Fraud experts noted that it is essential to obtain clear knowledge on the trends of fraudulent activities in all business circle through the measurement and observing the compliance level of organizations. This has made it possible through the utilization of specialized investigative skills which gives an inquiry by assisting in the protection and recovery of embezzled assets through civil action. Therefore, this study examines the effect of forensic accounting knowledge on fraud prevention among listed companies in Nigeria. Questionnaires were administered to 177 Auditors of the listed companies out of which 105 auditors responded. The paper also used the multiple regression model to test the hypotheses formulated. Furthermore, the finding suggests that forensic accounting knowledge and complexity are significantly related with fraud prevention. It is therefore recommended that auditing staff of these companies should have more forensic accounting knowledge so as to serve as a tool to deter and prevent fraudulent activities in companies and Nigeria at large.
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...EY
A report based on a survey conducted to understand the fraud scenario in India. This study aims to understand how businesses have coped with increasing fraud and corruption risk last year, what the emerging fraud risks in the industry are and the measures taken by various organizations to mitigate these risks.
For further information on EY's fraud investigation and dispute services, please visit: http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation---Dispute-Services
The document discusses risk management in companies. It provides questions for senior executives and IT executives about risks to the business from data security, regulatory compliance, and technological issues. It also summarizes statistics about the high costs of data breaches for companies and discusses how outsourcing some risk management functions can help companies focus on compliance in today's complex regulatory environment.
This document examines fraud prevention and internal controls in the Nigerian banking system. It uses both primary and secondary data to analyze the effectiveness of internal controls and identify factors that influence fraud. The primary data uses questionnaires from four banks to test how separation of duties, monitoring, and staff qualifications impact internal controls. The secondary data uses bank profit, regulation, technology, and M2 levels to further explore their impact on actual losses, weighted losses, and percentage increases in losses. Regression analysis is used to analyze the relationships between these factors. The results show that internal controls are effective against fraud but not all staff commit to them fully. The secondary data supports and expands on this by showing M2 levels, staff qualifications and technology have significant impacts across
This document discusses computer fraud and the fraud process. It begins by introducing the chapter topics which include what fraud is, who commits fraud and why, what is computer fraud and its forms, approaches to committing computer fraud, and ways to deter and detect it. It then discusses the fraud process and types of fraud perpetrators, known as white-collar criminals. Researchers have found few psychological differences between white-collar criminals and the general public. The document also introduces the fraud triangle of pressure, opportunity, and rationalization to explain why people commit fraud. Common pressures include financial problems and fear of status loss.
White paper on fraud detection with acl (send afterwards)~9sumitrarrc
This document discusses fraud detection and prevention through transactional analysis. It outlines the challenges of fraud management, including large data volumes, complex systems, and evolving fraud schemes. Traditional fraud detection methods like internal controls and audits are reactive and often detect fraud long after the fact. The document advocates for continuous transaction monitoring using data analytics software. This allows comparing data across systems, testing transactions against fraud indicators, and detecting fraud earlier to prevent greater losses. While powerful, challenges include the effort to extract and compare data from multiple systems and developing flexible analytics.
The document discusses changes to HIPAA regulations taking effect on September 23, 2013 as a result of the HIPAA Omnibus Final Rule released in January 2013. It provides an overview of major provisions including expanded definitions of covered entities and business associates, new requirements for business associates and their subcontractors, strengthened breach notification rules, and modifications to the Privacy and Security Rules. The presentation aims to introduce healthcare organizations to the upcoming changes at a high level in preparation for the September 23rd compliance deadline.
The 2013 Cost of Data Breach Study: France found that the average cost of a data breach in France increased from €122 per lost or stolen record in 2011 to €127 per record in 2012. The total average organizational cost of a data breach also rose over this period, from €2.55 million to €2.86 million. Malicious attacks were the most common cause of breaches, accounting for 42% of cases. Lost business costs, which include customer churn, increased sharply from €0.78 million in 2011 to €1.19 million in 2012. Certain organizational factors like having an incident response plan in place were found to lower the costs of a breach.
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...EY
A report based on a survey conducted to understand the fraud scenario in India. This study aims to understand how businesses have coped with increasing fraud and corruption risk last year, what the emerging fraud risks in the industry are and the measures taken by various organizations to mitigate these risks.
For further information on EY's fraud investigation and dispute services, please visit: http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation---Dispute-Services
The document discusses risk management in companies. It provides questions for senior executives and IT executives about risks to the business from data security, regulatory compliance, and technological issues. It also summarizes statistics about the high costs of data breaches for companies and discusses how outsourcing some risk management functions can help companies focus on compliance in today's complex regulatory environment.
This document examines fraud prevention and internal controls in the Nigerian banking system. It uses both primary and secondary data to analyze the effectiveness of internal controls and identify factors that influence fraud. The primary data uses questionnaires from four banks to test how separation of duties, monitoring, and staff qualifications impact internal controls. The secondary data uses bank profit, regulation, technology, and M2 levels to further explore their impact on actual losses, weighted losses, and percentage increases in losses. Regression analysis is used to analyze the relationships between these factors. The results show that internal controls are effective against fraud but not all staff commit to them fully. The secondary data supports and expands on this by showing M2 levels, staff qualifications and technology have significant impacts across
This document discusses computer fraud and the fraud process. It begins by introducing the chapter topics which include what fraud is, who commits fraud and why, what is computer fraud and its forms, approaches to committing computer fraud, and ways to deter and detect it. It then discusses the fraud process and types of fraud perpetrators, known as white-collar criminals. Researchers have found few psychological differences between white-collar criminals and the general public. The document also introduces the fraud triangle of pressure, opportunity, and rationalization to explain why people commit fraud. Common pressures include financial problems and fear of status loss.
White paper on fraud detection with acl (send afterwards)~9sumitrarrc
This document discusses fraud detection and prevention through transactional analysis. It outlines the challenges of fraud management, including large data volumes, complex systems, and evolving fraud schemes. Traditional fraud detection methods like internal controls and audits are reactive and often detect fraud long after the fact. The document advocates for continuous transaction monitoring using data analytics software. This allows comparing data across systems, testing transactions against fraud indicators, and detecting fraud earlier to prevent greater losses. While powerful, challenges include the effort to extract and compare data from multiple systems and developing flexible analytics.
The document discusses changes to HIPAA regulations taking effect on September 23, 2013 as a result of the HIPAA Omnibus Final Rule released in January 2013. It provides an overview of major provisions including expanded definitions of covered entities and business associates, new requirements for business associates and their subcontractors, strengthened breach notification rules, and modifications to the Privacy and Security Rules. The presentation aims to introduce healthcare organizations to the upcoming changes at a high level in preparation for the September 23rd compliance deadline.
The 2013 Cost of Data Breach Study: France found that the average cost of a data breach in France increased from €122 per lost or stolen record in 2011 to €127 per record in 2012. The total average organizational cost of a data breach also rose over this period, from €2.55 million to €2.86 million. Malicious attacks were the most common cause of breaches, accounting for 42% of cases. Lost business costs, which include customer churn, increased sharply from €0.78 million in 2011 to €1.19 million in 2012. Certain organizational factors like having an incident response plan in place were found to lower the costs of a breach.
Forensic Auditors To The Fore On Increasing White Collar CrimesVeriti Consulting LLC
Financial experts report forensic auditors have become part of the business in India as corporate white collar crimes continue to rise throughout the country.
Veriti Consulting LLC provides professional forensic accounting services across the United States. To speak with a professional forensic accountant call 855.232.4410
Privacy rules matter—make sure your firm stays compliant.
While every lawyer knows the basic rules behind confidentiality and attorney-client privilege, the significance of privacy law is less well-known—and that lack of knowledge can impact your law firm. Emerging privacy rights and rights of action are impacting businesses of all types—including those in the legal profession. Local, national, and even international laws are making privacy the next frontier in data management for lawyers.
Are you prepared to adjust to the new demands of privacy for law firms, and move beyond confidentiality?
Join Joshua Lenon—an IAPP Certified Information Privacy Professional and Clio’s Lawyer in Residence and Data Protection Officer—as he explains how these privacy laws can impact law firms and what your firm should do to ensure compliance.
In this free 1-hour CLE-eligible webinar, you’ll learn:
Why law firm data must conform with emerging privacy regulations
The impact of clients’ compliance with privacy law on firm operations
Future privacy laws that may affect your law firm—no matter where you operate
https://www.clio.com/events/webinar-law-firm-privacy/
The document discusses the growing issue of identity theft and how it poses significant legal and financial risks for companies. It notes that identity theft has led to millions lost in credit and loans for lenders, and thousands of victims spending huge amounts of time and money fixing the issues. For a company, the costs of an identity theft incident involving customers could reach tens or even hundreds of millions of dollars, considering fines, lawsuits, and time spent by victims. The document stresses that companies need to take reasonable steps to protect personal information and implement identity theft prevention programs to help mitigate these risks.
This document summarizes a paper about increasing data breaches and the need for legislation to address the problem. It notes that over 233 million US records have been exposed due to breaches since 2005. The document discusses the costs of breaches to companies and common causes, such as lost or stolen devices. It argues that while some states have breach notification laws, federal legislation is needed to standardize security practices and privacy protections across industries. The paper aims to examine if legislation is needed to reduce breaches, when people should be notified of breaches, and if compensation should be required.
The document analyzes data breach records from 2005-2015 to examine trends by industry. It finds that healthcare, education, government, retail, and finance were most commonly affected, accounting for over 80% of breaches. Personal information was the most frequently stolen record type, compromised through various methods like device loss, insider leaks, and hacking. The analysis also looks specifically at breach trends in the healthcare industry, where loss of portable devices like laptops was a primary source of compromises.
How to Get Proactive about your Vendor Master Data: 4 tips for successSarah Fane
1) Most companies have large invoice volumes and vendor bases but manage vendor data with small teams of only 1-5 people. Continuous monitoring of vendor data over time is a key challenge due to the manual nature of most vendor registration and data maintenance processes.
2) About a third of companies do not have regular processes for cleaning vendor master data and 21% never close stale vendor accounts, increasing their risk. Poor vendor data quality has contributed to fraud incidents for 34% of respondents in the past 5 years.
3) While interest is growing in supplier portals, current usage is only 24% and integration with vendor master data is limited, with under half supporting vendor self-service. Most vendor data reporting remains managed manually
This document summarizes various laws related to identity theft and data privacy, including the Fair Credit Reporting Act (FCRA), the Fair and Accurate Credit Transactions Act (FACTA), the Gramm-Leach-Bliley Act (GLBA), and state privacy laws. It notes that businesses can be held liable for identity theft that occurs in the workplace or when employee data is compromised. The document recommends implementing an identity theft protection program, appointing a compliance officer, developing security policies and training employees to help establish an "affirmative defense" in the event of data breaches or lawsuits.
Affirmative Defense Response System (ADRS)guest95afa8
Mitigating damages and reducing risk before, during and after a data breach occurs is what ADRS is all about. A system that shows "every good faith effort" at protecting the NonPublic Personal Information (NPI) of your customers, employees, and vendors as mandated by the FTC.
Cost of Data Breah in Healthcare_Quinlan, Courtneycourtneyquinlan
This document discusses the high costs of data breaches in the healthcare industry. It notes that the rise of electronic health records has led to more data theft opportunities. Data breaches can result in identity theft and fraudulent charges against patients. They also cost organizations millions to respond to. The document examines the financial costs of data breaches to both individuals and organizations. It then discusses strategies organizations can take to prevent data breaches, such as encrypting data, training employees, and developing a formal security plan.
Simple Training for Information Security and Payment FraudEvan Francen
The document discusses payment fraud risks and protections. It summarizes a survey finding that 74% of organizations were victims of payment fraud in 2016. Checks and wire transfers are most commonly targeted. Business email compromise scams targeting wire transfers are on the rise. The document provides 7 tips for protection, including employing dual control for transactions and monitoring accounts daily.
India Fraud Indicator 2012 is a first-of-its kind initiative in India conducted by the Fraud Investigation & Dispute Services team to look into fraud in all spheres of society, including the business and government segments, as well as in the case of financial institutions and individuals. In-depth analysis of the report suggests that businesses are continuously exposed to fraud risks, with losses recorded in this edition accumulating to around INR66 billion.
For further information on EY's fraud investigation and dispute services, please visit: http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation---Dispute-Services
This newsletter from Advanced Screening Solutions discusses pre-employment screening and background checks. It describes how screening is used to verify applicants' histories and check for criminal records in order to reduce risks. It outlines various types of background checks like criminal, education, and drug tests. The newsletter emphasizes that screening helps improve safety, productivity, and reduces liability for employers. It wishes readers a happy holiday season and offers their full-service pre-employment screening.
The document discusses identity theft laws and regulations that apply to businesses. It recommends that businesses appoint a security compliance officer, develop a written identity theft security plan, and provide mandatory training to employees on protecting personal information. This helps businesses comply with regulations, minimize risks, and potentially reduce liability from identity theft incidents.
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresJulien Boucher
The document discusses guidance from the SEC on cybersecurity disclosures for public companies. The SEC chairman has signaled increased scrutiny of companies' disclosures around cyber risks and incidents. The guidance outlines factors companies should consider in disclosing cybersecurity risks, including in risk factors, MD&A discussions, and financial statement implications. Companies should provide details on cybersecurity programs, risks from suppliers, and describe any material incidents and related costs.
The document discusses controls for ensuring reliability in information systems. It covers controls for confidentiality, privacy, processing integrity, and availability. For confidentiality, it describes controls for encryption, access controls, and disposal of sensitive information. For privacy, it discusses frameworks for protecting personal information and complying with privacy regulations. It also outlines controls for ensuring the accuracy, timeliness and authorization of processed data.
Reasons for the Popularity of Medical Record TheftOPSWAT
After a slew of data breaches in 2014, the FBI warned the healthcare industry that cyber-criminals would be directing more attention their way in 2015. The healthcare industry has become an increasingly valuable target for cyber thieves, and in some cases, a much easier target to attack, due to their often less than adequate investment in cyber security. What is it about the healthcare industry that has captured the cyber criminals' interest in the last few years?
This white paper covers various topics including industry data breach statistics, the value of credit card data versus medical record data, healthcare spending on cyber security and the impact of BYOD on industry vulnerability to data breaches. This white paper also highlights various solutions for protecting medical record data including multi-scanning, email security and the protection of endpoint devices.
Get the insights you need to elevate your legal practice.
The annual Legal Trends Report sheds light on the most important issues faced within the legal profession. This year’s report features a multi-year analysis of 2,000 law firms’ revenue growth, as well as a survey of 2,000 legal consumers, and a test of 1,000 law firms’ responses to client inquiries. Informed with this research, the report examines:
What differentiates growing law firms from stagnating practices.
What potential clients want when they look for a lawyer.
How today’s law firms fare at interacting with potential clients—and where they can improve.
In this 60 minute webinar, join George Psiharis, Clio’s Chief Operating Officer, and Joshua Lenon, Clio’s Lawyer in Residence, as they explore the 2019 Legal Trends Report in detail to identify the report’s most important findings and contextualize what the data means for legal professionals and firms.
By watching this Legal Trends Report webinar, you will learn:
The biggest takeaways from Clio’s research into 2019 legal trends.
Our top recommended actions for legal professionals based on the report.
Additional insights on how to take a more data-driven approach at your firm.
https://landing.clio.com/2019-Legal-Trends-Report.html
The document discusses identity theft protection services for businesses and employees. It explains that offering such services can help mitigate businesses' liability risks under laws like FACTA, HIPAA, and GLB by showing they have taken reasonable steps to protect customer data. It also notes that identity theft services can help reduce the time employees spend restoring their identity, saving businesses costs. Services that offer full identity restoration help minimize risks and costs to both employees and businesses from identity theft.
Impact of Provision of Litigation Supports through Forensic Investigations on...Premier Publishers
This paper presents an argument through the fraud triangle theory that the provision of litigation supports through forensic audits and investigations in relation to corporate fraud cases is adequate for effective prosecution of perpetrators as well as corporate fraud prevention. To support this argument, this study operationalized provision of litigation supports through forensic audit and investigations, data mining for trends and patterns, and fraud data collection and preparation. A sample of 500 respondents was drawn from the population of professional accountants and legal practitioners in Nigeria. Questionnaire was used as the instrument for data collection and this was mailed to the respective respondents. Resulting responses were analyzed using the OLS multiple regression techniques via the SPSS statistical software. The results reveal that the provision of litigation supports through forensic audits and investigations, fraud data mining for trends and patterns and fraud data collection and preparation for court proceedings have a positive and significant impact on corporate fraud prevention in Nigeria. This study therefore recommends that regulators should promote the provision of litigation supports through forensic audits and investigations in relation to corporate fraud cases in publicly listed firms in Nigeria, as this will help provide reports that are acceptable in court proceedings.
Application of forensic accounting a tool for confidence in auditors’ reportsAlexander Decker
The document discusses the application of forensic accounting as a tool to build confidence in auditors' reports. It examines how forensic accounting can help detect issues like fraud, theft, bribery, and intentional misstatements. The study administered questionnaires to auditing firms, legal experts, and computer specialists. The results found that forensic accounting can significantly aid in litigation, quantifying losses from theft, detecting bribery and misstatements, and finding intentional misrepresentations to auditors. The document recommends mandatory forensic accounting training for accountants to produce more reliable audit reports.
Forensic accounting is the application of accounting principles, theories and techniques to facts or hypotheses at issue in a legal dispute and encompasses every phase of litigation services. A forensic accountant uses accounting, auditing and investigative skills to assist in legal matters. This document provides an overview of forensic accounting and forensic auditing, including definitions, the differences between statutory and forensic audits, the approaches and techniques used in forensic audits and the functions of a forensic auditor.
Forensic Auditors To The Fore On Increasing White Collar CrimesVeriti Consulting LLC
Financial experts report forensic auditors have become part of the business in India as corporate white collar crimes continue to rise throughout the country.
Veriti Consulting LLC provides professional forensic accounting services across the United States. To speak with a professional forensic accountant call 855.232.4410
Privacy rules matter—make sure your firm stays compliant.
While every lawyer knows the basic rules behind confidentiality and attorney-client privilege, the significance of privacy law is less well-known—and that lack of knowledge can impact your law firm. Emerging privacy rights and rights of action are impacting businesses of all types—including those in the legal profession. Local, national, and even international laws are making privacy the next frontier in data management for lawyers.
Are you prepared to adjust to the new demands of privacy for law firms, and move beyond confidentiality?
Join Joshua Lenon—an IAPP Certified Information Privacy Professional and Clio’s Lawyer in Residence and Data Protection Officer—as he explains how these privacy laws can impact law firms and what your firm should do to ensure compliance.
In this free 1-hour CLE-eligible webinar, you’ll learn:
Why law firm data must conform with emerging privacy regulations
The impact of clients’ compliance with privacy law on firm operations
Future privacy laws that may affect your law firm—no matter where you operate
https://www.clio.com/events/webinar-law-firm-privacy/
The document discusses the growing issue of identity theft and how it poses significant legal and financial risks for companies. It notes that identity theft has led to millions lost in credit and loans for lenders, and thousands of victims spending huge amounts of time and money fixing the issues. For a company, the costs of an identity theft incident involving customers could reach tens or even hundreds of millions of dollars, considering fines, lawsuits, and time spent by victims. The document stresses that companies need to take reasonable steps to protect personal information and implement identity theft prevention programs to help mitigate these risks.
This document summarizes a paper about increasing data breaches and the need for legislation to address the problem. It notes that over 233 million US records have been exposed due to breaches since 2005. The document discusses the costs of breaches to companies and common causes, such as lost or stolen devices. It argues that while some states have breach notification laws, federal legislation is needed to standardize security practices and privacy protections across industries. The paper aims to examine if legislation is needed to reduce breaches, when people should be notified of breaches, and if compensation should be required.
The document analyzes data breach records from 2005-2015 to examine trends by industry. It finds that healthcare, education, government, retail, and finance were most commonly affected, accounting for over 80% of breaches. Personal information was the most frequently stolen record type, compromised through various methods like device loss, insider leaks, and hacking. The analysis also looks specifically at breach trends in the healthcare industry, where loss of portable devices like laptops was a primary source of compromises.
How to Get Proactive about your Vendor Master Data: 4 tips for successSarah Fane
1) Most companies have large invoice volumes and vendor bases but manage vendor data with small teams of only 1-5 people. Continuous monitoring of vendor data over time is a key challenge due to the manual nature of most vendor registration and data maintenance processes.
2) About a third of companies do not have regular processes for cleaning vendor master data and 21% never close stale vendor accounts, increasing their risk. Poor vendor data quality has contributed to fraud incidents for 34% of respondents in the past 5 years.
3) While interest is growing in supplier portals, current usage is only 24% and integration with vendor master data is limited, with under half supporting vendor self-service. Most vendor data reporting remains managed manually
This document summarizes various laws related to identity theft and data privacy, including the Fair Credit Reporting Act (FCRA), the Fair and Accurate Credit Transactions Act (FACTA), the Gramm-Leach-Bliley Act (GLBA), and state privacy laws. It notes that businesses can be held liable for identity theft that occurs in the workplace or when employee data is compromised. The document recommends implementing an identity theft protection program, appointing a compliance officer, developing security policies and training employees to help establish an "affirmative defense" in the event of data breaches or lawsuits.
Affirmative Defense Response System (ADRS)guest95afa8
Mitigating damages and reducing risk before, during and after a data breach occurs is what ADRS is all about. A system that shows "every good faith effort" at protecting the NonPublic Personal Information (NPI) of your customers, employees, and vendors as mandated by the FTC.
Cost of Data Breah in Healthcare_Quinlan, Courtneycourtneyquinlan
This document discusses the high costs of data breaches in the healthcare industry. It notes that the rise of electronic health records has led to more data theft opportunities. Data breaches can result in identity theft and fraudulent charges against patients. They also cost organizations millions to respond to. The document examines the financial costs of data breaches to both individuals and organizations. It then discusses strategies organizations can take to prevent data breaches, such as encrypting data, training employees, and developing a formal security plan.
Simple Training for Information Security and Payment FraudEvan Francen
The document discusses payment fraud risks and protections. It summarizes a survey finding that 74% of organizations were victims of payment fraud in 2016. Checks and wire transfers are most commonly targeted. Business email compromise scams targeting wire transfers are on the rise. The document provides 7 tips for protection, including employing dual control for transactions and monitoring accounts daily.
India Fraud Indicator 2012 is a first-of-its kind initiative in India conducted by the Fraud Investigation & Dispute Services team to look into fraud in all spheres of society, including the business and government segments, as well as in the case of financial institutions and individuals. In-depth analysis of the report suggests that businesses are continuously exposed to fraud risks, with losses recorded in this edition accumulating to around INR66 billion.
For further information on EY's fraud investigation and dispute services, please visit: http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation---Dispute-Services
This newsletter from Advanced Screening Solutions discusses pre-employment screening and background checks. It describes how screening is used to verify applicants' histories and check for criminal records in order to reduce risks. It outlines various types of background checks like criminal, education, and drug tests. The newsletter emphasizes that screening helps improve safety, productivity, and reduces liability for employers. It wishes readers a happy holiday season and offers their full-service pre-employment screening.
The document discusses identity theft laws and regulations that apply to businesses. It recommends that businesses appoint a security compliance officer, develop a written identity theft security plan, and provide mandatory training to employees on protecting personal information. This helps businesses comply with regulations, minimize risks, and potentially reduce liability from identity theft incidents.
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresJulien Boucher
The document discusses guidance from the SEC on cybersecurity disclosures for public companies. The SEC chairman has signaled increased scrutiny of companies' disclosures around cyber risks and incidents. The guidance outlines factors companies should consider in disclosing cybersecurity risks, including in risk factors, MD&A discussions, and financial statement implications. Companies should provide details on cybersecurity programs, risks from suppliers, and describe any material incidents and related costs.
The document discusses controls for ensuring reliability in information systems. It covers controls for confidentiality, privacy, processing integrity, and availability. For confidentiality, it describes controls for encryption, access controls, and disposal of sensitive information. For privacy, it discusses frameworks for protecting personal information and complying with privacy regulations. It also outlines controls for ensuring the accuracy, timeliness and authorization of processed data.
Reasons for the Popularity of Medical Record TheftOPSWAT
After a slew of data breaches in 2014, the FBI warned the healthcare industry that cyber-criminals would be directing more attention their way in 2015. The healthcare industry has become an increasingly valuable target for cyber thieves, and in some cases, a much easier target to attack, due to their often less than adequate investment in cyber security. What is it about the healthcare industry that has captured the cyber criminals' interest in the last few years?
This white paper covers various topics including industry data breach statistics, the value of credit card data versus medical record data, healthcare spending on cyber security and the impact of BYOD on industry vulnerability to data breaches. This white paper also highlights various solutions for protecting medical record data including multi-scanning, email security and the protection of endpoint devices.
Get the insights you need to elevate your legal practice.
The annual Legal Trends Report sheds light on the most important issues faced within the legal profession. This year’s report features a multi-year analysis of 2,000 law firms’ revenue growth, as well as a survey of 2,000 legal consumers, and a test of 1,000 law firms’ responses to client inquiries. Informed with this research, the report examines:
What differentiates growing law firms from stagnating practices.
What potential clients want when they look for a lawyer.
How today’s law firms fare at interacting with potential clients—and where they can improve.
In this 60 minute webinar, join George Psiharis, Clio’s Chief Operating Officer, and Joshua Lenon, Clio’s Lawyer in Residence, as they explore the 2019 Legal Trends Report in detail to identify the report’s most important findings and contextualize what the data means for legal professionals and firms.
By watching this Legal Trends Report webinar, you will learn:
The biggest takeaways from Clio’s research into 2019 legal trends.
Our top recommended actions for legal professionals based on the report.
Additional insights on how to take a more data-driven approach at your firm.
https://landing.clio.com/2019-Legal-Trends-Report.html
The document discusses identity theft protection services for businesses and employees. It explains that offering such services can help mitigate businesses' liability risks under laws like FACTA, HIPAA, and GLB by showing they have taken reasonable steps to protect customer data. It also notes that identity theft services can help reduce the time employees spend restoring their identity, saving businesses costs. Services that offer full identity restoration help minimize risks and costs to both employees and businesses from identity theft.
Impact of Provision of Litigation Supports through Forensic Investigations on...Premier Publishers
This paper presents an argument through the fraud triangle theory that the provision of litigation supports through forensic audits and investigations in relation to corporate fraud cases is adequate for effective prosecution of perpetrators as well as corporate fraud prevention. To support this argument, this study operationalized provision of litigation supports through forensic audit and investigations, data mining for trends and patterns, and fraud data collection and preparation. A sample of 500 respondents was drawn from the population of professional accountants and legal practitioners in Nigeria. Questionnaire was used as the instrument for data collection and this was mailed to the respective respondents. Resulting responses were analyzed using the OLS multiple regression techniques via the SPSS statistical software. The results reveal that the provision of litigation supports through forensic audits and investigations, fraud data mining for trends and patterns and fraud data collection and preparation for court proceedings have a positive and significant impact on corporate fraud prevention in Nigeria. This study therefore recommends that regulators should promote the provision of litigation supports through forensic audits and investigations in relation to corporate fraud cases in publicly listed firms in Nigeria, as this will help provide reports that are acceptable in court proceedings.
Application of forensic accounting a tool for confidence in auditors’ reportsAlexander Decker
The document discusses the application of forensic accounting as a tool to build confidence in auditors' reports. It examines how forensic accounting can help detect issues like fraud, theft, bribery, and intentional misstatements. The study administered questionnaires to auditing firms, legal experts, and computer specialists. The results found that forensic accounting can significantly aid in litigation, quantifying losses from theft, detecting bribery and misstatements, and finding intentional misrepresentations to auditors. The document recommends mandatory forensic accounting training for accountants to produce more reliable audit reports.
Forensic accounting is the application of accounting principles, theories and techniques to facts or hypotheses at issue in a legal dispute and encompasses every phase of litigation services. A forensic accountant uses accounting, auditing and investigative skills to assist in legal matters. This document provides an overview of forensic accounting and forensic auditing, including definitions, the differences between statutory and forensic audits, the approaches and techniques used in forensic audits and the functions of a forensic auditor.
Journal of Digital Forensics, Security and Law, Vol. 4(1) .docxpriestmanmable
Journal of Digital Forensics, Security and Law, Vol. 4(1)
39
Continuous Fraud Detection in Enterprise Systems
through Audit Trail Analysis
Peter J. Best
School of Accounting, Economics & Finance
University of Southern Queensland
Toowoomba, Queensland, 4350, Australia
Tel: (+61) 7 4631 1231 / Fax: (+61) 7 4631 5594
Email: [email protected]
Pall Rikhardsson
Financial Intelligence Division
Business Advisory, SAS Institute A/S
Købmagergade 7-9, DK-1150 Copenhagen K, Denmark
Tel: (+45) 7028 2506
Email: [email protected]
Mark Toleman
School of Information Systems
University of Southern Queensland
Toowoomba, Queensland 4350 Australia
Tel: (+61) 7 4631 5593 / Fax: (+61) 7 4631 5594
Email: [email protected]
ABSTRACT
Enterprise systems, real time recording and real time reporting pose new and
significant challenges to the accounting and auditing professions. This includes
developing methods and tools for continuous assurance and fraud detection. In
this paper we propose a methodology for continuous fraud detection that exploits
security audit logs, changes in master records and accounting audit trails in
enterprise systems. The steps in this process are: (1) threat monitoring-
surveillance of security audit logs for ‘red flags’, (2) automated extraction and
analysis of data from audit trails, and (3) using forensic investigation techniques
to determine whether a fraud has actually occurred. We demonstrate how mySAP,
an enterprise system, can be used for audit trail analysis in detecting financial
frauds; afterwards we use a case study of a suspected fraud to illustrate how to
implement the methodology.
Keywords: Continuous assurance, continuous audit, fraud detection, enterprise
system, accounting information systems, mySAP, audit trails.
Journal of Digital Forensics, Security and Law, Vol. 4(1)
40
1. INTRODUCTION
Fraud continues to be of major concern to business companies, not-for-profit
organizations and governmental agencies. Recent surveys by leading accounting
firms document that fraud is costing these organizations billions of dollars per
year (BDO 2008; KPMG 2008; Standards Australia 2008). Furthermore, fraud
means reduced macroeconomic output. Estimates indicate that fraud costs the
Australian economy up to 3 billion dollars each year (Standards Australia 2008).
The incidence and financial impact of fraud seems to be steadily increasing and
many organizations are ill-prepared to prevent and detect fraud (KPMG 2008).
Australian Standard AS 8001-2008 (Standards Australia 2008) proposes that
organizations implement a fraud detection program to quickly identify instances
of fraud should preventive measures and internal controls fail. It recommends the
development of systems for targeted post-transactional review and strategic use of
computer systems including effective data mining and real-time transaction
assessment to identify suspect fraudulent transactions. In a simi ...
Computer aided audit techniques and fraud detectionAlexander Decker
This research study examined the use of computer aided audit techniques (CAATs) to detect fraud. The study found that 72.8% of respondents agreed that CAATs play a major role in fraud detection. It was also found that CAATs help improve auditor performance and provide transparency in financial reporting. However, costs associated with implementation and skills required present challenges to adoption of CAATs. The study concluded that CAATs can effectively detect fraudulent and misappropriated practices in organizations.
The impact of forensic accounting on fraud detectionAlexander Decker
This document summarizes a research study that examined the impact of forensic accounting on fraud detection in Nigerian firms. The study aimed to determine the relationship between fraud detection and forensic accounting. It reviewed definitions and types of forensic accounting and fraud. Data was collected through questionnaires administered to 15 firms and analyzed using descriptive statistics and regression analysis. The study revealed that the application of forensic accounting services affects the level of fraudulent activities in firms. It concluded that forensic accounting can help curb fraud in companies.
Initiation of Forensic Accounting Investigation of Public Sector Corruption (...Premier Publishers
The aim of this paper was to gain an understanding of the processes of the initiation of forensic accounting investigation from the perspective of experts in the Nigerian leading anti-corruption body, the Economic and Financial Crimes Commission (EFCC). This qualitative case study mode of enquiry finds four means as precursors to the forensic accounting investigation of PSC in EFCC. The use of media report, intelligent report, whistle blowing and petitions were identified as triggering the commission of forensic accounting investigation of PSC in EFCC. However, a cursory look at these processes revealed that EFCC is more reactive type of investigation organization rather than the proactive one. Hence, EFCC is recommended to strongly imbibe the proactive type of forensic accounting investigation of PSC.
Effect of Internal Audit Functions on Fraud Control in Manufacturing Companie...ijtsrd
The study is aimed to examine the effect of the internal audit functions on fraud control in manufacturing companies in Anambra state. The study made use of survey design. Data were collected from primary sources through the issue of seventy two 72 structured questionnaires to four 4 senior management staff, including the accountant of each of the eighteen 18 companies under the study. The collected data were analysed using Logistic Regression analyses with the help of Statistical Package for Social Science SPSS version 23. The findings showed that the internal audit functions which include evaluation of internal control, risk assessment all affect fraud prevention and detection in manufacturing concern. Based on the above, it is recommended among others that management of manufacturing companies in Anambra state should always adopt the services of a qualified Internal auditor in the company so as to ensure no financial leakages and accountability in the company. The management should create and establish a standard internal control system, strong enough to stand against the wiles of fraud in order to promote continuity of operations in such company. The structure should be such that can remain relevant for a very long time and capable of been updated with emerging technology. Anyanwu, Nnamdi | Okafor, Gloria. O "Effect of Internal Audit Functions on Fraud Control in Manufacturing Companies in Anambra State" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49329.pdf Paper URL: https://www.ijtsrd.com/management/accounting-and-finance/49329/effect-of-internal-audit-functions-on-fraud-control-in-manufacturing-companies-in-anambra-state/anyanwu-nnamdi
Fraud is an economic and social menace with multiplier adverse consequences
on individuals, organizations and the society at large. Hence, the Fraud Box key
Model (FBKM) was used as one of the palliative measures to eradicating and
proffering a permanent solution to this monster called fraud. The aim of this study
was to ascertain the effectiveness of forensic accounting as a corporate
governance tool in reducing fraud and improving internal control systems in the
Banking Industry. A Likert scale questionnaire was designed and used as the
research instrument for data generation from respondents. 120 questionnaires
were administered to bankers in Benin City using the judgmental sampling
technique. Data obtained were analyzed using Binomial test. Findings from the
study revealed that forensic accounting aside significantly reducing fraud in the
banking industry, has helped to improve considerably the internal control systems
of banks. It was recommended that the regulatory agencies and shareholders
should strictly enforce forensic accounting of banks and ensure that both internal
control and internal audit staff embrace this emerging trend. Similarly,
accounting professional bodies and academic institutions should provide the
required specialized courses to ensure that forensic accounting personnel are
adequately trained. Bank employees should be duly sensitize on the dangers
inherent in fraud and the imperative of morals. Finally, stakeholders should
cooperate to ensure a fraud free banking industry.
The document discusses the implementation of forensic accounting techniques for fraud detection in Lagos, Nigeria. It begins with introducing forensic accounting and its importance in litigation support and fraud investigation. Some key forensic accounting concepts discussed include types of forensic accounting, skills required, and its scope. The document then covers concepts of fraud and fraud detection, including definitions, types of fraud, and techniques for detection. It presents two fraud cases investigated in Lagos, Nigeria using forensic accounting methods including statistical data analysis and artificial intelligence techniques for detection. The document aims to demonstrate how forensic accounting has aided in detecting various kinds of fraud in Nigeria.
Increase in technology has been helping all sectors of the economy in Nigeria. Yet, there is no gainsaying the fact that technology has both the positive and the negative sides of it. While economic and financial crimes perpetrators manipulate the negative part, forensic accounting uses it as a tool to unearth perpetrators. Crimes classified as economic and financial remain major problem facing the Nigeria’s economy and the citizenries and many believe that forensic accounting is the only panacea in Nigeria. We used the survey method for the purpose of this study. Four hypotheses (null hypotheses) were tested using the Pearson product moment correlation coefficient (PPMC) statistical tool. We find that forensic accounting has a significant but negative relationship with economic and financial crimes; technology has significant and positive relationship with both forensic accounting and economic and financial crimes; and that technology moderates the relationship that exists between forensic accounting and economic and financial crimes. We then made some recommendations such as mandatory forensic accounting department ought be established in publicly and privately owned institutions and offices through regulatory authorities and not on voluntary basis; recruit forensic accountants/investigators/auditors in both the private and public sectors and regularly train and retrain them on current technologies; the Nigerian government should amend existing laws to meet the requirements of present day technological advancement. We then concluded that forensic accounting as afield has all it takes to fight economic and financial crimes in Nigeria and that technology moderates the relationship, though negative, between forensic accounting and economic and financial crimes hence the need for technological advancement in forensic accounting in order to fight against economic and financial crimes.
Incessant financial scandals in the corporate organizations in nigeria audito...Alexander Decker
This document discusses auditors' culpability in financial scandals in Nigerian corporate organizations. It notes that several auditing firms have been implicated in falsifying or overstating financial information for their clients. The study examines factors that may compromise auditors' integrity and independence such as long-term relationships with clients, dependence on a single client for income, and lack of training. The document reviews literature documenting cases where auditors facilitated misleading financial reporting or failed to detect accounting irregularities. It aims to understand why fraud and irregularities still occur despite audits.
Effectiveness of internal auditor in controlling fraud and other financial ir...Alexander Decker
This study examined the effectiveness of internal auditors in controlling fraud and other financial irregularities in private universities in Southwest Nigeria. It evaluated the relevance of internal audit reports in exposing financial fraud and examined the effectiveness of auditing in detecting fraud. Regression analysis showed that internal auditors were effective in controlling fraud. Additionally, internal audit reports were found to be relevant in exposing various means of financial fraud. The study concluded that internal auditors can effectively expose fraud in private universities if allowed to perform their duties, and that auditing is an appropriate way to detect fraud and irregularities. It recommended that private universities implement strong internal controls and effective internal audit functions headed by qualified accountants.
Anti-Fraud 1
Anti-Fraud Prevention
Name
Class
Date
Professor
Anti-Fraud Prevention
Fraud is the intentional act of stealing another individual’s identity or misappropriating funds from a business or an organization. These individuals intentionally steal money from their business or commit acts of deception to gain the money of their victims. It is important for the company and even the individual to establish internal controls to prevent fraud. The company will need to employ a prevention plan that includes a clear fraud policy and use detection strategies to discover acts of fraud.
Regardless of size or sector, training, especially involving loss prevention, is critical to any business (2009). The small business takes the greatest hit from this type of crime and it can cause the small business to go bankrupt. The FBI's Internet Crime Complaint Center released its annual Internet Fraud Crime Report in 2006. The reports included multiple fraud types, including auction fraud, non-delivery, and credit-card fraud, as well as non-fraudulent complaints, such as computer intrusions, spam/unsolicited email and child pornography (2010).
A monetary loss from business and personal fraud exceeds $660 billion annually and on average a business or organization will lose 6% of their profit in a year. Businesses with less than one hundred employees will be the hardest hit by this crime. Occupational fraud and abuses fall into three main categories: asset misappropriation, fraudulent statements, and bribery and corruption (2009). A comprehensive control program would aid the organizations in avoiding this financial loss. It will provide valuable internal controls and assess the effectiveness of current internal controls. A confidential, anonymous reporting system will be developed and safeguard the companies assets.
The comprehensive control program would provide many benefits for the company. It would provide preventive, detective, and corrective controls and will apply new improved auditing standards and rules to follow concerning the standard of controls concerning both inventory and cash flow. In order to be proactive when protecting a company from fraud, this program would provide helpful strategies and methods for eliminating fraudulent activity.
Preventive measures that would be taken would work to stop fraud before it happens. It will provide controls for protecting the company’s assets and the private information of company personnel. Detective controls will be applied to alert company officials of any potential threats of fraud and aims at finding and investigating possible incidents of fraud. Corrective controls will monitor existing controls and apply alternative actions for any aspect of the fraud plan is not beneficial to the company. The comprehensive control program will provide measures to remedy problems that are discovered, so that future frauds can be better prevented and detected (.
Forensic Accounting and Integrated Financial Reporting of Banks using HausmanIJAEMSJORNAL
This study examined forensic accounting and integrated financial reporting of listed banks in Ghana. The study aimed to examine forensic accounting effects on the integrated financial reporting of the listed banks. Its specific objectives determined the impact Litigations, Claims, Fraud cases reported, Cost of forensic investigation and Non-performing loans (LCFCN) have on integrated financial reporting variables such as corporate social responsibility – CSR. Integrated financial reporting (IFR) is the dependent variable while forensic accounting (FA) is the independent variable. In line with these stated objectives, five research questions and five hypotheses were formulated and it adopted the ex-post facto research design. The population of study constitutes 24 listed banks in Ghana, only 8 listed banks was selected through a purposive sampling. The data for the study was purely secondary and sourced from related books of the banks via Central Banks bulletin (Ghana), African financials and banks reports for a period of 16years from 2004-2020. Moreover, data were analyzed using the descriptive statistics, the Shapiro -Wilk test for a diagnostic check for normality and a combination of the panel regression analysis with the Hausman test which aided appropriately specification whether the analysis should be done with a fixed effect or random effect model of which the fixed effect was used for the interpretation at (P 0.050 < 0.10). In nations analyzed, the results among others demonstrated that forensic accounting and integrated financial reporting were statistically significant at 1%, 5%, and 10% as claims is positive and have significant effect on CSR (β = 64687.53, P<0.10); Non-performing loans is statistically significant and had a negative effect on CSR (β = -2.934, P= 0.054 @ 0.10). The study hence concludes that the effective implementation of forensic accounting had a constructive and significant effect on the integrated financial reporting of listed banks in Ghana. The study recommends among others that the apex banks should mandate banks to incorporate forensic accounting when reassessing their employability skill set, report production, debt administration and management, and portray fairness virtue in their reporting system so as to attract more investment and positive public image.
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsIOSR Journals
This paper examined fraud prevention, mitigation and management practices. The respondents were 294 persons drawn from business owners, accountants, investors, bankers, and managers in Port Harcourt. The spearman’s rank order correlation coefficient statistical tool of the statistical package for social sciences (SPSS) was used to test the hypotheses. Results indicated that there is a significant relationship between internal control system and reduction in the manipulation of records; and there is a significant relationship between internal auditing and the prevention of assets defalcations.It was concluded that businesses operate in a risky environment where errors and irregularities which may result into fraud can occur. Fraud is an act of deception which is perpetrated by someone in authority for the illegal acquisition of the assets of an organization that he or she is entrusted to take care of. Thus, efficient and effective internal control system with adequate internal auditing should be provided to prevent, mitigate and manage all forms of fraudulent activities in organizations. In the lightof our findings from the study, we recommendedthat the management of firms should have mechanisms for theproper documentations of their assets, and that the management of organizations should provide mechanisms to safeguard all their physical assets.
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeriaijtsrd
The study examined The need for forensic auditing in public sector fraud Reduction in Nigerian public sector. To achieve this objective, data was collected from secondary source which include press reports, report of Economic and Financial Crime Commission EFCC , Report of Independent and Corrupt Practices Commission ICPC and Report from investigation committees. Two hypotheses were tested with the use of simple regression analysis. The results revealed that there is a significant relationship between forensic audit and fraud reduction also, that an increase in Forensic Audit significantly leads to a decrease in the occurrence of fraud cases in Nigerian public sector. On the basis of this finding, the study concludes that the services of Professional Forensic Auditors are needed to help reduce the occurrence of fraud in Nigerian public sector. Consequently, the study suggests among others that the Federal Government of Nigeria should adopt the services of professional forensic auditors to help reduce the occurrence of fraud in Nigerian public sector. Ekwe, Michael. C. | Azubike J. U. B. | Odogu, Laime Isaac "Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28122.pdfPaper URL: https://www.ijtsrd.com/management/public-sector-management/28122/forensic-auditing-and-public-sector-fraud-detection-in-rivers-state-nigeria/ekwe-michael-c
This literature review is organized in five sections. Firstly, we begin with general ideas and continue with the origin of the fraudulent. Secondly, we discuss the struggle of the phenomena, insisting on the available mechanisms. Finally, we’ll discuss the link between audit and fraud.
The document discusses the skills, ethics, and ethical conduct required of forensic experts. It defines forensic accounting and outlines the key skills needed, including accounting, auditing, investigative skills, legal knowledge, and information technology skills. It also discusses various theories of ethics and provides examples of potential ethical dilemmas in business situations involving discrimination and treatment of business partners. Maintaining high ethical standards is important for forensic experts in their work.
This document discusses forensic accounting and its importance in modern times. It provides an overview of forensic accounting, noting that it has existed for 200 years but its importance has grown with increased financial fraud and accounting scandals. It describes forensic accounting as encompassing both litigation support, such as calculating economic damages, and investigative accounting, like investigating employee theft. The document also outlines the typical processes involved in a forensic accounting investigation and some common scenarios where forensic accountants are retained.
Similar to Influence of Forensic Accounting Practices on Fraud Prevention among Listed Companies in Nigeria (20)
Evaluation of Agro-morphological Performances of Hybrid Varieties of Chili Pe...Premier Publishers
In Benin, chilli pepper is a widely consumed as vegetable whose production requires the use of performant varieties. This work assessed, at Parakou and Malanville, the performance of six F1 hybrids of chilli including five imported (Laali, Laser, Nandi, Kranti, Nandita) and one local (De cayenne), in completely randomized block design at four replications and 15 plants per elementary plot. Agro-morphological data were collected and submitted to analysis of variance and factor analysis of mixed data. The results showed the effects of variety, location and their interactions were highly significant for most of the growth, earliness and yield traits. Imported hybrid varieties showed the best performances compared to the local one. Multivariate analysis revealed that 'De cayenne' was earlier, short in size, thin-stemmed, red fruits and less yielding (≈ 1 t.ha-1). The imported hybrids LaaliF1 and KrantiF1 were of strong vegetative vigor, more yielding (> 6 t.ha-1) by developing larger, long and hard fruits. Other hybrids showed intermediate performances. This study highlighted the importance of imported hybrids in improving yield and preservation of chili fruits. However, stability and adaptation analyses to local conditions are necessary for their adoption.
An Empirical Approach for the Variation in Capital Market Price Changes Premier Publishers
The chances of an investor in the stock market depends mainly on some certain decisions in respect to equilibrium prices, which is the condition of a system competing favorably and effectively. This paper considered a stochastic model which was latter transformed to non-linear ordinary differential equation where stock volatility was used as a key parameter. The analytical solution was obtained which determined the equilibrium prices. A theorem was developed and proved to show that the proposed mathematical model follows a normal distribution since it has a symmetric property. Finally, graphical results were presented and the effects of the relevant parameters were discussed.
Influence of Nitrogen and Spacing on Growth and Yield of Chia (Salvia hispani...Premier Publishers
Chia is an emerging cash crop in Kenya and its production is inhibited by lack of agronomic management information. A field experiment was conducted in February-June and May-August 2021, to determine the influence of nitrogen and spacing on growth and yield of Chia. A randomized complete block design with a split plot arrangement was used with four nitrogen rates as the main plots (0, 40, 80, 120 kg N ha-1) and three spacing (30 cm x 15 cm (s1), 30 cm x 30 cm (s2), 50 cm x 50 cm (s3)). Application of 120 kg N ha-1 significantly increased (p≤0.05) vegetative growth and seed yield of Chia. Stem height, branches, stem diameter and leaves increased by 23-28%, 11-13%, 43-55% and 59-88% respectively. Spacing s3 significantly increased (p≤0.05) vegetative growth. An increase of 27-74%, 36-45% and 73-107% was recorded in number of leaves, stem diameter and dry weight, respectively. Chia yield per plant was significantly higher (p≤0.05) in s3. However, when expressed per unit area, s1 significantly produced higher yields. The study recommends 120 kg N ha-1 or higher nitrogen rates and a closer spacing of 15 cm x 30 cm as the best option for Chia production in Kenya.
Enhancing Social Capital During the Pandemic: A Case of the Rural Women in Bu...Premier Publishers
The document discusses a case study of enhancing social capital among rural women in Bukidnon Province, Philippines during the COVID-19 pandemic through a livelihood project. Key findings include:
1) Technical trainings provided by the project increased the women's knowledge, allowing them to generate additional household income through vegetable gardening during the pandemic.
2) The women's social capital, as measured by groups/networks, trust, and cooperation, increased by 15.5% from 2019 to 2020 through increased participation in their association.
3) Main occupations, income sources, and ethnicity influenced the women's social capital. The project enhanced social ties that empowered the rural women economically and socially despite challenges of the pandemic.
Improving the Efficiency of Ratio Estimators by Calibration WeightingsPremier Publishers
It is observed that the performances of most improved ratio estimators depend on some optimality conditions that need to be satisfied to guarantee better estimator. This paper develops a new approach to ratio estimation that produces a more efficient class of ratio estimators that do not depend on any optimality conditions for optimum performance using calibration weightings. The relative performances of the proposed calibration ratio estimators are compared with a corresponding global [Generalized Regression (GREG)] estimator. Results of analysis showed that the proposed calibration ratio estimators are substantially superior to the traditional GREG-estimator with relatively small bias, mean square error, average length of confidence interval and coverage probability. In general, the proposed calibration ratio estimators are more efficient than all existing estimators considered in the study.
Urban Liveability in the Context of Sustainable Development: A Perspective fr...Premier Publishers
Urbanization and quality of urban life are mutually related and however it varies geographically and regionally. With unprecedented growth of urban centres, challenge against urban development is more in terms of how to enhance quality of urban life and liveability. Making sense of and measuring urban liveability of urban places has become a crucial step in the context of sustainable development paradigm. Geographical regions depict variations in nature of urban development and consequently level of urban liveability. The coastal regain of West Bengal faces unusual challenges caused by increasing urbanization, uncontrolled growth, and expansion of economic activities like tourism and changing environmental quality. The present study offers a perspective on urban liveability of urban places located in coastal region comprising of Purba Medinipur and South 24 Parganas districts. The study uses the liveability standards covering four major pillars- institutional, social, economic and physical and their indicators. This leads to develop a City Liveability Index to rank urban places of the region, higher the index values better the urban liveability. The data for the purpose is collected from various secondary sources. Study finds that the eastern coastal region of the country covering state of West Bengal depicts variations in index of liveability determined by physical, economic, social and institutional indicators.
Transcript Level of Genes Involved in “Rebaudioside A” Biosynthesis Pathway u...Premier Publishers
Stevia rebaudiana Bertoni is a plant which has recently been used widely as a sweetener. This medicinal plant has some components such as diterpenoid glycosides called steviol glycosides [SGs]. Rebaudioside A is a diterpenoid steviol glycoside which is 300 times sweeter than table sugar. This study was done to investigate the effect of GA3 (50 mg/L) on the expression of 14 genes involved in Rebaudioside A biosynthesis pathway in Stevia rebaudiana under in vitro conditions. The expression of DXS remarkably decreased by day 3. Also, probably because of the negative feedback of GA3 on MEP-drived isoprenes, GGDS transcript level reached its lowest amount after GA3 treatment. The abundance of DXR, CMS, CMK, MCS, and CDPS transcripts showed a significant increase at various days after this treatment. A significant drop in the expression levels of KS and UGT85C2 is detected during the first day. However, expression changes of HDR and KD were not remarkable. Results revealed that the level of transcript of UGT74G1 and UGT76G1 up regulated significantly 4 and 2 times higher than control, respectively. However, more research needs to shed more light on the mechanism of GA3 on gene expression of MEP pathway.
Multivariate Analysis of Tea (Camellia sinensis (L.) O. Kuntze) Clones on Mor...Premier Publishers
Information on genetic variability for biochemical characters is a prerequisite for improvement of tea quality. Thirteen introduced tea clones characterized with objective; assessing tea clones based on morphological characters at Melko and Gera research stations. The study was conducted during 2017/18 cropping season on experimental plots in RCBD with three replications. Data recorded on morphological traits like days from pruning to harvest, height to first branch, stem diameter, leaf serration density, leaf length, leaf width, leaf size, petiole length, leaf ratio, internode length, shoot length, number of shoot, canopy diameter, hundred shoot weight, fresh leaf yield per tree. Cluster analysis of morphological trait grouped into four clusters indicated, the existence of divergence among the tested clones. The maximum inter-cluster distance was between clusters I and IV (35.27) while the minimum inter cluster distance was observed between clusters I and II (7.8).Principal components analysis showed that the first five principal components with eigenvalues greater than one accounted 86.45% for 15 morphological traits. Generally, the study indicated presence of variability for several morphological traits. However, high morphological variation between clones is not a guarantee for a high genetic variation; therefore, molecular studies need to be considered as complementary to biochemical studies.
Causes, Consequences and Remedies of Juvenile Delinquency in the Context of S...Premier Publishers
This research work was designed to examine nature of juvenile offences committed by juveniles, causes of juvenile delinquency, consequences of juvenile delinquency and remedies for juvenile delinquency in the context of Sub-Saharan Africa with specific reference to Eritrea. Left unchecked, juvenile delinquents on the streets engage in petty theft, take alcohol or drugs, rape women, rob people at night involve themselves in criminal gangs and threaten the public at night. To shed light on the problem of juvenile delinquency in the Sub-Saharan region data was collected through primary and secondary sources. A sample size of 70 juvenile delinquents was selected from among 112 juvenile delinquents in remand at the Asmara Juvenile Rehabilitation Center in the Eritrean capital. The study was carried out through coded self-administered questionnaires administered to a sample of 70 juvenile delinquents. The survey evidence indicates that the majority of the juvenile respondents come either from families constructed by unmarried couples or separated or divorced parents where largely the father is missing in the home or dead. The findings also indicate that children born out of wedlock, families led by single mothers, lack of fatherly role models, poor parental-child relationships and negative peer group influence as dominant causes of juvenile infractions. The implication is that broken and stressed families are highly likely to be the breeding grounds for juvenile delinquency. The survey evidence indicates that stealing, truancy or absenteeism from school, rowdy or unruly behavior at school, free-riding in public transportation, damaging the book of fellow students and beating other young persons are the most common forms of juvenile offenses. It is therefore, recommended that parents and guardians should exercise proper parental supervision and give adequate care to transmit positive societal values to children. In addition, the government, the police, prosecution and courts, non-government organizations, parents, teachers, religious leaders, education administrators and other stakeholders should develop a child justice system that strives to prevent children from entering deeper into the criminal justice process.
The Knowledge of and Attitude to and Beliefs about Causes and Treatments of M...Premier Publishers
Stigma and discrimination associated with mental illness are a common occurrence in the Sub-Saharan region including Eritrea. Numerous studies from Sub-Saharan Africa suggest that stigma and discrimination are major problems in the community, with negative attitudes and behavior towards people with mental illness being widespread. In order to assess the whether such negative attitudes persist in the context of Eritrea this study explored the knowledge and perceptions of 90 Eritrean university students at the College of Business and Economics, the University of Asmara regarding the causes and remedies of mental illness A qualitative method involving coded self-administered questionnaires administered to a sample of 90 university students to collecting data at the end of 2019. The survey evidence points that almost 50% of the respondents had contact with a mentally ill person suggesting that the significant number of the respondents experienced a first-hand encounter and knowledge of mental illness in their family and community. The findings show an overall greater science-based understanding of the causes of mental illness to be followed by recommended psychiatric treatments. The survey evidence indicates that the top three leading causes of mental illness in the context of Eritrea according to the respondents are brain disease (76%), bad events in the life of the mentally ill person (66%) and substance abuse or alcohol taking, smoking, taking drugs like hashish. (54%). The majority of the respondents have a very sympathetic and positive outlook towards mentally ill persons suggesting that mentally illness does not simply affect a chosen individual rather it can happen to anybody regardless of economic class, social status, ethnicity race and religion. Medical interventions cited by the majority of the respondents as being effective treatments for mental illness centered on the idea that hospitals and clinics for treatment and even cures for psychiatric disease. Changing perceptions of mental illnesses in Eritrea that paralleled the very caring and sympathetic attitudes of the sample university students would require raising public awareness regarding mental illness through education, using the mass media to raise public awareness, integrating mental health into the primary health care system, decentralizing mental health care services to increase access to treatment and providing affordable service to maintain positive treatment outcomes.
Effect of Phosphorus and Zinc on the Growth, Nodulation and Yield of Soybean ...Premier Publishers
This study investigated the effects of phosphorus and zinc on the growth, nodulation, and yield of two soybean varieties in Nigeria. Phosphorus application significantly affected growth, nodulation, yield, and some yield components, with 60 kg P2O5/ha giving the highest growth and yield. Phosphorus also increased nodulation, with 30 kg P2O5/ha providing the highest nodulation. Zinc application did not significantly affect most growth characters or nodulation, except for reducing plant height. Phosphorus increased soybean yield significantly to 1.9 t/ha compared to the control of 1.7 t/ha. Protein and oil contents were not significantly affected by phosphorus but were by zinc
Influence of Harvest Stage on Yield and Yield Components of Orange Fleshed Sw...Premier Publishers
A field experiment was conducted at Adami Tullu Agricultural Research Center in 2018 under rainfed condition with supplementary irrigation to determine the influence of harvest stage on vine yield and tuberous root yield of orange fleshed sweet potato varieties. The experiment consisted of four harvest stages (105, 120, 135 and 150 days after planting) and Kulfo, Tulla and Guntute varieties. A 4 X 3 factorial experiment arranged in randomized complete block design with three replications was used. Interaction of harvest stage and variety significantly influenced above ground fresh biomass, vine length, marketable tuberous root weight per hectare, commercial harvest index and harvest index. The highest mean values of above ground fresh biomass (66.12 t/ha) and marketable tuberous root weight (56.39 t/ha) were produced by Guntute variety harvested at 135 days after planting. Based on the results, it can be recommended that, farmers of the study area can grow Guntute variety by harvesting at 135 days after planting to obtain optimum vine and tuberous root yields.
Performance evaluation of upland rice (Oryza sativa L.) and variability study...Premier Publishers
This study evaluated 13 upland rice varieties over two locations in Ethiopia for yield and other traits. Significant differences were found among varieties for several traits. The highest yielding varieties were Chewaka, Hiddassie, and Fogera 1. Chewaka yielded 5395.8 kg/ha on average, 25.8-35% more than the check. Most varieties matured within 120-130 days. High heritability was found for days to heading, panicle length, and grain yield, indicating these traits can be easily improved through selection. Grain yield also had high genetic variation and heritability with genetic advance, suggesting yield can be improved through selection. This study identified variability that can be used
Response of Hot Pepper (Capsicum Annuum L.) to Deficit Irrigation in Bennatse...Premier Publishers
This study was conducted at Enchete kebele in Benna-Tsemay Woreda, South Omo Zone to evaluate the response of hot pepper to deficit irrigation on yield and water productivity under furrow irrigation system. The experiment comprised four treatments (100 % of ETc, 85% of ETc, 70 % of ETc and 50% of ETc), respectively. The experiment was laid out in RCBD and replicated four times. The two years combined yield results indicated that, the maximum total yield (20.38 t/ha) was obtained from 100% ETc while minimum yield (12.92 t/ha) was obtained from 50% of ETc deficit irrigation level. The highest WUE 5.22 kg/ha mm-1 was obtained from 50% of ETc. Treatment of 100% ETc irrigation application had highest benefit cost ratio (4.5) than all others treatments. Applying 50% of ETc reduce the yield by 37% when compared to 100 % ETc. Accordingly, to achieve maximum hot pepper yield in areas where water is not scarce, applying 100% ETc irrigation water application level throughout whole growing season under furrow irrigation system is recommended. But, in the study area water scarcity is the major limiting factor for crop production. So, it is possible to get better yield and water productivity of hot pepper when we apply 85% ETc irrigation water throughout growing season under furrow irrigation system.
Harnessing the Power of Agricultural Waste: A Study of Sabo Market, Ikorodu, ...Premier Publishers
Nigeria is still burdened with huge responsibilities of waste disposal because the potential for benefits of proper waste management is yet to be harnessed. The paper evaluates the capacity of the Sabo Cattle market in producing the required quantities of waste from animal dung alongside decomposed fruits with a view to generating renewable energy possibilities for lighting, security and other business activities of the market. It is estimated that about 998 million tons of agricultural waste is produced yearly in the country with organic wastes amounting to 80 percent of the total solid wastes. This can be categorized into biodegradable and non-biodegradable wastes. The paper evaluates the capacity of the Sabo Cattle market in producing the required quantities of waste from animal dung alongside decomposed fruits with a view to generating renewable energy possibilities for lighting, security and other business activities of the market. The Sabo market was treated as a study case with the adoption of in-depth examinations of the facility, animals and products for sale and waste generated. A combination of experimental, interviews (qualitative) and design simulation (for final phase) was adopted to extract, verify and analyse the data generated from the study. Animal waste samples were subjected to compositional and fibre analysis with results showing that the sample has high potency for biogas production. Biodegradable Wastes are human and animal excreta, agricultural and all degradable wastes. Availability of high quantity of waste generated being organic in Sabo market allows the use of anaerobic digestion to be proposed as a waste to energy technology due to its feasibility for conversion of moist biodegradable wastes into biogas. The study found that at peak supply period during the Islamic festivities, a conservative 300tonnes of animal waste is generated during the week which translates to over 800kilowatts of electricity.
Influence of Conferences and Job Rotation on Job Productivity of Library Staf...Premier Publishers
The general purpose of this study is to investigate the influence of conferences and job rotation on job productivity of library staff in tertiary institutions in Imo State, Nigeria. The survey research design was used for this study using questionnaire as an instrument for data collection. This study covered the entire population of 661. Out of these, 501 copies of the questionnaire representing 75.8% were duly completed and returned for analysis. Student’s t-test was used to analyze the research questions. The finding showed that conferences had no significant influence on the job productivity of library staff in tertiary institutions in Imo State, Nigeria (F cal= 7.86; t-vale =6.177; p >0.005). Finding also showed that job rotation significantly influences job productivity of library staff in tertiary institutions in Imo State, Nigeria (F-cal value= 18.65; t-value = 16.225; P<0.05). This study recommended that, government should ensure that library staff participate in conferences with themes and topics that are relevant to the job they perform and also ensure that there should be proper evaluation and feedback mechanism which aimed to ensuring control and minimize abuse of their development opportunities. Again, there should be written statement of objectives in order to sustain job rotation programmes. Also, that training and development needs of library staff must be identified and analyzed before embarking on job rotation processes as this would help to build skills, competences, specialization and high job productivity.
Scanning Electron Microscopic Structure and Composition of Urinary Calculi of...Premier Publishers
This document summarizes a study on the scanning electron microscopic structure and chemical composition of urinary calculi (stones) found in geriatric dogs. Microscopic examination of urine samples revealed increased numbers of blood cells, epithelial cells, pus cells, casts, bacteria and crystals of various shapes, predominantly struvite, calcium oxalate dihydrate and monohydrate, and ammonium urate. Scanning electron microscopy showed perpendicular columnar strata of struvite crystals and wavy phases of uric acid. Chemical analysis identified calcium phosphate, calcium oxalate and urea stones. The study characterized the microscopic and electron microscopic appearance of crystals and chemical composition of urinary calculi in geriatric dogs.
Gentrification and its Effects on Minority Communities – A Comparative Case S...Premier Publishers
This paper does a comparative analysis of four global cities and their minority districts which have been experiencing the same structural pressure of gentrification. The main contribution of this paper is providing a detailed comparison of four micro geographies worldwide and the impacts of gentrification on them: Barrio Logan in San Diego, Bo-Kaap in Cape Town, the Mission District in San Francisco, and the Rudolfsheim-Fünfhaus District in Vienna. All four cities have been experiencing the displacement of minority communities due to increases in property values. These cities were chosen because their governments enacted different policies to temper the gentrification process. It was found that cities which implemented social housing and cultural inclusionary policies were more successful in maintaining the cultural and demographic make-up of the districts.
Oil and Fatty Acid Composition Analysis of Ethiopian Mustard (Brasicacarinata...Premier Publishers
The experiments was conducted at Holetta Agricultural Research Center, to analyze forty nine Ethiopian Mustard land races for oil and fatty acid composition traits The experiment was carried out in a simple lattice design. The analysis of variance showed that there were highly significant differences among genotypes for all oil and fatty acid traits compared. The significant difference indicates the existence of genetic variability among the land races which is important for improvement
Antibiogram of Bacteria Isolated from Wounds of Diabetic Patients on Admissio...Premier Publishers
A major challenge faced by diabetic patients is infected diabetic ulcers usually associated with substantial morbidity and mortality. Worse issues arise from antibiotic resistant microorganisms. This study was conducted to determine the antibiogram of bacteria isolated from wounds of diabetic patients on hospital admission. Nine wound swab samples were collected from nine diabetic in-patients with ulcers. These were processed using standard protocols. Multi antibiotic sensitivity discs (Gram negative and Gram positive) containing ten antibiotics respectively were used. Total of 91 bacterial isolates were obtained belonging to five species. Staphylococcus aureus was most predominant (34.07%) and Proteus mirabilis was the least isolated (7.69%). Pseudomonas aeruginosa showed highest (100%) resistance to the antibiotics used, followed by Proteus mirabilis (90%), Staphylococcus aureus (80%) and Escherichia coli (30%). Klebsiella pneumoniae was 100% susceptible. Streptomycin was the most efficacious antibiotic while Ciprofloxacin and Augmentin were the least. The level of resistance exhibited by these clinical isolates is worrisome and likely to impede treatment outcomes. Streptomycin showed broad spectrum activity and may be the best drug of choice for treating wounds in diabetic patients however, there is need for antibiotic susceptibility testing and consideration of patient’s physiologic disposition before introducing antibiotic regimen.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
2. `
Influence of Forensic Accounting Practices on Fraud Prevention among Listed Companies in Nigeria
Yahaya et al. 009
The issues on the corporate world’ scandals, audit
fraternity and the society at large; hence, the erosion of
investors’ confidence in the financial markets (Levanti,
2001; Alao 2016). Among other possible causes of
liquidation in companies today are inadequacy of risk
management systems and diversion of the core
businesses to speculative activities. Companies perceived
the services of Forensic accounting as expensive that only
the big once can afford it (Eyisi & Agbaeze 2014).
Therefore, these companies would not want to law court
instead will rather decide to have their matter resolve
outside court to avoid bad corporate image.
LITERATURE REVIEW
The activities and understanding of business reality and
the kind of legal system in which it operates. Literatures
have shown that; there is dimension shift from accountants
focusing on fraud detection to wider forensic activities
(Cohen, Crain & Sanders 1996; Baron 2006; Wells 2003;
Crumbley, Heitger & Smith 2009). Forensic accounting is
that part of accounting which gives justifiable analysis in
law court and will be a forum of debate and ultimately
disputes resolution (Leech & Dowling 2006). It comprises
of specialized investigative accounting skills and body of
knowledge to established a suitable report on proceedings
(DiGabriele 2009).
Eze (2015) noted that Forensic accounting, involve
investigative accounting and litigation that have to do with
any wrong doing found during or after activities involved in
organizations. Dispute or litigation anticipated are part of a
specialized areas of accounting particularly the forensic
(Baron 2006). Forensic accounting can be explain as a
guide use in law court or procedures undergo during
investigation of fraud or any misappropriation (Crumbley,
Heitger & Smith 2005; Razaee et al 2016). According to
Albrecht, Albrecht and Albrecht (2006) reported that the
identification of the causes of fraud is very difficult. The
Authors added that the trend of fraud these days are
characterized by tedious web conspiracy which deviate
from the genesis of the problems. It was established that
fraud is characterized by illegal act and irregularities
intentionally perpetrated by theses culprits (DiGabriele,
2009).
Auditors with forensic accounting knowledge and skills
have important role to deter fraudulent activities in
companies especially organized business institution like
the listed companies. The ability of the companies to have
skilled and qualify auditors with forensic knowledge would
prevent fraud in the environment.
In addition, these companies prefer the use of computer
for software for their activities. These companies normally
keep on to the use of electronic paper work to facilitate
documentation and other process within and outside the
environment. However, big companies or organizations
deployed the use of robots computerised gadgets to
facilitate their activities and avoid irregularities (Leech &
Dowling 2006; Eyisi & Agbaeze 2014).
Even small audit companies are encouraged to adopt
modern technology such as electronic paper work.
Information Technology usage could reduce the time
auditors spend performing computerised, clerical tasks
and improve the quality of audit judgments by structuring
audit decision processes (Manson, McCartney & Sherer
1997; Modugu & Anyaduba 2013). These Information and
Technology gadgets of the 21st century appears to
increase audit quality and productivity through audit
automation, eliminating certain audit procedures, and
enhancing knowledge and information sharing capabilities
(Ojo 2012; Eliezer Balogun 2015). The combine
knowledge of forensic accounting and information
technology would go a long way to prevent fraud in most
listed companies.
Mohay, Anderson, Collie, De Vel & McKemmish (2003)
contend that a different characteristic of forensic
(computerized) have to be with application of technology
which with due regard to the requirements of the law. If not
adhere to, it can result in digital evidence being ruled as
inadmissible or as tainted. When presented the evidence
in law court with regard to computer forensic audit the court
only recognizes forensic technology evidences which
comprises of authenticity, completeness, reliability and
believability.
Forensic investigation involves large categories of careful
monitoring, assessments and evaluations of financial data
to avoid or detect irregularities (Efosa & Kingsley 2016;
Alao 2016). When it comes to most real, accurate process
of investigation and implies to most risky and delicate
crime scenarios calling for forensics to take charge of
every possible steps (Claire & Jude 2016; Temitope 2016).
This leads to crime resolutions and further comprehensive
research territory of forensic studies. Technology brings
specialized security with computer as a form of defense
against unauthorized and malicious intrusion and
computer forensics allows for identification of incidents,
collating records of evidences as there has been different
types of computer forensic which extends to records
management (Eze 2015; Sujatha & Gomez 2015;
Temitope et al 2016).
Fraud prevention and detection in organization has been
found to be curtailed through the mean of sound internal
control systems (Adebisi, Mathew and Emmanuel 2016;
Wells, 2008). Internal control system can be effective
through the establishment of knowledge, research and
development. The basic constant training of staff
contributes a lot in having a sound internal control system
in companies. Okafor & Andrew (2016) found that
knowledge of forensic accounting had been a means of
effective internal control system thereby reducing the fraud
in companies.
3. `
Influence of Forensic Accounting Practices on Fraud Prevention among Listed Companies in Nigeria
J. Acc. Aud. Tax. 010
However, Barra (2010) and Ozili (2018) stressed that
forensic accounting knowledge driven prevent fraud in
organization. Moyes and Baker (2003) noted that
auditors’ high skilled knowledge of forensic accounting is
most likely to detect and prevent fraud in companies. Also,
in another study Bierstaker, Burnaby and Hass (2004)
found that fraud detection and prevention tools is as a
result of effective and knowledgeable internal auditor.
The authors went ahead to report that the familiar used
tools in preventing fraud in companies are operational
audit, reference supervision on staff, internal control
review and development. The uncommon mechanism
used to as describe by the study are software and digital
analysis. ACFE (2008) stressed that operational tools such
as internal control and internal audit has been found to
detect and prevent fraud.
Nevertheless, literatures have found that most mechanism
used by organization to detect and prevent fraud in their
domain are said to be informal (ACFE, 2008; Drew and
Drew, 2010). There are arguments that prevention of fraud
in not as a result of sound internal control system.
However, a study conducted by Muslimat and Hamid
(2012) found that employees of the internal audit unit of a
government owned hospital do not have basic skills and
knowledge of fraud prevention which prone to danger of
fraudulent activities.
The study further suggests that some internal audit staff in
the hospital tried to prevent fraud on their own. This has
showed that if these staff can be educated with forensic
accounting knowledge they can be a mechanism for the
detection and prevention of fraud in the establishment.
Moreover, accounting studies indicated that sound internal
control system can prevent fraud (Nwaiwu & Aaron 2018;
Barra and Griggs, 2007). It is therefore, paramount to have
knowledge of forensic accounting skill. On this note the
study hypothesized that:
H1: Forensic Accounting knowledge has significant
relationship with Fraud Prevention.
H2: Forensic Accounting Complexity has significant
relationship with Fraud Prevention.
These hypotheses formulated and conceptual model are
being depicted in the figure below.
Conceptual Framework
Figure 1: Conceptual Framework
In the conceptual model presented above, the paper
discussed on the variables in the study and their
relationship which comprises of the independents and the
dependent variables. The dependent is the Fraud
prevention while the independents are Forensic
Accounting knowledge and Forensic Accounting
Complexity. The two sub independent variables have
relationship with the dependent variable.
Theoretical Framework
The theoretical framework of this study is based on the
theory of fraud triangle and fraud diamond. The two
underpinned theories are geared towards comprehensive
explanation on fraud and all the ways in which perpetrators
used in achieving their objectives (Enofe, Okpako, and
Atube, 2013). FBI (2014) define fraud as any means of
deceit and misused of trust by the perpetrators, it is also
found to be criminal act of deliberately violation of the law
and polices with the intention of achieving financial
benefits (Bansal, Suman, and Sonepat, 2014). These
theories focus on the reasons of frauds in companies and
other establishments. They provide ways of understanding
fraud in companies. The theory of fraud triangle comprises
of three cardinal point which are perceived pressure,
perceived opportunity and rationalization that was
developed by (Cressey 1953). Cressey (1953) stressed
that these three factors or element of fraud triangle are the
motive behind committing fraud in any establishment. The
perceived pressure is as a result of financial needs of
individuals that would not be shared. The second element
which is the perceived opportunity is when an individual
has access to fund or a custodian of fund and misused the
opportunity. The last element is the rationalization which
has to do with the personal justifications of what an
individual does in the act.
Pressure
Opportunity Rationalization
Figure 2: Fraud Triangle
Source: Cressey (1953)
The above model depicted the three element of Cressy
(1953) triangle fraud theory. The top pic of the model
represents the perceived pressure and the two-bottom
level of the model represent the perceived opportunity and
rationalization (Wells 2011 cited in Abdullahi and Mansor,
2015). This theory of fraud triangle has been expanded to
fraud diamond theory.
The expansion theory of fraud triangle is known as fraud
diamond theory which was introduced by Wolfe and
Hermanson (2004). The authors introduced a fourth
variable which known as capabilities, in their opinion fraud
Forensic
Knowledge
Forensic
Complexity
Fraud
Prevention
H1
H2
4. `
Influence of Forensic Accounting Practices on Fraud Prevention among Listed Companies in Nigeria
Yahaya et al. 011
occurrences in most cases happened when individual
used their right capabilities to commit fraud (Wolfe and
Hermanson, 2004). These individual normally would have
the tricks and skills of to commit fraud in organisations and
another establishment. Wolfe and Hermanson (2004) cited
in Abdullahi and Mansor (2015), found that perceived
opportunity give way in committing fraud while perceived
pressure (incentive) and rationalization lead perpetrators
to commit fraud. However, capability allows an individual
to identify the way an opportunity and used it often.
Opportunity
Incentive Capability
Rationalization
Figure 3: The Fraud Diamond
Source: Wolfe and Hermanson (2004)
RESEARCH METHODOLOGY
The research design adopted in this paper is the survey
method with a quest to assess forensic accounting
knowledge and complexity on fraud prevention among the
listed companies in Nigeria The research work was
conducted to covers the appropriate area of study. The
questionnaire was sent to one hundred and seventy-seven
(177) Auditors of the listed companies drawn from each
industry in Nigerian out of which 105 auditors responded.
The data collected were analysed using multiple
regression analysis. Hence, the hypotheses were tested
from the regression outcome. The five-point likert scale
was used to measure the degree to which respondents
agree or disagree with the statement provided in the
questionnaire, given thus: strongly disagree; disagree;
undecided; agree and strongly agree.
Reliability Test
In assessing the reliability of the data all the variables’
internal consistency was properly scrutinized with the aid
of a Cronbach’s alpha coefficients. Having examined each
fraud prevention variable’s underlying dimensions. Field
(2013) stressed that reliability measurement of scale
produce consistent results when the same entities are
measured under different conditions.
Therefore, the internal consistencies calculated have
exceeded the recommended threshold of 0.70. In a
nutshell, the FAK has a reliability value of 0.751, FAC has
0.887and FRP has a value of 0.732 which are above the
recommended value of Hair, Black, Babin, Anderson &
Tatham (2005). The table below show presents.
Table: 1 Reliability Test
variables Code Number
of items
Alpha
Coefficient
Forensic
Accounting
Knowledge
FAK1 7 0.751
Forensic
Accounting
Complexity
FAC2 6 0.887
Fraud Prevention FRP 6 0.732
RESULTS AND DISCUSSION
The result shows in table below depicts the significant
relationship between the one construct which is the fraud
prevention and the predictors (independent construct).
The tests of this regression assumptions were conducted
to indicates the finding by testing the regression
assumptions and the outcomes as provided, indicate fraud
prevention as (p<0.05), forensic accounting knowledge
(p<0.05). Under Standardized Coefficients, each variable
has beta coefficients of 0.419 and -0.027 respectively.
From the analysis, result indicates that forensic accounting
knowledge has positive and significant effect on fraud
prevention where it is, 0.419, meaning that there is 42% of
the independent variable explaining the fraud prevention
in listed companies and also it has (p < 0.05) that is
significant. Considering the following Hypotheses:
Hypothesis 1
H1: Forensic Accounting knowledge has significant
relationship with fraud prevention.
This hypothesis is therefore accepted. Which is consistent
with the studies of (Razaee et al 2016; Adebisi at al 2016;
Claire & Jude 2016)
Furthermore, forensic accounting complexity is negative
and insignificant where it is -0.27 > 0.05.
Meaning that, it has no significant relationship on fraud
prevention, considering the following Hypotheses:
Hypothesis 2
H2: Forensic Accounting Complexity has significant
relationship with fraud prevention.
This indicated that the hypothesis is negatively related and
insignificant, therefore rejecting the hypothesis. This
contradict the studies of (Nwaiwu & Aaron 2018; Eliezer &
Balogun 2015).
In the discussion, it is found the Knowledge on Forensic
accounting is significantly related to the fraud prevention
among listed companies. This also manifest that the
forensic accounting knowledge is magnitude enough to
impact on the fraud prevention among listed companies in
Nigeria. However, the Forensic accounting complexity
5. `
Influence of Forensic Accounting Practices on Fraud Prevention among Listed Companies in Nigeria
J. Acc. Aud. Tax. 012
shows a negative insignificant relationship with the fraud
prevention which depicted of too much complexities that
relate to forensic accounting in preventing fraud in listed
companies. The result is shown below:
Table 2: Regression model
Model
Unstandardized
Coefficients
Standardized
Coefficients
T Sig.B
Std.
Error Beta
(Constant) 6.189 1.925 3.215 .000
Forensic
accounting
knowledge .609 .197 .419 3.096 .003
Forensic
accounting
complexity -.067 .382 -.027 -.176 .861
a; Dependent variable of fraud Prevention
Rsquare = 0.176
R = 0.419
F change = 9.583
Sig. F change = 0.0035.
CONCLUSION AND RECOMMENDATION
The practice of auditing and investigation in forensics
accounting includes formal use, techniques for collecting,
legal processes, analyzing, and court presentation of fact
and reports from expert. These processes mentioned
requires authentication of the fact, specialized techniques
and analysis of data collected for dispute resolution. This
Forensic procedure conducted is a form of auditing which
deter illegal activities and irregularities in financial
accounts and also involves investigative accounting and
litigation.
It is an area of accounting that anticipated issues as it is
responsible for the utilization of specialized investigative
skills. This specialized area of accounting also finds an
inquiry by assisting in the protection and recovery of
embezzled assets through civil action. Forensic
accounting involves is resolving existing litigation, which
concern with primary issue of calculating economic
damage.
Fraud investigation is very important but shows very
challenging task in daily practice, Fraud prevention is
therefore considered as a measuring yard stick to
establish level of free companies’ sound internal control
system. Fraud experts noted that it is essential to obtain
clear view on trends of fraudulent activities in the business
circle through constants following and measuring of
organizations compliance level and keep a proper and
internal control system. Forensic accounting currently
being understood by accountants, as an elaborated
activity unto itself by which is capable to counter fraud.
The study therefore, recommended that stake holders,
authorities or government should impose the use forensic
accounting and auditing in ever organisation and other
agencies to deter corruption in all sectors of the economy.
The paper also recommends for further study that areas to
research on knowledge of Forensic accounting in
Ministries and department of government agencies and
also a different methodology to be use.
REFERENCES
Abdullahi R and mansor, N (2015): Fraud Triangle
Theory and Fraud Diamond Theory. Understanding
the convergent and divergent for future research.
International Journal of Academic Reasearch in
Accounting, Finance and Management Sciences. Vol.
5, No. 4 pp 38-45.
Adebisi J F, Mathew O. B and Emmanuel Y V (2016) The
Impact of Forensic Accounting in Fraud Detection and
Prevention: Evidence from Nigerian Public Sector.
International Journal of Business Marketing and
Management 1(5), pp.34-41
Associate of Certified Fraud Examiners (2008). Report to
the Nation on Occupational Fraud Abuse. Austine, Tx:
Association of Certified Fraud Examiners.
Alao A.A (2016) Forensic Auditing and Financial Fraud in
Nigerian Deposit Money Banks (DMBS), European
Journal of Accounting, Auditing and Finance Research
Vol.4 (No.8) PP 1-19
Albrecht, W. S., Albrecht, C. C., Albrecht, C. O. (2006).
Fraud Examination: Thomson South-Western.
Barra, R.A. and Griggs, K. (2007). Internal Control:
Lessons to be Learned from Fire. International Journal
of Services and Standards, 3 (4), pp. 375 – 389
Barra, R.A. (2010). The Impact of Internal Controls and
Penalties on Fraud. Journal of Information Systems, 24
(1), pp. 1-21.
Baron, L. (2006). CPAs Are a Hot Commodity. Journal of
Accountancy, Vol 201, (No2).
Bierstaker, J.L., Burnaby,P. and Hass, S. (2004). Internal
Auditors Fraud Prevention and Detection Methods.
Internal Auditing, 19.3 (May/June), Pp. 37 – 40
Cohen, M., Crain, M. A. Sanders, A. (1996). Skills Used in
Litigation Services. Journal of Accountancy, Vol 182,
(No.3), Pp 101.
Claire A.C & Jude I.O (2016) Forensic Accounting and
Fraud Detection in Nigeria Public Sector, Igbinedion
University Journal of Accounting Vol.2 Pp 148-173
Cressey. D.R (1953): The Criminal Violation of Financial
Trust. American sociological review 15 (6) pp 738-743,
December. Pp 1-15 retrieved from www.jstor.org.
Crumbley, D.L., Heitger, L.E., & Smith, G.S. (2005).
Forensic and Investigative Accounting. CCH Group,
Chicago, IL
Crumbley DL, Heitger LE, Smith GS (2009). Forensic and
investigative accounting. CCH Group: pp. 3-5.
DiGabriele, J. A. (2008). An Empirical Investigation of the
Relevant Skills of Forensic Accountants. Journal of
6. `
Influence of Forensic Accounting Practices on Fraud Prevention among Listed Companies in Nigeria
Yahaya et al. 013
Education for Business, Vol.83 (No.6), Pp 331-338.
http://dx.doi.org/10.3200/JOEB.83.6.331-338
DiGabriele, J. A. (2009). Implications of Regulatory
Prescriptions and Audit Standards on the Evolution of
Forensic Accounting in the Audit Process. Journal of
Applied Accounting Research, Vol.10 (No.2), Pp 109-
121.
DiGabriele, J. A. (2009). Forensic Accountant: A Closer
Look at the Skills Forensic Accounting Education
Should Emphasize. The Forensic Examiner, Summer,
Pp 77-79.
http://dx.doi.org/10.1108/09675420910984673
DiGabriele, J. A. (2011). Revisiting the Integration of
Forensic Accounting and the Auditing Paradigm. The
Forensic Examiner, Summer, Pp 70-73.
Drew, J.M. and Drew, M.E. (2010).Ponzimoniumi Madoff
and the Red Flags of Fraud. Griffit Business School,
University of Griffith Australia.
Enofe, A.O., Okpako, P.O., & Atube,E. N. (2013). The
Impact of Forensic Accounting on Fraud Detection.
European Journal of Business and Management, 5(26),
61–73.
Efosa E.E & Kingsley E.O.A.O (2016) Forensic Accounting
and Fraud Management: Evidence from Nigeria,
Igbinedion University Journal of Accounting Vol.2 Pp
245- 308
Eliezer O & Balogun E (2015) Relevance of Forensic
Accounting in the Detection and Prevention of Fraud in
Nigeria, Historical Research Letter Vol. 23 Pp 17-25
Eyisi A.S & Agbaeze E.K (2014) The Impact of Forensic
Auditors in Corporate Governance, International
Journal of Development and Sustainability Vol.3 (No. 2)
Pp 404-417
Eze N.M (2015) Forensic Auditing and Financial
Accounting in Nigeria: An Assessment, International
Journal of Economics and Management Studies Vol. 2
(No.4) Pp 6-12
FBI. (2014). Authorization and Budget Request to
Congress. NewYork: Department of Justice.
Field, A. (2013). Discovering statistics using IBM SPSS
Statistics (4th edn), London: SAGE.
Gottschalk, P. (2010). Prevention of white collar crime:
The role of accounting. Journal of Forensic and
Investigative Accounting, Vol.3 (No.1), Pp 23-48.
Hair, J. E., Black, W. C., Babin, B. J., Anderson, R. E., &
Tatham, R. L. (2005). Multivariate data analysis: Upper
Saddle River, NJ: Pearson Education.
Kleinman, G., & Anandarajan, A. (2011). In attentional
Blindness and its Relevance to Teaching Forensic
Accounting and Auditing. Journal of Accounting
Education, Vol.2 (No.9), Pp 37-49.
http://dx.doi.org/10.1016/j.jaccedu.2011.08.002
Leech, S.A., and Dowling, C. (2006). An investigation of
decision aids in audit firms: Current practice and
opportunities for future research. Working paper,
University of Melbourne
Levanti, M. (2001). Prevention of Fraud. Crime Prevention
Paper 17. London.
Manson, S.; McCartney, S. and Sherer, M. (1997). Audit
Automation: The Use of Information Technology in the
planning, Controlling and Recording of Audit Work.
Edinburgh: Institute of Chartered Accountants of
Scotland.
Modugu K.P & Anyaduba J.O (2013) Forensic Accounting
and Financial Fraud in Nigeria: An Empirical Approach,
International Journal of Business and Social Science
Vol. 4 (No.7) Pp 281-289
Mohay, G. M., Anderson, A., Collie, B., de Vel, O &
McKemmish, R. (2003). Computer and Intrusion
forensics, London, UK Artech House.
Moyes, G. and Baker, C.R. (2003). Auditor’s Belief About
the Fraud Detection Effectiveness of Standard Audit
Procedures. Journal Forensic Accounting, 4(2), pp. 199
– 216.
Muslimat, A. and Hamid, K.T. (2012). The Role of Internal
Audit Unit in Fraud Prevention in Government Owned
Hospitals in Nigeria. IOSR Journal of Business and
Management, 2(5), pp. 39 – 44
Nwaiwu J N & Aaron F C (2018) Forensic Accounting
Relevance and Fraud Detection Process and Financial
Performance in Nigeria. International Journal of
Advanced Academic Research | Accounting &
Economic Development Vol. 4, Issue 2 PP 16-35
Okafor M C & Andrew A A (2016) Effects of Forensic
Accounting Skills on the Management of Bank Fraud in
Nigeria. European Journal of Accounting, Auditing and
Finance Research Vol.4, No.6, pp.70-80
Ojo, M. (2012) Forensic Accounting and the Law: The
Forensic Accountant in the Capacity of an Expert
Witness. Retrieved from
http://ssm:com/abstract=2026071
Ozili P K (2018) Advances and Issues in Fraud Research:
A Commentary. Munich Personal RePEc Archive
Rezaee Z, Daniel L, Michael H & Alexis S (2016) Forensic
Accounting Education and Practice: Insights from
China: Journal of Forensic and Investigation
Accounting, Vol. 8 (No.1) PP 106-119
Simeunovic N, Grubor G & Ristic N (2016) Forensic
Accounting in the Fraud Auditing Case, The European
Journal of Applied Economics Vol.23 (No.2) Pp 45-56
Sujatha B. & Gomez S.S (2015) Fraud Detection and
Forensic Accounting, International Journal of Science
and Research Vol.4 (No. 4) Pp 3366-3369
Temitope O.A (2016) Relationship between Forensic
Accountants’ Competences and Audit Expectation
GAP: Evidence from Nigerian Deposit Money Banks
(Doctor of Philosophy), Jomo Kenyatta University
Kenya
Temitope O.A, Muturi W & Nasleku T (2016) Forensic
Accountant’s Responsibility Competency A Panacea
to Narrowing Audit Expectation GAO Among Nigerian
Money Deposit Banks, European Journal of Business
Economics and Accountancy Vol.4 (No.2) Pp 20-36
Wolfe, D. T., & Hermanson, D. R. (2004). Considering the
Four Elements of Fraud. The CPA Journal, 38-52