Professional Documents
Culture Documents
Impact of Forensic Accounting On Fraud D
Impact of Forensic Accounting On Fraud D
Impact of Forensic Accounting On Fraud D
Abstract
The recent fraud scandals in Zimbabwe have induced a crisis of confidence in financial reporting
and the traditional audit profession, hence the emergence of forensic accounting. Today forensic
accounting is a topical issue, not only in Zimbabwe, but all over the world. Forensic accounting is
the specialty practice area that provides a financial analysis that is sustainable at the court of law
from which the basis for litigation is formed. While fraud requires sophisticated ways to fathom,
forensic accountants apply their intuitive skills to analyze fraud.
The purpose of this study is to examine the impact of forensic accounting on fraud detection and
deterrence in Zimbabwe, and to proffer suggestions that will bring public awareness on the
importance of forensic accounting. The study also contributes to the limited existing literature on
forensic accounting in Zimbabwe. Data was gathered using 205 questionnaires, along with
interviews which were administered to six (6) Zimbabwe organisations. 149 questionnaires were
completed and returned. Follow up interviews were carried out with key staff in those
organisations. The data was subjected to statistical tests such as Cronbach’s alpha, Chi-Square Test
and Analysis Of Variance (ANOVA), to test the reliability of sample and to test the hypotheses.
The results of the empirical findings show that the use of forensic accounting increases fraud
detection and significantly deters fraud cases, both in private and public sectors of Zimbabwe. It
was also found out that forensic accountants play a key role in litigation support services.
Amongst the proffered solutions, it was recommended that the legislature must amend Criminal
Law (Codification and Reform) Act {Chapter, 9:23} and the Public Accountants and Auditors
Act (27:12) to embrace forensic accounting. The judiciary system must be trained in forensic
accounting, academic institutions must offer degrees and diplomas in forensic accounting, and the
government must promote forensic accounting so as to curb financial crimes.
Authors:
William Magombedze is a Forensic Accountant in Harare
Mufaro Gunduza is head of Mount Carmel Institute of Business Intelligence
1.0 Introduction
Forensic accounting is a fairly new phenomenon in Zimbabwe as a tool for combating fraud.
Indeed, fraud has manifested into some financial cancer, not only in Zimbabwe but the world
over. Today the term “forensic accounting” has taken a centre stage in most organisations across
the globe that come to realise the need of forensic accounting to detect and deter fraud cases
which have substantially soared across the world. For instance, Timmons and Wassener (2009),
reported that the Chief Financial Officer for Satyam (Pvt) Limited pleaded guilty to a huge fraud.
The article stated that the fourth largest Indian Information Technology outsourcing company,
Satyam Computer Services (Pvt) Limited, was audited by PricewaterhouseCoopers (PWC), which is
registered with the Stock Exchange Control, and both its Chief Executive Officer and Chief
Financial Officer certified its financial statements. The auditors (PWC) gave Satyam stakeholders a
clean Audit Report and could not discover that the financial statements were marinated with
fraud. Surprisingly, a total of US$1.04 billion in cash and bank loans recorded in its books of
accounts for the second quarter in 2008 were non-existent. This was only sniffed later on by
forensic accountants. Prima facie, this is a clear indication that forensic accountants are needed
around the world to curb fraud. Therefore, this study seeks to unpack forensic accounting and see
if it is the right tool for fraud detection and deterrence in Zimbabwe. If top of the cream external
auditors such as PWC cannot unearth fraud of high magnitudes running into billions of United
States dollars, what else can a forensic accountant do?!
Figure 1 below shows statistics of fraud cases where financial statements were misstated in
America:
Figure1
The diagram above shows that Financial Statement Fraud is mainly perpetrated through
booking fictitious revenues and followed by overstatement of assets on the company’s
books. Some companies are shrewd enough to record non-existent or fictitious assets and
these contribute about 10% of Financial Statement Fraud as per the diagram above.
Empirical evidence has shown that fraud is affecting all nations and according to Figure 2
below, the most affected regions are Sub-Saharan Africa with a total of 285 reported
fraud cases followed by Asian-Pacific with a total of 221 reported cases in the period
2015/2016. The least affected region was Middle-East & North Africa.
Figure 2
It is important to note that the chart above refers to “reported fraud cases”. It has
limitations in the sense that some nations or organisations prefer not to report their fraud
cases fearing that they might damage their reputations in the process. Therefore, this is
just the tip of the iceberg.
Ajomele (2015) listed major fraud scandals which rocked Nigeria in the past few years.
Such scams included Maina Pension scam where 195 billion naira was lost; Kerosine
subsidy scam which resulted in US$100 million vanish from the economy monthly and
PDP fuel subsidy shenanigans which resulted in 6 billion naira disappearing from Nigeria.
Other financial scandals included the Pension Fund fraud where 32.8 billion naira was
stolen resulting in the sentencing of the Chief Accountant for the fund; car purchase
scandal where 255 million naira was swindled and the perpetrator, Oduah, was charged;
Private Jet Arms scandal in which US$15 million was swindled; Mohammed Abacha 446
billion naira case and 7 billion bribe to Christian religious leaders (Ajomele, 2015).
Honestly, this is just a tip of the iceberg and more is still covered under water!
In South Africa, corruption is believed to be rampant within the Metro Police. Some
major scandals in South Africa include the Tshwane Prepaid Meter scam in which R830
million is believed to have been swindled; Prasa scandal where R3,9 billion was lost;
corruption by Minister of Energy in which R800 million is believed to have been lost and
corruption by the Sports Minister where R65 million is also believed to have been
swindled (Nedu, 2016).
Figure 3 below shows the number of fraud cases in Sub-Saharan Africa in the period
2015/2016:
Based on Figure 3 above, South Africa tops the chart (30.5%), seconded by Nigeria
(24.6%) and on the third position is Kenya (14.4%). The rest of the nations have fraud
cases below 5% each.
One major impediment to economic growth is corruption (Nedu, 2016). The table below
shows the level of cleanliness of a few selected Sub- Saharan nations with regards to
corruption. Countries at the bottom need to adopt radical anti-corruption measures. The
Corruption Perception Index presented below measures the levels of perceived public
sector corruption, on a scale of 0 to 100, where 0 refers to the highest level of public
sector corruption and 100 refers to the cleanest nations with regards to public sector
corruption.
Figure 4
According to the graph above, Botswana is the cleanest nation with levels of corruption
below 40% followed by Namibia (about 50%). The worst nations affected by public sector
corruption are Zimbabwe with a level of corruption as high as 80% and Somalia which has
corruption rate approaching 90%. This is amazing. The question remains, ‘will forensic
accounting curb corruption in Zimbabwe at this rate of 80%?’ Surely, this needs to be
looked into with a keen eye to see if it is the right tool to detect and curb corruption and
the other basket of frauds bedevilling the nation.
Presently, forensic accounting is gaining popularity in Zimbabwe, Africa and the world at
large. Educational institutions around the globe have started teaching forensic accounting
as a major course, for instance, Harare Institute of Technology University (Zimbabwe),
Ballsbridge University (Ghana) and Kogod School of Business (America) among others.
Figure 5 below shows fraud cases reported in Zimbabwe media after adopting multi-
currency:
Figure 5
Fraud Case Estimated loss Fraud Case Estimated loss
Air Zimbabwe saga US$10m Net-One scam US$11m
ZESA tender scandals US$300m ZIMRA duty scam US$20m
Interfin Bank scandal US$136m Chitungwiza Council salary storm US$10m
Econet / Liquid tax US$300m NSSA externalisation fiasco US$300m
saga
Mbada Diamond scam US$15bn Old Mutual death claim scam US$70,000
The researcher noticed an upsurge for the demand for forensic accountants in Zimbabwe
after the nation adopted a basket of multi-currencies as legal tender. It is common cause
that the United States dollar out-paced other currencies with regards to its demand and
the level of fraud also soared to unprecedented levels in the Zimbabwean economy,
hence the call for forensic accountants to fish out perpetrators of fraud.
Fraud is complicated and difficult to unearth. To this end, the researcher developed an
interest to find out if forensic accounting is the right tool for detecting and deterring
fraud in Zimbabwe. Without over-emphasising, forensic accountants are seen as god-
fathers for fraud detection among other services they provide such as business valuation,
asset identification in matrimonial disputes,, expert witness testimony, computation of
future earnings, computation of economic losses arising from a breach of contract, or
economic loss from terrorism such as the attack of America on September 11, 2001
among other assignments.
It is indeed important to note that although the field of forensic accounting seems to be
becoming a very popular and demanding occupation for many, it is not a career that just
anyone can choose to pursue because it requires a lot of hard work, effort, and personal
characteristics that not many people possess. This career appears to be very appealing
because it is not the ordinary “behind-the-desk” job where accountants do journals, draw
up cash books and so on. No, it’s not like that. It involves a lot of guerrilla tactics to sniff
out fraud and other criminal conduct. Although it comes from a family of accounting, it
is not what one would consider to be a stereotypical form of accounting.
However, despite how appealing forensic accounting seems to be, the researcher noted
that there are no set standards in Zimbabwe neither is there any Act of Parliament with
which forensic accountants must comply when carrying out their duties. The Institute of
Forensic Auditors (IFA) is still in its infancy and is yet to come up with standards to be
followed by forensic accountants.
Organisations spent thousands of dollars on internal and external auditors, yet there
seems to be no real value coming from them with regards to plugging financial crimes and
haemorrhage. Generally speaking, external auditors, internal auditors and Chief Financial
Officers lack requisite training in financial forensics to detect and deter modern
sophisticated crimes like security fraud, bankruptcies, money laundering by organised
criminals and other criminal financial transactions.
Also, whilst both internal and external auditors have reduced themselves to mere number
crunchers behind their desks, investor confidence has been shaved off in most economies
due to corruption and other forms of fraud. Indeed, there is need for a new guard to
ferret fraud and provide litigation support to organisations which fall prey of fraudulent
misdemeanours. Forensic accounting new as it is, has become a complex area of concern
for the accounting profession and seems to be a proper tool for fraud detection and
deterrence in developing nations such as Zimbabwe and world over.
Literature Review
2.1 Evolution of forensic accounting
Forensic accounting’s history dates back to the ancient Egyptian scribes who were
responsible for maintaining all of the Pharaoh's assets and report any fraud that could
have taken place and also bring culprits to the Pharaoh’s panel of judges for punishment .
During this time the Egyptian scribes were not aware that they were already fraud
examiners and also the term ‘forensic accounting’ was unknown to them (Dreyer, 2014).
In 1817, the principles of forensic accounting were tested in court, when an accountant
was called to be an expert witness in testifying at a bankruptcy hearing. Years later around
1931, investigative accounting was applied by Internal Revenue Service (IRS) and the FBI
to convict a culprit, Al Capone who was arrested for tax evasion. The investigative
accountant documented evidence of tax evasion for a conviction. This court case drew
the attention of many people on the significance of investigative accounting in criminal
cases. In 1932, forensic accounting techniques were also applied to solve the Lindbergh
baby kidnapping case by tracking down serial numbers of the gold certificates used to pay
the kidnapper's ransom. Eventually, this led to the conviction of the suspect of the ‘baby
kidnapping scam’ (Brown, 2008).
Maurice E. Peloubet (1946) is credited with developing the term forensic accounting. At
around the end of 1940s, forensic accounting was used during World War II (Rasey, 2009).
The concept of forensic accounting became fully fledged in the 1980s in some Western
countries, particularly in the United States of America. Forensic accounting was identified
as a profession composed of accounting, auditing, investigative skills and litigation support
(Ozkul and Pamukc, 2012). Thereafter, it was adopted by many nations in response to
fraud cases.
Figure 7
Peer
organisation
Parental Delinquent
demographi opportunitie
c s
Family
organisation
Spatial Excess of Delinquen
location delinquent t
definitions behaviour
Neighbourhoo
d organisation
Social Learned
structural School skills and
location organisation techniques
It is believed that pressure arises from financial needs, work-related issues, life-style changes and
from other sources. On the other hand, opportunity arises from weak internal control
environment such as on accounting, weak procedures, unfettered access to critical corporate
information, inadequate audit trails and so on. Rationalisation fortifies the perpetrator’s act of
committing fraud, whereby the fraudster comes up with bogus reasons for justifying fraud. The
reasons could be such as, “the company owes me”, “nobody will be personally hurt”, “I am
under-paid and deserve more”, “I will put proceeds of fraud for a good purpose such as to pay
tithe”, “the goat feeds within the radius of its rope”, and so on.
Cressey’s Fraud Triangle theory proffers different reasons for committing fraud, from those of
Differentiation Association Theory. Sutherland concluded that fraud is learned whilst Cressey saw
fraud as something that comes from external environment (pressure and opportunities) as well as
from internal environment (rationalisation), and does not give reference to the perpetrator’s
upbringing or society.
The Fraud Scale Theory
This theory was propounded by W. Steve Albrecht. The Fraud Scale is presented below:
Figure 9
High situational pressures, high opportunities to commit fraud and low personal integrity
result in high levels of fraud. On the other hand, low situational pressures, low
opportunities to commit fraud and high personal integrity often result in no or negligible
levels of fraud.
The Fraud Scale Theory seems to buttress Cressey’s Fraud Triangle Theory in the sense
that they both agree that pressure and opportunities are key ingredients to the
commission of fraud. However, the slight difference is that the Fraud Triangle talks about
‘rationalisation’ as another fundamental reason for fraud commission, whereas the Fraud
Scale Theory looks at the person’s integrity. The researcher seems to enjoy more the
Fraud Scale because personal integrity is surely a core factor for any form of misdeeds, be
they prostitution, corruption, robbery and fraud.
Table 1
Traditional auditing Forensic accounting
Traditional Auditing is mandatory and Forensic accounting is done in response to an event
governed by Companies Act such as fraud
Auditors should possess “professional Forensic accountants should possess “investigative
scepticism”. mentality” to treat all figures as suspects until proven
otherwise
Adds credibility to reported financial Resolves suspicions, accusations by determining facts
information
Obtain reasonable assurance that financial Findings used as evidence in court or to resolve a
statements are free of material dispute
misstatement
An auditor basically focuses on material A forensic accountant may focus more on seemingly
transactions. immaterial transactions.
Audit is mainly concentrated on financial The coverage of forensic accounting is wider than
statements and its related items audit dealing with both financial & non-financial
issues.
(Source: Carey, 2008)
Accordingly, forensic accounting is the integration of accounting skills, auditing
knowledge, information technology skills, criminal psychology and investigative skills to
resolve a legal problem (Zysman, 2004). It demands reporting, where fraud is established
and the report is considered as evidence in the court of law or in administrative
proceedings.
There is a debate on how to clearly categorize fraud. Attempts to categorize it have been
a daunting task to fraud specialists. One school of thought differentiates fraud according
to occupation (Singleton et al, 2006) while another school of thought serialized it on the
basis of whether it is public or private sector fraud (Comer, 2001). Similarly, another
school of thought accorded fraud in terms of industry in which the fraud has occurred
such as bank fraud and insurance fraud (Skalah et al, 2001). Lendemen (2003) found it
plausible to categorize fraud in terms whether it is corporate or non-corporate, such as
management fraud, insider dealing, investment fraud, and other related frauds.
One of the most serious forms of fraud is accounting fraud which involves hiding serious
financial problems, using fraudulent bookkeeping to overstate income, inflate company
assets or report a profit when the company is actually operating at a loss through creative
accounting techniques (Millichamp, 2002). This could be used to conceal theft in a
company. The collapse of Enron and Tyco are cases in point (Skalah et al, 2005).
According to (Ozkul and Pamukc, 2012), financial statement fraud results in the increase
of market value of the business and sometimes managers get paid performance bonuses
when in actual fact their organisations are loss-making.
Figure 15
(Source: FBI Financial Crimes Report: 2010-2011)
The above graph shows that FBI keeps improving on fraud detection. They have
intensified detection techniques over the years on corporate fraud, securities fraud,
healthcare fraud and mortgage fraud. However, it is not clear whether the decline in
insurance fraud and money laundering is attributable to fraud deterrence skills or it is
simply because majority of the cases were not identified as fraudsters developed new
tricks on the market.
In the past, many fraudulent acts have been detected by ‘tips’. Unfortunately, the
incidence of fraud proceeds during detection and losses consequently increase. Figure 16
below illustrates ways fraud can be established:
Figure 16
Figure 17
Figure 18
(Source: International Journal of Computer (0975-8887) Application, volume 79- No. 2,
October 2013)
The diagram shows a simple machine learning process that can be used to detect fraud in
organisations. Cahill et al (2000) state that supervised neural networks, fuzzy neural nets,
and combinations of neural nets and rules, have been extensively explored and used for
detecting fraud in mobile phone networks and financial statement fraud. On the other
hand, Bayesian learning neural network is implemented for credit card fraud detection,
telecommunications fraud and for detecting medical insurance fraud.
Sometimes forensic accountants use a hybrid system; where expert knowledge is
integrated with statistical power, use a series of data mining techniques for the purpose of
detecting fraud. Specifically, a rule-learning program to uncover indicators of fraudulent
behaviour from a large database of customer transactions is implemented (Crumbley et al,
2005).
Cahill et al (2000) recommend the design of a fraud signature, based on data of fraudulent
calls, to detect telecommunications fraud. For scoring a call for fraud its probability
under the account signature is compared to its probability under a fraud signature.
Thereafter, a Link Analysis is then employed to relate known fraudsters to other
individuals, using record linkage and social network methods. This type of detection is
only able to detect frauds similar to those which have occurred previously and been
classified by a human. To detect a novel type of fraud may require the use of an
unsupervised machine learning algorithm.
Zytkow and Rauch (1999) in their research paper concluded that there is series of
behavioural changes which follow a three-level profiling, for the purpose of fraud
detection. In order to do this, ‘normal’ profiles are created based on data without
fraudulent records (semi supervised). Also Burge and Shawe-Taylor (2013) use behaviour
profiling for the purpose of fraud detection. However, in the case of using a recurrent
neural network for prototyping calling behaviour, unsupervised learning is applied.
The research philosophy shows the author’s assumptions which serve as a base for
research strategy. Saunders et al (2009) allude that pragmatics recognise many
different ways of interpreting the world and as a result there is no single point of view
which can give the entire picture. Indeed, there may be multiple realities. Whilst
positivism and interpretivism are extremely mutually exclusive paradigms, positivism
asserts that only factual knowledge gained through measurement is more trustworthy.
Figure 6.1 below summaries the research philosophies:
Figure 6.1
Pragmatism Positivism Realism Interpretivism
Popular data Mixed / Highly structured Methods chosen must Small samples,
collection multiple fit the subject matter, in depth
methods quantitative or
Method designs Large samples qualitative Investigations,
qualitative
Quantitative Quantitative but
and qualitative can use
qualitative
In this study, the researcher applied a positivism approach that is based on the “objective”
ontology and quantitative method as its research strategy. To this end, the researcher
administered 205 questionnaires to gather data which was then subjected to statistical tests.
The two research questions seek to identify whether there is a relationship between forensic
accounting and fraud detection as well as fraud control. The survey method is applied in order to
collect a sufficient amount of primary data. The survey method was selected because the study
focuses on evaluating respondents’ opinions with regards to the effectiveness of forensic
accounting as a tool for detecting and combating fraud in Zimbabwe. The survey design method
utilises data collected from a population for interrogation. Due to limited research time and other
essential resources, the research uses both quantitative data using questionnaires and qualitative
data amazed through interviews with influential and key respondents. Qualitative research is
appropriate for small samples and its outputs are not quantifiable. However, its basic advantage is
that it offers a complete description and analysis of a research subject, without limiting the nature
of participant’s responses as is the case with questionnaires (Collins & Hussey, 2003).
It is important at this point in time to allay the misconception that qualitative research and
quantitative research are one and the same thing. Collins & Hussey (2003) clearly state that a
qualitative research is exploratory in nature which provides insights into the problem or
hypothesis for a quantitative research. It uses common techniques such as focus groups, individual
interviews and observations. In this regard, the sample size is small so as to fulfil an established
quota.
On the other hand, a quantitative research quantifies the problem by generating numerical data
that can be converted into meaningful statistics. It uses measurable data to formulate facts of the
research. Normally, it uses techniques such as surveys, online polls, face-to-face interviews and
website interceptors among others.
Table 2
Researcher- completed instruments Respondent-completed instruments
Tally sheets Questionnaires
Flowcharts Self-checklists
Rating scales Attitude scales
Interview guides Personality inventories
Performance checklists Aptitude tests
Observation forms Projective devices
Time and motion logs Socio-metric devices
(Source: Biddix, 2015)
The research focuses on questionnaires and interviews of key people as primary data collection
tools. The questionnaire used in this research is divided into four sections, where Section A to
Section C used structured questions and Section D employed open-ended questions. Also, the
interviews done with key people were derived from the questionnaire and follow-up questions
were asked when seeking clarity.
Table 3
Advantages Disadvantages
Large amounts of data can be The questionnaire fails to capture key information such as the
amazed within a short period of respondent’s emotions, behaviour and feelings
time at a low cost
The results can be easily Only a limited amount of information can be asked on the
quantifiable without much questionnaire which also limits its validity
influence on the reliability of
data
Data gathered can be analysed There is no way to tell the truthfulness of the respondent, nor
more scientifically compared to how much thought has been applied on the responses
other methods
Questionnaire is a practical way There is some degree of researcher’s imposition, that, he or
of gathering data she develops questions that are important to the researcher,
yet these questions might miss out on fundamental issues of
the research
Table 4
Pros Cons
Face –to-face interviews capture emotions and Normally face-to-face interviews are very
behaviours of the respondents expensive to conduct and this may severely
limit the scope of the research
The interviewer has control over the interview Interviews sometimes suffer from self-serving
and is able to keep the interviewee focused and bias, where the interviewer may end up
on track asking leading questions
Face-to-face interviews allow the interviewer to Manual data capturing and at the same time
capture verbal and non-verbal ques. interviewing the respondent may leave out
critical information unrecorded and
compromise quality of research
Finally face-to-face interviews help with proper Normally the sample size is small and may
screening of information, for instance, it may not represent the population. This has the
become difficult for the interviewee to result of undermining credibility of the
misrepresent about their gender and age. research outputs
(Source: Hughes, 1981)
3.5 Population Sampling
It is within the interest of the researcher to clearly define the population following clear logic and
judgment. The population must keep in line with the research objectives, for instance, when
researching on forensic accounting, it may be folly to draw the population from nurses who may
struggle to understand the subject matter.
Sharon (1999) states that sampling methods can either be probability based or non-probability
based. Where probability method is used, each member of the population has a known non-zero
chance of being selected. It includes random sampling, systematic sampling and stratified
sampling. Non-probability sampling includes convenience sampling, quota sampling, judgmental
sampling and snow-bow sampling. In this research, probability sampling method was used.
The population of study for this research comes from six (6) organisations, all based in Zimbabwe.
This is tabulated below:
Table 5
Organisation Population
Institute of Chartered Accountants of 27
Zimbabwe
Auditor General’s Office 81
Zimbabwe Anti-Corruption Commission 94
Zimbabwe Republic Police Serious Fraud Squad 176
Deposit Protection Corporation 28
Institute of Forensic Auditors (Zimbabwe) 14
Total 420
(Source: Population was estimated by Human Resources Departments of each
organisation)
It is pertinent to bear in mind that when selecting a sample there is always a compromise between
what is desirable and what is attainable. Where the sample looks unrepresentative of the
population, it is incumbent upon the researcher to moderate the sample from time to time.
Suitability of the sample will be determined by the following formula at 5% level of significance
(Adefila, 2008):
S = P / {1+P(g2)}
Where S = sample size
P = Population size
g = level of significance.
S = P / {1+P(g2)}
= 420 / {1 + 420(0.0025)
= 205
The sample distribution for the six (6) organisations is tabulated below:
Table 6
Organisation Population
Institute of Chartered Accountants of 14
Zimbabwe
Auditor General’s Office 39
Zimbabwe Anti-Corruption Commission 46
Zimbabwe Republic Police Serious Fraud Squad 87
Deposit Protection Corporation 12
Institute of Forensic Auditors (Zimbabwe) 7
Total 205
In order to have confidence that the survey results are representative of the population, it is
recommended to have a big pool of randomly selected participants. The question is, “How big is
big?” Niles (2006) highlighted that at 95% confidence level, margin of error can be calculated
using 1 / ∫N, where N is the sample size. The table below shows the margin of error for a sample:
Table 7
10 0.316 31.6%
20 0.224 22.4%
50 0.141 14.1%
100 0.100 10.0%
200 0.071 7.1%
500 0.045 4.5%
1,000 0.032 3.2%
2,000 0.022 2.2%
5,000 0.014 1.4%
10,000 0.010 1.0%
(Source: Creative Research Systems, 2003)
From the above table, a sample with 205 participants has a margin of error of 7.1%. In other
words, there is 7.1% probability that the sample is not representative of the population. On the
other hand, there is 92.9% probability that the sample is a representative of the population. The
author therefore concludes that the selected sample represents the population to a greater extent.
In addition to the above, the researcher upheld individuals' and organizations’ rights to
confidentiality and privacy as a central tenet of his work. However, the researcher is also aware
that many “privacy issues” are idiosyncratic to the research population. In such instance, the
researcher needed to devise ways to ask whether participants were willing to talk about sensitive
topics without putting them in awkward situations or demeaning their autonomy. In a case where
research participants have the freedom and latitude to choose how much information about
themselves they will reveal and under what circumstances, the researcher was careful when
recruiting participants for a study, for instance, it would be inappropriate to solicit information
from sacked employees in this type of research. Where the researcher is precluded from obtaining
full consent at the beginning of interview or answering questionnaires, for example, if the protocol
includes deception or exhibits spontaneous behaviour, the author offered a full debriefing before
data collection and provide participants with an opportunity to reiterate their consent. In
instances where the researcher hit the walls with regards to data collection (as is normally the case
with ‘sensitive offices’), the only option available is guerrilla tactics till adequate information is
amazed.
Finally, the researcher was clear to avoid any sort of research misconduct such as fabrication,
falsification and plagiarism. Fabrication refers to the process of making up data and reporting on
the same. Falsification refers to the manipulation of research materials or omitting data / results
such that the research is not balanced and accurately reported. Plagiarism refers to the
appropriation of one’s prior research or another person’s ideas, processes, results or words
without according appropriate credit.
4.0 Introduction
Data was collected through 205 questionnaires that were administered to six (6) organizations
based in Zimbabwe. The purpose of the questionnaires and interviews on focus groups was to
obtain feedback from participants on their views regarding forensic accounting as a tool for fraud
detection and deterrence in Zimbabwe. Of the 205 questionnaires that were sent out, 149 were
received from the participants. This was an overwhelming response more than what the
researcher had initially anticipated. This slightly moved the reliability of the sample from 92.9% to
91.8%. At least two participants were interviewed from each organization in order to obtain more
information through open-ended questions.
Table 9
Duration
Frequency Percent Valid Percent Cumulative Percent
1 to 5 years 37 24.8% 24.8% 24.8%
6 to 10 years 66 44.3% 44.3% 69.1%
Valid Less than 1 year 29 19.5% 19.5% 88.6%
More than 10 years 17 11.4% 11.4% 100%
Total 149 100 % 100%
(Source: 2016 survey)
This information is summarized by the following graph:
Figure 19.1: Duration in the organization
The analysis above shows that 44% of the respondents worked between 6 to 10 years, 25% worked
between 1 and 5 years, 19% worked less than a year at the organisation and 11% worked for a
period more than 10 years.
It can be concluded that at least 80.5% of the respondents had a first degree and above. Normally
such groups of participants are the ‘think tanks’ of most organizations.
4.2.4 Gender
The survey also looked at the gender distribution of the participants. The results show that there
were more responses from males than females in the organizations subjected to the survey. This is
shown on the table below:
Table 12 Gender
Frequency Percent Valid Percent Cumulative Percent
Female 69 46.3% 46.3% 46.3%
Male 80 53.7% 53.7% 100%
Valid
Bisexual 0 0.0% 0.0%
Total 149 100% 100%
(Source: 2016 Survey)
4.3 SECTION B - RELEVANCE OF FORENSIC ACCOUNTING
This section provides an analysis of the relevance of forensic accounting. This shows an
analysis of the effectiveness of forensic accounting as the tool for detecting fraud in
Zimbabwe organisations and also the extent to which forensic accounting can curb
fraudulent activities in Zimbabwe organisations.
The results are cross-tabulated as given on Table 13 below. The cross-tabulation focused
on the respondent’s position in the organization and the extent the respondent
understood forensic accounting.
Table 13: Position in the organisation vs. understanding of forensic accounting cross tabulation
Understanding of forensic accounting Total
Basic Not at Very
Knowledge all Knowledgeable
Count 22 18 68 108
Manager % within Position
and below in the 20.4% 16.7% 63.0% 100.0%
organisation
Count 0 0 21 21
Position in the Executive % within Position
organisation Director in the 0.0% 0.0% 100.0% 100.0%
organisation
Count 14 0 6 20
Non-
Executive % within Position
Director in the 70.0% 0.0% 30.0% 100.0%
organisation
Count 36 18 95 149
Total % within Position
in the 24.2% 12.1% 63.8% 100.0%
organisation
(Source: 2016 Survey)
The table above shows that 63% of the management and below were very knowledgeable about
forensic accounting, 100% of the executive directors was very knowledgeable and 70% of the non-
executive possessed basic knowledge about forensic accounting.
Overall, 24.2% of the respondents had basic knowledge on forensic accounting, 12.1% had no
knowledge of forensic accounting and 63.8% were very knowledgeable on the subject of forensic
accounting. Figure 19.5 shows total respondents within the organizations and their understanding
of forensic accounting.
Figure 19.6 above shows that overall 88% of the respondents were of the view that
forensic accounting is important in Zimbabwe, where 77% strongly agreed that the
services of forensic accountants are important in Zimbabwe and 11% just agreed that it is
important. This generally implies that forensic accounting is important in the organisations
operating in Zimbabwe.
4.3.3 Forensic accounting services are needed more in Zimbabwe’s Public Sector
Table 15 below shows the respondents’ views of forensic accounting in the public of
Zimbabwe.
Table 15: Forensic accounting services are needed more in public Sector
Frequency Percent Valid Percent Cumulative Percent
Agree 28 18.8% 18.8% 18.8%
Disagree 18 12.1% 12.1% 30.9%
Strongly disagree 0 0 0% 30.9%
Valid
Not sure 0 0 0% 30.9%
Strongly agree 103 69.1% 69.1% 100%
Total 149 100% 100%
(Source: 2016 Survey)
The results from Table 15 above seem to confirm those from Table 14, where majority of
the respondents (in this case 69.1%) strongly agreed that forensic accounting is important,
moreso in the public sector. The outcome from this survey seems to buttress the views of
the majority of authors who believe that the public sector is bedevilled with corruption
and all sorts of fraud, hence, the need for forensic accounting to curb financial
haemorrhage from the economy.
Figure 19.7: Forensic accounting services needed more in Zimbabwe’s public sector.
Figure 19.7 above shows that only 12% of the respondents disagreed that forensic
accounting is needed more in Zimbabwe public sector. Contrary to their view, 88%
generally agreed that forensic accounting is needed in public sector, where 69% strongly
agreed and this was supported by 19% who just agreed.
Although those with no knowledge about forensic accounting, 66.7% disagreed and 33.3%
strongly disagreed on the effectiveness of forensic accounting as a tool for fraud
detection, the result is overwhelmed by that of those with basic knowledge where 69.4%
strongly agreed and 74.7% of those who were very knowledgeable also strongly agreed
that forensic accounting is an important tool for fraud detection.
4.3.5 The services of forensic accountants are preferable to the services of both internal and
external auditors.
The following figure shows an analysis to find out if the services of the Forensic
Accountants are preferable to the services of both the Internal and the External auditors.
Table 18: Forensic accounting services are preferable to Internal and External Audit
Figure 19.10: Forensic accounting more preferred to Internal and External Auditing
Figure 19.10 above shows that 51.7% of the respondents strongly agreed whilst 4%
disagreed that forensic accounting services are preferred to the services of both the
internal and the external auditors in organizations operating in Zimbabwe.
Figure 19.11 above shows that 32.2% agreed that forensic accounting gives sufficient
evidence during litigation, 19.5% agreed strongly and 29.5% disagreed. This output shows
that a significant proportion of respondents disagreed (29.5%) including those who were
not sure (18.8%) that forensic accounting gives sufficient evidence during litigation.
However, the outcome is overwhelmed by those who agreed (32.2%) and those who
strongly agreed (19.5%). Overall, it shows that forensic accounting provides adequate
evidence during litigation process.
4.3.7 Forensic accounting skills and techniques reduce fraud occurrence in Zimbabwe
organizations.
Table 20 shows the analysis of whether forensic accounting skills and techniques curb
fraud occurrence in Zimbabwe organizations. The outcome shows that 51.7% of the
respondents agreed strongly that the forensic accounting skills reduce fraud occurrence in
Zimbabwe organizations, 14.8% also agreed, 25.5% were not sure and 8.1% disagreed to
that. This generally shows that forensic accounting skills reduce fraud in Zimbabwe
organisations. Table 20 shows the results in detail.
Table 20: Forensic accounting skills and techniques reduce fraud occurrence in Zimbabwe
organisations
Frequency Percent Valid Cumulative
Percent Percent
Agree 22 14.8% 14.8% 14.8%
Disagree 12 8.1% 8.1% 22.8%
Strongly 0 0.0% 0.0% 22.8%
Valid disagree
Not 38 25.5% 25.5% 48.3%
sure
Strongly 77 51.7% 51.7% 100%
agree
Total 149 100% 100%
The results are summarized on Figure 19.12 below.
Once again, it can be concluded that forensic accounting indeed deters fraud penetration
in most organisations operating within Zimbabwe.
According to Figure 19.14 above, very few people commit fraud for bogus reasons such
as, “it is my money, the organisation owes me”. This reason has a mean of 1.46 which is
much closer to 1 (or NO). Please refer to the key above. Rather, fraudsters commit fraud
as a result of opportunity which has a mean of 1.95 and much closer to a 2 (or YES).
Financial pressure is at the middle with a mean of 1.55. This analysis tests Cressey’s Fraud
Triangle to see which reasons carry much weight as far as fraud perpetration is concerned.
It has emerged to be ‘opportunity’ and lastly ‘rationalisation’.
It is evident from Figure 19.15 above that corruption is the major threat to the economy
and it is the most common tactic of siphoning away cash from Zimbabwe. Obviously, this
involves under-hand dealings, brown envelopes and excessive gratuities. Cyber crime
comes second and it needs to be curbed before it causes severe financial haemorrhage to
the Zimbabwe economy.
The researcher uses two different methods to test both hypotheses 1 and hypotheses 2.
The first step is to apply the Chi-Square test which attempts to measure the association
between importance of forensic accounting services and fraud detection in the first place
and then followed by the association between forensic accounting and fraud deterrence.
The second method is the Analysis of Variance (ANOVA), where observed data from
the questionnaire is compared in order to accept or refute the hypotheses.
b. 0 cells (0.0%) have expected frequencies less than 5. The minimum expected cell
frequency is 37.3.
Decision rule: The calculated level of significance (0.000) is below the predetermined alpha
(0.05), therefore reject the null hypothesis. It is hereby concluded that forensic accounting
affects fraud detection in organisations operating in Zimbabwe.
6.1.3 Hypothesis Two
H0 : Forensic accounting does not curb fraudulent activities in Zimbabwe
organisations.
H1 : Forensic accounting curbs fraudulent activities in Zimbabwe organisations.
Table 25 below shows the output from SPSS software which was used to calculate
the Chi-Square test in order to find out if there is no association between forensic
accounting and fraud deterrence.
b. 0 cells (0.0%) have expected frequencies less than 5. The minimum expected cell
frequency is 37.3.
Decision rule: The calculated level of significance (0.000) is below the predetermined alpha
(0.05), therefore reject the null hypothesis. It is hereby concluded that forensic accounting
deters fraud in organisations operating in Zimbabwe.
Once again, this relationship is tested using ANOVA. The results are shown in Table 27
below:
The study was meant to answer the key research questions which were: (i) to what extent
does forensic accounting identify the root causes of fraud and the perpetration schemes
used by con artists? (ii) to what extent is forensic accounting an effective tool for
detecting and curbing fraud in Zimbabwe organisations? (iii) to what extent is the study
able to generate new insights on the relevance of forensic accounting? In this study, the
researcher applied a positivism approach that is based on the “objective” ontology and
quantitative method as its research strategy. To this end, the researcher administered 205
questionnaires to gather data which was then subjected to statistical tests. The reliability
of the sample was tested using Cronbach’s alpha. The sample was found to be a true
representation of the population. Also, Chi-Square test and ANOVA statistics were used
to test two key hypotheses:
5.4 Recommendations
Pursuant to the revelation from the research conducted, the following recommendations
are important:
a. To the legislature
The Criminal Law (Codification and Reform) Act {Chapter 9:23} and Public
Accountants and Auditors Act {Chapter 27:12} must be amended and incorporate
the term ‘forensic accounting’. This will minimise misinterpretation by courts during
litigation processes.
b. To Auditor General’s Office
It is highly recommended that the Auditor General’s Office adopts forensic
accounting and establishes a section which specialises in financial forensics that is
adequately equipped. Once this is done, it will act as a deterrent of corruption and
other fraudulent activities in the public sector.
c. To Academic Institutions
All academic institutions which offer degrees in accounting must incorporate a
module in forensic accounting. Better still, they can offer degrees and diplomas in
forensic accounting. Honestly speaking, ‘knowledge is power’. Graduates will be
empowered to detect and deter fraud in various organisations before much damage
has been suffered.
d. To the Judiciary
It is common cause that most judges, lawyers and public prosecutors have little or no
understanding of forensic accounting. This may result in good evidence being thrown
out because it has not been well-understood. It is a considered view that lawyers,
public prosecutors and judges must train in financial forensics (even at least attending
workshops) and must also train in computers so that they are amiable with electronic
evidence when it is presented in courts.
i. To the researchers
Forensic accounting is a new phenomenon in Zimbabwe and little of it has been
researched so far. Researchers must develop interest in this area and carry out
research covering the entire discipline of forensic accounting. Below, the researcher
has proposed other facets of forensic accounting that need to be researched on.
ACFE (2014). Report To The Nations On Occupational Fraud And Abuse. USA
ACFE (2016). Report To The Nations On Occupational Fraud And Abuse. USA
Adegbie, F.F., & Fakile, A.S. (2012). Economic and financial Crime in Nigeria: forensic accounting
as antidote. British Journal of Arts and Social Sciences, 6 (1), 37-50.
Ajomele, D (2015). Fraud and Corruption. South African Institute of Corporate Fraud
Management
Albrecht, W. S., Albrecht, C.C. and Albrecht, C.O. (2006). Fraud Examination, 2nd ed. Thomson
South-Western.
Arokiasamy, L and Cristal- Lee, S (2009). Forensic Accounting: Public Acceptance towards
Occurrence of Fraud Detection. International Journal of Business Management. 120-160
Asare, S. K and Wright, A.M (2014). The Effectiveness of Alternative Risk Assessment and
Program Planning Tools in a Fraud Setting
Biddix, P. J (2015). Strategies for Assessing Commuter Students : Copyright © 1999 - 2017 John
Wiley & Sons, Inc.
Bolton, R. J and Hand, D. J. (2001). Unsupervised profiling methods for fraud detection.
Edinburgh, UK.
Cahill, M., D. Lambert, J. Pinheiro, and D. Sun (2000). Detecting fraud in the real world.
Collis, J., & Hussey, R. (2003). Business research: A practical guide for undergraduate and
postgraduate students (2nd ed.). Houndmills
Comer, R.J. (2001) Case Studies for Abnormal Psychology. Yale University School of Medicine's
Child Study Center.. Criminality Investigation Magazine, Vol. 3, No. 5.
Crumbley, D. L. (2005). Qualifying as an expert witness. Expert Witnessing in Forensic Accounting,
Philadelphia
Decker, D. (1998). Statistical Fraud Detection: A Review (with Discussion, Statistical Science 17 (3)
235-255).
Degboro, D. and J. Olofinsola, 2007. Forensic accountants and the litigation support engagement.
Nigerian Accountant.40(2): 27-52.
Denzin, N.K., & Lincoln, Y.S. (2005). The discipline and practice of qualitative research. The sage
handbook of qualitative research (2nd ed.). Thousand Oaks, CA: Sage
Dorronsoro, J.R,Ginel, F, Sanchez , C and Cruz, C. S. (1997). Neural Fraud Detection in credit
card operations.
Enofe, A.O. (2013).The Impact of Forensic Accounting on Fraud Detection. Journal of Business
and Management, Vol. 5, No. 26.
FBI (2016). Financial Crimes Report. Department of Justice
Federal Trade Commission Consumer Information. (2016). Scam Alerts. What to know and do
about scams in the news.
Forbes Magazine (2010). Why Corporate Fraud Is On The Rise. Los Angeles
Grippo, F. J., & Ibex, J. W. (2003). Introduction to forensic accounting. The National Public
Accountant, Washington.
Hatcher, Larry (1994), A Step-by-Step Approach to Using the SAS System for Factor Analysis
and Structural Equation Modeling, Cary, NC: The SAS Institute
Hopwood, W. S., Leiner, J.J., & Young G.R. (2008). Forensic Accounting. New York: McGraw-
Hill/Irwin.
Howard , S & Sheetz, M (2006). Forensic Accounting and Fraud Investigation for Non-Experts,
New Jersey, John Wiley and Sons Inc.
IRS (2016). Examples of Financial Institution Fraud Investigations – Fiscal Year 2016.
Lendemen, R. (2003). Implications for Investigations and Forensic Auditor. Boston Beacon Press.
New York.
Modugu, K. P & Anyaduba, J. O (2013). Forensic Accounting and Financial Fraud: an empirical
approach. International Journal of Business and Social Science, 4(7).
Neufer, N. L. (2000). Statistical Evidence: How to help jurors understand and use it properly.
Defense Counsel Journal 67(3): 360-391
NewsdzeZimbabwe, (2016). Audit Reveals Shocking Scams.
http://www.newsdzezimbabwe.co.uk/2016/06/audiit-reveals-shcoking-scams.html
Niles, R ( 2006). “Statistics Every Writer Should Know”
Okoye, E. I & Gbegi, D. O (2013). Forensic Accounting: A tool for fraud detection and
prevention in the public sector. International Journal of Academic Research in Business and
Social Sciences 3(3).
Okunbor , J. A & Obaretin, O (2010). Effectiveness of the Application of Forensic Accounting
Services in Nigerian Corporate Organisations. AAU JMS 1(1).
Owojori, A.A. and Asaolu, T.O. (2009). The Role of Forensic Accounting in Solving the Vexed
problem of Corporate World. European Journal of Scientific Research, 29(2), pp. 183– 187.
Ozkul, F.U., & Pamukc¸A. (2012). Fraud detection and Forensic Accounting, Istanbul, Turkey
Peloubet, M. E. (1946). Forensic Accounting: Its place in today’s economy. Journal of
Accountancy, Vol. 81 (6).
Popper, K. (2004). The Logic of Scientific Discovery
PWC Report (2009). Global Economic Crime Survey, Economic Crime in Downtown.
Saunders, M, Thornhill, A and Lewis, P. (2009), Research Methods for Business Students.
Singleton, T. W., & Singleton, A.J. (2010). Fraud Auditing and Forensic Accounting, (3rd ed.).
New York: John Wiley & Sons
Skalah, S.L, Alois. M. A and Sellar, G. (2001). Challenges of Internal Bank Fraud Policy: A case
study of commercial banks in Harare. International Journal of Management Sciences and Business
Research, 3(7).
Stanbury, J., & Paley-Menzies, C. (2010). Forensic Futurama: Why Forensic Accounting Is
Evolving.
The Belmont Report (1979).Ethical Principles and Guidelines for the Protection of Human Subjects
of Research. Ethics education library. United States, National Commission for the Protection of
Human Subjects of Biomedical and Behavioral Research
Timmons. H and B. Wassener (2009). “Satyam Chief Admits Huge Fraud,” New York Times, 8
January 2009. www.nytimes.com.
Williams, J. W. (2002). Playing the Corporate Shell Game: The Forensic Accounting and
Investigation Industry, Law, and Management of Organisational Appearances . Toronto: York
University.
Wolfe, D. T. & Hermanson, D.R. (2004). The Fraud Diamond: Considering the Four Elements of
Fraud, The CPA Journal December.
Yufeng Kou, Chang-Tien Lu, Sirirat S, Yo-Ping. (2004). Huang. Survey of fraud detection
techniques. Proceedings of the 2004 IEEE. International Conference of Networking, Sensing &
Control. Taipei, Taiwan, March 21-23, 2004.
Zimbabwe’s National Risk Assessment Report (2015). www.rbz.co.zw