Professional Documents
Culture Documents
Fraud Auditing
Fraud Auditing
Fraud auditing
Rocco R. Vanasco
Article information:
To cite this document:
Rocco R. Vanasco, (1998),"Fraud auditing", Managerial Auditing Journal, Vol. 13 Iss 1 pp. 4 - 71
Permanent link to this document:
http://dx.doi.org/10.1108/02686909810198724
Downloaded on: 03 March 2015, At: 06:10 (PT)
References: this document contains references to 405 other documents.
To copy this document: permissions@emeraldinsight.com
The fulltext of this document has been downloaded 11193 times since 2006*
Users who downloaded this article also downloaded:
William Hillison, Carl Pacini, David Sinason, (1999),"The internal auditor as fraud-buster", Managerial Auditing Journal, Vol.
14 Iss 7 pp. 351-363 http://dx.doi.org/10.1108/02686909910289849
Harold Hassink, Roger Meuwissen, Laury Bollen, (2010),"Fraud detection, redress and reporting by auditors", Managerial
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
Access to this document was granted through an Emerald subscription provided by 294800 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service
information about how to choose which publication to write for and submission guidelines are available for all. Please
visit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
Emerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of
more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online
products and additional customer resources and services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication
Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.
Rocco R. Vanasco
Director, Center for Internal Auditing Studies, National-Louis University, Chicago,
Illinois, USA
This paper examines the role For Elliot and Willingham (1980), financial
of professional associations, Introduction fraud is the “deliberate fraud committed by
governmental agencies, and Fraud is an ever-present threat to the effec- management that injures investors and credi-
international accounting and tive utilization of resources and hence will tors through materially misleading financial
auditing bodies in promulgat- always be an important concern of manage- statements.”
ing standards to deter and ment (Brink and Witt, 1982). The Institute of Internal Auditors (1985), in
detect fraud, domestically its SIAS No. 3, Deterrence, Detection, Investi-
Chandler et al. (1995), in their article titled
and abroad. Specifically, it gation, and Reporting of Fraud, has referred
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
the cost of litigation of fraud cases has cre- US$200,000 per incident.
ated a new wave of scandals and the auditors’ • The Wall Street Journal (1994a) reported
liability has skyrocketed in billions of dollars that Montedison, the Italian food and chem-
as attested from the following events: ical group, filed a suit against its former
• An editorial in Fortune (1978) reported that auditor Price Waterhouse, Italy, seeking
increased time pressure has led indepen- damages of more than one trillion lire
dent auditors to do a sloppy job in their (US$610 million). The suit seeks to recoup
audits. Out of 1,100 practitioners, 58 percent losses stemming from alleged “serious
had indicated that they had signed off on a negligence” in Price Waterhouse’s account-
required audit step without completing the ing from 1983-1992.
work or noting the omission. • Schmitt and Berton (1994) reported in The
• Thornhill (1985) observed that the US mili- Wall Street Journal that Deloitte agreed to
tary is defrauded by US$500 million to US$1 pay US$312 million to settle US claims
billion a year by unscrupulous contractors. related to S&L failure. The 18 pending law-
• The Institute of Financial Crime Preven- suits were seeking over US$14 billion for
tion (1986) reported that situation pres- theft-related work in the 1980s. The account-
sures, opportunities to commit fraud, and ing firm also agreed to provide training and
personal integrity are the three variables supervision for partners auditing financial
influencing the likelihood of fraud. Of all statements.
internal thefts 80 percent are committed by • Gardner (1996) reported in The White Paper
one employee acting alone. that GAO has estimated that total year loss
• Thomas (1990a) reported that fraud has to Medicare because of fraud and abuse is
caused billion dollar losses to financial approximately US$47 billion, or 10 percent
institutions and greatly increased the of total Medicare spending.
number of lawsuits. The Lincoln Savings In 1988, Berton reported in The Wall Street
and Loan Association and the so-called Journal that the malpractice claims against
“Keating five” lost US$2.3 billion in 1990s the accountants totaled US$1 billion; by
second quarter. The 2,500 S&Ls posted including the charges brought under RICO
US$271 million in losses in the first quarter cases, it would add up to US$4 billion in
of 1990. Rankin (1990) also reported that two claims. In 1992, it was estimated that there
of the Big Six firms face over US$13 billion were about US$30 billion in damage claims
in damages from related lawsuits. facing the profession as a whole.
• Schmedel and Berton (1992) reported a tax On 6 August 1992, the Big Six firms, over-
scandal in the Wall Street Journal concern- whelmed by the cost of litigation of cases
ing the Resolution Trust Corporation, a claiming auditors’ malpractice, issued a
federal thrift cleanup agency, which filed a Statement of Position entitled The Liability
US$400 million civil suit against Arthur Crisis in the United States: Impact on the
Andersen & Co. claiming that the account- Accounting Profession. The statement
ing firm was negligent in auditing the col- requests a substantive reform of both federal
lapsed Benjamin Franklin Savings Associa- and state liability laws, specifically the
tion. Andersen Consulting had failed to replacement of joint and several liability with
withhold Colorado’s income tax from the a proportionate liability. It states:
pay of 35 nonresident employees. As part of While other serious problems must also be
the civil settlement, Andersen paid addressed, the principal cause of
[5]
Rocco R. Vanasco unwarranted litigation against the profes- The survey demonstrates an “expectation
Fraud auditing sion is joint and several liability, which gap” between auditors and other segments of
governs the vast majority of actions brought the financial community about the duty to
Managerial Auditing Journal
13/1 [1998] 4–71 against accountants at the federal and state discover deliberate material defalcations of
levels. The profession is merely asking for
the financial statements. It also shows an
fairness – the replacement of joint and sev-
eral liability with a proportionate liability “expectation gap” between auditors and
standard that assesses damages against bankers and financial analysts with respect
each defendant based on that defendant’s to a number of possible auditor disclosures.
degree of fault. Proportionate liability will Lowe and Pany (1993) surveyed 141 mem-
help restore balance and equity to the liabil- bers of a municipal court jurors pool and 78
ity system by discouraging suits and giving auditors from a large international account-
blameless defendants the incentive to prove ing firm to assess their attitude toward the
their cases in court rather than settle. auditing profession. The result of the study
The chairman and senior partner at Price reveals an “expectation gap.” The jurors view
Waterhouse warned that runaway litigation the auditor’s role as that of a public watchdog
seriously undermines the ability of the finan- or guardian to the extent of expecting the
cial reporting system to provide information auditor to actively search out the smallest
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
that supports competitive decision making by fraud. Auditors disagree with this characteri-
US companies. Unrealistic expectations and zation of their task.
the risk-shifting liability system have com- Epstein and Geiger (1994) conducted a
bined to create a situation in which auditors nationwide survey of stock investors which
are viewed as absolute guarantors against revealed a startling evidence of the “expecta-
fraud, failure, and financial ruin. Unwar- tion gap” between the assurances auditors
ranted litigation and forced settlements provided on financial statements compiled by
account for the vast majority of claims management and the expectation of investors
against auditors pose a grave threat to the and other users of financial statements. Over
health of many businesses and professions 70 percent of the 246 investors surveyed
(O’Malley, 1993a). believe that auditors should be held responsi-
Berton (1992a), in his editorial entitled ble for detecting material misstatements due
“Holding accountants accountable,” discour- to fraud, and some 47 percent expect auditors
ages the notion of “safe harbor” for accoun- to provide absolute assurance that financial
tants since it might be an open door for their statements contain no material misstatement
negligence. Such safe harbor may hurt their due to errors.
reputation by conveying to the public that
they want audit fees without the commensu-
rate responsibilities. Lee (1992), in his editor- Part I: Fraud and the law
ial entitled “The audit liability crisis: they
protest too much,” believes that the In the last few decades, a plethora of fraud
contention of the Big Six US audit firms on suits have been filed under the Securities
curving unwarranted litigation is plain: Acts, the Racketeer Influence and Corrupt
They are being extorted by an unfair legal Organizations Act (RICO), and Common Law,
system, and if the public expects their con- some of which will be examined below.
tinued services, the system must be changed
so as not to interfere with the maximization The role of the securities and exchange
of their profits. The statement ignores a very commission
real audit crisis, involving enormous corpo- Auditors must recognize their responsibil-
rate failures and frauds, especially in bank- ity to the public investors by including
ing and insurance. Auditors have been management activities in their review (SEC,
found “guilty in court, have been censored 1940).
by regulators, and have had their licenses
suspended in some states, yet the Big Six To protect users of financial statements,
appear obsessed with their economic entitle- many of whom suffered great losses in the
ment as a virtual monopoly and clueless as 1929 stock market crash, the Securities and
to their need to raise their professional Exchange Commission (SEC) adopted the
standards.
1932 New York Stock Exchange rule requiring
Barron et al. (1977) conducted a nationwide all companies, whose stock was listed by the
survey to elicit views within the financial Exchange, to furnish their shareholders
community on two major issues: audited financial statements at least annually.
1 the auditor’s responsibility for detecting The SEC has been very active in protecting
corporate irregularities and illegal acts; the public interest since its inception and has
and questioned the role of the auditing and
2 the auditor’s responsibility for disclosing accounting profession when faced with mate-
irregularities and illegal acts. rially misstated financial statements in
[6]
Rocco R. Vanasco violation of the securities laws. The SEC has • Auditors should be responsible for detect-
Fraud auditing not hesitated to prosecute corporations and ing gross misstatements whether resulting
Managerial Auditing Journal auditors in several cases of fraudulent finan- from collusion or otherwise.
13/1 [1998] 4–71 cial statements. The SEC’s proceedings are • Auditors must recognize their responsibil-
based on the following 1933 and 1934 securi- ity to the public investors by including
ties laws. management activities in their review.
Section 11(a) of the Securities Act of 1933
In the 1941 fraud case of United States v.
states that both the company filing the regis-
White, the auditor was convicted of criminal
tration and its auditors may be held liable to
fraud under Section 17 of the Securities Act of
the initial purchasers of the securities in the
1933 for his failure to disclose several
event that the registration statement is found
instances of questionable accounting prac-
to contain material misstatements or omis-
tices in connection with the registration
sion.
statement (Boyton and Kell, 1996).
The Securities Exchange Act of 1934
In 1942, the SEC promulgated Rule 10b-5
expands coverage to subsequent purchasers
which states:
and sellers of stock. For many years, the It shall be unlawful for any person, directly
accountants’ liability for issuing unqualified or indirectly, by the use of any means or
opinions on misstated financial statements
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
[7]
Rocco R. Vanasco as members of these ancient professions Equity Funding, grouped the fraudulent
Fraud auditing should be able to escape criminal liability activities into three categories:
on a plea of ignorance when they have shut 1 the creation and inflation of assets in the
Managerial Auditing Journal
their eyes to what was plainly to be seen or
13/1 [1998] 4–71 balance sheet;
have knowledge they did not possess.
2 the borrowing of cash without recording
In the fraud case of Fischer v. Kletz (known as the corresponding liability; and
Yale Express), 266 F. Supp. 180 (SDNY, 1967), 3 the creation of phony insurance which was
the company issued financial statements sold to other insurance companies.
which were materially misstated. They
reported a net income of US$1,400,000 instead The fraud case of Hochfelder v. Ernst & Ernst,
of a loss of US$1,254,000 and charged to 503 F. 2d 1110 (1974), represents a violation of
retained earnings an additional US$629,000. the Rule 10(b)-5 under the Securities
The suit was filed under Section 182 of the Exchange Act of 1934. The suit was brought
1934 Securities Act and Rule 10b-5. The court by a group of investors against the CPA firm
noted: that audited the First Securities Company of
The auditor has a duty to anyone still rely- Chicago, a small brokerage firm. The presi-
ing on his report to disclose subsequently dent had persuaded the investors to mail him
discovered errors in the report. This duty their personal checks for a fund from which
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
exists regardless of the auditor’s lack of he was to invest in escrow accounts yielding
financial interest in any transactions to high returns to the investors. It was discov-
which the information relates. The obliga-
ered later that no such escrow accounts with
tion arises because of the auditor’s special
relationship that provides access to the accounting records of the First Securities
information. Company existed. The president had diverted
the investors’ checks for his own use.
The landmark fraud case Escott v. BarChris In the United States v. Natelli, 527 F. ed 311
Construction Corporation (283 F. Suppl 643, (1975), known as the National Student Mar-
1968) represents a violation of Section 11 of keting Corporation case, two auditors were
the 1933 Securities Act. The plaintiffs claimed convicted of criminal liability for failing to
that the registration statement for deben-
properly disclose the write-off of uncollectible
tures contained materially false statements
accounts. The accompanying footnote failed
and material omissions. The court’s opinion
to indicate that regular sales for 1968 were
noted that:
overstated 20 percent and actual net earnings
• the registration statement (Form S-1) was
were only 46 per cent of the reported earn-
false and misleading; and
ings. The Court concluded that:
• the CPA firm failed to comply with gener-
• The treatment of the retroactive adjustment
ally-accepted auditing standards (GAAS).
was done intentionally to conceal errors in
The judge reprimanded the auditor for not the 1968 statements.
exercising a skeptical attitude and stated that • A professional cannot escape criminal
the auditor “was too easily satisfied with glib liability on a plea of ignorance when they
answers to his inquiries. But there were have shut their eyes to what was plainly to
enough danger signals in the materials which be seen.
he did examine to require some further inves-
tigation on his part.” A 1976 decision by the US Supreme Court in
The fraud case United States v. Simon, (425 Ernst & Ernst v. Hochfelder, 425 US 185, 96s ct
F. 2d 796, 1969), known as the Continental 1375, 47 L Ed 2d 668 (1976), marked the end of
Vending case, involved both criminal and the accountant’s liability for ordinary negli-
civil proceedings against three CPAs. The US gence under Section 10 of the 1934 Act. The
government’s case of fraud against the CPAs Court stated:
was initiated on the ground that the Conti- When a statute speaks so specifically in
nental’s audited financial statements were terms of manipulation and deception, and of
misleading. The finding by the jury that the implementing devices and contrivances –
the commonly understood terminology of
balance sheet did not present fairly Continen-
intentional wrongdoing – and when its
tal’s financial position led to the conviction of
history reflects no more expansive intent,
the three CPAs. The auditors were found
we are quite unwilling to extend the scope of
guilty, were fined US$17,000, and their the statute to negligent conduct.
licenses to practice as CPAs were revoked.
The Equity Funding fraud caused a scandal Based on the above court ruling, an auditor is
in the business community. The Wall Street no longer liable to third parties under Section
Journal (1974) reported that a financial vice- 10(b) and Rule 10b-5 of the 1934 Act for ordi-
president testified that he was ordered by the nary negligence. The auditor has no liability
firm’s chairman to inflate the profits falsely. in the absence of any intent to deceive or
Robert Loeffler, the court appointed trustee of defraud.
[8]
Rocco R. Vanasco In 1976, the SEC issued Accounting Series New York area for a 45-day period. The action
Fraud auditing Release (ASR) No. 165. Whenever an audit was triggered by the finding of a SEC law
Managerial Auditing Journal change occurs, clients must report it in Form judge that the firm engaged in “unethical and
13/1 [1998] 4–71 8-K within the prior two years: improper professional conduct” in two audits
there were any disagreements with the of US Surgical Corp, because it failed to:
former accountant on any matter of • exercise due care;
accounting principles or practices, financial • maintain the proper level of professional
statement disclosure or auditing scope or
skepticism; and
practice, which disagreement if not resolved
to the satisfaction of the former accountant
• resolve the serious question of client
would have caused him to make reference in integrity before certifying the financial
connection with his report on the subject statements.
matter of the disagreement.
The alleged misconduct resulted in the
In cases of management fraud, the auditor issuance of unqualified audit reports on state-
should resign from the audit engagement. ments that were incorrect for significantly
In United States v. Weiner, 578 F. 2d 757 (9th overstating income.
Cir. 1978), three auditors of Equity Corpora- To deter auditors’ involvement in fraudu-
tion of America were convicted after a jury lent financial statements, the SEC can initiate
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
and former controller J. Paul Medlin, accus- Novatek International. It is believed that the
ing them of overstating Comptronix profits medical-products marketing concern was
and then trying to hide the fraud from the largely a stock rig perpetrated by its control-
company’s independent auditors and board. ling shareholder, ex-convict William Trainor.
The former company officials have agreed to The company has filed for Chapter 11 bank-
repay investors about US$1.1 million in order ruptcy protection (Laing, 1996).
to settle fraud and insider trading charges In November 1996, the SEC filed the first
(New York Times, 1994a). suit to halt securities manipulation over the
In 1994, the SEC filed a civil fraud against Internet. At the agency’s request, a federal
Marvin G. Basson, a certified public accoun- judge in Washington froze the assets of
tant, who allegedly conspired to commit secu- Charles O. Huttoe, the chairman of Systems
rities fraud by certifying financial statements of Excellence, and the assets of Theodore R.
that: “fraudulently overstated Towers’ assets, Melcher Jr and Shannon B. Terry, operators
revenue, and income.” In April 1994, Towers of an electronic newsletter, SGA Goldstar.
and its founder, Steven Hoffenberg, were The SEC complained that the newsletter
indicted on criminal fraud charges. The for- writers, in cahoots with Huttoe, touted the
mer vice-president, Charles Chugerman, company over the Internet. When the stock
pleaded guilty to criminal fraud charges for price took off, investigators say, the writers
doctoring computer runs and otherwise falsi- and Huttoe dumped the shares. Kenneth
fying Towers books to mislead investors and Lench, the SEC branch chief of the investiga-
ratings services about Towers’ financial tion warned that “investors should be wary of
health (New York Times, 1994a; Wall Street biases of people who recommend securities,
Journal, 1994b). particularly when they are anonymous”
In 1995, the SEC filed a complaint in Federal (Hannon, 1996).
District Court in Manhattan against Soft- The SEC’s Regulation S prohibits the sale of
point, a Nevada company. The SEC alleged Reg S stock by US corporations to foreigners.
that Softpoint’s officers had engaged in an In 1996, a federal jury found Arthur Feher Jr
international complex fraud. Softpoint, guilty of criminal fraud for issuing new Reg S
which develops and sells a computer-driven shares to a Canadian (Palmer, 1996).
cash register, issued 420,000 shares to a group
of “fictitious” foreign companies. Most of The racketeer influenced and corrupt
those shares, which the foreign firms bought organizations act
at a discount, were then resold to US RICO claims against accountants were
investors, raising US$1.72 million, most of unheard of, but presently fifty such cases
involving claims against large and local CPA
which went back to Softpoint (Eichenwald,
firms are filed (Wallace, 1995).
1995).
The same year, the SEC filed charges In 1970, the US Congress enacted the Racke-
against Bankers Alliance Corporation, Carpe teer Influenced and Corrupt Organizations
Diem International, Lee Financial, and Act (RICO) as a weapon against mobsters and
related companies in an operation that SEC racketeers who were influencing legitimate
termed a Ponzi scheme. (The Ponzi scheme, business. The act defines the term “racketeer-
named after Charles Ponzi, the organizer of ing activities” to include crimes such as mail
such scheme in the USA in 1919-20, is a swin- fraud and fraud of the sale of securities. The
dle in which a quick return on an initial RICO Act provides treble damages in civil
[ 10 ]
Rocco R. Vanasco cases brought under the Act. For civil cases, million in actual damages and as much as
Fraud auditing the standard of proof requires a “preponder- US$1 million in punitive damages, or five
Managerial Auditing Journal ance of evidence.” The plaintiff must prove times the firm’s malpractice insurance cover-
13/1 [1998] 4–71 that the defendant: age. The defendant is reported to have
• employed any device to defraud; reached out-of-court settlements approaching
• made untrue statement of material fact or US$50 million.
omitted material fact; Welton (1988) compared both Federal and
• engaged in act, practice, or course of busi- State RICO statutes as they affect accoun-
ness to commit fraud or deceit in connec- tants. He concluded that the cumulative effect
tion with purchase or sale of securities. of litigation under federal and one or more
state RICO statutes could lead to catastrophic
Plaintiff must also prove: damages sustained;
liability of up to 39 times the actual damages.
material misstatement or omission; reliance;
In 1990, Laventhol & Horvath was the first
and scienter. For criminal cases, the standard
of proof is “beyond a reasonable doubt.” Sec- big accounting firm to be found guilty of a
tion 32(a) establishes criminal liability for RICO charge in a case involving the audit of a
“willfully” and “knowingly” making false or federal tax-shelter program. The accounting
misleading statements in reports under the firm collapsed and its former partners agreed
to pay US$48 million to avoid personal bank-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
[ 12 ]
Rocco R. Vanasco In the Amoco Chemical Corp. v. Hill, Del Super that auditors have a responsibility not only to
Fraud auditing (318 A. 2d 617), the court defined negligence their clients but also to investors and others
Managerial Auditing Journal as: relying on audited financial statements.
13/1 [1998] 4–71 the failure to employ such care as a reason- In 1985, the New York Court of Appeals
ably prudent and careful person would use rejected the foreseeable standard in Credit
in similar circumstances; it is the doing of
Alliance Corporation v. Arthur Andersen &
an act that a person of ordinary prudence
would have done under similar circum-
Co. The court established three criteria for
stances. determining whether a plaintiff can bring a
claim against auditors for ordinary negli-
The court rulings on fraud cases seem to gence:
indicate that auditors have potential liability 1 the plaintiff did in fact rely on the audi-
for ordinary negligence to primary beneficia- tors’ report;
ries for whose benefit they intend to provide 2 the auditors knew that the plaintiff
the information, and foreseen beneficiaries
intended to rely on their report; and
for whom they know the client will provide
3 the auditors, through some action on their
information. This also reflects the view of the
part, evidenced understanding of the
American Law Institute, in its Restatement of
plaintiff ’s intended reliance.
Torts (1977, No. 552).
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
[ 13 ]
Rocco R. Vanasco In one of the first fraud cases of Ultramares violations, bid rigging, securities violations,
Fraud auditing Corp v. Touche (255 NY 170, 1931), the auditors price fixing, bribery, environmental viola-
Managerial Auditing Journal failed to discover fictitious accounts receiv- tions, embezzlement, mail fraud, and others.
13/1 [1998] 4–71 able. The auditors’ negligence was deemed so The Federal Sentencing Guidelines reaffirm
gross that it constituted fraud. Judge Cardozo the old legal doctrine of respondeat superior.
stated on this matter: The organization is responsible for the
If liability for negligence exists, a thought- wrongful action of its employees while acting
less slip or forgery beneath the cover of in their official capacity. Organizations may
deceptive entries may expose accountants to
minimize exposure to illegal acts by commu-
a liability in an indeterminate amount for
an indeterminate time to an indeterminate nicating to all employees and agents unethi-
class. cal behavior through training programs,
establishing proactive antifraud programs,
The court believed that gross negligence enhancing fraud awareness, and initiating
existed in this case because “in certifying to fraud compliance audits. The Sentencing
the correspondence between balance sheet Guidelines creates an extraordinary risk for
and accounts the defendants made a state- corporations. Corporations will be held crim-
ment as true to their own knowledge, when
inally responsible even if those in manage-
they had … no knowledge in the subject.”
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
• responding to reported offenses with actions • procedures for feedback and correction
taken to prevent recurrences (Flesher, 1996). should criminal incidents be uncovered
must be established (Federal Sentencing,
Sittenfeld (1996) offers tips to organizations to 1991).
comply with The Federal Sentencing Guide-
lines for Organizations. Internal auditors can The US Sentencing Guidelines provide for
support management anti-fraud efforts in the incremental lower fines when an organiza-
following areas by: tion reports an offense to the authorities,
• making certain that preventive, detective, cooperates in the investigation, identifies and
and reporting controls are in place to sat- disciplines the wrongdoers, and takes vigor-
isfy the mandate of the Sentencing Commis- ous steps to reduce the likelihood for an
sion; offense to be committed.
• knowing that punishments are prescribed Fiorelli and Rooney (1997) find that the
in the Guidelines and what organizations Internal Control – Integrated Framework
can do to deflect them; (1992) of the Committee of Sponsoring Orga-
• developing a clear understanding of the nizations (COSO) and the Sentencing Guide-
deterrent provisions of the Guidelines, how lines are related since both focus in develop-
ing a strong system of internal control. All
they can affect the organization’s daily
the Sentencing Guidelines’ requirements
operations, and which set of internal con-
“can be explained within the context of
trol will satisfy the Guidelines and protect
COSO.”
the organization; and
• advising management with regard to how
The foreign corrupt practices act
the organization can derive the greatest
In the long run, an international agreement
benefit from incentives offered by the is needed to curb the use of bribes by
Guidelines. transnational corporations (Clinard, 1990).
Jennings (1997) believes that the internal The USA’s revulsion to bribery was evidenced
auditor’s role is to make sure that the organi- during the 1970s when well-known US compa-
zation’s program has monitoring and audit- nies such as Lockheed, Northrop, and Gulf
ing systems that provide a check on financial Oil were making headlines almost daily
and accounting controls. The auditor should because they paid large sums of money to
detect the types of crimes and regulatory high foreign officials in order to close impor-
violations to which the company is vulnera- tant deals (Evans et al., 1994).
ble, and monitor how effectively the compli- The Internal Revenue Service (1976) found
ance program itself is operating. The internal that bribes abroad may have led to tax fraud
auditor should also research ways to take in accounting. A SEC-sponsored voluntary
advantage of mitigating factors under the compliance program (1976) disclosed that
Guidelines, as well as strategies for dealing over 250 US corporations had made question-
with employee reporting and for designating able or illegal payments in the USA and
the most appropriate person for compliance abroad. Many of the illegal payments were
responsibility. made through off-the-books “slush funds” or
An effective compliance program with the improper invoicing practices.
Sentencing Guidelines must demonstrate To deter corrupt practices, the US Congress
commitment, oversight, responsibility, enacted the Foreign Corrupt Practices Act
staffing, and due diligence. The Due (FCPA) on December 19, 1977. The Act
[ 15 ]
Rocco R. Vanasco amends Section 13(b) of the Securities governments of the Organization for Eco-
Fraud auditing Exchange Act of 1934. nomic Cooperation and Development (OECD)
Managerial Auditing Journal Its accounting requirements apply to all to ban the use of bribery by transnational
13/1 [1998] 4–71 companies that are registered under Section corporations. The Act signed by President
12 of the 1934 Securities Act or that are Reagan amended the FCPA in order to
required to file report under Section D of the address its perceived deficiencies. The
Act. The accounting provision of the Act is amendments affect: the accounting provi-
administered and enforced by the SEC. sions; the criminalization of foreign bribery;
The FCPA requires SEC-registrant compa- and he enforcement of the act. The term “rea-
nies to implement an internal control struc- sonable detail” as used in the record keeping
ture sufficient to provide reasonable assur- requirement and the “reasonable assurance”
ance that: as used in the internal control system must
• transactions are executed in accordance meet the “prudent man” test. Criminal liabil-
with management’s general and specific ity is applied for firms and individuals who
authorization; make payments to third parties while know-
• transactions are recorded as necessary: to ing that the payment would be used by the
permit preparation of financial statements third party for purposes barred by the FCPA.
in conformity with generally accepted
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
led to increased opportunities for public ing procedures about inventory reporting.
officials to engage in bribery. Determining This led the AICPA to appoint the Committee
liability under the FCPA is fraught with legal on Auditing Procedures (CAP) to examine
ambiguities in a country undergoing major audit procedures and other “public discus-
legal and economic changes. Most Depart- sions” related to McKesson & Robbins regard-
ment of Justice enforcement actions so far ing a US$19 million overstatement of inven-
have focused on bribery involving high gov- tory and accounts receivable. The same year,
ernment officials (Dugan and Lechtman, the CAP issued the Statements on Auditing
1996). Thueson (1997) reported that kickbacks Procedures (SAP) No. 1, Extension of Auditing
and bribes – though technically illegal in Procedures, which recommended: the obser-
Russia, are normal business practices. Lack vation of physical inventory; the direct confir-
of internal controls and documentation, and mation from the debtor which should be
“ethical lapses” seem to be the major hurdles regarded as a normal audit procedure in all
for Western companies doing business in cases where receivables constituted a signifi-
Russia. It is possible for a Russian company cant proportion of total assets; the appoint-
to hire a government agency official as a ment of independent certified public accoun-
consultant on a business matter even though tants; and a report from the independent
the agency official is reviewing the business certified public accountant. SAP No. 1 also
matter under consideration. authorized the substitution of other proce-
dures under certain circumstances.
In 1951, the CAP felt that an examination of
Part II: Fraud and the professional financial statements did not warrant the
standards discovery of irregularities and adopted the
The role of the AICPA following position on fraud:
Independent auditors should accept the The ordinary examination incident to the
responsibility for the discovery and disclo- issuance of an opinion respecting state-
sure of those irregularities which the exer- ments is not designed and cannot be relied
cise of due audit care by a prudent practi- upon to disclose defalcations and other
tioner would normally uncover (Mautz and similar irregularities, although their dis-
Sharaf, 1961). covery frequently results.
More than once the American Institute of The AICPA contends that a detailed examina-
Certified Public Accountants (AICPA) has tion of financial statements is not called for
come to the rescue of the accounting and by the cost/benefit relationship:
auditing profession in fraud cases by rectify- If an auditor were to attempt to discover
ing the situation and issuing auditing stan- defalcations and similar irregularities, he
dards and procedures. These fraud cases, would have to extend his work to a point
which have been widely publicized, have had where its costs would be prohibitive … It is
generally recognized that good internal
a profound effect on the profession as the
control and surety bonds provide protection
independent auditor’s responsibility has
much more cheaply.
changed drastically over the years. In the
early 1900s, the external auditors’ primary In 1960, the AICPA issued SAP No. 30, which
responsibility was the detection of fraud was later incorporated in the Statement of
because audits were primarily involved with Auditing Standard (SAS) No. 1, Codification of
cash transactions. Auditing Standards and Procedures in 1972.
[ 17 ]
Rocco R. Vanasco The auditor acknowledged responsibility for in 1967 which was superseded by SAS No. 1. It
Fraud auditing detecting fraud that would normally be dealt with the auditors’ responsibility for
Managerial Auditing Journal uncovered by an examination performed in detecting fraud. The auditor is required to
13/1 [1998] 4–71 accordance with GAAS: look specifically for irregularities which may
The responsibility of the independent audi- have a material effect on the financial state-
tor to detect fraud (which responsibility ments. It states:
differs as to clients and others) arises only Under generally accepted auditing stan-
when such failures clearly result from non- dards, the independent auditor has the
compliance with generally accepted audit- responsibility, with inherent limitations of
ing standards. the auditing process, to plan his examina-
tion to search for errors or irregularities
It was felt that the cost of the discovery of
that would have a material effect on the
fraud would be prohibitive:
financial statements, and to exercise due
If an objective of an independent auditor’s
skill and care in the conduct of that exami-
examination were the discovery of all fraud,
nation.
he would have to extend his work to a point
where its cost would be prohibitive. Even The possibility of material errors or irregu-
then he could not give assurance that all larities should influence the independent
types of fraud had been detected or that auditor to adopt a skeptical attitude in the
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
none had existed because of items such as examination of the financial statements. SAS
unrecorded transactions, forgeries, and
No. 16 (Section 316) states:
collusive fraud would not necessarily be
The auditor should plan and perform his
uncovered. It is generally recognized that
examination with an attitude of professional
good internal control and fidelity bonds
skepticism, recognizing that the application
provide protection more economically and
of his auditing procedures may produce
effectively.
evidential matter indicating the possibility
Mautz and Sharaf (1961) question the AICPA’s of errors and irregularities.
position to eliminate or minimize the respon- Later the AICPA issued SAS No. 17 (Section
sibility to uncover fraud through audit-client 316), which even more explicitly requires
agreements, letters, and statements in the design of the audit to provide reasonable
professional literature. They list three assurance of detecting material errors and
motives for the refusal to uncover fraud: irregularities. Both SASs 16 and 17 have been
1 the auditor appears to be renouncing credited to the SEC chief accountant’s persua-
his/her right to an area in which he/she sive ability (Sack, 1987).
has competence and in which he/she can The 1967 fraud case of Fischer v. Kletz led
be of service; the AICPA to issue in October 1969 the State-
2 as a professional group auditors are in ment of Auditing Procedures (SAP) No. 21
effect refusing to provide an effective ser- which provides that errors discovered after
vice to the business community; and the completion of an audit are not to be con-
3 auditors are emphasizing to clients and cealed by the auditors’ silence.
the world at large their unwillingness to In May 1973, the AICPA appointed a special
accept responsibility, to provide a difficult committee to “study whether the auditing
but useful service. standards which are currently considered
They argue that there is a considerable differ- appropriate and sufficient in the examination
ence between a reasonable search for major of financial statements should be changed in
irregularities and the complete search for the light of the Equity Funding fraud.” In
possible errors. There are indeed a consider- February 1975, the special committee issued
able number of irregularities which even an its report and concluded that “Customary
elaborate search might not detect; there are audit procedures properly applied would have
also a considerable number of errors which a provided a reasonable degree of insurance
reasonable investigation might not disclose. that the existence of fraud at Equity Funding
They also feel that such position cannot but would be detected.” The special committee
“lessen the prestige of the profession, particu- felt that the audit procedures were adequate
larly in view of the fact that the service and and recommended a restatement of those
the responsibility we now deny, at one time, sections of SAS No. 1:
was claimed rather forcefully.” It seems clear that the auditor has an obliga-
After the Equity Funding scandal, the SEC tion to discover material frauds that are
discoverable through the application of
summoned the public accounting profession
customary auditing procedures applied in
and demanded to know what they planned to accordance with generally accepted audit-
prevent the recurrence of similar catastro- ing standards. The auditing profession
phes. The AICPA responded by issuing SAS should, on an ongoing basis, continue to
No. 16, The Independent Auditor’s Responsibil- improve the efficiency of customary audit
ity for the Detection of Errors or Irregularities procedures to the end that probability of
[ 18 ]
Rocco R. Vanasco discovery of material frauds continues to profession’s reputation. This led the AICPA to
Fraud auditing increase within the limits of practicality establish the following auditing standards
(Cooper and Flory, 1976). and procedures.
Managerial Auditing Journal
13/1 [1998] 4–71 In March 1975, the Financial Accounting In April 1988, the AICPA issued SAS No. 53
Standards Board (FASB) released a discus- (AU 316), The Auditor’s Responsibility to
sion memorandum entitled Analysis of Issues Detect and Report Errors and Irregularities,
Related to Criteria for Determining Material- which distinguishes between errors and
ity which lists the following factors that are irregularities:
weighted by auditors in materiality judg- The term errors refers to unintentional
mistakes in financial statements and
ments and by investors and creditors in
includes mathematical or clerical mistakes
making investing and lending decisions: in the underlying records and accounting
• environmental factors; data from which the financial statements
• enterprise related factors; were prepared, mistakes in the application
• accounting practices; and of accounting principles, and oversight or
• uncertainty. misinterpretation of facts.
The term irregularities refers to inten-
It seems that the auditor’s responsibility to tional distortions of financial statements,
detect management fraud depends on the such as deliberate misrepresentations by
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
• improve the prevention and detection of form of a White Paper that restated the audi-
fraud; tor’s responsibility to detect material mis-
• enhance the utility of financial reporting to statement, including management fraud
those who rely on it; (Carmichael and Craig, 1996).
• assure the independence and objectivity of In May 1996, the Auditing Standards Board
the independent auditor; (ASB) issued a proposed SAS, Consideration
• discourage unwarranted litigation that of Fraud in a Financial Statement Audit. This
impedes innovation and undermines the will replace SAS No. 53, The Auditor’s Respon-
profession’s ability to meet evolving finan- sibility to Detect and Report Errors and Irreg-
cial reporting needs; and ularities. The proposed statement:
• strengthen the accounting profession’s • describes fraud and its characteristics;
disciplinary system. • requires the independent auditor to assess
The reform calls for a systematic review of the risk of material misstatement due to
alleged accounting failures (Miller, 1993). The fraud and provides categories of fraud risk
board of directors also endorsed the proposed factors that should be considered;
federal “Financial Fraud Detection and Dis- • provides guidance on how the auditor
closure Act” and stressed that auditors should respond to the results of the assess-
should receive a stronger support from man- ment;
agement to allow them to prevent and detect • provides guidance regarding the auditor’s
fraud: communication about fraud to manage-
Every participant in the financial reporting ment, audit committees, and others.
process has a stake in preventing wrongdo-
ing and all should be expected to share the
The risks of fraudulent financial reporting
responsibility. Management, for example, are broken down into three categories:
should renew its emphasis on ethical values 1 management characteristics;
throughout the organization. It is also criti- 2 industry characteristics; and
cal that an open line of communication with 3 operating characteristics and financial
the independent auditor be maintained. stability.
Therefore, advisors, such as attorneys,
should be called upon to bring to the inde- The standard reaffirms the independent
pendent auditor’s attention instances of auditor’s present responsibility to plan and
suspected fraud so that the auditor can, to perform the audit in order to obtain reason-
the extent possible, confirm or dispel those able assurance about whether the statements
suspicions. Regulators who possess such are free from material misstatements, and
knowledge should also be required to make whether such misstatement is caused by
that information known to the auditors.
error or fraud (Hrisak, 1996). The indepen-
In its 1993 annual report, the Public Over- dent auditor is required to consider both the
sight Board (POB) of the American Institute fraudulent financial reporting (management
of CPAs focused on the accounting profes- fraud) and the misappropriation of assets
sion’s response to the growing liability crisis. (employee fraud). External auditors must
According to POB chairman A.A. Sommer Jr, therefore take proactive steps to ascertain the
the board will support efforts to pass legisla- existence of fraud, such as verifying more
tion that restores the balance between receivables, confirming sales and shipments,
accountability and liability. Sommer believes and conducting site inspections of client
that auditors should be accountable for facilities. Along with the auditor’s increased
[ 21 ]
Rocco R. Vanasco responsibility will be guidelines regarding Financial Statement Audit (1996). It provides a
Fraud auditing the involvement of the board of directors and “benchmark for what auditors need to do to
Managerial Auditing Journal the weak systems of internal control (Demery, fulfill their responsibilities related to consid-
13/1 [1998] 4–71 1996). eration of fraud in an audit.” The better our
The proposed standard, for the first time, profession can become in detecting fraud, the
uses the word “fraud” instead of “irregular- better we will serve the public interest and
ity.” Under the proposed revision, AU 110 increase the value of our services (Hrisak,
would read as follows: 1996).
The auditor has a responsibility to plan and Michael H. Sutton, SEC chief accountant,
perform the audit to obtain reasonable lauded the new AICPA Statement as the most
assurance about whether the financial state- recent effort by the profession to help gain
ments are free of material misstatement,
public confidence. He also praised SAS No. 82
whether caused by error or fraud.
for referring to fraud by name, for the first
The standard will force independent auditors time, instead of by its euphemistic term
to document in their working papers that “irregularities” and for describing over 40
they have considered the risk of fraud in their fraud risk factors that auditors must consider
audits: in planning and performing the audit
In planning the audit, the auditor should (Sutton, 1997a).
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
document in the working papers evidence of Fraud and bankruptcy often are found in
the performance of the assessment of the lawsuits against auditors. The auditor’s
risk of material misstatement due to fraud,
detection and disclosure responsibilities in
including any fraud risk factors that the
these areas are a focus of the Private Securi-
auditor believes, individually or in combina-
tion, significantly impact the risk of mater- ties Litigation Reform of 1995. The Act
ial misstatement together with the auditor’s reaffirms the auditor’s responsibilities
response to those risk factors. In addition, if regarding SAS No. 53, The Auditor’s Responsi-
during the performance of the audit, fraud bility to Detect and Report Errors and Irregu-
risk factors and other conditions are identi- larities. SAS No. 54, Illegal Acts by Clients,
fied that cause the auditor to believe that the and SAS No. 82, Consideration of Fraud in a
risk of material misstatement due to fraud Financial Audit (Palmrose, 1997).
has increased, the changed assessment, and
any further response that the auditor con-
The role of the institute of internal auditors
cluded was appropriate also should be docu-
The internal auditor is vitally concerned
mented.
with all manners of waste and fraud, what-
Albrecht (1996b) believes that the required ever the source and however small the size.
documentation “will narrow the expectation This is rooted in the understanding that a
gap because they will force auditors to con- tiny cloud can mushroom in to a tempest
that may rock the pillars of the enterprise
sider fraud explicitly in every financial state-
(Sawyer, 1988).
ment audit.”
The standard also requires the independent The IIA emphasis on fraud is reflected in the
auditor to discuss with management the Standards of Professional Practice for Inter-
possibility of fraud: nal Auditors (SPPIA). Section 280 states:
The auditor also should inquire of manage- In exercising due professional care, internal
ment to obtain the client’s view regarding auditors should be alert to the possibility of
the risk of material misstatement due to intentional wrongdoing, errors and omis-
fraud. Information from that inquiry could sions, inefficiency, waste, ineffectiveness,
identify fraud risk factors that may affect and conflict of interest. They should also be
the auditor’s assessment and related alert to those conditions and activities
response. Some examples of matters that where irregularities are most likely to
might be discussed as part of the inquiry occur.
are: whether there are particular subsidiary
locations, business segments, types of trans- The standards do not, however, specify that
actions, account balances, or financial state- internal auditors are responsible for the
ment categories where fraud risk factors detection of fraud. Internal auditors must be
exist or may be more likely to exist; and how alert and consider the possibility of fraud
management may be addressing such risks. when carrying out an audit. Internal auditors
The standard raised the following concerns: cannot give absolute assurance that fraud
the increased cost of performing the financial does not exist:
Internal auditors cannot give absolute
audits; the increased exposure of auditors to
assurance that noncompliance and irregu-
litigations; and the flaws related to the fraud larities do not exist. Nevertheless, the possi-
risks factors (Albrecht, 1996b). bility of material irregularities of noncom-
David Landsittel, chairman of the ASB’s pliance should be considered whenever the
Fraud Task Force, commented on the new internal auditor undertakes an internal
SAS No. 82, Consideration of Fraud in a audit assignment.
[ 22 ]
Rocco R. Vanasco In 1985, The Institute of Internal Auditors conducted within the context of rules of
Fraud auditing deemed fraud so important to issue SIAS No. evidence. As a discipline, it encompasses
Managerial Auditing Journal 3, “Deterrence, detection, investigation, and financial expertise, fraud knowledge, and a
13/1 [1998] 4–71 reporting of fraud” to codify the internal strong knowledge and understanding of
auditor’s responsibility for fraud. The SIAS business reality and the working of the legal
added several subsections to Standard 280 to system. Its development has been primarily
address the issue of fraud detection. achieved through on-the-job training, as
well as experience with investigating offi-
In 1986, The Institute of Internal Auditors
cers and legal counsel.
took a stand on internal audit involvement in
the prevention of fraudulent activity – partic- Forensic accounting, which implies any
ularly, fraudulent financial reporting, and court-related work done by an accountant,
issued a paper entitled The Role of Internal can provide fraud review teams for the mem-
Auditors in the Deterrence, Detection, and bers of the legal profession. In criminal or
Reporting of Fraudulent Financial Reporting legal cases, forensic accountants can work for
(Institute of Internal Auditors, 1986). The the prosecution, defense, and even the court
paper was prepared for the National Commis- (Thornhill, 1995). Wells (1995) believes that
sion of Fraudulent Financial Reporting. forensic accounting has reached its limits
The pervasive influence by the Institute of
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
sent facts or subordinate his/her judgment to creditors.” He lists the following examples of
others.” The concepts of objectivity and management fraud and their underlying
integrity are the cornerstone of most profes- reasons:
sional associations, but some professionals • misappropriation of assets;
• reporting inflated asset values on operating
do not adhere to them in practice.
results so that those perpetrating the fraud
In a recent National Business Ethics Sur-
can retain their positions;
vey conducted by the Ethics Resource Center,
• increasing their remuneration;
nearly one-third of employees sometimes felt
• enhancing the holdings of company stock;
pressures to engage in misconduct to achieve
• improper use of assets to the benefit of man-
business objectives. One-fourth of the respon-
agement;
dents believe that their companies ignore
• overstatement of assets or understatement
unethical conduct to meet business objectives
of liabilities to present a favorable financial
and nearly one employee in six said their
position or results of operations;
company overtly encourages misconduct to
• the siphoning off of assets through transac-
meet business objectives. The Ethics
tions with affiliated entities;
Resource Center also reported that one-third
• kickbacks and other irregular transactions
of the employees surveyed witnessed miscon-
between officers and outside parties; and
duct at work, but less than half reported it to
• lack of disclosure of significant informa-
their employers. The majority of those who tion.
did report misconduct were not satisfied with
their company’s response. The likelihood that Management may make use of: false account-
employees report the misconduct they ing entries; misleading information; forged
observed increased significantly in compa- documents; unrecorded liabilities; or
nies with comprehensive ethical programs, recorded transactions with undisclosed ele-
and they were much more likely to be satis- ments. If evidence of top management fraud
fied with the outcome of their report than is disclosed, the board of directors or the
those without ethics programs (Internal audit committee should be alerted, and possi-
Auditor, 1995a). bly the regulatory agency. The collapse of the
Brief et al. (1997) examined one of the most Lincoln Savings and Loan Association is an
common types of fraud investigated by the example of management fraud.
SEC -the failure to report write-offs of over- Sawyer (1988) believes that the three condi-
stated assets. The study found, based on tions under which fraud exists are attributed
responses by more than 400 people, that 47 to the environment or climate set by senior
percent of the top executives, 41 percent of the management and the board:
controllers, and 76 percent of the graduate- 1 situational pressures experienced by
level business students included in the study employees of enterprises;
were willing to commit fraud by understating 2 uncontrolled access to assets, coupled with
write-offs that cut into their companies prof- management’s indifference; and
3 personal trait undermining personal
its. Such findings are indicative of the current
integrity.
state of ethics in financial reporting. They
provide but one reason why Congress, the He lists eight reasons behind management
SEC and the investing public all attach such fraud:
high value to the independent attest role of 1 Executives sometimes take rash steps
the auditing profession (Sutton, 1997b). from which they cannot retreat.
[ 25 ]
Rocco R. Vanasco 2 Profit centers may distort facts to hold off for 60 percent of the cases. Moreover, the
Fraud auditing divestment. study found that professional and managerial
Managerial Auditing Journal 3 Incompetent managers may deceive in employees were involved in 45 percent of the
13/1 [1998] 4–71 order to survive. cases. Based on the findings, they
4 Performance may be distorted to warrant recommended the following:
large bonuses. • To deter fraud, internal auditors should
5 The need to succeed can turn managers to ensure that strong prevention systems
deception. based on the fundamental principles of
6 Unscrupulous managers serve interests good internal control be established and
which conflict. used.
7 Profits may be inflated to obtain advan- • To detect and investigate fraud, organiza-
tages in the marketplace. tions must ensure the existence of strong
8 The one who controls both the assets and internal audit departments with sufficient
their records is in a perfect position to resources to pursue the increased responsi-
falsify the records. bilities faced by internal auditors.
Experience has shown that certain condi- A study was conducted to use a generalized
tions in an organization constitute symptoms quantitative-response model, EGB2, to model
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
• poor recordkeeping;
agement and the board of trustees should ask
• a lot of cash activity; and
auditors for a management letter on the suffi-
• the lack of a bidding process for the pur-
ciency of internal accounting and financial
chase of goods and services.
controls.
Ziegenfuss (1996) performed a study to deter-
mine the amount and type of fraud occurring
in state and local government. The study Part V: The industry sector
revealed that the most frequently occurring
The bank sector
types of fraud are:
The directors of commercial banks often are
• misappropriation of assets; held accountable for subordinate fraud,
• theft; even when they have no suspicion of the
• false representation; and existence of fraudulent activity (Schadewitz
• false invoices. and Blevins, 1996).
The reasons for the increased fraud in state In the last few decades, several hundred bank-
and local governments are: ing fraud cases have been reported by the
• poor management practice; press worldwide, some of which were really
• economic pressure; spectacular for their sophisticated schemes.
• weakened society values; Some of them are discussed below.
• people being not held responsible for their The role of bank directors, security person-
actions; and nel, audits, and examiners of financial insti-
• inadequate training for those responsible tutions is the deterrence and detection of
for fraud prevention/detection. fraud. Gup (1994) observed that banks have
The most often reported “red flags” are: learned the hard way how to protect them-
• weaknesses in internal control; selves against scams that defraud financial
• ignoring audit reports; institutions of billions of dollars. Statistics
• inventory losses; indicate that small banks are at most risk of
• nonreliance on internal/external audit being defrauded. The five most common
reports; schemes that result in major frauds that con-
• not paying attention to employee tribute to failures of financial institutions
comments; and are:
• actual expenses exceed those budgeted. 1 nominee loans;
2 double pledging of collateral;
The nonprofit organization sector 3 reciprocal loan arrangements;
The nonprofit community during the past 4 land flips; and
ten years has had to repeatedly defend its 5 linked financing.
credibility as a result of well-publicized
In 1978, a survey of EDP-related fraud was
scandals (Reis, 1996).
conducted in the banking and insurance
Recent events have shown that fraudulent industries in cooperation with the Bank
financial statements and embezzlement can Administration Institute, the American
occur even among charitable organizations Insurance Association, the American Council
and large companies like Leslie Fay, Phar of Life Insurance, and the Life Office Manage-
Mor and Miniscribe. It has been estimated ment Association. Of the 5,127 banks sur-
that 60 percent of people are only as honest as veyed, 105 reported they had experienced at
[ 28 ]
Rocco R. Vanasco least one case of what was believed to be EDP- and Commerce subcommittee, banks’ inde-
Fraud auditing related fraud. The survey indicated that the pendent auditors should share with regula-
Managerial Auditing Journal banking schemes most frequent used were tors their suspicion of bank fraud. He added
13/1 [1998] 4–71 misposting or misdirecting deposits. Other that “banks’ independent auditors should
most frequently used scheme included credit- report to the bank when they detect fraud. If
ing loans to borrowers who never received they resign from the account, they should
the funds, or who, in fact may have never report the reasons to regulators” (FDIC,
existed. In some other cases, perpetrators 1986).
made unauthorized extensions of credit In 1992, the Federal Deposit Insurance Cor-
limits and loan due dates. The perpetrators of poration negotiated a US$400 million settle-
fraud in the bank industry were, in order of ment with Ernst & Young. This settlement
frequency, clerks, loan officers, data proces- covered all cases brought against the account-
sors, tellers, and item processors. The method ing firm by federal regulators (Berton, 1992).
of detection identified in the event or factors Price Waterhouse, also in 1992, faced a
that triggered the detection of fraud were: US$338 million jury verdict. The 11-month
• internal controls; trial involved a bank audit that was
• routine audits; conducted by an inexperienced auditor who
• customer complaint/inquiry; did not discover bad loans and failed to iden-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
• accident, tip-off, unusual activity of perpe- tify reckless loan approval procedures
trators; (Berton and Adler, 1992).
• change in operations, EDP, or financial The same year, an US$8 billion negligence
statements (AICPA, 1984). suit was brought against two of the world’s
largest accounting firms, Price Waterhouse
Colvin et al. (1983) reported in Fortune that
and Ernst & Whinney (now part of Ernst &
the United American Bank of Knoxville used
Young) in connection with their audits of the
other banks, all controlled by the same family,
scandal-riddled Bank of Credit and Commerce
as a means of transferring problem loans
International (BCCI). Touche Ross, the liq-
thus keeping them from being detected by the
uidator of BCCI, charged the firms with negli-
auditors. The Federal Deposit Insurance
gence in their 1985 and 1986 audits of the
Corporation Improvement Act (FDICIA)
bank, which collapsed in 1991 amid what is
examiners found that the “bank had about
considered to be the largest fraud in banking
US$377 million, or nearly half its total assets,
history.
in loans the FDIC classified as partly or
Touche Ross claims that the massive fraud
totally uncollectible.” Nearly half of the prob-
should have been noticed years before it
lem loans were made to United American’s
finally came to light in 1991 (Souter, 1992). The
former chairman Jake F. Butcher, his family
report on the BCCI prepared by Senator John
associates and their interests.
Kerry’s subcommittee claims that the Bank of
In 1986, Keoning reported in the Wall Street
England was wholly deficient in its supervi-
Journal that Home Savings Bank was suing
sion of BCCI and conspired with BCCI audi-
its former auditor Arthur Andersen & Co.
tor Price Waterhouse and BCCIs main share-
and was seeking at least US$275 million in
holder to keep the bank going after seeing
compensatory damages. The Home Savings
clear evidence of fraud. The Bank of England
Bank alleged that the auditors did not dis-
and Price Waterhouse flatly denied these
cover the fraudulent use of the securities that
allegations claiming that they did not give
the bank used as collateral for loans to ESM
evidence directly to the subcommittee (The
Government Securities.
Economist, 1992). On October 22, 1992, the UK
In 1991, with bank failures at an all-time
government released the result of an inquiry
high, Congress passed legislation requiring
by a senior judge into the handling of the
internal control reports by insured deposi-
fraud-ridden Bank of Credit and Commerce
tory institutions. The FDICIA requires a
International, taking to task BCCI auditor
statement of management’s responsibility of
Price Waterhouse, BCCI major shareholder
the institution’s annual report for:
Abu Dhabi, and the bank’s main supervisor,
• establishing and maintaining adequate
the Bank of England. Lord Justice Bingham
internal controls over financial statement
stated in his report that the Bank of England
reporting and for complying with applica-
should have been more alert to early indica-
ble laws and regulations; and
tion of possible fraud (The Economist, 1992b).
• management’s assessment of the effective-
Fialka (1993) reported in the Wall Street
ness of the internal control and the compli-
Journal that former BNL-Atlanta manager
ance with designated laws and regulations
Christopher Drogoul claimed that the exter-
(FDICIA, 1991).
nal auditors failed to uncover US$5 billion of
According to FDIC chairman L. William allegedly fraudulent loans to Iraq in the late
Seidman, who testified before a House Energy 1980s. Drogoul, in a testimony before the
[ 29 ]
Rocco R. Vanasco House Banking Committee, stated that the In 1997, a former Chemical Banking Corpo-
Fraud auditing officials of the Banca Nazionale del Lavoro in ration trader, Victor Gomez, was sentenced to
Managerial Auditing Journal Rome encouraged him to make and conceal three years prison for concealing a US$66
13/1 [1998] 4–71 the large loans to Iraq while other bank million trading loss amassed through failed
branches were forbidden to make similar bets on Mexican pesos. Mr Gomez pleaded
loans. guilty for conspiracy and making false
According to the Commercial Crime entries in bank records. He doctored trading
Bureau, a division of the International Cham- records to conceal the trades from the New
ber of Commerce, there has been a significant York-based bank (Simon, 1997).
increase in reports of investment schemes Germany’s commercial banks have been hit
involving the buying and selling of the so- by three large financial fraud scandals involv-
called prime bank instruments. Areas of high ing metal and engineering giant Metallge-
risk for banks are procurement fraud, fraudu- sellschaft, real estate development concern
lent transfers, and transaction fraud (Warner, Dr Jungen Schneider, and international
1994). sports flooring company Balsam. Balsam’s
The Justice Department reported that con- four-man management board was arrested on
victions for bank fraud in 1994 dropped 17.3 suspicion of committing fraud, evading taxes,
and falsifying data to obtain loans. Balsam
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
1992. Employers need to be aware of the signs attempted to refund the money improperly
of employee fraud, which is a growing prob- withheld from other customers.
lem in the health care industry. Cottrell and 2 Case B. An audit of a credit balance review
Albrecht (1994) observed that managers, audi- of County General Hospital for the state’s
tors, and employees should be aware of the Medicaid program revealed that the
symptoms that suggest internal fraud. They finance director admitted issuing fictitious
should also know that these symptoms are refund checks, never intended for the pay-
neither productive nor absolute and that a ees to receive them. The Medicaid pro-
full investigation of all symptoms is neces- gram was refunded the full amount and
sary. the falsification was treated as a routine
According to the results of a survey con- exception rather than fraud.
ducted by the Health Insurance Association 3 Case C. An audit of the country’s health
of America, fraud by physicians, hospital benefits program revealed that a consul-
labs, and equipment providers nearly quadru- tant acknowledged receiving commission
pled from 1990 through 1992. As fraud abuse from the winning HMO and denied any
levels rise, insurers are calling for software to wrongdoing. The benefit committee dis-
detect billing aberrations, fraud, and abuse in agreed with the consultant and replaced
health care claims (Friedman, 1994). him.
The 1994 Department of Health and Human
From the lessons learned from the above
Service Office of the Inspector General (OIG)
cases, Stohl drew the following conclusions:
investigation discovered that billing discrep-
• Fraud detection lies in the detail.
ancies varied. The OIG believes that hospitals
• Follow-up is critical.
intentionally defrauded the Medicare pro-
• Suspected wrongdoing should be fully
gram. Medicare also caught hospitals wrong-
investigated to determine criminal intent.
fully submitting billings for experiential
• Fraud can be anywhere.
automatic implantable cardiac defibrillators
• Perpetrators often believe they are justified
(Gardner, 1996).
in the action taken.
In 1994, Cigna HealthCare has joined with
IBM to develop and implement a technologi- Stohl advises that auditors must be alert for
cal tool that analyzes providers’ behavior industry practices that may actually be dis-
patterns to identify potential abusers of honest. Last year’s accepted practice may be
health care. The fraud and abuse manage- tomorrow’s fraud.
ment system uses claim data to examine the The San Diego Union-Tribune (1996)
billing and medical activities of health care reported that a federal court fined Laboratory
providers to help determine the most likely Corporation of America US$187 million for
abusers (“Cigna-Healthcare,” 1994). fraudulent billings to state and federal gov-
Gardner (1995) reports that the Department ernment insurers. This scam is know as “add-
of Justice and other federal entities estimate on billing.” The lab encouraged doctors to
that as much as 10 percent of our national test patients by offering them a discounted
health care bill is lost to fraud and abuse. price on a battery of tests, some of which were
This means that as much US$100 billion may not necessary to the patient’s treatment. The
be lost this year due to health care fraud. This lab billed the doctors for the lower rate while
has led US Senator William S. Cohen (R- charging the government insurer the full
Maine) to introduce a bill titled “Health Care amount.
[ 31 ]
Rocco R. Vanasco On August 21,1996, President Clinton signed accused German artificial heart valve suppli-
Fraud auditing into law the Health Assurance Portability ers of bribing surgeons and administrators at
Managerial Auditing Journal and Accountability Act, common known as almost all western German public hospitals
13/1 [1998] 4–71 the Kassenbaum-Kennedy Bill. The Bill specializing in heart surgery. The bribes
grants government investigators plus resulted in millions of dollars of annual over-
Medicare and Medicaid groups more funding charges to the German national health care
and more power to pursue fraud and abuse system (Protzman, 1994).
cases. It also creates new incentives to launch In the UK, pharmacists collude with physi-
investigations, makes changes in the punish- cians to defraud the National Health Service
ment of health care providers that engage in (NHS). This may occur after a relationship
misconduct. Crane and Slavitt (1997) has developed and the physician seeks to pay
observed: for purchases through prescriptions of expen-
Congress used a two-barreled shotgun sive drugs which do not go to patients
approach in funding to combat fraud and (Duggan, 1995).
abuse. First, the appropriation levels made
the act remove any doubt that Congress is The insurance sector
finally getting serious about fraud and An accountant is not a guarantor of the
abuse. Second, Congress created a self-per- reports he prepares and is only duty bound
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
petuating fund that will assure that fraud to act honestly in good faith and with rea-
and abuse is a never-ending problem. sonable care in the discharge of his profes-
A survey conducted for the American Associ- sional obligations (SEC v. National Life
Insurance Co., 1974.)
ation of Retired Persons (AARP) by Interna-
tional Communications Research Group, Borda (1987) reported that the casualty insur-
which last December interviewed 2,000 adults ance frauds cost the public US$15 billion each
nationwide, found that 93 percent of Ameri- year and may add to as much as 25 percent to
cans think health-care fraud is widespread – policy premiums. Every insurance policy
and that “there is more of it in Medicare and bought by the public comes with a rate that
Medicaid than in any other kind of health includes enough to cover legitimate claims,
care.” June Gibbs Brown, Inspector General fraud, and profit for the company.
of the Department of Health and Human Ser- Tucker (1988) reviewed the early contribu-
vices (HHS), stated that the federal govern- tions of Kenneth W. Stringer to the Audit Risk
ment is fighting Medicare fraud since the new Model for insurance companies providing
computer system is able to analyze data, look fidelity bonds. The studies show that 10 per-
for trends, and look for problem at areas that cent of the claims submitted had been the
emerge. The pilot program called Operation results of collusion, forgery, and other irregu-
Restore Trust has already recovered US$139.3 larities. The studies warn that total reliance
million in fraud from both Medicare and on internal control to deter fraud is insuffi-
Medicaid providers (McLeod, 1997). cient.
The General Accounting Office (GAO) esti- Briloff (1991) reported in the Wall Street
mates that fraud accounts for ten percent of Journal, that Guarantee Security Life Insur-
the US$700 billion spent on health care in the ance Co., a Florida company, was able to com-
USA annually. This includes improper plete related-party transactions with its prin-
Medicare, Medicaid, and CHAMPUS billing cipal securities broker Merrill Lynch & Co.
practices by doctors and hospitals companies, from 1984 through 1988. In August 1991 Guar-
such as charging for tests, services or prod- antee became insolvent and its 57,000 policy-
ucts not provided (Iraola and Klubes, 1997). holders were temporarily prevented from
In Italy, massive corruption was revealed in collecting their annuities. The suit filed by
the pricing and registration of drugs. Conse- the Florida Insurance Commission accused
quently, the Italian pharmaceutical industry Merrill Lynch of fraud and also accused
is on the brink of collapse. The network of Coopers & Lybrand, Guarantee’s auditors, of
fraud and corruption encompasses every malpractice and breach of fiduciary duties.
stage between the manufacture and market- Omaha Indemnity Company is still recover-
ing of drugs (Abbott, 1993). Even the former ing from US$500 million in reinsurance fraud
Italian health minister, Francesco losses inflicted by two of its managing gen-
DeLorenzo, had apparently been colluding eral agents (MGAs) in a period of only a few
with drug companies to fix drug prices and to years. After reconstructing confusing masses
guarantee payoffs to pharmaceuticals. Sev- of poorly kept records, Omaha Indemnity
eral Italian universities have been accused of found that Royal American Managers (RAM)
accepting bribes to give the right “advice” Inc. had processed US$196.3 million in premi-
(Nature, 1993). ums but reported only US$61 million to
In Germany, officials of the Allgemeine Omaha Indemnity. RAM had pocketed
Ortskrankenasse health insurance network, US$34.6 million of the money, and much of the
[ 32 ]
Rocco R. Vanasco remainder had been absorbed in transactions SEC alleged that the former controller pre-
Fraud auditing among a network of companies, several of pared financial statements for Guarantee
Managerial Auditing Journal which were controlled by RAM principals Security that masked the fact that bond
13/1 [1998] 4–71 James Wining and Willie Schonacher Jr trades between the insurance company and
(McLeod, 1993). Merrill Lynch during the 1980s were sham
The IIA Dallas Chapter (1993) reported that transactions designed to mislead regulators
the audit of the National Flood Insurance and investors about the financial condition of
Program determined that a claim agent, who Guarantee and its parent, Transmark USA.
processed flood insurance claims, fabricated In 1995, Montana Goverment Mark Racicot
claims, arranged for the claims manager to signed into law State Bill 253, the Insurance
issue the checks, and then recalled the Fraud Protection Act. The law makes insur-
checks. The checks were passed to outside ance fraud a felony. Companies accepting
accomplices who cashed them and split the premiums without providing coverage and
money with the claim agent. Federal agents consumers supplying false oral or written
were notified and the claims agent was information could be charged with fraud. The
arrested. The auditor recommended halting bill will help to reduce the estimated US$85
the practice of allowing checks to be returned million of fraudulent insurance in the state
to the original requestors. (Cox, 1995).
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
The IIA Houston Chapter (1993) reported On April 2, 1996, the Miami Daily Business
that an internal audit determined that an Review reported that the New York Life Insur-
officer of an insurance company was with- ance Co. was ready to settle a federal fraud
drawing funds from dormant accounts con- suit for US$187 million. The investors claimed
taining unclaimed monies and buying New York Life Insurance, through an aggres-
cashier’s checks. The cashier’s checks were sive marketing program, made materially
made payable to various bill collectors, car false statements and hid relevant information
dealers, and relatives. The officer had stolen about the partnership’s prospects and risks.
US$60,000 and was convicted of fraud. The The 1996 survey by the Insurance Research
auditors recommended strengthening the Council (IRC) found stronger support for
internal control on dormant accounts. actions of insurance companies and law
At the Farmer Insurance Group of Compa- enforcement to vigorously investigate and
nies, management realized that to curb fraud punish insurance criminals, particularly
it was necessary to have a precise and mean- corrupt professionals, including doctors and
ingful vision statement. As the Home Office lawyers involved in fraud rings. In 1995,
analyzed how best to handle such detailed between US$5.2 billion and US$6.3 billion was
matters as handling fraud situations, it real- added to the insurance bills of personal car
ized that developing an overall vision of the insurance policyholders because of outright
audit would help keep the department fraud or claim padding, according to an IRC
focused on its goals (Jacka, 1995). estimate (IRC, 1997).
Fraud in the insurance sector is so perva- Prudential Insurance, New York Life, Met-
sive forcing Jim Brown to combat it with ropolitan Life, and other insurance compa-
great fervor. As Louisiana Insurance Com- nies have faced insurance commissioner
missioner, he increased manpower and investigators, class action lawsuits and thou-
budget for fraud detection and financial sands of complaints by policyholders about
auditing in 1992. He improved his depart- misrepresentations known as “churning.”
ment’s link with federal investigators and Policyholders were promised that thy would
encouraged state legislators to pass laws never again have to make life insurance pay-
making it easier to detect and prosecute ments when, in fact, they were being charged
insider fraud. a fixed amount per year (PR Newswire, 1997).
The results are impressive: 32 insurance On January 13, 1997, the US District Court
executives in Louisiana were convicted of in Los Angeles approved the settlement of two
various white-collar crimes; two former state class actions against Connecticut General
insurance commissioners and a former Life Insurance Company (“CGLIC”). The
deputy commissioner pleaded guilty of fraud, class actions alleged that CGLIC committed
and 36 out of 100 licensed insurers were fraud and misrepresentation in the sale of life
closed for being near insolvency (Covaleski, insurance policies by, among other things,
1994). falsely representing the number of payments
On October 14, 1994, the Wall Street Journal that would be required for the life insurance
(1994c) reported that the SEC lodged charges policies sold to the Class. The benefits pro-
against the former controller of Guarantee vided to the Class under this settlement also
Security Life Insurance for taking part in include US$35 million in future adjustments
fraudulent record-keeping and reporting to CGLIC will make to a group of policies which
hide the insurance’s financial condition. The were impacted by adjustments the company
[ 33 ]
Rocco R. Vanasco made to recover the cost of the DAC Tax and Member States of the European Union (EU)
Fraud auditing the provisions of the Omnibus Budget Recon- require different actions from auditors in
Managerial Auditing Journal ciliation Act of 1990 (Life Insurance Industry, cases of fraud. Auditors in France may be
13/1 [1998] 4–71 1997). required to report irregularities to authori-
Insurance fraud is also increasing in the ties while auditors in The Netherlands may
international area as well due to better com- be required to withdraw from the engage-
munications and transportation capabilities ment and report irregularities to a special
that allow perpetrators to move into and government agency. In the UK, auditors may
around the global arena. report to the authorities when the circum-
stances warrant (Schilder, 1996).
The retail industry sector Fraud has become of great concern in the
Dishonest employees are by far one of the European Union. The EUs common agricul-
leading causes of lost dollars to any com- tural policy (CAP) is prone to fraud. For more
pany. These employees will not only steal than a decade the European Court of Auditors
from you, but they will take precautions to has been making an annual report on fraud.
avoid detection (Dabney, 1997). Myriad frauds have been uncovered, ranging
The University of Florida’s 1996 National from theft of food aid to fraudulent claims
and awards from structural funds. According
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
is always below the adequacy for any effective Huang Moy and Raymond C. Lee had per-
audit planning. Under these circumstances, suaded a small-town branch of the Agricul-
fraud detection may be the last priority. ture Bank of China to issue the 200 standby
Nnanna (1995) reported that fax fraud in letters of credit totaling US$10 billion by
Nigeria is rampant and is costing companies using as a collateral a phony US$10 billion
several million dollars. Because a fax is trans- letter of credit from a nonexistent bank.
mitted over a telephone line, it is possible to The Indian perspective
intercept the information. The process is Fraud in the workplace is one of internal
similar to tapping into a phone call. Hackers auditing’s grimmest nightmares, and it is
divert faxes to other local fax receivers where often one of the most public (Cisz, 1997).
the fax’s information is used to deceive,
Dalal (1994) reported that members of India’s
defraud, or blackmail the sender or receiver.
Parliament were accusing top government
Some organizations concerned with security
ministers of playing an integral role in a 1992
are arming themselves with fax encryption
securities fraud scandal. A government
device. The new device locks between a fax
report acknowledges the fraud violations but
machine and the phone jack, and scrambles
attributes them to the previous government.
the signal as it is transmitted. The signal can
Opposition members of parliament did not
only be decoded by a matching device in the
seem pleased with the government denials of
receiving end. TRW Electronic Products Inc.
wrongdoing and by the small fines against the
has sold several thousand of the TRW Fax
banks implicated in the scandal.
Encryptors (Internal Auditor, 1991b).
McDonald (1995) reported a securities
Ekong (1995) observed that in Nigeria, man-
fraud. Pawan Sachdeva, a new Delhi shoe
agement, directors, and foreign shareholders
maker, drew attention when it came up
of the African Development Bank are able to
US$4.3 million short in a complicated double-
create a self-engineered mess. The sharehold-
issue scheme which is unfortunately common
ers were unable to elect a new president of the
in India. Authorities charged the officials of
bank and expressed serious concern over
the two Securities and Exchange Board of
nearly US$1 million spent on equipment
India with collusion. Both had granted the
which is not working, over US$750,000 spent
permission of 60-day period between the two
on unauthorized and abandoned projects, and
issues when the limit was 30 days. Pawan
fraud totaling over US$270,000 resulting from
Sachdeva was arrested on charges of falsely
spurious claims for educational allowances
overstating the number of the shares of his
by staff.
company.
According to the Corruption Perception
Index prepared by Transparency Interna- The Indonesian perspective
tional, based in Berlin, Nigeria tops the list as The fraud scandal reported sparked a public
the most commercially corrupt country in outcry against collusion between bank
officials’ politically backed borrowers (The
the world. Pakistan, Kenya, Bangladesh, and
White Paper, October 1994).
China round out the top five (Internal
Auditor, 1997). The White Paper (1994) reported that busi-
Stenger (1997), of the US Secret Service’s nessman Eddy Tansil was found guilty of
financial crimes division, stated that “Since causing a US$449 million loss to the Indone-
1990, Nigerian advance fee fraud, known as 4- sian government. Tansil allegedly obtained
1-9 after a section of the Nigerian criminal the loans from petrochemical projects that
[ 35 ]
Rocco R. Vanasco were never built. The businessman altered Da-ming is suspected of illegal trading prac-
Fraud auditing and misused credits managed by the state- tices and unsettled payments worth US$128
Managerial Auditing Journal owned P.T. Bank Pembangunan. The Indone- million. Oung invested funds for legislators
13/1 [1998] 4–71 sian government fined him US$231 million for who hoped to raise revenue for their political
the losses. party. His illicit connections with other mem-
bers of parliament has caused a scandal that
The Japanese perspective
Daiwa Bank Ltd of Japan pleaded guilty to has affected both the ruling Kuomintang
conspiring to conceal US$1.1 billion in trad- party and the Democratic Progressive Party.
ing losses from US regulators and agreed to The Economist (1995a) reported alleged
pay a US$340 million fine, one of the largest frauds that emerged in August 1995 in rela-
ever imposed by the USA (Wall Street Jour- tion to Chanhus City Fourth Credit Coopera-
nal, 1996a). tive, a credit union; International Bills
Smith (1995) reported that the Federal Finance Corporation, a large underwriter of
Reserve had kicked the Daiwa Bank out of the commercial papers; and Fengyuan Credit
US When the trader Toshihide Iguchi Union. The fraud had shown glaring gaps in
incurred a US$1.1 billion in trading losses, financial supervision and stock manipula-
top management at the Daiwa Bank allegedly tion.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
Venezuela’s government is keen to punish tunities for fraud in more than 80 percent of
the former top officials of Banco Latino who the cases; and
have managed to slip away to southern • about half of all frauds occurred in the
Florida (The Economist, 1995b). financial area.
The Economist (1995b) reported that the gov- Albrecht et al. (1994) believe that organiza-
ernment of Venezuela charged 83 former tions should adopt a proactive approach to
executives of the Banco Latino for fraud and reducing costs associated with fraud. A good
laundering monetary instruments in the program should emphasize fraud prevention
amount of US$2 billion. and not reaction to already committed fraud.
The Banco Latino and its Miami-affiliate The steps involved in such a model include
Banco Latino International have filed a crimi- implementation of prevention and awareness
nal suit in Miami, Florida, against its former programs, incidence of fraud, incident
bank president, Gustavo Gomez Lopez. reporting, investigation, action, resolution,
analysis, publication, implementation of
controls, examination of compliance and
Part VII: The investigative and training, and proactive fraud auditing.
reporting process According to Robert E. Fleming, director of
auditing and accounting at Urbach Kahn &
Fraud indicators Werlin in Albany, New York, there are many
While professional internal auditors may clues that should warn CPAs about the possi-
not be insurers against fraud, their respon-
bility of financial misstatement or fraud.
sibility for due professional care will
These include:
require an increasingly high level of alert-
ness to the indicators of fraud (Sawyer, • an overly complex organizational structure
1988). with many subsidiaries;
• unusual structured partnerships; and
The SEC, in ARS No. 174, has urged auditors • numerous joint ventures (Friedman, 1995).
to be on the alert for signs that indicate man-
agement might be seeking to conceal a deteri- Albrecht (1996) groups the indicators of
oration in the financial position of the com- employee fraud in six categories:
pany. Such red flags include: 1 Accounting anomalies which include
• the recognition of income from transac- embezzlement, overstatement of expenses,
tions which do not reflect actual economic fictitious journal entries, missing docu-
changes; ments, alterations on documents, exces-
• unwarranted attempts to defer expense sive voids or credits, increased past due
recognition; accounts, duplicate payments, entries
• avoiding recognition of losses; and made at or near the end of accounting
periods and others.
• timing of major transactions so as to
2 Internal control symptoms which include a
achieve apparent improvements in the
poor control environment, lack of segrega-
financial statements (Cooper and Flory,
tion of duties, lack of physical safeguards,
1976.)
lack of independent checks, lack of proper
In April 1988, the AICPA issued SAS No. 55, authorizations, lack of proper documents
“Consideration of the Internal Control Struc- and records, the overriding of existing
ture in Financial Statements” which states controls, and an inadequate accounting
that the effectiveness of internal controls system.
[ 40 ]
Rocco R. Vanasco 3 Analytical symptoms which include trans- • Conduct additional tests directed toward
Fraud auditing actions and amounts that are too large or detection of fraud if significant weaknesses
Managerial Auditing Journal too small; transactions or events that are found.
13/1 [1998] 4–71 occur at odd times and places. • Evaluate the indicators and decide whether
4 Lifestyle symptoms which include further action is necessary or an investiga-
employee’s greed, financial needs, or pres- tion should be recommended.
sures. Employees are living lifestyles far • Determine whether the organizational
beyond what they can reasonably afford. environment fosters control consciousness.
5 Behavioral symptoms which include • Determine whether realistic organizational
employees’ unusual and recognizable goals and objectives are set.
behavior patterns; unusual irritability
• Determine whether written corporate poli-
and suspiciousness; unsolicited confes-
cies exist that describe prohibited activi-
sions; and others.
ties.
6 Tips and complaints which include tips
• Assess whether action is taken when viola-
from employees that something is wrong.
tions are discovered.
For Albrecht, only the symptoms of fraud, the • Verify whether appropriate authorization
red flags or indicators exist to alert manage- policies for transactions are established
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
• believe the bosses already know and con- deception a criminal offense (Knox, 1994).
done the illegal activity,
• do not know exposures in specific terms, Fraud investigation
• do not know symptoms of fraud occurrence, Successful investigators and auditors follow
• fail to follow through on symptoms of fraud, up on curious occurrences based upon expe-
• are concerned about career implications of rience, judgment, and intuition (Palmer,
1993).
fraud detection.
According to the IIA Standards (SIAS No. 3),
Matsumura and Tucker (1992) conducted a
the role of internal auditing in the investiga-
study of the interaction between a manager
tion of fraud includes:
and an auditor which resulted in an increase
• Assessing the probable level and extent of
in fraud detection. In the game, the manager
the complicity in the fraud within the orga-
chose a probability of committing fraud
nization.
whereas the auditor decided to perform tests
• Assessing the qualifications and the skills
of transactions and detailed tests of balances.
of the internal auditors and the specialists
Four independent variables – the auditor’s
available to participate in the investigation
penalty, auditing standards requirements, the
to ensure that it is conducted by individuals
quality of the internal control structure, and
having the appropriate type and level of
the audit fees – were examined to assess their
technical expertise.
effects on tests of transactions and detailed
• Being cognizant of the rights of alleged
tests of balances, fraud detection, and inci-
perpetrators and personnel within the
dence of fraud. Increasingly the auditor’s
scope of the investigation and the reputa-
penalty was found to decrease fraud and
tion of the organization itself.
increase fraud detection.
• Designing procedures to follow in attempt-
Thompson (1992) suggests a five-step
ing to identify the perpetrators, extent of
approach for fraud detection:
fraud, techniques used, and cause of fraud.
1 Know fraud exposure in specific terms.
• Determining the knowledge, skills, and
2 Know exposure specific symptoms of
disciplines needed to effectively carry out
fraud.
the investigation.
3 Be alert for fraud symptoms.
• Coordinating activities with management
4 Incorporate into routine audit program
personnel, legal counsel, and other special-
steps that are likely to reveal fraud symp-
ists as appropriate throughout the course of
toms.
the investigation.
5 Follow through on all observed symptoms.
When a fraud investigation reveals irregular-
Ziegenfuss’ survey (1996) of municipal and
ities which may have an adverse impact on
local governments shows that the most effec-
the financial position and results of opera-
tive tools for fraud detection are:
tions, the director of internal auditing should
• internal audit review;
inform the appropriate management and the
• specific investigation by management;
audit committee.
• employee notification; and
When auditors suspect wrongdoing, a sepa-
• accidental discovery.
rate audit report may be required because the
According to the deputy director of UKs Seri- information may not be appropriate for dis-
ous Fraud Office, the reasons why auditors closure to all report recipients. SIAS No. 2
fail to detect fraud are: suggests that the proper authorities within
[ 42 ]
Rocco R. Vanasco the organization should be informed. When misappropriating assets and confront them
Fraud auditing senior management is involved, the audit with their suspicions. A suspect should not
Managerial Auditing Journal committee or similar high-level entity should be confronted until supporting evidence has
13/1 [1998] 4–71 be notified. been gathered. Confrontation should be done
Review of the draft of a proposed report on a by persons who specialize in investigating
fraud investigation by the legal counsel criminal activity, not by internal auditors.
reduces the possibility of inclusion (and dis- The SPPIA require that when an internal
semination) of a statement for which the auditor identifies multiple factors that have
accused employee could sue the organization. been linked with possible fraudulent condi-
If internal auditing wants to invoke client tions and suspects that fraud has taken place,
privilege, consideration should be given to the auditor should notify the appropriate
addressing the report to legal counsel. authorities within the company and recom-
For Thompson (1991), a thorough fraud mend an investigation. The report should
investigation should answer the following include the auditor’s conclusion as to
questions: whether sufficient information exists to con-
• Was it fraud or error? duct an investigation and summarize the
• Who did it? findings that serve as the basis for such deci-
• What was the extent of the loss? sion.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
[ 43 ]
Rocco R. Vanasco total value of property stolen in 1957 by structure cannot provide more than reason-
Fraud auditing robbery, burglary, larceny, and auto theft able assurance that fraud will be prevented.
was US$272 million. Consider also that the SIAS No. 3 emphasizes that the principal
Managerial Auditing Journal
13/1 [1998] 4–71 usual embezzlement amounts range from a mechanism for preventing fraud is control
few to many thousands of dollars and in and the primary responsibility for establish-
some instances to millions while the aver-
ing and maintaining control rests with man-
age loss from robbery and burglary in 1957
agement. It recommends a strong written
was only about US$200.
statement of management’s commitment to
Considering the large amount of defalcations corporate ethics. It lists the following as
and irregularities, one may wonder whether examples of preventive control:
an increase of audit work would have the • Competitive bidding serves as a control
effect of reducing losses of this kind in an over fraud by restricting the ability of a
amount equal to the cost of increasing audit- purchasing agent to reward a favored
ing (Mautz and Sharaf, 1961). vendor.
The AICPA, in its SAS No. 30, believes that • Subjecting credit card charges to the same
the fidelity bonds “provide more protection expense controls as those used on regular
economically and efficiently” than the company expense forms.
expenses for additional auditing work. The
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
another company’s purchasing agent to request. After the supervisor completed the
inflate sales. Trend and ratio analysis may reconciliations, the auditor reviewed them
detect potential fraud such as: and discovered that US$130,000 was missing.
• An unexplained increase in the default rate Further investigation determined that the
caused by bogus loans. supervisor had misappropriated the missing
• An extraordinary increase in accounting funds. The auditor recommended segregation
balances. of the manual checks issuance duties,
• Sudden and unjustified increase in the cost enhanced procedures for documenting cus-
of the service. tomers’ emergency requests for funds, and
• Comparing the beginning balance one tighter controls over storing and accounting
month to the ending balance of the prior for check stock.
month.
Inquiry
Discovery sampling It helps to know that fraud is likely. But
The only alternative to discovery sampling some symptoms demand follow-up (Morley,
is the examination of each item until an 1994).
example has been found or the entire popu-
lation has been examined (Sawyer, 1988). An audit technique that can help find the
people involved in the fraud is inquiry. By
Discovery sampling is used when the auditor asking questions whose answers the auditor
is examining populations where the existence already knows, the auditor can ascertain the
of fraud or gross error is suspected. Such interviewee’s truthfulness and desire to coop-
populations might include: erate (Wallace, 1995).
• fictitious employees on the payroll; To elicit information about fraud matters,
• duplicate payments; Wells (1992) suggests a “Fraud assessment
• unauthorized shipments of goods; and
questioning” (FAQ), a non-accusatory, struc-
• a nonexistent collateral for loan (Sawyer,
tured interview method. Used properly, FAQ
1988).
can provide auditors and fraud examiners the
Discovery sampling is used primarily for clue of possible suspects.
search of critical deviations such as evidence Inquiry can, at times, be the best tool to
of fraud. If such deviation exists, the auditors assess possible violations of company’s poli-
may abandon their sampling procedures and cies or verify allegations of fraud. The IIA
undertake a thorough examination of the Fraud Round Table of the Internal Auditor
population. Discovery sampling assumes that reported a unique case of conflict of interest
auditors have a reason to believe that some- which was confirmed by inquiry:
one has been preparing fraudulent records. A written complaint was received by the
senior manager and the internal auditor
Bank reconciliations stating that field supervisors were favoring
The promptness with which reconciliations relatives with service business in violation
are prepared by an independent party will of the company’s code of business conduct.
determine how effective they are as a con- The auditor decided that the direct interro-
trol (Wallace, 1995). gation of the supervisor was the best course
of action. When asked if the people who were
Bank reconciliations play a powerful role in providing services for the project were
detecting potential fraud by employees. The relatives, the supervisor answered: “They
IIA Houston Chapter (1993) reported that an are not relatives, they are in-laws.” The
[ 46 ]
Rocco R. Vanasco supervisor was replaced and the boss was • profiting on insider knowledge;
Fraud auditing reprimanded. • disclosing securities transactions to others;
Managerial Auditing Journal • accepting gifts from vendors;
13/1 [1998] 4–71 • destruction or disappearance of records or
Part IX: The white-collar crime assets; or
White-collar crime • any similar or related irregularity.
All types of frauds are characterized by The Futurist, the journal of the World Future
certain contributing factors related to the Society, predicted that white-collar crime will
values and motivations of the fraud perpe-
spiral upward in the knowledge-based econ-
trators and the management of the
defrauded organization (Menkus, 1990). omy. High-tech securities have independent
economies based on creating, collecting, and
In 1939, Edwin H. Sutherland, in his presenta- distributing data. Thieves thus have new
tion at the American Sociological Society tools for committing their crimes (Internal
Symposium, coined the term “white- collar Auditor, 1995b).
criminality” to indicate administrative Nichols (1996) surveyed the following
wrongdoing. sources of information on white-collar crime
Quinney (1964) gave the following reason in the Internet:
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
for the lack of interest in the white-collar and • The World Wide Web Sources provides
corporate crime in the 1960s: research, new articles, product and ser-
Although there has been considerable inter- vices, and agencies related to white-collar
est and activity in the study of white-collar
crime.
crime, the development of the area has been
hampered by a number of problems that
• The KPMG Investigation and Security Page
have not been made explicit. The concept contains various fraud surveys.
has remained unclear because criminolo- • The White Collar Crime Loss Prevention
gists have subsumed different behavior through Internal Control which is a study
under the term. In addition, writers have conducted by Ernst & Young for Chubbs
varied on the amount of emphasis given to Insurance Company. It provides guidance
the social status of the offender, have on assessing exposure to fraud losses,
employed different meanings of occupa- reviewing internal control procedures, and
tional activity, and have lacked consistency
specifying control objectives.
in designating the illegal nature of the
offense.
• The Statistical Sidebar provides statistics
on white collar crime criminals and their
The Federal Bureau of Investigation (FBI) patterns. It also provides the sources where
defines white-collar crime as: statistics were obtained.
Those acts characterized by deceit, conceal- • The Investigative Database, Boston, MA,
ment, violation of trust, and not dependent contains a 20-year investigation experience
upon the application of threat of physical
by an investigator.
force or violence. Such crimes are commit-
ted to obtain money, property, or services; or • The Statement to the Senate Appropriations
to secure personal or business advantage Committee issued by the Director of the
(Kelley, 1976). Federal Bureau of Investigation (FBI) in
March 1996, focuses on the FBI’s initiative
A similar definition is given by the US in conjunction with the international com-
Department of Justice (1977): munity to combat white-collar crime
• Intent to commit a wrongful act or to (Nichols, 1996).
achieve a purpose inconsistent with law or • The Business Report – “Corporate crime –
public policy. big and small” broadcast by the Australian
• Disguise of purpose through falsities and Broadcasting Corporation focuses on the
misrepresentations employed to accom- level of illegal corporate activity in
plish the scheme.
Australia.
• Reliance by the offender on the ignorance
• The White Collar and Corporate Crime Over-
or carelessness of the victim.
looked posts a brief synopsis of research on
• Voluntary action by the victim to assist the
how the media overlooks white-collar
offender as a result of the deceit practiced.
crimes.
• Concealment of the crime.
• Crimes in St Louis provides white-collar
The Fraud Examiners Manual (1997) lists the crime information on embezzlement and
following actions constituting fraud: environmental crimes committed in the
• any dishonest or fraudulent act; city.
• forgery or alteration of documents; • Fraud Detection Kit offers instructional
• misapplication of funds or assets; materials to help businessmen detect and
• impropriety with respect to reporting deduce occurrences of fraud within their
financial transactions; organizations.
[ 47 ]
Rocco R. Vanasco • White Collar Crime discusses the serious- in any Executive Branch department or
Fraud auditing ness of white-collar crimes and how the law agency for White Collar Crime prosecution
Managerial Auditing Journal and judges impact the defense strategies for purposes (Charfauros, 1995).
13/1 [1998] 4–71 the companies. Freeman and Forcese (1994) argue that the
• IRS Investigator’s Handbook describes how war on crime in Canada largely ignores not
IRS investigators trace financial transac- only such white-collar employee crime, bus
tions as they relate to white-collar crime. also violations committed by corporations.
• The National White Collar Crime Center These include tax evasion, bribery, fraudu-
provides investigative report services to lent advertising, illegal mergers, and monop-
assist in the fight against economic crimes. oly pricing. Canadians pay increased taxes
• The National Center for Justice provides and prices for consumer goods amounting to
links to other agencies and other areas as much as US$20 billion a year as a result of
within the domain of criminology. white-collar crime. US statistics show that
• The National Fraud Information Center is a white-collar and corporate crime accounts for
coalition among the National Association US$10 for every one dollar lost to robbery,
of Attorney Generals, the Federal Trade burglary, larceny and auto theft combined. If
Commission, the National Consumers this 10 to 1 ratio applies to Canada, Freeman
League, and MasterCard. It provides links
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
allowing audits of all retirement and pension and Techniques, reported that of the 600 com-
funds and requiring auditors to report sus- panies surveyed, 192 disclosed related-party
pected bribery, theft, or kickbacks within five transactions in 1990.
days (O’Connell and Schultz, 1996). In Autumn 1995, the British Accounting
Standards Board (ASB) issued Financial
Related-party transactions Reporting Standard No. 8, Related Party
In carrying out all phases of the audit, the
Disclosures. The disclosure standard is help-
auditor should be alert to any clues regard-
ing the existence of related parties and for
ful in reassuring readers that they have rele-
transactions involving them (Kapnick, vant information about matters that may well
1980). have affected a company’s reported perfor-
mance, but many people will see the standard
Related-party transactions played a large role as a response to fraud that have or may have
in several well-publicized fraud cases such as involved related parties (Archer, 1996).
Allied Crude Vegetable Oil, BarChris, Cenco,
CIT Financial, Continental Vending, Equity Unrecorded liabilities
Fund, Four Seasons, Home-Stake, Homex, Suspected wrongdoing must be fully investi-
McKesson & Robbins, Penn Central, Republic gated, no matter who the suspect might be
National Life Insurance, Sterling, Talley (Thompson, 1993b).
Industries, US Financial, Vesco, Westec, West-
The search for unrecorded liabilities includes
gate and many others. Related-party transac-
procedures performed through the last day of
tions are frequently used as conduits for
field work, such as examining subsequent
transferring assets out as the Continental
cash disbursements. These procedures are
Vending Machine fraud case. To muddy the
designed to detect liabilities that existed at
audit trail, loan proceeds are transferred
year-end but were omitted from liabilities
back and forward between the companies.
recorded in the client’s financial statements.
In July 1975, the AICPA issued SAS No. 6,
Related Party Transactions and provided the Computer fraud
following definition: The computer has greatly enhanced the
Related parties exist when another entity ability to conceal fraud (Levi, 1997).
has the ability to significantly influence the
management or operating policies of the In 1984, the EDP Fraud Review Task Force of
transacting parties or when another entity the AICPA defined EDP-related fraud as “any
has an ownership interest in one of the intentional act, or series of acts, that is
transacting parties and the ability to signifi- designed to deceive or mislead others and
cantly influence the other, to the extent that that has potential impact on an organiza-
one or more of the transacting parties might
tion’s financial statements.” Collier et al.
be prevented from fully pursuing its own
(1991) also defined computer fraud as “any
separate interests.
fraudulent behavior connected with comput-
In 1982, the FASB issued Statement of Finan- erization by which someone intends to gain a
cial Accounting Standard No. 57, Related dishonest advantage.”
Party Disclosures which states: “Auditors’ The first federal prosecution for computer
failure of auditing related-party transactions fraud occurred in 1966 when a programmer in
has been the subject of several fraud scan- a Minneapolis bank successfully instructed
dals.” In August 1983, the AICPA issued SAS the computer to ignore all overdrafts from his
No. 45, Related-party Transactions, which account. The discovery occurred when the
[ 54 ]
Rocco R. Vanasco bank returned to manual processing after a • application programs;
Fraud auditing computer failure (Alexander, 1974). • data files;
Managerial Auditing Journal Brandt (1977) provided an inventory of the • computer operations;
13/1 [1998] 4–71 biggest computer fraud perpetrated against • communications; and
US and foreign corporations. A lesson is to be • computer hardware, systems or firmware.
learned from the following examples:
Leinicke et al. (1990) suggest the implementa-
• Ordinary managers and clerks have perpe-
tion of a cost-effective fraud auditing pro-
trated more of the discovered computer
gram based on audit hooks or red flags to
fraud than computer experts.
detect fraud. The hooks are embedded during
• Analysis of 150 cases indicated that 40 per-
the design phase of a data processing system.
cent of corporate fraud involved fraudulent
For an insurance company, the audit hooks
payments to creditors (disbursements),
are designed to detect unauthorized and
employees via payroll, other individuals
(typically pension or insurance claims). potentially fraudulent charges to policyhold-
• Manipulation of incoming funds is most ers.
often tied to some means of permanently Menkus (1990) observed that understanding
eliminated receivables from accounts how computer fraud can occur will not elimi-
through unauthorized adjustment. nate the menace; but internal auditors have
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
• Manipulation of transactions that are most no alternative but to ferret out weaknesses
common include: adding unauthorized and develop counterstrategies. He listed eight
transactions (e.g. phony purchase orders); distinctive factors that contribute to the per-
altering transactions (e.g. posting deposits sistence of the computer fraud:
to another accounting); and not processing 1 Inadequate design of the information
transactions (e.g. interest income). system.
• Industry groups, which are expected to 2 Aggregation of the information system’s
have large inventory shrink, may indirectly transaction processing steps so that a
encourage fraud in the inventory areas. review of what is taking place becomes
• Means of detection of fraud are often suspi- impossible.
cions by fellow employees or excessive 3 Insufficient discrimination as to the legiti-
greed that prompts an investigation. macy of the transaction processed by the
information system.
In 1978, a survey of EDP-related fraud was 4 Toleration by the information system of
conducted in the banking and insurance errors – either in data content or process-
industries in cooperation with the American ing results.
Insurance Association, the American Council 5 Detachment of the information system’s
of Life Insurance, the Life Office Manage- ongoing operations from the physical or
ment, and the Bank Administration Institute functional reality to what it is supposed to
(AICPA, 1984). reflect.
Of the 854 insurance companies surveyed, 6 Unrestrained, unmediated remote access
the respondents identified 40 cases they to an information system that is subject to
believed to be EDP-related fraud. The most possible compromise or manipulation.
frequent scheme in the insurance industry 7 Restricted ability to collect sufficient
was generating claim payments to the perpe- knowledge about the fraud itself – espe-
trators or to accomplices. Another scheme cially, its scope and extent of the loss that
was generating refunds reductions of policy has occurred.
premiums by authorizing refund checks after 8 Limits in the investigation tools for ana-
changing policyholder members and lyzing the knowledge that auditors may
addresses, or by cancelling policies to gener- gain about fraud.
ate refund checks automatically. The perpe-
trators of fraud in order of frequency were Under the auspices of the IIA-UK and the
clerks, loan officers, data processors, supervi- Chartered Institute of Management Accoun-
sors, insurance agents, and systems program- tants, Collier et al. (1991) surveyed 300 mem-
mers. bers of both institutes of which 184
In May 1983, the OECD defined computer responded. The majority of the respondents
crime as “any illegal, unethical, or unautho- indicated that the organizations placed spe-
rized behavior involving data-processing, cific responsibility on the internal audit
and/or transmission of data.” department for prevention and detection of
The findings of the EDP Fraud Review Task computer fraud. The study also indicated that
Force of the AICPA (1984) indicate that EDP 96 percent of internal auditors consider the
fraud may be directly involved by improper possibility of fraud when examining new and
manipulation of: existing computerized systems. About 86
• input or transaction data; percent considered the possibility of fraud
• output or results; when specific reviews were in progress. The
[ 55 ]
Rocco R. Vanasco greatest level of threat was the false computer unauthorized use of computer systems
Fraud auditing input followed by unauthorized access. within the last 12 months;
Managerial Auditing Journal Thompson (1991) believes that the move- • more than 50 percent cited US corporate
13/1 [1998] 4–71 ment toward an increasingly computerized competitors as likely sources of attacks;
global economy likely will heighten exposure • more than 50 percent do not have a written
to fraud. Smith and Crumbley (1991), in Trap policy on how to deal with network intru-
Doors and Trojan Horses, introduced new sions;
auditing techniques to prevent and detect • more than 60 percent do not have a policy
fraud. for preserving evidence from criminal or
The following surveys show that computer civil proceedings;
frauds are mostly attributed to the inade- • more than 70 percent do not have a “warn-
quacy or lack of implementation of security ing” banner stating that computing activi-
systems. ties may be monitored;
The IIA Wichita Chapter (February 1991) • less than 17 percent said that they would
reported that, during an audit of microcom- advise law enforcement if they thought they
puter security, the audit found that the com- had been victimized;
pany’s microcomputer policy manual was • about 70 percent cited fear of negative pub-
rarely followed and was generally looked
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
relevant for both the public and the auditing milestones for the internal auditing profes-
profession, the auditing profession must, sion. Corporations are required to establish
however, consider the cost/benefit principle an internal control system which need to be
as the overriding factor in audit engagements. monitored by the internal auditing depart-
There are, of course, constraints as to how ment. Heavy fines are imposed on manage-
much evidence auditors can gather. Still ment for circumventing the internal control
sophisticated management frauds will go system.
undetected. The historical perspective of the The IIA, like all other auditing and account-
events presented shows the dilemma the ing professions, has had its ups and downs.
AICPA is facing in meeting the public interest This led von Schweitzer (1990) to comment, in
in preventing the issuance of fraudulent his “Professional myopia” that the internal
financial statements. The emphasis now is to auditing profession has moved from “the
re-focus the auditor’s attention to search for bright outlook of 1984” to the “uncertainties
fraud when planning an audit. of the 1990s.” This may be partially true since
The 1929 Wall Street market crash is the several auditing departments have under-
classic example of fraud that shocked the gone downsizing due to the new wave of cost
nation. It led the US Congress to take extreme reduction and effectiveness. But most corpo-
measures to protect creditors and investors rations are not really convinced that downsiz-
from the proliferation of fraudulent financial ing is the key to boost the company’s bottom
statements and establish the SEC early in the line. Considering the new wave and sophisti-
1930s. The SEC has pursued unrelentingly its cation of corporate fraud scandals, internal
task by investigating and prosecuting corpo- auditors will play a pivotal role in this area in
rations which have violated the securities the twenty-first century.
laws. The cases presented show that the SEC The cases examined suggest important
has been quite successful in curving down lessons to learn about fraud: new programs,
the issuance of fraudulent financial state- products, investments, and allowances
ments in the USA. The SEC has become a require particular scrutiny on the part of the
model governmental organization worldwide auditors; failing to discover and prevent mar-
for preventing fraud and prosecuting compa- keting and sales fraud on the part of its staff
nies for fraudulent acts. As a result, securi- may be one of the most dangerous mistakes
ties regulators and exchange officials in an organization can make; and executives
many countries are seeking help from their will be under increased pressure to prove that
US counterparts. The International Organi- they are preventing fraud through their stew-
zation of Securities Commissioners is work- ardship of a company (Internal Auditor, 1995).
ing to adopt the US accounting standards and Lacativo (1995) suggests a risk-based
rules in disclosure and insider trading approach to auditing fraud to respond to the
(Schroeder, 1993). companies’ expectation that auditors help
The Institute of Internal Auditors (IIA) has them meet the strict federal regulations
put fraud deterrence as a top priority task against fraud. A review of the current litera-
from its inception. In 1985, it became clear for ture also suggests that companies are relying
the IIA to make a leap forward on this deli- heavily on auditors to minimize losses from
cate issue and release SIAS 3 – Deterrence, fraud. Zeune (1994), in his article “How to fool
Detection, Investigation, and Reporting of auditors,” observed that accounting systems
Fraud to guide internal auditors in the deter- do not reflect recent changes in the business
rence, detection, investigation and reporting environment, the result being that it is easy
[ 61 ]
Rocco R. Vanasco to perpetrate fraud without being detected by Accountancy (1995), “Statement of auditing stan-
Fraud auditing auditors. This is because traditional auditing dard 110, fraud and error”, Vol. 115, March,
Managerial Auditing Journal is conducted in a vacuum, with no link p. 125.
13/1 [1998] 4–71 between a business’s key success factors and Accountancy (1995), “Statement of auditing stan-
the way in which those factors drive the dard SAS 120, Consideration of Law and Regu-
financial statements. lation”, Vol. 115, March, p. 125.
The international arena seems trouble- Accounting Today (1990), “Big Six firm barred”,
some. The statistics shows that most foreign July 23.
countries do not have governmental bodies ACFE (1995), Fraud Examiners Manual.
like the US Securities Commission, cannot ACFE (1996), “AICPA writes statement on fraud in
afford the establishment of a sophisticated financial audit”, The White Paper, May/June,
profession like the American Institute of p. 46.
Certified Public Accountants (AICPA), and ACFE (1996), “Top fraud fugitive arrested in
are not joining the Institute of Internal Audi- Bahamas”, The White Paper, May/June, p. 47.
tors (IIA) in the same number as the Anglo- AICPA, SAS 1 (1972), Codification of Auditing
Saxon countries. The ravages of fraud in Standards and Procedures, AICPA, New York,
Africa, Europe, Asia, and Eastern European NY.
countries are devastating and getting worse. AICPA, SAS 6 (1975), “Related party transactions”,
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
In a global economy and multinational trade, July, AICPA, New York, NY.
the trend of international fraud affects all AICPA (1978), “Commission on auditors’ responsi-
countries. American investors and financial bilities”, Report, Conclusions, and Recommen-
institutions have vested interest in many dations, AICPA, New York, NY, p. 32.
foreign corporations; international fraud AICPA, SAS 45 (1983), “Omnibus statement on
puts all at risk. auditing standards”, August, AICPA, New
Health care fraud, insurance fraud, defense York, NY.
procurement fraud, and other types of fraud AICPA (1984), Report on the Study of EDP-related
against the federal government are taking an Fraud in the Banking and Insurance Indus-
The following individuals enormous toll on the taxpayer’s money. To tries, EDP Fraud and Review Task Force, New
collaborated in the research reduce fraud in the industry sector, the IIA York, NY.
project: Anthony C. Carrollo, could establish task forces to develop “indus- AICPA, SAS 53 (1988), The Auditor’s Responsibility
US Environmental Protec- try guides” dealing with fraud prevention, to Detect and Report Errors and Irregularities,
tion Agency; Phillip Cho- detection, deterrence, and reporting. There AICPA, New York, NY.
miak, National-Louis Univer- AICPA, SAS 55 (1988), “Consideration of the inter-
seems to be a consensus that both internal
sity; Donald J. Eberle, Presi-
auditors and external auditors need to nal control structure in financial statements”,
dent of the IIA Illiana Chap-
sharpen their skills to meet the challenges of April, AICPA, New York, NY.
ter; Rhoda M. Espiritu,
Coopers and Lybrand; Jim fraud detection and prevention. AICPA, SAS 60 (1988), The Communication of
Feltes, Advocate Healthcare; The cases examined show that cash, inven- Control – Structure Related Matters Noted in
Jolene Ferguson, National- tory, and related party transactions are prone an Audit, April, AICPA, New York, NY.
Louis University; Robert C. to fraud. Auditors assign a high risk index to AICPA, SAS 61 (1988), “Communication with
Flannery, US Department of the potential misappropriation of inventory, audit committee”, April, AICPA, New York,
Agriculture; L. Bruce John- cash defalcation, and conflict of interest. NY.
son, Bethlehem Steel Com- The advent of the computerized systems AICPA SAS 54 (1988), Illegal Acts by Clients,
pany; Susan Lione, The AICPA, New York, NY.
has increased the improper manipulation of
Institute of Internal Audi-
input or transaction data, application pro- AICPA (1991), Accounting Trends and Techniques,
tors; Daniel T. Poludniak,
grams, data files, and computer operations. AICPA, New York, NY.
American Savings Bank;
Brian Reynolds, National- Embedded fraud is often hard to detect. To AICPA (1993a), Meeting the Financial Reporting
Louis University; Clifford R. survive in the twenty-first century, the Needs of the Future: A Commitment from the
Skousen, Utah State Univer- modern auditor needs a very extensive Public Accounting Profession, AICPA, New
sity; Loren W. Smith, knowledge and practice in EDP auditing. York, NY.
AMOCO Corporation; The IIA must launch a “global plan” to AICPA (1993b), In the Public Interest: Issues Con-
Rudolph L. Tracy, USS-Gary train and harness internal auditors with fronting the Accounting Profession, AICPA,
Works; Rao Vallabhaneni, more sophisticated techniques in combatting New York, NY.
US Railroad Retirement AICPA SAS 82 (1996), Consideration of Fraud in a
fraud globally and restructure its auditing
Board; Robert J. Vanek,
framework to meet the needs of all internal Financial Statement Audit, AICPA, New York,
Centier Bank; Kenneth
Webster, Bethlehem Steel auditors worldwide. NY.
Company Albrecht, S.W., Howe, K.R. and Romney (1984),
References and further reading Deterring Fraud: The Internal Auditor’s Per-
Abbott, A. (1993), “Italian health sector in disar- spective, IIA Research Foundation, Altamonte
ray following more scandals”, Nature, No. 364, Springs, FL.
August 19, p. 663. Albrecht, S.W., McDermott, E.A. and Williams,
Abelson, A. (1994), “Russian roulette”, Barron’s, T.L. (1994), “Reducing the cost of fraud”, Inter-
Vol. 74, August 8, p. 5. nal Auditor, Vol. 51, February, p. 28.
[ 62 ]
Rocco R. Vanasco Albrecht, S.W., Stice, J.D. and Stocks, K.D. (1993), Bergstrom, R.J. and Morrison, J.L. (1993), “RICO:
Fraud auditing “What do internal auditors need to know?”, has the ultimate weapon been crushed?”,
Managerial Auditing Journal Internal Auditor, Vol. 50, October, pp. 56-9. Journal of Accountancy, June, p. 17.
13/1 [1998] 4–71 Albrecht, W.S. (1996a), “Employee fraud”, Internal Berton, L. (1986), “Grant Thorton finds itself in
Auditor, October, p. 26. turmoil”, Wall Street Journal, April 14, p. 6.
Albrecht, W.S. (1996b), “The expectation gap”, The Berton, L. (1988), “Accountants try to keep RICO
White Paper, Vol. 10, September/October, at bay”, Wall Street Journal, April 29, p. 19.
p. 19. Berton, L. (1992), “Legal beat: Ernst accord may
Alexander, C.P. (1985), “Crime in the suites”, give FDIC leverage”, Wall Street Journal,
Time, June 10, p. 56. December 3, p. B11.
Alexander, T. (1974), “Waiting for the great com- Berton, L. (1992a), “Holding accountants account-
puter rip-off ”, Fortune, July, p. 146. able”, Wall Street Journal, September 22,
Allen, B. (1977), “The biggest computer frauds: p. A18.
lessons for the CPAs”, Journal of Berton, L. (1996), “Judge dismisses racketeering
Accountancy, May, pp. 52-62. charges against accountants in DeLorean
Alpert, B.S. (1992), “Federal sentencing guide- case”, Wall Street Journal, April, p. B8.
lines”, Internal Auditor, October, p. 46. Berton, L. and Adler, S. (1992), “CPAs nightmare:
Andersen, A. (1963), The First 50 Years, Arthur how audit of bank cost Price Waterhouse $338
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
[ 63 ]
Rocco R. Vanasco Brief, A.P., Duketich, J.M., Brown, P.R. and Brett, Cases in Auditing, Dame Publications,
Fraud auditing J.E. (1997), “What’s wrong with the treadway Houston, TX.
Managerial Auditing Journal commission report?”, Journal of Business Cottrell, D.M. and Albrecht, W.S. (1994), “Recog-
13/1 [1998] 4–71 Ethics, February, Vol. 183, p. 198. nizing the symptoms of employee fraud”,
Briloff, A.J. (1991), “Castles of sand”, Wall Street Healthcare Financial Management, Vol. 68,
Journal, December 22. May 8, p. 22.
Brink, V.Z. and Witt, H. (1982), Modern Internal Covaleski, J.M. (1994), “Stamping out insurer
Auditing, John Wiley & Sons, New York, NY. fraud”, Best’s Review, Vol. 95, October,
Calderon, T. and Green, B.P. (1994),“Internal fraud pp. 36-64.
leaves its mark: here’s how to spot, trace and Cox, B. (1995), “Montana governor signs tough
prevent it”, National Public Accountant, insurance fraud act”, National Underwriter
Vol. 39, August, p. 17. Property & Casualty-Risk & Benefits Manage-
Carmichael, D.R. and Craig, J.L. Jr (1996), “Pro-
ment, Vol. 17, April 24, p. 49.
posal to say ‘F’ word in auditing standards”,
Crane, M. (1993), “Auditors, their clients, fraud
The CPA Journal, Vol. 6, June, p. 22.
and error”, Accountancy, Vol. 112, December
Chambers, M. (1985), “Two face charges in bank
p. 95.
theft of $323 million”, New York Times, June
Crane, T.S. and Slavitt, E. (1997), “Congress accel-
28, p. B3.
erates fraud and abuse juggernaut”, American
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
[ 64 ]
Rocco R. Vanasco Economist (The) (1993), “Ferruzzi: hotting up Fiorelli, P.E. and Rooney, C.J. (1997), “COSO and
Fraud auditing crisis prompts large stock issue”, Vol. 328, the federal sentencing guidelines”, Internal
Managerial Auditing Journal September 14, p. 75. Auditor, April, p. 57.
13/1 [1998] 4–71 Economist (The) (1994), “Big buckets always leak Fischer v. Kletz (1967) (known as Yale Express), 266
most” Vol. 333, November 19, p. 58. F. Supp. 180 (SDNY).
Economist (The) (1995),“Hu-bris: Singapore’s stock Flesher, D.L. (1996), Internal Auditing – Standards
exchange”, Vol. 334, March 4, p. 72. and Practices, The Institute of Internal Audi-
Economist (The) (1995a), “Discredited”, Vol. 336, tors, Altamonte Springs, FL.
August 12, p. 62. Flesher, D.L. and Buttross, T.E. (1992), “Whistle-
Economist (The) (1995b),“Miami or bust”, Banco blowing hotlines”, Internal Auditor, August,
Latino, July 1. pp. 54-8.
Economist (The) (1995c),“Another Italian debt Fortune (1978), Editorial, July 17, p. 95.
problem”, July 1, p. 68. Frank, I. (1982), “Auditors: not detectives”, Dallas
Economist (The) (1996a),“Simply rotten: Italian Times Herald, August 29, p. 1.
finance”, Vol. 338, January 27, p. 66. Fraud Examiner Manual (1997), excerpts from
Economist (The) (1996b),“Same old story”, Vol. 340, “Preventing internal fraud”, The White Paper,
September 28. Vol. 2, January/February, p. 31.
Edgerton, J. (1992), “Employee theft on the rise”, Freedman, J.M. (1993), “IMA research on target”,
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
Louisville Courier Journal, October 30. Management Accounting, Vol. 74, May, p. 70.
Ehlers, H. (1996), “Building a case”, Internal Freeman, A. and Forcese, C. (1994),“Get tough on
Auditor, October, p. 38. corporate crime”, The Toronto Star, Novem-
Eichenwald, K. (1995), “SEC sues Nevada com- ber 17.
pany”, New York Times, April 28, p. D3. Friedland, J. (1996), “Argentine judge probes IBM
Ekong, E. (1995), “Bank on verge of a nervous
contracts with tax agency”, Wall Street Jour-
breakdown”, African Business, July/August,
nal, June 20, p. A12.
p. 6.
Friedman, A.S. (1994), “Software helps expose
Elliot, R.K. and Willingham, J.J. (1980), Manage-
claims fraud”, National Underwater, Vol. 98,
ment Fraud: Detection and Deterrence, Petro-
February 21, p. 7.
celli Books, New York, NY.
Friedman, S. (1995), “Strong internal controls are
Epstein, M.J. and Geiger, M.A. (1994), “Investor
vital”, Journal of Accountancy, Vol. 180,
views of audit assurance: recent evidence of
October, p. 90.
the expectation gap”, Journal of Accountancy,
Friedman, S. (1995), “Pay attention to warning
Vol. 177, January, pp. 60-2.
signals”, Journal of Accountancy, Vol. 180,
Ernst & Young (1992), Fraud 1992, Ernst & Young,
October, p. 88.
New York, NY.
Gardner, J. (1995), “The FBI is here!” The White
European (The) (1996), “New moves to tackle
Paper, August/September, p. 4.
fraud”, May 30, p. S2.
Gardner, J. (1996), “The Valentine’s Day Mas-
Evans, T.E., Taylor, M.E. and Holzmann, O. (1994),
sacre”, The White Paper, May/June, p. 49.
International Accounting & Reporting, South-
Gartland, P. (1995), “Germany as haven for scam
Western Publishing, Cincinnati, OH.
Fabrizius, M.P. (1990), “Fire in the field”, Internal and vultures”, The European, Vol. 267, June
Auditor, October, p. 77. 23, p. 4.
Fargason, J.S. (1992), Legal Compliance Auditing Gauntt, J.E. and Glezen, G.W. (1997), “Analytical
and the Federal Sentencing Guidelines, The auditing procedures”, Internal Auditor,
Institute of Internal Auditors, Altamonte February, p. 56.
Springs, FL. Gauthier, T.J. (1991), “It’s elementary, my dear
FASB (1975), Analysis of Issues Related to Criteria internal auditor”, Internal Auditor, February,
for Determining Materiality, FASB, Stamford, pp. 60-3.
CT, March 21. Gauthier, Y. (1995), “Forever fraud: interview with
FASB (1982), “Related party disclosures”, State- N. Inkster”, Internal Auditor, Vol. 52, October,
ment of Financial Accounting Standards No. p. 26.
57, FASB, Norwalk, CT. Geis, G. (1994), “Fraud in the former Soviet
FDIC (1986), “Chairman sees expanded role for Union”, The White Paper, October/November,
auditors in bank fraud”, Journal of Accoun- p. 3.
tancy, Vol. 162, July, p. 48. Gill, J.D. (1996), “Reporting fraud under wistle-
FDICIA (1991), Supervisory Guidance on the Imple- blower statutes”, The White Paper, May/June,
mentation Section 112 of the Federal Deposit p. 9.
Insurance Improvement Act, Pub. L. No. 102- Gill, J.D. (1996), “The private securities litigation
105 Stat. 2236, May 14. reform of 1995: securities fraud cases just got
Federal Register (The) (1991), “Federal sentencing tougher”, The White Paper, March/April, p. 9.
guidelines”, Vol. 56 No. 95, May 16, pp. 227-86. Goldstein, L.M. (1992), “Favorite frauds”, Internal
Fialka, J.J. (1993), “BNL-Atlanta chief says audits Auditor, August, pp. 35-40.
failed to uncover fraud”, Wall Street Journal, Graham, A. (1996), “Fraud and soap operas”,
November 10, p. B14. Internal Auditor, October, p. 5.
[ 65 ]
Rocco R. Vanasco Gumbel, P. (1995), “Germany catches the Euro- IIA North Jersey Chapter (1995), “Good for their
Fraud auditing pean disease”, Wall Street Journal, July 13, health”, Internal Auditor, June, p. 65.
Managerial Auditing Journal p. A6. IIA Northwest Metro Chicago Chapter (1993),
13/1 [1998] 4–71 Gup, B.E. (1994), “Protecting financial institutions “Commingling of funds”, Internal Auditor,
against fraud”, The Bankers Magazine, December, p. 75.
Vol. 177, May/June, p. 38042. IIA Round Table (1991), “It’s all relative”, Internal
Guy, D.M. and Mancino, J. (1992),“What an auditor Auditor, Vol. 48, October, p. 73.
does when finding fraud or illegal acts”, Jour- IIA San Francisco Chapter (1993), “Good public
nal of Accountancy, January, p. 103. relations”, Internal Auditor, October, p. 76.
Hannon, K. (1996), “Tip or tout? The perils of IIA Tucson Chapter (1994), “Uncertain pensions”,
buying on the buzz”, US News & World Report, Internal Auditor, June, p. 76.
Vol. 121, December, p. 114. IIA Wichita Chapter (1991), “Audit of microcom-
Hansen, J.V., McDonald, J.B. and Messier, W.F. puters”, Internal Auditor, February, p. 70.
(1996), “A generalized-response model and the IIA Wichita Chapter (1991), “Cash shortage expe-
analysis of management fraud”, Management rience”, Internal Auditor, Vol. 48, October,
Science, Vol. 42, July, p. 1022. p. 73.
Hrisak, D. (1996), “Auditors must sniff out fraud”, Institute of Chartered Accountants in England
The Journal of Chartered Accountants of New and Wales (1992), “Expectation gap can be
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
Zealand, Vol. 75, July, p. 30. bridged”, Accountancy, Vol. 110, November,
Harris, R.J. and Ricks, T.E. (1994), “Lockheed p. 11.
faces possible suspension on Air Force con- Institute of Financial Crime Prevention (1986),
tracts after indictment”, Wall Street Journal, Red Flags: What Every Manager Should Know
June 14, p. A12. about Internal Crime, Institute of Financial
Horsburgh, P. (1995), Info-sec Super Journal, World
Crime Prevention, Austin, TX.
Wide Web.
Institute of Internal Auditors, SIAS 2 – Communi-
Huebner, J. (1996), quoted in Leidig, M. “Slovakia
cating Results.
stings EBRD”, The European, November 14.
Institute of Internal Auditors (1985), SIAS 3 –
IIA Atlantic City Chapter (1991), “Inventory dis-
Deterrence, Detection, Investigation, and
crepancies”, Internal Auditor, Vol. 48, Decem-
Reporting of Fraud, The Institute of Internal
ber, p. 69.
Auditors, Altamonte Springs, FL, May.
IIA Baltimore Chapter (1992), “$3,000,000 embez-
Institute of Internal Auditors (1985), IIA Report on
zlement”, Internal Auditor, June, p. 74.
Fraud, IIA Research Foundation, Altamonte
IIA Baltimore Chapter (1994), “Is it real”, Internal
Springs, FL.
Auditor, June, p. 77.
Institute of Internal Auditors (1986),The Role of
IIA Calgary Chapter (1991), “Just to make sure”,
Internal Auditors in the Deterrence, Detection
Internal Auditor, February, p. 70.
and Reporting of Fraudulent Financial Report-
IIA Calgary Chapter (1991), “Count and count
ing, The Institute of Internal Auditors, Alta-
again”, Internal Auditor, February, p. 64.
monte Springs, FL.
IIA Dallas Chapter (1993), “Flood insurance
Institute of Internal Auditors (1988), “The IIA
claims all wet”, Internal Auditor, October,
p. 74. position on whistle-blowing”, Internal Audi-
IIA Dallas Chapter (1993), “$130,000 missing”, tor, October, p. 16.
Internal Auditor, October, p. 74. Institute of Internal Auditors (1988), Standards for
IIA Florida West Coast Chapter (1990), “Red the Professional Practice of Internal Auditing,
flags”, Internal Auditor, October, p. 79. 2nd ed., The Institute of Internal Auditors,
IIA Florida West Coast Chapter (1990), “Pennies Altamonte Spring, FL.
add up”, Internal Auditor, October, p. 79. Institute of Internal Auditors (1992), A New Look
IIA Forth Worth Chapter (1996), “Loan officer at Ethics and Fraud, The Institute of Internal
stretches limits”, The Internal Auditor, Auditors, Altamonte Springs, FL.
August, p. 67. Institute of Internal Auditors (1992), “Professional
IIA Houston Chapter (1991), “Drug pilferage”, standards bulletins (PSB)”, in Gleim, I., CIA
Internal Auditor, Vol. 48, August, p. 71. Examination Review, Gleim Publications,
IIA Houston Chapter (1993), “Control weaknesses Gainesville, FL.
= $60,000”, Internal Auditor, October, p. 74. Institute of Internal Auditors (1992), SIAS 1 –
IIA Houston Chapter (1993), “Recommendations Control: Concepts and Responsibilities, The
are not suggestions”, Internal Auditor, Institute of Internal Auditors, Maitland, FL.
October, p. 76. Internal Auditor (1991a), “Audit legislation weaves
IIA Houston Chapter (1997), “Cash disbursement its way through US Congress”, December,
controls”, Internal Auditor, March, p. 80. p. 10.
IIA Mount Diablo Chapter (1993), “Deceitful Internal Auditor (1991b), “Fax security a grown
refunds”, Internal Auditor, October, p. 73. concern”, Vol. 48, December, p. 9.
IIA North Jersey Chapter (1995), “Evaporating Internal Auditor (1992a), “Debate over govern-
cash”, Internal Auditor, February, p. 57. mental whistle-blower payment”, April, p. 10.
[ 66 ]
Rocco R. Vanasco Internal Auditor (1992b), “Strengthening whistle- Knight and Ridder (1997), “Coastal Mississippi
Fraud auditing blower protection in the workplace”, June, banks will use fingerprints to fight check
Managerial Auditing Journal p. 10. fraud”, Tribune Business News, January 19.
13/1 [1998] 4–71 Internal Auditor (1993), “Fraud-prone personality Knutson, P.H. (1994), “In the public interest – is it
type” August, p. 9. enough?”, The CPA Journal, Vol. 64, January,
Internal Auditor (1995a), “Employees say it’s hard p. 32.
to be ethical in some organizations”, Febru- Knox, J. (1994), “Why auditors don’t find fraud”,
ary, p. 9. Accountancy, Vol. 113, February, p. 128.
Internal Auditor (1995b), “To know the future” Koening, R. (1986), “Arthur Andersen is sued in
June, p. 10. audits of home state”, Wall Street Journal,
Internal Auditor (1995c), “Sales fraud”, Vol. 52, January 13, p. 4.
April, pp. 63-6. Konrath, L.F. (1996), Auditing Concepts and Appli-
Internal Auditor (1995d), “What did we learn in cations, West Publishing, New York, NY.
1994”, Vol. 52, February, pp. 53-4. Kovacs, A. (1996), “Unstable markets”, Internal
Internal Auditor (1996a), “British Rail fraud Auditor, Vol. 52, February, p. 30.
inquiry launched” p. 10. KPMG Peat Marwick (1993), Fraud Survey Results
Internal Auditor (1996b), “Businesses ignore 1993, KPMG Peat Marwick, New York, NY, p. 2.
computer security”, p. 11. Kramer, W.M. (1996), “What’s tougher than catch-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
Internal Auditor (1996c), “Hackers attack depart- ing the bad guys? Dealing with management”,
ment of defense”, October, p. 10. The White Paper, May/June, p. 6.
Internal Auditor (1996d), “UK implements benefit Kramer, W.M. (1996), “How to develop ‘proactive’
fraud hotlines”, October, p. 11. fraud detection computer programs”, The
Internal Auditor (1997), “Corrupt nations White Paper, September/October, p. 6.
ranked”, April, p. 9. Lacativo, B.F. (1995), “A risk-based approach to
auditing fraud”, Internal Auditing, Vol. 11,
Iraola & Klubes (1997), Fraud on the Government:
Summer, p. 41.
How Citizens Can Fight Health Care and
Laing, J.R. (1996), “Novatek Redux: catastrophes
Procurement Fraud Using the Qui Tam
thick and fast”, Barron’s, Vol. 26, November 4,
Statute, Iraola & Klubes, Washington, DC.
p. 12.
IRC (1997), “Tougher stand on insurance fraud
Lavelle, M. (1997), “Nations try to match US on Biz
endorsed by more Americans, says insurance
bribe law; but lawyers still argue over the
research council survey”, PR Newswire,
meaning of the FCPA”, The National Law
January 15, p. 115.
Journal, Vol. 19, January 20, p. B1.
Jacobson, A. (1990), How to Detect Fraud through
Lee, T. (1992), “The audit liability crisis: they
Auditing, IIA Research Foundation, Alta-
protest too much”, Accountancy, Vol. 110,
monte Springs, FL.
December, p. 102.
Jacka, M.J. (1995), “Auditing’s vision”, Internal
Leiding, M. (1996), “Slovakia stings EBRD”, The
Auditor, Vol. 52, June, pp. 46-9.
European, Vol. 340, November 14, p. 21.
Jayasankaran, S. (1995), “Back to square one: the
Leinicke, L.M., Ostrowsky, J.A. and Rexroad, W.M.
tangled tale of Malaysia’s Ayer Molek”, Far
(1994), “Fraud hotlines”, Internal Auditor,
Economic Review, 158, September 21, p. 82.
February.
Jeffords, R. Jr, Marchant, M.L. and Bridendall, Leinicke, L.M., Rexroad, W.M. and Ward, J.D.
P.H. (1992), “How useful are the treadway risk (1990), “Computer fraud: it works”, Internal
factors?”, Internal Auditor, June, p. 60. Auditor, August, p. 26.
Jennings, W.L. (1997), “Federal sentencing guide- Levi, P.C. (1997), “One step ahead of fraud: new
lines: what auditors need to know”, Transmis- software aids in data extraction”, The White
sion, Vol. XV, Winter, p. 1. Paper, Vol. 2, January/February, p. 6.
Johnston, J.L. (1995), “Following the trail of finan- Levington, C.A. (1991), “40 years of embezzlement
cial statement fraud”, Business Credit, Vol. 97, tracking: internal auditor, April, p. 51.
October, pp. 47-8. Life Insurance Industry (1997), “Plaintiff ’s law
Journal of Accountancy (1993), “Internal control firm announces class action settlement with
audit proposal draws fire and praise” Vol. 176, connecticut General Life Insurance Com-
October, p. 20. pany”, PR Newswire, January 22, p. 122.
Kapnick, H. (1980), “Responsibility and detection Lindquist, R. (1995), “Financial crime investiga-
in management fraud”, Readings and cases in tor”, Management Accounting, Vol. 76, March,
Auditing, Dame Publications, Houston, TX. pp. 63-64.
Kelley, C.M. (1976), “Accountants and auditors vs Loebbecke, J.K. (1987), “Assessing the risk of
white collar crime”, The Internal Auditor, material irregularities”, Auditing: A Journal
June, p. 35. of Practice & Theory, Fall, pp. 1-28.
Kimelman, J. (1994), “The lonely boy scout”, Loebbecke, J.K., Eining, M. and Willingham, J.J.
Financial World, Vol. 163, August 16, p. 50. (1989), “Auditors’ experience with material
Klotz, J.M. (1994), “Bribery of foreign officials – a irregularities: frequency, nature, and
call for change in the law of Canada”, Cana- detectability”, Auditing: A Journal of Practice
dian Bar Review, Vol. 73, December, p. 467. & Theory, Fall, p. 12.
[ 67 ]
Rocco R. Vanasco Lovell, A. (1993), “Corporate fraud and its chal- Nature (1993), “Clean drugs for Italy?”, Vol. 3,
Fraud auditing lenge to the profession”, Accountancy, August 19.
Managerial Auditing Journal Vol. 112, September, pp. 72-3. New York Times (1994a), “SEC accord on
13/1 [1998] 4–71 Lowe, D.J. and Pany, K. (1993), “Expectations of comptronix”, March 30, p. D7.
the audit function”, CPA Journal, Vol. 63, New York Times (1994b), “SEC suit on towers”,
August, p. 58. September 22, p. D3.
Luizzo, A.J. and Van Nostrand G. (1994), “Delving New York Times (1996), “Prosecution at Thyssen
deeper to decipher fraud”, Security Manage- Roils German executives”, August 16.
ment, Vol. 38, September, p. 113. Nichols, A. (1996), “Finding fraud in the Internet”,
MacDonald, E. (1996), “Auditors are ending up Internal Auditor, October, p. 24.
between a rock and a hard place over securi- Nnanna, O. (1995), “Nigeria: fraud on the line”,
ties law”, Wall Street Journal, December 24. African Business, December, p. 31.
McCoy, C.F. (1987), “Financial fraud: theories Norris, F. (1995), “Fraud can occur at a company,
behind nationwide surge in bank swindles”, even with auditors checking”, New York
Wall Street Journal, October 2, p. 15. Times, September 12, p. D6.
McDonald, H. (1995), “Barefoot in Bombay”, Far O’Connell, V. and Schultz, E.E. (1996), “Greater
Eastern Economic Review, Vol. 158, April 20, pension security in Clinton goal”, Wall Street
p. 85. Journal, April 12, p. C25.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
McLeod, D. (1993), “Omaha Indemnity Co’s rein- O’Malley, S.F. (1993a), “Legal liability is having a
surance fraud charges against Royal Ameri- chilling effect on the auditor’s role”, Account-
can Managers”, Business Insurance, Vol. 27, ing Horizons, Vol. 7, June, pp. 82-87.
July 12, p. 16. O’Malley, S.F. (1993b), “Toward a better under-
McLeod, D. (1997), “New campaign against fraud”, standing of the expectation gap”, CPA Review,
AARP Bulletin, April, p. 1 Vol. 63, February, pp. 6-7.
McNamee, D. (1996), “Too good to be true”, Palmer, J. (1996), “First-time loser; executive
Internal Auditor, August, pp. 62-3. convicted of fraud in Reg S Case”, Barron’s,
Marsh, D. et al. (1994), “Something is rotten”, The May 13.
Financial Times, July 9, p. 8. Palmer, R.D. (1993), “You’re not old as you look”,
Marsh, H.L. and Powel, T. (1989), “The audit com- Internal Auditor, August, p. 64.
mittee charter: Rx for fraud prevention”, Palmrose, Z.-V. (1997), “Who got sued?”, Journal of
Journal of Accountancy, Vol. 167, February, Accountancy, March, p. 67.
pp. 55-7. Pasztor, A. (1995), “Lockheed pleads guilty to
Matsumura, E.M. and Tucker, R.R. (1992), “Fraud conspiring to violate anti-bribery regula-
detection: a theoretical foundation”, The tions”, Wall Street Journal, January 30,
Accounting Review, Vol. 67, October, pp. 753-82. p. B5C.
Mautz, R.K. and Sharaf, H.A. (1961), The Philoso- Pope, K. (1995), “European Union’s did to its poor
phy of Auditing, American Accounting Asso- nations is wasting billions”, Wall Street Jour-
ciation. nal, April 3, p. A1.
Mautz, R.K., Tiessen, P. and Calson, R.H. (1984), Porter, D.I. (1971), “The insurance manager’s
Internal Auditing: Directions and Opportuni- responsibility in preventing employee fraud”,
ties, The Institute of Internal Auditors, Alta- The Weekly Underwriter, January 23, p. 23.
monte Springs, FL, p. 89. PR Newswire (1997), “Weiss v. Metropolitan Life
Meall, L. (1995), “How high is the money moun- Insurance fraud case”, January 17, p. 117.
tain?”, Accountancy, Vol. 115, January, pp. 38-9. Professional Standards Bulletins (PSB) 84-3 (1993),
Menkus, B. (1990), “Eight factors contributing to “Independence – responsibility for detecting
computer fraud”, Internal Auditor, October, all irregularities”, CIA Review by I. Gleim,
pp. 71-3. University Station, Gainesville, FL.
Miami Daily Business Review (1996), “New York Professional Standards Bulletins (PSB) 85-5,
Life Insurance Co. settling $187 million fraud “Professional proficiency – suspected wrong-
suit but denies allegations”, April 2. doing”.
Middlemann, C. and Munchau, W. (1995), “Power- Professional Standards Bulletins (PSB) 89-2,
house economy lacks sophisticated savers”, “Internal auditing procedures – analytical
The Financial Times, September 8, p. 7. procedures”.
Miller, S.H. (1993), “AICPA announces major ini- Prosser, W.L. (1971), Handbook of the Law of Torts,
tiative to strengthen financial reporting and West Publishing, St Paul, MN.
further tort reform prospects”, Journal of Protzman, F. (1994), “German bankers defend
Accountancy, Vol. 176, August, pp. 15-16. lending practices”, New York Times, June 23,
Morley, R.A. (1994), “Fraud in the north woods”, p. DL.
Internal Auditor, June, p. 75. Protzman, F. (1994), “Health-fraud accusations in
Mulder, P. (1995), cited in Peter Gartland, P., Germany”, New York Times, May 31, p. 1.
“Germany a haven from scam and vultures”, Quinney, R. (1964), “The study of white-collar
The European, Vol. 267, June 23, p. 21. crime. Toward a reorientation in theory and
National Underwriter (1992), “Mo. Blues’ pro- practice”, in Geir, G. and Meyer, R.F. (Eds),
grams battles fraud”, Vol. 96, November, p. 49. White-Collar Crime, Free Press, New York, NY.
[ 68 ]
Rocco R. Vanasco Rankin, K. (1990), “E&Y Deloitte face $13 billion in Annual Meeting of the American Institute of
Fraud auditing S&L damages”, Accounting Today, August 27, Accountants.
Managerial Auditing Journal p. 1. Shannon, H. (1995), “Criminal statistics”, Ameri-
13/1 [1998] 4–71 Rapalus, P. (1996), “Businesses ignore computer can Banker, Vol. 160, June 1, p. 8.
security”, Internal Auditor, p. 11. Shapiro, S. (1994), “Crime and fraud in a new
Reis, R. (1996), “10 steps toward avoiding another league”, Business Insurance, Vol. 28, Decem-
era of scandals”, Fund Raising Management, ber 26, p. 39.
Vol. 27, April, p. 46. Simon, S. (1997), “Ex-chemical trader sentenced to
Ricchiute, D.N. (1996), Auditing, South-Western 3 years”, American Banker, April 7, p. 3.
Publishing, Cincinnati, OH. Sims, C. (1991), “US joins whistle-blower suing
Robertson, J.C. (1996), Auditing, Irwin, Chicago, Rockwell”, New York Times, April 29, p. 3.
IL. Singleton Green, B. (1994), “What are auditors
Roy, N.P. (1993), “Can honesty be legislated?”, meant to be doing?”, Accountancy, Vol. 113,
Financial Executive, Vol. 9, January-February, February, p. 92.
p. 1. Singleton Green, B. (1995), “If it’s not plausible,
Rossow, M.M. (1996), “When your auditor blows don’t accept it”, Accountancy, Vol. 116,
the whistle: how to deal with a IOA crisis”, August, p. 24.
Journal of Corporate Accounting & Finance, Sittenfeld, I. (1996), “Federal sentencing guide-
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
[ 69 ]
Rocco R. Vanasco Tate, C.F. (1996), “The truth about audits”, Associ- Vinten, G. (1994), Whistleblowing – Subversion or
Fraud auditing ation Management, Vol. 48, September, p. 32. Corporate Citizenship, Paul Chapman Pub-
Managerial Auditing Journal Taylor, J. (1996), “Montedison of Italy is accused lishing, London.
13/1 [1998] 4–71 by SEC of hiding millions of dollars in von Schweitzer, H. (1990), “Professional myopia”,
bribes”, The Wall Street Journal, November Internal Auditor, June, p. 42.
22, p. A4. Wall Street Journal (1974), “Equity funding chief
Thomas, P. (1989), “Auditors say Lincoln S&L ordered false figures, ex-officer testifies”,
sham deals were approved by Arthur Young & November, p. 4.
Co”, Wall Street Journal, November 15, p. A2. Wall Street Journal (1976), “IRS finds bribes
Thomas, P. (1990), “The US acts to learn of Keating abroad may have led to tax fraud in account-
millions for restitution months after S&L ing for funds” March 9, p. 3.
failed”, Wall Street Journal, August 10, p. A12. Wall Street Journal (1984), “InterFirst’s chief
Thomas, P. (1990a), “RTC discloses insolvent resigns, profit fell in 4th period”, January 19,
savings and loans’ losses in period”, Wall p. 4.
Street Journal, August 10, p. A12. Wall Street Journal (1992), “Inventory chicanery
Thomas, W.C. (1979), “Materiality guidance”, The tempts more firms, fools more auditors”,
Journal of Accountancy, February. December.
Thompson, C.M. (1991), “Fraud: the challenge Wall Street Journal (1994a), “Italy’s Montedison
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
facing internal auditors”, The Internal Audi- sues Price Waterhouse, seeking $610 million”,
tor, June, p. 69. April 19.
Thompson, C.M. (1992), “Fighting fraud”, Internal Wall Street Journal (1994b), “Former vice presi-
Auditor, August, pp. 18-23. dent at Towers Financial pleads guilty to
Thompson, C.M. (1992), “Auditee interference and fraud”, September 30, p. B4.
deception”, Internal Auditor, June, p. 73. Wall Street Journal (1994c), “SEC lodges charges
Thompson, C.M. (1992), “Fraud”, Internal Auditor, against ex-official of a Florida insurer”,
August, p. 19. October 14, p. B4.
Thompson, C.M. (1993a), “Financial reporting Wall Street Journal (1996a), “Daiwa bank pleads
fraud”, Internal Auditor, December, p. 66. guilty to concealing $1.1 billion in losses”
Thompson, C.M. (1993b), “Fraud findings”, Inter- February 19.
nal Auditor, February, p. 61. Wall Street Journal (1996b), “Stock market sur-
Thompson, C.M. (1993c), “Fraud in the executive prises leads to new Italian market regula-
suite”, Internal Auditor, Vol. 50, October, p. 68. tions”, October 29.
Thompson, C.M. (1993d), “Bad news bearers”, Wall Street Journal (1996c), “Brazilian bank
Internal Auditor, June, p. 64. accounting fraud lasted 10 years”, Wall Street
Thompson, C.M. (1995), “What did we learn in Journal, March 6.
1994?”, Internal Auditor, February, p. 53. Wallace, W.A. (1995), Auditing, South-Western
Thornhill, W.T. (1985), “A riskier tomorrow”, The College Publishing, Cincinnati, OH.
Internal Auditor, April, pp. 28-31. Walker, R. (1993), “In search of relevance”, CA
Thornhill, W.T. (1995), Forensic Accounting. How to Magazine, Vol. 126, February, p. 26.
Investigate Financial Fraud, Irwin, Burr Warner, A. (1994), “Scam-busters”, The Banker,
Ridge, IL, 1995. Vol. 144, May, pp. 68-70.
Thornhill, W.T. (1996), “Fraud: input tampering”, Welch, S.T., Holmes, S.A. and Strawser, R. (1996),
Internal Auditing, Vol. 12, Summer, p. 48. “The inhibiting effect of internal auditors in
Thueson, B.C. (1997), “The land of opportunity”, fraud”, Internal Auditing, Vol. 12, Fall, p. 23.
The White Paper, Vol. 2, January-February, Wells, J.T. (1992), “Fraud assessment question-
p. 35. ing”, Internal Auditor, August, pp. 24-9.
Treadway Commission (1987), Report of the Wells, J.T. (1992), Fraud Examination: Investiga-
National Commission on Fraudulent Report- tive and Audit Procedures, Greenwood Pub-
ing. lishing Group, Westport, CT.
Tucker, J.J. (1988), An Early Contribution of Ken- Wells, J.T. (1993), “Financial Frankensteins”,
neth W. Stringer. Development and Dissemina- Internal Auditor, Vol. 50, April, pp. 52-7.
tion of the Audit Risk Model, Rutgers Univer- Wells, J.T. (1994), “Message from the chairman”,
sity, New Brunswick, NJ; National Commis- The White Paper, October/November.
sion on Fraudulent Reporting, 1987, Washing- Wells, J.T. (1994), “The billion dollar paper clip”,
ton, DC. Internal Auditor, October, pp. 32-8.
US Department of Justice (1977), The Investigation Wells, J.T. (1995), “It’s more than just accounting”,
of White Collar Crime, Government Printing Internal Auditor, June, p. 13.
Office, April, Washington, DC. Wells, J.T. (1997), “A medium rare scheme”, The
Van Nostrand, G. and Luizzo, A.J. (1996), “The White Paper, January/February, p. 19.
hidden cost of downsizing”, The White Paper, Wells, J.T. (1997), “Message from the chairman”,
Vol. 10, September/October, p. 23. The White Paper, January/February, p. 4.
Vanasco, R.R. (1992), “FCPA: the American antib- Wellsj, K. (1992), “Auditor in UK defends role in
ribery legislation”, Managerial Auditing BCCI report”, The Wall Street Journal, August
Journal, Vol. 7, pp. 24-30. 14, p. A4.
[ 70 ]
Rocco R. Vanasco Welton, R.E. (1988), “Pandora’s box: a comparison Wild, D. (1994), “Keep check on probity during
Fraud auditing of Federal and State RICO statutes as they reorganization”, Public Finance, December 9,
Managerial Auditing Journal affect accountants”, in A Profession in Transi- p. 3.
13/1 [1998] 4–71 tion: The Ethical and Legal Responsibilities of Williams, J. (1993), “Concealing out corruption”,
Accountants, (DePaul University 1988-1989 Internal Auditor, Vol. 50, June, pp. 33-7.
Research Symposium), pp. 65-79. Wojcik, J. (1993), “Managed care techniques also
White, R.M. (1977), The Entrepreneur’s Manual. work on company costs”, Business Insurance,
Business Start-ups, Spin-offs, and Innovation Vol. 27, May 3, p. 3.
Management, Chilton Book Company, Radnor, Yang, C. (1997), “Whistle-blowers on trial”, Busi-
PA. ness Week, March 24, p. 172.
White Paper (The) (1994a), “Fraud update”, Zelenko, L. and Urban, R. (1994), “Small investors
August/September. face pyramid collapse”, The European,
White Paper (The) (1994b), “Fraud update”, Vol. 241, December 22, p. 16.
October/November, p. 17. Zeune, G.D. (1994), “How to fool auditors”, Busi-
White Paper (The) (1997), “European office opens”, ness Credit, Vol. 96, October, pp. 27-32.
Vol. 2, January/February, p. 27. Ziegenfuss, D.E. (1996), “State and local govern-
Whittington, R.O. and Pany, K. (1995), Principles of ment fraud survey for 1995”, Managerial
Auditing, Irwin, Chicago, IL. Auditing Journal, Vol. 9, November, p. 49.
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
[ 71 ]
This article has been cited by:
1. Dessalegn Getie Mihret. 2014. National culture and fraud risk: exploratory evidence. Journal of Financial Reporting and
Accounting 12:2, 161-176. [Abstract] [Full Text] [PDF]
2. Kamil Omoteso and, Musa ObalolaThe Role of Auditing in the Management of Corporate Fraud 129-151. [Abstract] [Full
Text] [PDF] [PDF]
3. Joyce K. H. Nga, Evelyn W. S. Lum. 2013. An Investigation into Unethical Behavior Intentions Among Undergraduate
Students: A Malaysian Study. Journal of Academic Ethics 11, 45-71. [CrossRef]
4. George Emmanuel Iatridis. 2011. Accounting disclosures, accounting quality and conditional and unconditional conservatism.
International Review of Financial Analysis 20, 88-102. [CrossRef]
5. Katharina Chudzikowski, Gerhard Fink, Wolfgang Mayrhofer, Maaja Vadi, Krista Jaakson. 2011. The dual value of honesty
among Russians in selected former Soviet countries. Cross Cultural Management: An International Journal 18:1, 55-70.
[Abstract] [Full Text] [PDF]
6. Sunita Goel, Jagdish Gangolly, Sue R. Faerman, Ozlem Uzuner. 2010. Can Linguistic Predictors Detect Fraudulent Financial
Filings?. Journal of Emerging Technologies in Accounting 7, 25-46. [CrossRef]
7. Grant Samkin, K.A. Van Peursem, A. Balme. 2010. Threats to the New Zealand Serious Fraud Office: an institutional
perspective. Qualitative Research in Accounting & Management 7:3, 304-328. [Abstract] [Full Text] [PDF]
8. Grant Samkin, K.A. Van Peursem, A. Balme. 2010. Threats to the New Zealand Serious Fraud Office: an institutional
perspective. Qualitative Research in Accounting & Management 7:3, 304-328. [Abstract] [Full Text] [PDF]
Downloaded by MAHIDOL UNIVERSITY At 06:10 03 March 2015 (PT)
9. Philmore Alleyne, Nadini Persaud, Peter Alleyne, Dion Greenidge, Peter Sealy. 2010. Perceived effectiveness of fraud detection
audit procedures in a stock and warehousing cycle. Managerial Auditing Journal 25:6, 553-568. [Abstract] [Full Text] [PDF]
10. Michael Doumpos, Chrysovalantis Gaganis, Fotios Pasiouras. 2005. Explaining qualifications in audit reports using a support
vector machine methodology. Intelligent Systems in Accounting, Finance and Management 13:10.1002/isaf.v13:4, 197-215.
[CrossRef]
11. Gerald Vinten, Philmore Alleyne, Michael Howard. 2005. An exploratory study of auditors’ responsibility for fraud detection
in Barbados. Managerial Auditing Journal 20:3, 284-303. [Abstract] [Full Text] [PDF]
12. A. Seetharaman, M. Senthilvelmurugan, Rajan Periyanayagam. 2004. Anatomy of computer accounting frauds. Managerial
Auditing Journal 19:8, 1055-1072. [Abstract] [Full Text] [PDF]
13. Ch. Spathis, M. Doumpos, C. Zopounidis. 2002. Detecting falsified financial statements: a comparative study using
multicriteria analysis and multivariate statistical techniques. European Accounting Review 11, 509-535. [CrossRef]
14. Charalambos T. Spathis. 2002. Detecting false financial statements using published data: some evidence from Greece.
Managerial Auditing Journal 17:4, 179-191. [Abstract] [Full Text] [PDF]
15. M.H Abdolmohammadi, V.D Owhoso. 2000. Auditors’ ethical sensitivity and the assessment of the likelihood of fraud.
Managerial Finance 26:11, 21-32. [Abstract] [PDF]
16. Sunita GoelFraud Detection and Corporate Filings 315-332. [CrossRef]