the U.S. Tax Code in regard to international taxation.
· Use technology and information resources to research issues in international tax planning and research.
· Write clearly and concisely about international tax planning and research using proper writing mechanics.
Click here to view the assignment rubric.
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/271133751
CORPORATE ACCOUNTING SCANDAL AT
SATYAM: A CASE STUDY OF INDIA'S ENRON
ARTICLE · APRIL 2013
CITATIONS
3
READS
14,224
1 AUTHOR:
Madan Bhasin
Universiti Utara Malaysia
61 PUBLICATIONS 122 CITATIONS
SEE PROFILE
All in-text references underlined in blue are linked to publications on ResearchGate,
letting you access and read them immediately.
Available from: Madan Bhasin
Retrieved on: 02 April 2016
https://www.researchgate.net/publication/271133751_CORPORATE_ACCOUNTING_SCANDAL_AT_SATYAM_A_CASE_STUDY_OF_INDIA%27S_ENRON?enrichId=rgreq-7575bbc3-6176-48c6-8023-d62e4623d53f&enrichSource=Y292ZXJQYWdlOzI3MTEzMzc1MTtBUzoxODc2OTYwNTYxMTkyOTdAMTQyMTc2MTYzNTgwNA%3D%3D&el=1_x_2
https://www.researchgate.net/publication/271133751_CORPORATE_ACCOUNTING_SCANDAL_AT_SATYAM_A_CASE_STUDY_OF_INDIA%27S_ENRON?enrichId=rgreq-7575bbc3-6176-48c6-8023-d62e4623d ...
The purpose of this study is to analyze empirically by using secondary data on the possibility of corporate fraud by using various fraud theory approach. The research model in this study was tested using the ordinary least square (OLS) analysis method. A total of 310 company data were collected which consisted of financial data and other supporting data published by companies listed on the Indonesia Stock Exchange in the range of 2012 to 2017. This study provides empirical evidence that all the variant of fraud theory (fraud triangle theory, fraud diamond theory and fraud pentagon theory) can be investigated for its significant effect on corporate fraud by only using secondary data that are available and freely accessed by the public. The empirically tested research model in this study can provide a comprehensive understanding of practitioners, academics, government agencies and the general public in analyzing the topic of corporate fraud.
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_Haluk Ferden Gursel
Global firms are recognizing that the
anti-fraud profession is an important
component of risk measurement and
avoidance. The analysis below
illustrates how recent risk-based
management control systems are
hastening the development of
specialized anti-fraud agents. It is
evident that the increased public
appetite for transparency and enhanced
accountability has also spurred rapid
developments in the anti-fraud
discipline.
Post privatization Corporate Governance and the challenges of working capital...inventionjournals
The paper examines the impact of Corporate Governance on liquidity ratio of Ashaka Cement Company. The variables studied were activity ratio as dependent variables and Corporate Governance proxies as independent variables. Data was collected from the secondary sources, and the statistical tools employed in the Methodology were; Performance Trend Analysis and OLS regression. Trend Analysis result suggests that, liquidity ratio was higher pre privatization periods. Inferential Statistics Result suggests that, minority ownership, board size and privatization have positive and significant impact on liquidity ratio of Ashaka Cement Company, while, Total Market Value of Shares and percentage of non executive directors have negative and significant impact on liquidity ratio of Ashaka Cement Company. However, workforce has positive and insignificant impact on liquidity ratio. The study concludes that, corporate governance has significant impact on liquidity ratio of Ashaka Cement Company. However, unfavourable macroeconomic environment militated against its efficiency. The study recommends that, Nigerian government should ensure favorable macroeconomic environment, Foreign Investors should secure global cement market opportunities to justify investment and enhance companies’ earnings The findings may useful to corporate stakeholders and government policy makers
45The Security Survey An OverviewA security survey is a.docxalinainglis
45
The Security Survey: An Overview
A security survey is a critical, on-site examination…to ascertain the present security
status, identify deficiencies or excesses, determine the protection needed, and
make recommendations to improve the overall security of the operation.
—Raymond M. Momboisse, Industrial Security for Strikes, Riots and Disasters,
Charles C. Thomas Publishers, 1977
The goal of risk management—to manage risk effectively at the least possible cost—cannot
be achieved without eliminating or reducing, through a total management commitment,
the incidents that lead to losses.1 Before any risk can be eliminated or reduced, it must first
be identified. One proven method of accomplishing this task is the security survey. Charles
A. Sennewald, author and security consultant, has defined the security survey as follows:
“The primary vehicle used in a security assessment is the survey. The survey is the process
whereby one gathers data that reflects the who, what, how, where, when, and why of the
client’s existing operation. The survey is the fact-finding process.”2
Why Are Security Surveys Needed?
There are reports published by the Association of Certified Fraud Examiners (ACFE)
estimating that the cost of fraud and financial abuse to American business was in excess
of $994 billion per year in 2008 and rising. This figure is believed by most authorities to be
very conservative. The sad fact is that no one organization is capable of collecting all the
data available concerning fraud. As an example, in America we have an alarming trend
in Medicare fraud, costing taxpayers untold millions of dollars. The biggest problem, and
the one seen most often by fraud investigators, is that most corporate managers do not
know if they have theft problems. Worse, many do not even want to know that they have
a problem with employee theft! Some managers seem to prefer to keep things as they are
and to regard any suggestion of the need for increased security as a direct or indirect crit-
icism of their ability to manage their operations. We hope that this attitude has changed
for the better as a result of the downturn in the global economy. In times of economic
difficulties anything that affects the bottom line (profits) is not tolerated. Nevertheless,
where fraud exists, most business fraud surveys calculate losses at about 6 percent of
annual revenue. Some surveys we have seen reported have concluded that losses attrib-
utable to employee theft (internal theft) equal or exceeded profits! This is especially
7
1 The field of risk management encompasses much more than security and safety. These two subjects, along
with insurance, however, are the cornerstones of most effective risk management programs.
2 Sennewald, C. A., 2004. CPP, Security Consulting, third ed. Butterworth-Heinemann, Elsevier, Boston, MA.
C
O
N
N
E
L
L
,
B
O
B
1
6
6
0
T
S
46 RISK ANALYSIS AND THE SECURITY SURVEY
true for chain-store operations, .
Assessment of Tone at the TopA C C O U N T I N G & A U D .docxdavezstarr61655
Assessment of Tone at the Top
A C C O U N T I N G & A U D I T I N G
a u d i t i n g
JUNE 2015 / THE CPA JOURNAL50
By Susan S. Lightle, Bud Baker, and Joseph F. Castellano
The Psychology of Control Risk Assessment
Standards require that auditors assess an entity’s internal controls over financial reporting (ICFR), includ-
ing the control environment, which is influenced by the tone set by management and the board regarding
the importance of ICFR and the expected standards of employee conduct. This article argues that auditors
cannot assess the tone at the top by simply checking off a list of control mechanisms; they must understand
what motivates behavior within the organization (what might be called the psychology of control risk assess-
ment). It also illustrates a model to help auditors anticipate when an organization is prone to earnings
manipulation, and suggests how to assess the tone at the top of an organization.
In Brief
JUNE 2015 / THE CPA JOURNAL 51
I
n the late 1960s and early 1970s, the
U.S.-based energy conglomerate ITT
put together a remarkable string of
earnings increases under the leadership
of Harold Geneen: ITT increased its net
earnings each and every quarter, for 58
consecutive quarters, or more than 14 years
of Geneen’s 18-year tenure. Geneen was
lionized for this achievement; he became
the highest paid executive in the United
States, authored best-selling books, and was
memorialized across the country in the
form of new centers, buildings, and foun-
dations (Harvey D. Shapiro, “Management
Was the Message,” New York Times,
March 10, 1985, http://www.nytimes.
com/1985/03/10/books/management-was-
the-message.html). Only in retrospect, after
Geneen’s departure and the subsequent dis-
mantling of most of ITT, did it become
clear that those 58 straight quarters of
growth were not what they seemed to be.
The Price of Success
Earnings management—a benign
euphemism for financial manipulation—
is not a wholly irrational activity, albeit
an unethical one. In addition to the praise
heaped upon high flyers like ITT under
Geneen, researchers have demonstrated that
companies reporting 20 consecutive quar-
ters of earnings increases enjoy greater
profitability, higher stock valuations, and
higher price-earnings ratios than counter-
parts with similar underlying financial
strength (James N. Myers, Linda A. Myers,
Douglas J. Skinner, “Earnings Momentum
and Earnings Management,” August 2006,
http://ssrn.com/abstract=741244 or
http://dx.doi.org/10.2139/ssrn.741244).
But Myers, et al., also showed that this
“success” comes with a price: All those
previously positive measures decline
markedly when the unbroken sequence of
quarterly successes finally ends; the longer
the quarterly streak of good news runs, the
deeper the firm’s plunge when the time
of reckoning arrives. Efforts to manipu-
late earnings are practiced by widely dis-
parate companies and CEOs, whether lit-
tle known or famous; publicly regarded
as miscreants or su.
Assessment of Tone at the TopA C C O U N T I N G & A U D .docxfredharris32
Assessment of Tone at the Top
A C C O U N T I N G & A U D I T I N G
a u d i t i n g
JUNE 2015 / THE CPA JOURNAL50
By Susan S. Lightle, Bud Baker, and Joseph F. Castellano
The Psychology of Control Risk Assessment
Standards require that auditors assess an entity’s internal controls over financial reporting (ICFR), includ-
ing the control environment, which is influenced by the tone set by management and the board regarding
the importance of ICFR and the expected standards of employee conduct. This article argues that auditors
cannot assess the tone at the top by simply checking off a list of control mechanisms; they must understand
what motivates behavior within the organization (what might be called the psychology of control risk assess-
ment). It also illustrates a model to help auditors anticipate when an organization is prone to earnings
manipulation, and suggests how to assess the tone at the top of an organization.
In Brief
JUNE 2015 / THE CPA JOURNAL 51
I
n the late 1960s and early 1970s, the
U.S.-based energy conglomerate ITT
put together a remarkable string of
earnings increases under the leadership
of Harold Geneen: ITT increased its net
earnings each and every quarter, for 58
consecutive quarters, or more than 14 years
of Geneen’s 18-year tenure. Geneen was
lionized for this achievement; he became
the highest paid executive in the United
States, authored best-selling books, and was
memorialized across the country in the
form of new centers, buildings, and foun-
dations (Harvey D. Shapiro, “Management
Was the Message,” New York Times,
March 10, 1985, http://www.nytimes.
com/1985/03/10/books/management-was-
the-message.html). Only in retrospect, after
Geneen’s departure and the subsequent dis-
mantling of most of ITT, did it become
clear that those 58 straight quarters of
growth were not what they seemed to be.
The Price of Success
Earnings management—a benign
euphemism for financial manipulation—
is not a wholly irrational activity, albeit
an unethical one. In addition to the praise
heaped upon high flyers like ITT under
Geneen, researchers have demonstrated that
companies reporting 20 consecutive quar-
ters of earnings increases enjoy greater
profitability, higher stock valuations, and
higher price-earnings ratios than counter-
parts with similar underlying financial
strength (James N. Myers, Linda A. Myers,
Douglas J. Skinner, “Earnings Momentum
and Earnings Management,” August 2006,
http://ssrn.com/abstract=741244 or
http://dx.doi.org/10.2139/ssrn.741244).
But Myers, et al., also showed that this
“success” comes with a price: All those
previously positive measures decline
markedly when the unbroken sequence of
quarterly successes finally ends; the longer
the quarterly streak of good news runs, the
deeper the firm’s plunge when the time
of reckoning arrives. Efforts to manipu-
late earnings are practiced by widely dis-
parate companies and CEOs, whether lit-
tle known or famous; publicly regarded
as miscreants or su ...
Procurement fraud, bribery, and corruption have moved beyond a perceived risk and become a real issue for many organizations. This paper highlights the need for organizations to put the necessary processes in place to protect against procurement fraud. It also serves as a warning that the absence of any visible instances of bribery, fraud, and corruption should be no cause for complacency as instances of successful perpetration may remain hidden for long periods of time.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
Explore the world of the Taurus zodiac sign. Learn about their stability, determination, and appreciation for beauty. Discover how Taureans' grounded nature and hardworking mindset define their unique personality.
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
Global Interconnection Group Joint Venture[960] (1).pdf
Fraud risk assessment
1. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
Fraud Risk Assessment: A Tool for SME’s to Identify Effective
Internal Controls
Geetha A Rubasundram
School of Accounting, Finance and Quantitative Studies, Asia Pacific University, Technology Park Malaysia
57000, Kuala Lumpur
Email : geetharubasundram@yahoo.com
Abstract
In recent years, the importance of good control mechanisms has increased significantly due to the number of
high-profile corporate failures caused by top management fraudulent acts. Sarbanes Oxley Act 2002, Section 404
says that it is the management’s responsibility to maintain and assess the effectiveness of its own internal control
structure for financial reporting. The Act also states that it is the auditor’s responsibility to attest and report on
the management’s assessment and the state of the overall financial control. Previous research that had been
carried out was from the perspective catered mainly for the auditors or audit committees that had been set up by
the management of the organization. Not many organizations, especially Small and Medium Sized
Organizations are able to afford the cost of hiring consultants, auditors (external and internal) or set up audit
committees to assess and manage the Internal Controls. Therefore, this paper expects to provide guidance to
smaller sized organizations that prefer to set up and maintain effective and efficient Internal Controls in-house;
on how to carry out a Fraud Risk Assessment and recommend Internal Controls based on the results, whilst
trying to ensure costs, personnel and operations turnover are not affected in an unreasonable manner.
Keywords: Fraud Risk Assessment, Internal Controls, Fraud Schemes, Fraud, Small & Medium Sized,
Community Manager
1.0. INTRODUCTION
After the collapse of Enron, WorldCom and other failures of high profile corporations due to fraudulent activities,
many organizations, and stakeholders around the world have focused their efforts to minimize the risk of fraud
within their organizations. Fraud has been defined as an intentional act designed to deceive others, resulting in
the victim suffering a loss after relying on the deceit and the perpetrator achieving a gain (AICPA et al, 2008, p.5)
This definition is agreed by The Institute of Internal Auditors, Association of Certified Fraud Examiners and The
American Institute of Certified Public Accountants in their joint publication: Managing the Business Risk of
Fraud: A Practical Guide. A more detailed discussion on the definition of fraud is available in the literature
review section.
With the collapse of these companies due to fraudulent activities, the losses suffered were huge and affected
many stakeholders such as:-
• Employees to have lost their jobs
• Shareholders to have lost their investments
• Suppliers who had provided services to the organizations to not receive their payments
• Banks who had loaned or advanced funds to lose their advances
• Customers who had paid for the services to lose their money
• Economy of countries to be affected
A survey done by PricewaterhouseCooper’s in 2007 known as the Global Economic Crime Survey,
(PWC, 2007, p.4) found that over 43% of the 5,428 companies from 40 countries that took part in their research
project had suffered one or more significant economic crimes during the previous two years. The same survey on
page 8 attempted to identify the cost of losses from fraud., Although the survey has managed to show that the
estimated loss has increased from USD 1.7 Million on average per company in 2005 to USD 2.4 Million in 2007,
it was mentioned that this figure could have been undervalued due to the inability of the executives interviewed
to place a confirmed figure on the losses. The Association of Certified Fraud Examiners (ACFE, 2010, p.9)
agrees with the above survey in the “Report To The Nations 2010”, where it states “The inherently clandestine
nature of fraud means that many cases will never be revealed, and of those that are, the full amount of losses
might not be uncovered, quantified or reported. Consequently, any measurement of occupational fraud costs will
be, at best, an estimate. In any event, it is undeniable that the overall cost of occupational fraud is immense,
certainly costing organizations hundreds of billions or trillions of dollars each year”. Hence, looking at the high
cost of fraud, the need for organizations and business to focus on preventing, detecting, and responding to fraud
is extremely high.
The Association of Certified Fraud Examiners– Report to the Nation 2010, (ACFE, 2010) mentions
that fraud is likely to be detected by tips from whistleblowers (40.2%), management review (15.4%) and internal
106
2. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
audit (13.9%). Having anti-fraud controls appears to have helped reduce the cost and duration of fraud schemes.
The report had looked at the effect of 15 common controls on the median loss and duration of the frauds. Victim
organizations that had these controls in place had significantly lower losses and time-to-detection than those
organizations without the controls.
THE RESEARCH PROBLEM
The writer of this paper could not find relevant literature written for an in house management team from Small
and Medium Sized Organizations. Small and Medium Sized Enterprises are defined by the European
Commission as having less than 250 persons employed. They should also have an annual turnover of up to
EUR 50 million, or a balance sheet total of no more than EUR 43 million (European Commission
Recommendation of 6 May 2003).
Therefore, the objective of this paper was to introduce and implement efficient and effective Internal
Controls for the Small and Medium Sized Organisation. In larger organisations, the division of roles and
responsibility may prevent fraudulent acts due to the necessity and risk of collaboration. However, in smaller
sized firms, more often than not, the decision maker or authorised signatory may be limited to one person, or
minimal persons. Hence, the risk of fraudulent acts occurring may be higher as compared to larger firms. The
Association of Certified Fraud Examiners (1998) reported that organisations employing less than 100 employees
were the most vulnerable to the risk of fraud. This is also discussed by Shanmugam et al (2012).
The selection of choice for the Case Study is a Community Manager using the recommended process
identified during the literature review and the carrying out of the selected research methodology. A definition
which the writer found very close in description to the actual role of the Community Manager is in Wikipedia.
Although the writer is aware that Wikipedia is not an accepted source, but for the sake of providing a description
of the term, it has been included here. As briefly defined by Wikipedia, a Community Manager is a manager of
a “condominium or homeowners association including single-family home subdivisions, townhouses, or mixed-use
development”. A similar description is provided by Hyatt (1975, p. 979) where he discussed about the set up
of a Homeowner Association in a condominium. He mentions that the owner is not only interested in the unit
that he buys, but also the amenities, the grounds, the exterior of the building etc. Usually the Owner Association
is either run by the owners themselves or they hire a manager or management company to manage it for them
with periodic reporting. The role of the Community Manager is discussed and explored further in later sections
of this research paper.
This study explores the gap between the methodology used by auditors (internal and external) as
compared to an organizations internal management to provide a guide that is relevant and applicable to all small
and medium sized organizations to carry out a Fraud Risk Assessment and Management, as well as identifying
Internal Controls.
2.0. LITERATURE REVIEW
2.1. DEFINITION AND ELEMENTS OF FRAUD
Fraud has been defined as an intentional false representation by one party in order to gain unlawfully at the
expense of another who relied on the false information provided. This is agreed by Ruin (2009, p.88), CIMA
(2009, p.7) and Wells (2007, p.2). Examples of fraudulent activities include theft, corruption, bribery,
embezzlement, money laundering, and others, which causes financial losses to a corporation (CIMA, 2009, p.7).
A more corporate definition of fraud comes from the Statement on Auditing Standards 99 (SAS 99). SAS 99
defines fraud as an intentional act to cause a material misstatement in the financial reports, either by falsification
of accounting records, misappropriation of company assets such as theft or fraudulent expenditure amongst
others (Ruin, 2009, p.99). The Australian Auditing Standard ASA 240 (2006, Para. 9) agrees with the SAS 99
saying that it is an intentional act by one or more individuals among management, those charged with
governance, employees, or third parties, involving the use of deception to obtain an unjust or illegal advantage.
The focus of this paper is on Corporate Fraud; therefore, the victim party with losses due to fraudulent
activity is the Corporation itself. However, perpetrators of fraud may not necessarily be within the Corporation
itself. O’Bell (2009) mentions that an individual within an organization or external to the organization can
perpetrate fraud. For clarification purposes, organization and corporation signifies the same in this paper.
If the possible perpetrators were from within the organization such as the employees of the
organization, then they would be committing Occupational Fraud. Wells (2007, P.1) defines Occupational Fraud
as the misuse of one’s occupation in order to achieve personal enrichment through the deliberate misuse or
misapplication of the employing organizations resources or assets. Wells (2007) mentions the following points
need to be present to proof a fraudulent activity occurred in the first Report to the Nation on Occupational Fraud
and Abuse in 1996:
• Clandestine and violates the employees fiduciary duties to the organization
• Committed for the purpose of direct or indirect financial benefit to the employee
107
3. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
• Has costs the employing organizations losses in terms of assets, revenues, or reserves.
An employee’s fiduciary duty involves acting in good faith and in an honest manner when being entrusted in
handling assets or benefits of the assets not belonging to him, i.e. in a position of a trust (Wells, 2007, p.2). An
example of a violation of Fiduciary Duty would be if a Purchasing Manager takes bribes from a supplier and
awards the same supplier contracts regardless of their capabilities and experience.
There have been studies carried out to understand what makes persons in a position of trust, to become
violators of the same trust given to them. Most of the current literature read is from the research carried out by
Edwin H. Sutherland and Donald R Cressey (Wells, 2007, p.7). Sutherland was the first to define “white colour
crime” in 1939 which meant criminal acts of corporations and individuals acting in their corporate capacity.
Sutherland later developed the “theory of differential association” which was against the view then of “criminals
beget criminal offspring” (Wells, 2007, p.7). Sutherland believed crime maybe learnt by communicating with
others and should take into account environmental factors. A more recent literature is the research done by
Donald R. Cressey, who was a student of Sutherland (Wells, 2007, p.8), a theory now popularly known as the
Fraud Triangle.
2.2. FRAUD TRIANGLE – MOTIVE, OPPORTUNITY & RATIONALIZATION
Cressey’s focus was on embezzlers and the circumstances that would cause the then employees to become trust
violators. Wells, (2007, p.2) defines embezzlement as to intentionally misuse the benefit or use of an asset which
has passed on to the embezzler via a position of trust or agency, for the benefit of the embezzler. Cressey
interviewed about 200 convicted offenders during his research. Cressey’s final conclusion was that trusted
persons become trust violators when they view themselves as having a non-shareable financial problem that is
solvable using unethical means by violating their position of trust. The trust violators believed that they had a
right to use the organization’s assets and benefits assigned to the assets. (Wells, 2007, p.6)
Over the years, Donald Cressey’s hypothesis or popularly known as the Fraud Triangle where one leg
of the triangle represents pressures or motivation to carry out the fraud, the other is the opportunity available to
carry out the fraud and the final is rationalization.
CIMA (2009, p.13) mentions the same whereby:-
- Motivation or pressure is typically based on either greed or need
- Opportunity for fraud to take place is more likely in companies where there is a weak internal control
system, poor security over company property, little fear of exposure and likelihood of detection, or
unclear policies to concerning acceptable behavior.
- Rationalization of the fraudulent behavior by the perpetrators as necessary, harmless, or justified.
‘O Bell, (2009) mentions that when all three of the above conditions (motivation or pressure, opportunity and
rationalization) are present, the risk of fraud being perpetrated can increase significantly.SAS 99 agrees that
motivation or pressure, opportunity and rationalization are three conditions that can increase the risk of
fraudulent activities occurring in an organization. Any method identified to reduce the risk of fraud in an
organization should focus on reducing the three conditions identified in the fraud triangle.
2.3. METHODS TO PREVENT & DETECT FRAUD
O’Bell (2009) mentions that of the three conditions (opportunity, rationalization, and motivation); opportunity is
the one condition that is manageable to address fraud risks. This condition is managed by designing and
implementing a control environment that prevents, detects, and deters most fraudulent behaviour, whether
conducted by employees, vendors, consultants or senior management.
CIMA (2009, p.15) mentions that one of the most effective ways to tackle the problem of fraud is to adopt
methods that will decrease the motive or opportunity, or preferably both. Rationalization is personal to the
individual and more difficult to combat.
This paper followed ‘O Bell’s recommendation and focused on reducing Opportunity by implementing
a control environment to prevent, detect and deter fraudulent behaviour and activities. Rationalization as agreed
by both CIMA and ‘O Bell is more personal and difficult to control. However, pressures and motive, although
recommended by CIMA (2009, p.15), would not be part of the factors taken into consideration in this paper in
agreement with Cressey. Cressey considers pressures or motive as a non-sharable problem by the perpetrator
(Wells, 2007, p.6); hence, it may be a personal issue to the individual.
2.4. DEFINITION OF A CONTROL ENVIRONMENT AND INTERNAL CONTROL SYSTEM
O’ Bells recommendations of implementing a control environment with strong internal controls to prevent,
detect, and deter fraudulent behaviour is agreed by the Association of Certified Fraud Examiners (ACFE, 2010).
Having sound internal controls systems is also a requirement under the Companies Act, Sarbanes Oxley,
Turnbull Guidance, and various corporate governance codes. (CIMA, 2009, p.33)
A Control Environment, according to The Committee of Sponsoring Organizations of the Treadway Commission
108
4. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
(COSO), establishes the foundation for the Internal Control System by providing fundamental discipline and
structure (Verschoor, 2008). COSO 1992 - 2004 defines Internal Control System as a process, implemented and
managed by an entity's board of directors, management, and other personnel, designed to provide reasonable
assurance regarding the achievement of objectives regarding:
109
(i) Company strategy;
(ii) Effectiveness and efficiency of operations;
(iii) Reliability of financial reporting
(iv) Laws and regulations compliance
Rikhardsson (2006, p 2&8) mentions factors that contribute to the control environment which include:
• Integrity
• Ethical values
• Competence of the entity's management and employees
• Management's philosophy and operating style
• Assignment of authority
Therefore, a sound ethical culture and an effective system of internal control are essential elements of
an anti-fraud strategy. The Control Environment and Internal Control System should be an initiative by top
management as agreed by Rikkhardsson, The Committee of Sponsoring Organizations of the Treadway
Commission (COSO) and CIMA,(2009, p.33) says that the overall responsibility for the organization’s system
of internal control must be at the highest level in the organization. The emphasis on management integrity is also
discussed by Turner et al (2003), identifying the connection between incentives, opportunity and management
integrity.
For the Control Environment and Internal Control System to be successful, the Internal Control System
has to be included with the vision and mission of the company to achieve the companies’ objectives in an
effective and efficient manner. Internal controls operate on many levels. There could be behavioural controls,
information controls, operational controls, preventive controls, detective controls, application controls, and
general controls (Rikkhardsson). CIMA (2009) also provides examples of areas where Internal Controls typically
exist such as approval and authorization processes, access restrictions and transaction controls, account
reconciliations, and physical security. These procedures often include the division of responsibilities, checks and
balances to reduce risk.
Setting the control procedures and policies should not be a one off exercise and should be reviewed
continuously. When new policies are set in place, it should be done in a clear manner, documented and
communicated to all within the organization (CIMA, 2009, p.34). Regular review of internal controls is part of
the risk management process, and there should be continual improvement of controls taking into account of
possible new risks, such as new markets and technologies, changes in structure, or innovative fraudsters.
Ultimately, the internal control system should be part of the culture and operations of an organization (CIMA,
2009, p.34)
2.5. COST BENEFIT ANALYSIS OF INTERNAL CONTROLS
Nevertheless, too many controls could proof to be costly and time consuming, hence may cost the organization
to lose more due to a bureaucratic environment. The same view is shared by CIMA (2009), whereby the Internal
Control System consists of an organization’s policies and procedures that when taken together, support an
organization’s effective and efficient operation.
Verschoor, (2008, p.141) mentions that management should evaluate the controls that have been implemented to
ensure that the risk of a material misstatement in the financial statements could happen would be prevented or
detected in a timely manner. The approach taken should be top-down and risk based, to ensure efficiency of
operations by allowing management to focus on those controls that are needed to adequately address the risk of a
material misstatement of its financial statements and does not require the organization to identify every control
in a process or document the business processes impacting the organization (Verschoor, 2008, p.142).
2.6. RISK ASSESSMENT AND MANAGEMENT
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) has outlined five essential
components of an effective internal control system. Apart from the control environment, it also includes
communication and monitoring of the policies and controls set in place (Verschoor, 2008). The remaining two
components are:
- Risk Assessment, an analysis carried out by management to identify risks that could prevent the
achievement of predetermined objectives
- Control Activities, which consists of the policies, procedures, and practices, that ensure management
objectives and risk mitigation strategies are carried out and achieved.
O’ Bell (2009) recommends carrying out a fraud risk assessment as part of the anti-fraud controls to be
5. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
implemented, which is in line with the recommendation from The Committee of Sponsoring Organizations of the
Treadway Commission (COSO) excerpt above, except that it focuses on the risk of fraud purely. Since, this
paper also covers Internal Controls that need to be set in place, it shall also take into account the five essential
components from the Risk Management Strategies as mentioned in The Committee of Sponsoring Organizations
of the Treadway Commission (COSO).
CIMA (2009, p.17) defines Risk Management as the process of understanding and managing risks that
the entity is inevitably subject to in attempting to achieve its corporate objectives (CIMA official terminology,
2005). One such risk is fraud risk, a component of operational risk. Operational risk focuses on the risk
associated with errors or events in transaction processing or other business processes. A fraud risk review
considers whether these errors or events could be the result of a deliberate act designed to benefit the perpetrator.
The possible type of offence and the potential perpetrator classifies fraud categories and the risk from each area
and process of the business is gauged (CIMA, 2009, p.21).
The risk management cycle is an interactive process of identifying risks, assessing their impact, and prioritizing
actions to control and reduce risks. CIMA recommends the following steps (2009, p.19):
- Establish a risk management group and set goals.
- Identify risk areas
- Understand and assess the scale of risk in the initial stages itself.
- Develop a risk response strategy. Before developing the strategies, it is necessary to establish the risk
appetite of the organization. Risk appetite is the level of risk that the organization is prepared to accept
and this should be determined by the board. The appetite for risk will influence the strategies to manage
risk (CIMA, 2009, p22).
- Strategies for responding to risk generally fall into one of the following categories :-
• Risk Retention (e.g. choosing to accept small risks)
• Risk Avoidance (e.g. stopping sale of certain products to avoid the risk of occurring)
• Risk Reduction (e.g. through implementing controls and procedures)
• Risk Transfer (e.g. contractual transfer of risk; transferring risks to insurers)
- Implement the strategy and allocate responsibilities. - Clear assignment of responsibility and target
dates, including budgetary changes (CIMA, 2009, p.22).
- Implement and monitor the suggested controls - The chosen strategy may require the implementation of
new controls or the modification of existing controls. Controls implemented need to be assessed
together with the companies dynamic business objectives (CIMA, 2009, p.22).
- Review and refine the process continuously. (CIMA, 2009, p.22)
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Enterprise Risk
Management (ERM) framework , Vershoor (2008, P.131) and Rikhardsson(2006, p.19) agrees that just like the
Internal Control Environment, the risk appetite is set by the entity’s top management and will be used to
influence the strategies set in order to achieve the objectives set by the entity. Verschoor, (2008, p.131) mentions
that according to COSO, there are eight components of Enterprise Risk Management which in turn is similar to
the risk management cycle recommended by CIMA.
This paper will be following the recommendation in this section to carry out the Fraud Risk Assessment and
setting of an effective and efficient Internal Control Environment.
2.7. CARRYING OUT A FRAUD RISK ASSESSMENT
CIMA and The Committee of Sponsoring Organizations of the Treadway Commission (COSO) recommend
carrying out a Fraud Risk Assessment prior to implementing internal controls. This is to ensure proper focus,
identification, and management of fraud risk in an organization. O’ Bell (2009) believes that the Fraud Risk
Assessment helps to focus management’s attention on the significant fraud risks to be addressed and managed.
An effective Fraud Risk Assessment may include:
• Specific fraud schemes that could be perpetrated against the organization
• The personnel or departments within the organization that could commit each scheme
• The likelihood of that scheme occurring against the company in the current year
• The magnitude of impact that the scheme would have on the organization
• Assessment of the existing internal controls to mitigate fraud, and the identifying of any gap required to
update controls.
Beran (2009) also provides a guideline to carry out a Fraud Risk Assessment through conducting
brainstorming sessions with management to discuss potential fraud schemes and scenarios. A Fraud Risk Matrix
includes each process owner, possible fraudulent activities, and scenarios affecting the process, and a detailed
account of all controls in place to prevent or detect fraudulent activity to be created to monitor and gauge. Once a
Fraud Risk Matrix is developed, reviews can be performed or select processes to evaluate the effectiveness of the
110
6. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
stated controls to mitigate the fraud risks. The matrix provides the ability to perform a gap analysis to identify
areas where anti-fraud control is required.
The North Dakota State Government guideline for carrying out a Fraud Risk Assessment agrees with
the steps of setting up a risk assessment team and carry out a brainstorming activity and other methods such as
interviews with other personnel to understand the organizations business process, gather information about
potential fraud, identify the fraud risks, including the factors of the Fraud Triangle, risks of management override
of controls, an understanding of the fraud risk and the subset of risks specific to the organization.
CIMA, (2009, p.20) agrees with the above and also mentions some of the techniques that can be used
for analysis and identification of risk areas such as workshops, interviews, brainstorming, questionnaires, process
mapping, and comparison with other organizations and discussion with peers. However, the resulting document
is known as a Risk Register (CIMA, 2009, p.21), as compared to Beran’s (2009) version of the Fraud Risk
Matrix. The Risk Register and Risk Matrix are just different in name, but contents are the same, therefore both
terms will appear and mean the same in this paper.
The below steps have been identified to carry out a successful Fraud Risk Assessment & Management:
1. Management to initiate the Fraud Risk Assessment & Management by setting up a Fraud Risk
Assessment & Management Team (FRAM Team) to set goals, objectives and the fraud risk appetite of
the organization.
2. FRAM Team to carry out brainstorming activities, process mapping, necessary checks, audits & tests
and discussions / interviews with other personnel to understand the following:
2.1 The organizations environment, management, business, departments, processes , functions
111
and owners
2.2 Potential fraud scenarios and schemes, taking into account red flag areas such as
management override of controls and personnel who may have the three factors identified
in the Fraud Triangle – Opportunity, Rationalization and Motivation
2.3 Identify the categories required and assess the likelihood and impact of the fraud schemes
accordingly
2.4 Based on the above, do a review and gap analysis of the current controls in place and any
additional or revised controls needed, in line with the organizations risk appetite and
decided risk strategy
2.5 Implement and monitor controls with periodic evaluation.
Based on Step 1, the Fraud Risk Assessment & Management Team preferably consists of individuals from
different backgrounds, knowledge, skills, and perspectives. A suggested mix from North Dakota State
Government is:
- Accounting / finance personnel who are familiar with the financial reporting process and internal
controls
- Non financial business unit and operations personnel, to leverage their knowledge of day to day
operations
- Legal and compliance personnel
- Internal Audit personnel
For Step 2.2, the North Dakota State Government guide mentions that each division or function needs to carry
out a fraud assessment. Functions and services that need to be included in the assessment are Finance and
Accounting, Human Resources Management (payroll), Purchasing and Contracting and Information Technology.
2.8. FRAUD TREE: CLASSIFYING CATEGORIES OF FRAUD
In order to list specific fraud schemes, this paper reverts to (Wells 2007, p. 44 – 45), where it states that it is
better to classify and categorize occupational fraud, rather than lumping them into a general category, as by
comparing schemes in well-defined categories, common methods used by the perpetrators and common
vulnerabilities in the victim organization that allowed these frauds to succeed. This in turn should help in the
development of better, more efficient anti fraud tools. After the Report to the Nation study in 1996, the Fraud
Tree classification system was set up that accounted for most, if not all, of the most common occupational fraud
and abuse schemes.
According to the Fraud Tree, there are three major categories of occupational fraud:
- Asset Misappropriations
- Corruption
- Fraudulent Statements
Wells (2007, p.51 – 52) defines Asset Misappropriation as the misuse of any company asset for
personal gain. The book refers to Marshall and McManus definition of assets whereby “Assets are probable
future economic benefits obtained or controlled by a particular entity as a result of past transactions or events.
There are two broad definitions of assets, tangible and intangible. Intangible assets are difficult to misappropriate
7. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
because they are not physically identifiable. Hence for all practical purposes, asset misappropriations are
restricted to tangible assets. Tangible assets for accounting purposes, are classified on the entity’s books as one
of five principal types, cash accounts receivable, inventory, plant and equipment, or investments.
The second category of occupational fraud is Corruption, which is defined as “an act done with intent
to give some advantage inconsistent with official duty and the rights of others (Wells, 2007, p.278), which in
turn can be broken down into Conflicts of interest, Bribery, Illegal Gratuities and Economic Extortion (Wells,
2007, p.281).
The third category is Fraudulent Statements where can be segregated into financial and non-financial.
Wells mentioned that it would be easier to prevent and detect fraud by understanding the different pressures
faced by senior managers to drive them to commit fraud such as to show a positive performance, or losses etc.
(Wells, 2007, p.328).
Examples of fraudulent statement schemes are Fictitious Revenues, Timing Differences, Concealed
Liabilities and Expenses, Liability / Expense Omissions, Capitalized Expenses, Improper Disclosures, Improper
Asset Valuations etc. (Wells, 2007, p. 361)
The same categories are mentioned by CIMA (2009, p.8) and the North Dakota State Government. The
actual specifics and breakdowns of the categories, and the departments or personnel involved will not be covered
here, even though it was read as part of the Literature as instead, it will be directly covered under the Fraud Risk
Matrix towards the end of this paper.
2.9. ASSESSING THE LIKELIHOOD AND IMPACT OF THE RISK OF FRAUD
The next step after identifying possible fraud scenarios is to assess the likelihood and impact of the risk of fraud.
The North Dakota State Government article suggests assessing the relative likelihood and potential significance
of identified fraud risks based on historical information, known fraud schemes and interviews with staff,
including business process owners.
The North Dakota State Government guide recommends the following to assess both the likelihood and impact
as follows:
- Likelihood: To assess based on the instances of that particular fraud occurring in the past in that
organization, the prevalence of the fraud risk in industry and other factors, such as the number of
individual transactions, the complexity of the risk and the number of people involved in reviewing or
approving the process. Recommended categories to adequately grade the likelihood is remote,
reasonably possible and probably.
- Significance: Management’s assessment of the significance of a fraud risk should include not only
financial statement and monetary significance but also significance to criminal, civil, and regulatory
liability. The recommended grading categories include immaterial, more than significant, and material.
CIMA (2009, p.20) says as part of the Risk Management Cycle, the Fraud Risk Assessment &
Management Team should understand and assess the scale of risk in the initial stages itself. The group should
agree on the most appropriate definition and number of categories used when assessing likelihood and impact,
the two variables normally used to assess the scale of risk. The assessment of impact should be on an overall
basis, taking into account financial impact, political and commercial sensitivities, as well as the organizations
viability and reputation. The analysis should be either qualitative or quantitative and should be consistent to
allow comparisons. The qualitative approach usually involves grading risks in high, medium, and low categories.
The assessment of the likelihood of a risk occurring is by using the below basis:
- Gross: Assesses the inherent likelihood of the event occurring in the absence of any processes, which
the organization may have in place to reduce that likelihood.
- Net: Assesses the likelihood, taking into account current conditions and processes to mitigate the
112
chance of the event occurring.
- Target: Likelihood of a risk occurring reflects the risk appetite of the organization
Curtis (2008, p.131) is of the view that risks are to be analyzed by considering the likelihood and
impact as a basis for determining how they should be managed. CIMA, in the paragraph above, recommends that
risks be assessed on an inherent and residual basis.
Therefore, all three references agree that two main variables (impact or significance and likelihood) are
required to understand and assess the scale of risk. This paper shall follow the general recommendation of the
references and use the qualitative approach of providing a range following a grading of high, medium, and low
as compared to the recommendation of CIMA to use either quantitative grading. The assessment of the scale of
risk is on an inherent and residual basis, taking into account the risk appetite ascertained. The assessment of the
FRAM Team should be flexible yet detailed, taking into account industry expectations and externalities.
2.10. DEVELOPING A RISK STRATEGY
After assessing and identifying the possible fraud risks, the next step would be to develop a risk response
8. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
strategy. CIMA (2009, p.19) categorizes Risk Response Strategies to generally fall into one of the following
categories:-
- Risk Retention (e.g. choosing to accept small risks)
- Risk Avoidance (e.g. stopping sale of certain products to avoid the risk of occurring)
- Risk Reduction (e.g. through implementing controls and procedures)
- Risk Transfer (e.g. contractual transfer of risk such as transferring risks to insurers).
Curtis (2008, p.131) mentions that Committee of Sponsoring Organizations of the Treadway
Commission (COSO) also categorizes risk responses in the same way (avoiding, accepting, reducing or sharing
risk) and sets to develop a set of actions to align risks with the entity’s risk tolerances and appetite.
After deciding on the risk strategy, the final step shall be to implement, communicate, monitor and
carry out periodic evaluation of the risk of fraud and controls in line with the dynamic changes in the
organizations industry and business environment, and to assess it against the current risks identified and controls
in place, in line with the recommendation by CIMA and Committee of Sponsoring Organizations of the
Treadway Commission (COSO).
2.11. HYPOTHESIS AND RESEARCH QUESTION DEVELOPMENT
Coram et al (2008, p. 557) suggest that organizations with an internal audit department are more likely to detect
and self–report fraud, especially those that do not outsource that function. However, for those organizations that
are small and medium sized, it may not be feasible or cost efficient for them to have an Internal Audit
Department. Therefore, it would be better to have an in house management team to monitor, test, and implement
internal controls for small and medium sized companies who do not have the financial means to employ an
internal auditor, set up an audit committee, or hire an external auditor to carry out an in-depth testing
periodically.
In the literature review, a crucial step in identifying the required Internal Controls is to carry out a
Fraud Risk Assessment and Management. This is to ensure that the identified Internal Controls are effective and
would not cost the company in terms of inefficiency by implementing unnecessary controls.
Therefore, the Research Question (RQ1) and Hypothesis (H1) developed were as follows:
RQ1: Can Small and Medium Sized Organizations that carry out Fraud Risk Assessment & Management In
House identify and implement effective Internal Controls which are in line with the Organizations risk appetite
and strategy whilst not compromising on the efficiency of operations?
H1: Small and Medium Sized Organizations that carry out Fraud Risk Assessment & Management In House are
able to identify and implement effective Internal Controls which are in line with the Organizations risk appetite
and strategy whilst not compromising on the efficiency of operations .
3.0. RESEARCH DESIGN & METHODOLOGY
3.1. RESEARCH METHODOLOGY
The researcher’s main criteria when selecting the research methodology is as follows:
1. Ability to carry out an in-depth study of all documents, employees, culture, environment and processes
113
without any limitations.
2. To be able to carry out the necessary steps to test the current internal controls, environment and to
participate in discussions and decision making process.
3. To be able to bridge the gap between theory and practise, and to produce an actual process flow which
reflects the true professional practical situation.
Therefore, the research methodology selected by the writer of this thesis was to use Action Research
with a Case Study to be able to achieve the above. The writer agrees with Kizito and Kuhne et al (1997, p.23),
whereby that Action Research enables research to take place in real life situations and to solve actual problems
or issues, rather than just taking a more theoretical method. Since the focus of this paper was not on the general
practice, or whether the preferred choice was to use Internal Auditors or External Auditors etc, the writer did not
feel it was necessary to carry out a survey or to interview other organizations. Apart from the time constraint, the
other reason was the writer chose to use purposive sampling to ensure a more in-depth research to achieve the
objectives of this paper. The case study is on a Community Manager, whereby a Fraud Risk Assessment Team
consisting of managers managing the organization was set up. Brainstorming sessions were carried out between
the two Finance Managers, and also included meetings and interviews with other Process Owners from
Purchasing, Contracts, and the Technical Team.
3.2. ACTION RESEARCH & CASE STUDY: COMMUNITY MANAGER
The organization selected was that of a Community Manager which the writer of this paper had access into the
information, process and documents and was authorized to set up financial policies and procedures for the
Community Manager. Due to the sensitivity of the case, the country, the organization or the individuals involved
9. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
will remain anonymous. However, the main essence of the case study, the actual interviews, minutes of meetings,
brainstorming sessions within the key management team and other documents remains the same.
The key criteria’s for selecting the Community Manager:
1. An organization which is relatively new, small and fast progression planned.
2. Focus on optimisation of funds and clear policies
3. An environment with non stringent rules and regulations
4. Cash flow and financial issues related to fast paced growth. This was a key requirement, as the writer
agreed with Johnson (2008) that the temptation to commit fraud would be higher in a financially
troubled company.
4.0. ANALYSIS & RESULTS
As defined by Wikipedia, a Community Manager is a manager of a “condominium or homeowners association
including single-family home subdivisions, townhouses, or mixed-use development”. Although Wikipedia is not
a verified source, this definition of the role of a Community Manager is in line with the writer’s experience of
being involved with the Community Manager in the said case, as well as what is described in the governing
documentation of the mentioned Community Manager. Hyatt (1975) agreed with the above definition and scope.
The Community Manager in this region is not a recognized legal entity as there is no law governing its
incorporation or running.
The selected Community Manager manages a mixed-use development (hereinafter known as the
Community), whereby they collect monthly charges (known as Service Charges) from the unit owners and
disburse it for the maintenance and improvement of the common use facilities in the Community. The
Community Owners (Developer) hires the Community Manager as an Agent. A more in depth explanation about
the role of the Community Manager is discussed later in the paper. The data collection methods would also
include brainstorming sessions, meetings, and discussions with the key members / managers of the Community
Manager.
The reason why the writer selected the particular Community Manager as a case study apart from the
114
reasons above was:-
- As mentioned, the Community is NOT a legal entity and not registered with any governing body; hence,
its bank accounts and financial statements etc are held and managed by the Community Manager, who
is a legal entity. However, due to the lack of accountability and legal restraints, the risk of fraud
happening here is relatively high.
- There is no defined and approved strata law yet in place to govern the running of the Community
however for the time being, it is as an accepted practice to run it based on the terms of the Agreements
until a proper law is in place.
- The writer had carried out an initial study which showed that there were red flags to denote a high
possibility of fraud since there were apparent lack of controls or the controls were easily overridden by
certain individuals
The flow of this section would be in the same flow as the steps identified under the Academic Literature to carry
out a successful Fraud Risk Assessment & Management:
Steps:
1. Management to initiate the Fraud Risk Assessment & Management by setting up a Fraud Risk
Assessment & Management Team (FRAM Team) and to set goals ,objectives to be met and the risk
appetite of the organization.
2. FRAM Team to carry out brainstorming activities and discussions / interviews with other personnel to
understand the following:
2.1 The organizations environment, management, business, departments, processes , functions
and owners
2.2 Potential fraud scenarios and schemes, taking into account red flag areas such as
management override of controls and personnel who may have the three factors identified
in the Fraud Triangle – Opportunity, Rationalization and Motivation
2.3 Identify the categories required and assess the likelihood and impact of the fraud schemes
accordingly
2.4 Based on the above, do a review and gap analysis of the current controls in place and any
additional or revised controls needed, in line with the organizations risk appetite and
decided risk strategy
The above steps showed that Small and Medium Sized Organizations that carry out Fraud Risk
Assessment & Management In House are able to identify and implement effective Internal Controls which are in
line with the Organizations risk appetite and strategy whilst not compromising on the efficiency of operations,
therefore proving both the hypothesis and research question right.
10. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
4.1 FRAUD RISK MATRIX OR RISK REGISTER (Extract)
Table 1: Fraud Risk Matrix Or Risk Register For Company X
FACTOR / RISK AREA DEPT. LIKELI-HOOD
IMPACT INTERNAL CONTROLS
115
IDENTIFIED
ASSET MISAPPROPRIATION
Receipt Schemes
Skimming - Unauthorized
taking of cash /cheques
before recording revenues
or receivables ( or
understating cash or
receivables) - off book
funds
Finance Medium High Ensure separation of duties and access
control between
*Cashier
*Personnel who prepare the bank deposit.
5.0. CONCLUSION.
Setting up Internal Controls and a Control Environment to prevent fraudulent activities in an organization can
only be taken seriously when the tone is from the top. Until the committee was set up to oversee the management
of the Community, there was a lot of conflict and attempts to override the controls set in place, even though the
Finance Managers had already set up some interim controls.
The success of identifying the Internal Controls largely depended on the structured yet flexible
approach taken by the FRAM Team. Otherwise, many controls would have been introduced that would have
increased the bureaucracy of operations and increase of cost, and would have cost the company highly in terms
of efficiency and effectiveness.
The steps followed were extremely crucial to identify key areas and red flags to prioritize the controls
needed. By setting up the team, and ensuring their goals were in line with the vision and mission of the company
was a strategic plan by itself. By doing so, the organization was able to incorporate the controls as part of their
Key Performance Indicators and as part of their operational processes. By identifying their risk appetite, the team
would also know what to focus on especially due to the time constraint faced.
By identifying the processes, functions, departments etc, the FRAM Team were able to understand
better the loopholes and opportunities to commit fraud within the organization, especially since they were both
new to the organization and industry. Since there was involvement of the personnel from all the other department
and functions, the Fraud Risk Assessment was a good communication tool that informed the personnel that the
organization was being serious about having a zero tolerance for fraud.
Having placed a grade on the various scenarios and possibilities identified, it then helped the FRAM
Team to place more emphasis on those areas, which especially had high impact and high likelihood. Hence,
more controls were placed in those areas. Therefore, the hypothesis was proven correct, that by following the
steps outlines in the Literature review, the FRAM Team was able to come up with Internal Controls, which were
deemed effective and efficient. A week of monitoring after implementing the controls found that lesser
documentation was required, and the processing time was lowered. However, the study and monitoring of the
newly implemented Internal Controls was not carried out as part of the scope in this paper and is recommended
to be carried out in the future as a separate study.
The above process will be repeated periodically to review the controls set in place, and the
effectiveness of the controls in view of future transactions, management directions, and technology improvement.
As mentioned, this is a major process that needs to be undertaken by the management on an annual basis;
ensuring proper resources are allocated for the successful implementation of the same, and should be seen as part
of their goals to be achieved.
There does not seem to be a one-size fit all solution here. It is best to keep a flexible approach as it
tailors makes the final controls to suit the organization and its processes.
6.0. REFERENCES
ACFE: ASSOCIATION OF CERTIFIED FRAUD EXAMINERS (2010), Report To the Nation 2010
(http://www.acfe.com/rttn/2010-highlights.asp - last viewed on 8/1/2012)
AICPA et al (2008), Managing the Business Risk of Fraud: A Practical Guide
(http://www.aicpa.org/InterestAreas/ForensicAndValuation/Resources/FraudPreventionDetectionResponse/Dow
nloadableDocuments/managing_business_risk_fraud.pdf - last viewed on 08/08/2012)
AUDITING STANDARDS BOARD (2002) Statement on Auditing Standards No.99: Consideration of Fraud in
a Financial Statement Audit, AICPA
ALLEN ROBERT D et al (2006), “Auditor Risk Assessment: Insights from the Academic
11. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
Literature“,Accounting Horizons, pp. 157
AUDITING AND ASSURANCE STANDARDS BOARD 2006, AUSTRALIA AUDITING STANDARD ASA 240,
“The Auditor’s Responsibility to Consider Fraud in an Audit of a Financial Report”
BARAC KARIN et al (2010), “Internal Audit Outsourcing Practices in South Africa, African Journal of
Business Management Vol 3 (13) 2009, pp 969-979
BEASLEY MARK S et al (2003), “A Primer for Brainstorming Fraud Risks”, Journal of Accountancy , pp.1-12.
BERAN DENNY et al (2009), “Fraud Risk Assessment Enterprise Wide Risk Assessment”, Corporate
Compliance Insights.Com (http://www.corporatecomplianceinsights.com/managing-corporate-risk-fraud-risk-assessment-
enterprise-wide-risk-assessment/- last viewed on 8/1/2012)
CIMA: CHARTERED INSTITUTE OF MANAGEMENT ACCOUNTANTS (2009), CID Tech Guide: Fraud
Risk Management
(http://www1.cimaglobal.com/Documents/ImportedDocuments/cid_techguide_fraud_risk_management_feb09.p
df.pdf - last viewed on 18/12/2011)
COMMITTEE OF SPONSORING ORGANIZATIONS OF THE TREADWAY COMMISSION -COSO (2012),
Enterprise Risk Management – Understanding and Communicating Risk Appetite
COMMITTEE OF SPONSORING ORGANIZATIONS OF THE TREADWAY COMMISSION -COSO (1987),
Report of the National Commission on Fraudulent Financial Reporting
CORAM PAUL et al (2007), “Internal Audit, alternative Audit Structures and the level of misappropriation of
assets fraud”, Journal Compilation Accounting and Finance Association of Australia and New Zealand, 2008, pp
553-559
EUROPEAN COMMISSION RECOMMENDATION (2003), Definition of Small and Medium Sized
Enterprises
HYATT WAYNE S (1975), Condominium and Home Owner Associations: Formation and Development
JOHNSON SARAH (2008), “Deloitte study sees fraud ties to bankruptcy”. CFO.com,
(http://www.cfo.com/printable/article.cfm/12671294 - last viewed on 12th August 2012)
KIZITO F (-), Sustaining The Benefits Of Action Research In Decision Support Tools Development pp. 37-41
KPMG (2006), Fraud Risk Management: Developing a Strategy for Prevention, Detection and Response
(http://www.amr.kpmg.com/aci/docs/fraud_risk/Fraud_Risk_Web11_01_06.pdf - last viewed on 18/12/2011)
KUHNE, G.W. et al (1997) “Understanding and using action research in practice settings”
New Directions for Adult and Continuing Education, no. 73.(pp 23-40)
KUMAR RANJIT (2005), Research Methodology-A Step-by-Step Guide for Beginners,(2nd.ed.), Pearson
Education
LENARD M.J et al (2009), “An Historical Perspective on Fraud Detection: From Bankruptcy Models to Most
Effective Indicators of Fraud in Recent Incidents”, Journal of Forensic & Investigative Accounting, Vol 1, Issue
1, pp. 1 - 27
NDSG: North Dakota State Government (-), Fraud Risk Assessment Guideline
(http://www.nd.gov/fiscal/docs/fraudriskdocumentwithappendix.pdf - last viewed on 18/12/2011)
O’ BELL ERICK (2009), “5 Anti Fraud Strategies to Deter, Prevent and Detect Fraud”, Corporate Compliance
Insight (http://www.corporatecomplianceinsights.com/2010/internal-control-checklist-deter-prevent-detect-fraud
-last viewed on 8/1/2012)
PWC: PricewaterhouseCooper’s (2007), Global Economic Crime Survey in 2007
(http://www.pwc.com/gx/en/economic-crime-survey/pdf/pwc_2007gecs.pdf - last viewed on 18/12/2011)
PWC: PricewaterhouseCooper’s (2009), Global Economic Crime Survey in 2009
(http://www.pwc.com/gx/en/economic-crime-survey/assets/global-economic-crime-survey-2009.pdf - last
viewed on 18/12/2011)
RIKHARDSSON PALL et al (2006), “Business Process Risk Management and Internal Control: A proposed
Research Agenda in the context of Compliance and ERP systems” in Proceedings Second Asia/Pacific Research
Symposium on Accounting Information Systems, Melbourne. (http://eprints.qut.edu.au/5192/1/5192.pdf - last
viewed on 11/02/2012)
ROGGEVEN L.L. (2009), “Are auditors more alert on fraud?” Erasmus University Rotterdam
RUIN JOSEPH EBY (2009), Internal Auditing: Supporting Risk Management, Fraud Awareness Management
and Corporate Governance, Leeds Publications.
SHANMUGAM JAYA KUMAR et al (2012), “An Exploratory Study of Internal Control and Fraud Prevention
Measures in SME’s”
TURNER JERRY L et al (2003), “An Analysis of the Fraud Triangle“, pp 1 - 33
U.S. SECURITIES AND EXCHANGE COMMISSION, SARBANES OXLEY SECTION 404 – A Guide for
Small Business
VERSCHOOR CURTIS.C. (2008), Audit Committee Essentials, John Wiley & Sons
WAGNER STEPHEN (2006), The Unexpected Benefits of Sarbanes-Oxley, Harvard Business Review 2006, pp
116
12. Research Journal of Finance and Accounting www.iiste.org
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.5, No.15, 2014
1 - 10
WELLS JOSEPH T. (2007), Corporate Fraud Handbook – Prevention and Detection, 2nd Edition, John Wiley &
Sons
WIKIPEDIA (-), Definition of Community Manager (http://en.wikipedia.org/wiki/Community_manager - last
viewed on 18/12/2011)
YALE UNIVERSITY AUDITING, Balancing Risks and Controls
117
13. The IISTE is a pioneer in the Open-Access hosting service and academic event
management. The aim of the firm is Accelerating Global Knowledge Sharing.
More information about the firm can be found on the homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
There are more than 30 peer-reviewed academic journals hosted under the hosting
platform.
Prospective authors of journals can find the submission instruction on the
following page: http://www.iiste.org/journals/ All the journals articles are available
online to the readers all over the world without financial, legal, or technical barriers
other than those inseparable from gaining access to the internet itself. Paper version
of the journals is also available upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar