Professional Documents
Culture Documents
Victor Project Work Introduction
Victor Project Work Introduction
INTRODUCTION
primarily used to hedge against the risk of a contingent, uncertain loss. The
auditing of insurance companies should not be cajoled with but should be taken
seriously because they are risk bearers. They manage financial risk therefore their
monetary
Losses from fraud are significant. However, the full cost of fraud is immeasurable
1
prevention, and detection programs, as well as a fraud risk assessment process to
Although management and the board are ultimately responsible for fraud
environment
Coram, Ferguson and Moroney (2008) in their view sees internal audits as
consisting of all the measures taken by the organization for the purpose of;
protecting its resources against waste, fraud and inefficiency; ensuring accuracy
and reliability of accounting and operating data; ensuring compliance with the
control, internal auditors should be at liberty to state their opinions without any
because internal auditors are often organizational employees and not outsiders
(Gay & Simnett 2007), an independent frame of mind is essential and internal
auditors should have the ability to make tough recommendations without fear or
2
favour. Sawyer (1988) also argues that internal auditors should be independent in
order to perform their duties and should state their opinions freely without any
bias or restrictions.
legislation such as the Sarbanes Oxley Act (2002) in the USA. The recent spate of
managements toolkit for safeguarding the rate of return on capital and ensuring
acts are not dependent upon the threat of violence or physical force. Frauds are
advantage.”
3
Another definition of fraud from the publication “Managing the Business Risk of
(AICPA), states:
prevention and detection are related concepts, they are not the same. Fraud
On the other hand, fraud detection entails activities and programs designed to
The internal auditor’s roles in relation to fraud risk management could include
initial or full investigation of suspected fraud, root cause analysis and control
4
hotline, and providing ethics training sessions. If assigned such duties, internal
The incidence of fraud continues to increase across private and public sector
resistant, although developing countries and their various states suffer the most
pain. Today; modern organized financial crimes have appeared. Financial crimes
security fraud (EFCC, 2004), among others, have taken the Centre stage in the
preference.
Nigeria as a nation is deeply soaked in, and characterized by, fraud and its related
corrupt practices. These have had severe negative consequences on the country
and its global image. Fraud and related ills have caused instability in the economy
losses of revenues.
5
Business practices in Nigeria have been equally marred by incredible waves of
As in the society at large, frauds has become one of the most intractable
the day and management vigilance improving with the aid of computerization, it
is on record that millions of naira are lost to fraud and forgeries which Stanley
(1994) had argued results in huge financial losses to business organizations and
their customers, depletion of shareholders’ funds and capital base as well as loss
of confidence in businesses.
means of fraud committed with pen than through other means. Just as the banks
are hit, so also are other business organizations. Fraud may take the form of theft
information, cheque forgery, false financial statements, and so on, but whichever
form it takes, the fundamental point is that the business organization that falls
6
1.3 AIMS AND OBJECTIVES OF THE STUDY
The main aim of this study is to examine the relationship between internal audit
State.
ii. To ascertain the nature of relationship between the size of the internal
iv. To find out the nature of relationship between the qualification of the
7
vi. To evaluate the nature of relationship between the quality of audit work
I. To what extent does the size of internal audit relate with fraud
prevention?
II. What is the extent of relationship between the size of internal audit and
fraud investigation?
III. To what extent does the qualification of internal audit relate with fraud
prevention?
V. To what extent does the quality of audit work relate with fraud
prevention?
VI. What is the extent of relationship between the quality of audit work and
fraud investigation?
8
The study attempts to test the following null hypothesis generated from the
problem of study:
Ho1; There is no significant relationship between size of the internal audit and
fraud prevention.
Ho2; The size of the internal audit has no significant impact with fraud
investigation.
Ho4; The qualification of the internal audit has no significant impact with fraud
investigation.
Ho5; There is no significant relationship between the quality of audit work and
fraud prevention.
Ho6; The quality of audit work has no significant impact with fraud investigation.
9
1. Management and Staff: It is expected that the findings of this research would
managers and top level officers whose interest are geared towards the
enhancement of the chances of making great profit and retaining goodwill. It will
2. Academic scholar: The research work will add to the existing body of
1. Geographical scope: The research work covers internal audit and fraud
3. Unit of analysis: The unit of analysis of this research work are the manager
10
1.8 LIMITATION OF THE STUDY
1. The research work was limited by the fact that it covers just quoted
The researcher at this point believes that some key words and terms that will be
Internal auditor:
Internal control:
11
Internal audit:
Fraud prevention:
Fraud investigation:
evidence that fraud exists, detective internal controls are not intended to prevent
fraud.
The fraud risk assessment is a tool that assists management and internal auditors
in systematically identifying where and how fraud may occur and who may be in a
12
Fraud risk management is an ongoing process that provides an organization with
the tools to manage fraud risk in a manner consistent with the regulatory
This study comprises of five chapters each, dealing with different aspects. Chapter
v. Statement of hypothesis
ix. Definition of terms, and the chapter two of this project derives into the
13
research methodology. Chapter four consist of the analysis, presentation and the
interpretation of results and chapter five contains the summary, conclusion and
recommendation.
CHAPTER TWO
LITERATURE REVIEW
14
can't be unsurprising. It is based on this research gaps that this study will be
undertaken to bridge the gap as insurance fraud has continued to exist even with
the existence of previous studies as gathered in this literature review (Gramling,
2004).
2.1.2 Fraud Scale Theory
Fraud Scale Theory was established by Steve Albrecht (1986). The theory suggest
that the nine causes of fraud include: Living past means, overpowering craving for
individual increase, high individual obligation, and close relationship with clients,
pay not equivalent with employment, and wheeler-managing, solid test to beat
framework, inordinate betting and family/peer weight. He built up the fraud scale
which had: Situational weights (Prompt issues with environment and generally
obligations/misfortunes caused by individuals), saw openings (achieved by poor
controls), Individual respectability (which is affected by individual code of
conduct) (Fish, 2012).
2.1.3 Agency Theory
Agency Theory was established by Ross and Stephen (1973). The theory was
founded on the notion that there must be two parties for any contract to be
successful (Adams, 1994). In their case, the employer and employee are the two
parties who represent a firm to attain its long range objectives (Clarke, 1990). The
relationship between the principal (employer) and agent (employee) determines the
performance of any organization in the dynamic business environment. It reveals
how to best make connections in which one social occasion chooses the work
while another get-together makes the fundamental strides (Ewa and Udoayang,
2012). Chen and Container (2012) contend that money related administration is
about hazard, and every speculator gets together with an alternate resilience for
hazard. In an office relationship, odds are high that principals and specialists have
distinctive hazard resistances, which can prompt to mistaken assumptions and an
15
inability to concede to contributing choices. Notwithstanding when operators act
toward principals' objectives, their method for doing as such may struggle with
principal’s hazard resiliences. For instance, in a shareholder-official relationship,
an official may wish to gain battling organizations to accomplish the mutual
objective of expanding piece of the pie at a rebate, yet this arrangement might be
regarded excessively unsafe by a lion's share of shareholders (Cole, 2000). In the
realm of fund, some organization connections are trustee, implying that specialists
are lawfully required to act in light of a legitimate concern for their principals
(Kantarelis, 2007). Trustee obligations formalize an organization relationship and
give more noteworthy security to principals. On account of a money related
organizer who holds influence of lawyer for an individual customer, for instance,
that organizer has the privilege to direct monetary exchanges for the benefit of the
person without his assent or mindfulness. In this case, the monetary organizer is
legitimately required to settle on choices exclusively to the greatest advantage of
his customer, instead of getting things done with his customers' cash basically for
his very own benefit (Ewa & Udoayang, 2012).
2.1.4 Stewardship Theory
Davis et al. (1997), states that a steward takes care shareholder wealth through firm
performance, in light of the route that hence, the steward's utility focuses of
confinement are extended. In this point of view, stewards are administrators
attempting to ensure and make benefits for the shareholders. In this way,
stewardship hypothesis stresses concerning association being as stewards,
combining their objectives as a section of the connection (Spencer, 2007). The
stewardship point of view recommends that stewards are fulfilled and persuaded
when different leveled achievement is refined.
The theory sees the criticalness of association structures that enable the steward
and offers most conspicuous self-lead in light of trust (Donaldson and Davis,
16
1995). It weighs on the position of specialist to act all the more self-representing so
that the shareholders' advantages are expanded. When in doubt, this can minimize
the expenses went for checking and controlling representative conduct (Tracy,
2008). Jain and Narang (2009) affirm that keeping in mind the end goal to secure
their reputations for being pioneers in affiliations, directors are inclined to work the
firm to help cash related execution and moreover shareholders' advantages. In this
sense, it is assumed that the affiliation's execution can clearly influence perspective
of their individual execution.
21
indicator of IA effectiveness a viewpoint which is supported by ISPPIA. In
general, audit work should cover all systems and activities in all departments and
locations throughout the organization. The International Federation of Accountants
(2007) states that the scope of internal audit functions varies widely and depends
on the size and structure of the entity and the requirements of management.
Nevertheless, internal audit activities may include the following:
1. Monitoring and reviewing internal control systems, and recommending
improvements thereto.
2. Examination of financial and operating information. The internal audit function
includes reviewing the means used to identify, measure, classify and report
financial and operating information, and specific inquiry into individual items
including detailed testing of transactions, balances and procedures; 3. Review of
the economy, efficiency and effectiveness of operating activities, including non-
financial activities of an entity.
4. Review of compliance with laws, regulations and other external requirements,
and with management policies and directives and other internal requirements (The
International Federation of Accountants 2007).
The scope of IA is also expanding to determine whether the systems designed by
management are adequate and effective and whether the activities audited comply
with the appropriate requirements (Fadzil, Haron & Jantan 2005).
The IIA‘s Standards for Professional Practice of Internal Auditing state that the IA
activity must evaluate risk exposures relating to the organization‘s governance,
operations, and information systems regarding the reliability and integrity of
financial and operational information, effectiveness and efficiency of operations,
safeguarding of assets, and reviewing the systems established to ensure compliance
with those policies, plans, procedures, laws, regulations and contracts which could
have a significant impact on operations and reports, and should determine whether
22
the organization is in compliance (Institute of Internal Auditors 2011d). Internal
audit also needs to carry out appraisal of existing systems and be involved in the
revision or development of new systems before implementation. The internal audit
function should assist management in the evaluation of new technology, especially
in developing countries where the auditors ‘support in technical areas would
arguably be more paramount than areas where the business practice remains
relatively stable (Mihret & Woldeyohannis 2008).
24
the role of the internal audit function is determined by management or those
charged with governance. The objectives of management and those charged with
governance differ from those of the external auditor whose overall objective is to
obtain reasonable assurance about whether the financial statements as a whole are
free from material misstatement, whether due to fraud or error, and to report on the
financial statements in accordance with the auditor‘s findings. The objectives of
the internal audit function vary according to the requirements of management or
those charged with governance.
The internal audit function may achieve its objectives in a manner similar to that of
the external auditor. Accordingly, certain aspects of the internal audit function‘s
activities may be useful to the external auditor in determining the nature, timing
and extent of audit procedures to be performed, Goodwin (2004). Notwithstanding
its degree of autonomy and objectivity, the internal audit function is not
independent of management or the entity. The external auditor has sole
responsibility for the audit opinion expressed and, accordingly, that responsibility
is not reduced by the external auditor‘s use of the work of the internal audit
function‘. Therefore, there is no doubt neither party can do without the other; and
the work and success of one party is crucial to the success of the other. As a result,
the interaction between the internal and external auditors should contribute to IA
effectiveness, Mihret and Yismaw (2007).
Internal Audit as a Risk Management Mechanism
Value addition to the entity can be given by the internal auditors. It can be done by
giving assurance that its exposures regarding risk are properly managed and
understood (Leithhead, 1999). Internal audit need to play a vital role in monitoring
the risk profile of a company. Moreover, it should identify areas in order to better
the risk management procedures (Lindow & Race, 2002).
25
An internal audit can be helpful for organizations in identifying and evaluating
risks and putting the profession at the front line of the risk management (Walker et
al., 2003). Further, Kwan (1999) describes that within a company, development of
a risk based culture is required in order to build a strong organizational
commitment for risk management. This should result in the development of an
integrated risk management framework.
2.2.6 Internal Audit as a Control Mechanism
The management and directors of an entity adopt the process of internal control.
This process gives assurance about the achievement of the entity’s objectives
regarding financial reporting, operations and compliance with the regulations
(COSO Report, 1992). External auditing standards (Such as: AUS, 402 and ISA,
400) shows that the control environment can be strengthen by using effective
internal audit function by:
(i) Review of the internal control structure of a firm
(ii) On behalf of the management; monitoring different operations regarding
the information system and control procedures.
The asymmetry of information between divisional managers and senior managers
result in weakling the ability of the senior managers to firmly control operations.
The reason for this problem is the presence of internal agency costs (Ettredge et al.,
2000) which occurs between the upper management and the lower level staff
because of the incentive’s differences. So the use of strong internal controls system
including the internal audit for reviewing and monitoring mechanism. So keeping
this in mind, senior management can delegate their responsibilities in accordance
with the internal control to the internal audit function (Chambers, 1981).
2.2.7 Internal Audit as Internal Governance Mechanism
From the agency point of view, the role of strong governance within a firm lays by
aligning the management interests with the stakeholders in order to minimize
26
agency costs (Cohen et al., 2002). An independent board chairman, independent
directors on the board, internal audit, external audit and effective audit committee
are different corporate governance mechanisms used to monitor behavior of the
management (Cohen et al., 2004; Davidson et al., 2005). According to (Cohen et
al., 2004) the complex interactions within these governance mechanisms are like a
“corporate governance mosaic”. But problems between independent and executive
directors due to asymmetry information shows internal audit more likely as a
complementary mechanism. This is supported by determining evidences from the
researches examining the relationship between audit committees and internal audit
(Carcello et al., 2005). This is in accordance with the IIA view about internal
auditing; which helps organizations to improve and evaluate governance processes.
30
factors which create audit quality. Normative approach is also used in development
of accounting standards.
Deangelo (1981) for the first time considered the concept of auditing quality in
terms of descriptive aspects. He believed that auditing quality can be analyzed in
two dimensions: auditor capabilities explore the importance of errors and
distortions and the auditor capability to report errors and discovered distortions.
Other conceptual definitions of quality auditing are provided. For example, Zhou
(2007) considered auditing quality equal to quality of accounting standards,
accounting, accounting requirements and their disclosure. However, review of the
existing related literature suggests that public acceptance of these comments have
not been considered as much as Deangelo views. Other researchers such as Watts
and Zimmerman (1985) and Lee et al. (2003) also emphasized the definitions
provided by Deangelo. They considered the mentioned conceptual definition more
than any other definition in auditing literature. Although researchers accepted
Deangelo view and did not attempt to redefine the concept, they expanded the
definition and provided operational definitions in accordance with this concept that
will be discussed in the following views.
34
their auditors with professional skills in both accounting and performance sectors
Ahlawat and Lowe (2004).
2.2.11 Concept of Fraud
Fraud is a deliberate act (or failure to act) with the intention of obtaining an
unauthorized benefit, either for oneself or for the institution, by using deception or
false suggestions or suppression of truth or other unethical means, which are
believed and relied upon by others. Depriving another person or the institution of a
benefit to which he or she it is entitled by using any of the means described above
also constitutes fraud (http://sites.tufts.edu/amas/controls-compliance/fraud-
prevention/).
Fraud takes many forms. Some examples include: embezzlement, kickbacks, theft,
fraudulent financial reporting, environmental crimes, software piracy, bid rigging,
computer-related crime, identity theft, credit card fraud, check fraud, fraudulent
workers compensation claims, ghost employee schemes, expense report
schemes,“dummy” vendors, unreportedconflicts of
interest,etc(http://sites.tufts.edu/amas/controls-compliance/fraud-prevention/).
According to Adeniji (2004:354) and ICAN (2006:206), fraud is an intentional act
by one or more individuals among management, employees or third parties, which
results in a misrepresentation of financial statements. Fraud can also be seen as the
intentional misrepresentation, concealment, or omission of the truth for the purpose
of deception or manipulation to the financial detriment of an individual or an
organization which also includes embezzlement, theft or any attempt to steal or
unlawfully obtain, misuse or harm the asset of the organization, (Adeduro, 1998
and, Bostley and Drover 1972). Fraud has increased considerably over the recent
years and professionals believe this trend is likely to continue. According to Brink
and Witt (1982), fraud is an ever present threat to the effective utilization of
resources and it will always be an important concern of management. ISA 240
35
„The Auditor‟s Responsibilities to Consider Fraud in an Audit of Financial
Statement (Revised)‟ refers to fraud as “an intentional act by one or more
individuals among management, those charged with governance, employees or
third parties, involving the use of deception to obtain an unjust or illegal
advantage”. Aderibigbe and Dada (2007) define fraud as a deliberate deceit
planned and executed with the intent to deprive another person of his property or
rights directly or indirectly, regardless of whether the perpetrator benefits from his
or her actions.
2.2.12 Forms of Fraud
Weirich and Reinstein (2000 cited in Allyneand Howard 2005), define fraud as
“intentional deception, cheating and stealing”. Some common types of fraud
include creating fictitious creditors, “ghosts” on the payroll, falsifying cash sales,
undeclared stock, making unauthorized “write-offs”, and claiming excessive or
never-incurred expenses. Pollick (2006) regards fraud as a “deliberate
misrepresentation, which causes one to suffer damages, usually monetary losses”.
Albrecht et al (1995 cited in Allyne and Howard, 2005:287) classified fraud into
employee embezzlement, management fraud, investment scams, vendor fraud,
customer fraud, and miscellaneous fraud. Fraud also involves complicated
financial transactions conducted by white collar criminals, business professionals
with specialized knowledge and criminal intent (Pollick 2006). According to
Aguolu (2002), fraud can take place in one of two forms, which are either
defalcations or manipulations.
Defalcation is the misappropriation of a company’s assets. Manipulation is ether
the falsification of a company’s records or the improper use of the asset of the
company. Defalcation will often go with manipulations. Where the assets of a
company have been misappropriated, the offender will often after the records to
conceal the misappropriation. Manipulations on the other hand, may go without
36
defalcation. This may take the form of inflating the assets oromitting liabilities in
order to show a particular view. However, for the purpose of this paper, the forms
of fraud identified by Aguolu (2002) were adopted.
2.2.13 Financial crimes
Financial crimes cannot be precisely defined but can be described. No one
description suffices. Wikimedia dictionary describes financial crimes as crimes
against property, involving the unlawful conversion of property belonging to
another to one‟s owns. Williams (2005) incorporates corruptions to his description
of financial crimes. Other components of FCs cited in William‟s (2005) descrition
include bribes cronyism, nepotism, political donation, kickbacks, artificial pricing
and frauds of all kinds.
The array of components of financial crimes, some of which are highlighted above,
is not exhaustive. The EFCC Act (2004) attempts to capture the variety of
economic and financial crimes found either within or outside the organization. The
salient issues in EFCC‟s (2004) description include “violent, criminal and illicit
activities committed with the objective of earning wealth illegally… in a manner
that violates existing legislation… and these include any form of fraud, narcotic
drug, trafficking, money laundering, embezzlement, bribery, looting and any form
of corrupt malpractices and child labour, illegal oil bunkering and illegal mining,
tax evasion, foreign exchange malpractice including counterfeiting, currency, theft
of intellectual property and piracy, open market abuse, dumping of toxic waste and
prohibited goods, damage to the environment, etc.
This description is all-embracing and conceivably includes financial crimes in
corporate organization and those discussed by provision authors (William, 2005
and Khan, 2005). At the level of corporate organizations, financial crimes were
known to have led to the collapse of such organizations. Cotton (2003) as cited in
(Izedonmi, and Ibadin, 2012) attributes the collapse of Enron, WorldCom, Tyco,
37
Adelphia, to corporate fraud. $460 billion was said to have been lost. In Nigeria,
Cadbury Nig Plc whose books were criminally manipulated by management was
attributed to have lost 15 billion Naira. In the case of the nine collapsed
commercial banks in Nigeria, about one trillion naira was reported to have been
lost through different financial malpractice. This and other financial and economic
crimes are being investigated by EFCC under the EFCC Act (2004).
38
(2007), forensic accountants are trained to look beyond the numbers and deal with
the business realities of situations. Analysis, interpretation, summarization and the
presentation of complex financial business related issues are prominent features of
the profession. He further reported that the activities of forensic accountants
involve: investigating and analyzing financial evidence; developing computerized
applications to assists in the analysis and presentation of financial evidence;
communicating their findings in the form of reports, exhibits and collections of
documents; and assisting in legal proceedings, including testifying in courts, as an
expert witness and preparing visual aids to support trial evidence. In the same vein
Degboro and Olofinsola (2007) stated that forensic accountants provide assistance
of accounting nature in financial criminal and related economic matters involving
existing or pending cases. In financial crimes scenarios, the forensic accountant
must appreciate the seriousness of a situation and look beyond the game of
numbers. It must go beyond being a detective or regular accounting. The field of
forensic accounting is the product of forensic science and accounting, Crumbley
(2003) describes forensic scientists as the examiners and interpreters of evidence
and facts in legal matters. The science as used have according to Sadiq (2008)
involves the examination and interpretation of economic information. Forensic
accountant provides information that is used as evidence in the court of law. He
investigates, appraises and documents financial fraud and white-collar crimes
(such as embezzlement and frauds) by employees, management and other frauds or
crimes in the organization. He estimates losses, damages and assets
misappropriation and any other complex financial transaction. The whole process
ends in the production of report which is tendered to assist in legal adjudication.
The forensic accountants, in their investigation, use some investigative techniques
in financial crimes.
39
2.2.15 Measures of Fraud Management
2.2.15.1 Fraud Prevention
40
something hidden or obscure” (Webster, 1997, 1976, & 1941). Detection
encompasses three closely related activities in the fraud arena: fraud testing, fraud
attempts, and fraud successes. The separation is derived from the facts that not all
fraud attempts are successful and that not all perceived fraud attempts are intended
to be successful. These “tests” are attempts to reverse engineer the current fraud
policies and detection activities in order to locate vulnerability. Thus, detection in
the fraud arena must include revealing the existence of fraud testing and fraud
attempts, as well as successful frauds. The identification of testing, attempts, and
successes are typically clustered in the detection, prevention, and mitigation stages,
but are also relevant in each of the other stages of the Fraud Management
Lifecycle. Detection includes identification of a testing component, an attempt
component, and a success component.
Prevention is defined as, “to prevent, to stop or keep from doing or happening, to
hinder a person from acting” (Webster, 1997, 1976, & 1941). Prevent is a general
term meaning hindering, checking, or stopping. In the fraud arena the use of the
term prevention emphasizes both common forms of the definition, to keep from
doing and to hinder the fraudster from performing fraudulent activity. For the
purposes of this study the definition of prevention is to hinder, check, or stop a
fraudster from performing or perpetrating a fraudulent activity Wesley (2004).
.
Prevention stage activities are intended to prevent the fraud from occurring or to
secure the enterprise and its processes against fraud. The ability of prevention to
stop losses from occurring versus stopping fraudulent activity from continuing is
an important distinction. The latter activities are more appropriately mitigation
stage activities. Prevention, when perceived from a security perspective, can be
thought of as hardening the target. Prevention actions are frequently similar to
41
security activities in the information technology area. Deploying protective
procedures, processes, systems, and verifications, etc. that make fraud harder to
commit prevents fraud. Prevention activities are designed to make fraud more
difficult to commit. For example, the purpose of the many security features on
credit and debit cards is to make card based fraud more difficult, Wesley (2004).
42
4. Supervisors are selected and supervising tasks are divided with the aim who
will oversee an investigation on the middle level depending on the fact who
perpetrators are.
5. Legal Counsel may be appointed to supervise the investigation on the top level.
An investigation process comprises following activities:
1. Creating the plan of investigation,
2. detecting and analysing potential crime, preparing time schedule,
3. evidence collection,
4. interviewing,
5. findings summarized in a written- form protocol.
To create investigative plan is a good starting point. It enables the investigator to
prepare the steps how to approach the problem in an organized manner. The plan
should prioritize the performance of partial tasks to provide an interim report of
findings, if there is a need to prepare it, and to revise or plan next steps. The
investigation team approves what investigation tasks will need to be tackled and
distributes responsibilities and assigns the particular tasks to team members. The
following aspects should be considered in the plan:
a) the crime – first of all it is necessary to determine possible elements of the
crime and information that has to be collected to prove determined elements. In
this phase the case is assessed in terms of threat, risk, and vulnerability. The
parameters of the investigations are defined after the evaluating treat, risk and
vulnerability of the particular situations is done and listed. Time schedule for
investigation is prepared to fulfil legal requirements, to mitigate losses or potential
harm, or to fulfil conditions for submitting insurance claim.
b) materials - the investigator identifies what type of materials will have to be
reviewed to be prepared to investigate the crime e.g. determine and sum up
documents for review; processes to be learnt by investigator if needed (chemical
43
plant production, or sawmill operations etc); accumulate existing physical
evidence. All information collected needs to be kept confidential, protected against
being destroyed. Investigation should comply with applicable laws and rules
regarding collecting the information and interviewing witnesses. (Davia et.al,
1992).
According to ACFE evidence collection includes internal documents, such as -
personal files, internal phone records, computer files and other electronic sources,
email, financial records, security camera videos, physical and IT systems access
records and external records comprise e.g. public records, customer/vendor
information, media reports, information held by third parties, private detective
records, computer forensic examination. After gathering of evidence all
information will be analysed, including
1.review and categorization of information collected,
2.computer assisted data analyses and based on the results gained the phase of
development and testing of hypothesis will be implemented.
c) witnesses – availability of witnesses, the order in which witnesses should be
interviewed, existence of the suspect, determine the relations of witnesses to the
crime and to the potential suspect. “Interview is the main tool of investigation.
Interviewer must have following qualities:
A. Honesty, integrity and ability to persuade interviewees that the truth discovery
is important.
B. The ability to establish the rapport quickly and under the variety of conditions.
C. The ability to listen to interviewees and evaluate their responses and questions.
D. The ability to maintain self –control during interviews and not become
emotionally involved in the investigation. (Davia et.al., 1992).
Darina (2012) stated that investigations generally include interviews with neutral
third-party witnesses, corroborative witnesses, possible co-conspirators and the
44
accused. Interviewer should compose good questions that take into account the
background of the interviewee, that are short, simple and confined to the topic,
clear and easily understood, without sensational words e.g. confession, drug addict,
doper, stool pigeon, drunkard, emblezzer, not to evoke strong emotions, precise
and requiring a narrative answer. There are two methods to influence witnesses and
suspects’ state of mind:
1. Physical and mental abuse is an unjustified and illegal method in a democratic
society with human rights established that is sometimes used for interview.
2. Systematic interviewing is conducted in a friendly and humane atmosphere to
stimulate cooperation with the interviewee. The interviewed individual should
understand and feel that to speak the truth will be beneficial.
2.2.16 Relationship Between Internal Audit and Fraud Management
At today’s level of development, internal audit is a key participant in the system of
corporate governance. By introducing a systematic and disciplined approach,
internal audit is aimed at supporting and strengthening the mechanisms of
company management, as well as assessing and improving the effectiveness of risk
management and control processes (www.theiia.org). More specifically, internal
audit is expected to be focused on assessing the risks that could adversely affect
the organization, as well as on the establishment of a mechanism that will monitor
and control that risk, with a view to its elimination, or, at least, reduction Đukić
and Đorđević (2014).This role of internal audit means that it is a function that
knows all the processes in the company, the risks to which the company is
exposed, and internal control and the persons who carry out this control, which is
why its potential and ability to achieve high effectiveness in preventing and
detecting fraud is recognized. In this respect, the IIA Standards oblige internal
audit to, “in determining the objectives of its engagement, assess and take into
account the potential possibility of fraud” (ISPPIA 2210.A2) and “...assess the way
45
in which the company manages the risk of fraud” (ISPPIA 2120.A1). For these
reasons, today, the companies increasingly focus their programs, aimed at reducing
fraud, on internal audit, which is seen as the first line of defense, i.e. significant
management tool that ensures the protection of the company from internal criminal
behaviour Nestor (2004).
However, despite the obvious great potential of the internal audit to prevent and
detect fraud, and, in that regard, the expectations that have been placed before it,
the question arises as to how much internal auditors are actually really up to the
challenge in practice. The question arises because the Standard 1210.A2 itself
stipulates that “internal auditors must have sufficient knowledge to assess the risk
of fraud and the way in which the company manages that risk, but they are not
expected to have a level of expertise as the person whose primary responsibility is
detecting and investigating fraud”. So, with twelve years of experience in this
profession, Hodge (2012) recognizes that, in some cases, internal auditors have not
adequately responded to this task. In her view, the problem resides in the fact that
internal auditors do not really understand what it means to incorporate the
understanding of the risk of fraud into their work, not in the fact that they are
incompetent, negligent, or that there is some other reason why they are not able to
contribute to the prevention and detection of fraud. Some auditors interpret the
Standard requirements in the sense that they do not have too much responsibility to
prevent and detect fraud – they are not required to be fraud investigators, while
others are convinced that they possess the required knowledge, while reality is
actually the opposite. Based on her own experience, Hodge further states that the
understanding of the fraud risks is the individual responsibility of each auditor,
which is why they should constantly bear in mind their role in managing the risk of
fraud, and continually increase their knowledge about ways of preventing and
detecting fraud. A similar attitude was taken by DeZoort and Harrison (2008)
46
indicating that the level of responsibilities of internal auditors in preventing and
detecting fraud is, in fact, determined by their perception of the responsibility they
should have. Starting from the model of the triangle, first applied by Schlenker et
al. (1994), DeZoort et al (2008) investigated the effect of different types of fraud
(manipulation in financial statements, misuse of funds, and corruption) and the
professional obligation of application of standards on the internal auditor’s
responsibility to prevent and detect fraud. According to the triangle model,
personal responsibility of internal auditors is conditioned by the extent to which an
individual: (1) has a clear, welldefined set of regulations (standards, rules,
policies...), (2) feels a professional obligation, and (3) feels the connection with the
event by controlling it (there is an intention and possibility to establish and apply
specific measures as regards perpetrators). Starting from this model, results
obtained by DeZoort indicate that internal auditors show a higher degree of
responsibility for the prevention and detection of fraud relating to the misuse of
funds in relation to fraud related to the financial reporting process and corruption.
So, although the Standards of internal audit do not distinguish between types of
fraud that internal auditors should pay attention to, their perception of possibility to
control misuse of funds is perhaps the most pronounced. In addition, the study
results point to the position of internal auditors, based on which the highest degree
of responsibility for detecting fraud should be in the hands of the company bodies,
rather than the bodies outside of it (for example, external audit). However, at the
same time, internal auditors hold the position that the highest professional
responsibility belongs to the company management, accountants, and then the
internal auditors. Bearing in mind that the effectiveness of internal audit is largely
determined by the auditor’s personal attitude, knowledge, skills, etc., there are a
number of seminars, workshops, and conferences nowadays, which emphasize the
need for improvement of internal auditors in this area. More specifically, the
47
internal auditors are expected to: (1) become familiar with the work of the specific
part or process that is audited, in connection with possible acts of fraud,
characteristic of the subject of audit; (2) in work always apply professional
scepticism, i.e. deeper examination and critical evaluation of the findings, starting
from the assumption that managers or employees are neither honest nor dishonest.
CHAPTER THREE
RESEARCH METHODOLOGY
50
3.0 Introduction
Research methodology defines what the activity of research is, how to proceed,’
measure progress and what constitutes success. It forms the framework which
specifies the type of information to be collected and the source of data and data
collection.
The various areas that were examined in this chapter are as follows:
Research design
Population of the study
Sample technique
Sample size determination
Validity and Reliability of the Research Instrument
Operational Measures of the Variables
Data collection technique
Data analysis technique
51
The research design is the method and plan used to collect data and test
relationship between the variable hypothesized (Baridam, 2001). In other words, it
has, been considered as a “blue print” for research, da1ing with at list four
problems: what question to study, what data are relevant, what data to collect and
how to analyze the result.
For the purpose of this study, a cross sectional survey design, a sub set of quasi
experimental research field survey of some selected insurance companies in Rivers
state.
Basically the population of this work encompasses the top managers, HODs and
employees of this selected insurances companies in Nigeria. These insurance
companies and their branches were chosen because of their closeness to the
researcher’s location.
52
Therefore, the total population of the study is 103
N
n = 1+ N ¿ ¿
where,
N = population size
N
n = 1+ N ¿ ¿
53
103
n = 1+ ¿ ¿
103
n = 1+(103 x 0.0025)
103
n = 1+ 0.2575
103
n = 1.2575
n = 81
Therefore, the sample size of the study is 81 which consist of managers, HODs and
employees
The research used two sources of data in carrying out this research namely: the
primary source and the secondary source.
Questionnaires
Personal observation
Interview
The secondary source of data used in order to support findings includes textbooks,
journals, internet, newspapers etc.
54
The instrument for data collection was a questionnaire. The questionnaire was
divided into two sections, A & B. Section A was used to gather demographic
information of the respondents, while section B was further divided into parts, 1,
2 ,3,4 & 5 Each sections was assigned a five response options of strongly agree
(SA), agree (A), Neutral (N), strongly disagreed (SD), and disagree (D) with a
corresponding value of 5,4, 3, 2 and 1.
To ascertain that the instrument was reliable, that is, able to consistently elicit the
same information from the respondents, the researcher adopted the test re-test
technique. 15 copies of the questionnaire were administered to 15 respondents not
participating in the study. The instrument was re-administered to the same
respondents within an interval of two weeks. The responses (results) of the first
and second tests were collated and subjected to a reliability test using the Pearson
Product Moment Correlation Analysis. The result obtained yielded a reliability
index of 0.8, using a cronbach alpha indicating high reliability of the research
instruments.
55
3.9 Operational Measures of the Variables
The major variables for the study are internal audit techniques measured by size of
the internal audit, qualification of the internal audit and quality of audit work.
While fraud management is measured by fraud prevention and fraud investigation.
The data obtained from a study may or may not be in numerical or quantitative
form, that is, in the form of numbers. If they are not in numerical form, then we
can still carry out qualitative analysis based on experience of the individual. On the
other hand, if they are in numerical form, we start, by working out some
descriptive statistics to summarize the pattern of findings.
The data analysis techniques used in this study includes the Pearson correlation
method coefficient (rho) was used to test the stated hypotheses at a 95% (0.05)
level of significance. The rationale for this decision was due to the fact that the
researcher seeks to examine the relationship between internal audit techniques and
fraud management.
r= N∑ xy – (∑ x ¿( ∑ y )
[N∑x2 – (∑x)2][N∑y2 – (∑y)2]
56
Where
N = number of pairs of scores
∑ xy = Sum of the products of paired scores
∑ x = Sum of x scores
∑y = Sum of y scores
∑x2 = sum of squared x scores
∑y2 = sum of squared y scores
The statistical package for social sciences (SPSS) was also used in analyzing the
data.
57
CHAPTER FOUR
4.1 Introduction
and simple percentage methods. Further, the hypotheses were tested with statistical
package for social sciences (SPSS) version 21 using Pearson Correlation analysis
in other to examine the relationship between the independent variables and the
dependent variables. Data were obtained with the help of the questionnaire
designed for the study. The result of the analysis carried out would be used to draw
This chapter will also provide the interpretation of the data which will be discussed
b. Data Analysis
c. Test of hypotheses
d. Discussion of findings
58
4.2 Data Presentation
Data generated from the field will in this section be presented in table and figures.
A total of 81 copies of questionnaire were distributed to employees of the selected
insurance firms in Rivers State.
Table 4.1 above shows that a total of 81 copies of questionnaires were distributed
amongst employees (staff) comprising of employees within the top, middle and
lower managerial echelon of the selected insurance firms. Out of the 81 copies of
questionnaire administered, only 70 copies returned were considered useful, this
accounted for 86.4% responses rate. Due to obvious mistakes and incomplete
responses, 4 copies representing 4.9% were discarded, while 7 copies representing
8.7% could not be retrieved due to misplacement and other reasons given by the
respondents. Therefore, the total response rate that formed the basis of our analysis
was 70 copies representing 86.4% response rate.
59
4.2.1 DEMOGRAPHIC ANALYSIS
Gander
Frequency Percent Valid Percent Cumulative
Percent
Male 52 74.3 74.3 74.3
Valid Female 18 25.7 25.7 100.0
Total 92 100.0 100.0
Source: Survey Data (2018)
In table 4.2 above, it shows that 52 (or 74.3%) of the respondents are male while
18 (or 25.7%) of the respondents are female.
Age
Frequency Percent Valid Percent Cumulative
Percent
20-29 years 19 27.1 27.1 27.1
30-39 years 22 31.4 31.4 58.5
40-49 years 15 21.4 21.4 79.9
Valid
50-59 years 12 17.1 17.1 97.1
60 and above 2 2.9 2.9 100.0
Total 70 100.0 100.0
Source: Survey Data (2018)
Table 4.3 made us to understand that 19 (or 17.14%) of the respondents are within
the age range of 20-29 years, 22 (or 31.4%) are within the age range of 30-39years,
15(or 21.4%) are within 40-49 years, 12 (17.1%) are within the age range of 50-59
years while 2 (or 2.9%) are in the age range of 60 years and above.
60
Table 4.4 Percentage Distribution of Respondent’s Marital Status
marital status
From the above table of marital status, we observed that 51 of the respondents are
single representing 55.4% and 41 of the respondents are married representing
55.6% of the total respondents.
Educational qualification
From the table above, O’Level represent 30.9%, OND/HND represent 56.4%, B.sc
61
Table 4.6 Percentage distribution of respondent’s numbers of years in the
Organization
The table above shows the numbers of years the respondents has been with the
organization. Respondent who has spent 1-5 years in the organization were 31
representing 44.3%, 6-10 represent 35.7%, while 11-15 years in the organization
represented 20% of the total 70 respondents.
The table above shows the managerial position of the respondents. Top managers
represents 21.4%, middle managers are 28.6% while the Lower manager represents
50% of the total respondents.
62
4.3 Data Analysis
Univariate Analysis on the Dimensions of Internal Auditing Techniques and
Measures of Fraud Management in Insurance Rivers State.
Table 4.8
S/N Quality of internal audit work (5) (4) (3) (2) (1)
SA A N D SD
M1 The quality system of our organization is 25 16 10 12 7
defined
M2 Current procedures are in line with national 37 18 8 4 3
standards
M3 Our audit work are usually scrutinized by 30 24 11 5 0
industry experts
S/N Size of the internal audit
63
M7 There is written code of ethics business 21 25 13 6 5
conducts
Table 4.8 shows the response of 70 respondents on their opinion on internal audit
techniques and fraud management under study with reference to (quality of internal
audit work, internal audit size, qualification of the internal audit) and (fraud
64
quality of audit work, size of the internal audit, qualification of the internal audit,
fraud prevention and fraud investigation. Results revealed that 40.6% of the
respondent strongly agreed to the 1050 questions, 32.3% agreed to the questions,
11.7% were neutral to the questions, 10.6% disagreed while 4.9% strongly
management. This implies internal audit techniques have positive impact on the
fraud management.
When data are collected, the essence is to examine the relationship that exist
between the data collected and the hypotheses that were stated for the test to see
whether the perceived notion about the population before the research work holds
or not.
In testing each hypothesis that had been stated on this study, we use the available
The research statistics used for this study is the Pearson correlation analysis, while
the Z test was used to test the level of significance. This is because of the large
0.05 with the aid of Statistical Package for Social Sciences (SPSS).
65
Rejection Rule:
Accept H0 if p-value ≥ α
The tested hypotheses were interpreted through the Dana’s (2001) correlation
decision framework. Where
± 1 (Perfect)
While testing the hypothesis 2-tailed test was used and the significance level was
5% (0.05).
Decision rule:
If p-value is greater than alpha value, accept the null hypothesis and reject the
alternate.
66
If p-value is less than alpha value, reject the null hypothesis and accept the
Correlations
N 70 70
Decision:
From the result above, the correlation coefficient (r = 0.897) between size of the
internal audit and fraud prevention has a strong positive linear relationship. The
coefficient of determination (r2 = 0.80) indicates that 80% of fraud prevention can
be explained by size of the internal audit. The significant value of 0.000 (p< 0.05)
reveals a significant relationship. Based on that, the null hypothesis was rejected.
This implies that, there is a significant relationship between size of the internal
67
Decision rule:
If p-value is greater than alpha value, accept the null hypothesis and reject the
alternate.
If p-value is less than alpha value, reject the null hypothesis and accept the
Correlations
N 70 70
Decision:
From the result above, the correlation coefficient (r = 0.915) between size of the
internal audit and fraud investigation has a strong positive linear relationship. The
can be explained by size of the internal audit. The significant value of 0.000 (p<
0.05) reveals a significant relationship. Based on that, the null hypothesis was
rejected. This implies that, the size of the internal audit has significant impact with
fraud investigation.
68
Table 4.11 Statistical Analysis for Hypothesis Three
H03: There is no significant relationship between qualification of the internal audit
and fraud prevention.
Decision rule:
If p-value is greater than alpha value, accept the null hypothesis and reject the
alternate.
If p-value is less than alpha value, reject the null hypothesis and accept the
Correlations
Qualification of Fraud
the internal audit prevention
N 70 70
Decision:
From the result above, the correlation coefficient (r = 0.911) between qualification
of the internal audit and fraud prevention has a strong positive linear relationship.
69
The coefficient of determination (r2 = 0.83) indicates that 83% of fraud prevention
0.000 (p< 0.05) reveals a significant relationship. Based on that, the null
Decision rule:
If p-value is greater than alpha value, accept the null hypothesis and reject the
alternate.
If p-value is less than alpha value, reject the null hypothesis and accept the
Correlations
Qualification of Fraud
the internal audit investigation
N 70 70
70
Decision:
From the result above, the correlation coefficient (r = 0.899) between qualification
of the internal audit and fraud investigation has a strong positive linear
that, the null hypothesis was rejected. This implies that, the qualification of the
Decision rule:
If p-value is greater than alpha value, accept the null hypothesis and reject the
alternate.
If p-value is less than alpha value, reject the null hypothesis and accept the
71
Correlations
N 70 70
Pearson Correlation .963 1
N 70 70
Decision:
From the result above, the correlation coefficient (r = 0.963) between quality of
internal audit work and fraud prevention has a strong positive linear relationship.
The coefficient of determination (r2 = 0.93) indicates that 93% of fraud prevention
can be explained by quality of internal audit work. The significant value of 0.000
(p< 0.05) reveals a significant relationship. Based on that, the null hypothesis was
72
Decision rule:
If p-value is greater than alpha value, accept the null hypothesis and reject the
alternate.
If p-value is less than alpha value, reject the null hypothesis and accept the
Correlations
N 70 70
Pearson Correlation .926 1
N 70 70
Decision:
From the result above, the correlation coefficient (r = 0.926) between quality of
internal audit work and fraud investigation has a strong positive linear relationship.
The coefficient of determination (r2 = 0.86) indicates that 86% of fraud
investigation can be explained by quality of internal audit work. The significant
value of 0.000 (p< 0.05) reveals a significant relationship. Based on that, the null
hypothesis was rejected. This implies that, the quality of the internal audit work
has significant impact with fraud investigation.
73
4.5: DISCUSSION OF FINDINGS
The first hypothesis (Ho1) stated that there is no significant relationship between
size of the internal audit and fraud prevention. This was tested at 5% significance
level using Pearson correlation coefficient. The result from our analysis showed a
p-value of 0.000 while the alpha value was 0.05, therefore, following the decision
rule the null hypothesis was rejected and the alternate hypothesis accepted which
state that there is a significant relationship between size of the internal audit and
fraud prevention. Our analysis also showed correlation coefficient of 0.897 and
The second hypothesis (Ho2) stated that the size of the internal audit has no
level using Pearson correlation coefficient. The result from our analysis showed a
p-value of 0.000 while the alpha value was 0.05, therefore, following the decision
rule the null hypothesis was rejected and the alternate hypothesis accepted which
state that there is a significant relationship between size of the internal audit and
fraud investigation. Our analysis also showed correlation coefficient of 0.915 and
coefficient of determination of 84%. This implies that the size of the internal audit
74
The third hypothesis (Ho3) stated that there is no significant relationship between
qualification of the internal audit and fraud prevention. This was tested at 5%
significance level using Pearson correlation coefficient. The result from our
analysis showed a p-value of 0.000 while the alpha value was 0.05, therefore,
following the decision rule the null hypothesis was rejected and the alternate
qualification of the internal audit and fraud prevention. My analysis also showed
The fourth hypothesis (Ho4) stated that the qualification of the internal audit has no
significant impact with fraud investigation.
This was tested at 5% significance level using Pearson correlation coefficient. The
result from our analysis showed a p-value of 0.000 while the alpha value was 0.05,
therefore, following the decision rule the null hypothesis was rejected and the
81%. This implies that the qualification of the internal audit has significant impact
75
The Fifth hypothesis (Ho5) stated that there is no significant relationship between
quality of internal audit work and fraud prevention. This was tested at 5%
significance level using Pearson correlation. The result from our analysis showed a
p-value of 0.000 while the alpha value was 0.05, therefore, following the decision
rule the null hypothesis was rejected and the alternate hypothesis accepted which
state that there is a significant relationship between quality of internal audit work
and fraud prevention. Our analysis also showed Pearson correlation to be 0.963
positive relationship between quality of internal audit work and fraud prevention.
The sixth hypothesis (Ho6) stated that the quality of the internal audit work has no
This was tested at 5% significance level using Pearson correlation. The result from
our analysis showed a p-value of 0.000 while the alpha value was 0.05, therefore,
following the decision rule the null hypothesis was rejected and the alternate
quality of internal audit work and fraud investigation. Our analysis also showed
implies that the quality of the internal audit work has significant impact with fraud
investigation.
76
CHAPTER FIVE
5.0. INTRODUCTION
In this chapter, we will provide a summary and discussion of our findings, and
draw conclusions as well as make recommendations for possible future
research.
5.1. SUMMARY OF FINDINGS
The findings of this research revealed that significant relationship between internal
audit technique and fraud management in quoted insurance companies in Nigeria:
1. There is a strong positive relationship between size of the internal audit and
fraud prevention.
2. The size of the internal audit work has significant impact with fraud
investigation.
4. The qualification of the internal audit has significant impact with fraud
investigation.
6. The quality of the internal audit work has significant impact with fraud
investigation.
77
5.2. CONCLUSION
Using the method as described in chapter three to analyze the questions and a test
into the hypothesis provided by both the conceptual and theoretical framework in
prior chapters, The study examined intensively using very scientific providing
analysis into the relationship between internal audit techniques and fraud
management in quoted insurance companies in Nigeria. The study therefore shows
a strong positive significant relationship between size of internal audit and fraud
prevention. By implication of this firms that tend to implement internal audit
techniques tend to experience increasing performance. However, all of the
examined relationships proved significant.
78
5.3. RECOMMENDATIONS
Based on our findings, and conclusions above, we make the following
recommendations:
1. The researcher advices that firms should establish fraud policy and have a fraud
governance structure in place that assigns responsibilities for fraud investigations.
2. That the management should incorporated appropriate controls and skills to
prevent, detect, and investigate fraud.
3. That the management and the internal audit activity periodically assess the
effectiveness and efficiency of fraud controls.
4. That the management should ensure fraud investigation work papers and
supporting documents appropriately secured and retained.
1. The study was conducted in Port Harcourt. Similar study should be conducted in other
2. The study is limited to insurance firms in Port Harcourt. Future studies should duplicate
same in other sectors like health sector, banking sector, educational sector, and large
3. Also, the study should make use of other variables to measure internal audit techniques
4. The study should make use of other variables to measure fraud management other than
79
REFERENCES
Chambers, A.D. (1981), Internal Auditing: Theory and Practice, Pitman, London.
Clark, M, Gibbs, T & Schroeder, R (1981) CPAs judge internal audit
department objectivity', Management Accounting, 62, (8), 40-3.
80
Gay, G & Simnett, R 2007, Auditing and assurance services in Australia, Revised,
3edn, McGraw-Hill Australia, Sydney.
Goodwin, J (2003). The relationship between the audit committee and the internal
audit function: Evidence from Australia and New Zealand', International
Journal of Auditing, 7, (3) 263-78.
Kwon, IWG & Banks, DW (2004). Factors related to the organizational and
professional commitment of internal auditors. Managerial Auditing Journal,
19 (5) 606-22.
Leithhead, B.S. (1999). Managing change and size risks. Internal Auditor, .56
(6)68-9.
Libby, R & Frederick, DM 1990, 'Experience and the ability to explain audit
findings', Journal of Accounting Research, 28, (2) 348-67.
Lindow, P.E. and Race, J.D. (2002), “Beyond traditional audit techniques”, Journal
of Accountancy, 194 (1) 28-33.
81
Marx, KH (1976) Capital: a critique of political economy, Penguin Classics,
London.
Sawyer, L.B. (1995). An Internal; Audit Philosophy. Internal Auditor, 12, (3) 180-
200.
82
APPENDIX
Section A
Please kindly fill in your opinion by ticking the appropriate box. Each question
should only have one answer.
Demographic Characteristics.
8. Which of these appropriate the number of years your firm has been in operation:
A. 1-5yrs ( ) B. 6-10yrs ( ) C. 11-15yrs ( ) D.16-20yrs ( ) E. 21 and above ( )
83
SECTION B
Tick (√ ) in the box the option that best explains your opinion.
84
develop themselves
S/N Fraud prevention (5) (4) (3) (2) (1)
SA A N D SD
85