Professional Documents
Culture Documents
R2117455Q Dissertation Recall Jirivengwa Final
R2117455Q Dissertation Recall Jirivengwa Final
The undersigned certify that they supervised the dissertation of Recall Jirivengwa
risk management practices and whistle blower system on fraud detection in small
and medium enterprises in the retail sector: a case study for Mupandawana. The
University.
--------------------------------------------- -----------------------------
SUPERVISOR DATE
------------------------------------------------- ------------------------------------
CHAIRPERSON DATE
[i]
RELEASE FORM
Project title:
An assessment of the effects of fraud risk management practices and whistle blower system
on fraud detection in small and medium enterprises in the retail sector: a case study for
copies of this dissertation, lend and sell such copies for private, scholarly or
scientific purposes only. The researcher reserves other publication rights and
SIGNED: R. Jirivengwa
[ii]
DECLARATION
own work and research except to the extent indicated in the acknowledgement,
references and report in the body of the report and that it has not been submitted
institution.
R Jirivengwa
[iii]
DEDICATION
I dedicate this work to the Almighty God for his favour, and to my wife Beauty and my two boys
Alvin and Ashley for their support and cooperation. The project is also dedicated to my parents,
Hosea and the late Raviro for being wonderful parents. I would want to thank my supervisor for
[iv]
ABSTRACT
The study sought to assess the effects of fraud risk management practices and
whistle blower system on fraud detection in small and medium enterprises in the
retail sector in Mupandawana. The structured questionnaire was used as the main
research instrument. The “Likert five-point ranking scale was used for items in the
questionnaire. The study was done including small and medium enterprises in the
selected through random sampling. The researcher used pilot testing was done to
test validity and reliability of the data collection instrument. The SPSS version
16.0 was used to analyse the data in the research. Internal consistency of the
variables that is how closely related a set of variables are as a group was done using
Cronbach’s alpha. Data from the study was presented using percentages,
frequencies, tables and figures. The researcher got authorization from the university
and consent from respondents before carrying out the study. The study found out
that small and medium enterprises were exposed to electronic transfer fraud and
accounts receivable fraud to a large extent. The researcher also found out that fraud
risk management practices were effective in preventing fraud in small and medium
enterprises.
[v]
ACKNOWLEDGEMENTS
I wish to acknowledge the assistance I got from the following people who made it
possible for this document to be put together. First, my family who gave me moral
support and encouragement when temptations to quit the project were high. I further
acknowledge the profound assistance I got from the Midlands State University staff
Lastly, I appreciate the assistance I got from fellow students, workmates and
friends.
[vi]
Table of Contents
[vii]
2.6 Chapter Summary.............................................................................................................. 32
CHAPTER THREE ...................................................................................................................... 33
RESEARCH METHODOLOGY.................................................................................................. 33
3.0 Introduction ......................................................................................................................... 33
3.1 Research Philosophy ........................................................................................................... 33
3.2 Research design ................................................................................................................... 34
3.3 Research Method ................................................................................................................. 34
3.4 Population and Sample ........................................................................................................ 34
3.5 Research Instruments .......................................................................................................... 36
3.6 Data Sources ..................................................................................................................... 37
3.7 Data Collection Procedures ................................................................................................. 37
3.8 Data validity and reliability ................................................................................................. 38
3.8.1 Reliability ......................................................................................................................... 38
3.8.2 Validity ............................................................................................................................. 38
3.9 Data Presentation and Analysis Procedures ........................................................................ 39
3.9.1 Data Analysis ................................................................................................................... 39
3.9.2 Data Presentation.............................................................................................................. 40
3.10 Ethical Considerations....................................................................................................... 40
3.11 Chapter Summary.............................................................................................................. 41
CHAPTER 4 ................................................................................................................................. 42
DATA PRESENTATION, ANALYSIS AND DISCUSSION ..................................................... 42
4.0 Introduction ......................................................................................................................... 42
4.2 Reliability analysis .............................................................................................................. 43
4.3 Social and demographic information .................................................................................. 44
4.3.1 Gender of the respondents ................................................................................................ 44
4.3.2 Age of respondents ........................................................................................................... 45
4.3.3 Respondents’ qualifications ............................................................................................. 46
4.3.4 Work experience .............................................................................................................. 46
4.3.5 Main activities of the business ......................................................................................... 47
4.3.6 Fraud Risk Management Department .............................................................................. 48
4.3.7 Fraud Risk exposure and prevalence ................................................................................ 49
4.3.8 Effectiveness of Fraud risk management practices in SMEs ........................................... 50
4.3.9 Whistle blower protection practice .................................................................................. 51
4.4 Chapter summary ................................................................................................................ 53
CHAPTER 5 ................................................................................................................................. 54
[viii]
SUMMARY, CONCLUSIONS AND RECOMMENDATIONS................................................. 54
5.0 Introduction ......................................................................................................................... 54
5.1 Executive summary ............................................................................................................. 54
5.2 Summary of major findings ................................................................................................ 54
5.2.1 The amount of exposure to fraud risks in small and medium enterprises ...................... 55
5.2.2 The effectiveness of fraud risk management practices among small and medium
enterprises.................................................................................................................................. 56
5.2 3 the effect of whistleblower policies on employee fraud .................................................. 56
5.3 Conclusions ......................................................................................................................... 57
5.4 Recommendations ............................................................................................................... 57
5.5 Areas of further study .......................................................................................................... 58
REFERENCES ............................................................................................................................. 59
[ix]
CHAPTER ONE
INTRODUCTION
1.0 Introduction
The aim of this study was to assess the effects of fraud risk management practices and whistle
blower system on fraud detection in small and medium enterprises in the retail sector in Gutu.
Employee fraud is increasing in Zimbabwe and affects firms regardless of size. According to
CIMA (2018) it is estimated that organisations may be losing as much as 7% of their annual
turnover to fraud. Employees have been known to commit fraud against employees such as payroll
fraud, false expense claims and cash theft. The small and medium enterprises need to mitigate
This chapter outlines the background to the study, the statement of the problem and looks at the
objectives of the study. The research questions, significance of the study and the assumptions
under which the study were carried out are also covered in this chapter. The limitations which the
researched faced in this study are covered in this chapter together with the scope of the study. All
the key definitions which were necessary for the carrying out of this study are covered in this
study. The chapter ends with a summary of what was covered in the study.
Small and medium enterprises are important engines in driving the economies of both developing
and developed countries. Small and medium enterprises employ few persons and are characterised
a relatively small amount of capital and turnover. According to ACFE(2018) the number of frauds
and the amounts involved are ever increasing. Organisations have been trying to mitigate losses
incurred from fraud through the implementation of fraud risk management practices such as
1
The small and medium enterprises are more vulnerable to fraud because of lack of internal controls
and also lack of expertise by the management. Fraud is according to Tarjo (2021) a deliberate and
intentional act by a group or individual to cause harm to organization done secretly. It is aimed at
creating a personal gain for oneself and to create a loss to another. There are three main categories
of fraud that affects organisations regardless of size are asset misappropriations which involve
According to BDO (2020) a typical organization loses 5% of its revenues to fraud. Employees at
The Zimbabwean economy is characterised by many SMEs which are mostly found in the informal
sector. The small grocery shops coined “tuckshops” are mostly found in the informal sector. The
small and medium enterprises tend to be family owned and run and therefore trust amongst
employees and the owners tend to be high. This trust has led to the incidence of fraud occurring.
The high incidence of fraud has led to some small and medium enterprises to adopt fraud risk
The study’s objectives is to investigate the effect of employee fraud management practices on
fraud detection in small and medium enterprises. The Small and medium enterprises are more
This study aims to establish how weak internal control systems contributes to employee fraud.
Internal control systems tend to deter fraud. Collusion between small and medium enterprises and
third parties is determined in this study. It examines how whistleblower facilities influence
Small and medium enterprises are defined by the Small and Medium Enterprises Act of Zimbabwe
(24:12) as a business employing 6-72 people and has an annual turnover of US$500 000 to US$3
million. These enterprises are important to the Zimbabwean economy as they employ 75% of the
2
workforce. According to the Financial Tribune SMEs contributed $8, 58 billion to the country’s
Fraud in small and medium enterprises are more vulnerable to fraud and have led to their failure.
Chapman (2022). The ICAEW (2022) guideline warned that fraud is becoming cyber-enabled
because the internet is giving fraudsters more opportunities to infiltrate companies. This has
increased their success rate when carrying out fraud. The success rate is high because the small
and medium enterprise managers are gullible and often follow unsecured websites which results
Some small and medium enterprises are more vulnerable to fraud due to the nature of their services,
for example retail shops. In the United Kingdom, 44% of small business are targeted for fraud.
Employee fraud
The ACFE (2018) defines occupational or employee fraud as a situation whereby a person uses
employee theft or fraud is responsible for a third of all business bankruptcies. The small business
Employee fraud tend to have disastrous consequences to all stakeholders. It tends to be committed
by employees who have a strong understanding of the business and have the power to override
The incidence of fraud are ever increasing in all countries, Zimbabwe included. In Malaysia
according to PwC (2020), 68% of the fraud were committed by employees and 35% was committed
by collusion with third parties. Fraud committed by non-managerial employees include but is not
limited to embezzlement, petty theft, bribery, corruption, misappropriation of assets and computer
fraud. Dadzie-Dennis et al (2018) Fraudulent activities are costly to small and medium enterprises
as they lack cover for losses incurred. Nawawi and Salim (2018).
3
Employee fraud in Zimbabwe
Muleya (2022) noted that employee fraud is mainly perpetrated by managers, accounts clerks,
cashiers and sales representatives. He attributed the increases to lapses in company’s lapses in the
security system.The increase in the usage of the internet have led to an increase in fraud threats
In Zimbabwe companies have lost a lot of funds in fraud and robbery through collusions between
employees and third parties, The ZB Bank in 2021 lost USD2,5 million when its employee
Shadreck Njowa colluded with third parties and faked an armed robbery.Fraud is occurring in
firms which includes asset misappropriation and corruption. Asomaning (2019) stated highly
effective fraud risk management practices leads to an improvement in bank performance. He noted
that the fraud risk management practices were effective in mitigating fraud risk,
Chimwene (2017) noted that employee fraud is wide spread and collusion of employees led to
creation of phantom participants who obtained undeserved benefits. The businesses are losing a
lot of funds from employees who commit fraud for several reasons amongst them greediness.
Businesses regardless of size have to find ways of mitigating the effects of fraud. This will include
having fraud risk management practices such as anti-fraud strategies measures, internal control
measures and physical measures such as employing security guards in place. This will minimize
or eliminate the losses resulting from fraud. Hussain (2019) found out that fraud risk management
has a positive relationship with bank performance. Wanjiru(2020) in his studies found out that
only preventative and corrective controls have a negative effect on the degree of fraud.This study
aims to find out the effects of fraud risk management on fraud detection on small and medium
enterprises. It aims to find out if there are any effects on fraud detection of fraud risk management.
4
1.2 Problem Statement
Many small and medium enterprises faces the possibility of fraud occurring every day.
According to ACFE (2020) eighty-nine per cent of the fraudsters have are first time offenders and
therefore it is difficult to use trend analysis to predict the likelihood of fraud occurring in a firm.
There is need to have a strong fraud risk management policy in place to reduce the risk of loss
resulting from the commission of fraud. According to BDO (2020) fraudster possess characteristics
that align to top performing employees. There is need to reduce the incidence of fraud and
therefore fraud risk management is one of the key practices which are used to reduce fraud. There
have several researches on fraud risk management practices. However there is limited literature on
the effects of fraud risk management practices on fraud detection in small and medium enterprises.
This study seeks to find the effects of fraud risk management on fraud detection.
Main objective
The main objective of this study is to examine the effectiveness of the fraud risk management
(i) To explore the amount of exposure to fraud risks in small and medium enterprises
(ii) To identify the fraud risk management practices in small and medium enterprises
(iii) To ascertain the effectiveness of fraud risk management practices among small and
5
1.4 Research questions
The following research questions were formulated in order to achieve the objectives of the
study:
(i) What is the amount of fraud risk exposure in small and medium enterprises?
(ii) What are the fraud risk management practices in place in small and medium enterprise?
(iii) Are fraud risk management practices effective in reducing employee fraud in small and
medium enterprises?
(iv) What are the effects of the whistleblower policies on employee fraud in small and
medium enterprises?
The study will add to existing literature through original work through original work which
will address the effects of fraud risk management practices by small and medium enterprises
in Zimbabwe. This literature will act as a reference starting point for future researchers.
The study will be helpful to government departments who aim to support small and medium
enterprises. SEDCO for example will use the information generated from this study to advice
the SMEs managers and employees to prevent fraud and when setting up fraud risk
management practices.
The Zimbabwe Republic Police (ZRP) will use this study in the prevention of fraud by knowing
The owners and senior managers of small and medium enterprises will get to know the types
of fraud risks affecting their firms. This knowledge will be used in structuring strategies to
mitigate fraud risks and also used when running the businesses. The knowledge will enable the
small and medium enterprises to reduce their level of exposure to fraud risk thereby ensuring
fraud risks as well as the investors’ perception of fraud risks in small and medium enterprises.
Employees who will be whistleblowers will benefit from this study as it offers information on
The employees will also use the study as reference material on recognizing fraud and the
The majority of the respondents will cooperate and respond to questionnaires addressed to
them.
The sample is representative of the population and the findings from the sample will generalise
the population
1.7 Delimitations
Delimitations are parameters and factors which affect the research study which the researcher can
control. They have an influence on the study. The retail sector in Zimbabwe has many small and
medium enterprises. These research study was restricted to Mupandawana growth point because
of resource and time constraints. The research study was restricted to a randomly selected sample
1.8 Limitations
Price (2017) defined limitations as possible constraints or weaknesses of the research study. The
researcher faced the following limitations during the course of the study.
7
1.8.1 Resentments from respondents
Some of the participants approached by the researcher did not trust the researcher at first as they
suspected him to be a law enforcement officer. The researcher had to convince them that the
research was purely for academic purposes. The owners and the employees eventually cooperated
The researcher had a busy schedule at work, family time and study time. The researcher had to
sacrifice time in order to carry out the study. The respondents also faced time constraints as they
operated long working hours and every day. They sacrificed their busy working schedule to
The following terms and abbreviations were used to facilitate easy and consistent interpretations
Small and medium enterprises – They are firms which employ less than 50 workers
Fraud – the use of intentional dishonesty to achieve a financial advantage over another party.
Fraud risk- the risk of unexpected financial, material or reputational loss as a result of fraudulent
8
CHAPTER 2
LITERATURE REVIEW
2.0 Introduction
This chapter looks at the effect of fraud risk management practices on fraud detection in small and
medium enterprises. The areas covered in this chapter includes the concept of fraud, fraud risk
The chapter will also carry an examination of other theoretical literature and a review of the
literature on the effects of fraud risk management on fraud detection in small and medium
enterprises.
The study is based on Fraud Theories and Risk Management. Fraud occurs in all organization
regardless of their size and geographical location. The reasons why people commit fraud are
varied and there are theories which have been developed in trying to explain why employees
commit fraud. There have been measures which have been developed to try to eliminate fraud.
There have been several theories which seeks to explain why people or employees commit fraud.
The theories aim to explain the reasons why people commit fraud whether they are in position of
trust or not. People commit fraud for different reasons which tend to be universal regardless of
geographic location, language, and culture or ethnic background. These theories have developed
over the years and have included new interesting dimensions on the reasons why people commit
9
2.1.1.1 Fraud Triangle Theory
It is a theory which was developed by Donald Cressey in 1953 which explains the factors that lead
Cressey from his interaction with 250 criminals found out that there are three factors or conditions
that enable employees to commit occupational fraud. The criminals interviewed met two
conditions which are the acceptance of a position of trust in good faith and the violation of the
trust by the criminal. These three factors interact with each other and are not independent of each
Pressure
According to Natalis (2019) pressure is the pressure to commit a criminal act such as fraud. It
may relate to a non-shareable financial need. The need may result from money problems, gambling
debts and alcohol or drug addiction. It may be viewed as a financial or emotional force pushing
towards fraud. This need remains secret to the violator of the trust and the criminal perceive
themselves as having a need which cannot be sanctioned socially. They believe that no person will
understand their need thus it remains secretive. The pressure may only be temporary, but it may
push a person to do things they would not normally do. ACIPA (2019) identified financial targets
,personal financial need and external financial stability as the types of pressure or motivation which
can a person to commit fraud. The pressure may come from within the potential fraudster him or
herself or it may come from the environment. In Zimbabwe the economic environment and the
low salaries have been a factor which has led to an increase in fraud cases. The increase in drug
abuse which is increasing can also be sighted as a pressure which can lead to the commitment of
fraud. Several writers have classified the pressure into different categories but which tend to be
interrelated. The pressure can come from three main sources which are personal pressure resulting
from lack of personal control which leads to a secretive personal pressure. This may result from
10
financial and nonfinancial personal pressure. Nonfinancial personal pressure include pressure
because of lack of financial discipline and greediness and these are non-shareable because they are
Opportunity
It is a chance to commit fraud without being caught by management or authority. It arises due to
person who commits fraud usually sees an opportunity and reasons that he will not be caught by
the person who entrusted him with the organisation’s assets. The opportunity will allow the fraud
to take place without the offence being noticed. The criminal believes that the opportunity provides
ample time for him to carry out the offence without being noticed .Opportunity cannot be observed
and therefore remains in the background. Opportunities exist in the perception and mind of the
criminal. Opportunity refers to the ability and power of an employee to realize the weaknesses of
the
organizational system and taking advantage of it by making fraud possible. The perpetrator should
be able to identify the existence of an opportunity which he can take advantage of to commit fraud.
The fraud even when pressure is there if an opportunity does not exist. An opportunity to commit
11
fraud may exist because of things such as negligence of employee’s breach of policies and lack of
Rationalisation
This occurs when an employee tries to justify his criminal intentions. It is the most difficult factor
to measure. Kanu et al (2020). The perpetrator will formulate some idea which is morally
acceptable before engaging in selfish and unethical behavior such as committing fraud.
Rationalisation is taken as excuses and justifications that the fraud perpetrated is different from
criminal activity carried out by others. He tries to justify the commitment of the offence and aim
to get sympathy from other members of the society. A person is unlikely to commit fraud if he or
she cannot justify the immoral and unethical actions. He can justify his actions using the following
statements for example “I was borrowing the money and would pay back later” or “I wanted to
pay medical bills for my parent or child.” Rationalisation is difficult to identify or notice as the
mind of the perpetrator cannot be read. It is a justification for fraudulent behaviour because the
employee lacks personal integrity or moral reasoning and will therefore act unethically. A person
will commit fraud if he lacks ethical values and the ability to commit the fraud also depends on his
personal attitudes.
12
According to Sprague (2018) at least two of these fraud triangle elements must exist in order for
fraud to be successfully carried out. The elements identified by Cressey are used by managers in
order to eliminate fraud. There is need to reduce pressure on employees for example by trying to
give employees a salary which reduces the financial needs of the employee. Emotional stress or
force can be reduced by covering the employee’s social needs for example by showing concern
for the employee’s social wellbeing. The organization may use the fraud triangle as a guideline in
order to eliminate the opportunity to commit fraud. They may implement measures such as
internal controls and other preventative controls such as establishing a code of conduct which gives
employees guideline on how to conduct themselves in the organization. The Cressey’s Fraud
However, some theorists have criticized Cressey’ theory arguing that each fraud case has its own
unique factors which are not necessarily classified under the Fraud Triangle Theory. It is difficult
to observe rationalization and pressure when fraud takes place but the theory remains important in
reducing fraudulent behavior. The changes in the environment, both technologically and socially
have also led to fraud rather than the three factors.Burkey and Sarney (2018) criticized the theory
on the ground that it does not take into account ethics which has a bearing on the people’ decision
making process.
There is a second theory which developed because practitioners felt that the fraud triangle was
unable to solve fraud issues because pressure and rationalisation are difficult to be observed. It
is a refinement of the Fraud Triangle called Fraud Diamond theory. This theory was proposed by
Wolfe and Hermanson in 2004. Vousinas (2019). The theory still believes that for fraud to take
place there is need for a non-shareable pressure or motivation, an opportunity exists and the
perpetrator can justify or rationalize his or her actions. The three conditions as per Fraud Triangle
13
were also encompassed in this theory. The four components of the fraud diamond are shown in the
Pressure Opportunity
Rationalisation Capability
Capability
It was added as the fourth dimension to pressure, opportunity and rationalization. The fraud will
take place if the right people with the right abilities to commit fraud are in place. Capability is
the personal skills and characteristics of fraud perpetrators which play an active role for fraud to
be carried out in the presence of pressure, rationalisation and opportunity. It is a situation whereby
a person who has the necessary skills, traits and abilities to commit fraud. The skills include the
ability to deceive people. The fraudster will have a motive and would have identified an
opportunity and will use his abilities to turn it into a reality to commit fraud. Wolfe and Hermanson
identified position, ego, coercion, stress, deceit and intelligence as the elements which supports
capability.
Capability of a person to commit fraud includes his expertise to exploit opportunities and also to
tell lies and ability to force others to hide or commit fraud. Artani and Wetra (2017) Fraud is less
likely to occur without having the right person with the right skills to execute manipulation of
information. According to Nugradeni and Triatmoko (2016) there are six elements which fraud
perpetrators which are position, intelligence, level of self-confidence or ego , lying effectively ,
14
stress immunity and coercive immunity. Capability is of particular importance when carrying high
value or long term frauds. Rationalisation and capability are interrelated and the strength of each
element influences the others. The function or position of the perpetrator in the organization
enables capability to commit fraud. The position and the role played by the perpetrator may be a
The other dimension of the capability is the intelligence level of the perpetrator. Intelligence comes
into play when the fraudster understands and is capable of exploiting internal control weaknesses
and to use his position, function or authorized access to his greatest advantage. Intelligent, creative
and experienced people are able to get a full grasp of the controls and their vulnerability and will
commit high value and long term fraud. According to ACFE (2020) about 51% of the occupational
fraud perpetrators has at least a first degree and 49% were over 40years of age which means the
fraud perpetrators were educated and experienced. The fraudster has great confidence and strong
ego that he will not be detected and believes that he can easily pull himself out of the mud. The
estimated cost of fraud to the fraudster is lower the more confidence the fraudster is. A person with
ego is one who has the zeal to succeed at all costs and is self-absorbed and self-confident. Fraud
perpetrators tend to have strong ego and great confidence that they will not be detected.
Coercion, deceit and stress also related the qualities needed by the fraudster to be capable to carry
out fraud. A successful fraudster is able to coerce others to commit or conceal fraud. Capability
also includes the ability to lie effectively and consistently. In order to avoid detection, the fraudster
must be able to convincingly tell people including auditors lies. The fraudster must be able to
handle stress as the fraudulent act and its concealment tend to be stressful.
The Fraud Triangle and Fraud Diamond Theories are necessary when formulating strategies to
reduce the occurrence of fraud in small and medium enterprises. The fraud risk management
policies formulated will be premised on these two theories. However, the Fraud Triangle and
15
Diamond Theories have the limitation that they do not take into consideration ethics which drive
people’s decisions Burkey and Sanney (2018). Bartels (2018) defined ethics as a set of principles
guiding people’s decisions and behaviours within a specified circumstance. Ethics are what the
society generally considers to be right or wrong and are therefore moral guidelines. According to
Mansor and Abdullahi (2017) the absence of personal integrity could lead people to commit fraud
and therefore the reasons why people commit fraud is not only limited to pressure, opportunity,
2.2.1 Fraud
ACFE (2018) defined fraud as any activity which relies on deception to achieve a gain at the
advantage of another. The fraud will become a criminal offence when misrepresentation is made
knowingly of the truth or when a material fact is concealed in order to induce another to act to
ACFE (2021) defines occupational fraud as the use of a person’s occupation to enrich him or
herself through the deliberate and intentional misuse or misapplication of the employing
an organization.
Norazida M et al (2021) divided occupational fraud into management fraud and employee fraud.
However there is no clear distinction between management and employee fraud.This study is
restricted to misappropriation of assets which includes theft of company’s assets, false expense
16
2.2.3 Fraud Tree
ACFE classified occupational fraud into three subgroups: Corruption, Asset Misappropriation and
Financial Statement Fraud. In this study the researcher concentrated on the asset misappropriation
category as it is the most common type of occupational fraud accounting for 89%. ACFE (2018)
Adapted from ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse.
17
Asset misappropriation
It is the most commonly occurred fraud type in organization. It includes misuse and theft of assets.
It is carried out by third parties or employees who abuse their position to steal from the
organization through fraudulent activities. It includes stealing of trivial items such as ball point
points to large scale misappropriation of assets. These type of fraud is committed by people
entrusted with holding and managing the assets and interests of an organization and its employees.
The fraud triangle subdivided the asset misappropriation into theft of cash on hand , theft of cash
receipts and fraudulent disbursements. Theft of cash involves the stealing of cash convert it to
corporation’s assets by employees from which it may incur losses. Said et al (2018) The business
will incur losses resulting from the actions of its employees. The fraud results from deception and
its aim by the employee is to gain an unfair advantage at a disadvantage to his or her employer.
Employee fraud is the main reason why small businesses fail and it negatively affect business
operations. Bunn et al (2019) It leads to closure of business and loss of jobs and negatively affect
the economy through reduced demand, unemployment and reduced taxes and output. Fraud also
has a psychological effect on employees because of the trust amongst the employees.
from an honest person’s profile. Othman and Ameer (2022). The person who is likely to commit
fraud is difficult to detect. According to BDO (2021) eighty percent of the employees will either
steal or not depending on their rationale and ten per cent will steal at any opportunity.
18
Oluwatuyi (2019) defined fraud as an illicit and nonviolent criminal activity which is committed
Fraud risk management is the set of any planned activities and measures taken to reduce risk
including fraud risk. Apreku-Djan (2022) The activities are designed with the objective of
The enterprises may put in place policies designed to prevent, detect and respond to fraud. Wininda
et al (2019) . The purpose of fraud prevention policies is to help to prevent risks including fraud.
These prevention policies including having a Code of conduct, carrying out a third party due
Fraud detection policies will be put in place in order to find fraud and misconduct whenever they
occur.
A part of fraud risk management policies are the fraud response policies whose purpose is to take
appropriate corrective actions when fraud takes place such as investigations, enforcement actions.
The Fraud Management Lifecycle Theory is dynamic theory which was promulgated by Wesley
in 2004. It identified eight stages followed in fraud risk management and which is not necessarily
in order. Effective fraud management requires a balance in the competing and complementary
actions within the fraud management lifecycle. These stages or activities determine the success or
19
The first stage is deterrence which involves actions and activities whose purpose is stop or prevent
fraud from taking place. This activities may include physical security or even requiring passwords
The second stage is prevention which activities and actions which aim to prevent fraud from
occurring. The firm can prevent fraud from occurring through measures such as having an audit
committee which works hand in hand with the internal audit department. Some of the measures
which prevent fraud such as carrying out proper due diligence on new customers and new
employees
Detection is the third stage is a set of actions and activities which aim to uncover or reveal the
presence of fraud or an attempt to defraud the organization. The fraud or attempt is identified
Mitigation is the fourth stage which is meant to stop the occurrence of a loss from fraud. It is
carried out in order to hinder a fraudster from continuing or completion of any fraudulent activity.
This activity is done to discourage potential fraudsters from committing fraud to the detriment of
the organization.
Gathu(2018) cited policy activities as the sixth stage. The activities done involve the creation,
evaluation and communication in the deployment of policies which are meant to reduce fraud
incidences
The organization will carry out an analysis in order to determine the factors which resulted in the
loss occurring.
The seventh stage of the Fraud Management Practices is the investigations which involves
obtaining sufficient information and evidence in order to stop fraudulent activities and obtain
restitution or to recover assets. This involves the provision of evidence and support for the
20
The last stage is prosecution which involves the successful conviction of the fraudster. Gathu
(2018)
COSO (2016) sets out the five principles of fraud management which the organization can follow
The small and medium enterprises must prepare and communicate fraud risk management
program to senior management including the board of directors in order to get their
There is need for the small and medium enterprise will conduct an inclusive and
comprehensive fraud and risk assessment, These assessments are carried out in order to
identify risk and fraud schemes and assess the probability of significant fraud occurring
The organisation selects, develops, and disseminates preventive and detective fraud
control activities. These activities aim to reduce the risk of fraud occurring or not
potential fraud
21
2.3.4 Fraud Risk Management Techniques
Several fraud risk management techniques are used within the organization to minimize fraud
.The techniques include management style, fraud detection and deterrence procedures, internal
Fraud policies
A fraud policy is a document that sets out procedures and responsibilities to be followed in trying
A statement stating that all effort will be made by the organization to obtain assets
fraudulently acquired
Anti-fraud strategy
According to Trodovic (2020) it is a policy which aims to reduce or eliminate fraud .It is
In an anti-fraud strategy the fraud risk management must contain five key functions as
follows:
There is need to carry out an assessment of fraud risk for critical places and people exposed
to fraud possibility, for example in a grocery shop an assessment will be carried out at the
22
Fraud prevention procedures and methods need to be established in order reduce fraud risk.
In small and medium enterprises these measures maybe in form of physical measures such
as restricting physical entry through employing security guards and the use of passwords.
Fraud detection methods and procedures need to be put in place. These measures will help
There is need to put in place a fraud reporting process. This enables a quick response to
Lastly, there is need to adopt a policy that will ensure the implementation of programs to
Hussein and Hilal (2021) set out the following as best practices to minimize fraud risk:
There is need to ensure compliance with the policies and procedures which would have
put in place
Ethical behavior of the employees must be defined. Ethics is what the society generally
There is need to incorporate fraud awareness through orientation among new and
existing employees. This fraud awareness program will deter employees from
23
2.3.5 Whistleblowing
former employee reports unethical or illegal action such as fraud in an organization to those people
who can correct these actions. Whistleblowing involves ethics since people who are ethical tend
to report behavior which can harm an organization or the society. Whistleblowing is carried out in
public interest. Employees will be free to whistle blow if the firm has developed a culture of ethics,
Whistleblowing plays a major in the detection of fraud. ACFE (2018) reported that 43% of the
occupational fraud is detected by tip from employees and outsiders.An organization need to
develop whistleblower policies and procedures in order to encourage whistleblowing and also to
deter fraud. Whistleblowing is beneficial to the organization since it helps to prevent harm to the
Whistleblowers prefer to have their identity remain anonymous, that is they don’t want to be
exposed. Kumar and Santoro (2017) It takes a lot of courage for someone to reveal fraudulent
information. Whistleblowers prefer to remain anonymous because they fear the reprisal such as
to reduce or eradicate fraud. It is carried out in order to expose illegal, immoral or illegitimate
The Sarbanes-Oxley Act and Committee of Sponsoring Organisations (COSO) both recommends
the use of whistleblowing policies for internal control purposes. Small and medium enterprises
will have to put in place measures which encourage employees to report acts of misconduct or
fraud.
PwC (2020) recommends the firms to develop whistleblower policies and procedures in place. The
24
Complement and add value to the existing communication channels between employees
Make sure that disclosures made in confidence are properly investigated and dealt with
decisively and
Make sure that all the relevant disclosures are reported properly to top management
The setting up of whistleblowing policies and procedures will help in making employees aware
of the whistleblowing procedures which encourage employees with morality to blow the
whistle.The whistleblowers will report fraud when they feel that they can report fraud if they
are reporting to people with the power and willingness to action. Employees are unwilling to
blow the whistle as it may result in the whistleblower losing a career, or be isolated by others.
Rustiarini and Merawati(2020) suggested that employees will be encouraged to blow the
whistle if the employees believe that there is organizational justice within the organization.
There are several ways of blowing the whistle and Maulida (2021) noted that Jabor Banten
Bank in Indonesia can make anonymous whistle blows through the bank’s website. The
whistleblowing policy should state the procedures which can be used in reporting fraud.
Whistleblowing is done in the public interest and should take precedence to the employee’s
Saputra (2020) stated that employees will be motivated by morality when they blow the
whistle. Whistleblowing must be done in confidence and the disclosure must be made in good
faith.
25
2.4 Empirical literature review
This section presents review of related literature from previous studies on employee fraud in
businesses, weak internal control systems, fraud risk management, whistleblower protection
Hussein and Hilan (2021) looked at the impact of risk management on reducing financial fraud.
He used questionnaires which were distributed to 252 respondents. The research found out that
Asomaning (2019) assessed the effectiveness of fraud risk management. He used structured
questionnaires which he distributed to 100 bank employees. He found out the level of fraud risk to
be low in banks. He attributed the low fraud occurrence to fraud risk management.
Internal control systems influence employee fraud management in small and medium enterprises
according to Chimwene (2017). She carried out a census survey and used 478 questionnaires to
Kariuki (2017) carried out research to assess fraud risk management and financial sustainability in
non-governmental organisations operating in Kenya. His research found out that fraud risk
Gathu (2018) carried out a research on the effects of fraud risk management practices on medical
aid in Kenya. He found out that from a survey of 120 respondents that fraud risk management
tends to reduce fraudulent claims in medical aid. There is a possibility of researching the topic ib
Norazida et al (2021) researched on the factors influencing employee fraud in Malaysian banks.
The study was carried out using survey research. They issued 130 questionnaires to bank
employees and investigated on the effect of Fraud Pentagon Fraud theory. They found out that
26
pressure, opportunity, rationalization and capability all have a positive influence on employee
fraud.
Wanjiru and Ndegwa (2020) used a positivist research philosophy and a casual research design to
investigate the effects of preventative controls on fraud occurrence in listed companies in Kenya.
They used a sample of 320 managers and used regression analysis and found out that preventive
Tarjo and Anggoro (2021) investigated the effect of fraud risk management implementation on
fraud prevention. They used questionnaires which were issued to 163 respondents and he found
Forensic accounting has a significant effect on the detection of fraud according to Oluwatuyi
(2019). Oluwatuyi carried out a study on the effects of forensic accounting on the detection of
fraud in public sector. He carried out the survey by issuing 238 questionnaires to sample chosen
Chimwai and Munyanyi(2019) carried out a study on the risk attitude , risk perception and risk
management strategies adoption in Zimbabwe. They carried out the research by issuing 288
questionnaires to respondents. They found out that perceived risk and risk attitude both have a
positive and significant relationship to the adoption of risk management strategies. If they view
the risk to be significant the owners and senior managers will introduce fraud risk management
strategies.
Thamada et al (2021) used questionnaires and secondary data to analyse how small and medium
enterprises perceive risk. They found out that sound risk management identifies and manages all
the risks including fraud risk that affect business growth and sustainability.
Sunarti et al (2020) carried out a research on the use of fraud risk management as an anti-fraud
model in Bali , Indonesia. He used interviews and observation in tourist resort areas. His study
27
concluded that organisations with no clear lines of authority and no separation of duties are prone
to fraud.
Artati and Noviyanti (2020) used experimental research design to find an alternative fraud model
and auditor risk preferences. The study found out that the use of the Pentagon Fraud model will
Karanja (2018) used descriptive explanatory study and questionnaires to study the effects of fraud
risk management practices on the level of activity by an agent bank in Nairobi , Kenya. The study
concluded that fraud risk management practices reduced fraud occurrences and were effective in
mitigating fraud.
Hussain and Baker (2019) studied the effects of risk management, risk culture on the performance
of the banking sector. He used theoretical literature review and that there was a positive
Al Qubtan et al (2021) carried out a research with the primary data being collected through
interviews. The study was on the practical risk management approaches used by small and medium
enterprises. The study concluded that most SMEs are employing the bottom up model whereby
the problems are solved as they are brought to the attention of the supervisors or managers dealing
with fraud.
Department of Health in eThekwini District South Africa. The study was on the efficiency and
effectiveness of fraud risk management in the Health department. The study discovered that
Shahzad et al (2022) looked at the role of formalization of risk management methods among
perceived business risk and organization performance. He used questionnaires and found out that
the performance of the organization has a significant positive relationship with al components of
28
Karunaratane (2018) studied that impact of enterprise risk management on the firm’s performance
in Sri Langa financial institutions. He used convenient sampling method and used survey
questionnaires from 45 respondents. The study concluded that enterprise risk management had no
Wibowo and Tobing (2021) carried out a study on the implementation of fraud risk assessment
and antifraud strategy in government institutions. They used case study approach, questionnaires,
interviews and focus study groups to gather information. They concluded that there are several
Van der Heijeden (2021) carried out a study to find out if there is a relationship between an
employee’s position and the easy to commit fraud. He used interviews and questionnaires and the
study found out that fraudsters tend to be highly educated and the education placed them in a better
position and improves the ability of a person to spot internal control weaknesses.
Rinendy (2017) looked at the effects of organizational trust to reduce employee fraud risk. He used
a survey research design and questionnaires. The conclusion of the study was that employee trust
Petersen (2018) carried out an investigation on the effectiveness of internal controls activities in
combating occupational fraud risk in SMEs. The study was carried out using questionnaires and
interviews. The study concluded that firms with ineffective controls were at the risk of
occupational risk.
Korletey (2018) looked at the causes of employee fraud in the banking sector in Ghana. The data
was collected using questionnaires administered to 250 employees from 20 selected banks.
Interviews were also used to collect data. The study found out that ineffective corporate culture
29
Jassey (2020) carried out a research study to look at the factors determining employee behavior.
The primary data was collected by distributing questionnaires to employees who work in finance.
The study concluded that ethical corporate culture has no significant effect on employee fraud.
Moummer et al (2020) carried out a study on the impact of applying fraud detection and prevention
instruments in reducing occupational fraud. He carried out the study using questionnaires. He used
a sample of 501 supervisory employees of the Ministry of Health in Gaza strip. He found out that
fraud detection and prevention instruments reduced the incidences of occupational fraud.
Oluwatuyi and Akinwumi (2019) carried out a research study on the effect of forensic accounting
on the detection of fraud risk indicators. He used analytical and descriptive research survey whilst
studying the indicators in public enterprises in Ondo State in Nigeria. He found that forensic
accounting had a significant effect with regards to the detection of fraud risk. The study also
concluded that the effective use of forensic accounting could help in the detection of fraud risk
indicators.
Kultanen (2017 carried out a study and found out that people commit fraud because of low incomes
their social class. The research study was carried out from randomly selected employees at a
Su Myint Mho (2019) carried out a research study on the effects of internal controls in reducing
fraud in SMEs. He used questionnaires as a research instrument. The conclusions of the study were
that small and medium enterprises should maintain internal controls in order to reduce fraud.
Aladejebi and Oladimeji (2019) gave questionnaires to 200 small and medium enterprise owners
when he was studying the effects of fraud risk management in Lagos, Nigeria. His study concluded
that firms should implement fraud prevention measures such as societal values to reduce fraud.
Davis and Harris (2020) carried out a research study on the strategies which could be employed to
detect and prevent occupational fraud in small retail businesses. He used multiple case study
30
research design and interviews and observations. The study found out that the owners could reduce
fraud by using video monitoring, employee identification cards and separation of duties to deter
Ozlem (2018) carried out a research study comparing whether recent proactive approaches and
credible control frameworks are superior to traditional methods for fraud examination. The
findings were that developments in technology made hard controls obsolete. He carried out a
research involving using questionnaires which were filled in by randomly picked employees.
Akuh (2017) carried out a study on the strategies which can be used by small retail businesses to
detect and prevent employee fraud. He used multiple case study and interviews and found out that
Chakabva (2015) carried out a study on the effectiveness of risk management practices in SMEs
in Cape Town .He issued questionnaires to microfinance providers and the study concluded that
risk management frameworks which provide an all-inclusive approach to risk management are
Drabkova(2018) used a case study the look at the fraud risk management from the percepective of
the CFEBT Risk Triangle. The study concluded that there was an interconnection between certain
31
2.5 Research gap
There have not been much research on the effects of fraud risk management on small and
medium enterprises in rural areas or growth points. The researcher also noted that there few
researches done on the level of awareness of fraud management practices in small and medium
enterprises in Zimbabwe,
The next chapter looks at the research methodology. This encompasses the research philosophy
and research design used in the study. The chapter will also look at the research instruments and
32
CHAPTER THREE
RESEARCH METHODOLOGY
3.0 Introduction
Chapter three presents the methodology used in the study in order to achieve research objectives.
This chapter will look at the research philosophy and design. In this chapter the researcher will
look at the research methods used, and how the population was sampled. The data sources, research
instruments, the data collection procedures and data validity and reliability are also covered in this
chapter.
A research philosophy is defined as the belief the way in which data or information about a
phenomenon should be gathered, analysed and used. Tsung E.W.K (2016) The researcher opted to
use the Positivist research philosophy. The researcher chose the positivist because the social world
which was observed can be understood in an objective manner. In this research the assumption is
that the effects of fraud risk management practices on fraud risk can be observed in an objective
manner.The researcher chose the positivist research philosophy because it enables him to be
objective and he was able to dissociate himself from his personal views and was able to work
independently. Nickerson (2022)The belief by positivists that the reality is stable and can be
observed described objectively made the researcher to choose the philosophy. Zukauskas (2018)
33
3.2 Research design
Tsung (2016) defined a research design as a plan and way of how the questions in the study will
be answered. The researcher used descriptive survey research design. This method is ideal as the
researcher could gather information and summarise the information. The information summarized
was then presented and interpreted in order to explain the trends in the population.The advantage
of the descriptive survey design is that it allows the researcher is to study a number of variables to
The quantitative method was used in the research rather than the qualitative method. It was chosen
because it is objective when we tabulate the results of the survey from the questionnaires. The
reactions of people during the interview and on questionnaires can be tabulated and a conclusion
reached. The quantitative method facilitates comparison and aggregation of data from the research.
The findings can be presented clearly and economically if the quantitative method is used. The
quantitative approach provides the foundation for testing the research hypothesis,
The research used descriptive in this study is explanatory as it seeks to investigate the effects of
Shukla (2020) defined as a set or group of all the units on which the findings of the research
are to be applied. The entire number of SMEs operating in the retail sector in Mupandawana
growth point is the population. The researcher carried out a census of all the trading entities in the
growth point. There are more than 77 small and medium enterprises in Mupandawana , Gutu
District. The retail sector covered grocery shops, hardware shops, leisure spots and repair shops.
Grocery shops sell fast moving foodstuffs and small household goods. The hardware shops sell
34
mostly building materials and small tools. The table below shows the population of shops in
Mupandawana.
Target population
Groceries 50 7 350
Hardware 20 4 80
Supermarkets 2 10 20
Construction 5 10 50
Total 77 154
The whole population or items of interest cannot be studied due to legal, time, financial and other
resource constraints. The existence of these constraints necessitated the researcher to study a
sample of the population rather than the whole population. Shukla (2020 defined a sample as a
subset of the population which represents all the elements and characteristics of the population.
The results of the sample can then be generalized over the whole population. A properly selected
sample will be representative of the population it represents. However there is a possibility that
the sample may not be a true reflection of the population due to factors such as bias in the selection
process and failure to recognize underlying factors such as the population subgroups for example
Sampling technique
There are two main types of sampling, probability sampling and non-probability sampling.
Probability sampling is a sampling method, in which subjects are selected without any bias and
all the units of population have equal or predetermined and certain probability to be
35
selected in a sample. Non-probability sampling results in bias when selecting the sample and tends
not to be representative. The researcher used a census sampling technique .In census survey, the
researcher uses all people in the target population as the sample. The researcher had to use random
sampling in choosing the respondents for the survey. There are 430 employees in the groceries and
hardware small and medium enterprises to choose from. The researcher took 10% of the employees
as a sample. There were 43 employees who were interviewed and were given questionnaires.
The researcher gave the sampled respondents questionnaires. The questionnaire was deemed
appropriate because of time constraints and was deemed inexpensive. The questions in the
questionnaire were closed ended. These questions provided optional answers for easy to fill so as
to get as many responds as possible. The questionnaire comprised of four sections. The first section
requires demographic information about the respondents. The background on demographic details
were required in order to understand the respondents. The other sections contains questions
relating to fraud management, internal control, employee collusion with outsiders and the
whistleblower system. The researcher used questionnaires as they were not time consuming and
The use of the questionnaires was used because it has the following advantages:
Anonymity enables the respondents to freely respond and fill the questionnaire freely
The use of close ended questions allows uniformity of responses which makes data analysis
easier
The use of questionnaires enables respondents from distant places to fill in the
questionnaires. In this case Mpandawana covers a total of roughly 5 kilometers from the
36
Central Business District in all directions. This means that the respondents were covering
Disadvantages
The questionnaires are mainly meant for literate people who can easily decipher and answer
The use of closed questions in the questionnaire limited the alternative responses to be
given by the respondents. The respondents were unable to explain some of their responses.
The use of questionnaire allowed the researcher to allow standardization of answers which
enables speedy capture of data information. The use of close-ended questions reduced respondent
bias and allowed the researcher to limit the number of answers to only those relevant for the study.
The researcher in this study used information from other sources which is secondary data as
The primary data from the questionnaires was also used to carry out research which relates to the
local situation. Primary data means that the data is being collected for the first time and will be
The researcher used secondary data sources such as the internet to make an assessment by looking
at past related literature. The different secondary sources allowed the researcher to identify bias
Dudovskiy (2022) defined data collection as a process whereby information is collected from all
relevant sources in order to find answers to the research problem, hypothesis testing and outcome
evaluation. The questionnaires were distributed to group of respondents randomly selected for the
37
study. The researcher made the appointments with research respondents by personal contact or
through Whatsapp. He had to visit the respondents and hand in the questionnaires personally after
explaining the purpose of the study. The respondents were given ample time to complete the
The self-completion technique allows the participants to fill out the questionnaire at their own
convenient time and also to adequately answer all questions on the research instrument. The
questionnaires were retrieved from the participants personally for sorting and data analysis.
3.8.1 Reliability
Reliability is the extent to which the research results are consistent over time and it provides an
The researcher subjected the study’s research instruments to a pilot study to establish their
reliability. In this pilot study, the research instruments were subjected to the test-retest method.
The research instruments were tested and retested on a sample of 12 respondents. It was
administered twice to the same people in a space of a fortnight and their responses were checked
3.8.2 Validity
Validity is done in order for a data collection instrument in this case questionnaire to see whether
it accurately measures what it was intended to measure as per objectives b89 the current study.
38
The researcher applied content validity to determine the extent to which the different items in the
The researcher in this study checked the validity of the instrument, by preparing the first instrument
for trial and sought opinion on content, format of the questionnaire from the supervisor and fellow
students.
Internal validity
Internal validity is the extent to which the study design, conduct and analysis answer the research
questions without bias. In this study the researcher had also to seek opinion from the supervisor
External validity
External validity refers to extent to which results from a study can be applied or generalized to
other situations. Chitaranjan (2018) In this study fraud risk management practices can be applied
Face validity
Face validity refers to the extent to which the study appears to measure what it is expected to
measure. Cornell (2022) The use of the questions which require Agree Strongly Agree, Disagree
The researcher made use of both descriptive and inferential statistics to analyse data. The
frequencies, standard deviation and mean are some of the descriptive statistics used in presenting
the findings of the study. The average response of all the respondents on the ranking scale is mean
value.
39
The spread of the responses on the scale is represented by standard deviation whilst the profile of
Standard deviations and mean were used to present the level of exposure of small and medium
enterprises to fraud, the fraud risk management practice and effectiveness of level of small and
medium enterprises and factors affecting the effectiveness in fraud risk management.
The researcher used pie charts to show the demographic factors such as age, education level and
the gender of the respondents. The pie chart is eye catching and it simplifies the presentation of
the data. Pie charts are easily constructed by using Microsoft Excel program.
Frequency tables were used because they are relatively easy to read and interpret. The data fits
when a frequency table is used. The use of bar graphs will congest the page which will make it
difficult to interpret the information. Frequency tables will show the different types of scales in
the study.
The researcher undertook the study after getting approval from both Midlands State University
and employees and owners of small and medium enterprises. The study was explained to all
potential respondents and the researcher sought a written consent from respondents before their
participation. He advised the participants of their right to opt out of the study.
The researcher assured the respondents of their anonymity and confidentiality during the course
of study. The names of the participants were not to be written on questionnaire. The data collected
was securely stored by the researcher under lock and key. The researcher assured the participants
that the information obtained was for the purposes of learning only.
40
The researcher ensured honesty and sincerity throughout the research process by upholding
integrity. This will ensure that the Midlands State University receive an ethically conducted
The fraud risk statistics are increasing in Zimbabwe. This can be attributed to several factors
among them according to the Fraud Triangle and the Fraud Pentagon Theories. There is need to
have mitigating factors in place. The establishment of fraud risk management is one of the
41
CHAPTER 4
4.0 Introduction
This chapter is concerned with the presentation and analysis of data collected from sample subjects
using research questionnaire and document analysis. The chapter also discusses the findings in
relation to existing literature on the effects of fraud risk management and whistle blower system
on small and medium enterprises. The chapter provides the response rate attained on the
questionnaires which were issued out by the researcher. Reliability and demographic analysis are
also done in this chapter. Reliability was done using Cronbach’s alpha. The chapter also covers
findings on the effects of whistle blower effects on employee fraud in small and medium
enterprises.
The researcher issued 53 questionnaires to small and medium enterprise owners, employees both
shop floor and managerial. The results are tabulated below in Table 4.1
Table 4.1
Owners 20 15 75%
Managers 15 10 66,67%
Employees 18 16 88,8 %
53 41 77,36%
42
Table 4.1 above shows that out of 53 questionnaires given to the sample subjects 15 were received
from the small and medium enterprise owners out of 20. The managers returned 10 questionnaires
with 16 being returned by the general workers. A total of 49 questionnaires were received giving
a response rate of 77,36% . The response rate according to Saleh (2017) is deemed to be acceptable.
The researcher therefore concluded that 77,36% could be relied upon for the purposes of this study
The researcher carried out a pilot study to pre-test the data collection instrument for validity and
reliability. The pilot study was carried out with 10 people who were not part of the study. The
Cronbach’s Alpha measures the internal consistency and checks whether items within a scale
measures the same construct. The SPSS was used to compute the index alpha.
Table 4.2
Excluded 0 0.0
Total 53 100
43
Reliability statistics
Table 4.3
0.813 53
The results show that 0,813 as the Cronbach’s index and is considered good. Sekaran and
Bougie(2017). This demonstrated high reliability in the measurement scales for the constructs.
Table 4.4
Male 25 47
Female 28 53
The results in Table 4.4 show that 53% of the respondents were female of the respondents were
female and 47% of the respondents were male. This result shows that there were more females
than males. The difference is marginal and therefore appropriate for the current study.
44
4.3.2 Age of respondents
Table 4.5
percentage
Table 4,5 show that the majority of the respondents are aged between 20 and 40 years. These
classes accounting for 64, 14 % percent of the respondents. This represents the economically active
part of the population and therefore tends to be representative of the population. The respondents
below 20 years of age account for 11, 32 % which means that the age group are still not
45
4.3.3 Respondents’ qualifications
Table 4.6
percent
In Table 4.6 the majority of the respondents have either Diploma or an undergraduate degree
accounting for 84,91 % of the respondents. This shows from the researcher’s point of view that
the respondents are educated and therefore the respondents were answering from the informed
and knowledgeable point. Their results can therefore be relied upon by the researcher.
The Table 4.7 below shows the work experience of the respondents of the study.
Table 4.7
46
In table 4.7 the mode is 10 years and the mean was 9,4 years meaning that the majority of the
employees have served their respective firms for long periods and therefore have sufficient
knowledge relating to the firms. The researcher concluded that their knowledge can be relied upon.
The respondents are also likely to be involved in fraud because they are educated and experienced.
ACFE (2020) stated that 51% of the occupational fraud perpetrators were educated and
experienced.
35
30
25
20
15
10
0
Groceries Hardware Supermarket Construction
Figure 4.1
In Figure 4.1 above shows that the majority of the businesses are in the retail business with 35
firms in the groceries sector and 10 firms selling hardware. This represents the majority of firms
operating in Mupandawana and the researcher consider these firms to be appropriate for the
purposes of this study. Retails business tend to handle a lot of fast moving goods and cash and
47
they are therefore susceptible to fraud. They are likely to suffer from theft of cash according to
the Fraud Tree (ACFE (2020) The small and medium enterprises because there are numerous
opportunities to commit fraud. Cornish (2014) who cited the fraud triangle.
NO
9%
Yes
NO
Yes
91%
Figure 4.2
Figure 4.2 above shows that 91% (48 respondents) of the firms had a Fraud Risk Management or
equivalent department whilst the remaining 9% had no such department. This will enable the
researcher to find whether those firm with these department have low fraud incidences. The
existence of the fraud risk management department tend to reduce the opportunity to commit fraud.
The small and medium enterprises employ relatives and friend and they are therefore bound to act
48
4.3.7 Fraud Risk exposure and prevalence
The table 7.8 shows the prevalence of fraud in small and medium enterprises at Mupandawana
Table 4.8
Valid N (listwise) 53
The research sought to rate the sentiments on employee fraud from 53 respondents. The prevalence
of employee fraud was rated using a scale of 1 to 5 on a Likert scale. If the mean was close to 5,
the study regarded the statement as to a very large extent and when the mean is close to 4 it is
regarded as to a large extent and 3 is regarded as neutral. In the question regarding misuse of assets
the mean is close to 2 (1,91) which means the majority of the respondents believe that misuse of
assets occur to a small extent. In accounts receivable fraud the respondents believe that the
respondents believe that to a large extent, this type of fraud occurs at a Likert scale of 4 (mean
3,72) ACFE(2020) cited the misappropriation of assets as the most common method of fraud. In
this study there were high incidences of theft of electronic funds transfer and accounts receivable.
The theft of electronic funds include mobile transfer monies which one of the most common
49
4.3.8 Effectiveness of Fraud risk management practices in SMEs
In table 4.8 below it refers to questions relating to the effectiveness of fraud risk management
Table 4.8
occurrences
fraud occurrences
Valid N (listwise) 53
The research sought an assessment by employees and owners on their assessment of the fraud
risk management practices in their organisations. The majority of the respondents on the question
regarding whether their firms have been able to prevent fraud occurrences and incidences were
The respective firms have been able to predict fraud occurrences according to the respondents who
completed the questionnaire with a mean of 4,15 ( Likert scale 4 – large extent)
50
The majority of the 53 respondents felt that their organization have adequate measures in place to
deal with employee fraud. The mean scale was 3,81 (4 = large extent) There is a standard deviation
The majority of the firms have been able to recover losses which had previously occurred
according to the results of the survey at a mean of 3.89. The use of control systems and other fraud
risk management systems reduced the incidences of fraud. COSO (2016) recommends the
Table 4.9 below shows the respondents’ responses to questions relating to whistle blowing.
The respondents according to the answers in the questionnaire believed that employee fraud
The mean regarding the question on the ineffectiveness of the whistle blower system was 3.6
which is close to 4 on the Likert scale used by the researcher where the majority of the 53
respondents believed that “to a large extent” employee fraud occurred because of the
The respondents believed that the small and medium enterprises lacked internal mechanism to
protect whistle blowers. The mean was 3.62 with a standard deviation of 1.304 which means the
The whistle blowing system has not been working for the majority of the small and medium
enterprises because employees have no confidence because whistle blowers are harassed by
fellow workers according to the respondents. The mean was 3,70 which means the majority of the
51
Table 4.9
Ther
e is
Ineff lack
ectiv of
eness inter
whist mech of of
N Valid 53 53 53 53 53 53 53
Missing 1 1 1 1 1 1 1
deviation 4
Minimum 1 1 1 1 1 1 1
Maximum 5 5 5 5 5 5 5
52
53 respondents believed that to a large extent (4 on the Likert scale) whistle blowers are harassed
by fellow workers. The respondents felt that to a large extent (3,89 mean and standard deviation
of 1.204) there was management inaction for reported fraud cases. The respondents were neutral
or indifference regarding the view that the lack of financial incentives contributed to fraud in the
small and medium enterprises. The mean was 3,11 with a standard deviation of 1.476 .
Employees lack knowledge of the whistleblowing reporting procedure to large extent according to
the majority of the 53 respondents to the questionnaire. The mean was 3.75 with a standard
There are threats of expulsion and termination of employment to whistle blowers to a large extent
according to the respondents with a mean of 3.62 ( Likert scale 4). Kusumasari and Nurkidayat
(2017) defined whistleblowing as an ethical act or action of reporting a violation. There is need to
teach employees about ethics which will enhance whistleblowing. The threats of expulsion and
retaliation corroborates the view that employees prefer to whistle blow anonymously. Brenkert
(2010)
The chapter provided the findings of the study carried in Mupandawana on small and medium
enterprises. The response rate according to the questionnaires, Cronbach’s alpha reliability
analysis and the demographic characteristics such as gender of the respondents were covered in
this chapter.
The chapter provided findings of the following areas: fraud prevalence in small and medium
enterprises, how effective are the fraud risk management practices for small and medium
enterprises also looks at the whistle blower system. The next chapter provides the conclusions and
5.0 Introduction
The chapter gives a summary of the study’s major findings, the conclusions and the
recommendations arising from the study. The researcher summarised the findings and conclusions
of this study in line with the objectives of the study as stated in Chapter One of this study.
The study is organised into five chapters: Chapter One introduced the research study with detailed
information on the research problem, research background, and the objectives of the research
together with the research objectives. The specific study objectives, the significance of the study
Chapter Two within the study relates to literature review from related scholars. There is an
extensive of the literature which relates to this study. Chapter Three looked at and justified the
methodology adopted in this study. Data presentation and analysis was done in Chapter Four as
This study examined was to assess the effects of fraud risk management practices and whistle
blower system on fraud detection in small and medium enterprises in the retail sector in Gutu.
54
The specific objectives were : to explore the amount of exposure to fraud risks in small and
medium enterprises; to identify the fraud risk management practices in small and medium
enterprises ;to ascertain the effectiveness of fraud risk management practices and to investigate
the effect of whistleblower policies on employee fraud among small and medium enterprises.
The population for this study was drawn from small and medium enterprises operating in the retail
sector in Mupandawana growth point in Gutu. The respondents included employees and owners
of small and medium enterprises both gender. Data was collected from respondents using a self-
administered questionnaire with the respondents being given ample time to fill and return the form
to the researcher. The researcher carried out a desk review for document analysis. The researcher
used IBM SPSS version 29.0 to analyse quantitative data captured from the respondents’
questionnaires. The following key findings were established on the study on the study objectives
5.2.1 The amount of exposure to fraud risks in small and medium enterprises
Small and medium enterprises besides them being small and therefore easy to manage still are
exposed to fraud risk. The research found out the small and medium enterprises are exposed to
a large extent to electronic transfer fraud and accounts receivable fraud. The misappropriation
or misuse of assets affects the small and medium enterprises to a small extent. The respondents
were indifferent or neutral with regards to theft of cash in hand in small and medium enterprises.
Theft of inventory occur to a small extent in small and medium enterprises operating in the retail
sector.
55
5.2.2 The effectiveness of fraud risk management practices among small and medium
enterprises
The respondents believed that the fraud risk management practices in small and medium
enterprises are effective in preventing fraud from occurring both from internal and external
sources. The small and medium enterprises in retail sector have been able to prevent the
commission of fraud within the respective firms according to the respondents. The fraud risk
management practices in small and medium enterprises are so good that they have enabled small
and medium enterprises to predict the occurrence of fraud beforehand and allow the small and
medium enterprises to respond accordingly. The respondents have pointed out that the firms in
which they work for or own have measures in place to deal with employee fraud when it occurs.
The small and medium enterprises have been able to recover fraud losses to a large extent.
The respondents believe that where fraud occurs there is bound to be someone who can whistle
blow but the whistle blower system is ineffective. Small and medium enterprises have no internal
mechanisms to protect whistle blowers to large extent. Inaction by management to reported fraud
cases have to a large extent made the whistle blower practice ineffective. Respondents were
indifferent on the view that the lack of financial incentives contributed to fraud occurring in their
firms. Respondents to a large extent blame the lack of knowledge of the whistleblowing reporting
procedure to be the main reason why fraud goes unreported. There is threat of expulsion and
place.
56
5.3 Conclusions
The research study carried out in small and medium enterprises operating in the retail sector
raised the following possible conclusions: The small and medium enterprises are susceptible to
electronic transfer fraud and accounts receivables fraud. They are least exposed to theft of
inventory and misappropriation of assets. The fraud risk management practices done by small and
medium enterprises are effective in mitigating fraud. There are whistle blowing protection policies
in place which are ineffective because potential whistle blowers will be harassed and management
5.4 Recommendations
(i)The small and medium enterprises should reduce their exposure to electronic transfer fraud
and accounts receivable fraud. They should put in place fraud risk management practice will
(ii) The researcher found out that the fraud risk management policies in place are quite effective
and therefore they should look at further strengthening the policies in place and improve their
(iii)The researcher found out that the whistle blower system is ineffective and offers no
protection to whistle blowers. The firms are urged to have strong whistle blowing procedures
in place and they should protect the whistleblowers. The whistle blowing procedures should
57
5.5 Areas of further study
The researcher recommends further studies to be done on the effects of whistle blowing on
other sectors of the economy. Further studies can be made on the effects of non-conventional
58
REFERENCES
Adams, G. (2015). Efficiency of fraud risk management and firm performance in Nepal.
ACFE, (2020.) Report To the Nations On Occupational Fraud and Abuse 2020, Association of
Basri S.A,Marsam A.D et al (2017) Reinforcement tool of whistleblowing to eradicate fraud in the
Bunn, E., Ethridge, J., & Crow, K. (2019). Fraud in small businesses: A Preliminary Study. Journal
Chittaranjan A (2018) Internal, external and ecological validity in Research Design, Conduct and
COSO, 2016. Fraud Risk Management Guide - Executive Summary. In: Committee of
Cornish, Derek B and Clarke Ronald V(2014): The Reasoning Criminal: Rational Choice
Deloitte (2021) Fraud policies: Why you need one and what it should look like .
https://www2.deloitte.com/nz/en/pages/finance/articles/fraud-policies-why-you-need-one.html
59
Erbuga, G., S. (2020). Rationality in decision-making and deterring corporate fraud. Contemporary
S1569-375920200000102010
Karanja, N. N. (2018). Effect of fraud risk management practices on level of activity by agent
plus.strathmore.edu/handle/11071/606
Gathu, T. G. (2018). Effects of fraud risk management practices on net incurred medical claims in
plus.strathmore.edu/handle/11071/6115
Hussein W.N and Hilal A.M (2021) The impact of risk management on reducing Financial Fraud
Kumar, M., & Santoro, D. (2017). A Justification of Whistleblowing. Philosophy and Social
PwC, (2020). Fraud and corruption Malaysia has its say: PwC’s Global Economic Crime and Fraud
www.pwc.com/au/forensicservices.
Sekaran, U., Bougie, R. (2017). Research Methods for Business: A Skill Building Approach.
Ahmedabad:RishiPublications.
Rustiarini N.W and Merawati L.K (2020) Fraud and Whistleblowing Intention:
60
Said, J., Alam, M.M., Ramli, M., Rafidi, M., 2017. Integrating ethical values into fraud triangle
theory in assessing employee fraud : Evidence from the Malaysian banking industry. J. Int. Stud.
10, 170–184.
Saputra K.A.K , Saraswati et al (2020) Issues of Morality and Whistleblowing in short prevention
accounting. International Journal of Innovation , creativity and change Vol 12 Issue 3 2020
Including the Detection and Prevention of Fraud [Senior Theses]. University of South Carolina.
https://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=1225&context=senior_theses
Suh, J.B., Nicolaides, R., Trafford, R., 2019. The effects of reducing opportunity and fraud risk
factors on the occurrence of occupational fraud in financial institutions. Int. J. Law, Crime Justice
56, 79–88.
Yang, C.H., Lee, K.C., 2020. Developing a strategy map for forensic accounting with fraud risk
management: An integrated balanced scorecard-based decision model. Eval. Program Plann. 80,
101780
Mangala, D., & Kumari, P. (2017). Auditors' Perceptions of the Effectiveness of Fraud Prevention
https://doi.org/10.1177/0974686217738683
Maulida, W. Y., & Bayunitri, B. I. (2021). The influence of whistleblowing system toward fraud
eye-on-theft-fraud-by-employees/
61
Sitemere S (2022) https://www.busiweek.com/with-cyber-fraud-on-the-rise-in-zimbabwe-
customer-security-remains-essential/
institution : The application of the Fraud Pentagon Theory: Academy of Strategic Management
62
APPENDIX
APPENDIX A
Research instruments
Recall Jirivengwa
Dear Respondent
Forensic auditing and accounting with Midlands State University. I am undertaking a study
on “the effects of fraud risk management on fraud detection in small and medium
enterprises”.
Your assistance on the provision of data will be highly appreciated. I would like to conduct
Assurance is given that the information will be for the above purpose and will be treated
The research study is done for the purposes of fulfilling the university department and also
Yours faithfully
Recall Jirivengwa
63
APPENDIX B
TOPIC: The effects of fraud risk management practices and whistle blower system on fraud
This section covers the general background information about your organisation that relates
7 .Is there a fraud risk management or equivalent department in charge of fraud incidents?
Yes { } No { }
64
Below 1 year { } 1-3 years { } 4-6 years { } above 6 years { }
Section C: This part seeks information on the various aspects of fraud risk management.
9. How many fraud cases has your organisation suffered in the past five years?
Please indicate the extent of fraud prevalence in your organisation, Use the following scale
and tick the appropriate scale . The Scale is 1 to 5 where 1= to lesser extent 2= small extent
1 2 3 4 5
Section D: The effectiveness of the fraud risk management practices in small and medium
risk management practice. Please tick the appropriate scale using the following scale. 1=
lesser extent 2= small extent 3 = Neutral 4= large extent 5= very large extent
1 2 3 4 5
occurrences
65
(17 ) The firm is able to predict fraud occurrences
20. To what extent do you believe the ineffectiveness of the whistle blower system has contributed
1 2 3 4 5
66
67
68