Download as pdf or txt
Download as pdf or txt
You are on page 1of 70

Managerial Auditing Journal

Fraud auditing
Rocco R. Vanasco
Article information:
To cite this document:
Rocco R. Vanasco, (1998),"Fraud auditing", Managerial Auditing Journal, Vol. 13 Iss 1 pp. 4 - 71
Permanent link to this document:
http://dx.doi.org/10.1108/02686909810198724
Downloaded on: 03 March 2015, At: 06:10 (PT)
References: this document contains references to 405 other documents.
To copy this document: permissions@emeraldinsight.com
The fulltext of this document has been downloaded 11193 times since 2006*
Users who downloaded this article also downloaded:
William Hillison, Carl Pacini, David Sinason, (1999),"The internal auditor as fraud-buster", Managerial Auditing Journal, Vol.
14 Iss 7 pp. 351-363 http://dx.doi.org/10.1108/02686909910289849
Harold Hassink, Roger Meuwissen, Laury Bollen, (2010),"Fraud detection, redress and reporting by auditors", Managerial
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Auditing Journal, Vol. 25 Iss 9 pp. 861-881 http://dx.doi.org/10.1108/02686901011080044


Rani Hoitash, Ariel Markelevich, Charles A. Barragato, (2007),"Auditor fees and audit quality", Managerial Auditing Journal,
Vol. 22 Iss 8 pp. 761-786 http://dx.doi.org/10.1108/02686900710819634

Access to this document was granted through an Emerald subscription provided by 294800 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service
information about how to choose which publication to write for and submission guidelines are available for all. Please
visit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
Emerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of
more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online
products and additional customer resources and services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication
Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.

*Related content and download information correct at time of download.


Fraud auditing

Rocco R. Vanasco
Director, Center for Internal Auditing Studies, National-Louis University, Chicago,
Illinois, USA

This paper examines the role For Elliot and Willingham (1980), financial
of professional associations, Introduction fraud is the “deliberate fraud committed by
governmental agencies, and Fraud is an ever-present threat to the effec- management that injures investors and credi-
international accounting and tive utilization of resources and hence will tors through materially misleading financial
auditing bodies in promulgat- always be an important concern of manage- statements.”
ing standards to deter and ment (Brink and Witt, 1982). The Institute of Internal Auditors (1985), in
detect fraud, domestically its SIAS No. 3, Deterrence, Detection, Investi-
Chandler et al. (1995), in their article titled
and abroad. Specifically, it gation, and Reporting of Fraud, has referred
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

“Changing perceptions of the role of the com-


focuses on the role played by to fraud as encompassing “an array of irregu-
pany auditor, 1880-1940” believe that the prob-
the US Securities and larities and illegal acts characterized by
lems facing the auditing profession today
Exchange Commission (SEC), intentional deceptions. It can be perpetrated
may stem from the ostensible obsession with
the American Institute of for the benefit or the detriment of the organi-
fraud detection shown by some Victorian era
Certified Public Accountants zation.”
practitioners. This obsession created an
(AICPA), the Institute of The National Commission on Fraudulent
expectation gap among the public. Emphasiz-
Internal Auditors (IIA), the Financial Reporting (1987) defines fraudulent
ing fraud detection as the primary audit
Institute of Management financial reporting as an “intentional or
objective lasted until the 1930s, when the
Accountants (IMA), the Asso-
principal audit objective became the verifica- reckless conduct, whether by act or omission,
ciation of Certified Fraud
tion of the accounts. that results in materially misleading finan-
Examiners (ACFE), the US
According to the 1921 edition of Spicer and cial statements.”
Government Accounting
Pegler’s Practical Auditing, the principal The American Institute of Certified Public
Office (GAO), and other
reason for instituting an audit are to detect Accountants (1988), in its SAS No. 53, The
national and foreign profes-
fraud and errors. Walker (1993) observed that Auditor’s Responsibility to Detect and Report
sional associations, in pro-
auditors have become less interested in Errors and Irregularities, introduced the
mulgating auditing standards
detecting fraud. There is evidence that audi- term irregularities to describe intentional
and procedures to prevent
fraud in financial statements tors do not regard the reporting of significant misstatement of financial statements (man-
and other white-collar crimes. audit observations to stakeholders as an agement fraud) and theft of assets (employee
It also examines several fraud integral part of the audit and accept no fraud).
cases and the impact of responsibility for the audited financial state- Sawyer (1988) views fraud as a false repre-
management and employee ments. In general they are not overly con- sentation or concealment of material fact to
fraud on the various business cerned with detecting fraud and errors. induce someone to part with something of
sectors such as insurance, In the late 1940s, the external auditors did value. For Arens and Loebbecke (1994), fraud
banking, health care, and not assume a direct responsibility for fraud occurs when “a misstatement is made and
manufacturing, as well as the because of their inability to detect fraud there is both the knowledge of its falsity and
role of management, the involving unrecorded transactions, theft, and the intent to deceive.” For Wallace (1995),
boards of directors, the audit other irregularities. This was done to shield fraud is “a scheme designed to deceive; it can
committees, auditors, and accounting firms from lawsuits holding them be accomplished with fictitious documents
fraud examiners and their responsible from frauds (Brink and Witt, and representations that support fraudulent
liability in the fraud preven- 1982). financial statements.” For Flesher (1996),
tion and investigation. Fraud has attracted the attention for schol- fraud means “dishonesty in the form of inten-
ars, investigators, auditing and accounting tional deceptions or a willful misrepresenta-
associations, and government agencies, tion of fact.” For Albrecht (1996a), every fraud
nationally and internationally. Fraud’s many consists of three elements:
definitions include those given below. 1 theft act which involves taking cash, inven-
Prosser (1971) describes the elements of tory, information, or other assets manu-
fraud as follows: ally, by computer, or by telephone;
• false representation of a material fact; 2 concealment which involves the steps
• representation made with knowledge of its taken by the perpetrators to hide the fraud
Managerial Auditing Journal falsity; from others; and
13/1 [1998] 4–71 • a person acts in the representation; and 3 conversion which involves selling or con-
© MCB University Press • the person acting is damaged by his/her verting stolen assets into cash and then
[ISSN 0268-6902] reliance. spending the cash.
[4]
Rocco R. Vanasco Fraud rulings on management’s and audi- Colorado nearly US$1 million in taxes,
Fraud auditing tors’ liability are of great concern to boards of penalties, and investigation costs.
Managerial Auditing Journal directors, audit committees, management, • Based on information from the US Cham-
13/1 [1998] 4–71 independent auditors, internal auditors, ber of Commerce, Davia et al. (1992) esti-
fraud examiners, and regulatory agencies. mated that the cost of fraud in the USA
The American Association of Certified Public exceeds US$100 billion dollars annually.
Accountants (AICPA), the Institute of Inter- They wonder whether or not anyone is
nal Auditors (IIA), the Association of Certi- “watching the store.”
fied Fraud Examiners (ACFE), and other • KPMG Peat Marwick surveyed the 2,000
regulatory agencies have taken bold steps in largest companies in the USA to assess the
condemning fraudulent and unlawful acts in extent of fraud in US corporations (1993).
their regulations, codes of conduct, and audit- These include manufacturers, insurance
ing standards. companies, health care organizations, utili-
Several frauds reported in the last few ties, and consumer products companies. Of
decades have led the government and the the 330 responding companies, 26 percent
auditing profession to rethink and re-engi- acknowledged that they had experienced
neer their audit tools and procedures to safe- fraud during the previous 12-month period.
guard corporate assets better. Furthermore, The average cost to the company was
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

the cost of litigation of fraud cases has cre- US$200,000 per incident.
ated a new wave of scandals and the auditors’ • The Wall Street Journal (1994a) reported
liability has skyrocketed in billions of dollars that Montedison, the Italian food and chem-
as attested from the following events: ical group, filed a suit against its former
• An editorial in Fortune (1978) reported that auditor Price Waterhouse, Italy, seeking
increased time pressure has led indepen- damages of more than one trillion lire
dent auditors to do a sloppy job in their (US$610 million). The suit seeks to recoup
audits. Out of 1,100 practitioners, 58 percent losses stemming from alleged “serious
had indicated that they had signed off on a negligence” in Price Waterhouse’s account-
required audit step without completing the ing from 1983-1992.
work or noting the omission. • Schmitt and Berton (1994) reported in The
• Thornhill (1985) observed that the US mili- Wall Street Journal that Deloitte agreed to
tary is defrauded by US$500 million to US$1 pay US$312 million to settle US claims
billion a year by unscrupulous contractors. related to S&L failure. The 18 pending law-
• The Institute of Financial Crime Preven- suits were seeking over US$14 billion for
tion (1986) reported that situation pres- theft-related work in the 1980s. The account-
sures, opportunities to commit fraud, and ing firm also agreed to provide training and
personal integrity are the three variables supervision for partners auditing financial
influencing the likelihood of fraud. Of all statements.
internal thefts 80 percent are committed by • Gardner (1996) reported in The White Paper
one employee acting alone. that GAO has estimated that total year loss
• Thomas (1990a) reported that fraud has to Medicare because of fraud and abuse is
caused billion dollar losses to financial approximately US$47 billion, or 10 percent
institutions and greatly increased the of total Medicare spending.
number of lawsuits. The Lincoln Savings In 1988, Berton reported in The Wall Street
and Loan Association and the so-called Journal that the malpractice claims against
“Keating five” lost US$2.3 billion in 1990s the accountants totaled US$1 billion; by
second quarter. The 2,500 S&Ls posted including the charges brought under RICO
US$271 million in losses in the first quarter cases, it would add up to US$4 billion in
of 1990. Rankin (1990) also reported that two claims. In 1992, it was estimated that there
of the Big Six firms face over US$13 billion were about US$30 billion in damage claims
in damages from related lawsuits. facing the profession as a whole.
• Schmedel and Berton (1992) reported a tax On 6 August 1992, the Big Six firms, over-
scandal in the Wall Street Journal concern- whelmed by the cost of litigation of cases
ing the Resolution Trust Corporation, a claiming auditors’ malpractice, issued a
federal thrift cleanup agency, which filed a Statement of Position entitled The Liability
US$400 million civil suit against Arthur Crisis in the United States: Impact on the
Andersen & Co. claiming that the account- Accounting Profession. The statement
ing firm was negligent in auditing the col- requests a substantive reform of both federal
lapsed Benjamin Franklin Savings Associa- and state liability laws, specifically the
tion. Andersen Consulting had failed to replacement of joint and several liability with
withhold Colorado’s income tax from the a proportionate liability. It states:
pay of 35 nonresident employees. As part of While other serious problems must also be
the civil settlement, Andersen paid addressed, the principal cause of

[5]
Rocco R. Vanasco unwarranted litigation against the profes- The survey demonstrates an “expectation
Fraud auditing sion is joint and several liability, which gap” between auditors and other segments of
governs the vast majority of actions brought the financial community about the duty to
Managerial Auditing Journal
13/1 [1998] 4–71 against accountants at the federal and state discover deliberate material defalcations of
levels. The profession is merely asking for
the financial statements. It also shows an
fairness – the replacement of joint and sev-
eral liability with a proportionate liability “expectation gap” between auditors and
standard that assesses damages against bankers and financial analysts with respect
each defendant based on that defendant’s to a number of possible auditor disclosures.
degree of fault. Proportionate liability will Lowe and Pany (1993) surveyed 141 mem-
help restore balance and equity to the liabil- bers of a municipal court jurors pool and 78
ity system by discouraging suits and giving auditors from a large international account-
blameless defendants the incentive to prove ing firm to assess their attitude toward the
their cases in court rather than settle. auditing profession. The result of the study
The chairman and senior partner at Price reveals an “expectation gap.” The jurors view
Waterhouse warned that runaway litigation the auditor’s role as that of a public watchdog
seriously undermines the ability of the finan- or guardian to the extent of expecting the
cial reporting system to provide information auditor to actively search out the smallest
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

that supports competitive decision making by fraud. Auditors disagree with this characteri-
US companies. Unrealistic expectations and zation of their task.
the risk-shifting liability system have com- Epstein and Geiger (1994) conducted a
bined to create a situation in which auditors nationwide survey of stock investors which
are viewed as absolute guarantors against revealed a startling evidence of the “expecta-
fraud, failure, and financial ruin. Unwar- tion gap” between the assurances auditors
ranted litigation and forced settlements provided on financial statements compiled by
account for the vast majority of claims management and the expectation of investors
against auditors pose a grave threat to the and other users of financial statements. Over
health of many businesses and professions 70 percent of the 246 investors surveyed
(O’Malley, 1993a). believe that auditors should be held responsi-
Berton (1992a), in his editorial entitled ble for detecting material misstatements due
“Holding accountants accountable,” discour- to fraud, and some 47 percent expect auditors
ages the notion of “safe harbor” for accoun- to provide absolute assurance that financial
tants since it might be an open door for their statements contain no material misstatement
negligence. Such safe harbor may hurt their due to errors.
reputation by conveying to the public that
they want audit fees without the commensu-
rate responsibilities. Lee (1992), in his editor- Part I: Fraud and the law
ial entitled “The audit liability crisis: they
protest too much,” believes that the In the last few decades, a plethora of fraud
contention of the Big Six US audit firms on suits have been filed under the Securities
curving unwarranted litigation is plain: Acts, the Racketeer Influence and Corrupt
They are being extorted by an unfair legal Organizations Act (RICO), and Common Law,
system, and if the public expects their con- some of which will be examined below.
tinued services, the system must be changed
so as not to interfere with the maximization The role of the securities and exchange
of their profits. The statement ignores a very commission
real audit crisis, involving enormous corpo- Auditors must recognize their responsibil-
rate failures and frauds, especially in bank- ity to the public investors by including
ing and insurance. Auditors have been management activities in their review (SEC,
found “guilty in court, have been censored 1940).
by regulators, and have had their licenses
suspended in some states, yet the Big Six To protect users of financial statements,
appear obsessed with their economic entitle- many of whom suffered great losses in the
ment as a virtual monopoly and clueless as 1929 stock market crash, the Securities and
to their need to raise their professional Exchange Commission (SEC) adopted the
standards.
1932 New York Stock Exchange rule requiring
Barron et al. (1977) conducted a nationwide all companies, whose stock was listed by the
survey to elicit views within the financial Exchange, to furnish their shareholders
community on two major issues: audited financial statements at least annually.
1 the auditor’s responsibility for detecting The SEC has been very active in protecting
corporate irregularities and illegal acts; the public interest since its inception and has
and questioned the role of the auditing and
2 the auditor’s responsibility for disclosing accounting profession when faced with mate-
irregularities and illegal acts. rially misstated financial statements in
[6]
Rocco R. Vanasco violation of the securities laws. The SEC has • Auditors should be responsible for detect-
Fraud auditing not hesitated to prosecute corporations and ing gross misstatements whether resulting
Managerial Auditing Journal auditors in several cases of fraudulent finan- from collusion or otherwise.
13/1 [1998] 4–71 cial statements. The SEC’s proceedings are • Auditors must recognize their responsibil-
based on the following 1933 and 1934 securi- ity to the public investors by including
ties laws. management activities in their review.
Section 11(a) of the Securities Act of 1933
In the 1941 fraud case of United States v.
states that both the company filing the regis-
White, the auditor was convicted of criminal
tration and its auditors may be held liable to
fraud under Section 17 of the Securities Act of
the initial purchasers of the securities in the
1933 for his failure to disclose several
event that the registration statement is found
instances of questionable accounting prac-
to contain material misstatements or omis-
tices in connection with the registration
sion.
statement (Boyton and Kell, 1996).
The Securities Exchange Act of 1934
In 1942, the SEC promulgated Rule 10b-5
expands coverage to subsequent purchasers
which states:
and sellers of stock. For many years, the It shall be unlawful for any person, directly
accountants’ liability for issuing unqualified or indirectly, by the use of any means or
opinions on misstated financial statements
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

instrumentality of interstate commerce or


seems to be under Section 18 of the 1934 Act mail, or of any national securities exchange:
which states: • to employ any device, scheme, or artifice
Any person who shall make or cause to be to defraud;
made any statement in any application, • to make any untrue statement of a mate-
report, or document filed pursuant to this rial fact or to omit to state a material
title … which statement was at the time and fact necessary in order to make the
in the light of the circumstances under statement not misleading; or
which it was made false or misleading with • to engage in any act, practice, or course
respect to any material fact, shall be liable to of business which operates or would
any person (not knowing that such state- operate as a fraud or deceit upon any
ment was false or misleading) who, in person in connection with the purchase
reliance upon such statement, shall have or sale of any security (17 CFR 240.10b-
purchased or sold a security at a price which 5).
was affected by such statement, for damages
Under clauses (a) and (c) of Rule 10b-5, the
caused by such reliance, unless the person
courts may impose liability on directors,
sued shall prove that he acted in good faith
and had no knowledge that such statement officers, and professional advisers for fraudu-
was false or misleading (11 USC 78, 1970). lent acts that intentionally deceive a corpora-
tion’s existing and potential stockholders and
For the SEC, financial statements are materi- creditors. Clause (b) does not specifically
ally misstated if: state that the untrue statement or omission of
a substantial likelihood exists that a reason- fact had to be made with the intention to
able shareholder would consider it impor-
defraud. No express statute of limitations
tant in making an investment decision or it
applies to Rule 10b-5. Court cases in 1967
would have significantly altered the total
information mix available. made it clear that privity was not required in
10b-5 cases (Wallace, 1995).
The following cases illustrate the SEC’s deter- In the fraud case of United States v.
mination to curb fraudulent acts that injure Benjamin, 328 F. 2d 824,863 (2d Cir. 1964), the
the public interest. auditor was convicted in a criminal action
In 1939, the SEC conducted hearings which under Section 24 of the 1933 Securities Act for
disclosed that the audited financial state- his failure to exercise due diligence that
ments of McKesson & Robbins, Inc., a drug would have revealed misrepresentations in
company listed in the New York Stock proforma financial statements used in con-
Exchange, contained US$19 million of ficti- junction with the sale of unregistered securi-
tious assets, about one-fourth of the total ties. On this matter, the court’s opinion
assets shown in the balance sheet. The ficti- states:
tious assets included US$10 million of nonex- In our complex society, the accountant’s
istent inventory. At that time, the standards certificate and the lawyer’s opinion can be
did not require any observation of invento- instruments for inflicting pecuniary loss
ries. In 1940, the SEC issued Accounting more potent than the chisel or the crowbar.
Of course, Congress did not mean that any
Series Release (ASR) No. 19, In the Matter of
mistake of law or misstatement of fact
McKesson & Robbins. In its release, the SEC
should subject an attorney or an accountant
suggested that auditors investigate the man- to criminal liability simply because more
agement of new clients and noted: skilled practioners would not have made
• Numerous auditing procedures require them. But Congress equally could not have
strengthening inventory procedures. intended that men holding themselves out

[7]
Rocco R. Vanasco as members of these ancient professions Equity Funding, grouped the fraudulent
Fraud auditing should be able to escape criminal liability activities into three categories:
on a plea of ignorance when they have shut 1 the creation and inflation of assets in the
Managerial Auditing Journal
their eyes to what was plainly to be seen or
13/1 [1998] 4–71 balance sheet;
have knowledge they did not possess.
2 the borrowing of cash without recording
In the fraud case of Fischer v. Kletz (known as the corresponding liability; and
Yale Express), 266 F. Supp. 180 (SDNY, 1967), 3 the creation of phony insurance which was
the company issued financial statements sold to other insurance companies.
which were materially misstated. They
reported a net income of US$1,400,000 instead The fraud case of Hochfelder v. Ernst & Ernst,
of a loss of US$1,254,000 and charged to 503 F. 2d 1110 (1974), represents a violation of
retained earnings an additional US$629,000. the Rule 10(b)-5 under the Securities
The suit was filed under Section 182 of the Exchange Act of 1934. The suit was brought
1934 Securities Act and Rule 10b-5. The court by a group of investors against the CPA firm
noted: that audited the First Securities Company of
The auditor has a duty to anyone still rely- Chicago, a small brokerage firm. The presi-
ing on his report to disclose subsequently dent had persuaded the investors to mail him
discovered errors in the report. This duty their personal checks for a fund from which
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

exists regardless of the auditor’s lack of he was to invest in escrow accounts yielding
financial interest in any transactions to high returns to the investors. It was discov-
which the information relates. The obliga-
ered later that no such escrow accounts with
tion arises because of the auditor’s special
relationship that provides access to the accounting records of the First Securities
information. Company existed. The president had diverted
the investors’ checks for his own use.
The landmark fraud case Escott v. BarChris In the United States v. Natelli, 527 F. ed 311
Construction Corporation (283 F. Suppl 643, (1975), known as the National Student Mar-
1968) represents a violation of Section 11 of keting Corporation case, two auditors were
the 1933 Securities Act. The plaintiffs claimed convicted of criminal liability for failing to
that the registration statement for deben-
properly disclose the write-off of uncollectible
tures contained materially false statements
accounts. The accompanying footnote failed
and material omissions. The court’s opinion
to indicate that regular sales for 1968 were
noted that:
overstated 20 percent and actual net earnings
• the registration statement (Form S-1) was
were only 46 per cent of the reported earn-
false and misleading; and
ings. The Court concluded that:
• the CPA firm failed to comply with gener-
• The treatment of the retroactive adjustment
ally-accepted auditing standards (GAAS).
was done intentionally to conceal errors in
The judge reprimanded the auditor for not the 1968 statements.
exercising a skeptical attitude and stated that • A professional cannot escape criminal
the auditor “was too easily satisfied with glib liability on a plea of ignorance when they
answers to his inquiries. But there were have shut their eyes to what was plainly to
enough danger signals in the materials which be seen.
he did examine to require some further inves-
tigation on his part.” A 1976 decision by the US Supreme Court in
The fraud case United States v. Simon, (425 Ernst & Ernst v. Hochfelder, 425 US 185, 96s ct
F. 2d 796, 1969), known as the Continental 1375, 47 L Ed 2d 668 (1976), marked the end of
Vending case, involved both criminal and the accountant’s liability for ordinary negli-
civil proceedings against three CPAs. The US gence under Section 10 of the 1934 Act. The
government’s case of fraud against the CPAs Court stated:
was initiated on the ground that the Conti- When a statute speaks so specifically in
nental’s audited financial statements were terms of manipulation and deception, and of
misleading. The finding by the jury that the implementing devices and contrivances –
the commonly understood terminology of
balance sheet did not present fairly Continen-
intentional wrongdoing – and when its
tal’s financial position led to the conviction of
history reflects no more expansive intent,
the three CPAs. The auditors were found
we are quite unwilling to extend the scope of
guilty, were fined US$17,000, and their the statute to negligent conduct.
licenses to practice as CPAs were revoked.
The Equity Funding fraud caused a scandal Based on the above court ruling, an auditor is
in the business community. The Wall Street no longer liable to third parties under Section
Journal (1974) reported that a financial vice- 10(b) and Rule 10b-5 of the 1934 Act for ordi-
president testified that he was ordered by the nary negligence. The auditor has no liability
firm’s chairman to inflate the profits falsely. in the absence of any intent to deceive or
Robert Loeffler, the court appointed trustee of defraud.
[8]
Rocco R. Vanasco In 1976, the SEC issued Accounting Series New York area for a 45-day period. The action
Fraud auditing Release (ASR) No. 165. Whenever an audit was triggered by the finding of a SEC law
Managerial Auditing Journal change occurs, clients must report it in Form judge that the firm engaged in “unethical and
13/1 [1998] 4–71 8-K within the prior two years: improper professional conduct” in two audits
there were any disagreements with the of US Surgical Corp, because it failed to:
former accountant on any matter of • exercise due care;
accounting principles or practices, financial • maintain the proper level of professional
statement disclosure or auditing scope or
skepticism; and
practice, which disagreement if not resolved
to the satisfaction of the former accountant
• resolve the serious question of client
would have caused him to make reference in integrity before certifying the financial
connection with his report on the subject statements.
matter of the disagreement.
The alleged misconduct resulted in the
In cases of management fraud, the auditor issuance of unqualified audit reports on state-
should resign from the audit engagement. ments that were incorrect for significantly
In United States v. Weiner, 578 F. 2d 757 (9th overstating income.
Cir. 1978), three auditors of Equity Corpora- To deter auditors’ involvement in fraudu-
tion of America were convicted after a jury lent financial statements, the SEC can initiate
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

trial of multiple counts of securities fraud administrative proceedings against auditors


and filing false statements with the SEC. The under Administrative Rule 2(a) which states:
case involved the auditors’ failure to detect The Commission may disqualify and deny,
that US$2 billion of the company’s US$3.5 temporarily or permanently, the privilege of
billion of assets were fraudulently obtained appearing or practicing before it to any
accountant who:
through computer-produced, bogus insur-
• does not possess the requisite qualifica-
ance policies. In addition to criminal convic-
tions to represent others;
tions against the three auditors, five account- • is lacking in character or integrity; and
ing firms paid US$44 million in damages. At • is engaged in unethical or improper
Equity Funding, many employees knew about professional conduct, willfully aiding
the fraudulent activities and even partici- and abetting the violation of any provi-
pated in the fraud (Boynton and Kell, 1996). sion of the federal securities laws.
In Cenco Inc. v. Seidman & Seidman, 686 F.
Sommer (1975) refers to a SEC chairman’s
2d 449 (7th Cir. 1982), the defendants were
reasoning behind the issuance of injunctive
charged with violating SEC Rule 10b-5 and
proceedings against public accountants:
several federal securities laws. The case dealt
Put very simply, when the Commission
with the auditors’ failure to detect US$25 discerns that the auditor has not been alert
million inventory fraud perpetrated by top to his duty, that he has gone through an
management. In this particular case, the exercise by rote, or that has not been true to
judge made a distinction between manage- the duty of fair presentation, then in my
ment fraud and employee fraud: estimation, the Commission should prop-
• Auditors are not detectives hired to ferret erly authorize an action to enjoin the
out fraud. accountant from a repetition of those faults.
• Auditors must investigate if they suspect In 1991, the SEC investigated Guarantee Secu-
fraud; but in this case, the former manage- rity Life Insurance Co., the brokerage firm of
ment made fraud difficult to detect because Merrill Lynch, and the auditors of Coopers &
two executives turned the company “into Lybrand regarding a malpractice of related-
an engine of theft against outsiders.” party transactions. In 1993, Price Waterhouse
In 1984, the Wall Street Journal reported that (PW) successfully fought off allegations of
the SEC challenged InterFirst’s claim of audit fraud brought by the SEC in a Southern
US$54 million in tax benefits from a net oper- District of New York bench trial. The SEC had
ating loss carry-forward. The SEC questioned alleged that PW violated and aided in the
the claim, which was supported by the Inter- violation of antifraud provisions of the Secu-
First’s outside auditor, Arthur Andersen. rities Act of 1933 and the Securities Act of
Wallace (1995) observed that this is indicative 1934 in auditing AM International for the
of the close, advocate-type relationship fiscal year ending July 31, 1980. The court
depicted by the media between auditors and rejected the “SEC’s expertise on practically
their clients, which emphasizes disagree- all contested accounting or auditing issues”
ments with regulators and government agen- and adopted a liability rule in an SEC injunc-
cies. tion action most favorable to the accounting
In 1990, Accounting Today reported that in profession (Seamons, 1993).
an administrative proceeding, the SEC The most troublesome aspect of the audit-
barred a big six public accounting firm from ing profession is that some companies can get
accepting any new SEC engagement in the away if they set their minds in perpetrating
[9]
Rocco R. Vanasco fraud even if a major accounting firm is mon- investment is paid out of funds from new
Fraud auditing itoring the company’s books and annual investors in order to lure the victim into
Managerial Auditing Journal reports. The SEC reported that in 1991 and bigger risks.) The SEC alleged that the defen-
13/1 [1998] 4–71 1992, four top executives at the former dants made misleading claims in newspaper
Jamaica Water Power of Purchase, New York, ads, promising investors unrealistic high
invented fake assets and overstated the value rates of return in questionable investments.
of others in order to sell stock and collected A judge in the Federal District Court in Wash-
bonuses based on grossly overstated profits. ington issued a restraining order against the
The profits were reported in financial state- named companies (Antilla, 1995).
ments audited by the accounting firm of To prevent securities fraud, the SEC issued
Ernst & Young. Even after the company’s new disclosure rules in 1996. These rules aim
president had brought in another accounting at eliminating the watering down of stock
firm, Deloitte & Touche, to investigate the through false issuing to lure investors. This
suspicious figures, nothing much was done practice started in the nineteenth century,
(Norris, 1995). when Daniel Drew did this with the Erie
In 1994, the SEC filed a complaint against Railroad stocks (Donlan, 1996).
former Comptronix chairman William On October 14, 1996, Barron’s reported that
Hebding, former president Allen Shifflett, both the SEC and NASDAQ investigated
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

and former controller J. Paul Medlin, accus- Novatek International. It is believed that the
ing them of overstating Comptronix profits medical-products marketing concern was
and then trying to hide the fraud from the largely a stock rig perpetrated by its control-
company’s independent auditors and board. ling shareholder, ex-convict William Trainor.
The former company officials have agreed to The company has filed for Chapter 11 bank-
repay investors about US$1.1 million in order ruptcy protection (Laing, 1996).
to settle fraud and insider trading charges In November 1996, the SEC filed the first
(New York Times, 1994a). suit to halt securities manipulation over the
In 1994, the SEC filed a civil fraud against Internet. At the agency’s request, a federal
Marvin G. Basson, a certified public accoun- judge in Washington froze the assets of
tant, who allegedly conspired to commit secu- Charles O. Huttoe, the chairman of Systems
rities fraud by certifying financial statements of Excellence, and the assets of Theodore R.
that: “fraudulently overstated Towers’ assets, Melcher Jr and Shannon B. Terry, operators
revenue, and income.” In April 1994, Towers of an electronic newsletter, SGA Goldstar.
and its founder, Steven Hoffenberg, were The SEC complained that the newsletter
indicted on criminal fraud charges. The for- writers, in cahoots with Huttoe, touted the
mer vice-president, Charles Chugerman, company over the Internet. When the stock
pleaded guilty to criminal fraud charges for price took off, investigators say, the writers
doctoring computer runs and otherwise falsi- and Huttoe dumped the shares. Kenneth
fying Towers books to mislead investors and Lench, the SEC branch chief of the investiga-
ratings services about Towers’ financial tion warned that “investors should be wary of
health (New York Times, 1994a; Wall Street biases of people who recommend securities,
Journal, 1994b). particularly when they are anonymous”
In 1995, the SEC filed a complaint in Federal (Hannon, 1996).
District Court in Manhattan against Soft- The SEC’s Regulation S prohibits the sale of
point, a Nevada company. The SEC alleged Reg S stock by US corporations to foreigners.
that Softpoint’s officers had engaged in an In 1996, a federal jury found Arthur Feher Jr
international complex fraud. Softpoint, guilty of criminal fraud for issuing new Reg S
which develops and sells a computer-driven shares to a Canadian (Palmer, 1996).
cash register, issued 420,000 shares to a group
of “fictitious” foreign companies. Most of The racketeer influenced and corrupt
those shares, which the foreign firms bought organizations act
at a discount, were then resold to US RICO claims against accountants were
investors, raising US$1.72 million, most of unheard of, but presently fifty such cases
involving claims against large and local CPA
which went back to Softpoint (Eichenwald,
firms are filed (Wallace, 1995).
1995).
The same year, the SEC filed charges In 1970, the US Congress enacted the Racke-
against Bankers Alliance Corporation, Carpe teer Influenced and Corrupt Organizations
Diem International, Lee Financial, and Act (RICO) as a weapon against mobsters and
related companies in an operation that SEC racketeers who were influencing legitimate
termed a Ponzi scheme. (The Ponzi scheme, business. The act defines the term “racketeer-
named after Charles Ponzi, the organizer of ing activities” to include crimes such as mail
such scheme in the USA in 1919-20, is a swin- fraud and fraud of the sale of securities. The
dle in which a quick return on an initial RICO Act provides treble damages in civil
[ 10 ]
Rocco R. Vanasco cases brought under the Act. For civil cases, million in actual damages and as much as
Fraud auditing the standard of proof requires a “preponder- US$1 million in punitive damages, or five
Managerial Auditing Journal ance of evidence.” The plaintiff must prove times the firm’s malpractice insurance cover-
13/1 [1998] 4–71 that the defendant: age. The defendant is reported to have
• employed any device to defraud; reached out-of-court settlements approaching
• made untrue statement of material fact or US$50 million.
omitted material fact; Welton (1988) compared both Federal and
• engaged in act, practice, or course of busi- State RICO statutes as they affect accoun-
ness to commit fraud or deceit in connec- tants. He concluded that the cumulative effect
tion with purchase or sale of securities. of litigation under federal and one or more
state RICO statutes could lead to catastrophic
Plaintiff must also prove: damages sustained;
liability of up to 39 times the actual damages.
material misstatement or omission; reliance;
In 1990, Laventhol & Horvath was the first
and scienter. For criminal cases, the standard
of proof is “beyond a reasonable doubt.” Sec- big accounting firm to be found guilty of a
tion 32(a) establishes criminal liability for RICO charge in a case involving the audit of a
“willfully” and “knowingly” making false or federal tax-shelter program. The accounting
misleading statements in reports under the firm collapsed and its former partners agreed
to pay US$48 million to avoid personal bank-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

1934 Act. This section also provides for crimi-


nal penalties for violating the antifraud pro- ruptcy.
visions of Section 10(b) consisting of fines of In 1991, Berton and Truell reported in the
not more than US$100,000 or imprisonment of Wall Street Journal that a class action lawsuit
not more than five years or both. was filed against Price Waterhouse in federal
The Schacht v. Brown fraud case (1983) was court in Los Angeles on behalf of BCCI’s 1.2
the first audit failure case brought under million depositors seeking multibillion dollar
RICO. Three separate auditing firms were treble damages under the RICO Act. Price
found liable for alleged damages of US$100 Waterhouse was paid at least US$4 million for
million for “fraudulent prolongation of the work performed for BCCI in the USA.
corporation’s life beyond solvency.” Plaintiff In 1992, investors’ rights to sue a company’s
claimed that each CPA firm knew of the sub- auditors for alleged securities fraud and
sidiary company’s insolvency. Each auditing violations under the RICO Act has been
firm issued nonetheless unqualified financial upheld by the US District Court for the South-
statements from 1974 through 1977 (Boynton ern District of Florida. In Sahlen & Associ-
and Kell, 1996). ates, Inc., investors in Sahlen & Associates
In 1985, the US Supreme Court heard the brought suit against defendants that includes
case of Sedima v. Imrex and approved the auditor KPMG Peat Marwick after Sahlen
expansive scope to which RICO was being declared bankruptcy and its stock became
applied to cover cases involving legitimate worthless. The court ruled the allegations
business enterprises and individuals affili- that generally accepted auditing standards
ated with those enterprises. The Court con- had been violated, along with allegations that
ceded that RICO may have evolved into some- KPMG knew of or recklessly ignored other
thing quite different from the original con- irregularities, were sufficient to sustain a
ceptions of its enactors, but concluded that Rule 10b-5 claim under the Securities
“this defect – if defect it is – is inherent in the Exchange Act of 1934. The court also ruled
statute as written and its correction lies with that investors could bring a RICO action
Congress.” against KPMG, as RICO requirements were
Back in 1986, Martha Brannigan and satisfied by allegations that multiple mis-
Richard Koening reported in The Wall Street statements to investors were made to further
Journal that nine were indicted in the fraud a scheme to defraud (Balinga, 1992).
case of ESM Government Securities Litigation In 1993, the US Supreme Court heard the
v. Alexander Grant & Co. under the RICO case of Reves v. Ernst & Young, which
jurisdiction. This case involved Jose L. involved investors’ losses related to a farm-
Gomez, a former manager/partner of Alexan- ers’ co-operative that went bankrupt, and
der Grant & Co., who pleaded guilty to know- ruled that RICO “requires some participation
ingly approving ESMs false financial state- in the operation or management of the enter-
ments from 1978 through 1984, thus allowing a prise itself ” (Bergstrom and Morrison, 1993).
fraud that reached US$320 million in losses to In 1994, the Teamsters Union filed a US$22
investors. In 1987, Brannigan also reported million lawsuit in the US District Court in
that Gomez continued to participate in the Minneapolis against Midwest Motor Express,
fraud because of his inability to face up to accusing the Bismarck, ND, trucking com-
having made a mistake. Berton (1986) pany of fraud under the Racketeer Influenced
reported in The Wall Street Journal that and Corrupt Act (RICO). The Teamsters
Alexander Grant & Co. faced claims of US$300 alleged that Midwest embezzled millions of
[ 11 ]
Rocco R. Vanasco dollars from its employees and that the com- and on the basis of the evidence gathered
Fraud auditing pany defrauded workers of wages and bene- could have and should have noted these
Managerial Auditing Journal fits under the guise of saving the company defalcations.
13/1 [1998] 4–71 (Schulz, 1994). In 1995, Midwest Motor The message of this fraud case is simple;
Express won the case against the Teamsters
although the contract does not call for an
Union. Judge Patrick Conmy of US District
audit examination or detection of fraud, audi-
Court of North Dakota, Southwestern Divi-
tors should be responsible for disclosing
sion, said there is no factual basis to support
circumstances causing them to believe fraud
the Teamsters’ contention that Midwest used
exists.
mail services with the intent to defraud
In the 1982 fraud case of Fund of Funds, Ltd
employees (Schulz, 1995).
In 1996, the Wall Street Journal reported v. Arthur Anderson & Co., the plaintiff sued
that Federal Judge Michael B. Mukasey of the the auditors for breach of contract because
US District Court for the Southern District of the auditors failed to disclose irregularities
New York dismissed all racketeering charges totaling US$120 million to the client when the
against Arthur Andersen & Co. in lawsuits auditors’ engagement letter contained a spe-
involving the DeLorean Motor Co. Mukasey cific representation that any irregularities
would be revealed. Anderson admitted dis-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

retained portion of the suits alleging negli-


gence and fraud by the accounting firm as covery of the violation of the contract in
DeLorean’s auditor (Berton, 1996). auditing King Resources Corporation, but
declined to disclose the irregularities to Fund
Common law liability of Funds because of the AICPA’s Ethics Rule
Fraud stories seem almost like soap operas. 301 that prohibits disclosure of confidential
The faces and sets change, and plots can information (Boynton and Kell, 1996). The
take on surprising twists; but in both cases jury found Arthur Anderson liable for aiding
corruption and ruination unfortunately
and abetting violations of securities laws
seem omnipresent (Graham, 1996).
(Rule 10b-5) and common law fraud because of
Auditors are accountable not only under the their failure to disclose their knowledge of
1933 Act and RICO statute, but also under King Resources’s wrongdoing to Fund of
common law for materially misstated finan- Funds Limited. In addition, the jury found
cial statements. Common law is based on the accounting firm guilty of breach of con-
judicial precedents rather than legislative tract because they did not comply with the
enactment. The judge has the legislative specific representation in their engagement
flexibility to consider social, economic, and letter. The plaintiff was awarded damages of
political issues as well as prior case law. In US$81 million.
fraud cases, auditors are accountable for
breach of contract. Under the Tort Law, audi- Ordinary negligence
tors are also accountable for ordinary negli- Ordinary negligence is the failure to exercise
gence, gross negligence, and fraud. the due care that a reasonable, prudent
person would exercise in the same circum-
Breach of contract
stances.
Auditors’ liability in fraud cases arises from
breach of contract when they: issue standard In 1939, in the Matter of Interstate Hosiery
reports which do not comply with GAAP; do Mills Inc. (4 SEC 706, at 713), the court felt that
not deliver the audit report by the agreed- the auditor was negligent in carrying out his
upon date; or violate the clients confidential- duty. A prudent practitioner must recognize
ity relationship. unfamiliar situations and take such precau-
In the 1971 fraud case of Tenants’ Corpora- tionary measures as warranted by the cir-
tion v. Max Rothenberg, the co-operative sued cumstances. In such instances, the auditor
the auditors for alleged failure to detect defal- should adopt extra precautions and a skepti-
cation under two alternatives: cal attitude:
1 breach of contract to perform an audit; and On the other hand, he did not attempt to
2 negligence in failing to exercise due care translate the pounds and bale figures in
in performing the audit and in complying their confirmations into dollars for compar-
with GAAS. ison with the inventory recapitulations,
which was among the working papers.
The trial court in New York found the audi- Indeed, he was not familiar with the market
tors were engaged to perform an audit and price of silk and never inquired concerning
were negligent in not doing so. The court it, accepting Marien’s pricing without ques-
noted: tion and relying entirely upon Marien’s
Regardless of whether the auditors received representation that the total inventory
the invoices for purposes of audit or other- figure agreed with the corporation’s own
wise, they had a duty to detect defalcations records.

[ 12 ]
Rocco R. Vanasco In the Amoco Chemical Corp. v. Hill, Del Super that auditors have a responsibility not only to
Fraud auditing (318 A. 2d 617), the court defined negligence their clients but also to investors and others
Managerial Auditing Journal as: relying on audited financial statements.
13/1 [1998] 4–71 the failure to employ such care as a reason- In 1985, the New York Court of Appeals
ably prudent and careful person would use rejected the foreseeable standard in Credit
in similar circumstances; it is the doing of
Alliance Corporation v. Arthur Andersen &
an act that a person of ordinary prudence
would have done under similar circum-
Co. The court established three criteria for
stances. determining whether a plaintiff can bring a
claim against auditors for ordinary negli-
The court rulings on fraud cases seem to gence:
indicate that auditors have potential liability 1 the plaintiff did in fact rely on the audi-
for ordinary negligence to primary beneficia- tors’ report;
ries for whose benefit they intend to provide 2 the auditors knew that the plaintiff
the information, and foreseen beneficiaries
intended to rely on their report; and
for whom they know the client will provide
3 the auditors, through some action on their
information. This also reflects the view of the
part, evidenced understanding of the
American Law Institute, in its Restatement of
plaintiff ’s intended reliance.
Torts (1977, No. 552).
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Court rulings on auditors’ responsibility In the 1986 fraud case of International


and liability on fraud cases is not consistently Mortgage Co. v. John P. Butler Accountancy
applied. Corp., the California Appeals Court favored
They may be dependent on the judge’s the third party. Auditors issuing an unquali-
interpretation and other circumstances as is fied opinion on misstated financial
evidenced in the following fraud cases. statements can be sued by third parties.
In 1968, the court ruled in the Rhode Island In 1992, the US District Court for the North-
fraud case of Rusch Factors v. Touche holding ern District of California, in the case of
auditors responsible for “careless financial Software Toolworks, Inc. Securities Litigation,
misrepresentations relied upon by actually granted a summary judgment to Deloitte &
foreseen and limited classes of persons” when Touche in connection with a public stock
ordinary negligence is proven. The court offering by Software Toolworks. Deloitte had
noted: audited financial statements that were incor-
Why should an innocent reliant party be
porated in Toolworks’ prospectus for the
forced to carry the weight and burden of an
accountant’s professional misconduct? Isn’t offering, and investors alleged that those
the risk of loss more easily distributed and statements had made improper inclusions in
spread by imposing it on the accounting a revenue category. In granting summary
profession, which can pass the cost of insur- judgment, the court pointed out that Deloitte
ing against the risk on its customers, who had performed extensive testing of
can in turn pass the cost onto the entire Toolworks’ revenue recognition procedures
consumer ublic? (Software Toolworks, 1992).
In 1969, the Iowa Supreme Court held in Ryan Gross negligence
v. Kanne that third parties could recover from
Gross negligence is the failure to use even
auditors for ordinary negligence when the
slight care in the circumstances. Auditors
audit was known to benefit identified parties
acted carelessly and recklessly in conducting
before the auditor’s report was issued.
the audit.
In 1972, in the case of Rhode Island Hospital
In the 1938 fraud case of State Street Trust
Trust National Bank v. Swartz, the court held
Co. v. Ernst & Ernst, the auditors failed to
auditors liable for ordinary negligence to
assess the collectibility of the accounts
third parties even if they expressed a dis-
claimer on the related financial statements. receivable. The court recognized the liability
The negligence arises for failing to explain to third parties due to the auditors’ gross
fully the reasons for the disclaimer of opinion negligence and reckless misstatements which
and the effect this information would have in constituted gross negligence. Later, the Third
the financial statements. Circuit Court in McLean v. Alexander (599 F
In the 1983 fraud case of Citizens State Bank 2d 1190 -3d Cir. 1979) defined recklessness as:
v. Timm, Schmidt & Co., the court held the Highly unreasonable conduct involving not
merely simple, or even inexcusable negli-
tortfeasor liable for foreseeable consequences:
A tortfeasor is fully liable for all foreseeable gence, but an extreme departure from the
consequences of his act except as these standards of ordinary care, and which pre-
consequences are limited by policy factors. sents a danger of misleading buyers or sell-
ers that is either known to the defendant or
In the 1983 New Jersey fraud case of is so obvious that the actor must have been
H. Rosenblum, Inc. v. Adler, the court held aware of it.

[ 13 ]
Rocco R. Vanasco In one of the first fraud cases of Ultramares violations, bid rigging, securities violations,
Fraud auditing Corp v. Touche (255 NY 170, 1931), the auditors price fixing, bribery, environmental viola-
Managerial Auditing Journal failed to discover fictitious accounts receiv- tions, embezzlement, mail fraud, and others.
13/1 [1998] 4–71 able. The auditors’ negligence was deemed so The Federal Sentencing Guidelines reaffirm
gross that it constituted fraud. Judge Cardozo the old legal doctrine of respondeat superior.
stated on this matter: The organization is responsible for the
If liability for negligence exists, a thought- wrongful action of its employees while acting
less slip or forgery beneath the cover of in their official capacity. Organizations may
deceptive entries may expose accountants to
minimize exposure to illegal acts by commu-
a liability in an indeterminate amount for
an indeterminate time to an indeterminate nicating to all employees and agents unethi-
class. cal behavior through training programs,
establishing proactive antifraud programs,
The court believed that gross negligence enhancing fraud awareness, and initiating
existed in this case because “in certifying to fraud compliance audits. The Sentencing
the correspondence between balance sheet Guidelines creates an extraordinary risk for
and accounts the defendants made a state- corporations. Corporations will be held crim-
ment as true to their own knowledge, when
inally responsible even if those in manage-
they had … no knowledge in the subject.”
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

ment had no knowledge of participation in


the criminal events. In the matter of US v.
US Federal sentencing guidelines
Bank of New England, WA, 921F. 2d 844, 856
The guidelines are a reaction to a natural
frustration with the criminal justice system. (1st Cir.), cert. denied, 484 US 943 (1987), a
There was a feeling that federal judges were corporation can be criminally responsible for
not giving long enough sentences to white- the collective knowledge of several of its
collar criminals and were not imposing employees even if no single employee
large enough fines (US District Judge intended to commit crime. In the matter of
Marvin Aspen, 1991). New York Central and Hudson River Railroad
The corporate sentencing guidelines were v. United States 212 US 481 (1909); Standard Oil
mandated by Congress in the Comprehensive Co. of Texas v. United States 307 F. 2d 120 (5th
Crime Act of 1984. The Act established the Cir. 1962), corporations can be held crimi-
USA Sentencing Commission (USSC) which nally responsible for criminal acts of its
issued the Sentencing Guidelines for Individu- employees, “if those acts are done in the
als in 1987. On May 1, 1991, the USSC submit- course and scope of their employment and for
ted to Congress its Proposed Guidelines for the ostensible purpose of benefiting the cor-
Sentencing Corporations which became law poration.”
on November 1, 1991. The Sentencing Com- The Guidelines assign point values to
mission added an eighth chapter “Sentencing guilty organizations based on mitigating and
of organizations” to the seven earlier chap- aggravating circumstances. The fine goes up
ters of the Federal Sentencing Guidelines. if, among other things:
According to the Sentencing Commission, the • the organization engaged in similar mis-
eighth chapter was “designed so that the conduct in the past;
sanctions imposed upon organizations and • the crime violates an existing judicial order
their agents, taken together, will provide just or injunction; and
punishment, adequate deterrence, and incen- • the organization employs a high-level
tives for organizations to maintain internal person who has a prior criminal record.
mechanisms for preventing, detecting and
reporting criminal conduct” (Sittenfeld, The fine goes down if the organization has an
1996). Under the new federal sentencing effective program to prevent or detect viola-
guidelines, fines for a felony or a certain type tions of law. Organizations may help the judge
of misdemeanor can range from US$5,000 to reduce the culpability score if they can
US$72,500,000. Upper-level management can demonstrate that such activities are self-
minimize an organization’s exposure to reporting to authorities, co-operating with
awards of this magnitude by requiring an authorities, accepting responsibilities, and
internal control structure commensurate maintaining an effective compliance pro-
with those guidelines (Fargason, 1992). gram. Mitigating factors allow for probation
Organizations were charged to respond to for organizations which have established an
Congress’ reactions to the recent fraud scan- effective anti-fraud control program that
dals regarding the Savings-and-Loan (S&L) “was reasonably designed, implemented, and
crisis of the 1980s, BCCI, and the securities enforced so generally it will be effective in
industry which were dealt too easily by the preventing and detecting criminal conduct
court system (Alpert, 1992). The new guide- (Alpert, 1992). An effective program includes
lines deal with white-collar crimes, antitrust the following criteria:
[ 14 ]
Rocco R. Vanasco • establishing a compliance program which Diligence Program of The Federal Sentencing
Fraud auditing can reasonably be expected to reduce the Guidelines requires that:
Managerial Auditing Journal prospect of criminal activity; • standards and procedures to reduce crimi-
13/1 [1998] 4–71 • assigning responsibility to specific high- nal conduct within the organization must
level individuals for overseeing compliance be in place;
with standards and procedures; • high level personnel must be in charge of
• not allowing discretionary authority to the program;
individuals who in the organization know • due care must be exercised in terms of
or should have known would have a propen- delegating authority;
sity to engage in illegal activities; • effective communication and training
• installing monitoring and auditing systems regarding standards and procedures must
designed to detect criminal conduct; be established;
• communicating standards and procedures • mechanisms for monitoring, auditing, and
to all employees and agents through train- reporting criminal misconduct must exist;
ing programs and printed materials; • consistent enforcement of standards,
• reinforcing standards consistently through including investigation and discipline,
appropriate disciplinary mechanisms; and must be assured; and
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

• responding to reported offenses with actions • procedures for feedback and correction
taken to prevent recurrences (Flesher, 1996). should criminal incidents be uncovered
must be established (Federal Sentencing,
Sittenfeld (1996) offers tips to organizations to 1991).
comply with The Federal Sentencing Guide-
lines for Organizations. Internal auditors can The US Sentencing Guidelines provide for
support management anti-fraud efforts in the incremental lower fines when an organiza-
following areas by: tion reports an offense to the authorities,
• making certain that preventive, detective, cooperates in the investigation, identifies and
and reporting controls are in place to sat- disciplines the wrongdoers, and takes vigor-
isfy the mandate of the Sentencing Commis- ous steps to reduce the likelihood for an
sion; offense to be committed.
• knowing that punishments are prescribed Fiorelli and Rooney (1997) find that the
in the Guidelines and what organizations Internal Control – Integrated Framework
can do to deflect them; (1992) of the Committee of Sponsoring Orga-
• developing a clear understanding of the nizations (COSO) and the Sentencing Guide-
deterrent provisions of the Guidelines, how lines are related since both focus in develop-
ing a strong system of internal control. All
they can affect the organization’s daily
the Sentencing Guidelines’ requirements
operations, and which set of internal con-
“can be explained within the context of
trol will satisfy the Guidelines and protect
COSO.”
the organization; and
• advising management with regard to how
The foreign corrupt practices act
the organization can derive the greatest
In the long run, an international agreement
benefit from incentives offered by the is needed to curb the use of bribes by
Guidelines. transnational corporations (Clinard, 1990).
Jennings (1997) believes that the internal The USA’s revulsion to bribery was evidenced
auditor’s role is to make sure that the organi- during the 1970s when well-known US compa-
zation’s program has monitoring and audit- nies such as Lockheed, Northrop, and Gulf
ing systems that provide a check on financial Oil were making headlines almost daily
and accounting controls. The auditor should because they paid large sums of money to
detect the types of crimes and regulatory high foreign officials in order to close impor-
violations to which the company is vulnera- tant deals (Evans et al., 1994).
ble, and monitor how effectively the compli- The Internal Revenue Service (1976) found
ance program itself is operating. The internal that bribes abroad may have led to tax fraud
auditor should also research ways to take in accounting. A SEC-sponsored voluntary
advantage of mitigating factors under the compliance program (1976) disclosed that
Guidelines, as well as strategies for dealing over 250 US corporations had made question-
with employee reporting and for designating able or illegal payments in the USA and
the most appropriate person for compliance abroad. Many of the illegal payments were
responsibility. made through off-the-books “slush funds” or
An effective compliance program with the improper invoicing practices.
Sentencing Guidelines must demonstrate To deter corrupt practices, the US Congress
commitment, oversight, responsibility, enacted the Foreign Corrupt Practices Act
staffing, and due diligence. The Due (FCPA) on December 19, 1977. The Act
[ 15 ]
Rocco R. Vanasco amends Section 13(b) of the Securities governments of the Organization for Eco-
Fraud auditing Exchange Act of 1934. nomic Cooperation and Development (OECD)
Managerial Auditing Journal Its accounting requirements apply to all to ban the use of bribery by transnational
13/1 [1998] 4–71 companies that are registered under Section corporations. The Act signed by President
12 of the 1934 Securities Act or that are Reagan amended the FCPA in order to
required to file report under Section D of the address its perceived deficiencies. The
Act. The accounting provision of the Act is amendments affect: the accounting provi-
administered and enforced by the SEC. sions; the criminalization of foreign bribery;
The FCPA requires SEC-registrant compa- and he enforcement of the act. The term “rea-
nies to implement an internal control struc- sonable detail” as used in the record keeping
ture sufficient to provide reasonable assur- requirement and the “reasonable assurance”
ance that: as used in the internal control system must
• transactions are executed in accordance meet the “prudent man” test. Criminal liabil-
with management’s general and specific ity is applied for firms and individuals who
authorization; make payments to third parties while know-
• transactions are recorded as necessary: to ing that the payment would be used by the
permit preparation of financial statements third party for purposes barred by the FCPA.
in conformity with generally accepted
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Criminal penalties have been increased from


accounting principles or any other criteria US$1 million to US$2 million for companies,
applicable to such statements and to main- and from US$10,000 to US$100,000 for individ-
tain accountability for assets; uals.
• access to assets is permitted only in accor- Enforcement of the antibribery provisions
dance with management’s general or spe- for all jurisdictions has been consolidated
cific authorization; and within the Justice Department whereas the
• the recorded accountability for assets is SEC retains the responsibility to enforce the
compared with existing assets at reason-
provision relating to the company’s books
able intervals and appropriate action is
and records and internal controls.
taken with respect to any differences.
From 1980 to 1994 several corporations have
The FCPA’s provision to devise and establish been indicted for bribery under the FCPA.
an internal control system tends to deter Harris and Ricks (1994) reported in The Wall
fraudulent reporting. The SEC has not pre- Street Journal that Lockheed Corporation
scribed any detailed procedure or technique and two of its executives had been indicted on
to ensure compliance with the FCPA but has charges of making illegal foreign payments in
held that management has such responsibil- violation of the FCPA. Lockheed made illegal
ity. The SEC has, however, identified the fol- payment to Leila Takla, a member of the
lowing concepts in evaluating an internal Egyptian Parliament. On January 27, 1995,
control structure: Lockheed pleaded guilty for conspiring to
• appraisal of the overall control environ- violate US antibribery laws and was fined
ment; US$24.8 million. It admitted to falsifying
• translation of broad objectives into specific records and lying to the Pentagon in selling
objectives; three C-130 cargo planes for US$79 million to
• consideration of detailed procedures and Egypt (Pasztor, 1995).
techniques to achieve specific objectives; In Canada, state law bans bribery of federal
• monitoring control procedures to deter- and provincial government officials but does
mine if they are functioning as intended; not address such payment to foreign govern-
and ment employees. The US Foreign Corrupt
• evaluation of the system for reasonable Practices Act and the UN Draft International
assurance by considering the benefits Agreement on Illicit Payments could provide
and/or alternative controls. Canada with a framework for drafting laws
The bribery of foreign officials in order to prohibiting bribes of foreign officials (Klotz,
obtain, retain, or direct business to any 1994).
person is considered an illegal act. Under the In May 1994, the OECD, whose membership
FCPA, fines of up to US$1 million on compa- consists of 26 industrialized countries, issued
nies and up to US$10,000 for each individual a statement recommending that its members
and imprisonment for up to five years were act to “combat the bribery of foreign public
recommended. Insurance companies do not officials in connection with international
cover the FCPA provisions. Companies are business transactions” (Kimelman, 1994).
not allowed to pay for individual fines. In 1996, the US SEC accused Montedison of
In the 1988 Omnibus Trade and Competi- Italy of hiding millions of dollars in bribes
tiveness Act, Congress direct the President to and for submitting fraudulent financial
seek an agreement with the member reports (Taylor, 1996).
[ 16 ]
Rocco R. Vanasco In 1996, an Argentine federal judge initiated In 1936, the American Institute of Accoun-
Fraud auditing a formal investigation into a US$249 million tants (AIA) issued a pronouncement titled
Managerial Auditing Journal contract between the local IBM and Banco de “Examination of financial statements by
13/1 [1998] 4–71 la Nacion Argentine. At issue is whether IBM independent public accountants.” It did not
paid probes to obtain the contract. The US require confirmation of receivables in the
Justice Department and the SEC are looking case of companies having an adequate system
into whether IBM violated the FCPA provi- of internal control. In the case of inventories,
sions (Friedland, 1996). the external auditor relied principally for
The same year, international organizations information on the responsible officers and
such as the World Bank and the Organization employees of the company. The 1939 spectacu-
of American States (OAS) came out against lar fraudulent case of McKesson & Robbins,
corruption in cross-border business transac- Inc. changed all that. It brought to the public
tions. The United Nations’ General Assembly attention that independent auditors had
has even asked member states to make issued an unqualified opinion on financial
bribery in international business a crime and statements without observing the physical
to remove rules allowing corporations to inventory on hand nor confirming accounts
classify bribes as deductions (Lavelle, 1997). receivable balances with debtors. The SEC
In Russia, the privatization of business has had recommended the strengthening of audit-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

led to increased opportunities for public ing procedures about inventory reporting.
officials to engage in bribery. Determining This led the AICPA to appoint the Committee
liability under the FCPA is fraught with legal on Auditing Procedures (CAP) to examine
ambiguities in a country undergoing major audit procedures and other “public discus-
legal and economic changes. Most Depart- sions” related to McKesson & Robbins regard-
ment of Justice enforcement actions so far ing a US$19 million overstatement of inven-
have focused on bribery involving high gov- tory and accounts receivable. The same year,
ernment officials (Dugan and Lechtman, the CAP issued the Statements on Auditing
1996). Thueson (1997) reported that kickbacks Procedures (SAP) No. 1, Extension of Auditing
and bribes – though technically illegal in Procedures, which recommended: the obser-
Russia, are normal business practices. Lack vation of physical inventory; the direct confir-
of internal controls and documentation, and mation from the debtor which should be
“ethical lapses” seem to be the major hurdles regarded as a normal audit procedure in all
for Western companies doing business in cases where receivables constituted a signifi-
Russia. It is possible for a Russian company cant proportion of total assets; the appoint-
to hire a government agency official as a ment of independent certified public accoun-
consultant on a business matter even though tants; and a report from the independent
the agency official is reviewing the business certified public accountant. SAP No. 1 also
matter under consideration. authorized the substitution of other proce-
dures under certain circumstances.
In 1951, the CAP felt that an examination of
Part II: Fraud and the professional financial statements did not warrant the
standards discovery of irregularities and adopted the
The role of the AICPA following position on fraud:
Independent auditors should accept the The ordinary examination incident to the
responsibility for the discovery and disclo- issuance of an opinion respecting state-
sure of those irregularities which the exer- ments is not designed and cannot be relied
cise of due audit care by a prudent practi- upon to disclose defalcations and other
tioner would normally uncover (Mautz and similar irregularities, although their dis-
Sharaf, 1961). covery frequently results.

More than once the American Institute of The AICPA contends that a detailed examina-
Certified Public Accountants (AICPA) has tion of financial statements is not called for
come to the rescue of the accounting and by the cost/benefit relationship:
auditing profession in fraud cases by rectify- If an auditor were to attempt to discover
ing the situation and issuing auditing stan- defalcations and similar irregularities, he
dards and procedures. These fraud cases, would have to extend his work to a point
which have been widely publicized, have had where its costs would be prohibitive … It is
generally recognized that good internal
a profound effect on the profession as the
control and surety bonds provide protection
independent auditor’s responsibility has
much more cheaply.
changed drastically over the years. In the
early 1900s, the external auditors’ primary In 1960, the AICPA issued SAP No. 30, which
responsibility was the detection of fraud was later incorporated in the Statement of
because audits were primarily involved with Auditing Standard (SAS) No. 1, Codification of
cash transactions. Auditing Standards and Procedures in 1972.
[ 17 ]
Rocco R. Vanasco The auditor acknowledged responsibility for in 1967 which was superseded by SAS No. 1. It
Fraud auditing detecting fraud that would normally be dealt with the auditors’ responsibility for
Managerial Auditing Journal uncovered by an examination performed in detecting fraud. The auditor is required to
13/1 [1998] 4–71 accordance with GAAS: look specifically for irregularities which may
The responsibility of the independent audi- have a material effect on the financial state-
tor to detect fraud (which responsibility ments. It states:
differs as to clients and others) arises only Under generally accepted auditing stan-
when such failures clearly result from non- dards, the independent auditor has the
compliance with generally accepted audit- responsibility, with inherent limitations of
ing standards. the auditing process, to plan his examina-
tion to search for errors or irregularities
It was felt that the cost of the discovery of
that would have a material effect on the
fraud would be prohibitive:
financial statements, and to exercise due
If an objective of an independent auditor’s
skill and care in the conduct of that exami-
examination were the discovery of all fraud,
nation.
he would have to extend his work to a point
where its cost would be prohibitive. Even The possibility of material errors or irregu-
then he could not give assurance that all larities should influence the independent
types of fraud had been detected or that auditor to adopt a skeptical attitude in the
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

none had existed because of items such as examination of the financial statements. SAS
unrecorded transactions, forgeries, and
No. 16 (Section 316) states:
collusive fraud would not necessarily be
The auditor should plan and perform his
uncovered. It is generally recognized that
examination with an attitude of professional
good internal control and fidelity bonds
skepticism, recognizing that the application
provide protection more economically and
of his auditing procedures may produce
effectively.
evidential matter indicating the possibility
Mautz and Sharaf (1961) question the AICPA’s of errors and irregularities.
position to eliminate or minimize the respon- Later the AICPA issued SAS No. 17 (Section
sibility to uncover fraud through audit-client 316), which even more explicitly requires
agreements, letters, and statements in the design of the audit to provide reasonable
professional literature. They list three assurance of detecting material errors and
motives for the refusal to uncover fraud: irregularities. Both SASs 16 and 17 have been
1 the auditor appears to be renouncing credited to the SEC chief accountant’s persua-
his/her right to an area in which he/she sive ability (Sack, 1987).
has competence and in which he/she can The 1967 fraud case of Fischer v. Kletz led
be of service; the AICPA to issue in October 1969 the State-
2 as a professional group auditors are in ment of Auditing Procedures (SAP) No. 21
effect refusing to provide an effective ser- which provides that errors discovered after
vice to the business community; and the completion of an audit are not to be con-
3 auditors are emphasizing to clients and cealed by the auditors’ silence.
the world at large their unwillingness to In May 1973, the AICPA appointed a special
accept responsibility, to provide a difficult committee to “study whether the auditing
but useful service. standards which are currently considered
They argue that there is a considerable differ- appropriate and sufficient in the examination
ence between a reasonable search for major of financial statements should be changed in
irregularities and the complete search for the light of the Equity Funding fraud.” In
possible errors. There are indeed a consider- February 1975, the special committee issued
able number of irregularities which even an its report and concluded that “Customary
elaborate search might not detect; there are audit procedures properly applied would have
also a considerable number of errors which a provided a reasonable degree of insurance
reasonable investigation might not disclose. that the existence of fraud at Equity Funding
They also feel that such position cannot but would be detected.” The special committee
“lessen the prestige of the profession, particu- felt that the audit procedures were adequate
larly in view of the fact that the service and and recommended a restatement of those
the responsibility we now deny, at one time, sections of SAS No. 1:
was claimed rather forcefully.” It seems clear that the auditor has an obliga-
After the Equity Funding scandal, the SEC tion to discover material frauds that are
discoverable through the application of
summoned the public accounting profession
customary auditing procedures applied in
and demanded to know what they planned to accordance with generally accepted audit-
prevent the recurrence of similar catastro- ing standards. The auditing profession
phes. The AICPA responded by issuing SAS should, on an ongoing basis, continue to
No. 16, The Independent Auditor’s Responsibil- improve the efficiency of customary audit
ity for the Detection of Errors or Irregularities procedures to the end that probability of

[ 18 ]
Rocco R. Vanasco discovery of material frauds continues to profession’s reputation. This led the AICPA to
Fraud auditing increase within the limits of practicality establish the following auditing standards
(Cooper and Flory, 1976). and procedures.
Managerial Auditing Journal
13/1 [1998] 4–71 In March 1975, the Financial Accounting In April 1988, the AICPA issued SAS No. 53
Standards Board (FASB) released a discus- (AU 316), The Auditor’s Responsibility to
sion memorandum entitled Analysis of Issues Detect and Report Errors and Irregularities,
Related to Criteria for Determining Material- which distinguishes between errors and
ity which lists the following factors that are irregularities:
weighted by auditors in materiality judg- The term errors refers to unintentional
mistakes in financial statements and
ments and by investors and creditors in
includes mathematical or clerical mistakes
making investing and lending decisions: in the underlying records and accounting
• environmental factors; data from which the financial statements
• enterprise related factors; were prepared, mistakes in the application
• accounting practices; and of accounting principles, and oversight or
• uncertainty. misinterpretation of facts.
The term irregularities refers to inten-
It seems that the auditor’s responsibility to tional distortions of financial statements,
detect management fraud depends on the such as deliberate misrepresentations by
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

manner in which it was perpetrated, its per- management, sometimes referred to as


vasiveness, and the likelihood of its discovery management fraud, or misappropriation of
through competent application of auditing assets, sometimes referred to as defalca-
procedures. However, if management fraud is tions.
discovered, the adequacy of disclosure SAS No. 53 requires external auditors to:
depends on the anticipated impact such infor- • understand the characteristic causes and
mation will have on users of financial reports signs of errors and irregularities;
(Thomas, 1979). • assess the risk that errors or irregularities
In 1978, the AICPA’s Independent Commis- may cause a company’s financial
sion on Auditors’ Responsibilities (the statements to contain a material misstate-
“Cohen Commission” named after the chair- ment. Higher-than-normal risk of irregu-
person, Manuel Cohen, a former SEC Com- larities exist when working capital is inade-
missioner) issued a 195-page report on the quate or the client’s industry experiences
appropriate responsibilities of independent several business failures;
auditors. The Cohen Commission defined • design the audit to provide reasonable
fraud as follows: assurance of detecting errors and irregular-
Viewed broadly, any intentional act
ities that are material to the financial state-
designed to deceive or mislead others is
fraud. Fraud in the business environment ments; and
with which the auditor is concerned has a • disclose irregularities to outside agencies.
more specialized meaning. Fraud may occur SAS No. 53 also requires auditors to maintain
at the employee or management level. Fraud
an attitude of professional skepticism when
by nonmanagement employees are gener-
ally designed to convert cash or other assets
planning and performing an audit:
The auditor neither assumes that manage-
to an employee’s own benefit … Fraud at the
ment is dishonest nor assumes unquestion-
management level includes intentional
able honesty. Rather, the auditor recognizes
misrepresentations that may lead to
that conditions observed and evidential
improper selection of accounting principles
matter obtained, including information
or inclusion of false amounts, or the omis-
from prior audits, need to be objectively
sion of amounts from financial statements.
evaluated.
It is usually accompanied by acts of conceal-
ment, such as omission of entries, manipula- Albrecht (1996b), in “The expectation gap,”
tion of documents (including forgery), or argues that the only way SAS 53 could narrow
collusion among individuals inside or out-
the expectation gap between users and inde-
side the company.
pendent auditor expectations would be if:
Since 1985, the AICPA has been promoting the SAS No. 53 changed the way auditors con-
legislation which transpired in the fraud case ducted audits so that they actually detected
Credit Alliance Corporation v. Arthur Andersen more frauds; or changed user expectations
which rejected the “foreseeability standard” about what auditors are supposed to do. He
and held auditors liable for ordinary negli- believes that SAS 53 “hadn’t changed the way
gence only to those people whom they auditors conducted financial statement audit
acknowledged in writing were known to be nor had it changed user expectation.”
relying on their reports. In 1988, the Auditing Standard Board issued
In 1987, the well-publicized case of E.S.M. SAS No. 54 (Section 317), Illegal Acts by
Government Securities fraud case represented Clients, which superseded SAS No. 17. The
a real threat to the entire accounting statement defines illegal acts as violation of
[ 19 ]
Rocco R. Vanasco laws or governmental regulations and pro- No. 53 which requires external auditors to
Fraud auditing vides guidance in three general areas: report errors and irregularities. Examples of
Managerial Auditing Journal 1 an auditor’s responsibility for detecting illegal acts having a direct material effect
13/1 [1998] 4–71 and disclosing illegal acts; include violations of tax laws or of govern-
2 the audit procedures an auditor should ment grant contracts. Examples of illegal acts
consider both in the apparent absence of having a material but indirect effect on finan-
illegal acts and when illegalities are possi- cial statements include violations of equal
ble; and employment and antitrust laws (Ricchiute,
3 how an auditor should respond to detected 1996).
illegal acts (Ricchiute, 1996). The AICPA has recognized the establish-
ment of an adequate internal control struc-
When auditors become aware of possible
ture as a preventive measure of potential
illegal acts, they should obtain an understand-
irregularities. In April 1988, the AICPA
ing of the circumstances of the act and gather
sufficient evidence to judge the effect of the issued SAS 60, The Communication of Control
illegal act on the financial statement. When – Structure Related Matters Noted in an Audit
illegal acts may have occurred, Arens and which defines a reportable condition as a
Loebbecke (1994) suggest the following steps: “significant deficiency in the design or opera-
tion of the internal control structure which
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

1 the auditor should inquire of management


at a level above those likely to be involved could adversely affect the organization’s
in the potential illegal act; ability to record, process, summarize, and
2 the auditor should consult with the client’s report financial data consistent with the
legal counsel or another specialist who is assertions of management in the financial
knowledgeable about the potential illegal statements.”
act; and In 1991, Congressmen Ron Wyden, Edward
3 the auditor should consider accumulating J. Markey, and John D. Dingell felt that fraud
additional evidence to determine if there detection should be one of the primary goals
actually is an illegal act. of any audit of financial statements. They
introduced HR 4313, “Financial Fraud Detec-
Guy and Mancino (1992) suggest the following tion and Disclosure Act,” which represents
additional steps: an attempt to put more pressure on indepen-
• report the fraud or illegal acts to the audit dent auditors to detect fraud. In March 1993,
committee; the AICPA announced its endorsement of HR
• consider the implication of fraud or illegal 574, the Financial Fraud Detection and Dis-
act for other aspects of the audit; closure Act (the Wyden Act), on the basis that
• insist the financial statements be revised; it should bolster public confidence in the US
• withdraw from the engagement and com- financial reporting system by requiring audi-
municate in writing the reasons for the tors to provide earlier public notification of
withdrawal; and possible misconduct (Barlas, 1993).
• prepare a letter stating the agreement or The same year, Congressman Henry Gonza-
disagreement with the company’s state- lez introduced the HR 6, the Deposit Insur-
ments. ance Reform Bill. The bill would require
In 1995, the US Congress passed the securities external auditors who suspect wrongdoing to
law titled The Private Securities Litigation report the findings to management, which is
Reform Act which demands that auditors then responsible for informing the SEC
first hunt for illegal acts. Previously, auditors within one day. If the organization does not
were required to look for illegal acts only if inform the SEC on time, the auditor must
their suspicions were aroused. The new law resign and send a copy of the findings to the
says an auditor must first hunt for illegal agency (International Auditor, 1991a).
activities, then check for misleading numbers In 1993, the AICPA made a proposal that
or omissions in a company’s financial state- would mandate the SEC to establish a report-
ments (MacDonald, 1996). The act imposes, ing system that would require public compa-
for the first time, a duty on an independent nies to state whether their internal controls
auditor of a public company to report fraud over financial reporting were effective and to
or illegal activity to the SEC. Under the act, have their statements publicly corroborated
an auditor’s responsibility covers any activ- by an independent auditor. John B. Sullivan,
ity in violation of law, such as EPA, FOA, and chairman of the AICPA’s Accounting Stan-
EEOC violations (Rossow, 1996). dards Board, maintains that such a system
Under SAS No. 54, an auditor’s responsibil- would serve as a weapon against financial
ity to detect and report misstatements result- fraud. Walter P. Schuetze, former SEC chief
ing from illegal acts on financial statement accountant, maintains that such a system
amounts that have a direct material impact would not prevent dishonest companies from
on financial statements is identical to SAS “cooking the books” and could thus provide a
[ 20 ]
Rocco R. Vanasco false sense of security (Journal of Accoun- damages caused when they fail to meet their
Fraud auditing tancy, 1993). responsibilities, but not for the frauds and
Managerial Auditing Journal In August 1993, the AICPA’s Board of Direc- shortcomings of others or for the failures of
13/1 [1998] 4–71 tors issued a statement entitled Meeting the government policies (Sommer, 1993).
Financial Reporting Needs of the Future: A In March 1993, the AICPA POB published a
Commitment from the Public Accounting Pro- report, In the Public Interest: Issues
fession (AICPA, 1993a). The AICPA endorsed Confronting the Accounting Profession
the recommendation of the Public Oversight (AICPA, 1993b) and stated that an indepen-
Board and proposed several accounting dent auditor cannot be expected to detect
reforms in order to improve fraud detection, certain forms of management fraud. Such
strengthen auditor independence, and other statement may not be in consonance with
related auditing issues. This was done in some people who believe that uncovering
response to some prominent business failures management fraud should be an auditor’s
that had eroded public confidence. The main priority (Knutson, 1994). The POB how-
AICPA unveiled a historic initiative to ever recommended increased efforts by CPA
increase public confidence in financial firms to assure the implementation of SAS
reporting and to improve the climate for tort No. 53. Soon thereafter the AICPA issued a
reform by expanding auditors’ effort to: response to the POB recommendation in the
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

• improve the prevention and detection of form of a White Paper that restated the audi-
fraud; tor’s responsibility to detect material mis-
• enhance the utility of financial reporting to statement, including management fraud
those who rely on it; (Carmichael and Craig, 1996).
• assure the independence and objectivity of In May 1996, the Auditing Standards Board
the independent auditor; (ASB) issued a proposed SAS, Consideration
• discourage unwarranted litigation that of Fraud in a Financial Statement Audit. This
impedes innovation and undermines the will replace SAS No. 53, The Auditor’s Respon-
profession’s ability to meet evolving finan- sibility to Detect and Report Errors and Irreg-
cial reporting needs; and ularities. The proposed statement:
• strengthen the accounting profession’s • describes fraud and its characteristics;
disciplinary system. • requires the independent auditor to assess
The reform calls for a systematic review of the risk of material misstatement due to
alleged accounting failures (Miller, 1993). The fraud and provides categories of fraud risk
board of directors also endorsed the proposed factors that should be considered;
federal “Financial Fraud Detection and Dis- • provides guidance on how the auditor
closure Act” and stressed that auditors should respond to the results of the assess-
should receive a stronger support from man- ment;
agement to allow them to prevent and detect • provides guidance regarding the auditor’s
fraud: communication about fraud to manage-
Every participant in the financial reporting ment, audit committees, and others.
process has a stake in preventing wrongdo-
ing and all should be expected to share the
The risks of fraudulent financial reporting
responsibility. Management, for example, are broken down into three categories:
should renew its emphasis on ethical values 1 management characteristics;
throughout the organization. It is also criti- 2 industry characteristics; and
cal that an open line of communication with 3 operating characteristics and financial
the independent auditor be maintained. stability.
Therefore, advisors, such as attorneys,
should be called upon to bring to the inde- The standard reaffirms the independent
pendent auditor’s attention instances of auditor’s present responsibility to plan and
suspected fraud so that the auditor can, to perform the audit in order to obtain reason-
the extent possible, confirm or dispel those able assurance about whether the statements
suspicions. Regulators who possess such are free from material misstatements, and
knowledge should also be required to make whether such misstatement is caused by
that information known to the auditors.
error or fraud (Hrisak, 1996). The indepen-
In its 1993 annual report, the Public Over- dent auditor is required to consider both the
sight Board (POB) of the American Institute fraudulent financial reporting (management
of CPAs focused on the accounting profes- fraud) and the misappropriation of assets
sion’s response to the growing liability crisis. (employee fraud). External auditors must
According to POB chairman A.A. Sommer Jr, therefore take proactive steps to ascertain the
the board will support efforts to pass legisla- existence of fraud, such as verifying more
tion that restores the balance between receivables, confirming sales and shipments,
accountability and liability. Sommer believes and conducting site inspections of client
that auditors should be accountable for facilities. Along with the auditor’s increased
[ 21 ]
Rocco R. Vanasco responsibility will be guidelines regarding Financial Statement Audit (1996). It provides a
Fraud auditing the involvement of the board of directors and “benchmark for what auditors need to do to
Managerial Auditing Journal the weak systems of internal control (Demery, fulfill their responsibilities related to consid-
13/1 [1998] 4–71 1996). eration of fraud in an audit.” The better our
The proposed standard, for the first time, profession can become in detecting fraud, the
uses the word “fraud” instead of “irregular- better we will serve the public interest and
ity.” Under the proposed revision, AU 110 increase the value of our services (Hrisak,
would read as follows: 1996).
The auditor has a responsibility to plan and Michael H. Sutton, SEC chief accountant,
perform the audit to obtain reasonable lauded the new AICPA Statement as the most
assurance about whether the financial state- recent effort by the profession to help gain
ments are free of material misstatement,
public confidence. He also praised SAS No. 82
whether caused by error or fraud.
for referring to fraud by name, for the first
The standard will force independent auditors time, instead of by its euphemistic term
to document in their working papers that “irregularities” and for describing over 40
they have considered the risk of fraud in their fraud risk factors that auditors must consider
audits: in planning and performing the audit
In planning the audit, the auditor should (Sutton, 1997a).
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

document in the working papers evidence of Fraud and bankruptcy often are found in
the performance of the assessment of the lawsuits against auditors. The auditor’s
risk of material misstatement due to fraud,
detection and disclosure responsibilities in
including any fraud risk factors that the
these areas are a focus of the Private Securi-
auditor believes, individually or in combina-
tion, significantly impact the risk of mater- ties Litigation Reform of 1995. The Act
ial misstatement together with the auditor’s reaffirms the auditor’s responsibilities
response to those risk factors. In addition, if regarding SAS No. 53, The Auditor’s Responsi-
during the performance of the audit, fraud bility to Detect and Report Errors and Irregu-
risk factors and other conditions are identi- larities. SAS No. 54, Illegal Acts by Clients,
fied that cause the auditor to believe that the and SAS No. 82, Consideration of Fraud in a
risk of material misstatement due to fraud Financial Audit (Palmrose, 1997).
has increased, the changed assessment, and
any further response that the auditor con-
The role of the institute of internal auditors
cluded was appropriate also should be docu-
The internal auditor is vitally concerned
mented.
with all manners of waste and fraud, what-
Albrecht (1996b) believes that the required ever the source and however small the size.
documentation “will narrow the expectation This is rooted in the understanding that a
gap because they will force auditors to con- tiny cloud can mushroom in to a tempest
that may rock the pillars of the enterprise
sider fraud explicitly in every financial state-
(Sawyer, 1988).
ment audit.”
The standard also requires the independent The IIA emphasis on fraud is reflected in the
auditor to discuss with management the Standards of Professional Practice for Inter-
possibility of fraud: nal Auditors (SPPIA). Section 280 states:
The auditor also should inquire of manage- In exercising due professional care, internal
ment to obtain the client’s view regarding auditors should be alert to the possibility of
the risk of material misstatement due to intentional wrongdoing, errors and omis-
fraud. Information from that inquiry could sions, inefficiency, waste, ineffectiveness,
identify fraud risk factors that may affect and conflict of interest. They should also be
the auditor’s assessment and related alert to those conditions and activities
response. Some examples of matters that where irregularities are most likely to
might be discussed as part of the inquiry occur.
are: whether there are particular subsidiary
locations, business segments, types of trans- The standards do not, however, specify that
actions, account balances, or financial state- internal auditors are responsible for the
ment categories where fraud risk factors detection of fraud. Internal auditors must be
exist or may be more likely to exist; and how alert and consider the possibility of fraud
management may be addressing such risks. when carrying out an audit. Internal auditors
The standard raised the following concerns: cannot give absolute assurance that fraud
the increased cost of performing the financial does not exist:
Internal auditors cannot give absolute
audits; the increased exposure of auditors to
assurance that noncompliance and irregu-
litigations; and the flaws related to the fraud larities do not exist. Nevertheless, the possi-
risks factors (Albrecht, 1996b). bility of material irregularities of noncom-
David Landsittel, chairman of the ASB’s pliance should be considered whenever the
Fraud Task Force, commented on the new internal auditor undertakes an internal
SAS No. 82, Consideration of Fraud in a audit assignment.

[ 22 ]
Rocco R. Vanasco In 1985, The Institute of Internal Auditors conducted within the context of rules of
Fraud auditing deemed fraud so important to issue SIAS No. evidence. As a discipline, it encompasses
Managerial Auditing Journal 3, “Deterrence, detection, investigation, and financial expertise, fraud knowledge, and a
13/1 [1998] 4–71 reporting of fraud” to codify the internal strong knowledge and understanding of
auditor’s responsibility for fraud. The SIAS business reality and the working of the legal
added several subsections to Standard 280 to system. Its development has been primarily
address the issue of fraud detection. achieved through on-the-job training, as
well as experience with investigating offi-
In 1986, The Institute of Internal Auditors
cers and legal counsel.
took a stand on internal audit involvement in
the prevention of fraudulent activity – partic- Forensic accounting, which implies any
ularly, fraudulent financial reporting, and court-related work done by an accountant,
issued a paper entitled The Role of Internal can provide fraud review teams for the mem-
Auditors in the Deterrence, Detection, and bers of the legal profession. In criminal or
Reporting of Fraudulent Financial Reporting legal cases, forensic accountants can work for
(Institute of Internal Auditors, 1986). The the prosecution, defense, and even the court
paper was prepared for the National Commis- (Thornhill, 1995). Wells (1995) believes that
sion of Fraudulent Financial Reporting. forensic accounting has reached its limits
The pervasive influence by the Institute of
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

and will not continue to grow whereas fraud


Internal Auditors to deter, detect, and report
examination has been described as the
fraud will be discussed in the following sec-
growth field for the twenty-first century.
tions.
Most industrial companies are subject to
three layers of financial review – internal
The role of the association of certified
auditors, auditors employed by lending insti-
fraud examiners
Most of the internal frauds investigated by tutions, and independent public auditors. If
Certified Fraud Examiners (CFEs) such as any one of these financial reviews uncovers
embezzlement, kickbacks, and false invoic- suspicious activity, they may decide to call on
ing, even if they involve big dollars, aren’t a fraud auditor, sometimes referred as a
material to the financial statements of the forensic accountant. The inquiry of the foren-
corporation and don’t have to be disclosed. sic accountant will differ from that of the
But leave that fraud untended and the situa-
previously described audits in that the foren-
tion might change (Kramer, 1996).
sic accountant will be specifically looking for
The Association of Certified Fraud Examin- fraud. According to Luizzo and Van Nostrand
ers (ACFE) was founded in 1988 for the pur- (1994), the fraud auditor typically builds a
pose of reducing incidents of white-collar case by carefully examining records. When
fraud. The ACFE runs a program to accredit something out of the ordinary is noted, the
as Certified Fraud Examiners (CFEs) people fraud auditor delves deeper to find out why it
with skills necessary to detect, investigate, occurred. CFEs are engaged by a company as
and deter fraud. CFEs often have accounting consultants after an auditor has noted some
or auditing backgrounds and work in such
irregularity, specifically fraudulent activities.
fields as forensic accounting, fraud auditing
While financial auditors focus on the finan-
and investigations, loss prevention, law
cial transactions themselves and rely exten-
enforcement, research and academics, and
sively on the internal controls in determining
public accounting. CFEs can cash in on white
the nature, timing, and extent of the audit
collar crime by offering expert assistance to
attorneys and litigators (Cohenson and process, fraud auditors instead go deeper to
Dispasquale, 1993). the behavior that underlies each transaction
According to Wells (1997), the CFE would and look at how the central systems can be
have knowledge in four specific areas: circumvented (Bologna and Lindquist, 1995).
1 the investigation of fraud; Robertson (1996) observed that fraud exam-
2 the legal principles involving the proof of iners have little in the way of standard pro-
fraud; grams or materiality guidelines to limit their
3 the schemes involved in fraudulent finan- attention to fraud possibilities: “They float on
cial transactions; and a sea of observations, of exceptions and oddi-
4 an understanding of criminal behavior ties that may be the tip of a fraud iceberg.”
concerning fraudulent conduct. De Groot (1997) observed that fraud exami-
nation and forensic accounting in The
CFEs often work as forensic accountants.
Netherlands became “more prevalent in 1992
Bologna et al. (1993) define forensic account-
when KPMG announced that it was setting up
ing as follows:
Forensic and investigation accounting is the a forensic accounting department.” He gives
application of financial skills and an inves- four reasons for the sustained growth of fraud
tigative mentality to unresolved issues, examination and forensic accounting:
[ 23 ]
Rocco R. Vanasco 1 the rising company fraud and the waning • that the “tone set by top management” is of
Fraud auditing interest of the police and courts in such overriding importance.
Managerial Auditing Journal cases;
The Commission further stressed that users
13/1 [1998] 4–71 2 the conduct of criminal audits to keep
of audited financial statements should expect
criminal influence at bay;
auditors to:
3 the preparing and refuting claims becom-
• perform the audit with technical compe-
ing a bread-and-butter activity for forensic
tence, integrity, independence, and objectiv-
accountants; and
ity;
4 the defendants’ legal counsels increas-
• search for and detect material misstate-
ingly disputing the findings of accountants
ments, whether intentional or uninten-
and fraud examiners.
tional;
• prevent the issuance of misleading finan-
The role of the institute of management cial statements.
accountants
The heat is on auditors these days. Busi- The Commission, therefore, recommended to
nesses are going belly up at record rates. independent public accountants that:
And frequently the employees and the stock- • auditing standards be changed to recognize
holders of these fragile firms are the last to the auditor’s responsibility for detecting
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

know (Frank, 1982). fraudulent financial reporting better; and


The Institute of Management Accountants’ • the auditor’s standard report be improved
(IMA) research report The Role of Analytical to better communicate the work done by the
Procedures in Detecting Management Fraud auditor.
addresses the need to improve the auditor’s The Commission identified the following
ability to detect management fraud with a risks:
better knowledge of analytical procedures • Internal environmental risk which consists
(Freedman, 1993). of conditions, circumstances, and influ-
The IMA believes that management and the ences on a company that are subject to
board of directors should establish an inter- management control; and
nal control structure to prevent or detect • External environmental risk which includes
fraud. Part of that structure is the control industry conditions, regulatory and legal
environment. Factors in that environment considerations, and the business environ-
are: ment.
• management philosophy;
• operating style which sets the tone for com- The Treadway Report found that frauds were
pany activities; often initiated during good times, as growth
• a strong commitment by management to got out of hand and pressures for adequate
ethical conduct reflected in its written working capital created incentives to distort
policies and personnel practices, and records (Wallace, 1995).
• interest in effective control which fosters Jeffords et al. (1992) examined 910 cases
the creation of the appropriate environ- submitted to the Internal Auditor during the
ment. nine-year period from 1981-1989 to assess the
specific risk factors cited in the Treadway
The role of the Treadway Commission Commission Report. Approximately 63 per-
The Treadway Commission urged all partic- cent of the 910 cases are classified under the
ipants in the financial reporting process – to internal control risk which include:
consider several specific risk factors when • lack of regular, independent checks in per-
planning or reviewing proposed audit activi- formance;
ties (Jeffords et al., 1992). • inadequate organizational control methods;
• inadequate methods of communicating or
In 1987, the Commission on Fraudulent
enforcing the assignment of authority and
Financial Reporting (Treadway Commission)
responsibility; and
issued 49 recommendations to reduce the
• unauthorized access and physical control of
incidence of fraudulent financial reporting.
assets, records, computer programs, or
The Commission concluded that the primary
data.
responsibility for fraudulent reporting rests
with the management and the board of direc- Almost two-thirds of the 910 cases can be
tors of the company that issue the report. The classified according to the risk factors identi-
Commission reported: fied by the Treadway Commission.
• all public companies should maintain inter- In 1992, the Commission of Sponsoring
nal controls that will provide reasonable Organizations (COSO) of the National Com-
assurance that fraudulent financial report- mission on Fraudulent Financial Reporting
ing will be prevented or subject to early published its report, Internal Control –
detection; and Integrated Framework. COSO urges
[ 24 ]
Rocco R. Vanasco corporations to report on their internal con-
Fraud auditing trol, advice that has been strongly criticized Part III: The role of management,
by some people who may believe that honesty audit committee and auditors
Managerial Auditing Journal
13/1 [1998] 4–71 can be legislated. However, several cases The role of management
show that top company executives have been Due to criticisms of the profession resulting
accused of committing fraudulent financial from auditors’ nondiscovery of several large
reporting (Roy, 1993). management frauds, auditors now have
greater responsibility for discovering man-
agement fraud than previously (Arens and
Fraud and the professional code of
Loebbecke, 1994).
conduct
In order to reduce the risk of fraud, organi- According to Kapnick (1980), management
zations must develop a climate that rein- fraud stems from “improper actions of man-
forces ethical behavior (Tate, 1996). agement, normally accompanied by false
Rule 102 of the AICPA Code of Professional documentation of transactions or withhold-
Conduct states that “the members shall main- ing of relevant information, resulting in a
tain objectivity and integrity, shall be free of material impact on the financial statements
interest, and shall not knowingly misrepre- and in financial detriment to shareholders or
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

sent facts or subordinate his/her judgment to creditors.” He lists the following examples of
others.” The concepts of objectivity and management fraud and their underlying
integrity are the cornerstone of most profes- reasons:
sional associations, but some professionals • misappropriation of assets;
• reporting inflated asset values on operating
do not adhere to them in practice.
results so that those perpetrating the fraud
In a recent National Business Ethics Sur-
can retain their positions;
vey conducted by the Ethics Resource Center,
• increasing their remuneration;
nearly one-third of employees sometimes felt
• enhancing the holdings of company stock;
pressures to engage in misconduct to achieve
• improper use of assets to the benefit of man-
business objectives. One-fourth of the respon-
agement;
dents believe that their companies ignore
• overstatement of assets or understatement
unethical conduct to meet business objectives
of liabilities to present a favorable financial
and nearly one employee in six said their
position or results of operations;
company overtly encourages misconduct to
• the siphoning off of assets through transac-
meet business objectives. The Ethics
tions with affiliated entities;
Resource Center also reported that one-third
• kickbacks and other irregular transactions
of the employees surveyed witnessed miscon-
between officers and outside parties; and
duct at work, but less than half reported it to
• lack of disclosure of significant informa-
their employers. The majority of those who tion.
did report misconduct were not satisfied with
their company’s response. The likelihood that Management may make use of: false account-
employees report the misconduct they ing entries; misleading information; forged
observed increased significantly in compa- documents; unrecorded liabilities; or
nies with comprehensive ethical programs, recorded transactions with undisclosed ele-
and they were much more likely to be satis- ments. If evidence of top management fraud
fied with the outcome of their report than is disclosed, the board of directors or the
those without ethics programs (Internal audit committee should be alerted, and possi-
Auditor, 1995a). bly the regulatory agency. The collapse of the
Brief et al. (1997) examined one of the most Lincoln Savings and Loan Association is an
common types of fraud investigated by the example of management fraud.
SEC -the failure to report write-offs of over- Sawyer (1988) believes that the three condi-
stated assets. The study found, based on tions under which fraud exists are attributed
responses by more than 400 people, that 47 to the environment or climate set by senior
percent of the top executives, 41 percent of the management and the board:
controllers, and 76 percent of the graduate- 1 situational pressures experienced by
level business students included in the study employees of enterprises;
were willing to commit fraud by understating 2 uncontrolled access to assets, coupled with
write-offs that cut into their companies prof- management’s indifference; and
3 personal trait undermining personal
its. Such findings are indicative of the current
integrity.
state of ethics in financial reporting. They
provide but one reason why Congress, the He lists eight reasons behind management
SEC and the investing public all attach such fraud:
high value to the independent attest role of 1 Executives sometimes take rash steps
the auditing profession (Sutton, 1997b). from which they cannot retreat.
[ 25 ]
Rocco R. Vanasco 2 Profit centers may distort facts to hold off for 60 percent of the cases. Moreover, the
Fraud auditing divestment. study found that professional and managerial
Managerial Auditing Journal 3 Incompetent managers may deceive in employees were involved in 45 percent of the
13/1 [1998] 4–71 order to survive. cases. Based on the findings, they
4 Performance may be distorted to warrant recommended the following:
large bonuses. • To deter fraud, internal auditors should
5 The need to succeed can turn managers to ensure that strong prevention systems
deception. based on the fundamental principles of
6 Unscrupulous managers serve interests good internal control be established and
which conflict. used.
7 Profits may be inflated to obtain advan- • To detect and investigate fraud, organiza-
tages in the marketplace. tions must ensure the existence of strong
8 The one who controls both the assets and internal audit departments with sufficient
their records is in a perfect position to resources to pursue the increased responsi-
falsify the records. bilities faced by internal auditors.
Experience has shown that certain condi- A study was conducted to use a generalized
tions in an organization constitute symptoms quantitative-response model, EGB2, to model
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

of possible management fraud. The standards


and forecast management fraud. EGB2 aver-
require internal auditors to have knowledge
aged 89.3 percent predictive capability for
about factors (red flags) that have proven to
both symmetric and asymmetric cost
be associates with management fraud. The
assumptions of Type I and Type II errors. The
following conditions are considered indica-
predictive features of EGB2 are important to
tors of possible management fraud:
independent auditors since type II error can
• managers repeatedly assuming subordi-
be very costly to the firm in terms of litiga-
nates’ duties;
tion (Hansen et al., 1996).
• managers dealing in matters outside their
profit center’s scope;
• managers not complying with corporate The role of the audit committee
In many cases, top management apparently
directives and procedures;
did not believe that fraud could take place in
• generous performance-based reward sys-
their organization. The assumption was that
tems; people were honest, and internal control
• a domineering management; prevented fraud, waste, and abuse (Alpert,
• a management preoccupation with 1992).
increased financial performance;
• complex sales transactions and transfers of The AICPA’s SAS 61 (AU 380), “Communica-
funds between affiliated companies; tion with the audit committee” (1988)
• a manager continually handling the most requires external auditors to make oral or
pressing issues of a company creating an written communication to the audit commit-
opportunity to commit fraud; tee on material misstatements in the finan-
• suspension of normal and appropriate cial statements. The auditors should inform
procedures; and the audit committee of the board of directors
• unreasonable sales and production goals. of all irregularities.
The IIA’s SIAS No. 3, Deterrence, Detection,
Loebbecke et al. (1989) surveyed 121 audit
Investigation and Reporting of Fraud also
partners in the Big Six accounting firms.
requires internal auditors to inform manage-
They reported having found 354 irregulari-
ment, the board of directors, or the audit
ties. Fifty-five percent involved management
committee of suspected wrongdoing:
fraud perpetrated by 384 individuals, and 45
When the incidence of significant fraud has
percent involved defalcations perpetrated by been established to a reasonable certainty,
178 individuals. management or the board should be notified
Marsh et al. (1994) reported that fraud cases immediately.
involving top management has become com-
mon in continental Europe, especially in The Treadway Commission’s investigations
Germany. This has been attributed to the indicated that audit committees could serve
recession which has made some fraudulent very effectively to reduce the incidence of
acts difficult to hide. fraud. Marsh and Powel (1989) recommend an
Calderon and Green (1994) made an analy- audit committee charter for fraud prevention.
sis of 114 actual cases of corporate fraud pub- The charter should include responsibilities
lished in the Internal Auditor between 1986 dealing with:
and November 1990. They found limited sepa- • financial reporting;
ration of duties, false documentation, and • corporate governance; and
inadequate or nonexistent control account • internal control.
[ 26 ]
Rocco R. Vanasco The role of internal auditors Planning and management skills become
Fraud auditing It is a challenge to the internal auditor to increasingly important as the auditor
Managerial Auditing Journal give fraud the balanced attention it advances in the organization.
13/1 [1998] 4–71 deserves, while achieving the total range of According to a study sponsored by The
internal auditing services (Brink and Witt, Institute of Internal Auditors, internal audi-
1982).
tors need skills that go far beyond the tradi-
The SPPIA stresses that the role of internal tional requirements of the field. A wide vari-
auditors in fraud auditing is to be alert to: ety of auditing skills are still essential to
• the possibility of fraud; and analyze internal controls: collect, evaluate,
• conditions and activities when irregulari- and summarize data; and identify fraud
ties are most likely to occur. (Albrecht et al., 1993).
Thompson (1995) provides important
Brink and Witt (1982) suggest the following
lessons for the internal auditing profession.
internal auditors’ responsibilities in the area
The first lesson that internal auditors should
of fraud control:
keep in mind is that business changes should
• Assist and cooperate with organizational
be carefully scrutinized. It is their job to cau-
and other personnel that have been
tion management about fraud implications of
assigned responsibilities in connection
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

new products, investments, deals, partner-


with the instigation of actual or suspected
ships or programs. The second lesson is that
fraud.
marketing and sales fraud should be carefully
• Be alert to the possibilities of fraud in the
handled. Internal auditors can help in this
review of operating activities carried out by
area by advising management on the com-
organizational personnel.
pany’s exposures associated with deceptive
• Carry out such special assignments relat-
sales practices. The third lesson is that execu-
ing to fraud as may be required by responsi-
tive directors’ stewardship is being closely
ble members of the organization.
scrutinized. Internal auditors should there-
• Help evaluate the extent to which fraud
fore educate corporate officers about the
prevention and detection are given fair
importance of executive example.
consideration along with other operational
To Bologna and Lindquist (1995), auditors
activities.
have to enhance their knowledge of the char-
• Seek directly or indirectly to achieve the
balanced fraud oriented efforts that will acteristics and attributes of fraud because 90
assure maximum achievement of all other percent of fraud cases are discovered only by
types of needed organizational services. accident.

In 1988, IIA chairman of the board Bill Duane,


in his article, “Building together the future,” Part IV: Fraud in government and
summarized succinctly the role of the mod- nonprofit entities
ern internal auditor: “We are the control
experts, the control consultants, the can-do, The role of the US general accounting
value-added members of the management office
Fraud is a significant problem for govern-
team. We know better than anyone else how
ments today and one that can be reasonably
to combat fraud, error, and waste.”
expected to grow (Ziegenfuss, 1996).
There seems to be a consensus that auditors
need to sharpen their skills in identifying red When performing audit work under the US
flags in detecting fraud. Thompson (1991) General Accounting Office (GAO) standards,
views the internal auditor role with regard to the auditor is required to report irregulari-
fraud as identifiers, investigators, resident ties and illegal acts to the client agency under
experts, and educators. audit contract. Aspects of responsibility
Albrecht et al. (1993) believe that traditional under the Generally Accepted Government
skills required in the field of auditing are not Auditing Standards (GAGAS) for detecting
adequate to identify fraud. Modern auditors and reporting errors, irregularities, and
must possess: illegal acts include the following:
• effective communication; • Being aware of characteristics and types of
• reasoning; and potential material irregularities.
• problem-solving skills. • Exercising due care in pursuing indica-
tions of irregularities and illegal acts.
Internal auditors must also be familiar with a
• Under required circumstances, reporting
variety of auditing skills which are still
indications of irregularities to law enforce-
essential to:
ment or regulatory agencies.
• analyze internal control;
• collect, evaluate, and summarize data; and The GAO Field Work for Financial Audits
• identify fraud. require government auditors to:
[ 27 ]
Rocco R. Vanasco • Provide reasonable assurance of detecting a particular situation warrants them to be.
Fraud auditing irregularities material to the financial They will be dishonest if that seems more
Managerial Auditing Journal statements. beneficial (Johnston, 1995).
13/1 [1998] 4–71 • Provide reasonable assurance of detecting Revelations about fiscal misconduct in
material misstatements resulting from nonprofit organizations have drawn attention
direct-effect illegal acts. to the role of the auditor in the detection of
fraud. Nonprofit organizations must gain a
Friedman (1995) reported that the firm of
better understanding of what an audit is
Long & Edmunds relies heavily on the state of
designed to achieve (Tate, 1996).
the client’s internal controls to assess the
According to Reis, the debacles at Covenant
potential for fraud. In auditing government
House, United Way of America and the Foun-
entities and nonprofit organizations, Long &
dation for New Era Philanthropy are exam-
Edmunds consider several things during an
ples of how the nonprofit community is forced
audit that might warn of fraud or misstate-
to take two steps back for every bold step
ments, including:
forward. To prevent fraud in nonprofit orga-
• the way the client’s financial staff responds
nizations, he suggests, among other things,
to questions;
that an audit of a nonprofit organization’s
• improper segregation of duties;
financial statements be comprehensive. Man-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

• poor recordkeeping;
agement and the board of trustees should ask
• a lot of cash activity; and
auditors for a management letter on the suffi-
• the lack of a bidding process for the pur-
ciency of internal accounting and financial
chase of goods and services.
controls.
Ziegenfuss (1996) performed a study to deter-
mine the amount and type of fraud occurring
in state and local government. The study Part V: The industry sector
revealed that the most frequently occurring
The bank sector
types of fraud are:
The directors of commercial banks often are
• misappropriation of assets; held accountable for subordinate fraud,
• theft; even when they have no suspicion of the
• false representation; and existence of fraudulent activity (Schadewitz
• false invoices. and Blevins, 1996).
The reasons for the increased fraud in state In the last few decades, several hundred bank-
and local governments are: ing fraud cases have been reported by the
• poor management practice; press worldwide, some of which were really
• economic pressure; spectacular for their sophisticated schemes.
• weakened society values; Some of them are discussed below.
• people being not held responsible for their The role of bank directors, security person-
actions; and nel, audits, and examiners of financial insti-
• inadequate training for those responsible tutions is the deterrence and detection of
for fraud prevention/detection. fraud. Gup (1994) observed that banks have
The most often reported “red flags” are: learned the hard way how to protect them-
• weaknesses in internal control; selves against scams that defraud financial
• ignoring audit reports; institutions of billions of dollars. Statistics
• inventory losses; indicate that small banks are at most risk of
• nonreliance on internal/external audit being defrauded. The five most common
reports; schemes that result in major frauds that con-
• not paying attention to employee tribute to failures of financial institutions
comments; and are:
• actual expenses exceed those budgeted. 1 nominee loans;
2 double pledging of collateral;
The nonprofit organization sector 3 reciprocal loan arrangements;
The nonprofit community during the past 4 land flips; and
ten years has had to repeatedly defend its 5 linked financing.
credibility as a result of well-publicized
In 1978, a survey of EDP-related fraud was
scandals (Reis, 1996).
conducted in the banking and insurance
Recent events have shown that fraudulent industries in cooperation with the Bank
financial statements and embezzlement can Administration Institute, the American
occur even among charitable organizations Insurance Association, the American Council
and large companies like Leslie Fay, Phar of Life Insurance, and the Life Office Manage-
Mor and Miniscribe. It has been estimated ment Association. Of the 5,127 banks sur-
that 60 percent of people are only as honest as veyed, 105 reported they had experienced at
[ 28 ]
Rocco R. Vanasco least one case of what was believed to be EDP- and Commerce subcommittee, banks’ inde-
Fraud auditing related fraud. The survey indicated that the pendent auditors should share with regula-
Managerial Auditing Journal banking schemes most frequent used were tors their suspicion of bank fraud. He added
13/1 [1998] 4–71 misposting or misdirecting deposits. Other that “banks’ independent auditors should
most frequently used scheme included credit- report to the bank when they detect fraud. If
ing loans to borrowers who never received they resign from the account, they should
the funds, or who, in fact may have never report the reasons to regulators” (FDIC,
existed. In some other cases, perpetrators 1986).
made unauthorized extensions of credit In 1992, the Federal Deposit Insurance Cor-
limits and loan due dates. The perpetrators of poration negotiated a US$400 million settle-
fraud in the bank industry were, in order of ment with Ernst & Young. This settlement
frequency, clerks, loan officers, data proces- covered all cases brought against the account-
sors, tellers, and item processors. The method ing firm by federal regulators (Berton, 1992).
of detection identified in the event or factors Price Waterhouse, also in 1992, faced a
that triggered the detection of fraud were: US$338 million jury verdict. The 11-month
• internal controls; trial involved a bank audit that was
• routine audits; conducted by an inexperienced auditor who
• customer complaint/inquiry; did not discover bad loans and failed to iden-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

• accident, tip-off, unusual activity of perpe- tify reckless loan approval procedures
trators; (Berton and Adler, 1992).
• change in operations, EDP, or financial The same year, an US$8 billion negligence
statements (AICPA, 1984). suit was brought against two of the world’s
largest accounting firms, Price Waterhouse
Colvin et al. (1983) reported in Fortune that
and Ernst & Whinney (now part of Ernst &
the United American Bank of Knoxville used
Young) in connection with their audits of the
other banks, all controlled by the same family,
scandal-riddled Bank of Credit and Commerce
as a means of transferring problem loans
International (BCCI). Touche Ross, the liq-
thus keeping them from being detected by the
uidator of BCCI, charged the firms with negli-
auditors. The Federal Deposit Insurance
gence in their 1985 and 1986 audits of the
Corporation Improvement Act (FDICIA)
bank, which collapsed in 1991 amid what is
examiners found that the “bank had about
considered to be the largest fraud in banking
US$377 million, or nearly half its total assets,
history.
in loans the FDIC classified as partly or
Touche Ross claims that the massive fraud
totally uncollectible.” Nearly half of the prob-
should have been noticed years before it
lem loans were made to United American’s
finally came to light in 1991 (Souter, 1992). The
former chairman Jake F. Butcher, his family
report on the BCCI prepared by Senator John
associates and their interests.
Kerry’s subcommittee claims that the Bank of
In 1986, Keoning reported in the Wall Street
England was wholly deficient in its supervi-
Journal that Home Savings Bank was suing
sion of BCCI and conspired with BCCI audi-
its former auditor Arthur Andersen & Co.
tor Price Waterhouse and BCCIs main share-
and was seeking at least US$275 million in
holder to keep the bank going after seeing
compensatory damages. The Home Savings
clear evidence of fraud. The Bank of England
Bank alleged that the auditors did not dis-
and Price Waterhouse flatly denied these
cover the fraudulent use of the securities that
allegations claiming that they did not give
the bank used as collateral for loans to ESM
evidence directly to the subcommittee (The
Government Securities.
Economist, 1992). On October 22, 1992, the UK
In 1991, with bank failures at an all-time
government released the result of an inquiry
high, Congress passed legislation requiring
by a senior judge into the handling of the
internal control reports by insured deposi-
fraud-ridden Bank of Credit and Commerce
tory institutions. The FDICIA requires a
International, taking to task BCCI auditor
statement of management’s responsibility of
Price Waterhouse, BCCI major shareholder
the institution’s annual report for:
Abu Dhabi, and the bank’s main supervisor,
• establishing and maintaining adequate
the Bank of England. Lord Justice Bingham
internal controls over financial statement
stated in his report that the Bank of England
reporting and for complying with applica-
should have been more alert to early indica-
ble laws and regulations; and
tion of possible fraud (The Economist, 1992b).
• management’s assessment of the effective-
Fialka (1993) reported in the Wall Street
ness of the internal control and the compli-
Journal that former BNL-Atlanta manager
ance with designated laws and regulations
Christopher Drogoul claimed that the exter-
(FDICIA, 1991).
nal auditors failed to uncover US$5 billion of
According to FDIC chairman L. William allegedly fraudulent loans to Iraq in the late
Seidman, who testified before a House Energy 1980s. Drogoul, in a testimony before the
[ 29 ]
Rocco R. Vanasco House Banking Committee, stated that the In 1997, a former Chemical Banking Corpo-
Fraud auditing officials of the Banca Nazionale del Lavoro in ration trader, Victor Gomez, was sentenced to
Managerial Auditing Journal Rome encouraged him to make and conceal three years prison for concealing a US$66
13/1 [1998] 4–71 the large loans to Iraq while other bank million trading loss amassed through failed
branches were forbidden to make similar bets on Mexican pesos. Mr Gomez pleaded
loans. guilty for conspiracy and making false
According to the Commercial Crime entries in bank records. He doctored trading
Bureau, a division of the International Cham- records to conceal the trades from the New
ber of Commerce, there has been a significant York-based bank (Simon, 1997).
increase in reports of investment schemes Germany’s commercial banks have been hit
involving the buying and selling of the so- by three large financial fraud scandals involv-
called prime bank instruments. Areas of high ing metal and engineering giant Metallge-
risk for banks are procurement fraud, fraudu- sellschaft, real estate development concern
lent transfers, and transaction fraud (Warner, Dr Jungen Schneider, and international
1994). sports flooring company Balsam. Balsam’s
The Justice Department reported that con- four-man management board was arrested on
victions for bank fraud in 1994 dropped 17.3 suspicion of committing fraud, evading taxes,
and falsifying data to obtain loans. Balsam
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

percent to 626 while fraud convictions at


S&Ls plunged 37 percent to 192. From 1984- owed 50 German and foreign banks roughly
1994, 70 percent of the financial crimes were US$900 million. German banks defend their
committed by outsiders. Directors and offi- credit policies by saying that corporate
cers made up 22 percent of the remaining financing is a risky business and that there is
criminals, while chief executive officers, no foolproof method for preventing fraud and
abuse (Protzman, 1994a).
chairmen of boards and presidents accounted
In Hungary and the rest of Eastern Europe,
for 8 percent (Shannon, 1995).
there is a continuous battle between the inter-
Champlain (1995) observed that a financial
nal auditors, who are responsible for report-
institution could be instantly brought to its
ing suspected fraud to the police and the bank
knees by just one fraudulent wire transfer.
treasurers, liquidity managers, and other
Wire transfers pose the single greatest risk of
financial directors who want the big stable
loss to a financial institution because of the
clients. Those clients are often involved in
speed with which losses can occur. As a pre-
illegal activities. In this difficult environ-
ventive measure, he recommends proper
ment, internal auditors are attempting to
separation of duties to ensure that no single
educate managers in the ways of capitalism
individual has the ability to initiate, verify,
(Kovacs, 1996).
and transmit outgoing wire, or redirect
incoming wires to accounts other than those The health care sector
specified in the original instructions. Over the past five years, estimated losses
The IIA Fort Worth Chapter (1996) reported from health care fraud totaled about US$418
that the review of a customer’s request to billion – or as much as four times the cost of
refinance his loan revealed that a loan officer the entire savings and loan crisis (Cohen,
was granting advances on customers’ line of 1995).
credit that were in excess of the customers’ Fraud in the health care industry has been
authorized limit. There were also some ques- rampant worldwide in the last three decades
tions about the loans the officer made and his as shown from the following cases of health
personal relocation expenses when he joined care abuses. In the USA, health care fraud is
the company. A system was developed to of such magnitude that it has attracted the
detect line of credit advances that exceeded attention of the US Congress and local gov-
the authorized limit. ernments. Laws have been enacted to curve
Check fraud is the No. 1 bank crime. Some health care fraud. Some fraudulent health
90 percent of bank crimes involve checking care cases are discussed below.
accounts. Criminals pass some 2,000 bad Blue Cross and Blue Shield of Missouri
checks a day in the USA, costing businesses (1992) had developed a program aimed at
US$10 billion a year. Banks alone lose US$625 reducing health care fraud, billing errors,
million a year from check fraud. To safeguard and waste. The Audit and Quality Manage-
against bad checks, both the East and West ment Program saved the insurer members
Coast Banks and Credit Union require that US$3.5 million during the first six months of
noncustomers leave their fingerprint near 1992 (National Underwriter, 1992).
the signature when cashing a check. The The IIA Baltimore Chapter (1992) reported a
simple system involves rubbing a finger on a case in which the manager had confessed to
small blotter and pressing it on the check writing checks payable to fictitious health
(Knight and Ridder, 1997). care providers and depositing the checks into
[ 30 ]
Rocco R. Vanasco a personal bank account. The manager, a Fraud Prevention of 1995” in order to combat
Fraud auditing trusted employee, confessed to stealing US$4 fraud and abuse in the health care system.
Managerial Auditing Journal million over a two-year period and losing The Caremark International Inc. in 1995
13/1 [1998] 4–71 most of it at casinos in Atlantic City and Las pleaded guilty and paid US$159 million in
Vegas. civil and criminal damages. The home-
The Risk and Insurance Management Soci- health-care company was charged with pay-
ety’s Report noted that many managed care ing kickbacks to physicians in return for
techniques designed to curb employee health referrals within its home-infusion, oncology,
benefit costs can also be used to reduce work- hemophilia, and human-growth-hormone
ers’ compensation costs. Companies can use business (Stodghill, 1995).
“medical bill audits” to root out fraud, over- Stohl (1996) offers three fraud cases related
charges, and duplication that can inflate to the health care industry:
employers’ tabs for occupational illness and 1 Case A. An audit investigation revealed
injury (Wojcik, 1993). that customers were never credited for
The National Association of Attorneys refunds and that Quality Insurance Com-
General’s Health Care Task Force estimated pany kept over US$10 million belonging to
that fraud accounted for over US$80 billion of customers, including US$2.1 million due
the US$817 billion spent in health care in Stone Building Corporation. Quality never
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

1992. Employers need to be aware of the signs attempted to refund the money improperly
of employee fraud, which is a growing prob- withheld from other customers.
lem in the health care industry. Cottrell and 2 Case B. An audit of a credit balance review
Albrecht (1994) observed that managers, audi- of County General Hospital for the state’s
tors, and employees should be aware of the Medicaid program revealed that the
symptoms that suggest internal fraud. They finance director admitted issuing fictitious
should also know that these symptoms are refund checks, never intended for the pay-
neither productive nor absolute and that a ees to receive them. The Medicaid pro-
full investigation of all symptoms is neces- gram was refunded the full amount and
sary. the falsification was treated as a routine
According to the results of a survey con- exception rather than fraud.
ducted by the Health Insurance Association 3 Case C. An audit of the country’s health
of America, fraud by physicians, hospital benefits program revealed that a consul-
labs, and equipment providers nearly quadru- tant acknowledged receiving commission
pled from 1990 through 1992. As fraud abuse from the winning HMO and denied any
levels rise, insurers are calling for software to wrongdoing. The benefit committee dis-
detect billing aberrations, fraud, and abuse in agreed with the consultant and replaced
health care claims (Friedman, 1994). him.
The 1994 Department of Health and Human
From the lessons learned from the above
Service Office of the Inspector General (OIG)
cases, Stohl drew the following conclusions:
investigation discovered that billing discrep-
• Fraud detection lies in the detail.
ancies varied. The OIG believes that hospitals
• Follow-up is critical.
intentionally defrauded the Medicare pro-
• Suspected wrongdoing should be fully
gram. Medicare also caught hospitals wrong-
investigated to determine criminal intent.
fully submitting billings for experiential
• Fraud can be anywhere.
automatic implantable cardiac defibrillators
• Perpetrators often believe they are justified
(Gardner, 1996).
in the action taken.
In 1994, Cigna HealthCare has joined with
IBM to develop and implement a technologi- Stohl advises that auditors must be alert for
cal tool that analyzes providers’ behavior industry practices that may actually be dis-
patterns to identify potential abusers of honest. Last year’s accepted practice may be
health care. The fraud and abuse manage- tomorrow’s fraud.
ment system uses claim data to examine the The San Diego Union-Tribune (1996)
billing and medical activities of health care reported that a federal court fined Laboratory
providers to help determine the most likely Corporation of America US$187 million for
abusers (“Cigna-Healthcare,” 1994). fraudulent billings to state and federal gov-
Gardner (1995) reports that the Department ernment insurers. This scam is know as “add-
of Justice and other federal entities estimate on billing.” The lab encouraged doctors to
that as much as 10 percent of our national test patients by offering them a discounted
health care bill is lost to fraud and abuse. price on a battery of tests, some of which were
This means that as much US$100 billion may not necessary to the patient’s treatment. The
be lost this year due to health care fraud. This lab billed the doctors for the lower rate while
has led US Senator William S. Cohen (R- charging the government insurer the full
Maine) to introduce a bill titled “Health Care amount.
[ 31 ]
Rocco R. Vanasco On August 21,1996, President Clinton signed accused German artificial heart valve suppli-
Fraud auditing into law the Health Assurance Portability ers of bribing surgeons and administrators at
Managerial Auditing Journal and Accountability Act, common known as almost all western German public hospitals
13/1 [1998] 4–71 the Kassenbaum-Kennedy Bill. The Bill specializing in heart surgery. The bribes
grants government investigators plus resulted in millions of dollars of annual over-
Medicare and Medicaid groups more funding charges to the German national health care
and more power to pursue fraud and abuse system (Protzman, 1994).
cases. It also creates new incentives to launch In the UK, pharmacists collude with physi-
investigations, makes changes in the punish- cians to defraud the National Health Service
ment of health care providers that engage in (NHS). This may occur after a relationship
misconduct. Crane and Slavitt (1997) has developed and the physician seeks to pay
observed: for purchases through prescriptions of expen-
Congress used a two-barreled shotgun sive drugs which do not go to patients
approach in funding to combat fraud and (Duggan, 1995).
abuse. First, the appropriation levels made
the act remove any doubt that Congress is The insurance sector
finally getting serious about fraud and An accountant is not a guarantor of the
abuse. Second, Congress created a self-per- reports he prepares and is only duty bound
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

petuating fund that will assure that fraud to act honestly in good faith and with rea-
and abuse is a never-ending problem. sonable care in the discharge of his profes-
A survey conducted for the American Associ- sional obligations (SEC v. National Life
Insurance Co., 1974.)
ation of Retired Persons (AARP) by Interna-
tional Communications Research Group, Borda (1987) reported that the casualty insur-
which last December interviewed 2,000 adults ance frauds cost the public US$15 billion each
nationwide, found that 93 percent of Ameri- year and may add to as much as 25 percent to
cans think health-care fraud is widespread – policy premiums. Every insurance policy
and that “there is more of it in Medicare and bought by the public comes with a rate that
Medicaid than in any other kind of health includes enough to cover legitimate claims,
care.” June Gibbs Brown, Inspector General fraud, and profit for the company.
of the Department of Health and Human Ser- Tucker (1988) reviewed the early contribu-
vices (HHS), stated that the federal govern- tions of Kenneth W. Stringer to the Audit Risk
ment is fighting Medicare fraud since the new Model for insurance companies providing
computer system is able to analyze data, look fidelity bonds. The studies show that 10 per-
for trends, and look for problem at areas that cent of the claims submitted had been the
emerge. The pilot program called Operation results of collusion, forgery, and other irregu-
Restore Trust has already recovered US$139.3 larities. The studies warn that total reliance
million in fraud from both Medicare and on internal control to deter fraud is insuffi-
Medicaid providers (McLeod, 1997). cient.
The General Accounting Office (GAO) esti- Briloff (1991) reported in the Wall Street
mates that fraud accounts for ten percent of Journal, that Guarantee Security Life Insur-
the US$700 billion spent on health care in the ance Co., a Florida company, was able to com-
USA annually. This includes improper plete related-party transactions with its prin-
Medicare, Medicaid, and CHAMPUS billing cipal securities broker Merrill Lynch & Co.
practices by doctors and hospitals companies, from 1984 through 1988. In August 1991 Guar-
such as charging for tests, services or prod- antee became insolvent and its 57,000 policy-
ucts not provided (Iraola and Klubes, 1997). holders were temporarily prevented from
In Italy, massive corruption was revealed in collecting their annuities. The suit filed by
the pricing and registration of drugs. Conse- the Florida Insurance Commission accused
quently, the Italian pharmaceutical industry Merrill Lynch of fraud and also accused
is on the brink of collapse. The network of Coopers & Lybrand, Guarantee’s auditors, of
fraud and corruption encompasses every malpractice and breach of fiduciary duties.
stage between the manufacture and market- Omaha Indemnity Company is still recover-
ing of drugs (Abbott, 1993). Even the former ing from US$500 million in reinsurance fraud
Italian health minister, Francesco losses inflicted by two of its managing gen-
DeLorenzo, had apparently been colluding eral agents (MGAs) in a period of only a few
with drug companies to fix drug prices and to years. After reconstructing confusing masses
guarantee payoffs to pharmaceuticals. Sev- of poorly kept records, Omaha Indemnity
eral Italian universities have been accused of found that Royal American Managers (RAM)
accepting bribes to give the right “advice” Inc. had processed US$196.3 million in premi-
(Nature, 1993). ums but reported only US$61 million to
In Germany, officials of the Allgemeine Omaha Indemnity. RAM had pocketed
Ortskrankenasse health insurance network, US$34.6 million of the money, and much of the
[ 32 ]
Rocco R. Vanasco remainder had been absorbed in transactions SEC alleged that the former controller pre-
Fraud auditing among a network of companies, several of pared financial statements for Guarantee
Managerial Auditing Journal which were controlled by RAM principals Security that masked the fact that bond
13/1 [1998] 4–71 James Wining and Willie Schonacher Jr trades between the insurance company and
(McLeod, 1993). Merrill Lynch during the 1980s were sham
The IIA Dallas Chapter (1993) reported that transactions designed to mislead regulators
the audit of the National Flood Insurance and investors about the financial condition of
Program determined that a claim agent, who Guarantee and its parent, Transmark USA.
processed flood insurance claims, fabricated In 1995, Montana Goverment Mark Racicot
claims, arranged for the claims manager to signed into law State Bill 253, the Insurance
issue the checks, and then recalled the Fraud Protection Act. The law makes insur-
checks. The checks were passed to outside ance fraud a felony. Companies accepting
accomplices who cashed them and split the premiums without providing coverage and
money with the claim agent. Federal agents consumers supplying false oral or written
were notified and the claims agent was information could be charged with fraud. The
arrested. The auditor recommended halting bill will help to reduce the estimated US$85
the practice of allowing checks to be returned million of fraudulent insurance in the state
to the original requestors. (Cox, 1995).
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

The IIA Houston Chapter (1993) reported On April 2, 1996, the Miami Daily Business
that an internal audit determined that an Review reported that the New York Life Insur-
officer of an insurance company was with- ance Co. was ready to settle a federal fraud
drawing funds from dormant accounts con- suit for US$187 million. The investors claimed
taining unclaimed monies and buying New York Life Insurance, through an aggres-
cashier’s checks. The cashier’s checks were sive marketing program, made materially
made payable to various bill collectors, car false statements and hid relevant information
dealers, and relatives. The officer had stolen about the partnership’s prospects and risks.
US$60,000 and was convicted of fraud. The The 1996 survey by the Insurance Research
auditors recommended strengthening the Council (IRC) found stronger support for
internal control on dormant accounts. actions of insurance companies and law
At the Farmer Insurance Group of Compa- enforcement to vigorously investigate and
nies, management realized that to curb fraud punish insurance criminals, particularly
it was necessary to have a precise and mean- corrupt professionals, including doctors and
ingful vision statement. As the Home Office lawyers involved in fraud rings. In 1995,
analyzed how best to handle such detailed between US$5.2 billion and US$6.3 billion was
matters as handling fraud situations, it real- added to the insurance bills of personal car
ized that developing an overall vision of the insurance policyholders because of outright
audit would help keep the department fraud or claim padding, according to an IRC
focused on its goals (Jacka, 1995). estimate (IRC, 1997).
Fraud in the insurance sector is so perva- Prudential Insurance, New York Life, Met-
sive forcing Jim Brown to combat it with ropolitan Life, and other insurance compa-
great fervor. As Louisiana Insurance Com- nies have faced insurance commissioner
missioner, he increased manpower and investigators, class action lawsuits and thou-
budget for fraud detection and financial sands of complaints by policyholders about
auditing in 1992. He improved his depart- misrepresentations known as “churning.”
ment’s link with federal investigators and Policyholders were promised that thy would
encouraged state legislators to pass laws never again have to make life insurance pay-
making it easier to detect and prosecute ments when, in fact, they were being charged
insider fraud. a fixed amount per year (PR Newswire, 1997).
The results are impressive: 32 insurance On January 13, 1997, the US District Court
executives in Louisiana were convicted of in Los Angeles approved the settlement of two
various white-collar crimes; two former state class actions against Connecticut General
insurance commissioners and a former Life Insurance Company (“CGLIC”). The
deputy commissioner pleaded guilty of fraud, class actions alleged that CGLIC committed
and 36 out of 100 licensed insurers were fraud and misrepresentation in the sale of life
closed for being near insolvency (Covaleski, insurance policies by, among other things,
1994). falsely representing the number of payments
On October 14, 1994, the Wall Street Journal that would be required for the life insurance
(1994c) reported that the SEC lodged charges policies sold to the Class. The benefits pro-
against the former controller of Guarantee vided to the Class under this settlement also
Security Life Insurance for taking part in include US$35 million in future adjustments
fraudulent record-keeping and reporting to CGLIC will make to a group of policies which
hide the insurance’s financial condition. The were impacted by adjustments the company
[ 33 ]
Rocco R. Vanasco made to recover the cost of the DAC Tax and Member States of the European Union (EU)
Fraud auditing the provisions of the Omnibus Budget Recon- require different actions from auditors in
Managerial Auditing Journal ciliation Act of 1990 (Life Insurance Industry, cases of fraud. Auditors in France may be
13/1 [1998] 4–71 1997). required to report irregularities to authori-
Insurance fraud is also increasing in the ties while auditors in The Netherlands may
international area as well due to better com- be required to withdraw from the engage-
munications and transportation capabilities ment and report irregularities to a special
that allow perpetrators to move into and government agency. In the UK, auditors may
around the global arena. report to the authorities when the circum-
stances warrant (Schilder, 1996).
The retail industry sector Fraud has become of great concern in the
Dishonest employees are by far one of the European Union. The EUs common agricul-
leading causes of lost dollars to any com- tural policy (CAP) is prone to fraud. For more
pany. These employees will not only steal than a decade the European Court of Auditors
from you, but they will take precautions to has been making an annual report on fraud.
avoid detection (Dabney, 1997). Myriad frauds have been uncovered, ranging
The University of Florida’s 1996 National from theft of food aid to fraudulent claims
and awards from structural funds. According
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Retail Security Survey on retail loss preven-


to MEP John Tomlinson, the CAP is the great-
tion reported that retail security executives
est incentive to crime in Europe (Meall, 1995).
continue to believe that employee theft is
The annual report of the European Union’s
their firms’ most significant source of finan-
Court of Auditors revealed that fraud, corrup-
cial loss. Responses indicate that a 38.4 per-
tion, and mismanagement are ubiquitous in
cent of shrinkage losses is attributed to
the EU. In 1993 alone, one-tenth of the EU’s
employee theft, 35.8 percent to shoplifting,
total went astray through fraud or misman-
19.4 percent to administrative errors, and 6.4
agement in the common agricultural policy
percent to vendor fraud. On average, 31.1
and the regional aid funds (The Economist,
employee theft apprehensions were reported 1994). Of the US$93.6 billion doled out by the
for every US$100 million in sales (Dabney, EU in 1994 to its 15 member nations, every-
1997). To prevent employee fraud, retail thing, from agricultural subsidies to high-
industries perform background checks, crim- ways in needy regions, the EU’s own auditors
inal checks, and drug testing. estimate that an outstanding US$10 billion
was wasted through mismanagement and
fraud (Pope, 1995). The European Commis-
Part VI: The international arena sion proposed that all member states treat
Most fraudsters have moved in from offering fraud against the EU budget as a criminal
penny stocks. They are now likely to peddle offense.
derivatives such as currency or bond In 1996, Ernst & Young International Fraud
futures (Mulder, 1995). Network surveyed the finance directors of
more than 800 companies from 11 countries –
Most countries do not have a governmental
including The Netherlands and the UK –
body like the US Securities and Exchange
operating internationally. The result of the
Commission to check on potential securities
survey shows:
fraud, nor have a professional association of
• Almost 60 percent of the finance directors
the sophistication of the AICPA that has
acknowledged that internal controls were
greatly enhanced the prestige of the auditing not keeping pace with the growth of their
profession. The Institute of Internal Auditors, companies.
the only international auditing association, • More than half of the companies had no
has struggled to harmonize the internal written fraud policy.
auditing profession worldwide despite the • Over three-fourths of those surveyed
wide cultural, economic, and political differ- believed that the fraud they detected could
ences among countries. In an age of commu- have been avoided.
nication, the national boundaries have been • Over three-fourths of fraud detected was
shattered and the auditing profession must committed by the companies’ own staff.
operate within the global village despite its • More than a quarter of the companies suf-
constraints. fered losses in excess of US$1 million as a
result of fraud during the past five years (De
The European Union perspective Groot, 1997).
Globalization spurs complex market and
political environments, and language and The European (1996) reported that the Euro-
currency complications. In this dynamic pean Commission revealed 4,750 instances of
milieu, there is plenty of opportunity for fraud perpetrated against the EU’s 1995
things to go wrong (Thompson, 1995). budget which amounted to ECU 1.15 billion.
[ 34 ]
Rocco R. Vanasco Klaus Hansch, President of the European code, has emerged as one of the most lucra-
Fraud auditing Parliament, stressed that the success in coun- tive fraudulent activities perpetrated by orga-
Managerial Auditing Journal tering fraud could be achieved if national nized criminal elements within the Nigerian
13/1 [1998] 4–71 authorities lived up to their Maastricht community.” The “419” scams invite foreign
Treaty responsibility to treat fraud against companies to participate in a multi-million-
the EU budget on a par with cheating the dollar swindle against the Nigerian Central
national coffers. Most fraud relates to the EUs Bank and a national Oil company.
agricultural budget and many cases deal with
export subsidies. Asian countries
The Chinese perspective
The African countries After one of the most serious swindles ever
The Nigerian perspective attempted against a Chinese bank, two
It appears that a glitch in diverting the fax Chinese-Americans were sent to prison. The
can result in it being sent to the wrong sentences were among the heaviest handed
receiver. This represents the best opportu- down against US citizens (The White Paper,
nity for the Nigerian Security Service to 1994a).
track down the criminals (Nnanna, 1995). The White Paper (1994a) reported that the
In many African countries, the audit budget Chinese government charged that Francisco
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

is always below the adequacy for any effective Huang Moy and Raymond C. Lee had per-
audit planning. Under these circumstances, suaded a small-town branch of the Agricul-
fraud detection may be the last priority. ture Bank of China to issue the 200 standby
Nnanna (1995) reported that fax fraud in letters of credit totaling US$10 billion by
Nigeria is rampant and is costing companies using as a collateral a phony US$10 billion
several million dollars. Because a fax is trans- letter of credit from a nonexistent bank.
mitted over a telephone line, it is possible to The Indian perspective
intercept the information. The process is Fraud in the workplace is one of internal
similar to tapping into a phone call. Hackers auditing’s grimmest nightmares, and it is
divert faxes to other local fax receivers where often one of the most public (Cisz, 1997).
the fax’s information is used to deceive,
Dalal (1994) reported that members of India’s
defraud, or blackmail the sender or receiver.
Parliament were accusing top government
Some organizations concerned with security
ministers of playing an integral role in a 1992
are arming themselves with fax encryption
securities fraud scandal. A government
device. The new device locks between a fax
report acknowledges the fraud violations but
machine and the phone jack, and scrambles
attributes them to the previous government.
the signal as it is transmitted. The signal can
Opposition members of parliament did not
only be decoded by a matching device in the
seem pleased with the government denials of
receiving end. TRW Electronic Products Inc.
wrongdoing and by the small fines against the
has sold several thousand of the TRW Fax
banks implicated in the scandal.
Encryptors (Internal Auditor, 1991b).
McDonald (1995) reported a securities
Ekong (1995) observed that in Nigeria, man-
fraud. Pawan Sachdeva, a new Delhi shoe
agement, directors, and foreign shareholders
maker, drew attention when it came up
of the African Development Bank are able to
US$4.3 million short in a complicated double-
create a self-engineered mess. The sharehold-
issue scheme which is unfortunately common
ers were unable to elect a new president of the
in India. Authorities charged the officials of
bank and expressed serious concern over
the two Securities and Exchange Board of
nearly US$1 million spent on equipment
India with collusion. Both had granted the
which is not working, over US$750,000 spent
permission of 60-day period between the two
on unauthorized and abandoned projects, and
issues when the limit was 30 days. Pawan
fraud totaling over US$270,000 resulting from
Sachdeva was arrested on charges of falsely
spurious claims for educational allowances
overstating the number of the shares of his
by staff.
company.
According to the Corruption Perception
Index prepared by Transparency Interna- The Indonesian perspective
tional, based in Berlin, Nigeria tops the list as The fraud scandal reported sparked a public
the most commercially corrupt country in outcry against collusion between bank
officials’ politically backed borrowers (The
the world. Pakistan, Kenya, Bangladesh, and
White Paper, October 1994).
China round out the top five (Internal
Auditor, 1997). The White Paper (1994) reported that busi-
Stenger (1997), of the US Secret Service’s nessman Eddy Tansil was found guilty of
financial crimes division, stated that “Since causing a US$449 million loss to the Indone-
1990, Nigerian advance fee fraud, known as 4- sian government. Tansil allegedly obtained
1-9 after a section of the Nigerian criminal the loans from petrochemical projects that
[ 35 ]
Rocco R. Vanasco were never built. The businessman altered Da-ming is suspected of illegal trading prac-
Fraud auditing and misused credits managed by the state- tices and unsettled payments worth US$128
Managerial Auditing Journal owned P.T. Bank Pembangunan. The Indone- million. Oung invested funds for legislators
13/1 [1998] 4–71 sian government fined him US$231 million for who hoped to raise revenue for their political
the losses. party. His illicit connections with other mem-
bers of parliament has caused a scandal that
The Japanese perspective
Daiwa Bank Ltd of Japan pleaded guilty to has affected both the ruling Kuomintang
conspiring to conceal US$1.1 billion in trad- party and the Democratic Progressive Party.
ing losses from US regulators and agreed to The Economist (1995a) reported alleged
pay a US$340 million fine, one of the largest frauds that emerged in August 1995 in rela-
ever imposed by the USA (Wall Street Jour- tion to Chanhus City Fourth Credit Coopera-
nal, 1996a). tive, a credit union; International Bills
Smith (1995) reported that the Federal Finance Corporation, a large underwriter of
Reserve had kicked the Daiwa Bank out of the commercial papers; and Fengyuan Credit
US When the trader Toshihide Iguchi Union. The fraud had shown glaring gaps in
incurred a US$1.1 billion in trading losses, financial supervision and stock manipula-
top management at the Daiwa Bank allegedly tion.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

told Iguchi to carry on with his theft and


forgery while they looked into ways to The Anglo-Saxon countries
conceal the losses. The bank postponed an The Australian perspective
investigation by claiming Iguchi was on vaca- All public held companies should adopt and
implement a code of ethics. The code should
tion. The Fed’s banishment of Daiwa forced
be supported in the highest levels in the
Japan’s Ministry of Finance to arrange the
organization (Sawyer, 1988).
consolidation of Daiwa and Sumitomo
Bank. Part of a special report on ethics on internal
auditing, a probe by the Independent Com-
The Malaysian perspective
mission Against Corruption in New South
Respected employees who steal net more
each year than all the nation’s professional Wales, Australia, into the issuance of drivers’
criminals (Porter, 1971). licenses by the Roads and Traffic Authority
(RTA) determined that a number of motor
Jayasankaran (1995) reported a security vehicle registries had been engaging in vari-
fraud perpetrated by the Malaysian rubber ous corrupt practices for several years. In
company’s Ayer Molek which spawned a response, the RTAs Internal Audit Branch
series of events that threatened to destroy a launched a concerted effort to develop new
major financial institution, generated law- anti-fraud and anti-corruption strategies that
suits and police investigations, called into go well beyond the investigation’s findings
question Malaysia’s justice system, and (Williams, 1993).
embarrassed the central bank.
The Canadian perspective
The Singaporian perspective Fraud schemes often are global crimes,
Crime and fraud have surpassed terrorism skipping over national borders and involv-
as the major threats to multinational corpo- ing people from many countries (The White
rations (Shapiro, 1994). Paper, 1997).
On March 4, 1995, The Economist reported the As it moves into the twenty-first century,
securities fraud in the Singapore’s stock Canada’s accounting profession is working
exchange. The Singapore International Mon- constantly to improve the services it pro-
etary Exchange (SIMEX) regulations have vides. In their standard-setting efforts,
been seriously tightened in the wake of the accounting professionals are dealing with
Singapore-staged collapse of Barings. The new kinds of information such as fraud, per-
Finance Minister Richard Hu recommended
formance reporting, sound business prac-
greater separation of trading and settlement
tices, and internal control (Dalglish, 1994).
accounts and activities, and of company and
An expectation gap exists in Canada. Users
client investing.
of financial statements believe that auditors
The Taiwanese perspective can detect all misstatements with the same
Taiwan’s stock exchange index has fallen by level of assurance, whereas most auditors
a third since the beginning of 1995. Investors would agree that they cannot possibly detect
are worried about a number of financial misstatements arising from fraud or illegal
scandals that have emerged recently (The acts with the same level of assurance that
Economist, 1995a).
they can detect misstatements arising from
Baum (1994) reported that the Taiwanese error. The cause of this expectation gap can
government is suffering a political scandal be traced in part to the auditing sections of
linked to securities fraud. Legislator Oung the CICA Handbook which state that auditors
[ 36 ]
Rocco R. Vanasco seek “reasonable assurance whether the 120, “Consideration of law and regulations”
Fraud auditing financial statements are free of material establishes standards and provides guidance
Managerial Auditing Journal statements but fail to define the term “reason- in the auditors’ responsibility to consider law
13/1 [1998] 4–71 able assurance” (Cockburn, 1993). and regulations in an audit of financial state-
In the Canadian case of International ments. Both statements require auditors to
Laboratories Ltd v. Dewer (Manitoba), 54 ALR design audit procedures so as to have a rea-
2d, published in the American Law Report, sonable expectation of detecting misstate-
the court found the auditors negligent for ments arising from fraud or error that are
failing to exercise his intuitive feelings and material to the financial statements. Some
professional skepticism: believe that the cost of checking representa-
In holding the defendants liable for their tions and genuineness of documents in order
negligence in not discovering the defalca- to ferret out fraud would probably double the
tions, the court placed emphasis upon the cost of audits. It is therefore desirable that the
fact that the defendant auditors had at one
Auditing Practices Board (APB) define the
point suggested to another manager the
concepts of “reasonable expectations” and
position of power held by the latter, and the
opportunity afforded him for any possible “arising from fraud or error” (Singleton,
fraud, but had failed to communicate to 1994).
Fraud cases.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

their employers, the shareholders, the dan-


ger which existed, and had not taken any Frauds are easier to hide when profits are
steps to discover whether or not he was in good (McCoy, 1987).
fact taking advantage of his position.
In 1987, Leeds Estate Building and Investment
The UK perspective Co. v. Shepherd was the first case involving an
When confronted with the necessity for a auditor. The court’s opinion noted that audi-
decision on a difficult question of policy tors are responsible for checking the sub-
with respect to financial statements, the stance of transaction, not merely their mathe-
accountant should search his conscience matical accuracy.
rather than the statutes (Andersen, 1963).
UKs Department of Trade and Industry
In the UK, auditors have been reluctant to investigated James Ferguson Holdings and
reveal fraud for fear of reprisals. Experience Barlow Clowes Gilt Managers Limited and
indicates that accountants who defend their concluded that the affairs of both companies
professional ethics and refuse to condone or were conducted in a comprehensively dishon-
participate in illegal behavior will lose their est manner over a period of years to 1988. The
jobs (Lovell, 1993). investigators attempted to discover why no
In 1992, the Institute of Chartered Accoun- one was aware of what was going on at the
tants in England and Wales published a companies until their collapse. The inspec-
report written by three academics titled tors acknowledged that Barlow Clowes skill-
“Expectation gap can be bridged.” The report fully concealed the facts from its auditors
asserts that the profession needs to embrace over a considerable period of time. Even so,
the role of detecting fraud, widen its responsi- the inspectors concluded that the auditing
bility beyond the shareholders as a group, firm of Spicer and Pegler and Touche Ross
and spin off its audit regulatory role to an should have been more alert to the possibility
independent agency. of fraud (Singleton Green, 1995).
In January 1995, Britain’s Auditing Practice In July 1991, the UK Bank of Credit & Com-
Board (APB) issued two statements of audit- merce International (BCCI) collapsed in a
ing standards – SAS 110 and SAS 120 dealing multibillion dollar fraud. Collusion at the
with the assessment of fraud risk. SAS 110 highest level of management and with third
“Fraud and error” addresses the questions of parties may have contributed to BCCI’s
how much responsibility auditors and man- demise. Major customers and prominent
agement must take when it comes to detect- individuals were involved in the scheme of
ing and reporting fraud and illegal acts. The fictitious loans and nonrecourse loans confir-
exposure draft would require auditors to mations. Wellsj (1992) reported in the Wall
assess the risk that fraud or error may cause Street Journal that BCCI was charged with
the financial statements to contain material falsifying book entries and paying substan-
misstatements (Crane, 1993). The Statement tial amounts to silence its would-be whistle-
supplies guidance on the auditors’ responsi- blowers.
bility to consider fraud and error in an audit The UK Audit Commission for Local
of financial statements. It notes that auditors Authorities in England and Wales recorded
should plan and perform their audit proce- 54,000 cases of fraud in 1993-1994 alone result-
dures, and evaluate and report on the results ing in losses of up to £25 millon sterling. The
thereof, recognizing that fraud or error may Commission, therefore, urged councils to
materially affect the financial statements strictly observe financial control standards
(SAS 110, 1995). The second statement, SAS (Wild, 1994).
[ 37 ]
Rocco R. Vanasco In 1996, a major railway ticket fraud was fraud, graft, and abuse of public office are
Fraud auditing uncovered during an internal audit carried commonplace (Bohlen, 1995).
Managerial Auditing Journal out by British Rail for the Association of In recent years, Italy has had its shares of
13/1 [1998] 4–71 Train Operating Companies. The fraud cen- financial scandals that shocked the nation.
tered on transporting tickets from one station Bribery of government officials, counterfeit-
to another, which meant that London, Tilbury ing public debt, tax evasions, planned losses,
and Southwest (LTS) rail would have netted writedown of the nominal value of shares,
US$1 million more that it was entitled to bribes-for-contracts, conflict-of-interest and
under its ticketing agreement. The fraud others have been reported by the Italian press
started when LTS management was awarded almost daily.
the train franchise in December 1995 (Internal Bribes-for-contract scandals have shaken
Auditor, 1996a). Italy since March 1992. In 1993, the executives
The French perspective of Fiat, the largest Italian car manufacturer,
A wave of allegations of fraud has struck the admitted that Fiat had to pay kickbacks to
French business world, hurting the stock government officials in order to obtain public
prices of companies accused of scandal contracts (Ciferri, 1993).
(Echikson, 1994). The Economist (1993) reported that the
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

shareholders of Montedison agreed to file a


In 1994, the stocks of the French companies –
suit against Ferruzzi Finanziaria (FerFin) for
Lyonnaise des Eaux and Cie Generale des
alleged fraud involving over 560 billion lire
Eaux – fell more than 10 percent the day after
(US$350 million) since the shareholders of
a prosecutor said that the water utilities were
FerFin had approved a radical writedown of
responsible for 80 percent of all of the coun-
the nominal value of its shares.
try’s political corruption (Echikson, 1994).
In 1994, Salvatore Sciascia, tax director of
The German perspective the Fininvest, a company owned by the Ital-
Fraud is flourishing throughout Europe. ian prime minister Silvio Berlusconi, turned
Many practioners are operating from rented himself in to investigators and admitted to
offices in German cities such as Cologne, have authorized bribes to government tax
Dasseldorf, and Frankfurt (Gartland, 1995). authorities. Sciascia’s confession unleashed
A flood of financial fraud scandals has hit new conflict-of-interest charges against the
Germany from Metallgesellschaft’s losses on prime minister (Bannon, 1994).
trading in oil-based derivatives to the demise In 1995, prosecutors charged Cesare Romiti,
of the Juergen Schneider real estate group an executive of the Fiat group in connection
which has cost Deutsche Bank not only pres- with accusation that the company
tige but has also pushed down its share price maintained slash funds from which it made
by more than 10 percent (Bray, 1994). Accord- illegal payments to politicians in exchange
ing to the German federal criminal bureau, for public contracts. Fiat is Italy’s largest
the Bundeskriminalamt, some 40 billion company with almost 250,000 employees
(Tagliabue, 1995).
deutschmarks a year are lost by German
The Economist (1995b; 1995c) reported that
citizens to fraud or poor investment advice
the treasury minister discovered 3,364 fraud-
(Middlemann and Munchau, 1995).
ulent government securities with a total face
In 1995, the disclosure of an alleged kick-
value of nearly 36 billion lire. This was the
back scandal at auto maker Adam Opel, the
result of counterfeiting bond certificates. To
German unit of General Motors, is just one
prevent similar forgeries, Italy’s central bank
indication that fraud is rapidly growing in
has resorted to the “dematerialization” or
Germany. This is causing some concern
paperless trading, which involves replacing
among government and industry leaders. As
physical certificates with computerized
Germans become far more aware of bribery,
record of ownership of the bonds.
fraud, and other economic crimes, govern-
The same year, Gemina SpA, one of Italy’s
ment officials are moving to create new legis-
most powerful industrial holding companies,
lation (Gumbel, 1995).
incurred an unexpected US$172 million loss.
The New York Times (1996) reported the
The Italian financial investigators raided
case involving charges of fraud at Steel and
Gemina to investigate the possibility of fraud-
Construction Company Thyssen AD. Some
ulent financial statements. It is believed that
German analysts see a new vigor by German the huge loss had been planned as a prepara-
prosecutors willing to break the country’s tion for the merger of some Fiat units with
taboos by investigating allegation of corpo- the Ferruzzi Finanziaria, a holding company,
rate fraud. and create a US$23 billion-per-year conglom-
The Italian perspective erate around the Montedison chemical group
In Italy, cheating the Government is such an which is controlled by Ferruzzi (Tagliabue,
old and popular sport that stories about 1995).
[ 38 ]
Rocco R. Vanasco The Economist (1996a) reported that Italy’s which are the most rapidly growing threats to
Fraud auditing system of SIMs (Societa di Intermediazione the economy. This is mostly due to the lack of
Managerial Auditing Journal Mobiliare), instituted in 1991 to bring domestic controls and inexperience on inter-
13/1 [1998] 4–71 accountability to the securities industry, has national capital markets (Blum, 1994).
created its own set of problems. State regula-
tor Consob has suspended 45 SIMs and has The Hungarian perspective
charged two Italian subsidiaries of interna- Internal auditors in Hungary and the rest of
Eastern Europe are confronted by some
tional banks with many securities fraud
unique challenges due to the region’s politi-
violations.
cal history (Kovacs, 1996b).
The Economist (1996b) reported that
Lorenzo Necci, the head of Italy’s railways, In Hungary, there is a continuous battle
had created a scandal named “tangentopoli” between the internal auditors, who, accord-
(kickbacks). Necci, who is in jail, has been ing to the Hungarian Banking Law, are
accused of fraud, embezzlement, and crimi- responsible to report suspected fraud to the
nal association. police, and the financial managers who
The Wall Street Journal (1996b) reported want to keep those stable clients, who are
that the Italian stock market Consob is inves- often engaged in illegal activities (Kovacs,
1996).
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

tigating the computer and telecommunica-


tions giant Olivetti, SpA, to determine how
the corporation incurred a huge pretax loss The Russian perspective
Freedom in Russia means to many people
of US$289.3 billion and a net debt of US$824.4
only the license to cut corners, to cheat, to
million. Management fraud may have
participate in new kinds of illegal deals that
occurred since the executives may have acted the authorities are too lethargic and too
on an inside information to cash in their backward to cope with (Geis, 1994).
Olivetti stock. The Consob is recommending
a revision of the current securities laws to Geis (1994) reported that fraud is pervasive in
prevent a similar scandal. Russian and Eastern European countries.
The fraud and corruption that permeate life
The Swiss perspective in Russia is the result of “unbridled greed.”
In the competitive global business environ- No one can accomplish anything legitimately
ment, executives and auditors do not have
– for a certain amount of bribe money, rele-
the luxury of identifying fraud exposure by
waiting to see what actual losses develop
vant authorities do the impossible. This per-
(Thompson, 1995). vasive fraud, comments Geis, “eats at the guts
of the nation, challenges its integrity, and
In the 1980s, financier Werner Rey built up a demoralizes its citizens.”
huge international conglomerate which Abelson (1994) reported a Russian stock
collapsed in 1991 in Switzerland’s largest swindle. Wealthy Russian Sergei Mavrodi’s
corporate failure. Switzerland authorities MMM bilked 5 million Russians with
charged Rey with making false statements, enticing TV ads. The Moscow investment
falsification of documents, and fraud (ACFE, company shares started at US$1, rocketed to
1996). US$55 in July, and dropped to US$.45 in
Zelenko and Urban (1994) reported that August.
authorities in Switzerland and Germany Thueson (1997) observed that business
were trying to unravel a massive pyramid opportunities in Russia are virtually unlim-
fraud in which thousands of small investors ited but the opportunities for fraud also
have seen their savings vanish amid “unful- abound. He warns that Russia’s natural
filled promises of massive financial gain.” wealth can entice the unwary into the fraud
Damara Bertges and her husband Harald, the snare.
founders of the European Kings Club, have
been arrested. An investigating magistrate in The Slovakian perspective
the Swiss canton of Uri, found that as much Tenders aren’t going to foreign investors, or
as US$113 million may have been laundered even to domestic investors, because these
through an interlocking web of 60 companies exclusive deals are made (Huebner, 1996).
into bank accounts elsewhere. Leiding (1996) reported that the European
Bank for Reconstruction and Development
The Eastern European countries (EBRD)is no longer seen as the reconstruc-
The Czech perspective tion and development institution after discov-
The Czech Republic has been the victim of a ering it was a victim of a state-sponsored
number of fraud scandals since the over-
fraudulent scheme. This follows the revela-
throw of communism in 1989 (Blum, 1994).
tion that the London-based EBRD paid six
In the last few years, the Czech Republic has times more for privatization shares than a
been victim of fraud and economic crime group of local buyers.
[ 39 ]
Rocco R. Vanasco South American countries depends largely on management’s integrity.
Fraud auditing The Brazilian perspective Indicators of misstatements in financial state-
Managerial Auditing Journal Nacional, which is Brazil’s seventh-largest ments or management fraud include:
13/1 [1998] 4–71 private financial institution, cost taxpayers • management’s failure to correct material
some US$5 million (Wall Street Journal, weaknesses in internal control that are
1996c). practical to correct;
The Wall Street Journal (1996c) reported that • a high turnover rate in top financial posi-
an elaborate accounting claim by the officers tions; and
of the Banco Nacional SA had concealed the • understaffing of accounting and financial
insolvency of the bank for more than a functions.
decade. Nacional had submitted false finan- The value of internal control is apparent in
cial statements to Central Bank administra- both preventing and detecting fraud. In a
tors from 1986 until its collapse in 1995. The recent survey conducted by Welch et al. (1996)
government discovered Nacional’s fraud only shows that the majority of the members of the
after agreeing to assume the bank’s US$5 Association of Certified Fraud Examiners
billion in bad debts. agree on the following findings:
The Venezuelan perspective • weak internal controls had created oppor-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Venezuela’s government is keen to punish tunities for fraud in more than 80 percent of
the former top officials of Banco Latino who the cases; and
have managed to slip away to southern • about half of all frauds occurred in the
Florida (The Economist, 1995b). financial area.
The Economist (1995b) reported that the gov- Albrecht et al. (1994) believe that organiza-
ernment of Venezuela charged 83 former tions should adopt a proactive approach to
executives of the Banco Latino for fraud and reducing costs associated with fraud. A good
laundering monetary instruments in the program should emphasize fraud prevention
amount of US$2 billion. and not reaction to already committed fraud.
The Banco Latino and its Miami-affiliate The steps involved in such a model include
Banco Latino International have filed a crimi- implementation of prevention and awareness
nal suit in Miami, Florida, against its former programs, incidence of fraud, incident
bank president, Gustavo Gomez Lopez. reporting, investigation, action, resolution,
analysis, publication, implementation of
controls, examination of compliance and
Part VII: The investigative and training, and proactive fraud auditing.
reporting process According to Robert E. Fleming, director of
auditing and accounting at Urbach Kahn &
Fraud indicators Werlin in Albany, New York, there are many
While professional internal auditors may clues that should warn CPAs about the possi-
not be insurers against fraud, their respon-
bility of financial misstatement or fraud.
sibility for due professional care will
These include:
require an increasingly high level of alert-
ness to the indicators of fraud (Sawyer, • an overly complex organizational structure
1988). with many subsidiaries;
• unusual structured partnerships; and
The SEC, in ARS No. 174, has urged auditors • numerous joint ventures (Friedman, 1995).
to be on the alert for signs that indicate man-
agement might be seeking to conceal a deteri- Albrecht (1996) groups the indicators of
oration in the financial position of the com- employee fraud in six categories:
pany. Such red flags include: 1 Accounting anomalies which include
• the recognition of income from transac- embezzlement, overstatement of expenses,
tions which do not reflect actual economic fictitious journal entries, missing docu-
changes; ments, alterations on documents, exces-
• unwarranted attempts to defer expense sive voids or credits, increased past due
recognition; accounts, duplicate payments, entries
• avoiding recognition of losses; and made at or near the end of accounting
periods and others.
• timing of major transactions so as to
2 Internal control symptoms which include a
achieve apparent improvements in the
poor control environment, lack of segrega-
financial statements (Cooper and Flory,
tion of duties, lack of physical safeguards,
1976.)
lack of independent checks, lack of proper
In April 1988, the AICPA issued SAS No. 55, authorizations, lack of proper documents
“Consideration of the Internal Control Struc- and records, the overriding of existing
ture in Financial Statements” which states controls, and an inadequate accounting
that the effectiveness of internal controls system.
[ 40 ]
Rocco R. Vanasco 3 Analytical symptoms which include trans- • Conduct additional tests directed toward
Fraud auditing actions and amounts that are too large or detection of fraud if significant weaknesses
Managerial Auditing Journal too small; transactions or events that are found.
13/1 [1998] 4–71 occur at odd times and places. • Evaluate the indicators and decide whether
4 Lifestyle symptoms which include further action is necessary or an investiga-
employee’s greed, financial needs, or pres- tion should be recommended.
sures. Employees are living lifestyles far • Determine whether the organizational
beyond what they can reasonably afford. environment fosters control consciousness.
5 Behavioral symptoms which include • Determine whether realistic organizational
employees’ unusual and recognizable goals and objectives are set.
behavior patterns; unusual irritability
• Determine whether written corporate poli-
and suspiciousness; unsolicited confes-
cies exist that describe prohibited activi-
sions; and others.
ties.
6 Tips and complaints which include tips
• Assess whether action is taken when viola-
from employees that something is wrong.
tions are discovered.
For Albrecht, only the symptoms of fraud, the • Verify whether appropriate authorization
red flags or indicators exist to alert manage- policies for transactions are established
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

ment of wrongdoing. and maintained.


• Determine whether policies, practices,
Fraud detection procedures, reports, and mechanisms are
In planning tests for a fraud audit, the goal
developed to monitor activities and safe-
is often to test an unrepresentative set of
items, focusing on exceptions to standard guard assets.
procedures (Armstrong, 1988). • Assess whether recommendations need to
be made for the establishment or enhance-
The US Institute of Accountants’ SAP No. 1, ment of cost-effective control to help deter
Extension of Auditing Procedures (1939)
fraud.
stressed that the external auditor is not
• Recommend the establishment of a strong,
responsible for detecting fraud in the ordi-
written statement of management’s com-
nary examination of the financial statements:
In making the ordinary examination, the mitment to corporate ethics.
independent auditor is aware of the possibil- Internal auditors would be more likely to
ity that fraud may exist. Financial state-
detect fraud if they develop their ability to
ments may be overstated as the result of
defalcation and similar irregularities, or recognize and question changes that occur in
deliberate misrepresentation by manage- organizations. Examples of audit tests to
ment, or both… However, the ordinary detect fraud are:
examination directed to the expression of an • To detect the alteration of the beginning
opinion in financial statements is not pri- balance in the monthly checking account
marily or specifically designed and cannot reconciliation, the auditor should compare
be relied upon to disclose defalcation and
monthly balances and use change and trend
other similar irregularities, although their
discovery may result. Similarly, though the analysis. Applying analytical procedures is
discovery of deliberate misrepresentation a good way to detect the diversion of funds.
by management is usually more closely • The means of detecting kickbacks paid to a
associated with the objective of the ordinary new buyer is the use of change analysis
examination, such examination cannot be and trend analysis of buyer or vendor activ-
relied upon to assure its discovery. ity.
For Thompson (1993c), the symptoms of fraud • The possibility of detection (or deterrence)
are often obvious to anyone who cares to look. of a fraud involving bogus placement agen-
These indicators may arise as a result of cies is to verify new vendor firms listed in a
control established by management, tests professional association catalog and/or
conducted by auditors and other sources both verify the vendor name and address
within and outside the organization. Detec- through the telephone book.
tion of fraud consists of identifying the indi- • The means of detecting alteration of
cators of fraud sufficient to warrant recom- receipts for employee expenses is done by
mending an investigation. The internal audit- comparing the copy of a document that has
ing department’s responsibilities for detect- not been within the control of the employee.
ing fraud when conducting audit assign- This approach should only be used in
ments are to: unusual fraud situations.
• Have sufficient knowledge of the indicators
of fraud. Loebbecke (1987) suggests assessing the risk
• Be alert to opportunities such as control of irregularities and considering the pres-
weaknesses that could allow fraud. ence or absence of three key criteria:
[ 41 ]
Rocco R. Vanasco 1 The degree to which conditions are such • inadequate scope of auditing testing and
Fraud auditing that a material irregularity could be com- inquiries;
Managerial Auditing Journal mitted. • restrictions of auditors’ work by manage-
13/1 [1998] 4–71 2 The degree to which the person or persons ment;
in position of authority and responsibility • auditors’ failure to understand the business
in the entity have a reason or motivation to of the company being audited;
commit an irregularity. • failure to identify related party transac-
3 The degree to which the person or persons tions;
in positions of authority or responsibility • reliance on uncorroborated representa-
in the entity have an attitude or set of ethi- tions from management; and
cal values that they would allow them- • deceptions practiced on auditors.
selves to commit an irregularity.
It is entirely possible that an auditor could
Thompson (1991) offers some good reasons perform an audit in an entirely reasonable
why auditors do not detect fraud. The way and in full accordance with auditing
assumption is that they: standards and still not detect deliberate mate-
• do not believe that detection is their job, rial misstatement. UKs Companies Act of
• are too trusting of those they audit, 1985 foresaw that possibility making auditor
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

• believe the bosses already know and con- deception a criminal offense (Knox, 1994).
done the illegal activity,
• do not know exposures in specific terms, Fraud investigation
• do not know symptoms of fraud occurrence, Successful investigators and auditors follow
• fail to follow through on symptoms of fraud, up on curious occurrences based upon expe-
• are concerned about career implications of rience, judgment, and intuition (Palmer,
1993).
fraud detection.
According to the IIA Standards (SIAS No. 3),
Matsumura and Tucker (1992) conducted a
the role of internal auditing in the investiga-
study of the interaction between a manager
tion of fraud includes:
and an auditor which resulted in an increase
• Assessing the probable level and extent of
in fraud detection. In the game, the manager
the complicity in the fraud within the orga-
chose a probability of committing fraud
nization.
whereas the auditor decided to perform tests
• Assessing the qualifications and the skills
of transactions and detailed tests of balances.
of the internal auditors and the specialists
Four independent variables – the auditor’s
available to participate in the investigation
penalty, auditing standards requirements, the
to ensure that it is conducted by individuals
quality of the internal control structure, and
having the appropriate type and level of
the audit fees – were examined to assess their
technical expertise.
effects on tests of transactions and detailed
• Being cognizant of the rights of alleged
tests of balances, fraud detection, and inci-
perpetrators and personnel within the
dence of fraud. Increasingly the auditor’s
scope of the investigation and the reputa-
penalty was found to decrease fraud and
tion of the organization itself.
increase fraud detection.
• Designing procedures to follow in attempt-
Thompson (1992) suggests a five-step
ing to identify the perpetrators, extent of
approach for fraud detection:
fraud, techniques used, and cause of fraud.
1 Know fraud exposure in specific terms.
• Determining the knowledge, skills, and
2 Know exposure specific symptoms of
disciplines needed to effectively carry out
fraud.
the investigation.
3 Be alert for fraud symptoms.
• Coordinating activities with management
4 Incorporate into routine audit program
personnel, legal counsel, and other special-
steps that are likely to reveal fraud symp-
ists as appropriate throughout the course of
toms.
the investigation.
5 Follow through on all observed symptoms.
When a fraud investigation reveals irregular-
Ziegenfuss’ survey (1996) of municipal and
ities which may have an adverse impact on
local governments shows that the most effec-
the financial position and results of opera-
tive tools for fraud detection are:
tions, the director of internal auditing should
• internal audit review;
inform the appropriate management and the
• specific investigation by management;
audit committee.
• employee notification; and
When auditors suspect wrongdoing, a sepa-
• accidental discovery.
rate audit report may be required because the
According to the deputy director of UKs Seri- information may not be appropriate for dis-
ous Fraud Office, the reasons why auditors closure to all report recipients. SIAS No. 2
fail to detect fraud are: suggests that the proper authorities within
[ 42 ]
Rocco R. Vanasco the organization should be informed. When misappropriating assets and confront them
Fraud auditing senior management is involved, the audit with their suspicions. A suspect should not
Managerial Auditing Journal committee or similar high-level entity should be confronted until supporting evidence has
13/1 [1998] 4–71 be notified. been gathered. Confrontation should be done
Review of the draft of a proposed report on a by persons who specialize in investigating
fraud investigation by the legal counsel criminal activity, not by internal auditors.
reduces the possibility of inclusion (and dis- The SPPIA require that when an internal
semination) of a statement for which the auditor identifies multiple factors that have
accused employee could sue the organization. been linked with possible fraudulent condi-
If internal auditing wants to invoke client tions and suspects that fraud has taken place,
privilege, consideration should be given to the auditor should notify the appropriate
addressing the report to legal counsel. authorities within the company and recom-
For Thompson (1991), a thorough fraud mend an investigation. The report should
investigation should answer the following include the auditor’s conclusion as to
questions: whether sufficient information exists to con-
• Was it fraud or error? duct an investigation and summarize the
• Who did it? findings that serve as the basis for such deci-
• What was the extent of the loss? sion.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

• How was it done? Reporting consists of various oral or writ-


For Thompson (1993d), the responsibility for ten interim or final communication to man-
investigating suspected wrongdoing should agement. When an internal auditor’s proce-
be clearly defined and communicated to dures lend to suspicion of some kind of
everyone within the organization. wrongdoing, the auditor should:
Investigation consists of performing • determine the possible effects of the wrong-
extended procedures necessary to determine doing;
whether fraud, as suggested by the indica- • discuss the matter with the appropriate
tors, has occurred. It includes gathering suffi- level of management; and
cient evidential matter about the specific • decide with management who should inves-
details of a discovered fraud. All fraud inves- tigate or otherwise follow up the suspicion
tigations need to start with a plan for gather- (SIAS 3).
ing and handling the evidence (Ehlers, 1996). When wrongdoing is suspected, the auditor’s
When conducting fraud investigations, responsibility extends to the appropriate
internal auditors should assess the probable level of management within the organization
level and the extent of complicity in the fraud
(PSB 85-5). A written report is required at the
within the organization. Internal auditors,
conclusion of the investigation phase. It
lawyers, investigators, security personnel,
should include all findings, conclusions, rec-
and other specialists from inside or outside
ommendations, and corrective action taken.
the organization are the parties that usually
Internal auditing is responsible for report-
conduct or participate in fraud investiga-
ing fraud to senior management or the board
tions.
when the incidence of fraud of a material
Albrecht et al. (1994) suggest that formal
amount has been established to a reasonable
procedures be established in the investiga-
certainty.
tion process:
• to assess the scope of the investigation;
Fraud deterrence
• to determine the investigation methods;
Management can reduce fraud-handling
• to follow up on tips of suspected fraud; difficulties by establishing the policy and
• to conduct interviews; related approaches to handling fraud before
• to review documentation; and the fact, not after (Thompson, 1991).
• to report the findings.
Stewart (1959), in his “Nature and prevention
Fraud reporting of fraud,” makes a good point in stressing
Many internal auditors felt that finding that defalcations and irregularities could be
fraud was career limiting and possibly reduced with a reasonable increase in audit-
career-ending, especially if the fraud discov- ing work:
ered was perpetrated by a senior member of In our world of war, confusion, evil, and
management (Alpert, 1992). suffering, the accounting profession is very
much aware of the fact that defalcations and
According to the Standards for the Profes-
other irregularities have grown consider-
sional Practice of Internal Auditing (SPPIA), ably in number and amount in recent years.
a fraud report is required at the conclusion of American business losses from these frauds
the investigation. In performing an audit, have been estimated to range from one to
internal auditors are lacking due professional three billion dollars annually. Contrast this
care when they suspect employees for with the U.S. police reports to the FBI that

[ 43 ]
Rocco R. Vanasco total value of property stolen in 1957 by structure cannot provide more than reason-
Fraud auditing robbery, burglary, larceny, and auto theft able assurance that fraud will be prevented.
was US$272 million. Consider also that the SIAS No. 3 emphasizes that the principal
Managerial Auditing Journal
13/1 [1998] 4–71 usual embezzlement amounts range from a mechanism for preventing fraud is control
few to many thousands of dollars and in and the primary responsibility for establish-
some instances to millions while the aver-
ing and maintaining control rests with man-
age loss from robbery and burglary in 1957
agement. It recommends a strong written
was only about US$200.
statement of management’s commitment to
Considering the large amount of defalcations corporate ethics. It lists the following as
and irregularities, one may wonder whether examples of preventive control:
an increase of audit work would have the • Competitive bidding serves as a control
effect of reducing losses of this kind in an over fraud by restricting the ability of a
amount equal to the cost of increasing audit- purchasing agent to reward a favored
ing (Mautz and Sharaf, 1961). vendor.
The AICPA, in its SAS No. 30, believes that • Subjecting credit card charges to the same
the fidelity bonds “provide more protection expense controls as those used on regular
economically and efficiently” than the company expense forms.
expenses for additional auditing work. The
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Davia et al. (1992) suggest that top manage-


Surety Association of America remarked
ment should play a proactive role in fraud
instead that in many cases, reliance on bond-
prevention by providing training in:
ing has proved unsatisfactory because losses
• disclosure of fraud;
far exceeded expectations (Surety Associa-
• investigative techniques;
tion of America, 1954).
• the nature of evidence required to conclude
Preventing fraud consists of those actions
the presence of fraud; and
taken to discourage the perpetration of fraud
• the internal controls necessary to deter the
and limit the exposure if fraud does occur. occurrence of fraud.
Internal auditing is responsible for assisting
in the deterrence of fraud by examining and Wells (1993) believes that the most effective
evaluating the adequacy and the effectiveness deterrent of fraud is the specter of detection,
of controls, commensurate with the extent of which can be bolstered by a stronger audit
the potential exposure/risk in the various presence. He feels that the following lessons
segments of the entity’s operations. In 1985, can be learned from those who commit finan-
The Institute of Internal Auditors issued cial fraud:
SIAS 3, “Deterrence, detection, investigation, • the risk of fraud exists in all financial activ-
and reporting of fraud,” and recommended ities and with all people;
that the internal auditing profession should: • those who commit fraud share personality
• Determine whether the organizational traits, mainly narcissism;
environment fosters control consciousness. • defrauders tend to spend their money osten-
• Set realistic organizational goals and objec- tatiously to impress those around them;
tives. • a great deal of fraud could be prevented or
• Determine whether written corporate poli- detected if auditors were more skeptical;
cies exist that describe prohibited activities and
and the action required whenever viola- • controls are of limited value in deterring
tions are discovered. fraud.
• Assess whether appropriate authorization In 1994, Wells proposed a “Model fraud pre-
policies for transactions are established vention program” which seems to be a signifi-
and maintained. cant departure from current auditing prac-
• Determine whether policies, practices, tices. The main points of this theory are
procedures, reports, and other mechanisms based on the following assumptions:
are developed to monitor activities and • the independent auditor is currently facing
safeguard assets. unprecedented liability for failing to detect
• Assess whether communication channels material frauds;
provide management with adequate and • the detection of these frauds by indepen-
realistic information. dent auditors is difficult at best, even with
• Determine whether recommendations need adequate training, and
to be made for the establishment or • the auditor’s primary concern should be
enhancement of cost-effective control to prevention, not detection.
help deter fraud.
The fraud prevention program should have
Internal auditors cannot guarantee that three realistic and measurable goals:
fraud will not occur. Given its inherent limi- 1 reduce losses resulting from fraud;
tations, even an effective internal control 2 deter fraud through proactive policies; and
[ 44 ]
Rocco R. Vanasco 3 increase the likelihood of early fraud Analytical auditing procedures, including
Fraud auditing detection. horizontal and trend analysis, are important
Managerial Auditing Journal and effective fraud detection techniques. By
Albrecht (1996a) agrees with chairman Wells
13/1 [1998] 4–71 analyzing sales in the last three or five years,
that “fraud prevention is far more cost-effec-
auditors can detect unexpected sales trend.
tive than fraud detection” but for the external
Special software allow the analysis of sales by
auditors “activities such as client acceptance
customer, salespersons, month, and activity.
and fraud prevention aren’t covered by ASB
The AICPA SAS No. 8 (1992) describes ana-
standards.”
lytical procedures as “evaluations of financial
Fraud prevention in most financial institu-
information made by a study of relationships
tions is a top priority. Begg (1994) reported
among both financial and non-financial
that check fraud alone costs the banking
data.” They involve comparisons of recorded
industry more than US$1 billion annually,
amounts, or ratios developed from recorded
with losses per transaction averaging
amounts to expectations developed by an
between US$10,000 and US$20,000. To deter
auditor. SAS No. 8 also states that a basic
such a fraud, First, Chicago adopted a strat-
premise underlying the application of analyt-
egy, termed “shared liability” which helps the
ical procedures is that relationships among
bank and its customers jointly identify
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

data may reasonably be expected to exist and


approaches to fraud prevention and imple- continue in the absence of known conditions
ment measures to reduce their exposure to to the contrary. Variability in these relation-
loss sharply. Procedure and technical mea- ships can be explained by, for example,
sures to combat check fraud that can be unusual events or transactions, business or
implemented in conjunction with a program accounting changes, misstatements or ran-
of shared liability include: dom fluctuation. Thus, the possibility of mis-
• screening of new account applicants; statements arising from fraud or errors
• data sharing with banking peers; should be considered when unexpected differ-
• built-in security measures such as holo- ences between recorded amounts and those
gram shipping on official bank or corporate determined by analytical procedures are
checks; and identified.
• cash management services. Gauntt and Glezen (1997) find analytical
Management may not support fraud preven- auditing procedures a powerful tool in identi-
tion for three reasons: fying areas where the risk of errors and fraud
1 Management’s concerns often are else- are high. The results of analytical auditing
where than audit or fraud. procedures may be useful to auditors in the
2 Managers are reluctant to believe the effort to provide management with early
existence of fraud. warnings of financial and operating prob-
3 Management may unreasonably feel that lems.
bringing up the presence of fraud may The emphasis on analytical audit proce-
alienate the work force (ACFE, 1995). dures increases when the auditor either sus-
pects fraud or believes that the risk of errors
The American Society for Industrial Security and irregularities is high. According to the
(ASIS), an international non-profit associa- National Commission on Fraudulent Finan-
tion of precessional security, publishes a cial Reporting, the potential for detecting
newsletter on fraud prevention and security fraudulent financial reporting through ana-
related matters in the World Wide Web lytical auditing procedures has not been fully
(Horsburgh, 1995). The homepage hosts is realized. The Report points out that unusual
University of Stellenbosch. According to Bliss transactions, deliberate manipulation of
and Aoki (1997), the perception of detection, estimates or reserves, and misstatements of
not internal controls per se, is the strongest revenues and assets often introduce aberra-
deterrent of fraud. Once the opportunity for tions in otherwise predictable amounts,
embezzlement and pilfering is removed most ratios, or trends. The Report suggests that in
people will follow their conscience. a number of cases reviewed by the Commis-
sion, analytical procedures might have
increased the likelihood of detecting fraudu-
Part VIII: Techniques in the lent financial reporting (PSB 89-2).
investigative and reporting process Albrecht (1996a) noted that analytical fraud
Analytical auditing procedures symptoms include transactions or events that
Analytical fraud symptoms are procedures happen at odd times or places; that are per-
or relationships that are too unusual or too formed by or involve people who would not
unrealistic to be believable (Albrecht, normally participate; or that include odd
1996a). procedures, policies, or practices.
[ 45 ]
Rocco R. Vanasco Trend analysis internal auditor noticed that one of the insur-
Fraud auditing If auditors were responsible for the discov- ance company’s independent agents did not
Managerial Auditing Journal
ery of all employee fraud, auditing tests keep the agency’s bank reconciliation cur-
13/1 [1998] 4–71 would have to be greatly expanded (Arens rent. After reviewing the evidence associated
and Loebbecke, 1994.)
with the agency’s bank account, the auditor
Trend analysis, which considers statistical found that one of the agents, no longer with
data over a period of years as a basis for fore- the agency, had taken advantage of the
casts, is a useful tool for detecting anomalies. delayed reconciliations and purloined the
For instance, an auditor who performs ana- missing funds. The auditor recommended
lytical procedures on financial statements that bank reconciliations be kept current.
would expect the percentage change in cost of The IIA Dallas Chapter (1993) reported that
sales to vary little from the change in sale. A an internal audit found that the branch’s
sharp increase in production and sales that reconciliations were three months behind,
results in greatly increased productivity or and those completed were poorly executed.
the marketing of a new product with a high The supervisor in charge of the bank recon-
price and a low cost may explain that the ciliations could issue, sign, and mail manual
entity’s sales people are conspiring with checks to satisfy a customer’s emergency
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

another company’s purchasing agent to request. After the supervisor completed the
inflate sales. Trend and ratio analysis may reconciliations, the auditor reviewed them
detect potential fraud such as: and discovered that US$130,000 was missing.
• An unexplained increase in the default rate Further investigation determined that the
caused by bogus loans. supervisor had misappropriated the missing
• An extraordinary increase in accounting funds. The auditor recommended segregation
balances. of the manual checks issuance duties,
• Sudden and unjustified increase in the cost enhanced procedures for documenting cus-
of the service. tomers’ emergency requests for funds, and
• Comparing the beginning balance one tighter controls over storing and accounting
month to the ending balance of the prior for check stock.
month.
Inquiry
Discovery sampling It helps to know that fraud is likely. But
The only alternative to discovery sampling some symptoms demand follow-up (Morley,
is the examination of each item until an 1994).
example has been found or the entire popu-
lation has been examined (Sawyer, 1988). An audit technique that can help find the
people involved in the fraud is inquiry. By
Discovery sampling is used when the auditor asking questions whose answers the auditor
is examining populations where the existence already knows, the auditor can ascertain the
of fraud or gross error is suspected. Such interviewee’s truthfulness and desire to coop-
populations might include: erate (Wallace, 1995).
• fictitious employees on the payroll; To elicit information about fraud matters,
• duplicate payments; Wells (1992) suggests a “Fraud assessment
• unauthorized shipments of goods; and
questioning” (FAQ), a non-accusatory, struc-
• a nonexistent collateral for loan (Sawyer,
tured interview method. Used properly, FAQ
1988).
can provide auditors and fraud examiners the
Discovery sampling is used primarily for clue of possible suspects.
search of critical deviations such as evidence Inquiry can, at times, be the best tool to
of fraud. If such deviation exists, the auditors assess possible violations of company’s poli-
may abandon their sampling procedures and cies or verify allegations of fraud. The IIA
undertake a thorough examination of the Fraud Round Table of the Internal Auditor
population. Discovery sampling assumes that reported a unique case of conflict of interest
auditors have a reason to believe that some- which was confirmed by inquiry:
one has been preparing fraudulent records. A written complaint was received by the
senior manager and the internal auditor
Bank reconciliations stating that field supervisors were favoring
The promptness with which reconciliations relatives with service business in violation
are prepared by an independent party will of the company’s code of business conduct.
determine how effective they are as a con- The auditor decided that the direct interro-
trol (Wallace, 1995). gation of the supervisor was the best course
of action. When asked if the people who were
Bank reconciliations play a powerful role in providing services for the project were
detecting potential fraud by employees. The relatives, the supervisor answered: “They
IIA Houston Chapter (1993) reported that an are not relatives, they are in-laws.” The

[ 46 ]
Rocco R. Vanasco supervisor was replaced and the boss was • profiting on insider knowledge;
Fraud auditing reprimanded. • disclosing securities transactions to others;
Managerial Auditing Journal • accepting gifts from vendors;
13/1 [1998] 4–71 • destruction or disappearance of records or
Part IX: The white-collar crime assets; or
White-collar crime • any similar or related irregularity.
All types of frauds are characterized by The Futurist, the journal of the World Future
certain contributing factors related to the Society, predicted that white-collar crime will
values and motivations of the fraud perpe-
spiral upward in the knowledge-based econ-
trators and the management of the
defrauded organization (Menkus, 1990). omy. High-tech securities have independent
economies based on creating, collecting, and
In 1939, Edwin H. Sutherland, in his presenta- distributing data. Thieves thus have new
tion at the American Sociological Society tools for committing their crimes (Internal
Symposium, coined the term “white- collar Auditor, 1995b).
criminality” to indicate administrative Nichols (1996) surveyed the following
wrongdoing. sources of information on white-collar crime
Quinney (1964) gave the following reason in the Internet:
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

for the lack of interest in the white-collar and • The World Wide Web Sources provides
corporate crime in the 1960s: research, new articles, product and ser-
Although there has been considerable inter- vices, and agencies related to white-collar
est and activity in the study of white-collar
crime.
crime, the development of the area has been
hampered by a number of problems that
• The KPMG Investigation and Security Page
have not been made explicit. The concept contains various fraud surveys.
has remained unclear because criminolo- • The White Collar Crime Loss Prevention
gists have subsumed different behavior through Internal Control which is a study
under the term. In addition, writers have conducted by Ernst & Young for Chubbs
varied on the amount of emphasis given to Insurance Company. It provides guidance
the social status of the offender, have on assessing exposure to fraud losses,
employed different meanings of occupa- reviewing internal control procedures, and
tional activity, and have lacked consistency
specifying control objectives.
in designating the illegal nature of the
offense.
• The Statistical Sidebar provides statistics
on white collar crime criminals and their
The Federal Bureau of Investigation (FBI) patterns. It also provides the sources where
defines white-collar crime as: statistics were obtained.
Those acts characterized by deceit, conceal- • The Investigative Database, Boston, MA,
ment, violation of trust, and not dependent contains a 20-year investigation experience
upon the application of threat of physical
by an investigator.
force or violence. Such crimes are commit-
ted to obtain money, property, or services; or • The Statement to the Senate Appropriations
to secure personal or business advantage Committee issued by the Director of the
(Kelley, 1976). Federal Bureau of Investigation (FBI) in
March 1996, focuses on the FBI’s initiative
A similar definition is given by the US in conjunction with the international com-
Department of Justice (1977): munity to combat white-collar crime
• Intent to commit a wrongful act or to (Nichols, 1996).
achieve a purpose inconsistent with law or • The Business Report – “Corporate crime –
public policy. big and small” broadcast by the Australian
• Disguise of purpose through falsities and Broadcasting Corporation focuses on the
misrepresentations employed to accom- level of illegal corporate activity in
plish the scheme.
Australia.
• Reliance by the offender on the ignorance
• The White Collar and Corporate Crime Over-
or carelessness of the victim.
looked posts a brief synopsis of research on
• Voluntary action by the victim to assist the
how the media overlooks white-collar
offender as a result of the deceit practiced.
crimes.
• Concealment of the crime.
• Crimes in St Louis provides white-collar
The Fraud Examiners Manual (1997) lists the crime information on embezzlement and
following actions constituting fraud: environmental crimes committed in the
• any dishonest or fraudulent act; city.
• forgery or alteration of documents; • Fraud Detection Kit offers instructional
• misapplication of funds or assets; materials to help businessmen detect and
• impropriety with respect to reporting deduce occurrences of fraud within their
financial transactions; organizations.
[ 47 ]
Rocco R. Vanasco • White Collar Crime discusses the serious- in any Executive Branch department or
Fraud auditing ness of white-collar crimes and how the law agency for White Collar Crime prosecution
Managerial Auditing Journal and judges impact the defense strategies for purposes (Charfauros, 1995).
13/1 [1998] 4–71 the companies. Freeman and Forcese (1994) argue that the
• IRS Investigator’s Handbook describes how war on crime in Canada largely ignores not
IRS investigators trace financial transac- only such white-collar employee crime, bus
tions as they relate to white-collar crime. also violations committed by corporations.
• The National White Collar Crime Center These include tax evasion, bribery, fraudu-
provides investigative report services to lent advertising, illegal mergers, and monop-
assist in the fight against economic crimes. oly pricing. Canadians pay increased taxes
• The National Center for Justice provides and prices for consumer goods amounting to
links to other agencies and other areas as much as US$20 billion a year as a result of
within the domain of criminology. white-collar crime. US statistics show that
• The National Fraud Information Center is a white-collar and corporate crime accounts for
coalition among the National Association US$10 for every one dollar lost to robbery,
of Attorney Generals, the Federal Trade burglary, larceny and auto theft combined. If
Commission, the National Consumers this 10 to 1 ratio applies to Canada, Freeman
League, and MasterCard. It provides links
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

and Forcese estimate that corporate crime


for contacting the coalition to report an costs Canadians about US$30 billion a year.
incident or to obtain information on previ-
ous reported activities. Employee fraud
• The Transparency International provides One of the most effective ways of deterring
useful information to anyone interested in dishonest conduct is by not hiring dishonest
researching the international corporate employees (Sawyer, 1988).
offenders. Kroll Associates Inc. (1993), a business fraud
• The Anthem Corporation distributes the detective agency based in New York City,
Financial Crime Investigator which allows offers the following list of behavior and
the user to write queries in the database events as early signs that may point to trouble:
management or mainframe computer • Significant changes in behavior, including
system. Fraud indicators are matched with unexplained mood swings.
profiles of specific fraud schemes. • Reluctance to take vacations or be away
Gulf Investigation, Inc.’s Report on white from the office.
collar (1997) is alarming: • Suggestions of heavy personal debts.
White-collar crime is a rampant vicious • Extravagant purchases or lifestyle.
plague which is crippling the American • Unusually close ties to vendors or a sudden
economy. Credit card fraud may exceed 1.5 switch in long-term vendors.
billion in 1994. Bank and insurance fraud • Tendency to manage by crisis: a disregard
has already exceeded even the most outra- for structure, controls, or procedures.
geous estimates of the 80’s. There are no real
• A desire to control operations and safe-
accurate numbers for the amount of dollars
guard assets: a disregard for segregation of
lost in check fraud, just educated estimates.
It is estimated that 90% of the daily business duties.
transactions in the U.S. involve checks. In • Continued adversarial relationships with
1993, about 100 billion checks (not dollars) groups within and outside the organization
were processed with an average return – particularly auditors.
(bounce) rate of about 2 percent. Collectabil- • Chronic job frustration: a known malcon-
ity studies in the mid-1980s reflected a 50% tent.
recovery rate. This figure is unrealistic in
the economic climate of the 1990s. Major According to Bliss et al. (1997), nearly 75 per-
retailers reported in 1992 that the amount of cent of employees steal at least once, and half
uncollectible checks presented to them of those are repeat offenders. As a result,
increased by over 35% from 1991. The Fed- almost one in three small business failures
eral Bureau of Investigation estimated in can be attributed to internal theft. They claim
1992 that 15 fraudulent checks were passed that employee fraud is far more costly and
each second, that equates to 54,000 checks an
devastating than all crimes committed by
hour.
shoplifters, vandals, and armed robbers. The
In Guam, the Twenty-third Legislature intro- most common rationalizations for stealing
duced Bill No. 116 which added a new No. are:
30116 to Title 5, Guam Code Annotated, rela- • I’m only borrowing the funds until I get a
tive to establishing a White Collar Crimes raise.
Unit within the Prosecution Division of the • No one will get hurt, the company has bud-
Department of Law. The Attorney General geted for this.
may utilize the services of specified personnel • Everybody does it.
[ 48 ]
Rocco R. Vanasco The IIA Florida West Coast Chapter (1990) • Borrowing petty cash and submitting ficti-
Fraud auditing reported that a bank teller frequently went on tious or personal checks to keep the
Managerial Auditing Journal shopping trips to New York City and Mexico, account balance in line.
13/1 [1998] 4–71 owned an expensive condominium, and • Diverting petty cash for personal use by
bought expensive lunches for friends. Most submitting phony invoices and expense
bank tellers cannot afford that lifestyle. The bills.
auditor’s review of the branch’s record dis- • Recording a deposit from an interbank
closed that almost half million dollars was transfer in the current period while failing
missing. The teller processed entries, per- to record the related disbursement until the
formed reconciliations, and handled next period kiting.
disbursements. There was no separation of Smith (1995) offers a typology of individuals
duties, and the teller was trusted by the who will embezzle:
branch manager. • The “Keeping up with the Joneses” type is
The Institute of Internal Auditors’ Profes- the individual who wants to live a life of
sional Standards Bulletin (PBS 84-3) warn luxury. The only way to afford this lifestyle
that audit tests are not designed to make is to steal from the employer.
detailed examinations and verifications of all • The “Opportunist” type is the person who
transactions to detect employee fraud and
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

quickly detects a lack of or a weakness in


other irregularities. However, internal internal control and seizes the opportunity
auditors have the basic responsibility to use to use this deficiency to his benefit.
due professional care in the application of • The “Crisis/in need” type is the individual
audit skills, tests, and conclusions based on who resorts to stealing to pay for large
the appropriate complexities of the audit family medical bills, to support his/her
being performed. Internal auditors cannot abuse of an expensive substance such as
give absolute assurance that irregularities do cocaine, or to pay gambling debts.
not exist. The possibility of material irregu- • The “Professional criminal” type is an
larities should be considered by internal individual who has made a career of
auditors when undertaking audit responsibil- stealing and has learned to cover his/her
ities (PSB 84-3). tracks.
• The “Unsatisfied/disgruntled” type is the
Embezzlement individual who thinks that he/she has
Embezzlement, like all crime, is a product of been unfairly treated. He/she steals to
motive and opportunity (Bologna, 1994). get the “compensation he/she deserves”
Embezzlement constitutes a fraud. It is the for his/her work or punish his/her
intentional appropriation of property employer.
entrusted to one’s care. Embezzlers convert To deter embezzlement, Smith (1995) recom-
property to their own use and conceal the mends the following measures:
theft. Bologna (1994) cites the following envi- • institute strong internal control policies
ronmental factors that enhance the probabil- which reduce the opportunity for crime;
ity of embezzlement: • conduct an aggressive and thorough
• Inadequate rewards. background check prior to employment;
• Inadequate internal controls. and
• No separation of duties or audit trails. • identify behavior patterns and intervene
• Ambiguity in job roles, duties, responsibili- before they cause problems.
ties, and areas of accountability.
• Failure to counsel and take administrative Other measures management could also
action when performance levels or personal consider are:
behavior fall below acceptable levels. • Create a positive work environment.
• Inadequate operational review. • Train all employees on drug awareness and
• Lack of timely or periodic review, inspec- encourage them to seek help.
tions, and follow-up to assure compliance • Contract with a family crisis counseling
with company goals, priorities, policies, service to provide assistance to employees.
procedures, and governmental regulations. • Consider whether to establish a drug test-
ing policy.
• Failure to monitor and enforce policies on
• Adopt an open door policy. Encourage
honesty and loyalty.
employees with work-related or personal
Embezzlers are persons who hold fiduciary problems to discuss them freely with man-
positions. Bologna cites the following agement.
schemes to embezzle cash: • Provide a telephone hotline service so
• Borrowing cash from funds to be deposited employees can anonymously report suspi-
on the assumption that the embezzler will cious wrongdoing and other ethics viola-
make it up on the next day (lapping). tions.
[ 49 ]
Rocco R. Vanasco If an internal auditor suspects that an poor financial planning, unusual complex
Fraud auditing employee is embezzling funds, the auditor procedures, and organizational indifference
must: (Alpert, 1992).
Managerial Auditing Journal
13/1 [1998] 4–71 • exercise due professional care; and Bologna distinguishes larceny from embez-
• inform the appropriate authorities in the zlement. The difference lies in the issue of the
company. legality of the article stolen. In larceny, the
Due professional care dictates that a suspect thief never had legal custody, whereas the
should not be confronted until supporting embezzler was legally authorized by the
evidence has been gathered. owner to take or receive the article and to
Bliss and Aoki (1997) claim that in nearly possess it for a time.
every case of embezzlement, a detailed analy- The IIA Baltimore Chapter (1994) reported a
sis of the company records shows that the case of larceny. A security group investigated
basic accounting system and the related and determined that a former employee had,
accounting control structure are the key for through available technology, created copies
evidence of past, present, and future internal of a blank check that had been reported miss-
fraud. ing before the employee had been terminated.
The fraud totaled US$7,000. The former
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Kiting employee was charged with grand larceny. As


Internal theft schemes work on the basis of a result, controls were put in place to deter-
four principles: disguise, divergence, diver- mine whether or not checks are real.
sion, and conversion (Bologna, 1994).

Kiting is the recording of a deposit from an Lapping


The purpose of lapping is to keep all
interbank transfer in the current period
accounts current in order to avoid auditor
while failing to record the related disburse-
suspicion and unusual customer exceptions
ment until the next period. The auditor to confirmation requests (Konrath, 1996).
detects kiting by:
• examining a schedule of bank transfers for Lapping is a type of embezzlement involving
a period covering a few days before and misappropriation of cash from a customer
after the balance sheet date; and and covering the resulting shortage with
• comparing paid checks returned in the next subsequent cash collection from another
day period, and dated prior to year-end, customer. To conceal the shortage, the
with checks listed as outstanding on the defrauder attempts to:
related bank reconciliation. • keep bank and book amounts in agreement
so that a bank reconciliation will not detect
Chambers (1985) reported in the New York
the fraud;
Times a well-publicized kiting case involving
• correct the customer’s account within a few
the president and chief executive officers of
days. Any discrepancy in the customer’s
Transit Mix Concrete Corporation and two
account can be explained as a delay in
large banks, Marine Midland and Citibank.
receiving the cash or posting it.
The officers drew checks in the Transit Mix
Concrete account at Citibank and deposited To detect lapping, auditors:
those checks in an account at Marine Mid- • confirm accounts receivable;
land for Water Tunnel Associates, a dummy • make a surprise cash count; and
company also operated by the officers of • compare the details of Cash Receipts Jour-
Transit Mix Concrete. The officers of Transit nal entries with the details of the corre-
Mix Concrete Co. were charged with stealing sponding deposit slips.
US$23 million.
Lapping is an internal control weakness. It
Alexander (1985) reported another kiting
can be prevented by separating the cash col-
case in Time. The use of float permitted the
lection from the recording function. Lapping
brokerage firm of E.F. Hutton fraudulently to
often involves fraud of small amounts. It is
obtain interest-free loans exceeding US$8
detected when there is suspicion of fraud.
million from 400 banks between 1980 and 1982.
Twenty or so executives participated in the
Pilferage
kiting scheme. Although the fraud was
Organizations should focus their efforts not
insignificant to the bottom line, nonetheless on eliminating occasional pilferage but on
the results were devastating to Hutton, which keeping it from blossoming into chronic or
eventually sold out. professional abuses (Wells, 1994).

Larceny Webster’s Dictionary defines “pilfer” as “to


The forensic auditor knows about those “red steal in small quantities.” It is done over and
flags” that make organizations their own over almost daily by employees at all levels of
worst enemy by routine control overrides, the organization. Wells (1994) reported that in
[ 50 ]
Rocco R. Vanasco the USA alone, workers annually pilfer a Auditors can detect such a fraud while per-
Fraud auditing billion dollars in paper clips, pencil, station- forming sale cutoff tests and examining
Managerial Auditing Journal ary, and postage. Nationwide, employees may transactions a few days before and after year
13/1 [1998] 4–71 pilfer as much as US$200 million a day – about end.
US$4 per employee. Sales and marketing fraud is one of the
Edgerton (1992) reported that the cost of biggest exposure areas for companies. It may
more serious employee thefts has grown take the form of fraudulent actions designed
dramatically. The survey conducted by the to generate fictitious commissions, or sales
London House and Food Marketing Institute representatives who defraud customers for
of more than 1,000 supermarkets shows that the benefit of the company or themselves
the average amount of theft per employee (Internal Auditor, 1995c).
rose from US$44.72 per employee in 1989 to The Cohen Commission reviewed several
168.48 in 1992 – an increase of 379 percent. fraud cases and found that direct confirma-
The IIA Houston Chapter (1991) reported a tion of accounts receivable from outside par-
case of pilferage of narcotics: ties did not provide the expected assurance
The internal auditor, while reviewing the because outsiders ignored incorrect informa-
narcotics inventory and activity reports, tion and actually cooperated with manage-
ment in giving incorrect information
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

found that the beginning balances did not


always agree with the previous day’s ending (Wallace, 1995).
balance. When the balances disagreed, the To uncover vendor fraud, auditors look for
beginning balance was less than the previ- red flags or weaknesses in the internal con-
ous day’s ending balance. These differences trol system such as:
always occurred when a particular nurse • vendor not on the approved vendor list;
was on duty. Further study determined that • invoice without purchase order or receiv-
the nurse had a personal substance abuse ing document;
and was pilfering the narcotics. • payment without invoice;
The IIA Mount Diablo Chapter (1993) • vendor’s address, telephone number, and
reported a case of deceitful pilfering. A ZIP code matches employee’s address;
review of refund receipts issued by the • sequentially numbered invoices;
cashier during the previous months detected • others (Kramer, 1996).
more cases of questionable refunds:
• some handwritten; Cash receipts and disbursements
Since auditors are now sued every time
• different customers; and
there is an undetected fraud, there should be
• no supervisor signatures. fewer undetected frauds and, hence, fewer
The cashier was interrogated and admitted to lawsuits (Albrecht, 1996b).
pilfering over US$25,000 via a refund scam. Commingling personal and company funds
The auditor recommended strengthening can lead to potential fraud. The IIA North-
internal control over refund procedures. west Metro Chicago Chapter (1993) reported a
case in which during a controls review of a
newly established distribution center, the
Part X: Accounts vulnerable to internal auditor found that cash receipts,
fraud which averaged US$125,000 daily, were
deposited in the personal account of the cen-
Accounts receivable and sales
ter’s accountant. The accountant remitted the
All fraud is done by those we trust… Audi-
tors and management should trust people, cash receipts to the central accounting office
but we are inviting trouble if we allow blind by personal check. When the auditor brought
trust to replace vigilance in auditing or to management’s attention the commingling
management (Thompson, 1992). of personal and company funds, the company
established a centrally controlled bank
The case of United States v. Natelli (1975) deals account and night deposit procedures.
with the failure to disclose properly the write- Lack of separation of duties for cash
off of uncollectible accounts and the over- receipts and cash application may cause
statement of sales thus making financial fraudulent misappropriation of cash. The IIA
statements misleading. North Jersey Chapter (1995) reported that the
Financial statements may be materially internal auditor’s review of the receipts’ log
misstated by inflated accounts receivable and and comparison of the log to bank amounts
sales at year end. The two most common revealed that US$39,000 had simply evapo-
schemes are: rated. Further review of the cash receipt
1 fabricated invoices; and functions performed by the same person who
2 increased sale prices substantially above made the bank deposits disclosed another
the company’s list prices. US$50,000 in revenue losses where profits
[ 51 ]
Rocco R. Vanasco should have been realized. Afterwards, inter- Several fraud cases have shown that inven-
Fraud auditing nal controls were implemented to ensure tory is often misappropriated by both man-
Managerial Auditing Journal separation of duties for cash receipts, cash agement and employees. In Cenco Inc. v.
13/1 [1998] 4–71 application, and cash report functions to help Seidman & Seidman, top management
prevent such losses in the future. defrauded the company of US$25 million in
The IIA Houston Chapter (1997) reported inventory.
that a duplicate payment of US$75,300 was If it appears that defalcation may exist as a
discovered by the internal auditor during a result of inventory manipulation, Clyde Lev-
review of transactions. The invoice for the ington (1991) recommends the following pro-
duplicate payment could not be located. The cedures:
auditor reiterated the relevance of appropri- • take a physical inventory and account for
ately documenting payment and reviewing the purchases and cost of sales during the
them for potential duplicate payments. period following the end of the fiscal period;
• determine the reasonableness of the gross
Petty cash value of inventories at year’s end;
In fraud, there is no issue of materiality • verify the extensions and additions on the
(Morley, 1994). inventory used to record the value at the
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

beginning and end of the fiscal year; and


Morley (1994) audited the petty cash fund of a
• review the policies and the application of
large organization and learned that:
the internal control procedures concerning
• All fraud is committed by those we trust.
the custodians involved in physically han-
• Early detection is sometimes the best pre-
dling the inventory.
vention.
• Auditors must be persistent in following up The IIA Calgary Chapter (1991) reported that
on explanations, particularly those that do the internal auditor was observing a quar-
not make sense. terly inventory and questioned the value of
• Dumpster diving can sometimes prove to be some damaged items. The damaged items
a useful tool in detecting fraud. were kept on hand until the suppliers could
• When fraud is suspected, even the slightest inspect them and issue replacements. The
variation from the norm is worth pursuing. auditor found that the items were included
• It helps to know that fraud is likely, but twice, once as inventory on hand and again as
some symptoms demand follow-up. receivables.
The IIA Atlantic City Chapter (1991)
The IIA Wichita Chapter (1991) reported the reported the following case of inventory
following case of cash shortage: fraud:
A special audit was conducted and employ- Inventory and requisitioning were con-
ees were interviewed. A suspect was identi- trolled by means of an automated perpetual
fied,but no sold evidence was found. The inventory system. The auditor noticed that
manager and auditor were advised by the the requisition form was blank and the
legal counsel that actual theft must be bartender had to write in the alcoholic
observed; witnesses must actually see a beverages that were delivered. The auditor
smoking gun in the suspect’s hand, so to determined that no one ever matched the
speak. After hours, hidden video cameras quantities input to the inventory system – a
were installed and within 48 hours a visual control weakness that prevented detection
record was made of the suspect taking the of inventory shrinkage. The auditor
money. The employee was dismissed and matched the requisition forms with the
additional controls were implemented. quantities of alcoholic beverages delivered.
Numerous deficiencies were detected. The
Inventory auditor recommended that matching
When a fraud is expected, auditors perform required quantities and ordered quantities
threat analyses, which means they examine become part of the normal process of alco-
what assets are held and how those assets holic beverage control.
can be taken. Then, the auditors strive to
Wells (1997) reported an inventory fraud in an
outsmart the crooks (Wallace, 1995).
US Army Commissary. The Army Audit
The media has reported several allegedly Agency uncovered the inventory skimming
fraudulent financial statements attributed to scheme perpetrated by the meat manager.
significant inventory misstatements. A The manager was able to defraud the Army
December 1992 Wall Street article, “Inventory Commissary by raising the price of the meat
chicanery tempts more firms, fools more high enough to make up for the amount of
auditors,” stated that the “recent rise in government-purchased meat he diverted to
inventory fraud is one of the biggest single outside restaurants. The total loss of the
reasons for the proliferation of accounting scheme was estimated at US$5 million or
scandals.” more.
[ 52 ]
Rocco R. Vanasco Accounts payable/purchases worksheet balance, the clerk’s withholding
Fraud auditing When one person is given total control over was increased by the pennies. Nobody com-
the financial records, it is a license to steal plained. The clerk’s good luck soured after
Managerial Auditing Journal
13/1 [1998] 4–71 (Bliss and Aoki, 1997). the pennies became quarters and the IRS
A transfer of cost of sales to a prepaid asset investigated the clerk’s filing for several thou-
account may cause fraudulent financial state- sand dollar federal tax refund for possible tax
ments. Thompson (1993a) reported a case of a fraud.
financial reporting fraud in which an The IIA Calgary Chapter (1991) reported
unrecorded cost of sales for US$1.2 million that an auditor performed a thorough compli-
took place. The audit manager had deter- ance test of the payroll system and found little
mined that cost of sales was 39 percent, well evidence of control in the update and check
within the industry standard, but the accoun- reconciliation and distribution process. With
tant responsible for preparing the cost of the help of the financial officer, the auditor
sales analysis showed that cost of sales was able to convince management to imple-
averaged 44 percent, not 39 percent. The dif- ment new controls and strengthen existing
ference was not caused by overpayment as controls in the payroll systems.
alleged by the accountant but from an unsup- The IIA North Jersey Chapter (1995)
reported that through a simple review of
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

ported adjustment made by the financial


controller to the general ledger from food payroll records, an internal auditor was able
inventory account to a prepaid asset account. to uncover several irregularities in the orga-
Such a transfer overstated the preliminary nization’s employee benefit plan such as:
net income to the parent company. • former employees were still being carried
The IIA San Francisco Chapter (1993) on the employer-paid health insurance
reported a case of nonexistent vendor fraud. roster;
An audit had shown significant control weak- • a 22-year-old, non-college student son of a
nesses in accounts payable. There was no personnel department employee was
verification of the existence of vendors, and included in the insurance roster even
checks were returned to the requesting sales- though he was not considered an eligible
people for delivery to the vendors. The audit dependent; and
findings showed that the sales manager had • retired employees were present on the
stolen US$430,000 by means of checks written active payroll and were receiving a full
to nonexistent vendors and diverted to the retiree pension at the same time.
manager’s bank accounts. The auditors rec-
ommended validating vendors and stopping Pensions plans and benefits
the practice of hand delivery of checks. Given current social trends, it no longer is
expedient, and could be described as impru-
dent, to assume automatically that the client
Payroll fraud
and its subordinates are trustworthy
If your readers spot a man who cheats in
(De Groot, 1997).
little ways on their team, I suggest that they
get rid of him fast. This kind of man won’t The looting of pension funds of the Salvation
carry his load in little ways, so why should Army Endowment, the Chicago Housing
you expect him to be honest in the big Authority and other organizations has been
things? (White, 1977).
reported in the media. The following cases of
Payroll fraud can be perpetrated by the most pension fraud show that management abuse
common schemes: of pension funds is both a national and inter-
• setting ghost employees; national concern.
• failing to delete employees who have been In 1993, Britain’s Serious Fraud Office
terminated; and indicted Kevin and Jan Maxwell charging
• submitting excessive overtime. them with defrauding pension participants of
approximately US$375 million missing from
To detect these kinds of fraud, auditors apply
the company pension funds (Schvimmer,
the following analytical tests:
1993). British fraud investigators allege that
• duplicate and validity tests;
shares belonging to Maxwell pension funds
• exception testing; and
were illegally used to secure loans to prop up
• recalculations (Crowder, 1997)
Robert Maxwell’s private ventures. In 1996,
Fraud may arise from a lack of implementa- the Serious Fraud Office found the Maxwells
tion in the internal control system. The IIA not guilty of misusing L 122 million in shares
Florida West Coast Chapter (1990) reported belonging to Maxwell Company pension fund
that a company payroll clerk, who manually (Chernoff, 1996). The UK Goode Committee’s
prepared paychecks, figured nobody checked report on proposed pension law reforms
to see that the amount withheld for taxes was would increase the accountant’s role, both as
accurate to the penny. To make the payroll an auditor and adviser to pension plans. The
[ 53 ]
Rocco R. Vanasco report calls for auditors to be statutorily superseded SAS No. 6. It provides guidance
Fraud auditing required to report serious or persistent irreg- for auditors in:
Managerial Auditing Journal ularities to regulators and calls for stronger • identifying related-party transactions,
13/1 [1998] 4–71 position for trustees to safeguard against • determining the existence of related-party
fraud or irregularity (Cole, 1993). transactions, and
In 1994, the IIA Tucson Chapter reported • examining related party transactions and
that confirmation notices were mailed to all balances.
pensioners (about 1,000). The recalculation of
Thomas (1989) reported in the Wall Street
the pension benefits for the sample of pen-
Journal that the auditors who audited the
sioners detected five pensions that were inac-
financial statements of Lincoln Savings and
curate. The inaccuracies appeared to have
Loan Association did not devote adequate
been caused by data input errors. Three of the
audit resources to examine the related-party
pensioners were due a total of US$10,000 plus
transactions and were accused of actually
interest, and two pensioners had been over-
approving the transactions. The Lincoln
paid a total of US$11,000.
Savings and Loan Association reported losses
On April 11, 1996, President Clinton pro-
exceeding US$2.5 billion!
posed a plan to reduce pension fraud by In 1991, the AICPA, in its Accounting Trends
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

allowing audits of all retirement and pension and Techniques, reported that of the 600 com-
funds and requiring auditors to report sus- panies surveyed, 192 disclosed related-party
pected bribery, theft, or kickbacks within five transactions in 1990.
days (O’Connell and Schultz, 1996). In Autumn 1995, the British Accounting
Standards Board (ASB) issued Financial
Related-party transactions Reporting Standard No. 8, Related Party
In carrying out all phases of the audit, the
Disclosures. The disclosure standard is help-
auditor should be alert to any clues regard-
ing the existence of related parties and for
ful in reassuring readers that they have rele-
transactions involving them (Kapnick, vant information about matters that may well
1980). have affected a company’s reported perfor-
mance, but many people will see the standard
Related-party transactions played a large role as a response to fraud that have or may have
in several well-publicized fraud cases such as involved related parties (Archer, 1996).
Allied Crude Vegetable Oil, BarChris, Cenco,
CIT Financial, Continental Vending, Equity Unrecorded liabilities
Fund, Four Seasons, Home-Stake, Homex, Suspected wrongdoing must be fully investi-
McKesson & Robbins, Penn Central, Republic gated, no matter who the suspect might be
National Life Insurance, Sterling, Talley (Thompson, 1993b).
Industries, US Financial, Vesco, Westec, West-
The search for unrecorded liabilities includes
gate and many others. Related-party transac-
procedures performed through the last day of
tions are frequently used as conduits for
field work, such as examining subsequent
transferring assets out as the Continental
cash disbursements. These procedures are
Vending Machine fraud case. To muddy the
designed to detect liabilities that existed at
audit trail, loan proceeds are transferred
year-end but were omitted from liabilities
back and forward between the companies.
recorded in the client’s financial statements.
In July 1975, the AICPA issued SAS No. 6,
Related Party Transactions and provided the Computer fraud
following definition: The computer has greatly enhanced the
Related parties exist when another entity ability to conceal fraud (Levi, 1997).
has the ability to significantly influence the
management or operating policies of the In 1984, the EDP Fraud Review Task Force of
transacting parties or when another entity the AICPA defined EDP-related fraud as “any
has an ownership interest in one of the intentional act, or series of acts, that is
transacting parties and the ability to signifi- designed to deceive or mislead others and
cantly influence the other, to the extent that that has potential impact on an organiza-
one or more of the transacting parties might
tion’s financial statements.” Collier et al.
be prevented from fully pursuing its own
(1991) also defined computer fraud as “any
separate interests.
fraudulent behavior connected with comput-
In 1982, the FASB issued Statement of Finan- erization by which someone intends to gain a
cial Accounting Standard No. 57, Related dishonest advantage.”
Party Disclosures which states: “Auditors’ The first federal prosecution for computer
failure of auditing related-party transactions fraud occurred in 1966 when a programmer in
has been the subject of several fraud scan- a Minneapolis bank successfully instructed
dals.” In August 1983, the AICPA issued SAS the computer to ignore all overdrafts from his
No. 45, Related-party Transactions, which account. The discovery occurred when the
[ 54 ]
Rocco R. Vanasco bank returned to manual processing after a • application programs;
Fraud auditing computer failure (Alexander, 1974). • data files;
Managerial Auditing Journal Brandt (1977) provided an inventory of the • computer operations;
13/1 [1998] 4–71 biggest computer fraud perpetrated against • communications; and
US and foreign corporations. A lesson is to be • computer hardware, systems or firmware.
learned from the following examples:
Leinicke et al. (1990) suggest the implementa-
• Ordinary managers and clerks have perpe-
tion of a cost-effective fraud auditing pro-
trated more of the discovered computer
gram based on audit hooks or red flags to
fraud than computer experts.
detect fraud. The hooks are embedded during
• Analysis of 150 cases indicated that 40 per-
the design phase of a data processing system.
cent of corporate fraud involved fraudulent
For an insurance company, the audit hooks
payments to creditors (disbursements),
are designed to detect unauthorized and
employees via payroll, other individuals
(typically pension or insurance claims). potentially fraudulent charges to policyhold-
• Manipulation of incoming funds is most ers.
often tied to some means of permanently Menkus (1990) observed that understanding
eliminated receivables from accounts how computer fraud can occur will not elimi-
through unauthorized adjustment. nate the menace; but internal auditors have
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

• Manipulation of transactions that are most no alternative but to ferret out weaknesses
common include: adding unauthorized and develop counterstrategies. He listed eight
transactions (e.g. phony purchase orders); distinctive factors that contribute to the per-
altering transactions (e.g. posting deposits sistence of the computer fraud:
to another accounting); and not processing 1 Inadequate design of the information
transactions (e.g. interest income). system.
• Industry groups, which are expected to 2 Aggregation of the information system’s
have large inventory shrink, may indirectly transaction processing steps so that a
encourage fraud in the inventory areas. review of what is taking place becomes
• Means of detection of fraud are often suspi- impossible.
cions by fellow employees or excessive 3 Insufficient discrimination as to the legiti-
greed that prompts an investigation. macy of the transaction processed by the
information system.
In 1978, a survey of EDP-related fraud was 4 Toleration by the information system of
conducted in the banking and insurance errors – either in data content or process-
industries in cooperation with the American ing results.
Insurance Association, the American Council 5 Detachment of the information system’s
of Life Insurance, the Life Office Manage- ongoing operations from the physical or
ment, and the Bank Administration Institute functional reality to what it is supposed to
(AICPA, 1984). reflect.
Of the 854 insurance companies surveyed, 6 Unrestrained, unmediated remote access
the respondents identified 40 cases they to an information system that is subject to
believed to be EDP-related fraud. The most possible compromise or manipulation.
frequent scheme in the insurance industry 7 Restricted ability to collect sufficient
was generating claim payments to the perpe- knowledge about the fraud itself – espe-
trators or to accomplices. Another scheme cially, its scope and extent of the loss that
was generating refunds reductions of policy has occurred.
premiums by authorizing refund checks after 8 Limits in the investigation tools for ana-
changing policyholder members and lyzing the knowledge that auditors may
addresses, or by cancelling policies to gener- gain about fraud.
ate refund checks automatically. The perpe-
trators of fraud in order of frequency were Under the auspices of the IIA-UK and the
clerks, loan officers, data processors, supervi- Chartered Institute of Management Accoun-
sors, insurance agents, and systems program- tants, Collier et al. (1991) surveyed 300 mem-
mers. bers of both institutes of which 184
In May 1983, the OECD defined computer responded. The majority of the respondents
crime as “any illegal, unethical, or unautho- indicated that the organizations placed spe-
rized behavior involving data-processing, cific responsibility on the internal audit
and/or transmission of data.” department for prevention and detection of
The findings of the EDP Fraud Review Task computer fraud. The study also indicated that
Force of the AICPA (1984) indicate that EDP 96 percent of internal auditors consider the
fraud may be directly involved by improper possibility of fraud when examining new and
manipulation of: existing computerized systems. About 86
• input or transaction data; percent considered the possibility of fraud
• output or results; when specific reviews were in progress. The
[ 55 ]
Rocco R. Vanasco greatest level of threat was the false computer unauthorized use of computer systems
Fraud auditing input followed by unauthorized access. within the last 12 months;
Managerial Auditing Journal Thompson (1991) believes that the move- • more than 50 percent cited US corporate
13/1 [1998] 4–71 ment toward an increasingly computerized competitors as likely sources of attacks;
global economy likely will heighten exposure • more than 50 percent do not have a written
to fraud. Smith and Crumbley (1991), in Trap policy on how to deal with network intru-
Doors and Trojan Horses, introduced new sions;
auditing techniques to prevent and detect • more than 60 percent do not have a policy
fraud. for preserving evidence from criminal or
The following surveys show that computer civil proceedings;
frauds are mostly attributed to the inade- • more than 70 percent do not have a “warn-
quacy or lack of implementation of security ing” banner stating that computing activi-
systems. ties may be monitored;
The IIA Wichita Chapter (February 1991) • less than 17 percent said that they would
reported that, during an audit of microcom- advise law enforcement if they thought they
puter security, the audit found that the com- had been victimized;
pany’s microcomputer policy manual was • about 70 percent cited fear of negative pub-
rarely followed and was generally looked
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

licity as the reason they would not report a


upon with disdain. There were varying docu- suspected crime (Internal Auditor, 1996b).
mentation standards, backup procedures, and
security methods, ranging from very good to According to a 1996 report from the US Gen-
virtually nonexistent. The audit report eral Accounting Office, computer systems in
resulted in corrective action to revise and the US Department of Defense may have expe-
expand the company’s microcomputer rienced as many as 250,000 hacker attacks in
manual. 1995. Such attacks are often successful, grant-
Input tampering is considered to be the ing unknown and unauthorized persons
most prevalent computer fraud. Input scams access to highly sensitive information, and
can be prevented with an effective internal they double in number each year due to eas-
control system such as: ier and more widespread use of the Internet
• separation of duties; and to the increasing sophistication of com-
• control totals; puter hackers (Internal Auditor, 1996c).
• access controls; and Rapalus (1996) feels that there has to be a
• audit trails (Thornhill, 1996). greater commitment of resources to informa-
tion systems security and increased coopera-
Computer fraud, which is considered a crimi- tion between the private sector and law
nal offense, has drawn the attention of federal enforcement. The information age has
and state legislators causing them to be more already arrived, “but many organizations are
vigilant than ever. Thornhill lists the follow- woefully unprepared.”
ing statutes enacted: Credit card fraud in the US involving bank
• Fraud in connection with Federal Inter- cards alone totaled US$680 million in 1995.
state Computers (Title 18, USC Section The growth percentage of fraud is however
1030). decreasing as new technologies are becoming
• The Electronic Funds Transfer Act (Title more widely used. In 1996, Mastercard and
15, USC Section 1693n). Visa International developed Secure Elec-
• The Counterfeit Access Device and Com- tronic Transactions (SET), a new standard for
puter Fraud and Abuse Act of 1984 (Title 18, credit card payments in the Internet. The key
USC Section 1030). to SET is that the merchant from whom the
• Computer Fraud and Abuse Act of 1986 purchase is made never gets to see the buyer’s
(Public Law 99-474). credit card number, instead the card number
• Electronic Communications Privacy Act of
is encrypted and sent to the merchant’s bank
1986 (Public Law 99-508).
(Arnold, 1996).
• Small Business Computer Crime Preven-
In the UK, a recent KPMG survey of senior-
tion Act of 1984 (Public Law 98-362).
level finance executives at 1,500 organizations
• Computer Security Act (Public Law 100-
shows that finance directors are basically
325).
uninformed about computer security issues.
In 1996, the US-based Computer Security The survey revealed that:
Institute (CSI) queried security practioners • Ninety-eight percent of the organizations
from a variety of US agencies, financial insti- have not implemented BS7799, the IT secu-
tutions, and universities. The CSI survey rity standard developed in February by the
shows: UK government and industrialists.
• 41 percent of the respondents had • Sixty-seven percent have no business conti-
experienced some form of intrusion or nuity plan.
[ 56 ]
Rocco R. Vanasco • Only 45 percent have a written security organization should be informed. The inter-
Fraud auditing policy. nal auditor may recommend whatever inves-
• Only one in five requires formal security tigation is considered necessary in the cir-
Managerial Auditing Journal
13/1 [1998] 4–71 compliance from business partners. cumstances. Thereafter, the auditor should
follow up to see that the internal auditing
• Back-ups and disaster plans are untested.
department’s responsibilities have been
• Compliance reviews are rare.
met.
• Only 36 percent regularly backup data held
on PC’s (Internal Auditor, 1996b). The second Guideline 440.01 states that follow
up is necessary in the reporting process of
In the US, the Federal Bureau of Investigation
improper activities:
(FBI) has established International Computer Internal Auditing should determine that
Crime Squads throughout the country in corrective action was taken and is achieving
response to the rapid escalation of computer the desired results, or that management or
crime. the board has assumed the risk of not taking
In 1995, the Futurist predicted that orga- corrective action on the reported findings.
nized crime will take full advantage of the
The Institute of Internal Auditors, in its “IIA
information superhighway. A prime target
position paper on whistle-blowing” recon-
will be financial institutions. Computer-
firms that reporting to the board of directors
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

literate mob groups will reroute electronic-


satisfies the requirements of the professional
cash flow and steal valuable information kept
standards, particularly when an audit com-
by banks (Internal Auditor, 1995b).
mittee is available to which internal audit is
granted access (Institute of Internal Auditors,
Whistleblowing
Employees who report illegal and unethical
1988).
practices in the workplace ought to be pro- Mautz et al. (1984), in their survey on whis-
tected and cherished by their employers tle-blowing, relate to the unpleasant experi-
(Vinten, 1994). ence of whistleblowers:
Within internal auditing, loyalties are likely
For Vinten (1994), society owes a debt of grati- to vary with personal plans and opportuni-
tude to its whistleblowers. He remarked that ties of the auditors concerned. We found no
in the real world, vigilance is needed to deal strong understanding or teaching with
with illegal price-fixing, cheating on govern- regard to an overriding professional loyalty
ment defense contracts, abuse and incompe- to an institution, position, or ideal. On a
tence in hospitals, disregard of health and number of occasions when the subject of
safety standards. whistle-blowing slipped into the conversa-
tion, the attitude of those present was nei-
The IIA Code of Ethics proclaims that Certi-
ther positive nor negative. Some of those
fied Internal Auditors or members of The
who had an occasion in blowing the whistle
Institute of Internal Auditors “shall not were bitter about the results of having done
knowingly be part of any illegal or improper so.
activity” and mentions that auditors have an
obligation to the general public. The IIA ethi- There seems to be a consensus that whistle-
cal posture on informing the “public” on blowers ought to be protected from any sort of
irregularities seems to contradict its position retaliatory measures. Gill (1996) believes that
taken in the SPPIA and PSB which limits employers are often unwilling to implement
such information internally. Ethics and loy- any negative employment decision against a
alty may not follow the same line of reason- wistleblower for fear that the employee will
ing. Professional Standards Bulletin 83-5 add a claim of retaliation to the suit. Albrecht
states: (1996a) also agrees that employees must be
When an internal auditor’s procedures lead given easy avenues for whistleblowing and be
to suspicion of some kind of wrongdoing, the reassured that it is okay to come forward.
auditor should determine the possible Clinard (1990), in his survey, gave several
effects of wrongdoing, discuss the matter reasons for nor reporting corporate viola-
with the appropriate level of management, tions to the government:
and decide with management who should • strong loyalty;
investigate or otherwise follow up the suspi-
• an employee might not have all the perti-
cion. When wrongdoing is suspected, the
auditor’s responsibility extends to the appro-
nent facts about the violation;
priate level of management within the orga- • it would make one’s supervisors look bad;
nization. • an individual should quit instead of going
to the government.
The Standards for Professional Practice of
Internal Auditing (1988), Guideline 280.03 Chazen et al. (1985) observed that external
states: auditors are not legally obligated to blow the
When an internal auditor suspects wrongdo- whistle on clients. However, circumstances
ing, the appropriate authorities within the may exist when auditors are legally justified
[ 57 ]
Rocco R. Vanasco in making disclosures to a regulatory agency In 1991, a former Rockwell machinist David
Fraud auditing or a third party. Such circumstances occur: Vosoughka filed a suit under the Federal
Managerial Auditing Journal • when a client has intentionally and without False Claims Act, which awards whistle blow-
13/1 [1998] 4–71 authorization associated or involved a CPA ers a portion – generally 15 percent on any
in its misleading conduct; money received by the government as a result
• when a client distributed misleading draft of the legal action. The lawsuit alleges that
of financial statements prepared by a CPA Rockwell workers routinely charged their
for internal use only; and time to space shuttle accounts even when
• when a client prepares and distributes in they were working on other projects. The
an annual report or prospectus misleading Justice Department joined the whistle blower
information for which the CPA has not in the lawsuit and accused Rockwell Interna-
assumed responsibility. tional Corporation of overcharging NASA
possibly by billions of dollars for contracts to
CPAs should not view Rule 301 on confiden-
build part of the space shuttle (Sims, 1991).
tial information as an excuse for inaction
In 1992, many members of the US Congress
where action may be appropriate to right the
wanted to increase the protection to workers
wrongful act committed by a client. The
and executives who blow the whistle on their
external auditor’s responsibilities to disclose
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

employers’ violations and strengthen Section


illegal clients acts to outside parties is the
11(c) of the Occupational Safety and Health
same as for material irregularities.
Act (OSHA) by:
To reduce governmental fraud, Congress
• extending from 30-180 days the time during
amended the False Claims Act of 1986 which
which an employee can file a whistle-blower
encourages employees to sue employers who
complaint; and
are defrauding the government. Title 31,
• allow the Department of Labor to pursue
Section 3729-3732, allows individuals to file
retaliation allegation via a departmental
what is called a “qui tam” lawsuit (Latin for
hearing, instead of going to federal court as
“in the name of the King”). Under the law, a
now is the case (Internal Auditor, 1992b).
wistleblower can bring suit in the govern-
ment’s name against a company perpetrating Others believe that auditors should be
fraud against the government. The False responsible for whistle-blowing to inform
Claims Act permits recovery of “three times” appropriate authorities when suspected
the amount of damages caused to the govern- fraud and other illegalities are discovered in
ment by the false claims, plus a US$10,000 the course of an audit. Many organizations
penalty per false claim. The wistleblower, have established hotlines as a way of meeting
identified as a “relator” is entitled to up to 30 the requirements of the Federal Sentencing
percent of the amount recovered, including Guidelines of 1991. The auditing profession is,
attorney’s fees. In addition, the Act makes it however, struggling with the dilemma of
illegal for employers to retaliate in any way confidentiality and the pressures from Con-
against wistleblowers for reporting fraud gress to whistle-blow. If confidentiality is not
(Iraola and Klubes, 1997). Senators Charles respected, the entire audit process may be
Grassley and Howard Berman felt that this imperiled (Wallace, 1995).
whistle-blowing provision was aimed at In 1993, the US Congress proposed a bill
employees of private companies. In a Febru- “Financial Fraud Detection and Disclosure
ary 2, 1992 letter to the Washington Post, they Act.” It aims to force auditors to report mis-
wrote that auditors “have a conflict of inter- leading corporate financial accounting to the
est and an unacceptable incentive to self-deal SEC, seek to encourage such reporting by
if they are allowed to participate in substan- giving auditors a time limit to resolve report-
tial recoveries simply for doing their jobs” ing problems with management, and to
(Internal Auditor, 1992a). confer virtual immunity from retribution if
Barlas (1990) reported that the corporate they do report irregularities. The bill has its
whistle-blowers could be hurt by the Bush critics. Although it recognizes investor’s need
Administration proposal to tighten the Com- for better financial reporting, it is unlikely to
puter Fraud and Abuse Act of 1986. The catch auditors who are criminally conspiring
amendments proposed by the Justice Depart- with their clients as such auditors would not
ment, would classify information in federal likely voluntarily report any wrongdoing.
related computer files as “property.” If a The bill would involve too much government
defense contractor employee copied informa- intervention in business management
tion in a Pentagon weapons systems test from (Donlan, 1993).
a computer file and slipped that information US Corporations are pleading with the
to a federal prosecutor or a congressional Supreme Court to strengthen their legal
committee chairman, that employee could be defenses against the False Claim Act. Since
prosecuted under federal law. the Department of Justice values its
[ 58 ]
Rocco R. Vanasco informants, the corporate plea may be futile • if handled properly, the hotlines can be good
Fraud auditing (Yang, 1997). public relations tools; and
Managerial Auditing Journal In the UK, a bill designed to protect individ- • they deter fraud.
13/1 [1998] 4–71 uals who disclose corporate wrongdoing,
failed to get through the UK Parliament. The In 1996, the UK’s Department of Social Secu-
Public Interest Disclosure Bill would have rity set up a hotline for exposing individuals
allowed individuals acting in the public inter- suspected of making bogus claims. After
est to obtain a court order protecting them receiving an average of 250 calls per hour,
from termination or discrimination due to with one-third of them relating to employers –
their revelations (Chapman, 1996). rather than individuals – who cheat the
In New Zealand, the Parliament is system, Social Security Secretary Peter Lilley
currently considering two pieces of legisla- called for the establishment of a separate
tion intended to protect whistleblowers: dedicated line for reporting dishonest
1 the Wistleblowers Protection Bill, intro- employees. An estimated £1 billion each year
duced by Phil Goff, a private member of is wrongly paid to benefit claimants who
Parliament, in June 1994; and cheat the system (Internal Auditor, 1996d).
2 the Protection Disclosure Bill, a Govern- To preserve the anonymity of whistleblow-
ment Bill, introduced in August 1996.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

ers, Anthem Corporation developed the


Both bills enable whistleblowers to obtain Financial Crime Investigator which helps
immunity from civil and criminal proceed- auditors, investigators, security personnel,
ings. The Financial Transactions Reporting and prosecutors detect, investigate, and
Act of 1996 contains a specific provision for combat contract and procurement fraud. The
auditors for reporting irregularities (Dalziel, program includes pulldown options that
1996). provide advice on how to proceed after an
Hotlines allegation is made or an anonymous tip is
In 1979, the General Accounting Office (GAO) given, that list the principal indicators of
established a whistle-blowing hotline as a contract or procurement fraud, and outline
mechanism for combating fraud, waste, and the essential legal proofs of such fraud
abuse in federal expenditures. The success of (Lindquist, 1995).
the GAO hotline has led other government
agencies, including 26 statutory Inspectors Fraud and downsizing
General, state and local agencies, and private There is a clear social price being paid by
companies to implement similar programs. downsizing workers, and at the same time
The primary findings resulting from tips there is a significant increase in fraud inci-
received include private use of government dents among American business entities
property, work-hour abuse by federal employ- (Van Nostrand and Luizzo, 1996).
ees, fraud by recipients of such benefits as Van Nostrand and Luizzo (1996) find a corre-
welfare, social security, disability and hous- lation between downsized workers and fraud
ing, and general mismanagement by govern-
increase. The underlying reasons are:
ment employees. Comptroller General Bow-
• loyal employees suddenly become embez-
sher was satisfied with the results of the GAO
zlers;
hotline and stated that “the existence of the
hot line has been a deterrent factor” (Flesher • the cutback of personnel in sensitive areas
and Buttross, 1992). such as security, payroll, management
In 1979, the Department of Defense (DOD) information systems makes the company
also established a fraud hotline. The DOD more vulnerable to fraud;
office of the Inspectors General estimated • the employees tend to retaliate and hurt the
that “27 percent of the allegations reported to company by committing fraud against it;
the hotline were substantiated with identified • cutbacks are made in those areas where
savings of US$5.3 million dollars in a two-year more fraud protection is needed.
operation” (Flesher, 1996).
Norman Inkster, president of KPMG Investi-
Leinicke et al. (1994) reported on the hot-
gation and Security Inc. in Toronto, believes
lines established by five companies – Archer
Daniels Midland (ADM), First Chicago, Geor- that many factors in the current business
gia-Pacific, Keystone Insurance, and South- environment, such as downsizing, de-layer-
ern California Edison Company. The results ing, and sophisticated technology, can actu-
show the following advantages: ally generate more opportunity for fraud
• the fraud surfaced by hotline tips often (Gauthier, 1995). Unfortunately, downsizing
results in strengthening internal controls; dampens employee loyalty, leads to increased
• the benefits of operating the hotlines employee fraud and opens the door for more
greatly outweighed their costs; management abuses.
[ 59 ]
Rocco R. Vanasco Conflic of interest fraud • vendor telephone numbers to employees’
Fraud auditing The primary detective control against self- home telephone numbers or outside busi-
Managerial Auditing Journal
dealing is to match the employee master file ness numbers.
13/1 [1998] 4–71 records against the vendor file records for
identical information, such as taxpayer
identification numbers, addresses, bank
Conclusion
account numbers, and the like (McNamee,
1996). The audit department that chooses to be
part of the fraud solution can look forward
Employee fraud often arises when employees to continuing professional challenge
are both self-employed and work, at the same (Thompson, 1991).
time, with organizations. They frequently
tend to sell their personal products to the Fraudulent financial statements are of great
organizations they work with. McNamee concern not only to the corporate world, but
(1996) wrote that often organizations do not also to the accounting profession. Every year
like to do business with their employees so the public has witnessed spectacular busi-
that the employees are not placed in a situa- ness failures reported by the media in major
tion where a conflict of interest exists national and international journals, newspa-
between the employees’ responsibilities to pers, and magazines. These catastrophic
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

events have shocked the public, undermined


the employers and the employees’ self-inter-
auditors’ credibility in their reporting func-
est. To prevent employee fraud, he suggests
tion, and eroded public confidence in the
two preventive controls that should work in
accounting and auditing profession. Often
all organizations:
government agencies have been accused of
1 a clear communication policy addressing
being naïve and indifferent when their fig-
conflicts of interest and self-dealing; and
ures have been grossly misrepresented.
2 a screen in the accounts payable program
Rather than moving toward a philosophy of a
that provides adequate location addresses
comprehensive fraud prevention, the audit-
and company ownership information so
ing profession worldwide seems to be in a
that major suppliers can be properly iden-
constant motion to enact statutes and audit-
tified before being added to the vendor file.
ing standards after the fraud scandals have
Conflicts of interests can lead to types of been reported widely in the press. Events
fraud that are difficult to detect. Financial such as unreported revenues, manipulation
interest in a customer or supplier is an exam- of losses, inflated sales, fraudulent write-offs
ple of nepotism. A purchasing agent who had of uncollectible accounts, unusual related-
a personal interest in a supplier could charge party transactions, misappropriation of
his employer inflated prices (Flesher, 1996). assets and many other irregularities have
Fabrizius (1990) reported that an audit spearheaded several court rulings and
investigation conclusively determined that a shaped the auditing standards.
supervisor had repeatedly violated the com- Leading writers list the detection of fraud
pany’s conflict of interest policy. These viola- as one of the most important purposes of
tions included receiving gifts, kickbacks, auditing. They view auditing as an important
excessive entertainment, and borrowing social service to the economic community
money from various vendors. Certain ven- (Seidman, 1939). Mautz and Sharaf (1961) also
dors admitted that they had provided to the believe in the profession as a social service to
supervisor, such expensive items as hunting the community; they think that “auditors are
rifles and trips to resort areas. To prevent a truly professional men if they are not in busi-
reoccurrence of this type of problem, a more ness solely for their profit.”
effective vendor-selection process was estab- The public and the auditing profession
lished. worldwide seem to have divergent views of
To detect conflict of interest fraud, Kramer what is expected from auditors. The results of
(1996) suggests several steps including the the surveys conducted by Barron et al. (1997);
test for indicators: Epstein and Gieger (1994); Lowe and Pany
• improper sole source awards; (1993) show that an “expectation gap” exists
• low-bid award; in the USA. The Institute of Chartered
• multiple purchases under bid limit. Accountants in England and Wales (1992)
issued a report titled “Expectation gap can be
Crowder (1997) also lists several procedures bridged” and urged the profession to embrace
to detect potential fraud arising from the role of detecting fraud. Also in Canada, an
employee conflict of interest. Auditors use expectation gap exists since users of financial
CATTs which allow to compare: statements believe that auditors can detect all
• vendor addresses to employee address; misstatements with the same level of assur-
• vendor address to employees’ outside busi- ance, whereas most auditors would agree that
ness addresses; and this is not the case (Cockburn, 1993). Bankers,
[ 60 ]
Rocco R. Vanasco financial analysts, investors, and even jurors of fraud. The IIA position is that fraud, no
Fraud auditing expect from auditors to search for fraud. matter the amount, ought to be investigated
Managerial Auditing Journal Independent auditors, of course, disagree on since it may lead to discovery of larger man-
13/1 [1998] 4–71 this “perceived” characterization of their agement or employee misconduct. The same
auditing tasks. The public expects auditors to year, the IIA restated its position on fraud by
provide an absolute guarantee against fraud, releasing IIA Report on Fraud. The aware-
failure, and financial ruin. Shareholders and ness of fraud and its devastating results are
third parties feel fully justified in demanding being communicated through seminars, con-
that auditors compensate them for losses and ferences, articles and sponsored research. Its
unmet expectations (O’Malley, 1993b). The presence and influence are felt worldwide.
accounting profession needs to address the Considering the alarming increase of fraud
public’s unrealistic expectations regarding cases worldwide, the IIA, as an international
the independent auditor’s role in preventing association, needs a more comprehensive
business fraud. The AICPA has been agoniz- plan on how to assist internal auditors world-
ing from the attacks leveled against the audit- wide to protect multinational corporations
ing and accounting profession and appointed from the ravages of fraud. The Foreign Cor-
several task forces to deal with the thorny rupt Practices Acts of 1977 and the Federal
issue of fraud. Although the fraud issue is Sentencing Guidelines of 1991 represent two
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

relevant for both the public and the auditing milestones for the internal auditing profes-
profession, the auditing profession must, sion. Corporations are required to establish
however, consider the cost/benefit principle an internal control system which need to be
as the overriding factor in audit engagements. monitored by the internal auditing depart-
There are, of course, constraints as to how ment. Heavy fines are imposed on manage-
much evidence auditors can gather. Still ment for circumventing the internal control
sophisticated management frauds will go system.
undetected. The historical perspective of the The IIA, like all other auditing and account-
events presented shows the dilemma the ing professions, has had its ups and downs.
AICPA is facing in meeting the public interest This led von Schweitzer (1990) to comment, in
in preventing the issuance of fraudulent his “Professional myopia” that the internal
financial statements. The emphasis now is to auditing profession has moved from “the
re-focus the auditor’s attention to search for bright outlook of 1984” to the “uncertainties
fraud when planning an audit. of the 1990s.” This may be partially true since
The 1929 Wall Street market crash is the several auditing departments have under-
classic example of fraud that shocked the gone downsizing due to the new wave of cost
nation. It led the US Congress to take extreme reduction and effectiveness. But most corpo-
measures to protect creditors and investors rations are not really convinced that downsiz-
from the proliferation of fraudulent financial ing is the key to boost the company’s bottom
statements and establish the SEC early in the line. Considering the new wave and sophisti-
1930s. The SEC has pursued unrelentingly its cation of corporate fraud scandals, internal
task by investigating and prosecuting corpo- auditors will play a pivotal role in this area in
rations which have violated the securities the twenty-first century.
laws. The cases presented show that the SEC The cases examined suggest important
has been quite successful in curving down lessons to learn about fraud: new programs,
the issuance of fraudulent financial state- products, investments, and allowances
ments in the USA. The SEC has become a require particular scrutiny on the part of the
model governmental organization worldwide auditors; failing to discover and prevent mar-
for preventing fraud and prosecuting compa- keting and sales fraud on the part of its staff
nies for fraudulent acts. As a result, securi- may be one of the most dangerous mistakes
ties regulators and exchange officials in an organization can make; and executives
many countries are seeking help from their will be under increased pressure to prove that
US counterparts. The International Organi- they are preventing fraud through their stew-
zation of Securities Commissioners is work- ardship of a company (Internal Auditor, 1995).
ing to adopt the US accounting standards and Lacativo (1995) suggests a risk-based
rules in disclosure and insider trading approach to auditing fraud to respond to the
(Schroeder, 1993). companies’ expectation that auditors help
The Institute of Internal Auditors (IIA) has them meet the strict federal regulations
put fraud deterrence as a top priority task against fraud. A review of the current litera-
from its inception. In 1985, it became clear for ture also suggests that companies are relying
the IIA to make a leap forward on this deli- heavily on auditors to minimize losses from
cate issue and release SIAS 3 – Deterrence, fraud. Zeune (1994), in his article “How to fool
Detection, Investigation, and Reporting of auditors,” observed that accounting systems
Fraud to guide internal auditors in the deter- do not reflect recent changes in the business
rence, detection, investigation and reporting environment, the result being that it is easy
[ 61 ]
Rocco R. Vanasco to perpetrate fraud without being detected by Accountancy (1995), “Statement of auditing stan-
Fraud auditing auditors. This is because traditional auditing dard 110, fraud and error”, Vol. 115, March,
Managerial Auditing Journal is conducted in a vacuum, with no link p. 125.
13/1 [1998] 4–71 between a business’s key success factors and Accountancy (1995), “Statement of auditing stan-
the way in which those factors drive the dard SAS 120, Consideration of Law and Regu-
financial statements. lation”, Vol. 115, March, p. 125.
The international arena seems trouble- Accounting Today (1990), “Big Six firm barred”,
some. The statistics shows that most foreign July 23.
countries do not have governmental bodies ACFE (1995), Fraud Examiners Manual.
like the US Securities Commission, cannot ACFE (1996), “AICPA writes statement on fraud in
afford the establishment of a sophisticated financial audit”, The White Paper, May/June,
profession like the American Institute of p. 46.
Certified Public Accountants (AICPA), and ACFE (1996), “Top fraud fugitive arrested in
are not joining the Institute of Internal Audi- Bahamas”, The White Paper, May/June, p. 47.
tors (IIA) in the same number as the Anglo- AICPA, SAS 1 (1972), Codification of Auditing
Saxon countries. The ravages of fraud in Standards and Procedures, AICPA, New York,
Africa, Europe, Asia, and Eastern European NY.
countries are devastating and getting worse. AICPA, SAS 6 (1975), “Related party transactions”,
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

In a global economy and multinational trade, July, AICPA, New York, NY.
the trend of international fraud affects all AICPA (1978), “Commission on auditors’ responsi-
countries. American investors and financial bilities”, Report, Conclusions, and Recommen-
institutions have vested interest in many dations, AICPA, New York, NY, p. 32.
foreign corporations; international fraud AICPA, SAS 45 (1983), “Omnibus statement on
puts all at risk. auditing standards”, August, AICPA, New
Health care fraud, insurance fraud, defense York, NY.
procurement fraud, and other types of fraud AICPA (1984), Report on the Study of EDP-related
against the federal government are taking an Fraud in the Banking and Insurance Indus-
The following individuals enormous toll on the taxpayer’s money. To tries, EDP Fraud and Review Task Force, New
collaborated in the research reduce fraud in the industry sector, the IIA York, NY.
project: Anthony C. Carrollo, could establish task forces to develop “indus- AICPA, SAS 53 (1988), The Auditor’s Responsibility
US Environmental Protec- try guides” dealing with fraud prevention, to Detect and Report Errors and Irregularities,
tion Agency; Phillip Cho- detection, deterrence, and reporting. There AICPA, New York, NY.
miak, National-Louis Univer- AICPA, SAS 55 (1988), “Consideration of the inter-
seems to be a consensus that both internal
sity; Donald J. Eberle, Presi-
auditors and external auditors need to nal control structure in financial statements”,
dent of the IIA Illiana Chap-
sharpen their skills to meet the challenges of April, AICPA, New York, NY.
ter; Rhoda M. Espiritu,
Coopers and Lybrand; Jim fraud detection and prevention. AICPA, SAS 60 (1988), The Communication of
Feltes, Advocate Healthcare; The cases examined show that cash, inven- Control – Structure Related Matters Noted in
Jolene Ferguson, National- tory, and related party transactions are prone an Audit, April, AICPA, New York, NY.
Louis University; Robert C. to fraud. Auditors assign a high risk index to AICPA, SAS 61 (1988), “Communication with
Flannery, US Department of the potential misappropriation of inventory, audit committee”, April, AICPA, New York,
Agriculture; L. Bruce John- cash defalcation, and conflict of interest. NY.
son, Bethlehem Steel Com- The advent of the computerized systems AICPA SAS 54 (1988), Illegal Acts by Clients,
pany; Susan Lione, The AICPA, New York, NY.
has increased the improper manipulation of
Institute of Internal Audi-
input or transaction data, application pro- AICPA (1991), Accounting Trends and Techniques,
tors; Daniel T. Poludniak,
grams, data files, and computer operations. AICPA, New York, NY.
American Savings Bank;
Brian Reynolds, National- Embedded fraud is often hard to detect. To AICPA (1993a), Meeting the Financial Reporting
Louis University; Clifford R. survive in the twenty-first century, the Needs of the Future: A Commitment from the
Skousen, Utah State Univer- modern auditor needs a very extensive Public Accounting Profession, AICPA, New
sity; Loren W. Smith, knowledge and practice in EDP auditing. York, NY.
AMOCO Corporation; The IIA must launch a “global plan” to AICPA (1993b), In the Public Interest: Issues Con-
Rudolph L. Tracy, USS-Gary train and harness internal auditors with fronting the Accounting Profession, AICPA,
Works; Rao Vallabhaneni, more sophisticated techniques in combatting New York, NY.
US Railroad Retirement AICPA SAS 82 (1996), Consideration of Fraud in a
fraud globally and restructure its auditing
Board; Robert J. Vanek,
framework to meet the needs of all internal Financial Statement Audit, AICPA, New York,
Centier Bank; Kenneth
Webster, Bethlehem Steel auditors worldwide. NY.
Company Albrecht, S.W., Howe, K.R. and Romney (1984),
References and further reading Deterring Fraud: The Internal Auditor’s Per-
Abbott, A. (1993), “Italian health sector in disar- spective, IIA Research Foundation, Altamonte
ray following more scandals”, Nature, No. 364, Springs, FL.
August 19, p. 663. Albrecht, S.W., McDermott, E.A. and Williams,
Abelson, A. (1994), “Russian roulette”, Barron’s, T.L. (1994), “Reducing the cost of fraud”, Inter-
Vol. 74, August 8, p. 5. nal Auditor, Vol. 51, February, p. 28.

[ 62 ]
Rocco R. Vanasco Albrecht, S.W., Stice, J.D. and Stocks, K.D. (1993), Bergstrom, R.J. and Morrison, J.L. (1993), “RICO:
Fraud auditing “What do internal auditors need to know?”, has the ultimate weapon been crushed?”,
Managerial Auditing Journal Internal Auditor, Vol. 50, October, pp. 56-9. Journal of Accountancy, June, p. 17.
13/1 [1998] 4–71 Albrecht, W.S. (1996a), “Employee fraud”, Internal Berton, L. (1986), “Grant Thorton finds itself in
Auditor, October, p. 26. turmoil”, Wall Street Journal, April 14, p. 6.
Albrecht, W.S. (1996b), “The expectation gap”, The Berton, L. (1988), “Accountants try to keep RICO
White Paper, Vol. 10, September/October, at bay”, Wall Street Journal, April 29, p. 19.
p. 19. Berton, L. (1992), “Legal beat: Ernst accord may
Alexander, C.P. (1985), “Crime in the suites”, give FDIC leverage”, Wall Street Journal,
Time, June 10, p. 56. December 3, p. B11.
Alexander, T. (1974), “Waiting for the great com- Berton, L. (1992a), “Holding accountants account-
puter rip-off ”, Fortune, July, p. 146. able”, Wall Street Journal, September 22,
Allen, B. (1977), “The biggest computer frauds: p. A18.
lessons for the CPAs”, Journal of Berton, L. (1996), “Judge dismisses racketeering
Accountancy, May, pp. 52-62. charges against accountants in DeLorean
Alpert, B.S. (1992), “Federal sentencing guide- case”, Wall Street Journal, April, p. B8.
lines”, Internal Auditor, October, p. 46. Berton, L. and Adler, S. (1992), “CPAs nightmare:
Andersen, A. (1963), The First 50 Years, Arthur how audit of bank cost Price Waterhouse $338
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Andersen, Chicago, IL. million judgment – firm, which plans to


Antilla, S. (1995), “Invest $200,000, get 15 percent appeal, allegedly failed to spot a weak loan
rate”, New York Times, March 3, p. D1. portfolio”, Wall Street Journal, August 14,
Apostolu, B. (1985), An Investigation of Internal p. A4.
Auditor Judgment of the Indicators of Potential Berton, L. and Truell, P. (1991), “Price
Fraud: An Analytical Hierarchy Approach,
Waterhouse’s US unit received at least $4
Louisiana State University, Baton Rouge, LA.
million in fees from BCCI”, Wall Street Jour-
Archer, G. (1996), “Related parties: still hard to
nal, November 11, p. A3.
spot”, Accountancy, Vol. 117, January, p. 64.
Bliss, E.C. and Aoki, I.S. (1997), Are Your Employ-
Arena, R.W. (1992), Auditing to Prevent Fraud and
ees Stealing You Blind?, Pfeiffer and Company,
Abuse, IIA Research Foundation, Altamonte
San Diego, CA.
Springs, FL.
Bloombecker, B. (1990), Spectacular Computer
Arens, A.A. and Loebbecke, J.K. (1994), Auditing –
Crimes, Dow-Jones-Irwin, Homewood, IL.
An Integrated Approach, Prentice-Hall, Engle-
Blum, P. (1994), “Czechs fall prey to financial
wood Cliffs, NJ.
predators”, The Financial Times, April 26, p. 2.
Armstrong, J.E. (1988), “Auditing to detect fraud”,
Bohlen, C. (1995), “Bribery as a way of life in
The CPA Journal, September, pp. 78-82.
italy”, New York Times, December 10, p. 21.
Arnold, W. (1996), “Fraud, nosy web pages tor-
Bologna, J.G. (1992), “Thinking like a thief ”,
ment internet users”, Asian Wall Street Jour-
Internal Auditor, August 30.
nal Weekly, Vol. 18, March 18, p. 19.
Bologna, J.G. (1994), “How to detect and prevent
Aspen, M. (1992), US district judge, quoted by
embezzlement”, The White Paper, August/
Alpert, S.B., “Federal Sentencing
Guidelines”, The Internal Auditor, October, September, p. 4.
p. 46. Bologna, G.J. and Lindquist, R.J. (1995), Fraud
Balinga, W. (1992), “Right to bring securities fraud Auditing and Forensic Accounting, John Wiley
and RICO action against auditors upheld”, & Sons, New York, NY.
Journal of Accountancy, Vol. 173, June, p. 29. Bologna, J.G., Lindquist, R.J. and Wells, J.T. (1993),
Bannon, L. (1994), “Official admits to tax bribery The Accountant;s Handbook of Fraud and
at Fininvest”, Wall Street Journal, July 26, Commercial Crime, John Wiley & Sons, New
p. D13. York, NY, p. 232.
Barlas, S. (1990), “Justice department wants tight- Boockholdt, J.L., Chang, S.Y. and Finley, D.R.,
ening of computer fraud law”, Internal Audi- (1992), “Using duds to detect fraud”, Internal
tor, October, p. 11. Auditor, August, pp. 59-68.
Barlas, S. (1993) “AICPA supports revised fraud Borda, R.L. (1987), “Insurance fraud costs billion”,
detection act”, Management Accounting, Journal of Commerce, December 3, p. 1.
Vol. 74, May, p. 9. Boynton, W. and Kell, W.G. (1996), Modern Audit-
Barron, D.C., Johnson, D.A., Searfoss, D.G. and ing, John Wiley & Sons, New York, NY.
Smith, C.H. (1997), “Uncovering irregulari- Brannigan, M. (1987), “Auditor’s downfall shows a
ties: are we closing the expectation gap?”, The man caught in trap of his own making”, The
Journal of Accountancy, October. Wall Street Journal, March 4, p. 31.
Baum, J. (1994), “Fast friends: stock scandal tars Brannigan, M. and Keoning, R. (1986), “Nine are
all of Taiwan’s main parties”, Far Eastern indicted in the collapse of ESM; US charges
Economic Review, Vol. 157, October 27, p. 30. firm hid its huge losses”, The Wall Street
Begg, T.E. Jr (1994), “Using shared liability to Journal, April 14, p. 6.
combat check fraud”, The Banker Magazine, Bray, N. (1994), “Scandals knock Deutsche bank’s
Vol. 117, November/December, pp. 57-60. image”, Wall Street Journal, July 5.

[ 63 ]
Rocco R. Vanasco Brief, A.P., Duketich, J.M., Brown, P.R. and Brett, Cases in Auditing, Dame Publications,
Fraud auditing J.E. (1997), “What’s wrong with the treadway Houston, TX.
Managerial Auditing Journal commission report?”, Journal of Business Cottrell, D.M. and Albrecht, W.S. (1994), “Recog-
13/1 [1998] 4–71 Ethics, February, Vol. 183, p. 198. nizing the symptoms of employee fraud”,
Briloff, A.J. (1991), “Castles of sand”, Wall Street Healthcare Financial Management, Vol. 68,
Journal, December 22. May 8, p. 22.
Brink, V.Z. and Witt, H. (1982), Modern Internal Covaleski, J.M. (1994), “Stamping out insurer
Auditing, John Wiley & Sons, New York, NY. fraud”, Best’s Review, Vol. 95, October,
Calderon, T. and Green, B.P. (1994),“Internal fraud pp. 36-64.
leaves its mark: here’s how to spot, trace and Cox, B. (1995), “Montana governor signs tough
prevent it”, National Public Accountant, insurance fraud act”, National Underwriter
Vol. 39, August, p. 17. Property & Casualty-Risk & Benefits Manage-
Carmichael, D.R. and Craig, J.L. Jr (1996), “Pro-
ment, Vol. 17, April 24, p. 49.
posal to say ‘F’ word in auditing standards”,
Crane, M. (1993), “Auditors, their clients, fraud
The CPA Journal, Vol. 6, June, p. 22.
and error”, Accountancy, Vol. 112, December
Chambers, M. (1985), “Two face charges in bank
p. 95.
theft of $323 million”, New York Times, June
Crane, T.S. and Slavitt, E. (1997), “Congress accel-
28, p. B3.
erates fraud and abuse juggernaut”, American
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Champlain, J.J. (1995), “Is your wire transfer


Medical News, Vol. 40, January 13, p. 22.
system secure?”, Internal Auditor, June, p. 56.
Chandler, R., Edwards, R. and Anderson, M. Crowder, N. (1997), “Fraud detection techniques”,
(1995), “Changing perceptions of the role of Internal Auditor, April, p. 17.
the company auditor, 1980-1940”, Accountancy, Dabney, D.A. (1997), quoted in “Survey shows
Vol. 116, November, p. 138. disturbing retail fraud trend”, IIA Today,
Chapman, C. (1996), “UK/wistleblower bill fails”, February, p. 8.
Internal Auditor, October, p. 8. Dalal, S. (1994), “We are not amused: Indian MPs
Charfauros, M.V. (1995), Twenty-third Guam Legis- fume over stock-scandal report”, Far Eastern
lature 1995 (First) Regular Session, Bill No. Economic Review, Vol. 157, August 18, p. 54.
116, Section 1. Dalglish, K. (1994), “A strategy for the twenty-first
Chazen, C., Miller, R.L. and Solomon, K.I. century”, CA Magazine, Vol. 127, May, p. 3.
(1985),“When the rules say: ‘see your lawyer’, Dalziel, A. (1996), “Whistleblowing”, Journal of
Journal of Accountancy. Chartered Accountants of New Zealand,
Chernoff, J. (1996), “Acquittal puts end to Maxwell Vol. 75, November, p. 12.
pension saga”, Pension & Investment, Vol. 241, Davia, H.R., Coggins, P.C., Wideman, J.C. and
February 5, p. 3. Kastantin, J.T. (1992), Management Accoun-
Ciferri, L. (1993), “Fiat brass to face flak at share- tant’s Guide to Fraud Discovery and Control,
holders meeting”, Automobile News, June 28, John Wiley & Sons, New York, NY.
p. 14. De Groot, A. (1997), “The Netherlands fraud
Cigna-Healthcare (1994), “Cigna, IBM tech tool examiner”, The White Paper, Vol. 2, January-
targets healthcare fraud”, National Under- February, p. 23.
writer, Vol. 98, October 3, p. 5. Demery, P. (1996), “Increasing auditors’ responsi-
Cisz, M.M. (1997), “Are your employees stealing bility in finding fraud”, The Practical Accoun-
you blind?”, Book review, Internal Auditor, tant, Vol. 29, March, p. 8.
April, p. 22.
Donlan, T.G. (1993), “A bigger whistle: congress
Clinard, M.B. (1990), Corporate Corruption. The
pushes accountants to be more accountable”,
Abuse of Power, Praeger, New York, NY.
Barron’s, Vol. 73, July 5, p. 10.
Cockburn, D.J. (1993), “Closing the GAP”, CA
Donlan, T.G. (1996), “Watering stock”, Barron’s,
Magazine, Vol. 126, November, pp. 3-32.
Vol. 76, November 25, p. 66.
Cohen, W.S., US Senator (1995), “The FBI is here”,
Duane, W. (1988), “Building together the future”,
in Gardner, J.R. (Ed.), The White Paper,
Internal Auditor, August.
August/September, p. 4.
Dugan, C.F. and Lechtman, V.L. (1996), “In Russia,
Cohenson, M.S. and Dispasquale, R. (1993),
“Crime can pay for certified fraud examin- bribery ban is causing difficulties”, The
ers”, The Practical Accountant, Vol. 26, National Law Journal, Vol. 19, October, p. C1.
February, pp. 20-2. Duggan, C. (1995), “Script fraud”, Chemist & Drug-
Cole, I. (1993), “Putting trustees at the head of the gist, September 16, p. S1.
table”, Accountancy, Vol. 112, November, p. 77. Echikson, W. (1994), “Will Paris go the way of
Collier, P.A., Dixon, R. and Marston, C.L. (1991), Rome”, Fortune, Vol. 130, August 8, p. 14.
“Computer fraud. Research findings from the Economist (The) (1992), “Lord Justice Bingham’s
UK”, Internal Auditor, August, pp. 49-52. report on BCCI affair”, Vol. 325, October 24,
Colvin, G. et al. (1983), “Jake Butcher’s fall”, p. 88.
Fortune, March 21, p. 7. Economist (The) (1992a), “BCCI: paper thriller.
Cooper, K. and Flory, S. (1976), “Lessons from Report by Senator J. Kerry’s Subcommittee,”
McKesson and equity funding”, Readings and Vol. 325, October 11, p. 94.

[ 64 ]
Rocco R. Vanasco Economist (The) (1993), “Ferruzzi: hotting up Fiorelli, P.E. and Rooney, C.J. (1997), “COSO and
Fraud auditing crisis prompts large stock issue”, Vol. 328, the federal sentencing guidelines”, Internal
Managerial Auditing Journal September 14, p. 75. Auditor, April, p. 57.
13/1 [1998] 4–71 Economist (The) (1994), “Big buckets always leak Fischer v. Kletz (1967) (known as Yale Express), 266
most” Vol. 333, November 19, p. 58. F. Supp. 180 (SDNY).
Economist (The) (1995),“Hu-bris: Singapore’s stock Flesher, D.L. (1996), Internal Auditing – Standards
exchange”, Vol. 334, March 4, p. 72. and Practices, The Institute of Internal Audi-
Economist (The) (1995a), “Discredited”, Vol. 336, tors, Altamonte Springs, FL.
August 12, p. 62. Flesher, D.L. and Buttross, T.E. (1992), “Whistle-
Economist (The) (1995b),“Miami or bust”, Banco blowing hotlines”, Internal Auditor, August,
Latino, July 1. pp. 54-8.
Economist (The) (1995c),“Another Italian debt Fortune (1978), Editorial, July 17, p. 95.
problem”, July 1, p. 68. Frank, I. (1982), “Auditors: not detectives”, Dallas
Economist (The) (1996a),“Simply rotten: Italian Times Herald, August 29, p. 1.
finance”, Vol. 338, January 27, p. 66. Fraud Examiner Manual (1997), excerpts from
Economist (The) (1996b),“Same old story”, Vol. 340, “Preventing internal fraud”, The White Paper,
September 28. Vol. 2, January/February, p. 31.
Edgerton, J. (1992), “Employee theft on the rise”, Freedman, J.M. (1993), “IMA research on target”,
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Louisville Courier Journal, October 30. Management Accounting, Vol. 74, May, p. 70.
Ehlers, H. (1996), “Building a case”, Internal Freeman, A. and Forcese, C. (1994),“Get tough on
Auditor, October, p. 38. corporate crime”, The Toronto Star, Novem-
Eichenwald, K. (1995), “SEC sues Nevada com- ber 17.
pany”, New York Times, April 28, p. D3. Friedland, J. (1996), “Argentine judge probes IBM
Ekong, E. (1995), “Bank on verge of a nervous
contracts with tax agency”, Wall Street Jour-
breakdown”, African Business, July/August,
nal, June 20, p. A12.
p. 6.
Friedman, A.S. (1994), “Software helps expose
Elliot, R.K. and Willingham, J.J. (1980), Manage-
claims fraud”, National Underwater, Vol. 98,
ment Fraud: Detection and Deterrence, Petro-
February 21, p. 7.
celli Books, New York, NY.
Friedman, S. (1995), “Strong internal controls are
Epstein, M.J. and Geiger, M.A. (1994), “Investor
vital”, Journal of Accountancy, Vol. 180,
views of audit assurance: recent evidence of
October, p. 90.
the expectation gap”, Journal of Accountancy,
Friedman, S. (1995), “Pay attention to warning
Vol. 177, January, pp. 60-2.
signals”, Journal of Accountancy, Vol. 180,
Ernst & Young (1992), Fraud 1992, Ernst & Young,
October, p. 88.
New York, NY.
Gardner, J. (1995), “The FBI is here!” The White
European (The) (1996), “New moves to tackle
Paper, August/September, p. 4.
fraud”, May 30, p. S2.
Gardner, J. (1996), “The Valentine’s Day Mas-
Evans, T.E., Taylor, M.E. and Holzmann, O. (1994),
sacre”, The White Paper, May/June, p. 49.
International Accounting & Reporting, South-
Gartland, P. (1995), “Germany as haven for scam
Western Publishing, Cincinnati, OH.
Fabrizius, M.P. (1990), “Fire in the field”, Internal and vultures”, The European, Vol. 267, June
Auditor, October, p. 77. 23, p. 4.
Fargason, J.S. (1992), Legal Compliance Auditing Gauntt, J.E. and Glezen, G.W. (1997), “Analytical
and the Federal Sentencing Guidelines, The auditing procedures”, Internal Auditor,
Institute of Internal Auditors, Altamonte February, p. 56.
Springs, FL. Gauthier, T.J. (1991), “It’s elementary, my dear
FASB (1975), Analysis of Issues Related to Criteria internal auditor”, Internal Auditor, February,
for Determining Materiality, FASB, Stamford, pp. 60-3.
CT, March 21. Gauthier, Y. (1995), “Forever fraud: interview with
FASB (1982), “Related party disclosures”, State- N. Inkster”, Internal Auditor, Vol. 52, October,
ment of Financial Accounting Standards No. p. 26.
57, FASB, Norwalk, CT. Geis, G. (1994), “Fraud in the former Soviet
FDIC (1986), “Chairman sees expanded role for Union”, The White Paper, October/November,
auditors in bank fraud”, Journal of Accoun- p. 3.
tancy, Vol. 162, July, p. 48. Gill, J.D. (1996), “Reporting fraud under wistle-
FDICIA (1991), Supervisory Guidance on the Imple- blower statutes”, The White Paper, May/June,
mentation Section 112 of the Federal Deposit p. 9.
Insurance Improvement Act, Pub. L. No. 102- Gill, J.D. (1996), “The private securities litigation
105 Stat. 2236, May 14. reform of 1995: securities fraud cases just got
Federal Register (The) (1991), “Federal sentencing tougher”, The White Paper, March/April, p. 9.
guidelines”, Vol. 56 No. 95, May 16, pp. 227-86. Goldstein, L.M. (1992), “Favorite frauds”, Internal
Fialka, J.J. (1993), “BNL-Atlanta chief says audits Auditor, August, pp. 35-40.
failed to uncover fraud”, Wall Street Journal, Graham, A. (1996), “Fraud and soap operas”,
November 10, p. B14. Internal Auditor, October, p. 5.

[ 65 ]
Rocco R. Vanasco Gumbel, P. (1995), “Germany catches the Euro- IIA North Jersey Chapter (1995), “Good for their
Fraud auditing pean disease”, Wall Street Journal, July 13, health”, Internal Auditor, June, p. 65.
Managerial Auditing Journal p. A6. IIA Northwest Metro Chicago Chapter (1993),
13/1 [1998] 4–71 Gup, B.E. (1994), “Protecting financial institutions “Commingling of funds”, Internal Auditor,
against fraud”, The Bankers Magazine, December, p. 75.
Vol. 177, May/June, p. 38042. IIA Round Table (1991), “It’s all relative”, Internal
Guy, D.M. and Mancino, J. (1992),“What an auditor Auditor, Vol. 48, October, p. 73.
does when finding fraud or illegal acts”, Jour- IIA San Francisco Chapter (1993), “Good public
nal of Accountancy, January, p. 103. relations”, Internal Auditor, October, p. 76.
Hannon, K. (1996), “Tip or tout? The perils of IIA Tucson Chapter (1994), “Uncertain pensions”,
buying on the buzz”, US News & World Report, Internal Auditor, June, p. 76.
Vol. 121, December, p. 114. IIA Wichita Chapter (1991), “Audit of microcom-
Hansen, J.V., McDonald, J.B. and Messier, W.F. puters”, Internal Auditor, February, p. 70.
(1996), “A generalized-response model and the IIA Wichita Chapter (1991), “Cash shortage expe-
analysis of management fraud”, Management rience”, Internal Auditor, Vol. 48, October,
Science, Vol. 42, July, p. 1022. p. 73.
Hrisak, D. (1996), “Auditors must sniff out fraud”, Institute of Chartered Accountants in England
The Journal of Chartered Accountants of New and Wales (1992), “Expectation gap can be
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Zealand, Vol. 75, July, p. 30. bridged”, Accountancy, Vol. 110, November,
Harris, R.J. and Ricks, T.E. (1994), “Lockheed p. 11.
faces possible suspension on Air Force con- Institute of Financial Crime Prevention (1986),
tracts after indictment”, Wall Street Journal, Red Flags: What Every Manager Should Know
June 14, p. A12. about Internal Crime, Institute of Financial
Horsburgh, P. (1995), Info-sec Super Journal, World
Crime Prevention, Austin, TX.
Wide Web.
Institute of Internal Auditors, SIAS 2 – Communi-
Huebner, J. (1996), quoted in Leidig, M. “Slovakia
cating Results.
stings EBRD”, The European, November 14.
Institute of Internal Auditors (1985), SIAS 3 –
IIA Atlantic City Chapter (1991), “Inventory dis-
Deterrence, Detection, Investigation, and
crepancies”, Internal Auditor, Vol. 48, Decem-
Reporting of Fraud, The Institute of Internal
ber, p. 69.
Auditors, Altamonte Springs, FL, May.
IIA Baltimore Chapter (1992), “$3,000,000 embez-
Institute of Internal Auditors (1985), IIA Report on
zlement”, Internal Auditor, June, p. 74.
Fraud, IIA Research Foundation, Altamonte
IIA Baltimore Chapter (1994), “Is it real”, Internal
Springs, FL.
Auditor, June, p. 77.
Institute of Internal Auditors (1986),The Role of
IIA Calgary Chapter (1991), “Just to make sure”,
Internal Auditors in the Deterrence, Detection
Internal Auditor, February, p. 70.
and Reporting of Fraudulent Financial Report-
IIA Calgary Chapter (1991), “Count and count
ing, The Institute of Internal Auditors, Alta-
again”, Internal Auditor, February, p. 64.
monte Springs, FL.
IIA Dallas Chapter (1993), “Flood insurance
Institute of Internal Auditors (1988), “The IIA
claims all wet”, Internal Auditor, October,
p. 74. position on whistle-blowing”, Internal Audi-
IIA Dallas Chapter (1993), “$130,000 missing”, tor, October, p. 16.
Internal Auditor, October, p. 74. Institute of Internal Auditors (1988), Standards for
IIA Florida West Coast Chapter (1990), “Red the Professional Practice of Internal Auditing,
flags”, Internal Auditor, October, p. 79. 2nd ed., The Institute of Internal Auditors,
IIA Florida West Coast Chapter (1990), “Pennies Altamonte Spring, FL.
add up”, Internal Auditor, October, p. 79. Institute of Internal Auditors (1992), A New Look
IIA Forth Worth Chapter (1996), “Loan officer at Ethics and Fraud, The Institute of Internal
stretches limits”, The Internal Auditor, Auditors, Altamonte Springs, FL.
August, p. 67. Institute of Internal Auditors (1992), “Professional
IIA Houston Chapter (1991), “Drug pilferage”, standards bulletins (PSB)”, in Gleim, I., CIA
Internal Auditor, Vol. 48, August, p. 71. Examination Review, Gleim Publications,
IIA Houston Chapter (1993), “Control weaknesses Gainesville, FL.
= $60,000”, Internal Auditor, October, p. 74. Institute of Internal Auditors (1992), SIAS 1 –
IIA Houston Chapter (1993), “Recommendations Control: Concepts and Responsibilities, The
are not suggestions”, Internal Auditor, Institute of Internal Auditors, Maitland, FL.
October, p. 76. Internal Auditor (1991a), “Audit legislation weaves
IIA Houston Chapter (1997), “Cash disbursement its way through US Congress”, December,
controls”, Internal Auditor, March, p. 80. p. 10.
IIA Mount Diablo Chapter (1993), “Deceitful Internal Auditor (1991b), “Fax security a grown
refunds”, Internal Auditor, October, p. 73. concern”, Vol. 48, December, p. 9.
IIA North Jersey Chapter (1995), “Evaporating Internal Auditor (1992a), “Debate over govern-
cash”, Internal Auditor, February, p. 57. mental whistle-blower payment”, April, p. 10.

[ 66 ]
Rocco R. Vanasco Internal Auditor (1992b), “Strengthening whistle- Knight and Ridder (1997), “Coastal Mississippi
Fraud auditing blower protection in the workplace”, June, banks will use fingerprints to fight check
Managerial Auditing Journal p. 10. fraud”, Tribune Business News, January 19.
13/1 [1998] 4–71 Internal Auditor (1993), “Fraud-prone personality Knutson, P.H. (1994), “In the public interest – is it
type” August, p. 9. enough?”, The CPA Journal, Vol. 64, January,
Internal Auditor (1995a), “Employees say it’s hard p. 32.
to be ethical in some organizations”, Febru- Knox, J. (1994), “Why auditors don’t find fraud”,
ary, p. 9. Accountancy, Vol. 113, February, p. 128.
Internal Auditor (1995b), “To know the future” Koening, R. (1986), “Arthur Andersen is sued in
June, p. 10. audits of home state”, Wall Street Journal,
Internal Auditor (1995c), “Sales fraud”, Vol. 52, January 13, p. 4.
April, pp. 63-6. Konrath, L.F. (1996), Auditing Concepts and Appli-
Internal Auditor (1995d), “What did we learn in cations, West Publishing, New York, NY.
1994”, Vol. 52, February, pp. 53-4. Kovacs, A. (1996), “Unstable markets”, Internal
Internal Auditor (1996a), “British Rail fraud Auditor, Vol. 52, February, p. 30.
inquiry launched” p. 10. KPMG Peat Marwick (1993), Fraud Survey Results
Internal Auditor (1996b), “Businesses ignore 1993, KPMG Peat Marwick, New York, NY, p. 2.
computer security”, p. 11. Kramer, W.M. (1996), “What’s tougher than catch-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Internal Auditor (1996c), “Hackers attack depart- ing the bad guys? Dealing with management”,
ment of defense”, October, p. 10. The White Paper, May/June, p. 6.
Internal Auditor (1996d), “UK implements benefit Kramer, W.M. (1996), “How to develop ‘proactive’
fraud hotlines”, October, p. 11. fraud detection computer programs”, The
Internal Auditor (1997), “Corrupt nations White Paper, September/October, p. 6.
ranked”, April, p. 9. Lacativo, B.F. (1995), “A risk-based approach to
auditing fraud”, Internal Auditing, Vol. 11,
Iraola & Klubes (1997), Fraud on the Government:
Summer, p. 41.
How Citizens Can Fight Health Care and
Laing, J.R. (1996), “Novatek Redux: catastrophes
Procurement Fraud Using the Qui Tam
thick and fast”, Barron’s, Vol. 26, November 4,
Statute, Iraola & Klubes, Washington, DC.
p. 12.
IRC (1997), “Tougher stand on insurance fraud
Lavelle, M. (1997), “Nations try to match US on Biz
endorsed by more Americans, says insurance
bribe law; but lawyers still argue over the
research council survey”, PR Newswire,
meaning of the FCPA”, The National Law
January 15, p. 115.
Journal, Vol. 19, January 20, p. B1.
Jacobson, A. (1990), How to Detect Fraud through
Lee, T. (1992), “The audit liability crisis: they
Auditing, IIA Research Foundation, Alta-
protest too much”, Accountancy, Vol. 110,
monte Springs, FL.
December, p. 102.
Jacka, M.J. (1995), “Auditing’s vision”, Internal
Leiding, M. (1996), “Slovakia stings EBRD”, The
Auditor, Vol. 52, June, pp. 46-9.
European, Vol. 340, November 14, p. 21.
Jayasankaran, S. (1995), “Back to square one: the
Leinicke, L.M., Ostrowsky, J.A. and Rexroad, W.M.
tangled tale of Malaysia’s Ayer Molek”, Far
(1994), “Fraud hotlines”, Internal Auditor,
Economic Review, 158, September 21, p. 82.
February.
Jeffords, R. Jr, Marchant, M.L. and Bridendall, Leinicke, L.M., Rexroad, W.M. and Ward, J.D.
P.H. (1992), “How useful are the treadway risk (1990), “Computer fraud: it works”, Internal
factors?”, Internal Auditor, June, p. 60. Auditor, August, p. 26.
Jennings, W.L. (1997), “Federal sentencing guide- Levi, P.C. (1997), “One step ahead of fraud: new
lines: what auditors need to know”, Transmis- software aids in data extraction”, The White
sion, Vol. XV, Winter, p. 1. Paper, Vol. 2, January/February, p. 6.
Johnston, J.L. (1995), “Following the trail of finan- Levington, C.A. (1991), “40 years of embezzlement
cial statement fraud”, Business Credit, Vol. 97, tracking: internal auditor, April, p. 51.
October, pp. 47-8. Life Insurance Industry (1997), “Plaintiff ’s law
Journal of Accountancy (1993), “Internal control firm announces class action settlement with
audit proposal draws fire and praise” Vol. 176, connecticut General Life Insurance Com-
October, p. 20. pany”, PR Newswire, January 22, p. 122.
Kapnick, H. (1980), “Responsibility and detection Lindquist, R. (1995), “Financial crime investiga-
in management fraud”, Readings and cases in tor”, Management Accounting, Vol. 76, March,
Auditing, Dame Publications, Houston, TX. pp. 63-64.
Kelley, C.M. (1976), “Accountants and auditors vs Loebbecke, J.K. (1987), “Assessing the risk of
white collar crime”, The Internal Auditor, material irregularities”, Auditing: A Journal
June, p. 35. of Practice & Theory, Fall, pp. 1-28.
Kimelman, J. (1994), “The lonely boy scout”, Loebbecke, J.K., Eining, M. and Willingham, J.J.
Financial World, Vol. 163, August 16, p. 50. (1989), “Auditors’ experience with material
Klotz, J.M. (1994), “Bribery of foreign officials – a irregularities: frequency, nature, and
call for change in the law of Canada”, Cana- detectability”, Auditing: A Journal of Practice
dian Bar Review, Vol. 73, December, p. 467. & Theory, Fall, p. 12.

[ 67 ]
Rocco R. Vanasco Lovell, A. (1993), “Corporate fraud and its chal- Nature (1993), “Clean drugs for Italy?”, Vol. 3,
Fraud auditing lenge to the profession”, Accountancy, August 19.
Managerial Auditing Journal Vol. 112, September, pp. 72-3. New York Times (1994a), “SEC accord on
13/1 [1998] 4–71 Lowe, D.J. and Pany, K. (1993), “Expectations of comptronix”, March 30, p. D7.
the audit function”, CPA Journal, Vol. 63, New York Times (1994b), “SEC suit on towers”,
August, p. 58. September 22, p. D3.
Luizzo, A.J. and Van Nostrand G. (1994), “Delving New York Times (1996), “Prosecution at Thyssen
deeper to decipher fraud”, Security Manage- Roils German executives”, August 16.
ment, Vol. 38, September, p. 113. Nichols, A. (1996), “Finding fraud in the Internet”,
MacDonald, E. (1996), “Auditors are ending up Internal Auditor, October, p. 24.
between a rock and a hard place over securi- Nnanna, O. (1995), “Nigeria: fraud on the line”,
ties law”, Wall Street Journal, December 24. African Business, December, p. 31.
McCoy, C.F. (1987), “Financial fraud: theories Norris, F. (1995), “Fraud can occur at a company,
behind nationwide surge in bank swindles”, even with auditors checking”, New York
Wall Street Journal, October 2, p. 15. Times, September 12, p. D6.
McDonald, H. (1995), “Barefoot in Bombay”, Far O’Connell, V. and Schultz, E.E. (1996), “Greater
Eastern Economic Review, Vol. 158, April 20, pension security in Clinton goal”, Wall Street
p. 85. Journal, April 12, p. C25.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

McLeod, D. (1993), “Omaha Indemnity Co’s rein- O’Malley, S.F. (1993a), “Legal liability is having a
surance fraud charges against Royal Ameri- chilling effect on the auditor’s role”, Account-
can Managers”, Business Insurance, Vol. 27, ing Horizons, Vol. 7, June, pp. 82-87.
July 12, p. 16. O’Malley, S.F. (1993b), “Toward a better under-
McLeod, D. (1997), “New campaign against fraud”, standing of the expectation gap”, CPA Review,
AARP Bulletin, April, p. 1 Vol. 63, February, pp. 6-7.
McNamee, D. (1996), “Too good to be true”, Palmer, J. (1996), “First-time loser; executive
Internal Auditor, August, pp. 62-3. convicted of fraud in Reg S Case”, Barron’s,
Marsh, D. et al. (1994), “Something is rotten”, The May 13.
Financial Times, July 9, p. 8. Palmer, R.D. (1993), “You’re not old as you look”,
Marsh, H.L. and Powel, T. (1989), “The audit com- Internal Auditor, August, p. 64.
mittee charter: Rx for fraud prevention”, Palmrose, Z.-V. (1997), “Who got sued?”, Journal of
Journal of Accountancy, Vol. 167, February, Accountancy, March, p. 67.
pp. 55-7. Pasztor, A. (1995), “Lockheed pleads guilty to
Matsumura, E.M. and Tucker, R.R. (1992), “Fraud conspiring to violate anti-bribery regula-
detection: a theoretical foundation”, The tions”, Wall Street Journal, January 30,
Accounting Review, Vol. 67, October, pp. 753-82. p. B5C.
Mautz, R.K. and Sharaf, H.A. (1961), The Philoso- Pope, K. (1995), “European Union’s did to its poor
phy of Auditing, American Accounting Asso- nations is wasting billions”, Wall Street Jour-
ciation. nal, April 3, p. A1.
Mautz, R.K., Tiessen, P. and Calson, R.H. (1984), Porter, D.I. (1971), “The insurance manager’s
Internal Auditing: Directions and Opportuni- responsibility in preventing employee fraud”,
ties, The Institute of Internal Auditors, Alta- The Weekly Underwriter, January 23, p. 23.
monte Springs, FL, p. 89. PR Newswire (1997), “Weiss v. Metropolitan Life
Meall, L. (1995), “How high is the money moun- Insurance fraud case”, January 17, p. 117.
tain?”, Accountancy, Vol. 115, January, pp. 38-9. Professional Standards Bulletins (PSB) 84-3 (1993),
Menkus, B. (1990), “Eight factors contributing to “Independence – responsibility for detecting
computer fraud”, Internal Auditor, October, all irregularities”, CIA Review by I. Gleim,
pp. 71-3. University Station, Gainesville, FL.
Miami Daily Business Review (1996), “New York Professional Standards Bulletins (PSB) 85-5,
Life Insurance Co. settling $187 million fraud “Professional proficiency – suspected wrong-
suit but denies allegations”, April 2. doing”.
Middlemann, C. and Munchau, W. (1995), “Power- Professional Standards Bulletins (PSB) 89-2,
house economy lacks sophisticated savers”, “Internal auditing procedures – analytical
The Financial Times, September 8, p. 7. procedures”.
Miller, S.H. (1993), “AICPA announces major ini- Prosser, W.L. (1971), Handbook of the Law of Torts,
tiative to strengthen financial reporting and West Publishing, St Paul, MN.
further tort reform prospects”, Journal of Protzman, F. (1994), “German bankers defend
Accountancy, Vol. 176, August, pp. 15-16. lending practices”, New York Times, June 23,
Morley, R.A. (1994), “Fraud in the north woods”, p. DL.
Internal Auditor, June, p. 75. Protzman, F. (1994), “Health-fraud accusations in
Mulder, P. (1995), cited in Peter Gartland, P., Germany”, New York Times, May 31, p. 1.
“Germany a haven from scam and vultures”, Quinney, R. (1964), “The study of white-collar
The European, Vol. 267, June 23, p. 21. crime. Toward a reorientation in theory and
National Underwriter (1992), “Mo. Blues’ pro- practice”, in Geir, G. and Meyer, R.F. (Eds),
grams battles fraud”, Vol. 96, November, p. 49. White-Collar Crime, Free Press, New York, NY.

[ 68 ]
Rocco R. Vanasco Rankin, K. (1990), “E&Y Deloitte face $13 billion in Annual Meeting of the American Institute of
Fraud auditing S&L damages”, Accounting Today, August 27, Accountants.
Managerial Auditing Journal p. 1. Shannon, H. (1995), “Criminal statistics”, Ameri-
13/1 [1998] 4–71 Rapalus, P. (1996), “Businesses ignore computer can Banker, Vol. 160, June 1, p. 8.
security”, Internal Auditor, p. 11. Shapiro, S. (1994), “Crime and fraud in a new
Reis, R. (1996), “10 steps toward avoiding another league”, Business Insurance, Vol. 28, Decem-
era of scandals”, Fund Raising Management, ber 26, p. 39.
Vol. 27, April, p. 46. Simon, S. (1997), “Ex-chemical trader sentenced to
Ricchiute, D.N. (1996), Auditing, South-Western 3 years”, American Banker, April 7, p. 3.
Publishing, Cincinnati, OH. Sims, C. (1991), “US joins whistle-blower suing
Robertson, J.C. (1996), Auditing, Irwin, Chicago, Rockwell”, New York Times, April 29, p. 3.
IL. Singleton Green, B. (1994), “What are auditors
Roy, N.P. (1993), “Can honesty be legislated?”, meant to be doing?”, Accountancy, Vol. 113,
Financial Executive, Vol. 9, January-February, February, p. 92.
p. 1. Singleton Green, B. (1995), “If it’s not plausible,
Rossow, M.M. (1996), “When your auditor blows don’t accept it”, Accountancy, Vol. 116,
the whistle: how to deal with a IOA crisis”, August, p. 24.
Journal of Corporate Accounting & Finance, Sittenfeld, I. (1996), “Federal sentencing guide-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

Vol. 7, Spring, p. 99. lines”, Internal Auditor, April, pp. 56-62.


Sack, R.J. (1987), “The SEC and the profession: an Smith, E.R. (1995), “A positive approach to dealing
exercise in balance”, Research in Accounting with embezzlement”, The White Paper,
Regulation, Vol. 1, pp. 167-73. August/September, pp. 17-18.
San Diego Union-Tribune (1996), “Lab fined $187 Smith, G.N. (1995), “Spare the rod”, Financial
million for medical billing fraud” November
World, Vol. 164, December 5, p. 10.
24.
Smith, M.L. and Crumbley, L. (1991), Trap Doors
SEC (1940), in the Matter of McKesson & Robbins,
and Trojan Horses, Thomas Herdin & Daugh-
Accounting Series Release No. 19.
ter, Sun Lakes, AZ.
SEC (1976), 12(b) of Form 8-K, Accounting Series
Software Toolworks. (1992), “Auditors granted
Release No. 165.
summary judgment in securities case”, Jour-
Sawyer, L. (1988), Internal Auditing, The Institute
nal of Accountancy, Vol. 174, September, p. 21.
of Internal Auditors, Altamonte Springs, FL.
Sommer, A.A. (1975), “Accountants: a flexible
Schadewitz, H.J. and Blevins, D.R. (1996), “COSO
standard”, Litigation, Winter, pp. 35-9.
and CFEs. How the treadway commission
Sommer, A.A. (1993), “POB annual report stresses
affects certified fraud examiners”, The White
liability crises”, Journal of Accountancy,
Paper, May/June, p. 35.
Vol. 175, February, pp. 21-2.
Schilder, A. (1996), “Research opportunities in
Souter, G. (1992), “BCCI to seek billions from
auditing in the European Union”, Accounting
auditors”, Business Insurance, Vol. 26, Novem-
Horizons, Vol. 10, December, p. 88.
ber 2, pp. 23-4.
Schmedel, S.R. and Berton, L. (1992), “Arthur
Stenger, M. (1997), quoted in Patrick Crow’s “Back
Andersen copes with effects of tax scandal:
tensions rise at accounting firms from actions to Nigeria”, The Oil and Gas Journal, June 1,
by consulting unit”, Wall Street Journal, p. 21.
August 6. Stewart, C. (1959), “The nature and prevention of
Schmitt, R.B. and Berton, L. (1994), “Deloitte to fraud”, The Journal of Accountancy, p. 41.
pay $312 million to settle US claims related to Stodghill, R. (1995), “A mea culpa – and a come-
S&L failure”, Wall Street Journal, March 15, back?”, Business Week, July 3, p. 3.
p. A6. Surety Association of America (1954), Safeguards
Schroeder, M. (1993), “Babysitting the world’s Against Employee Dishonesty in Business,
emerging bourses”, Business Week, November Surety Association of America, New York, NY.
1, p. 112. Sutherland, E.H. (1940), “White-collar Criminal-
Schulz, J.D. (1994), “Teamsters file racketeering ity”, American Sociological Review, Vol. 5,
lawsuit against midwest motor express”, February, pp. 1-17.
Traffic World, Vol. 237, February 7. Sutton, M.H. (1997a), cited in “SEC leaders discuss
Schulz, J.D. (1995), “Midwest Motor Express wins the value of independence”, Journal of
in RICO case”, Traffic World, Vol. 243, July 31, Accountancy, Vol. 183, February.
p. 34. Sutton, M.H. (1997b), “Auditor independence: the
Schvimmer, A. (1993), “Maxwells charged with challenge of fact and appearance”, Accounting
asset skimming”, Pension and Investments, Horizons, Vol. 11, March, p. 86.
Vol. 21, July 26, p. 4. Tagliabue, J. (1995), “Italian prosecutors seek
Seamons, Q.F. (1993), “SEC loses in trial against fraud trial”, New York Times, December 8,
auditor Price Waterhouse”, National Public p. D6.
Accountant, Vol. 38, March, pp. 16-17. Tagliabue, J. (1995), “Gemina inquiry might hurt
Seidman, J.S. (1939), “A case study of employee planned Fiat-Ferruzzi deal”, New York Times,
frauds”, Proceedings of the Fifty-seventh October 9, p. D2.

[ 69 ]
Rocco R. Vanasco Tate, C.F. (1996), “The truth about audits”, Associ- Vinten, G. (1994), Whistleblowing – Subversion or
Fraud auditing ation Management, Vol. 48, September, p. 32. Corporate Citizenship, Paul Chapman Pub-
Managerial Auditing Journal Taylor, J. (1996), “Montedison of Italy is accused lishing, London.
13/1 [1998] 4–71 by SEC of hiding millions of dollars in von Schweitzer, H. (1990), “Professional myopia”,
bribes”, The Wall Street Journal, November Internal Auditor, June, p. 42.
22, p. A4. Wall Street Journal (1974), “Equity funding chief
Thomas, P. (1989), “Auditors say Lincoln S&L ordered false figures, ex-officer testifies”,
sham deals were approved by Arthur Young & November, p. 4.
Co”, Wall Street Journal, November 15, p. A2. Wall Street Journal (1976), “IRS finds bribes
Thomas, P. (1990), “The US acts to learn of Keating abroad may have led to tax fraud in account-
millions for restitution months after S&L ing for funds” March 9, p. 3.
failed”, Wall Street Journal, August 10, p. A12. Wall Street Journal (1984), “InterFirst’s chief
Thomas, P. (1990a), “RTC discloses insolvent resigns, profit fell in 4th period”, January 19,
savings and loans’ losses in period”, Wall p. 4.
Street Journal, August 10, p. A12. Wall Street Journal (1992), “Inventory chicanery
Thomas, W.C. (1979), “Materiality guidance”, The tempts more firms, fools more auditors”,
Journal of Accountancy, February. December.
Thompson, C.M. (1991), “Fraud: the challenge Wall Street Journal (1994a), “Italy’s Montedison
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

facing internal auditors”, The Internal Audi- sues Price Waterhouse, seeking $610 million”,
tor, June, p. 69. April 19.
Thompson, C.M. (1992), “Fighting fraud”, Internal Wall Street Journal (1994b), “Former vice presi-
Auditor, August, pp. 18-23. dent at Towers Financial pleads guilty to
Thompson, C.M. (1992), “Auditee interference and fraud”, September 30, p. B4.
deception”, Internal Auditor, June, p. 73. Wall Street Journal (1994c), “SEC lodges charges
Thompson, C.M. (1992), “Fraud”, Internal Auditor, against ex-official of a Florida insurer”,
August, p. 19. October 14, p. B4.
Thompson, C.M. (1993a), “Financial reporting Wall Street Journal (1996a), “Daiwa bank pleads
fraud”, Internal Auditor, December, p. 66. guilty to concealing $1.1 billion in losses”
Thompson, C.M. (1993b), “Fraud findings”, Inter- February 19.
nal Auditor, February, p. 61. Wall Street Journal (1996b), “Stock market sur-
Thompson, C.M. (1993c), “Fraud in the executive prises leads to new Italian market regula-
suite”, Internal Auditor, Vol. 50, October, p. 68. tions”, October 29.
Thompson, C.M. (1993d), “Bad news bearers”, Wall Street Journal (1996c), “Brazilian bank
Internal Auditor, June, p. 64. accounting fraud lasted 10 years”, Wall Street
Thompson, C.M. (1995), “What did we learn in Journal, March 6.
1994?”, Internal Auditor, February, p. 53. Wallace, W.A. (1995), Auditing, South-Western
Thornhill, W.T. (1985), “A riskier tomorrow”, The College Publishing, Cincinnati, OH.
Internal Auditor, April, pp. 28-31. Walker, R. (1993), “In search of relevance”, CA
Thornhill, W.T. (1995), Forensic Accounting. How to Magazine, Vol. 126, February, p. 26.
Investigate Financial Fraud, Irwin, Burr Warner, A. (1994), “Scam-busters”, The Banker,
Ridge, IL, 1995. Vol. 144, May, pp. 68-70.
Thornhill, W.T. (1996), “Fraud: input tampering”, Welch, S.T., Holmes, S.A. and Strawser, R. (1996),
Internal Auditing, Vol. 12, Summer, p. 48. “The inhibiting effect of internal auditors in
Thueson, B.C. (1997), “The land of opportunity”, fraud”, Internal Auditing, Vol. 12, Fall, p. 23.
The White Paper, Vol. 2, January-February, Wells, J.T. (1992), “Fraud assessment question-
p. 35. ing”, Internal Auditor, August, pp. 24-9.
Treadway Commission (1987), Report of the Wells, J.T. (1992), Fraud Examination: Investiga-
National Commission on Fraudulent Report- tive and Audit Procedures, Greenwood Pub-
ing. lishing Group, Westport, CT.
Tucker, J.J. (1988), An Early Contribution of Ken- Wells, J.T. (1993), “Financial Frankensteins”,
neth W. Stringer. Development and Dissemina- Internal Auditor, Vol. 50, April, pp. 52-7.
tion of the Audit Risk Model, Rutgers Univer- Wells, J.T. (1994), “Message from the chairman”,
sity, New Brunswick, NJ; National Commis- The White Paper, October/November.
sion on Fraudulent Reporting, 1987, Washing- Wells, J.T. (1994), “The billion dollar paper clip”,
ton, DC. Internal Auditor, October, pp. 32-8.
US Department of Justice (1977), The Investigation Wells, J.T. (1995), “It’s more than just accounting”,
of White Collar Crime, Government Printing Internal Auditor, June, p. 13.
Office, April, Washington, DC. Wells, J.T. (1997), “A medium rare scheme”, The
Van Nostrand, G. and Luizzo, A.J. (1996), “The White Paper, January/February, p. 19.
hidden cost of downsizing”, The White Paper, Wells, J.T. (1997), “Message from the chairman”,
Vol. 10, September/October, p. 23. The White Paper, January/February, p. 4.
Vanasco, R.R. (1992), “FCPA: the American antib- Wellsj, K. (1992), “Auditor in UK defends role in
ribery legislation”, Managerial Auditing BCCI report”, The Wall Street Journal, August
Journal, Vol. 7, pp. 24-30. 14, p. A4.

[ 70 ]
Rocco R. Vanasco Welton, R.E. (1988), “Pandora’s box: a comparison Wild, D. (1994), “Keep check on probity during
Fraud auditing of Federal and State RICO statutes as they reorganization”, Public Finance, December 9,
Managerial Auditing Journal affect accountants”, in A Profession in Transi- p. 3.
13/1 [1998] 4–71 tion: The Ethical and Legal Responsibilities of Williams, J. (1993), “Concealing out corruption”,
Accountants, (DePaul University 1988-1989 Internal Auditor, Vol. 50, June, pp. 33-7.
Research Symposium), pp. 65-79. Wojcik, J. (1993), “Managed care techniques also
White, R.M. (1977), The Entrepreneur’s Manual. work on company costs”, Business Insurance,
Business Start-ups, Spin-offs, and Innovation Vol. 27, May 3, p. 3.
Management, Chilton Book Company, Radnor, Yang, C. (1997), “Whistle-blowers on trial”, Busi-
PA. ness Week, March 24, p. 172.
White Paper (The) (1994a), “Fraud update”, Zelenko, L. and Urban, R. (1994), “Small investors
August/September. face pyramid collapse”, The European,
White Paper (The) (1994b), “Fraud update”, Vol. 241, December 22, p. 16.
October/November, p. 17. Zeune, G.D. (1994), “How to fool auditors”, Busi-
White Paper (The) (1997), “European office opens”, ness Credit, Vol. 96, October, pp. 27-32.
Vol. 2, January/February, p. 27. Ziegenfuss, D.E. (1996), “State and local govern-
Whittington, R.O. and Pany, K. (1995), Principles of ment fraud survey for 1995”, Managerial
Auditing, Irwin, Chicago, IL. Auditing Journal, Vol. 9, November, p. 49.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

[ 71 ]
This article has been cited by:

1. Dessalegn Getie Mihret. 2014. National culture and fraud risk: exploratory evidence. Journal of Financial Reporting and
Accounting 12:2, 161-176. [Abstract] [Full Text] [PDF]
2. Kamil Omoteso and, Musa ObalolaThe Role of Auditing in the Management of Corporate Fraud 129-151. [Abstract] [Full
Text] [PDF] [PDF]
3. Joyce K. H. Nga, Evelyn W. S. Lum. 2013. An Investigation into Unethical Behavior Intentions Among Undergraduate
Students: A Malaysian Study. Journal of Academic Ethics 11, 45-71. [CrossRef]
4. George Emmanuel Iatridis. 2011. Accounting disclosures, accounting quality and conditional and unconditional conservatism.
International Review of Financial Analysis 20, 88-102. [CrossRef]
5. Katharina Chudzikowski, Gerhard Fink, Wolfgang Mayrhofer, Maaja Vadi, Krista Jaakson. 2011. The dual value of honesty
among Russians in selected former Soviet countries. Cross Cultural Management: An International Journal 18:1, 55-70.
[Abstract] [Full Text] [PDF]
6. Sunita Goel, Jagdish Gangolly, Sue R. Faerman, Ozlem Uzuner. 2010. Can Linguistic Predictors Detect Fraudulent Financial
Filings?. Journal of Emerging Technologies in Accounting 7, 25-46. [CrossRef]
7. Grant Samkin, K.A. Van Peursem, A. Balme. 2010. Threats to the New Zealand Serious Fraud Office: an institutional
perspective. Qualitative Research in Accounting & Management 7:3, 304-328. [Abstract] [Full Text] [PDF]
8. Grant Samkin, K.A. Van Peursem, A. Balme. 2010. Threats to the New Zealand Serious Fraud Office: an institutional
perspective. Qualitative Research in Accounting & Management 7:3, 304-328. [Abstract] [Full Text] [PDF]
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)

9. Philmore Alleyne, Nadini Persaud, Peter Alleyne, Dion Greenidge, Peter Sealy. 2010. Perceived effectiveness of fraud detection
audit procedures in a stock and warehousing cycle. Managerial Auditing Journal 25:6, 553-568. [Abstract] [Full Text] [PDF]
10. Michael Doumpos, Chrysovalantis Gaganis, Fotios Pasiouras. 2005. Explaining qualifications in audit reports using a support
vector machine methodology. Intelligent Systems in Accounting, Finance and Management 13:10.1002/isaf.v13:4, 197-215.
[CrossRef]
11. Gerald Vinten, Philmore Alleyne, Michael Howard. 2005. An exploratory study of auditors’ responsibility for fraud detection
in Barbados. Managerial Auditing Journal 20:3, 284-303. [Abstract] [Full Text] [PDF]
12. A. Seetharaman, M. Senthilvelmurugan, Rajan Periyanayagam. 2004. Anatomy of computer accounting frauds. Managerial
Auditing Journal 19:8, 1055-1072. [Abstract] [Full Text] [PDF]
13. Ch. Spathis, M. Doumpos, C. Zopounidis. 2002. Detecting falsified financial statements: a comparative study using
multicriteria analysis and multivariate statistical techniques. European Accounting Review 11, 509-535. [CrossRef]
14. Charalambos T. Spathis. 2002. Detecting false financial statements using published data: some evidence from Greece.
Managerial Auditing Journal 17:4, 179-191. [Abstract] [Full Text] [PDF]
15. M.H Abdolmohammadi, V.D Owhoso. 2000. Auditors’ ethical sensitivity and the assessment of the likelihood of fraud.
Managerial Finance 26:11, 21-32. [Abstract] [PDF]
16. Sunita GoelFraud Detection and Corporate Filings 315-332. [CrossRef]

You might also like