Running head: AN EMPIRICAL STUDY ON ACCOUNTING AND AUDITING ENFORCEMENT RELEASES CASES
An Empirical Study on Accounting and Auditing Enforcement Releases Cases
Xin Tan
Southeast Missouri State University
Author Note
This paper was submitted in partial fulfillment of the requirements of the degree of Masters in Business Administration
AN EMPIRICAL STUDY ON ACCOUNTING AND AUDITING ENFORCEMENT RELEASES CASES
31
Abstract
The objective of the paper is to provide an empirical study about the characteristics of accounting fraud and fraudulent financial reporting occurrences, including violation length, industry, audit tenure and violation types. To do so, I collected Accounting and Auditing Enforcement Releases (AAERs) issued by the Securities and Exchange Commission (SEC) for accounting fraud committed by companies during 2009-2011, which provides a fraud sample consisting of 66 companies. I analyzed each incident and explore key company characteristics in instances of fraudulent reporting in AAERs.
APPLIED RESEARCH ACCEPTANCE SHEET
An Empirical Study on Accounting and Auditing Enforcement Releases Cases
Submitted by Xin Tan in partial fulfillment of the requirements for the degree of Masters in Business Administration.
Accepted on behalf of the Faculty of the School of Graduate Studies and Research by the Applied Research Project Committee.
(Date)
Advisor/Chair (Name,Ph.D.)
______________________________ (Date)
MBA Coordinator (Name, Ph.D.)
CONTENTS
ABSTRACT.............................................................. .............................. ……………. i
ACCEPTANCE PAGE.............................................. ………………… ii
CONTENTS....................................... …………....................................... …………iii
INTRODUCTION…………………………………………………….…...1
LITERATURE REVIEW……………………………………………….....3
METHOD…………………………………………………….……………… 4
RESEARCH DESIGN AND RESULT………………………………...… 5
CONCLUSION………………………………………………………….....15
LIMITATION…………………………………………………..... .... …...... 16
REFERENCES…………………………………………………………. …18
APPENDIX …………………………………………………………. ……. 20
I. Introduction
While the United States experienced an unprecedented storm of accounting fraud, like Enron and WorldCom, around the beginning of twenty-first century, it is still unclear to what extent the typical fraud profile has changed in recent years. In the last decade, the accounting industry has made a variety of legislative and regulatory changes because of accounting fraud, such as the Sarbanes-Oxley Act of 2002. This act was enacted as a reaction to major accounting scandals and it enhanced standards for all U.S. public companies boards, management and public accounting firms. Fraudulent financial reporting can have significant consequences for companies, stockholde ...
This document analyzes different fraud theories - the fraud triangle, fraud diamond, and fraud pentagon - and their ability to detect corporate fraud in Indonesia. It reviews the literature on each theory and their components (pressure, opportunity, rationalization, capability, arrogance). The study uses secondary data from 310 publicly listed Indonesian companies from 2012-2017 to empirically test if the theories significantly affect corporate fraud. The results of statistical tests show the data supports all the hypotheses, indicating all three fraud theories can be used to investigate corporate fraud based only on publicly available secondary data.
This literature review is organized in five sections. Firstly, we begin with general ideas and continue with the origin of the fraudulent. Secondly, we discuss the struggle of the phenomena, insisting on the available mechanisms. Finally, we’ll discuss the link between audit and fraud.
Brennan, Niamh M. and McGrath, Mary [2007] Financial Statement Fraud: Inciden...Prof Niamh M. Brennan
This document summarizes a research paper that studied 14 cases of financial statement fraud from the US and Europe. It found that senior management was usually responsible, and the most common method of fraud was recording false sales to meet external earnings forecasts. Fraud was typically discovered by management, either existing or new management taking over.
Ajekwe & ibiamke 2017 the association between audit quality and earnings ...Nicholas Adzor
This study examines the association between audit quality and earnings management among listed firms in Nigeria. The study measures audit quality based on auditor size (Big 4 vs non-Big 4) and earnings management using absolute discretionary accruals. Prior literature suggests that larger audit firms constrain earnings management more due to greater reputational concerns and audit quality. However, some studies find no significant difference. The study tests the null hypothesis that there is no significant association between reported discretionary accruals and audit quality among Nigerian firms. Financial statement data is obtained for 79 listed real sector firms and an independent sample t-test and Wilcoxon test will be used to analyze the relationship.
This paper investigates the relationship between internal control weaknesses and the likelihood of receiving Accounting and Auditing Enforcement Releases (AAERs), which are issued by the SEC against companies for misconduct related to U.S. GAAP. The author analyzes AAERs issued in 2009 and matches companies that received AAERs to similar control companies that did not. The results show a significant positive relationship between internal control weaknesses and the issuance of AAERs in 2009, indicating that companies with weaker internal controls are more likely to engage in earnings management. However, the overall model is reported to be insignificant, limiting the strength of the findings. The study aims to provide insights for companies, stakeholders, auditors and regulators on
An examination of actual fraud cases with a focus on the auditor’s responsibi...Jesper Seehausen
This working paper examines actual fraud cases involving auditors in Denmark from 1909-2006 to understand the evolution of auditors' responsibilities related to fraud. The paper analyzes how court rulings and professional organizations in Denmark have established auditors' duties to detect potential fraud situations and respond appropriately. The analysis finds that auditors have never been criticized solely for failing to detect fraud, but rather for deficiencies in their audit work or failures to communicate issues. Over time, courts now consider fraud a normal business risk for which auditors must be proactively responsible in planning and conducting audits.
This document analyzes different fraud theories - the fraud triangle, fraud diamond, and fraud pentagon - and their ability to detect corporate fraud in Indonesia. It reviews the literature on each theory and their components (pressure, opportunity, rationalization, capability, arrogance). The study uses secondary data from 310 publicly listed Indonesian companies from 2012-2017 to empirically test if the theories significantly affect corporate fraud. The results of statistical tests show the data supports all the hypotheses, indicating all three fraud theories can be used to investigate corporate fraud based only on publicly available secondary data.
This literature review is organized in five sections. Firstly, we begin with general ideas and continue with the origin of the fraudulent. Secondly, we discuss the struggle of the phenomena, insisting on the available mechanisms. Finally, we’ll discuss the link between audit and fraud.
Brennan, Niamh M. and McGrath, Mary [2007] Financial Statement Fraud: Inciden...Prof Niamh M. Brennan
This document summarizes a research paper that studied 14 cases of financial statement fraud from the US and Europe. It found that senior management was usually responsible, and the most common method of fraud was recording false sales to meet external earnings forecasts. Fraud was typically discovered by management, either existing or new management taking over.
Ajekwe & ibiamke 2017 the association between audit quality and earnings ...Nicholas Adzor
This study examines the association between audit quality and earnings management among listed firms in Nigeria. The study measures audit quality based on auditor size (Big 4 vs non-Big 4) and earnings management using absolute discretionary accruals. Prior literature suggests that larger audit firms constrain earnings management more due to greater reputational concerns and audit quality. However, some studies find no significant difference. The study tests the null hypothesis that there is no significant association between reported discretionary accruals and audit quality among Nigerian firms. Financial statement data is obtained for 79 listed real sector firms and an independent sample t-test and Wilcoxon test will be used to analyze the relationship.
This paper investigates the relationship between internal control weaknesses and the likelihood of receiving Accounting and Auditing Enforcement Releases (AAERs), which are issued by the SEC against companies for misconduct related to U.S. GAAP. The author analyzes AAERs issued in 2009 and matches companies that received AAERs to similar control companies that did not. The results show a significant positive relationship between internal control weaknesses and the issuance of AAERs in 2009, indicating that companies with weaker internal controls are more likely to engage in earnings management. However, the overall model is reported to be insignificant, limiting the strength of the findings. The study aims to provide insights for companies, stakeholders, auditors and regulators on
An examination of actual fraud cases with a focus on the auditor’s responsibi...Jesper Seehausen
This working paper examines actual fraud cases involving auditors in Denmark from 1909-2006 to understand the evolution of auditors' responsibilities related to fraud. The paper analyzes how court rulings and professional organizations in Denmark have established auditors' duties to detect potential fraud situations and respond appropriately. The analysis finds that auditors have never been criticized solely for failing to detect fraud, but rather for deficiencies in their audit work or failures to communicate issues. Over time, courts now consider fraud a normal business risk for which auditors must be proactively responsible in planning and conducting audits.
Detection of creative accounting related frauds in the zimbabwean cotton indu...Alexander Decker
This document summarizes a research study that examined the role of internal auditing in detecting creative accounting fraud in the Zimbabwean cotton industry. The study found that the number of reported fraud cases, including those related to creative accounting, increased during periods of hyperinflation. It also found that locations that received internal audit visits were more likely to report frauds than locations that did not receive visits. Statistical tests confirmed a relationship between internal auditing and increased fraud detection. The researchers concluded that internal auditing plays an important role in detecting creative accounting frauds within organizations.
Application of forensic accounting a tool for confidence in auditors’ reportsAlexander Decker
The document discusses the application of forensic accounting as a tool to build confidence in auditors' reports. It examines how forensic accounting can help detect issues like fraud, theft, bribery, and intentional misstatements. The study administered questionnaires to auditing firms, legal experts, and computer specialists. The results found that forensic accounting can significantly aid in litigation, quantifying losses from theft, detecting bribery and misstatements, and finding intentional misrepresentations to auditors. The document recommends mandatory forensic accounting training for accountants to produce more reliable audit reports.
This document summarizes a research study that examined the effect of fraud pentagon theory on financial statement fraud. The study used fraud score modeling to observe banking companies in Indonesia from 2016-2018. The results found that external pressure and financial stability had a significant effect on financial statement fraud, while audit opinion, audit committee changes, and external audit quality did not. The study aimed to empirically test relationships between several variables derived from fraud pentagon theory, agency theory, and information asymmetry theory on instances of financial statement fraud. Statistical analysis of the companies' financial data supported some but not all of the hypotheses.
This document summarizes a study that examines the relationship between corruption and firm investment in Vietnam using survey data from Vietnamese small and medium enterprises. The study tests two hypotheses: that corruption hinders firm investment by increasing costs and promoting rent-seeking behaviors, or that corruption boosts investment by helping firms overcome bureaucratic obstacles. The study employs both a simple logistic regression model and a bivariate probit model with a corruption instrument variable to address potential endogeneity between corruption and investment. The results provide evidence that corruption hinders firm investment in Vietnam, which may partially explain the negative effect of corruption on firm performance found in previous research.
This review present some evidence on fraud, forensic accounting, the skills and education of the forensic investigator. Also, some explanation for the diverging views among academics and regulators in relation to detecting fraud are provided. To regulators, I address the question on why academic research in forensic accounting have little significance to inform policy. Further, I present some rich set of questions and identify a number of important directions for future research in forensic accounting. This paper is intended to stimulate debates and future research on the issues identified.
This document is a project report on forensic accounting in India written by Sridevi H.V. It discusses the evolution and increasing importance of forensic accounting due to rising financial frauds. It outlines the objectives and methodology of the study. Forensic accounting involves detecting fraud and investigating accounting irregularities by looking beyond raw numbers and applying skills from accounting, auditing and law. It is useful for fraud examinations, dispute resolution, and other legal proceedings. However, forensic accountants in India face difficulties due to a lack of organized databases and sometimes unreasonable client expectations. The report examines the nature, role and techniques of forensic accounting as well as common types of financial frauds.
The audit found that the company had not performed an ABC analysis of suppliers to classify them based on spending amounts. This results in purchasing activities not focusing on key suppliers. It was also found that local purchases were only from one supplier and overseas purchases lacked competitive bidding. The audit recommends the company conduct an ABC analysis to identify key suppliers and invite competitive bids for large-value purchases.
Corporate Governance and Earnings Quality of Listed Banks in Rivers Stateinventionjournals
This study investigated the relationship between corporate governance and earnings quality of listed banks in Rivers State. It examined the relationship between Board size and accrual quality; Audit committee independence and value relevance; and directors’ independence and accrual quality of listed banks in Rivers State. It adopted the quantitative approach in investigating the assumed relationships. Using regression analysis and Pearson product moment correlation coefficient, the result indicated a positive relationship between corporate governance and earnings quality. It revealed positive association between board size, independent directors and accrual quality. No relationship was established between independent audit committee and accrual quality. It is recommended that the existing board size should be maintained to sustain bank performance. In addition, quality and independent directors should be hired for earnings and accrual management. Finally, further study is recommended for other sectors using different research to correct the limitation of the research method and tools
This document provides an overview of forensic accounting. It begins by defining forensic accounting as involving investigative services and litigation support related to fraud investigations and legal actions. It describes the roles of investigative forensic accountants and forensic accountants providing litigation support. It provides examples of situations forensic accountants investigate, such as employee theft, vendor fraud, and tax evasion. It also discusses the Association of Certified Fraud Examiners and internal auditing.
This document provides an overview of forensic accounting. It begins by defining forensic accounting as involving investigative services and litigation support related to fraud investigations and legal actions. It describes the roles of investigative forensic accountants and forensic accountants providing litigation support. It provides examples of situations forensic accountants investigate, such as employee theft, vendor fraud, and tax evasion. It also discusses the Association of Certified Fraud Examiners and internal auditing.
Assignment 1 Foreign Source Income Rules (Client Letter)Due Wee.docxtrippettjettie
Assignment 1: Foreign Source Income Rules (Client Letter)
Due Week 2 and worth 160 points
You are a CPA working as a tax professional engaged to provide tax advice to a client with operations in the United States and internationally. The client has specifically requested information on strategies that she can use to minimize the tax effects of foreign sourced income.
Use your text, the Internet, and / or Strayer Learning Resource Center to research the various rules regarding source rules for income and deductions.
Write a one to two (1-2) page paper in which you:
1. Create a letter to communicate to your client about the source rules for income and deductions and the conditions under which income received in foreign countries may or may not be taxed in the U.S.
2. Present a proposal to the client as to how to reduce the U.S. tax impact from income received from outside the U.S. Provide details to support your proposal.
3. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
4. Format your assignment according to the following formatting requirements:
·
a. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
b. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page is not included in the required page length.
c. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.
The specific course learning outcomes associated with this assignment are:
· Analyze the source rules reach of the U.S. Tax Code in regard to international taxation.
· Use technology and information resources to research issues in international tax planning and research.
· Write clearly and concisely about international tax planning and research using proper writing mechanics.
Click here to view the assignment rubric.
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/271133751
CORPORATE ACCOUNTING SCANDAL AT
SATYAM: A CASE STUDY OF INDIA'S ENRON
ARTICLE · APRIL 2013
CITATIONS
3
READS
14,224
1 AUTHOR:
Madan Bhasin
Universiti Utara Malaysia
61 PUBLICATIONS 122 CITATIONS
SEE PROFILE
All in-text references underlined in blue are linked to publications on ResearchGate,
letting you access and read them immediately.
Available from: Madan Bhasin
Retrieved on: 02 April 2016
https://www.researchgate.net/publication/271133751_CORPORATE_ACCOUNTING_SCANDAL_AT_SATYAM_A_CASE_STUDY_OF_INDIA%27S_ENRON?enrichId=rgreq-7575bbc3-6176-48c6-8023-d62e4623d53f&enrichSource=Y292ZXJQYWdlOzI3MTEzMzc1MTtBUzoxODc2OTYwNTYxMTkyOTdAMTQyMTc2MTYzNTgwNA%3D%3D&el=1_x_2
https://www.researchgate.net/publication/271133751_CORPORATE_ACCOUNTING_SCANDAL_AT_SATYAM_A_CASE_STUDY_OF_INDIA%27S_ENRON?enrichId=rgreq-7575bbc3-6176-48c6-8023-d62e4623d ...
FRBNY Economic Policy Review April 2003 65Transparency, JeanmarieColbert3
FRBNY Economic Policy Review / April 2003 65
Transparency, Financial
Accounting Information,
and Corporate Governance
1. Introduction
ibrant public securities markets rely on complex systems
of supporting institutions that promote the governance
of publicly traded companies. Corporate governance structures
serve: 1) to ensure that minority shareholders receive reliable
information about the value of firms and that a company’s
managers and large shareholders do not cheat them out of the
value of their investments, and 2) to motivate managers to
maximize firm value instead of pursuing personal objectives.1
Institutions promoting the governance of firms include
reputational intermediaries such as investment banks and
audit firms, securities laws and regulators such as the Securities
and Exchange Commission (SEC) in the United States, and
disclosure regimes that produce credible firm-specific
information about publicly traded firms. In this paper, we
discuss economics-based research focused primarily on the
governance role of publicly reported financial accounting
information.
Financial accounting information is the product of
corporate accounting and external reporting systems that
measure and routinely disclose audited, quantitative data
concerning the financial position and performance of publicly
held firms. Audited balance sheets, income statements, and
cash-flow statements, along with supporting disclosures, form
the foundation of the firm-specific information set available to
investors and regulators. Developing and maintaining a
sophisticated financial disclosure regime is not cheap.
Countries with highly developed securities markets devote
substantial resources to producing and regulating the use of
extensive accounting and disclosure rules that publicly traded
firms must follow. Resources expended are not only financial,
but also include opportunity costs associated with deployment
of highly educated human capital, including accountants,
lawyers, academicians, and politicians.
In the United States, the SEC, under the oversight of the U.S.
Congress, is responsible for maintaining and regulating the
required accounting and disclosure rules that firms must
follow. These rules are produced both by the SEC itself and
through SEC oversight of private standards-setting bodies such
as the Financial Accounting Standards Board and the Emerging
Issues Task Force, which in turn solicit input from business
leaders, academic researchers, and regulators around the
world. In addition to the accounting standards-setting
investments undertaken by many individual countries and
securities exchanges, there is currently a major, well-funded
effort in progress, under the auspices of the International
Accounting Standards Board (IASB), to produce a single set of
accounting standards that will ultimately be acceptable to all
countries as the basis for cross-border financing transactions.2
The premise beh ...
This document explores the relationship between accounting conservatism and auditing quality in Egyptian industrial corporations. It examines how accounting conservatism, as measured by the book-to-market ratio, relates to characteristics of auditing quality like international auditors, industry specialization, auditor qualifications, and client retention period. The study tests three hypotheses: 1) there is an acceptable level of accounting conservatism in Egyptian industrial corporations, 2) there is an acceptable level of auditing quality in Egyptian auditing firms, and 3) auditing quality characteristics have a statistically significant impact on accounting conservatism. Regression analysis is used to test the third hypothesis using a sample of 54 industrial corporations over 2006-2010.
White paper on fraud detection with acl (send afterwards)~9sumitrarrc
This document discusses fraud detection and prevention through transactional analysis. It outlines the challenges of fraud management, including large data volumes, complex systems, and evolving fraud schemes. Traditional fraud detection methods like internal controls and audits are reactive and often detect fraud long after the fact. The document advocates for continuous transaction monitoring using data analytics software. This allows comparing data across systems, testing transactions against fraud indicators, and detecting fraud earlier to prevent greater losses. While powerful, challenges include the effort to extract and compare data from multiple systems and developing flexible analytics.
Assessment of Tone at the TopA C C O U N T I N G & A U D .docxdavezstarr61655
Assessment of Tone at the Top
A C C O U N T I N G & A U D I T I N G
a u d i t i n g
JUNE 2015 / THE CPA JOURNAL50
By Susan S. Lightle, Bud Baker, and Joseph F. Castellano
The Psychology of Control Risk Assessment
Standards require that auditors assess an entity’s internal controls over financial reporting (ICFR), includ-
ing the control environment, which is influenced by the tone set by management and the board regarding
the importance of ICFR and the expected standards of employee conduct. This article argues that auditors
cannot assess the tone at the top by simply checking off a list of control mechanisms; they must understand
what motivates behavior within the organization (what might be called the psychology of control risk assess-
ment). It also illustrates a model to help auditors anticipate when an organization is prone to earnings
manipulation, and suggests how to assess the tone at the top of an organization.
In Brief
JUNE 2015 / THE CPA JOURNAL 51
I
n the late 1960s and early 1970s, the
U.S.-based energy conglomerate ITT
put together a remarkable string of
earnings increases under the leadership
of Harold Geneen: ITT increased its net
earnings each and every quarter, for 58
consecutive quarters, or more than 14 years
of Geneen’s 18-year tenure. Geneen was
lionized for this achievement; he became
the highest paid executive in the United
States, authored best-selling books, and was
memorialized across the country in the
form of new centers, buildings, and foun-
dations (Harvey D. Shapiro, “Management
Was the Message,” New York Times,
March 10, 1985, http://www.nytimes.
com/1985/03/10/books/management-was-
the-message.html). Only in retrospect, after
Geneen’s departure and the subsequent dis-
mantling of most of ITT, did it become
clear that those 58 straight quarters of
growth were not what they seemed to be.
The Price of Success
Earnings management—a benign
euphemism for financial manipulation—
is not a wholly irrational activity, albeit
an unethical one. In addition to the praise
heaped upon high flyers like ITT under
Geneen, researchers have demonstrated that
companies reporting 20 consecutive quar-
ters of earnings increases enjoy greater
profitability, higher stock valuations, and
higher price-earnings ratios than counter-
parts with similar underlying financial
strength (James N. Myers, Linda A. Myers,
Douglas J. Skinner, “Earnings Momentum
and Earnings Management,” August 2006,
http://ssrn.com/abstract=741244 or
http://dx.doi.org/10.2139/ssrn.741244).
But Myers, et al., also showed that this
“success” comes with a price: All those
previously positive measures decline
markedly when the unbroken sequence of
quarterly successes finally ends; the longer
the quarterly streak of good news runs, the
deeper the firm’s plunge when the time
of reckoning arrives. Efforts to manipu-
late earnings are practiced by widely dis-
parate companies and CEOs, whether lit-
tle known or famous; publicly regarded
as miscreants or su.
Assessment of Tone at the TopA C C O U N T I N G & A U D .docxfredharris32
Assessment of Tone at the Top
A C C O U N T I N G & A U D I T I N G
a u d i t i n g
JUNE 2015 / THE CPA JOURNAL50
By Susan S. Lightle, Bud Baker, and Joseph F. Castellano
The Psychology of Control Risk Assessment
Standards require that auditors assess an entity’s internal controls over financial reporting (ICFR), includ-
ing the control environment, which is influenced by the tone set by management and the board regarding
the importance of ICFR and the expected standards of employee conduct. This article argues that auditors
cannot assess the tone at the top by simply checking off a list of control mechanisms; they must understand
what motivates behavior within the organization (what might be called the psychology of control risk assess-
ment). It also illustrates a model to help auditors anticipate when an organization is prone to earnings
manipulation, and suggests how to assess the tone at the top of an organization.
In Brief
JUNE 2015 / THE CPA JOURNAL 51
I
n the late 1960s and early 1970s, the
U.S.-based energy conglomerate ITT
put together a remarkable string of
earnings increases under the leadership
of Harold Geneen: ITT increased its net
earnings each and every quarter, for 58
consecutive quarters, or more than 14 years
of Geneen’s 18-year tenure. Geneen was
lionized for this achievement; he became
the highest paid executive in the United
States, authored best-selling books, and was
memorialized across the country in the
form of new centers, buildings, and foun-
dations (Harvey D. Shapiro, “Management
Was the Message,” New York Times,
March 10, 1985, http://www.nytimes.
com/1985/03/10/books/management-was-
the-message.html). Only in retrospect, after
Geneen’s departure and the subsequent dis-
mantling of most of ITT, did it become
clear that those 58 straight quarters of
growth were not what they seemed to be.
The Price of Success
Earnings management—a benign
euphemism for financial manipulation—
is not a wholly irrational activity, albeit
an unethical one. In addition to the praise
heaped upon high flyers like ITT under
Geneen, researchers have demonstrated that
companies reporting 20 consecutive quar-
ters of earnings increases enjoy greater
profitability, higher stock valuations, and
higher price-earnings ratios than counter-
parts with similar underlying financial
strength (James N. Myers, Linda A. Myers,
Douglas J. Skinner, “Earnings Momentum
and Earnings Management,” August 2006,
http://ssrn.com/abstract=741244 or
http://dx.doi.org/10.2139/ssrn.741244).
But Myers, et al., also showed that this
“success” comes with a price: All those
previously positive measures decline
markedly when the unbroken sequence of
quarterly successes finally ends; the longer
the quarterly streak of good news runs, the
deeper the firm’s plunge when the time
of reckoning arrives. Efforts to manipu-
late earnings are practiced by widely dis-
parate companies and CEOs, whether lit-
tle known or famous; publicly regarded
as miscreants or su ...
This study examines the role of fraud risk factors in the fraud pentagon theory in detecting fraudulent financial statements. The study analyzed 28 Indonesian banking companies from 2017-2019 using secondary data and the SEM-PLS method. The results found that external pressure, influence monitoring, auditor switching, director changes, and CEO picture frequency simultaneously influence fraudulent financial statement detection. However, individually, external pressure, auditor switching, influence monitoring, and director changes significantly influence detection, while CEO picture frequency does not. The study aims to help companies improve accountability and transparency and help investors conduct more diligent due diligence when evaluating potential investments.
1 2Cheat Sheet on Evidence and DocumentationACC491J.docxhoney725342
1
2
Cheat Sheet on Evidence and DocumentationACC/491
July 3, 2017Cheat Sheet on Evidence and Documentation
Relevance, Reliability and Sufficiency of Evidence
The basic property of an audit report is that it should entail relevance. The report t should be written in a standard format which is usually mandated by generally accepting the set auditing standards. Accounting is an important task since it ensures financial details of a business are kept considerably clean. Going through the terminologies in order to know everything that is involved in auditing is important when auditing the financial records. The first step involves dividing the field into the foremost part known as the financial statement. Soares (1997). All businesses hold their financial statements in high regards since it is a legal requirement to provide and they provide them when they are requested by relevant bodies. These statements represent the picture of the business in reference to its financial robustness. The audited report reports are used to verify that the details given in their statements. For instance, the public corporations are supposed to ensure that their statements are professionally audited in order to secure their investors’ wealth.
It is important to note that the concept of reliability is of real interest to a wide variety of audit participants. This is due to many quotations and references that are required for well-founded financial information and the role of audit. It has been said that having a genuine financial and economic data should be the principle assumptions of a society. Being reliable increases confidence in and reliance on financial statements. Some of the aspects of reliability include faithful representation, fitness for purpose, robustness as well as the audit firm reliability.
The quantity of audit evidence is in simple words what sufficiency of audit evidence means. The risk of material and the inclusive quality of the evidence presented is what needs to be considered to fulfill the sufficiency needed. One should rely on an eloquent order other than the convincing one. Yang (2007). Impressive evidence shows the scale one way or the other and provides one with a basis beyond a sensible doubt for forming a viewpoint (Loughran, Maire, 2011). Convincing evidence is one which is perfectly reliable. It involves looking for all clients' records in order to achieve this level of assertion. Careful documentation of the work and the audit opinion must be fact-based and should be retractable so that a different review of the audit should depict the same conclusion (Loughran, Maire, 2011).
Confidentiality: Financial statements should be handled with confidentiality. Confidential information should not be disclosed to anyone. The accountant must protect the information from unauthorized disclosure or public release. The auditor should be accountable for any access by unauthorized people. In most times, clients see the auditors as trusted ...
Eastern European countries appear to have become dependent on Ru.docxjoellemurphey
Eastern European countries appear to have become dependent on Russian oil originally due to the country being a reliable supplier to the European countries (Bradshaw, 2014, p. 76). Though the countries were allies with the United States, they were trying to become less dependent on the Middle East and saw that Russia was a reliable source. Much of this reliance was due to the “iron curtain” as well as the fact that many of the Eastern European countries were part of the Soviet Union in some way or affiliated with them.
It appears that much of the reason as to why these countries reached energy accords with Russia is due to the convenience. There was “limited access to storage and alternative sources of gas supply” (Bradshaw, 2014, p. 77). This pushed these countries to depend more on Russia, which appeared to be an easier access to gas supplies. Another reason might have been due to fear as the Kremlin punished Ukraine for voting for an anti-Moscow government (Bradshaw, 2015, p. 77). This action shows that many of these countries may have reached these accords due to the pressure and encouragement of the Soviet Government. In the 1980’s the dependence of European countries on Russian gas resources was 50-60%. In the 1970’s, many of the Eastern European countries also became reliant on Russia due to a greater demand of oil and gas. The surrounding countries that were providing resources were not able to keep up with the demand and thus these countries sought to get their sources from Russia. It also helped that Russia’s prices appeared to be lower than that of the world market (Bradshaw, 2014, p. 87-88). Due to the price of oil and gas and the availability, Eastern European countries were able to grow and build in gas import and its infrastructure, thus in turn causing it to be dependent on Russia.
Bradshaw, M. (2014).
Global Energy Dilemmas: Energy Security, Globalization, and Climate Change
. Cambridge, UK: Polity Press.
Based on your considered review of this module’s readings as well as your reflection upon the first three modules, evaluate the questions below.
In retrospect it seems obvious, but exactly how and why did Eastern European countries come to depend on Russian oil and natural gas after World War II?
Why did the Western Europeans reach energy accords with the Russians in the 1970s and early 1980s, building large-scale natural gas import infrastructures and increasing their dependence on Russian gas?
.
EAS 209 Second Response Paper Topic Assignment Due .docxjoellemurphey
EAS 209
Second Response Paper Topic
>>>Assignment Due Date: Friday, October 12, 2018<<<
Write 350 words, excluding works cited and references, on the following topic:
Dipesh Chakrabarty cites John Stuart Mill to show one dimension of historicist
consciousness: “a recommendation to the colonized to wait.” What does Chakrabarty
mean by this phrase? Consider, e.g. why, according to Mill, “Indians, Africans, and other
‘rude’ nations” had to be consigned to what Chakrabarty called “an imaginary waiting
room of history.”
To respond to this question, you might find it helpful to consider Chakrabarty’s discussion
on historicism or “stagist theory of history.”
▪ Submit a hard copy in your Tutorial Section on Friday, October 12.
▪ Papers must be type-written, double-spaced, appearing in 12 points Times New Roman font or
its equivalent with 1” margins. Do not exceed 400 words. You are responsible for keeping an
extra copy of your own paper.
▪ The assignment does not ask you to conduct additional research. Papers that do not respond
to the given topic or do not follow the specific instructions described above will receive no
marks. No resubmission allowed.
▪ You need to present your argument logically and clearly, fully demonstrate the precise
understanding of Chakrabarty’s argument and substantiate your argument convincingly and
with details.
▪ Observe the Chicago Manual of Style referencing practice and properly cite the passages you
quote (i.e. author, title, page number, etc.). Works cited or references should not be counted
toward the 350 word limit.
▪ Any ideas or expressions that are not your own must be placed in quotation marks and
referenced with page number. Academic misconduct will not be tolerated. See:
http://www.artsci.utoronto.ca/osai/The-rules/what-is-academic-misconduct
▪ You may share notes and discuss your ideas with others for preparation. But the paper you
submit must be exclusively written by you alone and in your own words clearly distinguishable
from others’. Papers that plagiarize, replicate others, or contain identical or near-identical
passages that appear in other papers will not be accepted or credited.
▪ You must proof-read before submission. Sentences that are incomplete or unintelligible will
not be read or credited.
▪ Late submission and papers submitted via e-mail will not be accepted or credited unless
under extraordinary circumstances. ABSOLUTELY NO EXCPETION!
http://www.artsci.utoronto.ca/osai/The-rules/what-is-academic-misconduct
I N T R O D U C T I O N
The Idea of Provincializing Europe
Europe . . . since 1914 has become provincialized, . . .
only the natural sciences are able to call forth a
quick international echo.
(Hans-Georg Gadamer, 1977)
The West is a name for a subject which gathers itself in
discourse but is also an object constituted discursively;
it is, evidently, a name always associating itself with
those regions, communities, and peoples.
More Related Content
Similar to Running head AN EMPIRICAL STUDY ON ACCOUNTING AND AUDITING ENFO.docx
Detection of creative accounting related frauds in the zimbabwean cotton indu...Alexander Decker
This document summarizes a research study that examined the role of internal auditing in detecting creative accounting fraud in the Zimbabwean cotton industry. The study found that the number of reported fraud cases, including those related to creative accounting, increased during periods of hyperinflation. It also found that locations that received internal audit visits were more likely to report frauds than locations that did not receive visits. Statistical tests confirmed a relationship between internal auditing and increased fraud detection. The researchers concluded that internal auditing plays an important role in detecting creative accounting frauds within organizations.
Application of forensic accounting a tool for confidence in auditors’ reportsAlexander Decker
The document discusses the application of forensic accounting as a tool to build confidence in auditors' reports. It examines how forensic accounting can help detect issues like fraud, theft, bribery, and intentional misstatements. The study administered questionnaires to auditing firms, legal experts, and computer specialists. The results found that forensic accounting can significantly aid in litigation, quantifying losses from theft, detecting bribery and misstatements, and finding intentional misrepresentations to auditors. The document recommends mandatory forensic accounting training for accountants to produce more reliable audit reports.
This document summarizes a research study that examined the effect of fraud pentagon theory on financial statement fraud. The study used fraud score modeling to observe banking companies in Indonesia from 2016-2018. The results found that external pressure and financial stability had a significant effect on financial statement fraud, while audit opinion, audit committee changes, and external audit quality did not. The study aimed to empirically test relationships between several variables derived from fraud pentagon theory, agency theory, and information asymmetry theory on instances of financial statement fraud. Statistical analysis of the companies' financial data supported some but not all of the hypotheses.
This document summarizes a study that examines the relationship between corruption and firm investment in Vietnam using survey data from Vietnamese small and medium enterprises. The study tests two hypotheses: that corruption hinders firm investment by increasing costs and promoting rent-seeking behaviors, or that corruption boosts investment by helping firms overcome bureaucratic obstacles. The study employs both a simple logistic regression model and a bivariate probit model with a corruption instrument variable to address potential endogeneity between corruption and investment. The results provide evidence that corruption hinders firm investment in Vietnam, which may partially explain the negative effect of corruption on firm performance found in previous research.
This review present some evidence on fraud, forensic accounting, the skills and education of the forensic investigator. Also, some explanation for the diverging views among academics and regulators in relation to detecting fraud are provided. To regulators, I address the question on why academic research in forensic accounting have little significance to inform policy. Further, I present some rich set of questions and identify a number of important directions for future research in forensic accounting. This paper is intended to stimulate debates and future research on the issues identified.
This document is a project report on forensic accounting in India written by Sridevi H.V. It discusses the evolution and increasing importance of forensic accounting due to rising financial frauds. It outlines the objectives and methodology of the study. Forensic accounting involves detecting fraud and investigating accounting irregularities by looking beyond raw numbers and applying skills from accounting, auditing and law. It is useful for fraud examinations, dispute resolution, and other legal proceedings. However, forensic accountants in India face difficulties due to a lack of organized databases and sometimes unreasonable client expectations. The report examines the nature, role and techniques of forensic accounting as well as common types of financial frauds.
The audit found that the company had not performed an ABC analysis of suppliers to classify them based on spending amounts. This results in purchasing activities not focusing on key suppliers. It was also found that local purchases were only from one supplier and overseas purchases lacked competitive bidding. The audit recommends the company conduct an ABC analysis to identify key suppliers and invite competitive bids for large-value purchases.
Corporate Governance and Earnings Quality of Listed Banks in Rivers Stateinventionjournals
This study investigated the relationship between corporate governance and earnings quality of listed banks in Rivers State. It examined the relationship between Board size and accrual quality; Audit committee independence and value relevance; and directors’ independence and accrual quality of listed banks in Rivers State. It adopted the quantitative approach in investigating the assumed relationships. Using regression analysis and Pearson product moment correlation coefficient, the result indicated a positive relationship between corporate governance and earnings quality. It revealed positive association between board size, independent directors and accrual quality. No relationship was established between independent audit committee and accrual quality. It is recommended that the existing board size should be maintained to sustain bank performance. In addition, quality and independent directors should be hired for earnings and accrual management. Finally, further study is recommended for other sectors using different research to correct the limitation of the research method and tools
This document provides an overview of forensic accounting. It begins by defining forensic accounting as involving investigative services and litigation support related to fraud investigations and legal actions. It describes the roles of investigative forensic accountants and forensic accountants providing litigation support. It provides examples of situations forensic accountants investigate, such as employee theft, vendor fraud, and tax evasion. It also discusses the Association of Certified Fraud Examiners and internal auditing.
This document provides an overview of forensic accounting. It begins by defining forensic accounting as involving investigative services and litigation support related to fraud investigations and legal actions. It describes the roles of investigative forensic accountants and forensic accountants providing litigation support. It provides examples of situations forensic accountants investigate, such as employee theft, vendor fraud, and tax evasion. It also discusses the Association of Certified Fraud Examiners and internal auditing.
Assignment 1 Foreign Source Income Rules (Client Letter)Due Wee.docxtrippettjettie
Assignment 1: Foreign Source Income Rules (Client Letter)
Due Week 2 and worth 160 points
You are a CPA working as a tax professional engaged to provide tax advice to a client with operations in the United States and internationally. The client has specifically requested information on strategies that she can use to minimize the tax effects of foreign sourced income.
Use your text, the Internet, and / or Strayer Learning Resource Center to research the various rules regarding source rules for income and deductions.
Write a one to two (1-2) page paper in which you:
1. Create a letter to communicate to your client about the source rules for income and deductions and the conditions under which income received in foreign countries may or may not be taxed in the U.S.
2. Present a proposal to the client as to how to reduce the U.S. tax impact from income received from outside the U.S. Provide details to support your proposal.
3. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
4. Format your assignment according to the following formatting requirements:
·
a. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
b. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page is not included in the required page length.
c. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.
The specific course learning outcomes associated with this assignment are:
· Analyze the source rules reach of the U.S. Tax Code in regard to international taxation.
· Use technology and information resources to research issues in international tax planning and research.
· Write clearly and concisely about international tax planning and research using proper writing mechanics.
Click here to view the assignment rubric.
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/271133751
CORPORATE ACCOUNTING SCANDAL AT
SATYAM: A CASE STUDY OF INDIA'S ENRON
ARTICLE · APRIL 2013
CITATIONS
3
READS
14,224
1 AUTHOR:
Madan Bhasin
Universiti Utara Malaysia
61 PUBLICATIONS 122 CITATIONS
SEE PROFILE
All in-text references underlined in blue are linked to publications on ResearchGate,
letting you access and read them immediately.
Available from: Madan Bhasin
Retrieved on: 02 April 2016
https://www.researchgate.net/publication/271133751_CORPORATE_ACCOUNTING_SCANDAL_AT_SATYAM_A_CASE_STUDY_OF_INDIA%27S_ENRON?enrichId=rgreq-7575bbc3-6176-48c6-8023-d62e4623d53f&enrichSource=Y292ZXJQYWdlOzI3MTEzMzc1MTtBUzoxODc2OTYwNTYxMTkyOTdAMTQyMTc2MTYzNTgwNA%3D%3D&el=1_x_2
https://www.researchgate.net/publication/271133751_CORPORATE_ACCOUNTING_SCANDAL_AT_SATYAM_A_CASE_STUDY_OF_INDIA%27S_ENRON?enrichId=rgreq-7575bbc3-6176-48c6-8023-d62e4623d ...
FRBNY Economic Policy Review April 2003 65Transparency, JeanmarieColbert3
FRBNY Economic Policy Review / April 2003 65
Transparency, Financial
Accounting Information,
and Corporate Governance
1. Introduction
ibrant public securities markets rely on complex systems
of supporting institutions that promote the governance
of publicly traded companies. Corporate governance structures
serve: 1) to ensure that minority shareholders receive reliable
information about the value of firms and that a company’s
managers and large shareholders do not cheat them out of the
value of their investments, and 2) to motivate managers to
maximize firm value instead of pursuing personal objectives.1
Institutions promoting the governance of firms include
reputational intermediaries such as investment banks and
audit firms, securities laws and regulators such as the Securities
and Exchange Commission (SEC) in the United States, and
disclosure regimes that produce credible firm-specific
information about publicly traded firms. In this paper, we
discuss economics-based research focused primarily on the
governance role of publicly reported financial accounting
information.
Financial accounting information is the product of
corporate accounting and external reporting systems that
measure and routinely disclose audited, quantitative data
concerning the financial position and performance of publicly
held firms. Audited balance sheets, income statements, and
cash-flow statements, along with supporting disclosures, form
the foundation of the firm-specific information set available to
investors and regulators. Developing and maintaining a
sophisticated financial disclosure regime is not cheap.
Countries with highly developed securities markets devote
substantial resources to producing and regulating the use of
extensive accounting and disclosure rules that publicly traded
firms must follow. Resources expended are not only financial,
but also include opportunity costs associated with deployment
of highly educated human capital, including accountants,
lawyers, academicians, and politicians.
In the United States, the SEC, under the oversight of the U.S.
Congress, is responsible for maintaining and regulating the
required accounting and disclosure rules that firms must
follow. These rules are produced both by the SEC itself and
through SEC oversight of private standards-setting bodies such
as the Financial Accounting Standards Board and the Emerging
Issues Task Force, which in turn solicit input from business
leaders, academic researchers, and regulators around the
world. In addition to the accounting standards-setting
investments undertaken by many individual countries and
securities exchanges, there is currently a major, well-funded
effort in progress, under the auspices of the International
Accounting Standards Board (IASB), to produce a single set of
accounting standards that will ultimately be acceptable to all
countries as the basis for cross-border financing transactions.2
The premise beh ...
This document explores the relationship between accounting conservatism and auditing quality in Egyptian industrial corporations. It examines how accounting conservatism, as measured by the book-to-market ratio, relates to characteristics of auditing quality like international auditors, industry specialization, auditor qualifications, and client retention period. The study tests three hypotheses: 1) there is an acceptable level of accounting conservatism in Egyptian industrial corporations, 2) there is an acceptable level of auditing quality in Egyptian auditing firms, and 3) auditing quality characteristics have a statistically significant impact on accounting conservatism. Regression analysis is used to test the third hypothesis using a sample of 54 industrial corporations over 2006-2010.
White paper on fraud detection with acl (send afterwards)~9sumitrarrc
This document discusses fraud detection and prevention through transactional analysis. It outlines the challenges of fraud management, including large data volumes, complex systems, and evolving fraud schemes. Traditional fraud detection methods like internal controls and audits are reactive and often detect fraud long after the fact. The document advocates for continuous transaction monitoring using data analytics software. This allows comparing data across systems, testing transactions against fraud indicators, and detecting fraud earlier to prevent greater losses. While powerful, challenges include the effort to extract and compare data from multiple systems and developing flexible analytics.
Assessment of Tone at the TopA C C O U N T I N G & A U D .docxdavezstarr61655
Assessment of Tone at the Top
A C C O U N T I N G & A U D I T I N G
a u d i t i n g
JUNE 2015 / THE CPA JOURNAL50
By Susan S. Lightle, Bud Baker, and Joseph F. Castellano
The Psychology of Control Risk Assessment
Standards require that auditors assess an entity’s internal controls over financial reporting (ICFR), includ-
ing the control environment, which is influenced by the tone set by management and the board regarding
the importance of ICFR and the expected standards of employee conduct. This article argues that auditors
cannot assess the tone at the top by simply checking off a list of control mechanisms; they must understand
what motivates behavior within the organization (what might be called the psychology of control risk assess-
ment). It also illustrates a model to help auditors anticipate when an organization is prone to earnings
manipulation, and suggests how to assess the tone at the top of an organization.
In Brief
JUNE 2015 / THE CPA JOURNAL 51
I
n the late 1960s and early 1970s, the
U.S.-based energy conglomerate ITT
put together a remarkable string of
earnings increases under the leadership
of Harold Geneen: ITT increased its net
earnings each and every quarter, for 58
consecutive quarters, or more than 14 years
of Geneen’s 18-year tenure. Geneen was
lionized for this achievement; he became
the highest paid executive in the United
States, authored best-selling books, and was
memorialized across the country in the
form of new centers, buildings, and foun-
dations (Harvey D. Shapiro, “Management
Was the Message,” New York Times,
March 10, 1985, http://www.nytimes.
com/1985/03/10/books/management-was-
the-message.html). Only in retrospect, after
Geneen’s departure and the subsequent dis-
mantling of most of ITT, did it become
clear that those 58 straight quarters of
growth were not what they seemed to be.
The Price of Success
Earnings management—a benign
euphemism for financial manipulation—
is not a wholly irrational activity, albeit
an unethical one. In addition to the praise
heaped upon high flyers like ITT under
Geneen, researchers have demonstrated that
companies reporting 20 consecutive quar-
ters of earnings increases enjoy greater
profitability, higher stock valuations, and
higher price-earnings ratios than counter-
parts with similar underlying financial
strength (James N. Myers, Linda A. Myers,
Douglas J. Skinner, “Earnings Momentum
and Earnings Management,” August 2006,
http://ssrn.com/abstract=741244 or
http://dx.doi.org/10.2139/ssrn.741244).
But Myers, et al., also showed that this
“success” comes with a price: All those
previously positive measures decline
markedly when the unbroken sequence of
quarterly successes finally ends; the longer
the quarterly streak of good news runs, the
deeper the firm’s plunge when the time
of reckoning arrives. Efforts to manipu-
late earnings are practiced by widely dis-
parate companies and CEOs, whether lit-
tle known or famous; publicly regarded
as miscreants or su.
Assessment of Tone at the TopA C C O U N T I N G & A U D .docxfredharris32
Assessment of Tone at the Top
A C C O U N T I N G & A U D I T I N G
a u d i t i n g
JUNE 2015 / THE CPA JOURNAL50
By Susan S. Lightle, Bud Baker, and Joseph F. Castellano
The Psychology of Control Risk Assessment
Standards require that auditors assess an entity’s internal controls over financial reporting (ICFR), includ-
ing the control environment, which is influenced by the tone set by management and the board regarding
the importance of ICFR and the expected standards of employee conduct. This article argues that auditors
cannot assess the tone at the top by simply checking off a list of control mechanisms; they must understand
what motivates behavior within the organization (what might be called the psychology of control risk assess-
ment). It also illustrates a model to help auditors anticipate when an organization is prone to earnings
manipulation, and suggests how to assess the tone at the top of an organization.
In Brief
JUNE 2015 / THE CPA JOURNAL 51
I
n the late 1960s and early 1970s, the
U.S.-based energy conglomerate ITT
put together a remarkable string of
earnings increases under the leadership
of Harold Geneen: ITT increased its net
earnings each and every quarter, for 58
consecutive quarters, or more than 14 years
of Geneen’s 18-year tenure. Geneen was
lionized for this achievement; he became
the highest paid executive in the United
States, authored best-selling books, and was
memorialized across the country in the
form of new centers, buildings, and foun-
dations (Harvey D. Shapiro, “Management
Was the Message,” New York Times,
March 10, 1985, http://www.nytimes.
com/1985/03/10/books/management-was-
the-message.html). Only in retrospect, after
Geneen’s departure and the subsequent dis-
mantling of most of ITT, did it become
clear that those 58 straight quarters of
growth were not what they seemed to be.
The Price of Success
Earnings management—a benign
euphemism for financial manipulation—
is not a wholly irrational activity, albeit
an unethical one. In addition to the praise
heaped upon high flyers like ITT under
Geneen, researchers have demonstrated that
companies reporting 20 consecutive quar-
ters of earnings increases enjoy greater
profitability, higher stock valuations, and
higher price-earnings ratios than counter-
parts with similar underlying financial
strength (James N. Myers, Linda A. Myers,
Douglas J. Skinner, “Earnings Momentum
and Earnings Management,” August 2006,
http://ssrn.com/abstract=741244 or
http://dx.doi.org/10.2139/ssrn.741244).
But Myers, et al., also showed that this
“success” comes with a price: All those
previously positive measures decline
markedly when the unbroken sequence of
quarterly successes finally ends; the longer
the quarterly streak of good news runs, the
deeper the firm’s plunge when the time
of reckoning arrives. Efforts to manipu-
late earnings are practiced by widely dis-
parate companies and CEOs, whether lit-
tle known or famous; publicly regarded
as miscreants or su ...
This study examines the role of fraud risk factors in the fraud pentagon theory in detecting fraudulent financial statements. The study analyzed 28 Indonesian banking companies from 2017-2019 using secondary data and the SEM-PLS method. The results found that external pressure, influence monitoring, auditor switching, director changes, and CEO picture frequency simultaneously influence fraudulent financial statement detection. However, individually, external pressure, auditor switching, influence monitoring, and director changes significantly influence detection, while CEO picture frequency does not. The study aims to help companies improve accountability and transparency and help investors conduct more diligent due diligence when evaluating potential investments.
1 2Cheat Sheet on Evidence and DocumentationACC491J.docxhoney725342
1
2
Cheat Sheet on Evidence and DocumentationACC/491
July 3, 2017Cheat Sheet on Evidence and Documentation
Relevance, Reliability and Sufficiency of Evidence
The basic property of an audit report is that it should entail relevance. The report t should be written in a standard format which is usually mandated by generally accepting the set auditing standards. Accounting is an important task since it ensures financial details of a business are kept considerably clean. Going through the terminologies in order to know everything that is involved in auditing is important when auditing the financial records. The first step involves dividing the field into the foremost part known as the financial statement. Soares (1997). All businesses hold their financial statements in high regards since it is a legal requirement to provide and they provide them when they are requested by relevant bodies. These statements represent the picture of the business in reference to its financial robustness. The audited report reports are used to verify that the details given in their statements. For instance, the public corporations are supposed to ensure that their statements are professionally audited in order to secure their investors’ wealth.
It is important to note that the concept of reliability is of real interest to a wide variety of audit participants. This is due to many quotations and references that are required for well-founded financial information and the role of audit. It has been said that having a genuine financial and economic data should be the principle assumptions of a society. Being reliable increases confidence in and reliance on financial statements. Some of the aspects of reliability include faithful representation, fitness for purpose, robustness as well as the audit firm reliability.
The quantity of audit evidence is in simple words what sufficiency of audit evidence means. The risk of material and the inclusive quality of the evidence presented is what needs to be considered to fulfill the sufficiency needed. One should rely on an eloquent order other than the convincing one. Yang (2007). Impressive evidence shows the scale one way or the other and provides one with a basis beyond a sensible doubt for forming a viewpoint (Loughran, Maire, 2011). Convincing evidence is one which is perfectly reliable. It involves looking for all clients' records in order to achieve this level of assertion. Careful documentation of the work and the audit opinion must be fact-based and should be retractable so that a different review of the audit should depict the same conclusion (Loughran, Maire, 2011).
Confidentiality: Financial statements should be handled with confidentiality. Confidential information should not be disclosed to anyone. The accountant must protect the information from unauthorized disclosure or public release. The auditor should be accountable for any access by unauthorized people. In most times, clients see the auditors as trusted ...
Similar to Running head AN EMPIRICAL STUDY ON ACCOUNTING AND AUDITING ENFO.docx (20)
Eastern European countries appear to have become dependent on Ru.docxjoellemurphey
Eastern European countries appear to have become dependent on Russian oil originally due to the country being a reliable supplier to the European countries (Bradshaw, 2014, p. 76). Though the countries were allies with the United States, they were trying to become less dependent on the Middle East and saw that Russia was a reliable source. Much of this reliance was due to the “iron curtain” as well as the fact that many of the Eastern European countries were part of the Soviet Union in some way or affiliated with them.
It appears that much of the reason as to why these countries reached energy accords with Russia is due to the convenience. There was “limited access to storage and alternative sources of gas supply” (Bradshaw, 2014, p. 77). This pushed these countries to depend more on Russia, which appeared to be an easier access to gas supplies. Another reason might have been due to fear as the Kremlin punished Ukraine for voting for an anti-Moscow government (Bradshaw, 2015, p. 77). This action shows that many of these countries may have reached these accords due to the pressure and encouragement of the Soviet Government. In the 1980’s the dependence of European countries on Russian gas resources was 50-60%. In the 1970’s, many of the Eastern European countries also became reliant on Russia due to a greater demand of oil and gas. The surrounding countries that were providing resources were not able to keep up with the demand and thus these countries sought to get their sources from Russia. It also helped that Russia’s prices appeared to be lower than that of the world market (Bradshaw, 2014, p. 87-88). Due to the price of oil and gas and the availability, Eastern European countries were able to grow and build in gas import and its infrastructure, thus in turn causing it to be dependent on Russia.
Bradshaw, M. (2014).
Global Energy Dilemmas: Energy Security, Globalization, and Climate Change
. Cambridge, UK: Polity Press.
Based on your considered review of this module’s readings as well as your reflection upon the first three modules, evaluate the questions below.
In retrospect it seems obvious, but exactly how and why did Eastern European countries come to depend on Russian oil and natural gas after World War II?
Why did the Western Europeans reach energy accords with the Russians in the 1970s and early 1980s, building large-scale natural gas import infrastructures and increasing their dependence on Russian gas?
.
EAS 209 Second Response Paper Topic Assignment Due .docxjoellemurphey
EAS 209
Second Response Paper Topic
>>>Assignment Due Date: Friday, October 12, 2018<<<
Write 350 words, excluding works cited and references, on the following topic:
Dipesh Chakrabarty cites John Stuart Mill to show one dimension of historicist
consciousness: “a recommendation to the colonized to wait.” What does Chakrabarty
mean by this phrase? Consider, e.g. why, according to Mill, “Indians, Africans, and other
‘rude’ nations” had to be consigned to what Chakrabarty called “an imaginary waiting
room of history.”
To respond to this question, you might find it helpful to consider Chakrabarty’s discussion
on historicism or “stagist theory of history.”
▪ Submit a hard copy in your Tutorial Section on Friday, October 12.
▪ Papers must be type-written, double-spaced, appearing in 12 points Times New Roman font or
its equivalent with 1” margins. Do not exceed 400 words. You are responsible for keeping an
extra copy of your own paper.
▪ The assignment does not ask you to conduct additional research. Papers that do not respond
to the given topic or do not follow the specific instructions described above will receive no
marks. No resubmission allowed.
▪ You need to present your argument logically and clearly, fully demonstrate the precise
understanding of Chakrabarty’s argument and substantiate your argument convincingly and
with details.
▪ Observe the Chicago Manual of Style referencing practice and properly cite the passages you
quote (i.e. author, title, page number, etc.). Works cited or references should not be counted
toward the 350 word limit.
▪ Any ideas or expressions that are not your own must be placed in quotation marks and
referenced with page number. Academic misconduct will not be tolerated. See:
http://www.artsci.utoronto.ca/osai/The-rules/what-is-academic-misconduct
▪ You may share notes and discuss your ideas with others for preparation. But the paper you
submit must be exclusively written by you alone and in your own words clearly distinguishable
from others’. Papers that plagiarize, replicate others, or contain identical or near-identical
passages that appear in other papers will not be accepted or credited.
▪ You must proof-read before submission. Sentences that are incomplete or unintelligible will
not be read or credited.
▪ Late submission and papers submitted via e-mail will not be accepted or credited unless
under extraordinary circumstances. ABSOLUTELY NO EXCPETION!
http://www.artsci.utoronto.ca/osai/The-rules/what-is-academic-misconduct
I N T R O D U C T I O N
The Idea of Provincializing Europe
Europe . . . since 1914 has become provincialized, . . .
only the natural sciences are able to call forth a
quick international echo.
(Hans-Georg Gadamer, 1977)
The West is a name for a subject which gathers itself in
discourse but is also an object constituted discursively;
it is, evidently, a name always associating itself with
those regions, communities, and peoples.
Earth Science LabIn what order do materials settle in waterSo t.docxjoellemurphey
Earth Science Lab:In what order do materials settle in water?
So this is my Topic:
In what order do materials settle in water? Design and carry out an experiment to determine the order in which different sized materials (e.g., sand, gravel, topsoil) settle out in water after they have been mixed up.
but i don't understand the question below:
What are some possible treatments you can use to answer your question? What are some variables that may influence your question, and are they variables that you can easily manipulate and test?
What can i write about the possible treatments?
.
EarlyIntervention Strategies Paper (15 points)The pu.docxjoellemurphey
Early
Intervention Strategies Paper (15 points)
The purpose of the presentation is to help classmates understand different types of intervention strategies for early intervention. Students will be expected to write a 5-7 page paper that is comprised of two parts. In Part I, the student will discuss the role of each of the following professionals that can comprise a treatment team in a maximum of 3 pages:
Developmental Teacher Occupational Therapist Physical Therapist Speech/Language Pathologist
Audiologist Vision Consultant Psychologist Pediatrician
Part II: Furthermore, each student will set up a site visit at a local agency or provider of services to young children and will spend some time observing a particular facility or program that cares for and provides services to infants and young children. The following list should be used to guide the observations. The student should summarize thefollowing information in at least 3 pages:
Name of the facility or program
Ages of the children served
History and philosophy of the facility or program
Structure of the facility or program (Co-Op, Pre-K, )
Services provided
Activities and routines in which the children engage
Adult to child ratio
Types of delays and disabilities of the children who attend this program
Family involvement
Type of setting: inclusive setting, provisions for inclusion
Curriculum used
Would you recommend this facility to a family with a child with a disability? Why or why not?
.
Early Hominids & Australopithecus SubscribeWhat is a too.docxjoellemurphey
Early Hominids & Australopithecus
Subscribe
What is a tool? Did
Sahelanthropus
,
Orrorin
,
Ardipithecus, or Australopithecus
use tools? What evidence shows that they used tools?
What do these groups represent for human evolution? Why are these hominids unique in human evolutionary history?
.
Early scholarly and philosophical manuscripts were in Greek. However.docxjoellemurphey
Early scholarly and philosophical manuscripts were in Greek. However, by the 5th century CE – and onward – language was mainly spread by conquests, trades, religious affiliations, technological advancements or entertainment. (Gascoigne, 2001). For example, as the geographic territory under Roman control grew, the use of Latin as a common language also spread. In areas under Roman control, Latin was the spoken and written language of the courts and commerce, as well as the language of the Christian church. As the Roman Empire expanded, Latin served as a common language that allowed for people of diverse linguistic backgrounds to be able to communicate.
Onward and by the early 14th century, the trend toward the use of vernacular language had spread throughout most of Europe. As monarchies throughout the region began to consolidate, the use of vernacular languages contributed to an increasing nationalism, or feeling of pride in one’s own nation, and in this case among people of similar linguistic backgrounds. People began to feel more connected to local leaders than they did to influences from afar. These sociopolitical shifts, along with the development of moveable type (the printing press), helped to ensure the success of the vernacular languages during the Renaissance.
Assignment:
The goal of this assignment is to research and report on the origins of vernacular language, and its spread while also providing evidence of Latin’s influence on all Western languages.
Choose one native language spoken in Europe, discuss the origins of the vernacular language and describe how the language spread.
As a whole, in what ways has Latin influenced Western language development?
Prepare a 2-page essay (not including cover page and works cited page) answering the questions stated above in APA format.
.
Early Learning & Developmental Guidelines July 2017 1 .docxjoellemurphey
Early Learning &
Developmental Guidelines
July 2017 1
Early Learning and Developmental Guidelines
This document provides current Web links to all State early learning and development guidelines (ELGs). At this
time, all 56 States and Territories have developed ELGs for preschool children, and virtually all have ELGs for
infants and toddlers. The following table provides the website for ELGs from the States.
State ELG Name and Web Site
ELG Age
Range
Alabama Alabama Early Learning Guidelines
http://dhr.alabama.gov/large_docs/aelg.pdf
Birth to 5
years
Alaska Early Learning Guidelines (2007)
https://education.alaska.gov/publications/earlylearningguidelines.pdf
Birth to 5
years
Arizona Early Learning Standards (2013)
http://www.azed.gov/early-childhood/files/2011/11/arizona-early-learning-
standards-3rd-edition.pdf
3 to 5 years
Arizona’s Infant and Toddler Developmental Guidelines (Draft)
http://www.azftf.gov/Documents/Arizona%20Infant%20and%20Toddler%20
Developmental%20Guidelines%20DRAFT%20for%20VETTING.pdf
Birth to 3
years
Arkansas Arkansas Child Development and Early Learning Standards (2016)
http://www.arheadstart.org/Ark_Early_Learning_Standards%20(19)%20(1).p
df
Birth to 5
years
California California Infant/Toddler Learning & Development Foundations (2009)
http://www.cde.ca.gov/sp/cd/re/itfoundations.asp
Birth to 3
years
California Preschool Learning Foundations, Volumes 1-3
http://www.cde.ca.gov/sp/cd/re/psfoundations.asp
3 to 5 years
Colorado Colorado Early Learning & Development Guidelines (2013)
https://www.cde.state.co.us/early/eldgs
Birth to 5
years
Connecticut Guidelines for the Development of Infant & Toddler Early Learning
http://www.ct.gov/dss/lib/dss/dss_early_learning_guidelines.pdf
Birth to 3
years
Connecticut Early Learning and Development Standards (2014)
http://www.ct.gov/oec/lib/oec/earlycare/elds/ctelds.pdf
Birth to 5
years
Connecticut Preschool Assessment Framework (2008)
http://www.sde.ct.gov/sde/lib/sde/PDF/DEPS/Early/Preschool_Assessment_
Framework.pdf
3 to 5 years
http://dhr.alabama.gov/large_docs/aelg.pdf
https://education.alaska.gov/publications/earlylearningguidelines.pdf
http://www.azed.gov/early-childhood/files/2011/11/arizona-early-learning-standards-3rd-edition.pdf
http://www.azed.gov/early-childhood/files/2011/11/arizona-early-learning-standards-3rd-edition.pdf
http://www.azftf.gov/Documents/Arizona%20Infant%20and%20Toddler%20Developmental%20Guidelines%20DRAFT%20for%20VETTING.pdf
http://www.azftf.gov/Documents/Arizona%20Infant%20and%20Toddler%20Developmental%20Guidelines%20DRAFT%20for%20VETTING.pdf
http://www.cde.ca.gov/sp/cd/re/itfoundations.asp
http://www.cde.ca.gov/sp/cd/re/psfoundations.asp
https://www.cde.state.co.us/early/eldgs
http://www.ct.gov/dss/lib/dss/dss_early_learning_guidelines.pdf
http://www.ct.gov/oec/lib/oec/earlycare/elds/ctelds.pdf
http://www.sde.ct.gov/sde/lib/sde/PDF/DEPS/Early/Preschool.
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxjoellemurphey
Early Innovations and Their Impact Today
Wilbur and Orville Wright's innovative spirit allowed them to take their place in history. Their inventions have changed the way people live around the world. At the turn of the century, an explosion in technological achievements occurred. The same kind of energy that went into advances in aviation went into the development of automobiles, telephones, televisions, and immunizations to prevent diseases. These and other innovations and achievements continue to have an enormous impact on human life.
In this week's Discussion, you will analyze two technological innovations/achievements of the late 19th/early 20th century and describe the impact they have on life today.
To prepare for this Discussion:
Review Chapter 2 (pp.10–30) from this week's Learning Resources focusing on technological innovations and achievements around the globe.
Identify two significant technological innovations/achievements (such as the telephone, television, automobiles, and vaccinations) from the late 19th and early 20th centuries.
Consider the ways in which these technologies made an impact on society at the turn of the century.
Reflect on how these technologies continue to impact your life today.
Support your assertions by making at least 2 references, in proper APA format, to your course readings.
With these thoughts in mind:
Post by Day 3 a 2- to 3-paragraph analysis where you do the following:
Identify two significant technological innovations/achievements from the late 19th and early 20th centuries.
Describe, in your opinion, why you believe your choices were significant and created global impacts during that time period.
Explain how these two particular innovations/achievements impact the way you live today.
.
Early childhood professionals have an essential role in creating.docxjoellemurphey
Early childhood professionals have an essential role in creating and supporting stable, responsive environments that reduce and reverse the impact of adversity (Center on the Developing Child, 2015b). In this Discussion, you explore the impact of adverse experiences and the role of the early childhood professional in supporting healthy, nurturing developmental contexts.
.
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxjoellemurphey
Early Constitutional Controversies
In 1788, Alexander Hamilton and James Madison, who had both played active roles at the Constitutional Convention, worked together to write
The Federalist Papers
, a series of articles originally published in New York newspapers to convince readers to back the ratification of the Constitution. Constitutional scholars often refer to these papers to gain an appreciation of the “original intention” of the Framers, how those men expected the federal government to operate under the Constitution, and the powers they sought to grant or deny the federal government. By the early 1790s, however, Hamilton and Madison had divided over basic constitutional questions such as whether or not the federal government could charter a national bank. The American electorate, which had ratified the Constitution, had split on the issue as well, dividing into rival Federalist and Republican parties.
For this assignment, explore
one
significant constitutional controversy, from the first two decades of the United States under the Constitution (1789 to 1821). Topics to consider include:
The incorporation of the Bank of the United States
Debt assumption
The Jay Treaty
The Alien and Sedition Acts
The Election of 1800
John Marshall’s use of judicial review
The Louisiana Purchase
The trial of Aaron Burr
Jefferson’s Embargo
Federalist opposition to the War of 1812
Missouri’s application for statehood
Describe opposing views of the topic under consideration, and explain how each side used the Constitution to support its position. Assess the validity of the two sides according to your own interpretation of the Constitution as well as according to how the Constitution and constitutional principles were understood at the time the controversy occurred.
The paper should draw from at least
one
primary source and
two
scholarly, secondary sources for a total of three sources (not including the Constitution itself). For assistance on the use of primary and secondary sources, please see sections 8.1 and 8.2 of the Ashford Writing Center. The secondary sources should be accessed through any of the academic databases available through the Ashford University library.
The paper must be three pages in length and formatted according to APA style. You must use at least three scholarly resources (at least two of which can be found in the Ashford Online Library) other than the textbook to support your claims and subclaims. Cite your resources in text and on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar.
.
Early Civilizations MatrixUsing your readings and outside sour.docxjoellemurphey
Early Civilizations Matrix
Using your readings and outside sources complete the following matrix. Be sure to address the following in your matrix:
•
Provide names, titles, dates, brief descriptions of important events, and other details as necessary.
•
Note the details of key political, socioeconomic, technological, artistic, musical, architectural, philosophical, and literary developments for each civilization listed in the table, which were evidenced in the humanities.
Be sure to properly cite the sources that you use in completing this matrix.
.
Early childhood teachers need to stay connected to what is occurring.docxjoellemurphey
Early childhood teachers need to stay connected to what is occurring in the community outside the classroom politically and economically because these factors will influence their classroom. Items of recent debate include social and emotional development, as well as technology in the early childhood classrooms.
For this assignment, take on the role of an early childhood teacher. The principal of your school has placed you on a committee to create a 12-15 slide digital presentation to inform families about current trends in early childhood education. Explain the trends and discuss whether they are developmentally appropriate for young children. In addition, include a description of the effect this trend has on student outcomes. The presentation should discuss early childhood trends and influences on the early childhood classroom in the following areas:
Political (legislative and regulatory)
Economic
Social-emotional
Technological
One trend of choice (e.g., assessment, physical fitness, play in the classroom, emergent curriculums, recess, common core)
Include a title slide, reference slide, and speaker’s notes in your digital presentation.
Use 3-5 scholarly resources to support your research
.
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxjoellemurphey
Early and Middle Adulthood Paper
Prepare
a 1,050- to 1,400-word paper in which you examine the psychological adjustments to aging and lifestyle that occur within individuals during early and middle adulthood. Be sure to include the following:
Discuss how social and intimate relationships evolve and change during early and middle adulthood.
Identify various role changes that occur during early and middle adulthood.
Examine the immediate and future impact of healthy and unhealthy habits practiced during early and middle adulthood.
Use
a minimum of two peer-reviewed sources.
.
Earlier this semester, you participated in a class discussion about .docxjoellemurphey
Earlier this semester, you participated in a class discussion about the character of Bath de Chaucer's wife. You are aware of the complexity of her as a resourceful, cunning, open and ambitious woman. For this essay, I would like you to write a comparison / contrast essay in which you discuss the Wife of Bath as you compare or contrast one or more of these three well-known modern American women: Beyoncé Lil 'Kim, and / or Lady Gaga.
Think beyond and below cliches and perceptions. The comparison should not be disrespectful to these modern iconic women. Obviously, times have changed, and I am in no way suggesting that these modern women share all or even some of the qualities of the Wife of Bath, aside from her drive for independence, sovereignty, and success.
When developing the comparisons and contrasts of it, you should use AT LEAST THREE SOURCES to gather information and knowledge to support the claims and interpretations of it. These sources should be cited in the text and on a works cited page using a precise MLA documentation style.
You will write one essay of 500 - 600 words for this paper . This essay must be formatted in MLA Paper form.
Here is the reading about The character of Bath de Chaucer’s life
From The Canterbury Tales:
General Prologue
Here bygynneth the Book of the Tales of Caunterbury
Whan that Aprill, with his shoures soote
The droghte of March hath perced to the root
And he bathed every veyne in swich liquor,
Of which virtue begotten is the flour;
5 Whan Zephirus eek with his sweete breeth
Inspired hath in every holt and heeth
The tender croppes, and the yonge ring
Hath in the Ram his halfe cours yronne,
And smale foweles maken melodye,
10 That slepen al the nyght with open eye-
(So priketh hem Nature in hir corages);
Thanne longen folk to goon on pilgrimages
And palmeres for to seken straunge strondes
To ferne halwes, kowthe in probry londes;
15 And specially from every shires ende
Of Engelond, to Caunterbury they wende,
The hooly blisful martir for to seke
That hem hath holpen, whan that they were seeke.
Bifil that in that seson, on a day,
20 In Southwerk at the Tabard as I lay
Redy to wenden on my pilgrymage
To Caunterbury with ful devout courage,
At nyght was come into that hostelrye
Wel nyne and twenty in a compaignye
25 Of Sondry folk, by aventure yfalle
In felaweshipe, and pilgrimes were they alle,
That toward Caunterbury wolden ryde.
The rooms and the stables weren wyde,
And wel we weren esed att beste;
30 And shortly, whan the sonne was to rest,
So hadde I spoken with hem everichon
That I was of hir felaweshipe anon,
And made forward erly for to ryse
To take our wey, ther as I yow devyse.
35 But nathelees, whil I have tyme and space,
Er that I ferther in this tale pace,
Me thynketh it acordaunt to resoun
To tel yow to the conditio.
This document provides instruction on writing comparison and contrast essays. It discusses balancing points between topics, writing a strong thesis statement using a T-diagram, and following an effective structure. Specifically, it recommends determining if an essay will focus more on similarities or differences, and using a T-diagram to outline key points for each topic. This allows writers to logically organize their ideas and ensure equal coverage of topics in their essays. Effective introductions and conclusions are also important.
Earlean, please write these notes for me. October 01, 20181. My .docxjoellemurphey
Earlean, please write these notes for me. October 01, 2018
1. My name is Brittney, this is my first day in group, I am from Lake worth, my age is 25, Originally from California, I have been clean 83 days. She grew up Catholic. She is pregnant with her first child 6 weeks states she wants to be a good mother, she went to doctor today it is confirmed. A BOY
Brittney’s does not believe in God she believes the Universe
Tell me one positive thing about yourself? I am FUNNY.
2. Tessa, I am 20 years old, I am from Missouri, I have been clean 8 months, and I’m going home Friday. I have a sister that just relapsed 4 days a go with an overdose, beaten etc. and I am showing her tough love. I got some news that my best friend in New York overdose, so my feelings have been going back and forth. And I am supposed to be the strong one. But I’m OK.
I am Out Going and Determined to make it.
Tessa has a Buddha faith says karma is a bitch
Tessa wants to co to college in January, she stated I am the SIT, says her self esteem is high.
3. Megan, I am 20-year-old from Colorado, Arizona… I am grateful and kind.
Megan believes FLDS Mormon latter-day saints, believes in God, he is loving and caring.
4. Elizabeth, I am 19 years old from St. Louis, Missouri, I was adopted, and I am very CARING. She explained to me before group she was given her meds Seroquel, and she has not had it for 4 days, so she was in and out asleep, but when I called her name she did respond politely. Believes in God
5. She is concerned about going to jail, would like to go to culinary school but this will be her first year.
6. Julian, I am 31 years old I am a Hard Worker I work two jobs Java Juice, and Brews.
Believes in God, and she prays every morning, se shared when she relapsed she did not pray that morning. July 28.
7. Dawn, originally from New York, I have been married a long time with 3children I been living in Florida. My family does not know I have another side I am like a camelina to my family my entire life they had no idea I was smoking crack an that I am a Junky I have lost everything facing divorce
Dawn was raised Catholic and she believes in God. And she would love forgiveness from husband and children, wants a chance to be understood. Teresa stated understand yourself and be accountable to you first.
When Dawn shared her story, it detoured the SPIRITUALITY meeting because Tessa gave the first feedback. And Codependency, cross addictions, service work, was discussed between them. The director Teresa interjected and explained the meaning you are replacing one thing with something else like, going to the GYM, SHOPPING, RELATIONSHIPS, any distraction to get you outside of yourself, or to get validated by someone else. You are hurting you to help someone else.
Breaktime
.
eam Assignment 4 Teaming Across Distance and Culture..docxjoellemurphey
eam Assignment 4: Teaming Across Distance and Culture.
1. What are the major effects of the physical separation of group members? How can distance, in some cases, be beneficial to groups and teams?
2. What other areas of organizational behavior or design are impacted by information technology, and what are the implications for organizational change?
3. Brainstorm some ways to “redesign” your office space (or an office space you have previously worked in) on paper using virtual or flexible space, or flexible furniture. How would this redesign enhance successful teamwork?
4. What are some of the ways that cross-cultural teams are distinguished from other types of teams? What are some of the benefits and difficulties of building a cross-cultural team?
250 Words
.
ead the following articleMother Tongue Maintenance Among North .docxjoellemurphey
ead the following article:
Mother Tongue Maintenance Among North American Ethnic Groups
, Robert W. Shrauf
Address the following:
What are some of the factors behind both the loss and persistence of native languages?
Does losing or maintaining one's native language have any impact on one's degree of acculturation or assimilation?
.
eActivityGo to the United States Equal Employment Oppo.docxjoellemurphey
eActivity
Go to the United States Equal Employment Opportunity Commission’s website to review discrimination types, located at
http://www.eeoc.gov/laws/types
. Be prepared to discuss.
Employment Relationship and Discrimination" Please respond to the following:
From the e-activity, visit the EEOC website link provided and select any three (3) types of discrimination and discuss. What key laws are applicable to the discrimination types you selected?
.
Each year on or around June 15, communities and municipalities aroun.docxjoellemurphey
Each year on or around June 15, communities and municipalities around the world plan activities and programs to recognize World Elder Abuse Awareness Day, a day set aside to spread awareness of the abuse of the elderly (Center of Excellence on Elder Abuse & Neglect, 2013). The abuse of older adults is a growing concern and statistics suggest that the number of elders experiencing abuse is an alarmingly high number. Research suggests that close to half the people diagnosed with dementia experience some form of abuse (Cooper, C., Selwood, A., Blanchard, M., Walker, Z., Blizard, R., & Livingston, G., 2009; Wiglesworth, A., Mosqueda, L., Mulnard, R., Liao, S., Gibbs, L., & Fitzgerald, W., 2010, as cited on http://www.ncea.aoa.gov/Library/Data/index.aspx). Elder abuse takes on many forms and can include physical, emotional, psychological, and economic abuse. The legendary American actor, Mickey Rooney, spoke to the United States Senate, describing his own experiences of pain and neglect at the hands of his stepson, asking legislators to take seriously the abuse of the elderly.
Respond to colleagues by suggesting alternative strategies. The Original posts are contained in the attachement.
Support your responses with specific references to the Learning Resources. Be sure to provide full APA citations for your references.
.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Running head AN EMPIRICAL STUDY ON ACCOUNTING AND AUDITING ENFO.docx
1. Running head: AN EMPIRICAL STUDY ON ACCOUNTING
AND AUDITING ENFORCEMENT RELEASES CASES
An Empirical Study on Accounting and Auditing Enforcement
Releases Cases
Xin Tan
Southeast Missouri State University
Author Note
This paper was submitted in partial fulfillment of the
requirements of the degree of Masters in Business
Administration
AN EMPIRICAL STUDY ON ACCOUNTING AND
AUDITING ENFORCEMENT RELEASES CASES
31
2. Abstract
The objective of the paper is to provide an empirical study
about the characteristics of accounting fraud and fraudulent
financial reporting occurrences, including violation length,
industry, audit tenure and violation types. To do so, I collected
Accounting and Auditing Enforcement Releases (AAERs) issued
by the Securities and Exchange Commission (SEC) for
accounting fraud committed by companies during 2009-2011,
which provides a fraud sample consisting of 66 companies. I
analyzed each incident and explore key company characteristics
in instances of fraudulent reporting in AAERs.
APPLIED RESEARCH ACCEPTANCE SHEET
An Empirical Study on Accounting and Auditing Enforcement
Releases Cases
3. Submitted by Xin Tan in partial fulfillment of the
requirements for the degree of Masters in Business
Administration.
Accepted on behalf of the Faculty of the School of
Graduate Studies and Research by the Applied Research Project
Committee.
(Date)
Advisor/Chair (Name,Ph.D.)
______________________________ (Date)
MBA Coordinator (Name, Ph.D.)
CONTENTS
ABSTRACT..............................................................
.............................. ……………. i
ACCEPTANCE
PAGE.............................................. ………………… ii
CONTENTS....................................... ………….......................
................ …………iii
INTRODUCTION…………………………………………………….
…...1
LITERATURE
REVIEW……………………………………………….....3
METHOD…………………………………………………….………
……… 4
RESEARCH DESIGN AND
RESULT………………………………...… 5
CONCLUSION………………………………………………………
….....15
LIMITATION…………………………………………………..... ....
…...... 16
REFERENCES………………………………………………………
4. …. …18
APPENDIX
…………………………………………………………. ……. 20
I. Introduction
While the United States experienced an unprecedented storm of
accounting fraud, like Enron and WorldCom, around the
beginning of twenty-first century, it is still unclear to what
extent the typical fraud profile has changed in recent years. In
the last decade, the accounting industry has made a variety of
legislative and regulatory changes because of accounting fraud,
such as the Sarbanes-Oxley Act of 2002. This act was enacted
as a reaction to major accounting scandals and it enhanced
standards for all U.S. public companies boards, management
and public accounting firms. Fraudulent financial reporting can
have significant consequences for companies, stockholders,
investors, auditors and regulators. High profile fraud cases may
decrease the credibility of the financial reporting system and
erode the confidence of capital markets.
Whether or not companies are likely to engage in accounting
fraud is not easy to determine or obvious to track. That’s why
this research analyzed the firms who were involved in
fraudulent financial reporting and aimed to provide a useful
understanding of fraud occurrences. The Committee of
Sponsoring Organizations of the Treadway Commission (COSO)
conducted studies (Beasley et al, 1997) about fraudulent
financial reporting in order to provide a comprehensive analysis
of fraud incidents investigated by the SEC. It offered a great
method for researchers to analyze companies who committed
fraud and fraud occurrences.
This paper follows COSO’s method to collect sample firms and
make an empirical study of those cases. Every sample firm in
this paper was investigated by the SEC and presented in
Accounting and Auditing Enforcement Releases (AAERs)
5. during a three year period from 2009 to 2011. The AAERs
summarizes the actions brought by the SEC against public
companies, audit firms, mangers and auditors. Moreover, those
releases contain the process of the fraud occurrences, such as
name of firms or people, violation date, time period, types of
fraud and the main purpose of fraud. Some of those cases even
indicate the dollar amount of money involved in the fraud and
monetary penalties for the firms who committed fraud.
This paper identifies 66 organizations involved in fraudulent
financial reporting. There are two advantages to analyzing
sample organizations. On one hand, it will help people to obtain
a better understanding of organizations involved in fraudulent
reporting and the fraud process. Most of the occurrences of
accounting fraud behavior are the result of behavior tending
towards the firms’ benefit. For example, Farber (2005)
indicated that 60 percent of the fraud involved in fictitious
transactions, such as creating phony invoices, which tend to
overstate net income. Finding out the key features of recent
fraudulent activity will help outsiders, such as auditors,
regulators and potential investors to more accurately evaluate
organizations.
This research differs from previous studies in the following
aspects: first, data from previous studies are outdated and may
not represent the current relationships and facts. Second, the
present research focuses on AAER cases against companies, not
individual people.
The remainder of this paper is organized as follows. In section
II, a brief review of the relevant literature is provided. Section
III presented the research method and a description of the
sample. Section IV contained the research design and empirical
results. A summarized conclusion is provided in Section V.
6. II. Literature review
There is much research available on fraudulent financial
reporting based on the empirical study. Previous researchers
have tested and verified almost every aspect of firms identified
by SEC as fraudulently reporting.
One study supported by COSO in 1997 analyzed 347 accounting
fraud cases, providing an extensive updated analysis of
financial statement fraud occurrences. One of the finding was
that “most fraud overlapped at least two fiscal periods,
frequently involving both quarterly and annual financial
statements.”(Beasley et al, 1997, P.7)
Most of the literature clustered in governance mechanisms.
Beasley (1996) found that larger proportions of outside
members on the board of directors significantly reduced the
likelihood of reporting fraud and that fraud does not have a
connection with committees meets. Farber (2005) examined the
association between the credibility of the financial reporting
system and the quality of governance mechanisms. Sample firms
tend to have poor governance relative to control sample firm.
He found that firms who committed fraud have fewer audit
committee meetings and a small percentage of Big
Four[footnoteRef:1] audit firms. He also mentioned that
improve governance would results in superior stock price
performance. [1: The Big Four present the four largest
professional services networks in accountancy and professional
services, which handle the vast majority of audits for publicly
traded companies. This group is known for the following
companies: PricewaterhouseCoopers, Deloitte Touche
Tohmatsu, Ernst & Young and KPMG. Others present other
auditors except Big Four.]
Coffee (2002) and Cox (2003) highlighted some cases of
fraudulent financial reporting of public accounting firms to
indicate the undeniable link between auditors and fraud
companies. The sample firms showed an obvious preference for
7. inflated profit rather than the inflated net assets in fraudulent
financial reporting. With inflated profit, fictitious income is the
most common technique and obtained by the inflated sales’
revenue. Lennox and Pittman (2010) conducted a research study
about whether the Big Four public accounting firms are
associated with higher quality financial statements. They
suggested that the clients of the Big Four firms are less apt to
engage in fraudulent financial reporting.
Maksimovic and Titman (1991) found that companies are more
likely to commit fraud when they have longer audit firm tenure
because they suffered from financial distress. The General
Accounting Office (GAO) indicated that “mandatory audit firm
rotation may not be the most efficient way to strengthen audit
independence” (2003, Highlights). Thus an increasing number
of researches papers to address this point have emerged in
recent years. Carcello (2004) examined the relation between
audit firm tenure and fraudulent financial reporting and found
that in the first three years of engagement relationship is more
likely to detect fraudulent financial reporting. However, he
failed to find evidence to prove longer client relationship would
lead audit failure. O’Mally (2002) examined auditor tenure and
auditor performance but failed to detect a relationship between
tenure and fraudulent financial reporting. New York Stock
Exchange (2003) advised that companies should periodically
change their audit firms for high profile audit quality.
III. Methods
Sample collection
In order to conduct this research, samples are quite essential in
every aspect. The researcher use AAERs as a proxy for the
occurrence of fraud. Consistent with Beasley (1996), this proxy
is intended to capture extreme cases of fraud in the error-to-
fraud continuum. The analysis period is restricted to three years
to make data collection more accessible. The AAERs appear to
be reasonable sources for identifying financial statement fraud
occurrences because they depict the detail of each fraud and it
8. is controlled by Securities and Exchange Commission (SEC).
Another source of my research is the EDGAR database. It
provides access to corporate information, including a company’s
financial information, registration statements, prospectuses and
periodic reports.
An illustrative example of SEC’s justification for issuing
AAERs follows (per AAER No. 3093, in the case of UTstarcom,
Inc.):
The SEC's complaint charges UTStarcom with violations of the
anti-bribery, books and records, and internal controls provisions
of the FCPA (Sections 30A, 13(b) (2) (A) and 13(b) (2) (B) of
the Securities Exchange Act of 1934, respectively). UTStarcom
agreed, without admitting or denying the charges, to the entry
of a permanent injunction against FCPA violations and to
provide the SEC with annual FCPA compliance reports and
certifications for four years, in addition to paying the $1.5
million penalty.
According to Vinod (2002), “An industry is a collection of
firms offering goods or services that are close substitutes of
each other”. That’s why all fraud firms in this paper were
reviewed to identify with the four-digit SIC code. The
researcher obtained this data from SEC 10-K Form. The first
two-digit as general SIC code is taken in order to facilitate the
analysis of the sample firm’s industry distribution.
IV. Research Design and Results
Table 1 provides the information about the sample. The SEC
issued 437 AAERs related to the violation of regulations from
the year from 2009 to 2011. Three hundred and twenty two of
them are firms not involved in financial statement fraud or are
cases against individual CPA or auditors. I abandoned 21 firms
because they did not file any financial statement to the SEC and
23 more firms because financial statement data was unavailable.
Finally, 5 more samples were deducted from the final sample
because the cases were duplicative. Thus, there are 66 firms
allegedly engaged in fraudulent financial reporting and
9. investigated by SEC that were used as research.
Table 1: Sample Selection of 66 Firms Subject to AAERs
Number of AAERs issued between 2009 and 2011
437
Less:
AAERs against individual CPA or auditors
322
Firms without SEC files
21
Firms without proxy or financial statement data
23
Duplicate firms
5
Final Sample
66
After making sure all the information is accurate, the researcher
started to manage the data to generate results in an effective
way. Inputting or uploading the data into a spreadsheet. Then,
based on the shape of the charts and the data itself, the
researcher was able to categorize each fraud firm by SIC Code.
Table 2 indicates that sample firms were widely distributed
among industries. Consistent with COSO’s 1999 and 2010
study, fraud occurred in a variety of industries but unlike their
findings, manufacturing account for about 42% of the incidents,
with 28 firms out of 66 in this research. According the 2010
COSO study, the most frequent industries cited were computer
hardware and software, with a number of 20%. One reason of
the different results is that the COSO study measured samples
10. by numbers of schemes occurred in total while the researcher
measured samples by numbers of firm. In general, Table 2
shows no significant difference in industries so it is a good idea
to limit behavior of prevention in any particular industry.
Table 2: Sample Firms Distribution by Types of Industry
Table 3 reports summary statistics of the sample. The company
data are picked from their SEC 10-K filings and those financial
numbers are cited at the first year of violation date. It shows
zero in net sales and total assets because one incidence is
startups with not assets or revenues in its construction phrase.
There is a significant difference between median and mean in
net sales, net income and total assets, which implies that some
big numbers occurred and greatly pull up the average number.
Johnson et al. (2002) stated that “In the United States, there is
no mandatory audit firm rotation and companies tend to change
auditors after relatively long tenure. Consequently, the age of
the client and the tenure of the audit firm may be correlated”.
Consistent with their research, the researcher measured the
audit firm tenure as the number of consecutive years that the
audit firm has audited the client and used SEC files to collect
audit tenure. The table indicates that most schemes lasted
several years. They average violation period is 4.36 years, with
median fraud period 4 years. In another point of view, frauds or
violation behaviors are not easy to prevent in a single fiscal
year.
The average audit tenure is about 2 times longer than the length
of GAAP violation. Since client-specific knowledge is useful in
detecting material misleading presentation in the financial
reports, the longer tenure of the audit firm, the more likely the
auditor will be able to detect financial fraud or errors.
11. Table 3: Descriptive Statistics of Sample Firms
Note: One observation reported zero in net sales and total assets
because it is startups with no assets or revenues in its
construction phrase.
In order to obtain a more comprehensive understanding between
audit tenure and violation length, the author makes a scatter
diagram and use a Pearson correlation test to determine if the
two variables are linearly related. Consistent with peer research,
Table 4 shows a positive liner relationship connects audit tenure
and length of violation. The correlation coefficient r = 0.25
(p=0.04).
Table 4: Scatter Diagram about Audit Tenure and Violation
Length
Table 5 presents the violation length by audit tenure type of
audit firm. Because the average audit tenure is 7.89 years, the
researcher defined short audit tenure as less than eight years,
and long audit tenure as eight years or more. Even though
client-specific knowledge is useful in detecting material
misleading presentation in the financial reports, sample firms
which maintain longer audit tenure have longer length of
violation. On the one side, it supports the advice of New York
Stock Exchange (2003) which states mandatory audit firm
rotation would have positive effect on financial reporting. On
the other side, the results of independent samples t-test show
mean of 4.0 for Short and 4.67 for Long Tenure, p=.26, which
indicates the means of the two factors do not indeed differ
significantly.
There are 50 out 66 sample firms (76%) employ Big Four
12. auditors. The difference of audit tenure between Big Four
auditor and other auditors seems significant, compared 9.24
years to 3.69 years. It implies that Big Four auditors are likely
to maintain longer client-customer relationship than other
auditors. One important finding is that there is no significant
difference between length of violation and audit tenure when
sample firms employ Big Four auditors. However, firms employ
non Big Four auditors show about 2-year difference in length of
violation.
Table 5: Exhibit Violation Length by Audit Tenure Type of
Audit Firm
Based on information provided by AAERs cases, the researcher
identified techniques used for fraudulent financial reporting.
Table 6 offers a recap about methods of fraud. Misleading
presentation includes all frauds related to the financial
statement, including misreported statement and note disclosure,
such as fictitious transactions, misstatement of assets and
improper use of accounting practice. Overstated income
techniques represent fraud behavior driven to boost income
illegally, such as fictitious revenue recognition, and
understatement expenses or liabilities. Insufficient internal
controls would lead a company to unreliable financial reporting
and ineffective operations, examples include improper payment
and bribery. Regulation violation relate to other miscellaneous
issues related to legal regulations, like illegal procedures in
acquisitions.
Among the 66 observations, 58 (88%) of them are investigated
by SEC because of misleading presentation and 38 (58%) of
them overstated their income. The main motivation for violation
and fraud behavior is to boost profit and bolster financial
performance. In speaking of internal controls, they have
significantly impacted on the reliability of financial reporting
and effectiveness of operations, which may lead to fraud
occurrence. When more than half of the observations are
involved in insufficient internal control, it is not surprising to
13. notice they are on the list of AAERs.
Table 6: Exhibit Fraudulent Reporting Methods
Types of Violation
Numbers of Firms
Percentage of Total
Mislead Presentation
58
88%
Overstate Income
38
58%
Insufficient Internal Controls
28
42%
Regulation Violation
5
8%
Total
-
-
Note: Most AAERs describe multiple infractions. Thus, the
table does not sum to 100%.
As noted in Table 7, the most common scheme used for
fraudulent reporting is improper payment (32%), which is the
result of insufficient internal controls. One instance for
improper payment is Watts Water Technologies, Inc. (AAERs
No.3328). Its subsidiary (CWV) in China made illegal
payments to employees of an institute, who assisted in design
and construction to CWV’s project. The purpose and effect of
those payments was to force the institute to recommend its
value of products and facilitate its sales. The improper
payments generated profits for Watts of more than $2.7 million.
Twenty-seven percent of the 66 sample firms’ financial
statements were misstated through the understatement of
expenses or liabilities. Cablevision Systems Corporation
(AAERs No. 2920) is a diversified entertainment and
14. telecommunications company. From 1999 through 2003, it
recognized certain costs as current expenses when the cost
should not have been recognized in those periods. It overstated
expense in earlier fiscal periods and understated expenses in
later periods. The improper recognized expenses understated
$7,895 million expenses from 2001 to 2003, which results 5.1%
understatement in net loss of 2003.
Even though bribery has relatively small percentage compared
to others, it is a very specific scheme and cannot be neglected.
The SEC alleges that a subsidiary of Maxwell Technologies,
Inc. (AAERs No.3236) for repeatedly paying bribes to
government officials in China to obtain business from several
Chinese state-owned entities. Maxwell manufactures energy
storage and power delivery products. A Maxwell subsidiary paid
over $2.5 million in bribes from 2002 through May 2009 for
contracts that generated more than $15 million in revenues.
There are 7 incidents (11%) found related to backdate stock
options. One example is about Hain Celestial Group, Inc.
(AAERs No. 3045). At least from1998 to 2002, Hain
fraudulently backdated stock options granted to Company
officers, directors, and employees, concealing millions of
dollars in expenses from the Company's shareholders. It granted
stock options at earlier dates in order to gain profit of low stock
prices and misreport it on its SEC filings.
Misconduct inventory is one of the most common techniques to
overstate of assets. Among all 66 samples firms, there are 6 of
them committed misconduct inventory. Thor Industries, Inc.
(AAERs No.3280) was filed by SEC because Thor engaged in a
fraudulent accounting scheme to understate Dutchmen’s cost of
goods sold. Thus, it would avoid recognizing inventory costs
that were not reflected in Dutchmen’s financial accounting
system.
Table 7: Exhibit Types and Frequencies of Schemes
Note: Those are the most common schemes employed by sample
firms and most of firms committed multi-schemes at single
15. fiscal year. Thus, the sum of percentage does not equal to 100
percent
Table 8 indicates the detail information about descriptive
statistics of dollar amount money involved in the incidents and
the penalty by the schemes presented in Table 7. In this
research, the researcher found 51 AAERs cases (77%)
specifically indicated the dollar amount of money involved in
schemes and 45 cases (68%) were fined by monetary penalties.
One important discover provided by Table 8 is that bribery
comes with a heavier penalty than other GAAP violation. The
average dollar amount associated with bribery is $5 million,
which is the smallest number compared to other four violations.
However, the average penalty for firms committed bribery is
about $42 million, which is almost 10 times higher than
improper payment and inventory misconduct, and 70 times
higher than backdating stock options. It is not difficult to
understand this finding because bribery is not only a business
behavior violation, but also relates to ethical or moral issue.
Table 3 of Appendix presents the detail information of
percentage distribution about penalty over dollar amount of
fraud. The average percentage influence of penalty over fraud
amount is 37% while the median percentage is 11%.
As mentioned above, each AAERs case engaged in more than
one GAAP violations and detailed information is not presented
well in the documents, so I cannot clearly allocate the specific
dollar amount in every violation. In other words, numbers
shown in the table for infractions are overlapped and overstated.
However, Table 8presents the general relationship tendency
between dollar amount of fraud and penalties.
Table 8: Descriptive Statistics about Dollar Amount of Fraud
and Penalty by Types of Scheme.
16. In Table 9 and Table 10, the changes are varied in every
percentage number and the influence of net income is much
greater than net sales. The average impact percent on net sales
is 3.75% and on net income is 8%. Those tables provide
distribution of Penalty impact on net sales and net income by
penalties respectively. Most changes are less than 1 % of both
net sales and net income, which implies that monetary
punishment may not enough to prevent fraud.
Table 9: Distribution of Penalty Amount as a Percentage of Net
Sales
Table 10: Distribution of Penalty Amount as a Percentage of
Net Income
Note: Percentage changes are both negative and positive,
because 20 out of 66 sample firms have net loss and 1 firm is a
startup with no net income and net sales.
V. Conclusion
Based on the results and the discussions above, this study
explores several key conclusions. Firstly, fraudulent financial
reporting occurs in a variety of industries. Even though
fraudulent financial reporting is more likely to occur in some
particular industries, we can never limit behavior of prevention
fraud in those industries. Secondly, fraud reporting needs to be
watched and prevented at the very first time, because the
occurrence is not easy to prevent in a single fiscal year.
Thirdly, audit tenure and length of violation are linearly related
to each other, and longer audit tenure tends to have longer
length of violation. Big-Four audit firms tend to obtain longer
audit tenure compared with others. Moreover, whether or not
periodically change audit firms would shorten the length of
violation is still unclear because the means of violation length
and audit tenure do not differ significantly.
17. Fourthly, improper revenue recognition is the leading type of
fraud, which implies the main motivation for violation and
fraud behavior is to boost profit and bolster financial
performance.
Fifthly, the consequences of fraudulent scheme are severe to
fraud firms and monetary punishment differs in types of
scheme. Penalties do not have significant impact on companies,
because percentage changes on both net sales and net income
are less than 1 %.
VI. Limitations
There is a significant time lag between the occurrence of fraud
and the issuance of AAERs case, and most of frauds are
happened before 2009. Thus, the information and conclusion
offered in this study may be behind.
The use of AAERs has limitations. For example, because the
SEC selects cases for which it has the best chance of winning
a judgment, they are likely to include instances of the most
extreme misleading reporting. Therefore, the results of this
study are not likely to be generalized to the entire population of
firms that report fraudulently.
Almost every sample firms committed more than one scheme at
the same time period. The researcher is unable to allocate the
specific dollar amount of fraud for each scheme and according
penalties. The data in Table 8 is inevitably overrated and
inaccurate.
18. References
Accounting and Auditing Enforcement Releases. Retrieved from
http://www.sec.gov/divisions/enforce/friactions.shtml
Beasley, M.S. (1996). An empirical analysis of the relation
between the board of director composition and financial
statement fraud. The Accounting Review 71 (October): 443-465.
Beasley, M. S., Carcello, J.V., and Hermanson, D.R. (1997).
Fraudulent Financial Reporting: 1987-1997, An Analysis of
U.S. Public Companies. New York: COSO.
Beasley, M. S., Carcello, J.V., Hermanson, D.R., and Neal, T.L.
(2010). Fraudulent Financial Reporting: 1998-2007, An
Analysis of U.S. Public Companies. New York: COSO.
Carcello, J., and Nagy, A. (2004). Audit Firm Tenure and
Fraudulent Financial Reporting. Auditing:A Journal of Practice
and Theory 23 (2): 55–70.
Coffee, J. C. (2002). Understanding Enron: It’s about the
gatekeepers, stupid. Working paper, Columbia University
School of Law.
Cox, J. D. (2003). Reforming the culture of financial reporting:
The PCAOB and themetrics for accounting measurements.
Washington University Law Review 81 (2):301–27.
General Accounting Office (GAO). (2003). Public Accounting
Firms Required Study on the Potential Effects of Mandatory
Audit Firm Rotation. Retrieved from
19. http://www.gao.gov/assets/250/240738.pdf
Johnson, V., Khurana, I.K, and Reynolds, J.K. (2002). Audit-
firm tenure and the quality of financial reports. Contemporary
Accounting Research 19: 637-660.
Lennox, C., and Pittman, J. A (2007). The importance of IRS
monitoring to accounting fraud. Working paper, Hong Kong
University of Science and Technology.
Lennox, C. and Pittman, J.A. (2010), Big Five Audits and
Accounting Fraud. Contemporary Accounting Research, Vol.
27, No. 1, pp. 209-247, March 2010.
Maksimovic,V., and Titman, S. (1991). Financial policy and
reputation for product quality. Review of Financial Studies 4
(1): 175–200.
New York Stock Exchange. (2003). Final NYSE Corporate
Governance Rules. Retrieved from
http://www.nyse.com/pdfs/finalcorpgovrules.pdf
O’Malley, S. (2002). Oversight Hearing on “Accounting and
Investor Protection Issues Raised by Enron and Other Public
Companies.” Senate Committee on Banking, Housing, and
Urban Affairs. 107th Cong., 2nd sess.
Top-down investment approach. Retrieved from
http://www.investopedia.com/terms/t/topdowninvesting.asp#axz
z1dEgF9OHm
Vinod, K. (2002). Note on industry structure. Retrieved from
http://info.umuc.edu/mba/public/AMBA607/IndustryStructure.ht
ml
1
Appendix
Table1: Table of Sample Firms from AAERs
AAERs No.
Firm Name
State location
20. Industry
2951
Allion Healthcare, Inc.
NY
Bituminous Coal & Lignite Mining
3348
Aon Corporation
IL
Crude Petroleum & Natural Gas
2972
Apogee Technology, Inc.,
MA
Drilling Oil & Gas Wells
3242
ArthroCare Corporation
TX
Drilling Oil & Gas Wells
3109
Assurant, Inc.
NY
Drilling Oil & Gas Wells
3021
Avery Dennison Corporation
CA
Drilling Oil & Gas Wells
3069
Bancinsurance Corporation
OH
Drilling Oil & Gas Wells
2920
Cablevision Systems Corporation
NY
Oil & Gas Field Services, Nec
3063
China Holdings, Inc.
CA
21. Food And Kindred Products
3127
Collins & Aikman Corporation
MI
Converted Paper & Paperboard Prods
2982
CSK Auto Corporation
AZ
Industrial Inorganic Chemicals
3048
Dana Holding Corporation
OH
Agricultural Chemicals
2955
Delphi Corporation
MI
Fabricated Plate Work
3134
Diatect International Corp.
UT
Miscellaneous Fabricated Metal Products
3007
Doral Financial Corporation
PR
Industrial Trucks, Tractors, Trailors & Stackers
3060
ECO2 Plastics, Inc.
CA
Pumps & Pumping Equipment
3036
Entrade, Inc.
IL
Computer & Office Equipment
3321
Escala Group, Inc.
CA
22. Computer Storage Devices
3108
General Re Corporation
CT
Computer Peripheral Equipment, Nec
3201
GlobalSantaFe Corp.
TX
Calculating & Accounting Machines
3283
GSI Group, Inc
MA
Electric Lighting & Wiring Equipment
3045
Hain Celestial Group, Inc.
NY
Telephone & Telegraph Apparatus
2935
Halliburton Company
TX
Radio & Tv Broadcasting & Communications Equipment
3026
Helmerich & Payne, Inc.
OK
Communications Equipment, Nec
2968
Ingram Micro Inc.
CA
Semiconductors & Related Devices
3254
International Business Machines Corporation
NY
Miscellaneous Electrical Machinery, Equipment & Supplies
3050
Isilon Systems, Inc.
WA
23. Miscellaneous Electrical Machinery, Equipment & Supplies
2934
ITT Corporation
NY
Motor Vehicles & Passenger Car Bodies
3268
Kentucky Energy, Inc.
KY
Motor Vehicle Parts & Accessories
2941
Krispy Kreme Doughnuts, Inc.
NC
Motor Vehicle Parts & Accessories
3297
LaBarge, Inc,
MO
Motor Vehicle Parts & Accessories
3213
LocatePlus Holdings Corporation
MA
Motor Homes
3015
LSB Industries, Inc.
OK
Search, Detection, Navagation, Guidance, Aeronautical Sys
3236
Maxwell Technologies Inc.
CA
Measuring & Controlling Devices, Nec
3022
MedQuist Inc.
NJ
Surgical & Medical Instruments & Apparatus
3067
Merge Healthcare Incorporated
IL
24. Electromedical & Electrotherapeutic Apparatus
2970
Monster Worldwide, Inc.
NY
Water Transportation
3102
NATCO Group Inc.
TX
Airports, Flying Fields & Airport Terminal Services
3165
Navistar International Corporation
IL
Cable & Other Pay Television Services
3229
NIC Inc.
KS
Hazardous Waste Management
3206
Noble Corporation
TX
Wholesale-Computers & Peripheral Equipment & Software
3199
Office Depot, Inc.
FL
Wholesale-Jewelry, Watches, Precious Stones & Metals
2943
Pediatrix Medical Group, Inc.
FL
Wholesale-Drugs, Proprietaries & Druggists' Sundries
3203
Pride International, Inc.
TX
Wholesale-Farm Product Raw Materials
2949
Quest Software, Inc.
CA
25. Retail-Food Stores
3274
Rockwell Automation, Inc.
WI
Retail-Auto Dealers & Gasoline Stations
3068
SafeNet, Inc.
MD
Retail-Auto & Home Supply Stores
2963
Stratum Holdings, Inc.
TX
Retail-Miscellaneous Shopping Goods Stores
3189
Sunopta, Inc.,
ON
Commercial Banks, Nec
3157
Sunrise Senior Living, Inc.
VA
Mortgage Bankers & Loan Correspondents
3064
Symbol Technologies, Inc.
NY
Accident & Health Insurance
3047
Tenet Healthcare Corporation
TX
Hospital & Medical Service Plans
3035
Terex Corporation
CT
Fire, Marine & Casualty Insurance
3280
Thor Industries, Inc.
OH
26. Fire, Marine & Casualty Insurance
3207
Tidewater Inc.
LA
Insurance Agents, Brokers & Service
3202
Transocean Inc.
TX
Services-Help Supply Services
3154
Trident Microsystems, Inc.
CA
Services-Prepackaged Software
3187
True North Finance Corporation
FL
Services-Prepackaged Software
2995
Ulticom, Inc.
NJ
Services-Computer Integrated Systems Design
3093
UTStarcom, Inc.
F4
Services-Computer Integrated Systems Design
3044
VeriFone Holdings, Inc.
CA
Services-Computer Processing & Data Preparation
3117
Verint Systems Inc.
NY
Services-Computer Processing & Data Preparation
3217
Vitesse Semiconductor Corporation
CA
27. Services-Nursing & Personal Care Facilities
3328
Watts Water Technologies, Inc
MA
Services-Hospitals
2971
WellCare Health Plans, Inc.
FL
Services-General Medical & Surgical Hospitals, Nec
3019
West Marine, Inc.
CA
Services-Management Consulting Services
Table 2: Exhibit Violation Types Information of Each Sample
Firms
Company Name
Types of Violation
Description
Amt of Fraud ($)
Penalty
($)
Allion Healthcare, Inc.
5,1,2
It understated interest expense for the warrants in conformity
with GAAP
932,517
N/A
It overstated its net income and understated its loss per share in
2005.
28. It failed to maintain an adequate system of accounting controls.
Aon Corporation
2,4,1
It failed to maintain an adequate internal control system
designed to detect and prevent the improper payments.
3,600,000
1,764,000
Its subsidiaries made over $3.6 million in improper payments to
foreign government officials between 1983 and 2007 to get
favorable business treatment.
Apogee Technology, Inc.
1
It is a publicly traded company alleged to inflate earnings in
2003 and 2004.
200,000
35,000
ArthroCare Corporation
2,1,5
It lacks internal control over sales.
It materially overstated sales revenue.
N/A
N/A
Assurant, Inc.
1
It is an insurance company and improper booked $10 million
payment as a bona fide reinsurance recovery.
29. 10,000,000
3,500,000
It materially overstated the net income that it reported for the
quarter ended September 30, 2004 to the public and in
Commission filings.
Avery Dennison Corporation
4,2
Its subsidiary in China made illegal payment about $30,000 to
foreign officials.
81,000
318,470
It failed to accurately record these payments in books and
records.
Bancinsurance Corporation
5,
It failed to account properly for more than $2 million of
reinsurance claims
2,000,000
60,000
Cablevision Systems Corporation
2,4,5
It o overstated expenses in earlier fiscal periods, and understate
expenses in later periods.
56,049,900
N/A
It made improper prepays to its subsidiary.
30. China Holdings, Inc.
3
It made material misrepresentations in nine public filings in
2008 and 2009, including improper audit reports from current
and former auditors.
N/A
N/A
Collins & Aikman Corporation
2,1
It inflated reported income between 2001 and 2004.
N/A
7,200,000
It used false documents from suppliers designed to mislead its
external auditors.
CSK Auto Corporation
3
It made material misrepresentations in 2009 in public filings.
N/A
N/A
Dana Holding Corporation
2,1,4,5,
It improperly recognized revenue or income on several
transactions and delayed recording expenses in the appropriate
period from 2004 and mid-2005.
43,000,000
N/A
It filed materially false and misleading periodic reports with
SEC.
31. It understated steel surcharge costs.
Its deficient system of internal controls contributed to the
restatement of its financial statements for the first two quarters
of fiscal year 2005, fiscal year 2004 and prior years.
Delphi Corporation
4
It filed materially false and misleading financial statements in
the company's 2001 Form 10-K.
20,000,000
30,000
It improperly recorded a $20 million payment from an IT
company in December 2001, made in connection with a new
contract between the IT company and Delphi.
Diatect International Corporation
5
It filed materially false and misleading financial statements.
N/A
216,281
Doral Financial Corporation
2,1
It overstated income by approximately $921 million or 100
percent on a pre-tax, cumulative basis between 2000 and 2004
32. by improperly accounting for the purported sale of non-
conforming mortgage loans.
921,000,000
123,000,000
$ 123 million to its investors harmed by accounting fraud.
ECO2 Plastics, Inc.
3
It has never registered a class of securities under the Exchange
Act but has registered offerings of securities under the
Securities Act of 1933.
N/A
N/A
Entrade, Inc.
3,2
It did not maintain adequate books and records of liabilities
arising from acquisition.
N/A
N/A
It lacked a system of internal accounting controls designed to
assure accurate transactions.
Escala Group, Inc.
4,1
It overstated $80 million to its revenues to boost its stock price
in 2003.
80,000,000
164,584
General Re Corporation
1,2
33. Its foreign subsidiary made sham transactions with AIG in 2000.
200,000,000
8,100,000
It improperly recognized more than $200 million in revenues
from 2000 to 2002.
GlobalSantaFe Corporation
2,4,
It made illegal payments to its customers brokers from January
2002 through July 2007.
N/A
5,900,000
GSI Group, Inc
1,2,
It improperly recognized revenue $7.8 million from 2004 to
2008.
7,800,000
N/A
It has numerous deficiencies of internal controls that were
attributable to its fraud.
Hain Celestial Group, Inc.
1,5,7,
It backdated stock options granted to Company officers,
directors, and employees, concealing millions of dollars in
expenses from the Company's shareholders.
20.500,000
N/A
34. It materially understated expenses and overstated its income in
disclosures to the Commission and the investing public, and
falsely represented in filings that Hain had incurred no expenses
for option grants.
Halliburton Company
2,6
It paid bribes to official within the Nigerian Government in to
obtain the construction contracts.
6,000,000
177,000,000
Its internal control failed to detect bribery.
Helmerich & Payne, Inc.
2,4,5,
It made improper payment to its subsidiaries.
185,673
375,681
Ingram Micro Inc.
1,4,5,2,8
It overstated revenues by $622 million from 1998 to 2000.
622,000,000
15,000,000
It made illegal payments to its suppliers and take extraordinary
sales discounts.
It improperly recorded excess inventory fees.
35. International Business Machines Corporation
2,4,6,
It subsidiaries paid cash bribes and provided improper gifts and
payments of travel and entertainment expenses to various
government officials in South Korea in order to secure the sale
of IBM products.
N/A
2,000,000
Isilon Systems, Inc.
1
It cut secret side deals with Isilon customers to allow the
company to report inflated sales to its shareholders.
4,800,000
N/A
It misreported $4.8 million in improper revenue during 2006
and 2007.
ITT Corporation
1,2,4
Its subsidiaries made illicit payments to generated sales and
realized improper profits of more than $1 million.
4,000,000
1,678,650
Kentucky Energy, Inc.
1,4,
It accounted for warrants it had issued before and overstated its
assets by 43%.
13,000,000
N/A
Krispy Kreme Doughnuts, Inc.
1,2
36. It fraudulently inflated earnings in 2003.
528,323
N/A
LaBarge, Inc,
5,1,2
Its internal controls lapses and inaccurate records misstatement
in fillings in 2006 and 2007.
437,000
200,000
LocatePlus Holdings Corporation
1
It fraudulently inflated revenue as well as a scheme to
manipulate the stock of another company.
2,000,000
N/A
LSB Industries, Inc.
1,5,8
It failed to comply with GAAP in connection with LSB’s change
in inventory pricing methodology from LIFO to FIFO.
250,000
N/A
Maxwell Technologies Inc.
4,1,2,6
Its subsidiary paid over $2.5 million in bribes to officials at
several Chinese state-owned entities through a third-party sales
agent for contracts that generated more than $15 million in
revenues for Maxwell
15,000,000
8,000,000
MedQuist Inc.
1,2
It inflated customer bills to increase revenues and profit
margins
6,600,000
75,000
Merge Healthcare Inc.
37. 1,2,4
Its misstatements to the public, Merge’s stock price dropped
from $24.50 to $7.30 per share, reflecting a $500 million loss in
market capitalization.
500,000,000
870,000
Monster Worldwide, Inc.
7
Its multi-year scheme to secretly backdate stock options granted
to thousands of Monster officers, directors and employees.
399,500,000
2,500,000
NATCO Group Inc.
5,2,3,7
Its subsidiaries created and accepted false documents in filings.
80,000
N/A
Its subsidiaries bribed Kazakstan’s officials to get contract
interest.
Navistar International Corporation
5,1,2, ,
It overstated its pre-tax income by a total of approximately
$137 million as the result of various instances of misconduct.
137,000,000
1,049,503
NIC Inc.
4
It failed to disclose more than $1.18 million in perquisites to
Fraser from at least 2002 to 2007.
1,800,000
500,000
38. It failed to disclose its payment of $1 million to fly and operate
planes.
Noble Corporation
2,4,
It made improper payments through its custom agents to
officials of the Nigeria Customs Service to obtain permits and
permit extensions necessary for operating offshore oil rigs in
Nigeria.
N/A
5,576,998
Office Depot, Inc.
2
It violated fair disclosure regulations when selectively
conveying to analysts and institutional investors that the
company would not meet analysts' earnings estimates.
30,000,000
1,000,000
It recognized approximately $30 million in funds received from
vendors in exchange for the company's merchandising and
marketing efforts.
Pediatrix Medical Group, Inc.
7,5
It backdated stock options grants to executives and employees
and with reporting false financial information to shareholders.
8,800,000
N/A
It illegally avoided expense for in-the-money options.
39. Pride International, Inc.
1,6
It and its subsidiaries bribed government officials in Venezuela,
India, Mexico, Kazakhstan, Nigeria, Saudi Arabia, the Republic
of the Congo, and Libya. The bribery schemes allowed Pride
and its subsidiaries to extend drilling contracts, obtain the
release of drilling rigs and other equipment from customs
officials, reduce customs duties, extend the temporary
importation status of drilling rigs, lower various tax
assessments, and obtain other improper benefits.
2,500,000
23,529,718
Quest Software, Inc.
1, 7
It improperly granted undisclosed in-the-money stock options to
executives and employees by backdating millions of options
from 1999 through 2002.
113,600,000
150,584
Rockwell Automation, Inc.
1,4
Its subsidiary made payment not directly related to business
purposes for employees and customers.
1,700,000
400,000
SafeNet, Inc.
7
It engaged in a scheme to backdate option grants to senior
executives and employees in order to take advantage of low
points in the company's stock price, without recording the
requisite compensation expense for these option grants.
1,600,000
1,000,000
Stratum Holdings, Inc.
40. 3
It failed to comply with Item 307 and 308T of Regulation S-B in
its 10-KSB report filed in 2008.
N/A
N/A
Sunopta, Inc.
8, 5,1,2
It failed to identify necessary downward adjustments to account
for such inventory at its net realizable value and understated its
cost.
N/A
46,200
Sunrise Senior Living, Inc.
1
It made improper adjustments to its reserve for self-insured
health and dental benefits and its accrual for corporate bonuses
to meet public earnings forecasts.
N/A
50,000
Symbol Technologies, Inc.
1
It engaged in a fraudulent scheme to inflate revenue, earnings
and other measures of financial performance in order to create
the false appearance that Symbol had met or exceeded its
financial projections.
3,091,539
250,000
Tenet Healthcare Corporation
1
It inflated its earnings by exploiting Medicare's outlier
reimbursement regulations, which provided for additional
reimbursement to hospitals to cover the additional costs for
treating extraordinarily sick patients.
11,000,000
2,000,000
Terex Corporation
41. 1
It aided and abetted the fraudulent accounting by URI for two
year-end transactions that were undertaken to allow URI to meet
its earnings forecasts. These fraudulent transactions also
allowed Terex to prematurely recognize revenue from its sales
to URI.
N/A
8,000,000
Thor Industries, Inc.
2,5,8
Its subsidiaries engaged in a fraudulent accounting scheme to
understate Dutchmen’s cost of goods sold in order to avoid
recognizing inventory costs that were not reflected in
Dutchmen’s financial accounting system.
27,000,000
1,900,000
Tidewater, Inc.
2,4,5,6,
It paid bribes to foreign government officials in Azerbaijan
disguised as payments for legitimate services.
1,600,000
217,000
It authorized improper payments to customs officials in Nigeria
that were inaccurately recorded as legitimate expenses in the
Company's books and records.
Transocean, Inc.
1, 4,
It made illicit payments through its customs agents to Nigerian
government officials to extend the temporary importation status
of its drilling rigs, to obtain false paperwork associated with its
drilling rigs, and obtain inward clearance authorizations for its
rigs and a bond registration.
42. 10,243,056
7,265,080
Trident Microsystems, Inc.
5,1,7
It backdated stock option documentation to make it appear as if
options had been granted on earlier dates, resulting in disguised
"in-the-money" option grants to Company employees, officers,
and on at least one occasion to directors.
37,000,000
350,000
It engaged in a fraudulent and deceptive scheme to provide
undisclosed compensation to executives and other employees,
concealing millions of dollars in expenses from the Company's
shareholders.
True North Finance Corporation
1
It improperly recognized revenue on interest from borrowers
which were not paying True North and which were in poor
financial condition.
74,000,000
N/A
Ulticom, Inc.
7
It improperly recorded the grant dates of eight company-wide
grants of employee stock options.
2,677,000
25,000
It involved certain long-standing and improper accounting
practices that were not in conformity with GAAP.
43. UTStarcom, Inc.
4,6
It subsidiary paid nearly $7 million between 2002 and 2007 for
hundreds of overseas trips by employees of Chinese
government-controlled telecommunications companies that were
customers of UTStarcom, purportedly to provide customer
training.
7,000,000
3,000,000
VeriFone Holdings, Inc.
1
It made unsupportable alterations to its records to compensate
for an unexpected decline in gross margins, overstating
VeriFone’s operating income by a total of 129 percent.
37,000,000
25,000
Verint Systems, Inc.
1,2
Its books and records falsely and inaccurately reflected, among
other things, the Company's liabilities, expenses, net income,
and general financial condition through at least the fiscal year
ended January 31, 2005.
6,500,000
N/A
It failed to maintain a system of internal accounting controls
sufficient to provide assurances that its reserve activity was
recorded as necessary to permit the proper preparation of
financial statements in conformity with GAAP.
Vitesse Semiconductor Corporation
1,5,7
It manipulated grant dates in order to award in-the-money
44. options and failed to ensure that Vitesse properly recorded
compensation expenses for the backdated grants.
184,000,000
162,320
It compounded their fraudulent revenue recognition practices by
failing to timely record credits related to the invalid accounts
receivable that were generated by the distributor's return of
product.
Watts Water Technologies, Inc
1,2,4
Its subsidiary made improper payment to its employees in order
to facilitate its sales.
2,700,000
3,776,606
WellCare Health Plans, Inc.
4,1
It fraudulently retained over $40 million it was required to
return to Florida state agencies under programs that provided
mental health services to Medicaid recipients and health care
services to uninsured children.
40,000,000
10,000,000
West Marine, Inc.
1,8
It filed numerous false financial statements from 2004 to 2006
after making undisclosed accounting changes designed to offset
an unexpected earnings shortfall.
13,200,000
N/A
45. It improperly increased its pre-tax income for the year,
offsetting the undisclosed reduction in earnings caused by the
change in inventory valuation.
Note:
1-Overstate Revenue;
5-Undserstate Expense
2-Insufficient Internal Controls
6-Bribery
3-Regulation Violation
7-Backdated Stock Option
4-Improper Payment
8-Inventory Misconduct
Table 3: Exhibit Penalty Percentage Impact on Dollar Amount
of Fraud
Name
Dollar Amount of Fraud ($)
Penalty
($)
Penalty as Percent of Fraud Amount
VeriFone Holdings, Inc.
37,000,000
25,000
0.07%
Vitesse Semiconductor Corporation
184,000,000
162,320
0.09%
46. Quest Software, Inc.
113,600,000
150,584
0.13%
Delphi Corporation
20,000,000
30,000
0.15%
Merge Healthcare Incorporated
500,000,000
870,000
0.17%
Escala Group, Inc.
80,000,000
164,584
0.21%
Monster Worldwide, Inc.
399,500,000
2,500,000
0.63%
Navistar International Corporation
137,000,000
1,049,503
0.77%
Ulticom, Inc.
2,677,000
25,000
0.93%
Trident Microsystems, Inc.
37,000,000
350,000
0.95%
MedQuist Inc.
6,600,000
75,000
1.14%
47. Ingram Micro Inc.
622,000,000
15,000,000
2.41%
Bancinsurance Corporation
2,000,000
60,000
3.00%
Office Depot, Inc.
30,000,000
1,000,000
3.33%
General Re Corporation
200,000,000
8,100,000
4.05%
Thor Industries, Inc.
27,000,000
1,900,000
7.04%
Symbol Technologies, Inc.
3,091,539
250,000
8.09%
Doral Financial Corporation
921,000,000
123,000,000
13.36%
Tidewater Inc.
1,600,000
217,000
13.56%
Apogee Technology, Inc.,
200,000
35,000
17.50%
48. Tenet Healthcare Corporation
11,000,000
2,000,000
18.18%
Rockwell Automation, Inc.
1,700,000
400,000
23.53%
WellCare Health Plans, Inc.
40,000,000
10,000,000
25.00%
Assurant, Inc.
10,000,000
3,500,000
35.00%
ITT Corporation
4,000,000
1,678,650
41.97%
NIC Inc.
1,180,000
500,000
42.37%
UTStarcom, Inc.
7,000,000
3,000,000
42.86%
LaBarge, Inc,
437,000
200,000
45.77%
Maxwell Technologies Inc.
15,000,000
8,000,000
53.33%
49. SafeNet, Inc.
1,600,000
1,000,000
62.50%
Transocean Inc.
10,243,056
7,265,080
70.93%
Watts Water Technologies, Inc
2,700,000
3,776,606
139.87%
Helmerich & Payne, Inc.
185,673
375,681
202.33%
Avery Dennison Corporation
81,000
318,470
393.17%
Industry Distribution
Mining
12%
Manufacturing
42%
Transportation,
communications, electric, gas and sanitary services
6%
Retail trade
6%
Finance, Insurance and real estate
11%
Services
51. Net Sales (In
thousands)66$502,604$3,547,150$7,190,884$38,300,0000
Net Income (In
thousands)66$16,926$371,785$1,679,639$13,425,000($370,000
)
Total Assets(In
thousands)66$491,949$5,406,624$14,791,796$109,022,000,0
Auditor Data:
Audit Tenure (In years)6687.894.72181
Violation Data:
Length of Violation (In years)6644.362.92151
Money Involved (In
thousands)51$8,800$72,340$173,685$921,000$80
Penalty (In thousands)45$1,000$9,800$31,497$177,000$25
Violation Length
Short TenureLong Tenure
Average
Tenure
Others No.of Sample1614216
Mean (In Years)3.693.575.503.81
St.Dev (In Years)2.392.923.503.13
Big FourNo.of Sample50163450
Mean (In Years)9.244.384.624.54
St.Dev (In Years)4.432.203.032.79
TotalNo.of Sample66303666
Mean (In Years)7.894.004.674.36
St.Dev (In Years)4.682.633.062.90
Average Audit Tenure
Dollar amount of fraudNo. %MeanMedianSt.DeviationMaxMin
Type of Fraud Involving
Improper payment
2132%82,984,63113,000,000177,189,488622,000,00081,000
Understate
expense1827%75,930,27920,500,000155,046,949622,000,00018
5,673
Bribery69%5,036,0002,500,0005,348,08215,000,00080,000
52. Backdate stock
option711%109,439,57137,000,000133,307,340399,500,0002,67
7,000
Misconduct
inventory69%139,890,00027,000,000241,375,327622,000,00025
0,000
Penalty
Type of Fraud Involving
Improper payment
2132%4,254,0591,839,3254,800,24915,000,00030,000
Understate
expense1827%1,881,415283,5004,048,29515,000,00046,200
Bribery69%42,149,3448,000,00067,923,279177,000,000217,000
Backdate stock
option711%637,581162,320936,9742,500,00025,000
Misconduct
inventory69%4,242,800973,1006,257,14315,000,00025,000
Watch Out for Pro Forma
Pro forma reporting, in which companies provide investors a
choice in reported income numbers, is popular among
companies in the S&P 500. For example, in 2008–2009, in
addition to income measured according to generally accepted
accounting principles (GAAP), nearly 50 percent of S&P 500
companies also reported an income measure that is adjusted for
certain items. Companies make these adjustments because they
believe the items are not representative of operating results.
How do these pro forma numbers compare to GAAP? As shown
in the chart below, ap-proximately 30 percent of the S&P 500
companies report pro forma income in excess of operating
income in the third quarter of 2009. In general, pro forma
profits were 18 percent higher than operating earnings.
Characteristic of pro forma reporting practices is Amazon.com.
It has adjusted for items such as stock-based compensation,
amortization of goodwill and intangibles, impairment charges,
and equity in losses of investees. All of these adjustments make
53. pro forma earnings higher than GAAP income. In its earnings
announcement, Amazon defended its pro forma reporting,
saying that it gives better insight into the fundamental
operations of the business.
Some raise concerns that companies use pro forma reporting to
deflect investor attention from bad news. Skeptics of these
practices often note that these adjustments generally lead to
higher adjusted net income and, as a result, often report
earnings before bad stuff (EBS). In addition, they note that it is
difficult to compare these adjusted or pro forma numbers
because companies have different views as to what is
fundamental to their business.
In many ways, the pro forma reporting practices by companies
like Amazon represent implied criticisms of certain financial
reporting standards, including how the information is presented
on the income statement. In response, the SEC issued
Regulation G, which requires companies to reconcile non-GAAP
financial measures to GAAP. This regulation provides investors
with a roadmap to analyze adjustments companies make to their
GAAP numbers to arrive at pro forma results. Regulation G
helps investors compare one company's pro forma measures
with results reported by another company.
The FASB (and IASB) are working on a joint project on
financial statement presentation to address users' concerns
about these practices. Users believe too many alternatives exist
for classifying and reporting income statement information.
They note that information is often highly aggregated and
inconsistently presented. As a result, it is difficult to assess the
financial performance of the company and compare its results
with other companies. This trend toward more transparent
income reporting is encouraging, but managers still like pro
forma reporting, as indicated by a recent survey in response to
the FASB financial statement presentation project. Over 55
54. percent polled indicated they would continue to practice pro
forma reporting, even with a revised income statement format.
Source: A. Stuart, “A New Vision for Accounting: Robert Herz
and FASB Are Preparing a Radical New Format for Financial
Statements,” CFO Magazine (February 2008), pp. 49–53. See
also SEC Regulation G, “Conditions for Use of Non-GAAP
Financial Measures,” Release No. 33-8176 (March 28, 2003)
and Compliance & Disclosure Interpretations: Non-GAAP
Financial Measures (January 15, 2010), available at
www.sec.gov/divisions/corpfin/guidance/nongaapinterp.htm.