Spelling suggestions: "subject:"fraud."" "subject:"braud.""
251 |
Impact of Internal Information Quality on Potential Earnings Management and FraudSmith, Dallin O. 01 September 2021 (has links)
No description available.
|
252 |
TELECOMMUNICATION FRAUD PREVENTION POLICIES AND IMPLEMENTATION CHALLENGEAyamga, Dominic January 2018 (has links)
The telecommunication system has being one of the greatest inventions of man. Ever since its introduction, it has grown to become the backbone of development and a platform for good governance for most countries throughout the world. Sadly, this good invention of man was never designed with its security or the security of its services in mind [22]. Despite the importance of telecommunication, and the existence of telecommunication systems for so many years, telecommunication system security are neither well understood nor managed effectively [22]. After several years of telecommunication system existence, security concerns are becoming a threat to its existence and operations. All countries have policies regulating telecommunication operations as well as policies to ensure sanity in the use of telecommunication platforms to the benefit of their societies, governments and the telecom operators. The challenge however, is how efficient and effective these policies are implemented. These challenges, create room for criminals to commit fraud using telecom platforms by exploiting the weaknesses in either the policies or the lack of will to implement the policies by regulators. This thesis used field research method to examine the existing telecommunication fraud prevention policies, the current challenges in implementing these policies and the existing telecom frauds. Using the country Ghana as a case study, the current challenges were broadly placed into three (3) categories as follows: (a) regulators challenges, (b) operators challenges and (c) User/subscriber challenges. Unlike findings of previous studies, the research found that: (i) inefficient telecommunication fraud prevention policies, (ii) the quest to earn high revenue in international termination fees to sustain the economy and telecom operations and (iii) lack of proper coordination and cooperation between implementation agencies, are the new challenges which were not previously stated as challenges to the implementations of telecommunication fraud prevention policies. This does not discount the fact that some of the previously revealed challenges persist. The research findings are used to generalised for other developing countries with features similar to Ghana especially sub-Sahara African countries. And also, all the recommendations are applicable as well.
|
253 |
An examination of the fraudulent factors associated with corporate fraudZmuda, Ronald 01 December 2011 (has links)
Between the years 1998 and 2002, the United States suffered a time in which several large companies engaged in fraudulent behavior which eroded investor confidence in the stock market and to some extent destabilized the economy. Audits, which were conducted to assess the validity and reliability of a company's financial statements, were not detecting the material misstatements in the statements. As a result, both the US Government and the accounting profession needed to come up with a way to prevent these immense frauds from occurring in the future. As a response to these large frauds, in 2002, the US Government passed the Sarbanes-Oxley Act of 2002 (SOX) and the American Institute of Certified Public Accountants (AICPA) issued Statement on Auditing Standards No. 99(SAS No. 99) to improve investor confidence and the auditing function's ability to detect material frauds. The intent of this thesis was to look at the fraudulent factors associated with several recent corporate frauds and compare them to the standards set by SAS No. 99. Through the analysis conducted, this thesis looks at the relationships between pressures, opportunities, and rationalizations made during the act of fraud.
|
254 |
Diffusion of Innovation and Fraud in the Subprime Mortgage MarketKoller, Cynthia 29 November 2010 (has links)
No description available.
|
255 |
The Effect of Psychological Contract Violations on Employee Intentions to Report FraudScheetz, Andrea M. 01 June 2016 (has links)
No description available.
|
256 |
Assessing Fraud Risk, Trustworthiness, Reliability, and Truthfulness: Integrating Audit Evidence from Multiple SourcesAbell, Meghann Lynn 14 June 2010 (has links)
To assess fraud risk, auditors collect evidence in a sequential manner by reviewing workpaper documentation, and by collecting corroborating and clarifying information from financial (management) personnel and nonfinancial (operating) personnel. SAS 99 (AICPA, 2002) noted that audit evidence gathered from financial personnel may be susceptible to deception. In addition, prior researchers have found auditors to be poor at detecting deception immediately following deceptive communication. Though the audit process is sequential and iterative, these studies measured auditors– ability to detect deception at a single point and did not provide corroborating evidence after the deceptive communication for auditors to revise their judgments. In this study, I examined auditors’ fraud risk assessments and truthfulness judgments throughout the audit process when there was an attempt at deception by management (financial) personnel. The belief adjustment model provided a framework to examine auditors’ initial judgments, their judgments directly following a deception attempt by financial personnel, and their judgments after receiving corroborating evidence from nonfinancial personnel.
Sixty-four experienced auditors electronically completed one of four randomly assigned cases and, within each case, assessed the fraud risk, truthfulness, trustworthiness, and reliability of financial personnel at multiple points for a fictitious client. I manipulated the presence (absence) of fraud and the level of experience of the source of corroborating evidence (operating personnel). I hypothesized that auditors would not be able to differentially evaluate fraud risk and truthfulness judgments of financial personnel between the fraud and no fraud conditions when exposed to workpaper documentation and deceptive client inquiry evidence by management (financial personnel). However, I expected to find that auditors– would update their fraud risk and truthfulness judgments as they reviewed audit evidence from nonfinancial (operating) personnel.
The results indicate that auditors in this study are not able to appropriately assess fraud risk and the truthfulness of financial personnel following the review of workpaper and client inquiry evidence. While the client was deceptive in the fraud condition only, auditors did not differentially assess the fraud risk and truthfulness of financial personnel between the fraud and no fraud conditions. After auditors reviewed evidence from nonfinancial personnel, in the presence of fraud, auditors increased their fraud risk and decreased their truthfulness judgments of financial personnel as inconsistent evidence was presented from a corroborating source. Therefore, in the presence of fraud, auditors improved the effectiveness of the audit process by appropriately increasing their fraud risk assessments in light of inconsistent audit evidence from nonfinancial (operating) personnel. Of equal importance, in the absence of fraud, auditors decreased their fraud risk assessments as consistent evidence was presented from a corroborating source. Therefore, auditors increased the efficiency of the audit process by appropriately decreasing their fraud risk assessments after integrating consistent audit evidence from nonfinancial personnel into their judgments. Further, I observed that these auditors revised their fraud risk assessments to a greater extent when audit evidence was provided by a source with a higher level of experience.
Though prior research has found auditors to be poor at detecting deception, the results of this study indicate that auditors will increase or decrease their fraud risk assessments and truthfulness judgments based on the consistency of audit evidence gathered from a corroborating source. Therefore, in practice, auditors may be able to detect deception as the audit progresses. / Ph. D.
|
257 |
The Effects of Auditors' Trust in Client Management on Auditors' JudgmentsKerler, William A. III 14 July 2005 (has links)
This dissertation presents the results of three research studies investigating the role trust plays in an auditor's decisions. The first study examines whether auditors develop trust in a client's management after working with the client during prior audit engagements. The results indicate that auditors have higher trust in the client's management after a positive, overall satisfying experience working with the client compared to a negative, overall unsatisfying experience. The first study also investigates whether auditors" trust in a client affects their audit decisions. The results show a negative relationship between auditors" trust and their fraud risk assessment. Specifically, lower levels of trust are associated with higher levels of risk, and vice versa. Together, the results suggest that auditors may indeed develop trust in a client's management and this trust may affect their audit decisions.
The second study examines whether Certified Public Accountants’ (CPAs) level of moral reasoning affects their decision to trust a client's management and the extent to which to trust them. The results show that CPAs with relatively higher levels of moral reasoning have less trust in the client's management than CPAs with relatively lower levels of moral reasoning. The findings indicate that an auditor's decision to trust a client's management is, at least in part, an ethical judgment. Also, because the decision is an ethical one, the findings suggest that trust beyond some threshold would be considered unethical.
The third study extends the results of the first study by simultaneously examining how an auditor's trust and the financial importance of the client affect the auditor's decision to accept the client's preferred method of recognizing revenue. The results indicate that auditors" trust in the client's management is positively related to their commitment to the goal of supporting the client's preferred reporting methods (goal commitment), which in turn is positively related to the auditors" assessments of the acceptability of the client's methods for reporting purposes. The importance of the client did not affect auditors" goal commitment or their acceptability assessments. The findings suggest that auditors with higher levels of trust may be more likely to accept the client's preferred method of financial reporting.
Overall, these results add to our knowledge of audit judgment and decision-making by providing evidence that auditors do indeed develop trust in a client's management; that the decision and extent to trust the client is in part an ethical judgment; and that auditors" trust may affect their audit decisions. This dissertation highlights the important role that an auditor's trust plays in his or her audit decisions. / Ph. D.
|
258 |
Intervening to Increase the ID-Checking Behavior of Cashiers: Cashier-Focused vs. Customer-Focused ApproachesDowning, Christopher O'Brien Jr. 11 June 2015 (has links)
The present four field studies explored the effectiveness of multiple prevention techniques designed to increase the frequency of cashiers' identification (ID)-checking behaviors from a customer-focused and cashier-focused approach. Studies 1 and 2 examined customer-focused approaches, whereas Study 3 examined a cashier-focused approach. Study 4 examined a combination of the cashier-focused and customer-focused approaches.
From a customer approach, Study 1 investigated the use of four prompts (a no-prompt control, an antecedent only, an antecedent with a positive consequence, and an antecedent with a negative consequence) at encouraging cashiers to ask customers for their ID during a credit purchase. Research assistants (RAs) visited various stores and made credit purchases, while displaying one of the four prompts covering their card's signature line to the cashier during check-out. The results showed RAs were checked for ID the most when using the prompts containing the antecedent and consequence, which was checked for ID significantly more than the no-prompt control.
Study 2 (also a customer approach) attempted to replicate Study 1 in a non-college community. Using a similar methodology as Study 1, the results showed RAs were checked for ID the most when using the prompt with the antecedent and positive consequence, which was checked for ID significantly more than the no-prompt control.
From a cashier approach, Study 3 investigated the use of a goal-setting and prompt intervention led by the restaurant manager to increase the frequency of cashiers' ID-checking behavior. Using an A-B-A (Baseline-Intervention-Withdrawal) reversal design at one of two restaurants, the results showed the intervention restaurant's percentage of ID-checked purchases increased from Baseline to the Intervention phase. But, it decreased slightly during the Withdrawal phase, showing functional control but also some maintenance over the target behavior. The percentage of ID-checked purchases at the control restaurant was almost nonexistent throughout the study.
Study 4 investigated the impact of using two intervention approaches (i.e., the customer and cashier approach) as opposed to one (i.e., the customer approach) to increase the frequency of cashiers' ID-checking behavior. While the A-B-A phases were occurring in the restaurants used in Study 3, RAs entered the restaurants and displayed an antecedent and positive consequence prompt to the cashiers during a credit purchase. The results of Study 4 partially supported the hypothesis. The cashiers in the intervention restaurant significantly checked more RAs for ID when two intervention approaches were combined than when only one intervention approach was used during Baseline, but not during the Withdrawal phase. / Ph. D.
|
259 |
Understanding the FTX exchange collapse: A dynamic connectedness approachAkyildirim, Erdinc, Conlon, T., Corbet, S., Goodell, J.W. 26 September 2023 (has links)
No / Employing a TVP-VAR dynamic connectedness analysis, we identify avenues through which the collapse of the FTX exchange manifested contagion effects throughout a number of financial markets. Results indicate that interaction effects become significantly pronounced, coinciding with key milestones during the collapse of FTX and related companies. Specifically, sources of contagion stem from two tokens created by the exchange and related companies, namely FTT Token and Serum. Such results further develop the expanding literature based on the inherent contagion effects of such unregulated products. / Conlon acknowledges the support of Science Foundation Ireland under Grant Number 16/SPP/33 and 13/RC/2106 and 17/SP/5447.
|
260 |
Developing a Practical Intervention to Prevent Identity Theft: A Behavioral-Science Field StudyDowning, Christopher O'Brien Jr. 16 April 2010 (has links)
Cashiers' identification-checking behaviors were observed at two grocery stores with the aim to actively involve cashiers in decreasing credit-card fraud. After baseline observations, cashiers at one store received a participative goal-setting and feedback intervention, whereby they collaboratively set a store goal for checking customers' identification. Over 23 days, the cashiers received one-to-one verbal feedback on their store's identification-checking percentages. The percentage of identification-checked purchases at the intervention store increased from 0.2 percent at Baseline to 9.7 percent during the Intervention. Then, it declined to 2.3 percent during Withdrawal, showing functional control of the intervention over the cashiers' target behavior. The cashiers at the other store served as the control group, and their percentage of identification-checked purchases were 0.3 percent, 0.4 percent, and 0.7 percent respectively during each of the A-B-A phases at the intervention store. It was also found the intervention affected male cashiers more than female cashiers. The present study also assessed the social validity of the current intervention by surveying both customers and cashiers from the intervention store. The results showed that customers do not mind getting their ID checked, while cashiers consider it important to check a customer for identification during a credit purchase. / Master of Science
|
Page generated in 0.0462 seconds