SlideShare a Scribd company logo
1 of 21
II. Fraud Principles
1. What is fraud?           l
2. Classic fraud research
3. Fraud triangle and it`s scope
4. Profile of fraudsters
5. Who is victimised by fraud more often?
6. Fraud taxonomies
7. Fraud tree.
8. Evalution of a typical fraud
1. What is fraud?
• Fraud as a crime. Fraud is a generic term, and embraces all the multifarious means that
  human ingenuity can devise, which are resorted to by one individual, to get an advantage by
  false means
• Corporate fraud. Corporate fraud is any fraud commited by, for, or against a business
  corporation.
• Management fraud. Management fraud is the intentional misrepresentation of corporate or
  unit performance levels
• The ACFE defines financial statement fraud as: ‘‘the deliberate misrepresentation of the
  financial condition of an enterprise in order to deceive financial statement users.
1. What is fraud
• The U.S. Supreme Court in 1887 provided a definition of fraud in the civil sense. The most
  important point was the 4th: `That it was made with intent`
• The defendant can easily defend the claims with the ‘‘oops’’ theory that is, oops, I made a
  mistake
• But, if at the beginning of the fraud investigation, the victim entity’s antifraud personnel take
  the time to establish a pattern, even if that means allowing the fraudster to continue to steal
  for awhile, then the victim can establish ‘‘forensic’’ evidence related to intent. The fraudster
  might try the ‘‘oops defense,’’ but if the victim is able to produce dozen of instances, the
  judge or jury will probably not believe it.
2. Classis fraud research
• In order to commit fraud, a rationalization must exist for the individual to decide
  fraud is worth committing
• The current term fraud was traditionally referred to as white-collar crime, and the
  two are used synonymously here.
• Jaspan and Black tried to derive antifraud measures their book ` The Thief in the
  White Collar `.
• Jaspan and Black advise employers to: (1) pay their employees fairly, (2) treat their
  employees decently, and (3) listen to their employees problems, if they want to avoid
  employee fraud.
• But to temper that bit of humanism with a little reality, they also suggest that
  employers should never place full trust in either their employees or the security
  personnel they hire to check on employees.
2. Classis fraud research
• Hartung disagrees with Jaspan’s and Black’s generalizations and focuses on
  the individual. He argues: Their criminality is learned in the process of
  symbolic communication, dependent upon cultural sources.
• In reality, both Jaspan and Black, and Hartung appear to have been correct.
• Hartung noted that individuals are inevitably affected by their environment.
• Jaspan and Black suggestions to deter fraud say the same as modern efforts
  do: Create an environment with few reasons and with few opportunities to
  commit fraud.
3. Fraud triangle
•   Why a person in a position of trust would become a violator of that trust?
3. Fraud triangle
•  Cressey interviewed about 200 embezzlers in prison. One of the major conclusions of his
  efforts was that every fraud had three things in common:
• (1) pressure (sometimes referred to as motivation). Sometimes an insatiable greed causes
  relatively wealthy people to commit frauds. Motives to commit fraud in business usually are
  rationalized by the old saying that all is fair in love and war—and in business, which is
  amoral, anyway.
• (2) rationalization (of personal ethics). In an ACFE Report, 93 percent of the reported
  fraudsters had no prior criminal convictions. E.g ‘‘I am just borrowing the money’’
• (3) knowledge and opportunity to commit the crime. This aspect of the triangle is the only
  one that auditors can easily observe or control.
SCOPE OF FRAUD
• Research in the last 10 years has been able to reveal both the scope of fraud and the
  most effective means of detecting frauds.
• Research by the ACFE reveals that the estimated level of fraud detected from 1996 to
  2008 has been consistent in the U.S. economy—approximately 6 percent of annual
  revenues.
• In 2009, KPMG released its fourth Fraud Survey. KPMG interviewed 204 executives
  in companies with at least $250 million in revenues.
• 74 percent of employees reported they had personally observed wrongdoing in their
  organization in the prior 12 months.
• The greatest concern was the potential loss of public trust, according to 71 percent of
  the executives
4. PROFILE OF FRAUDSTERS
• Who? The person is usually someone who was not suspected, oftentimes
  least suspected.
• Are some people more prone to commit fraud than others? Gwynn Nettler,
  in Lying, Cheating and Stealing, offers these insights on cheaters and deceivers:
• People who have experienced failure, who are disliked and who dislike
  themselves, impulsive, distractible, ignorant people, people who have great
  pressure to achieve important objectives.
4. PROFILE OFonFRAUDSTERS
 Why Do Employees Lie, Cheat, and Steal the Job?
• The employee believes he can get away with it, she desperately needs or desires the
  money or articles stolen, feels frustrated or dissatisfied about some aspect of the job,
  ‘‘Everybody else steals, so why not me?’’, has no self-control, ‘‘They’re so big,
  stealing a little bit won’t hurt them”, The employee was economically, socially, or
  culturally deprived during childhood.

• Why is it that, despite the consequences of criminal behavior, it still occurs?
  Apparently, it is because the rewards gained often exceed the risk of punishment.
• Many times, if not most, when a fraud is detected, the extent of punishment
  regarding the perpetrator is to be fired, sometimes without even paying back the
  fraud losses.
High-Level and Low-Level Thieves
• Hall and Singleton provide a similar profile like ACFE RTTN for a typical
  fraudster in general. These criminals are: (a) in a key position in the
  company, (b) are usually male, (c) are more than 50 years old, (d) are
  married, and (e) are highly educated. This profile leads us to this overall
  conclusion: A white-collar criminal does not look like a criminal!
High-Level and Low-Level Thieves
         Most expensive frauds                    Most frequent frauds

• Have been with the firm for a long   • Have been an employee for about the same
  time                                   amount of time as the high-level thieves
                                       • Earn much less
• Earn a high income
                                       • Could be either male or female (gender
• Are male                               doesn’t matter)
• Are over 60 years of age,            • Are between the ages of 41 and 50
• Are well educated                    • Have finished high school
• Have never been charged with         • Operate alone
  anything criminal                    • And have usually not been charged with
                                         any criminal behavior
5. WHO IS VICTIMIZED BY FRAUD MOST
                  OFTEN?
• Fraud is therefore most prevalent in organizations that have no controls, no
  trust, no ethical standards, no profits, and no future.
• Small businesses and organizations have a higher risk of fraud than any
  other size entity, because they are more likely to have one accountant, no
  segregation of duties, and no compensating control, and those factors are the
  most common in fraud.
6. FRAUD TAXONOMIES
We focus on frauds in financial statements and business transactions.
The following are some of the ways fraud has been classified.

                 • Fraud can be perpetrated against customers, creditors investors, suppliers, bankers, insurers, or
   Consumer
  and Investor     government authorities (e.g., tax fraud)
    Frauds




                 • Criminal fraud requires proof of an intentiona deception. Criminal fraud denotes a false representation of a material fact made by one party to
 Criminal and
                   another party with the intent to deceive and induce the other party to justifiably rely on the fact to his/her detriment
  Civil Fraud    • Civil fraud requires that the victim suffer damages.


   Fraud for
                 •Frauds directed against the company
  and against
 the Company
                 •Frauds that benefit the company


                 • Internal means all the ways used to fraud such asprice fixing, corporate tax evasion, violations of environmental laws, false advertising.
   Internal
     and         • External fraud such as frauds committed by vendors, suppliers, and contractors who might overbill, double bill.
   external
    fraud


 Management      • Internal controls are measured by their effectiveness; they must be monitored constantly to ensure that they are functioning at the level designed
    and            and intended
 nonmanage
 ment fraud
7. The fraud tree
• The three main categories are (1) fraudulent statements, (2) asset
  misappropriation, and (3) corruption.
8. Evolution of a typical fraud


                                                              3.Rationalization
                                   2.Opportunity
                                                          Formulate intent without
      1.Motivationa                Knowledge and
                                                           self-incrimination; e.g.,   4.Commit the fraud
Financial need, greed, ego.   opportunity to commit the
                                                            ‘‘just borrowing the
                                       fraud.
                                                                  money,’’
8. Evolution of a typical fraud


                            6.Conceal the crime                              8.Suspicion or discovery
                                                                              discovery of variance
                                 Use large               7. Red flags
                                                                             or anomaly including a
5.Convert asset to cash   volume accounts, rely on     Red flags could         sufficient analysis,
                                                                             discrepancies, internal
                          apathy, alter documents,   be a lifestyle change   controls, internal audit,
                            destroy documents                                external audit, accident
8. Evolution of a typical fraud


9.Predication determined           10.Fraud theory
                                                            11.Fraud investigation
            A                     The fraud theory                                         12.Write a report
                                                             Identify and gather
fraud professional believes   approach helps to identify                                   Almost all fraud
                                                           forensic evidence, loss of
 a fraud has occurred, is      the most likely schemes                                  investigations require a
                                                            assets confirmed, loss
 occurring, or will occur      and how they are being                                   report at its conclusion
                                                                 documented
because of circumstances             perpetrated
8. Evolution of a typical fraud


                                                                        14.Trial
                                                              Presentation of facts and
                                                               testimony before trier of
13a.Disposition: Termination   13b.Disposition: Prosecution   fact, use of expert witness,
                                                               presentation of forensic
                                                                       evidence
Summary
• An understanding of the fraud principles is the foundation to any antifraud
  activity, whether it is developing a fraud policy, investigating a fraud, or
  designing antifraud controls.
• Therefore it is vitally important to know all one can about the fraud triangle,
  fraud tree, scope of fraud (it can happen here), profile of a fraudster, and
  other basic principles.

More Related Content

What's hot

7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensicswhbrown5
 
PRESENTATION ON FINANCIAL STATEMENT FRAUDS
PRESENTATION ON FINANCIAL STATEMENT FRAUDSPRESENTATION ON FINANCIAL STATEMENT FRAUDS
PRESENTATION ON FINANCIAL STATEMENT FRAUDSRATAN AGARWALA
 
Non Financial Evidences (Behavorial Aspects) in a Fraud Examination
Non Financial Evidences (Behavorial Aspects) in a Fraud ExaminationNon Financial Evidences (Behavorial Aspects) in a Fraud Examination
Non Financial Evidences (Behavorial Aspects) in a Fraud ExaminationPallavi Vyas
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in AccountingMuhammad Qasim
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Forensic audit ppt
Forensic audit pptForensic audit ppt
Forensic audit pptNikhil Priya
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...central university of rajasthan
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 

What's hot (20)

7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
PRESENTATION ON FINANCIAL STATEMENT FRAUDS
PRESENTATION ON FINANCIAL STATEMENT FRAUDSPRESENTATION ON FINANCIAL STATEMENT FRAUDS
PRESENTATION ON FINANCIAL STATEMENT FRAUDS
 
Non Financial Evidences (Behavorial Aspects) in a Fraud Examination
Non Financial Evidences (Behavorial Aspects) in a Fraud ExaminationNon Financial Evidences (Behavorial Aspects) in a Fraud Examination
Non Financial Evidences (Behavorial Aspects) in a Fraud Examination
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
Types of Fraud.pptx
Types of Fraud.pptxTypes of Fraud.pptx
Types of Fraud.pptx
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Red flags fraud
Red flags fraudRed flags fraud
Red flags fraud
 
How to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your OrganizationHow to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your Organization
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in Accounting
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Forensic audit ppt
Forensic audit pptForensic audit ppt
Forensic audit ppt
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Who Commits Fraud
Who Commits Fraud   Who Commits Fraud
Who Commits Fraud
 
Fraud & corruption
Fraud & corruptionFraud & corruption
Fraud & corruption
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 

Viewers also liked

Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)k.surya kumar
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 

Viewers also liked (6)

Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 

Similar to Fraud principles1

Fraud, Specifically Corporate Fraud, Is A Common Occurrence
Fraud, Specifically Corporate Fraud, Is A Common OccurrenceFraud, Specifically Corporate Fraud, Is A Common Occurrence
Fraud, Specifically Corporate Fraud, Is A Common OccurrenceChristy Davis
 
INSURANCE FRAUD INVESTIGATION AUTO RUN - FAST.ppsx
INSURANCE FRAUD INVESTIGATION AUTO RUN  - FAST.ppsxINSURANCE FRAUD INVESTIGATION AUTO RUN  - FAST.ppsx
INSURANCE FRAUD INVESTIGATION AUTO RUN - FAST.ppsxJamesCronin20
 
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdfWHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdfsooryasalini
 
Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1CA.Kolluru Narayanarao
 
1. How to Embezzle Money” There are a myriad of techniques for e.docx
1. How to Embezzle Money” There are a myriad of techniques for e.docx1. How to Embezzle Money” There are a myriad of techniques for e.docx
1. How to Embezzle Money” There are a myriad of techniques for e.docxSONU61709
 
William Black The Best Way to Rob a Bank is to Own One!
William Black The Best Way to Rob a Bank is to Own One!William Black The Best Way to Rob a Bank is to Own One!
William Black The Best Way to Rob a Bank is to Own One!Dulce Vendetta
 
The Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention ChecklistThe Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention ChecklistVeriti Consulting LLC
 
Detection of Financial Statement Frauds
Detection of Financial Statement FraudsDetection of Financial Statement Frauds
Detection of Financial Statement Fraudsrehan012
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crBrady Allen
 
Fraud Case Study
Fraud Case StudyFraud Case Study
Fraud Case StudyAngela Hays
 

Similar to Fraud principles1 (18)

Fraud motivation Triangle.pptx
Fraud motivation Triangle.pptxFraud motivation Triangle.pptx
Fraud motivation Triangle.pptx
 
Conference paper 1 st national forensic conference, yaounde. [compatibility m...
Conference paper 1 st national forensic conference, yaounde. [compatibility m...Conference paper 1 st national forensic conference, yaounde. [compatibility m...
Conference paper 1 st national forensic conference, yaounde. [compatibility m...
 
Fraud prevention
Fraud preventionFraud prevention
Fraud prevention
 
Fraud, Specifically Corporate Fraud, Is A Common Occurrence
Fraud, Specifically Corporate Fraud, Is A Common OccurrenceFraud, Specifically Corporate Fraud, Is A Common Occurrence
Fraud, Specifically Corporate Fraud, Is A Common Occurrence
 
INSURANCE FRAUD INVESTIGATION AUTO RUN - FAST.ppsx
INSURANCE FRAUD INVESTIGATION AUTO RUN  - FAST.ppsxINSURANCE FRAUD INVESTIGATION AUTO RUN  - FAST.ppsx
INSURANCE FRAUD INVESTIGATION AUTO RUN - FAST.ppsx
 
2013-04-04 Nonprofit Fraud: Part I
2013-04-04 Nonprofit Fraud: Part I2013-04-04 Nonprofit Fraud: Part I
2013-04-04 Nonprofit Fraud: Part I
 
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdfWHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
 
Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1
 
Part 1-frauds
Part 1-fraudsPart 1-frauds
Part 1-frauds
 
Red Flags Fraud
Red Flags FraudRed Flags Fraud
Red Flags Fraud
 
1. How to Embezzle Money” There are a myriad of techniques for e.docx
1. How to Embezzle Money” There are a myriad of techniques for e.docx1. How to Embezzle Money” There are a myriad of techniques for e.docx
1. How to Embezzle Money” There are a myriad of techniques for e.docx
 
2013-05-07 Nonprofit Fraud: Part II
2013-05-07 Nonprofit Fraud: Part II2013-05-07 Nonprofit Fraud: Part II
2013-05-07 Nonprofit Fraud: Part II
 
2013-11-19 Nonprofit Fraud Part 2
2013-11-19 Nonprofit Fraud Part 22013-11-19 Nonprofit Fraud Part 2
2013-11-19 Nonprofit Fraud Part 2
 
William Black The Best Way to Rob a Bank is to Own One!
William Black The Best Way to Rob a Bank is to Own One!William Black The Best Way to Rob a Bank is to Own One!
William Black The Best Way to Rob a Bank is to Own One!
 
The Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention ChecklistThe Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention Checklist
 
Detection of Financial Statement Frauds
Detection of Financial Statement FraudsDetection of Financial Statement Frauds
Detection of Financial Statement Frauds
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
 
Fraud Case Study
Fraud Case StudyFraud Case Study
Fraud Case Study
 

Fraud principles1

  • 2. 1. What is fraud? l 2. Classic fraud research 3. Fraud triangle and it`s scope 4. Profile of fraudsters 5. Who is victimised by fraud more often? 6. Fraud taxonomies 7. Fraud tree. 8. Evalution of a typical fraud
  • 3. 1. What is fraud? • Fraud as a crime. Fraud is a generic term, and embraces all the multifarious means that human ingenuity can devise, which are resorted to by one individual, to get an advantage by false means • Corporate fraud. Corporate fraud is any fraud commited by, for, or against a business corporation. • Management fraud. Management fraud is the intentional misrepresentation of corporate or unit performance levels • The ACFE defines financial statement fraud as: ‘‘the deliberate misrepresentation of the financial condition of an enterprise in order to deceive financial statement users.
  • 4. 1. What is fraud • The U.S. Supreme Court in 1887 provided a definition of fraud in the civil sense. The most important point was the 4th: `That it was made with intent` • The defendant can easily defend the claims with the ‘‘oops’’ theory that is, oops, I made a mistake • But, if at the beginning of the fraud investigation, the victim entity’s antifraud personnel take the time to establish a pattern, even if that means allowing the fraudster to continue to steal for awhile, then the victim can establish ‘‘forensic’’ evidence related to intent. The fraudster might try the ‘‘oops defense,’’ but if the victim is able to produce dozen of instances, the judge or jury will probably not believe it.
  • 5. 2. Classis fraud research • In order to commit fraud, a rationalization must exist for the individual to decide fraud is worth committing • The current term fraud was traditionally referred to as white-collar crime, and the two are used synonymously here. • Jaspan and Black tried to derive antifraud measures their book ` The Thief in the White Collar `. • Jaspan and Black advise employers to: (1) pay their employees fairly, (2) treat their employees decently, and (3) listen to their employees problems, if they want to avoid employee fraud. • But to temper that bit of humanism with a little reality, they also suggest that employers should never place full trust in either their employees or the security personnel they hire to check on employees.
  • 6. 2. Classis fraud research • Hartung disagrees with Jaspan’s and Black’s generalizations and focuses on the individual. He argues: Their criminality is learned in the process of symbolic communication, dependent upon cultural sources. • In reality, both Jaspan and Black, and Hartung appear to have been correct. • Hartung noted that individuals are inevitably affected by their environment. • Jaspan and Black suggestions to deter fraud say the same as modern efforts do: Create an environment with few reasons and with few opportunities to commit fraud.
  • 7. 3. Fraud triangle • Why a person in a position of trust would become a violator of that trust?
  • 8. 3. Fraud triangle • Cressey interviewed about 200 embezzlers in prison. One of the major conclusions of his efforts was that every fraud had three things in common: • (1) pressure (sometimes referred to as motivation). Sometimes an insatiable greed causes relatively wealthy people to commit frauds. Motives to commit fraud in business usually are rationalized by the old saying that all is fair in love and war—and in business, which is amoral, anyway. • (2) rationalization (of personal ethics). In an ACFE Report, 93 percent of the reported fraudsters had no prior criminal convictions. E.g ‘‘I am just borrowing the money’’ • (3) knowledge and opportunity to commit the crime. This aspect of the triangle is the only one that auditors can easily observe or control.
  • 9. SCOPE OF FRAUD • Research in the last 10 years has been able to reveal both the scope of fraud and the most effective means of detecting frauds. • Research by the ACFE reveals that the estimated level of fraud detected from 1996 to 2008 has been consistent in the U.S. economy—approximately 6 percent of annual revenues. • In 2009, KPMG released its fourth Fraud Survey. KPMG interviewed 204 executives in companies with at least $250 million in revenues. • 74 percent of employees reported they had personally observed wrongdoing in their organization in the prior 12 months. • The greatest concern was the potential loss of public trust, according to 71 percent of the executives
  • 10. 4. PROFILE OF FRAUDSTERS • Who? The person is usually someone who was not suspected, oftentimes least suspected. • Are some people more prone to commit fraud than others? Gwynn Nettler, in Lying, Cheating and Stealing, offers these insights on cheaters and deceivers: • People who have experienced failure, who are disliked and who dislike themselves, impulsive, distractible, ignorant people, people who have great pressure to achieve important objectives.
  • 11. 4. PROFILE OFonFRAUDSTERS Why Do Employees Lie, Cheat, and Steal the Job? • The employee believes he can get away with it, she desperately needs or desires the money or articles stolen, feels frustrated or dissatisfied about some aspect of the job, ‘‘Everybody else steals, so why not me?’’, has no self-control, ‘‘They’re so big, stealing a little bit won’t hurt them”, The employee was economically, socially, or culturally deprived during childhood. • Why is it that, despite the consequences of criminal behavior, it still occurs? Apparently, it is because the rewards gained often exceed the risk of punishment. • Many times, if not most, when a fraud is detected, the extent of punishment regarding the perpetrator is to be fired, sometimes without even paying back the fraud losses.
  • 12. High-Level and Low-Level Thieves • Hall and Singleton provide a similar profile like ACFE RTTN for a typical fraudster in general. These criminals are: (a) in a key position in the company, (b) are usually male, (c) are more than 50 years old, (d) are married, and (e) are highly educated. This profile leads us to this overall conclusion: A white-collar criminal does not look like a criminal!
  • 13. High-Level and Low-Level Thieves Most expensive frauds Most frequent frauds • Have been with the firm for a long • Have been an employee for about the same time amount of time as the high-level thieves • Earn much less • Earn a high income • Could be either male or female (gender • Are male doesn’t matter) • Are over 60 years of age, • Are between the ages of 41 and 50 • Are well educated • Have finished high school • Have never been charged with • Operate alone anything criminal • And have usually not been charged with any criminal behavior
  • 14. 5. WHO IS VICTIMIZED BY FRAUD MOST OFTEN? • Fraud is therefore most prevalent in organizations that have no controls, no trust, no ethical standards, no profits, and no future. • Small businesses and organizations have a higher risk of fraud than any other size entity, because they are more likely to have one accountant, no segregation of duties, and no compensating control, and those factors are the most common in fraud.
  • 15. 6. FRAUD TAXONOMIES We focus on frauds in financial statements and business transactions. The following are some of the ways fraud has been classified. • Fraud can be perpetrated against customers, creditors investors, suppliers, bankers, insurers, or Consumer and Investor government authorities (e.g., tax fraud) Frauds • Criminal fraud requires proof of an intentiona deception. Criminal fraud denotes a false representation of a material fact made by one party to Criminal and another party with the intent to deceive and induce the other party to justifiably rely on the fact to his/her detriment Civil Fraud • Civil fraud requires that the victim suffer damages. Fraud for •Frauds directed against the company and against the Company •Frauds that benefit the company • Internal means all the ways used to fraud such asprice fixing, corporate tax evasion, violations of environmental laws, false advertising. Internal and • External fraud such as frauds committed by vendors, suppliers, and contractors who might overbill, double bill. external fraud Management • Internal controls are measured by their effectiveness; they must be monitored constantly to ensure that they are functioning at the level designed and and intended nonmanage ment fraud
  • 16. 7. The fraud tree • The three main categories are (1) fraudulent statements, (2) asset misappropriation, and (3) corruption.
  • 17. 8. Evolution of a typical fraud 3.Rationalization 2.Opportunity Formulate intent without 1.Motivationa Knowledge and self-incrimination; e.g., 4.Commit the fraud Financial need, greed, ego. opportunity to commit the ‘‘just borrowing the fraud. money,’’
  • 18. 8. Evolution of a typical fraud 6.Conceal the crime 8.Suspicion or discovery discovery of variance Use large 7. Red flags or anomaly including a 5.Convert asset to cash volume accounts, rely on Red flags could sufficient analysis, discrepancies, internal apathy, alter documents, be a lifestyle change controls, internal audit, destroy documents external audit, accident
  • 19. 8. Evolution of a typical fraud 9.Predication determined 10.Fraud theory 11.Fraud investigation A The fraud theory 12.Write a report Identify and gather fraud professional believes approach helps to identify Almost all fraud forensic evidence, loss of a fraud has occurred, is the most likely schemes investigations require a assets confirmed, loss occurring, or will occur and how they are being report at its conclusion documented because of circumstances perpetrated
  • 20. 8. Evolution of a typical fraud 14.Trial Presentation of facts and testimony before trier of 13a.Disposition: Termination 13b.Disposition: Prosecution fact, use of expert witness, presentation of forensic evidence
  • 21. Summary • An understanding of the fraud principles is the foundation to any antifraud activity, whether it is developing a fraud policy, investigating a fraud, or designing antifraud controls. • Therefore it is vitally important to know all one can about the fraud triangle, fraud tree, scope of fraud (it can happen here), profile of a fraudster, and other basic principles.