Saturday, June 15, 2024

thumbnail

CAUSES OF FRAUD AND THE IMPORTANCE OF AUDITING

 






INTRODUCTION


Fraud is an integral part of every walk of life. Fraud is evident in every economy be it developed, like The U.S.A., Europe, Japan or even African Beggar nation economies. The degree of prevalence varies anyway. Fraud undermine the safety, soundness and stability of organizations. It is not desirable, it is a retrogressive virus.

Any organization wishing to conduct its business, in an orderly and efficient manner needs some internal controls. The aim is to produce:

        i.            Reliable financial accounting information both for its own use and for other interested parties.

      ii.            Reduce fraud, because fraud cannot be completely eradicated.
Fraudsters deliberately falsify reports, most especially where they discover a loophole in the system.

The desire of every management or organization should be to exterminate fraud, prevent it or to reduce it to the barest minimum. Fraud therefore, is defined as; misappropriati0n, theft or embezzlement of corporate assets in the particular economic environment.

In the simplest thinking, fraud could be seen as stealing by tricks. Historically, fraud has always existed with the nature and life of mankind. The Nigeria society, particularly since after the civil war is plagued with the desire to get rich quick. An ugly aspect of this scenario is frequencies, complexities and magnitude of these frauds. As society become more enlightened and complex, methods of perpetrating frauds become more sophisticated.

THE PLAYERS IN FRAUD GAME

        i.  Most frauds take place with the connivance of an insider, or staff of the organization.

      ii.It could even be a sole business initiative of the staff. For example; an executive with greedy intent produces and manipulates documents to raise funds with no genuine claim. Everything looks right except that they do not exist.

    iii. So many organizations have in the recent time gone under and many factors have been attributed, but it is obvious that fraud was one major of such reasons.

THE ELEMENTS OF FRAUD

The three elements are called “WOE” Will, Opportunity and Exit; these imply;
-The will to commit the fraud by the individual.

-The opportunity to execute the fraud

 -The Exit, which is the escape from sanctions against successful or attempted fraud or deviant behavior.

TYPES OF FRAUD

Bite fraud: occurs when the assets are taken and the individual taking it disappears. This usually involves large assets, hence it is detected quickly. Therefore to avoid being tracked downs and the “biter” absconds to a protected colony e.g. A thief.

Nibble fraud: involves small assets taken in piecemeal, therefore, the possibility of early detection is very low, hence the fraud takes place on many occasions.

CAUSES OF FRAUD

The causes of fraud arc grouped into two major classes i.e. Institutional and Environmental/Social factors.

       I. Institutional factors: The institutional causes of fraud identified are:

a. Poor internal control/internal check; inadequate internal control and invective and/or inefficient application of internal control measures create hayfields loopholes for inclined staff, or member of church to commit fraud, so also ineffective audit.

b. Inadequate training and re-training; lack of adequate training and retraining on both the technical and theoretical aspects of the job leads to poor performance that breeds malpractice. Failure by the management and staff to undergo on-the job training and even relevant outside courses also lead to unsatisfactory performance which eventually creates room for malpractice.

c. Inadequate knowledge and Experience of Staff; Malpractice occur with higher frequency among staff with little experience and knowledge. With experienced and knowledgeable staff, there is less likelihood that malpractice would pass such staff undetected unless with his active connivance.

d. Use of sophisticated Accounting Machines: In the hands of dishonest staff sophisticated accounting machines could be employed to deliberately omit entries, substitute improper calculations and posting. Manipulate documents, substitute fictitious documents and other genuine ones.

e. Poor Security Arrangement: Fraudsters. Thieves always have their way in organizations where security arrangement for valuable documents and assets are weak, poor and vulnerable.

f. Negligence: Negligence is a product of several factors including supervision, lack of technical knowledge, apathy, pressure etc.

g. Bad Management: Management practices, when negative to the aspirations and development needs of staff, could result in the generality of staff being frustrated. Frustration in turn breeds malpractice.

h.Poor RemunerationWhen remuneration packages cannotconform with the economic realities of the times or salaries paid cannot favorably compare with those received by their counterparts in the same industry, staff will be compelled to become rather opportunistic in making money from other sources which may lead to wide spread corruption and misappropriation of assets.


Other causes are

             i  Absence detailed operational manual manual.

           ii.  Poor record keeping and accounting

          iii.  Faulty personnel policies.

          iv.   Staff infidelity.

    II.            Environmental/Societal factors;

a.       Personality Profile of Fraudsters: Some people are over ambitious hence prone to committing fraud. They are bent on making it, by hook or crook.
They dismiss morality as an unnecessary prerequisite of virtuous life.

b.      Social Value: There is general dishonesty in the society with morality thrown to the dogs, hence the society becomes fraudulent. Misplacement of religious and social values, the unquestioning attitudes of the society towards sources of wealth and brazing desired of such to live up to expectation.

c.       Fear of Negative Publicity: Many institutions fail to report cases of fraud to the appropriate authorities, as they believe doing so will give negative publicity/image of the institution. The attitude encourages individuals with inordinate ambition to continue to defraud.

d.      Indiscipline: There is always a minimum level of conformity, orderliness and moderate behavior below which the individual and the society will not be able to function effectively.

e.       Slow and tortuous legal procedures

f.       Lack of effective deterrent or punitive measures.

MOTIVATIONAL FACTORS TO DEFRAUD

The following factors motivate an individual to defraud organizations:

·         Excessive pressure to meet family obligation

·         High cost of living

·         The desire to be like others

·         Social expectations and obligations

·         Job frustration

·         Heavy personal indebtedness

·         Desperate need for money

·         Greed

·         Everybody does it syndrome etc.

FORMS OF FRAUD

The following are the forms of fraud:

·         Forgery of authorized signature

·         Premature writing off— of assets

·         Over invoicing

·         Defalcation

·         Suppression of liability/Assets 

·         Unofficial borrowing 

·         Fictitious transactions etc.

·         Withdrawals from dormant account

·         Syndicate fraud

         EFFECTS OF FRAUD

·     Fraud leads to loss of funds and premature wind-up 

·     Fraud could lead to loss of an organizations trained manpower as a result of shortage of funds to Sustain its employees who seeks out for greener pastures elsewhere.

·  Fraud damages the image of an organization prospective investors/members will not be willing to identify with or invest in an organization with battered reputation or rocked by cases of fraud.

·     Where past and present fraud are not being checked by the authorities, other members would definitely cash on the vulnerability of the system to continue to defraud the organization.

FRAUD DETECTION

Frauds detection requires innovative and creative thinking as well as rigor or science

        i.  To detect fraud or the intention of it, the following measures should be deployed.

      ii.  Staff Appraisal: This could be achieved by depth study and analysis of staff profile through the CV and studying the staff character.The CV:  Staff with high turnover or job profile and traits of irresponsibility can be revealed.

Typical character, of a fraudulent staff

a)      He rarely wants to go on leave

b)      He hates transfer

c)      He is a jingle, the most popular among staff and others

d)     His temperate range is between the two extreme very obliging (all the
time and highly aggressive on occasions)

e)      Commands confidence

f)       Very hard working but counter productive

FRAUD IDENTIFICATION

The following indicate fraud:

a)      Weak internal check and control

b)      Missing of vouchers and documents

c)      Falsification of documents

d)     Unapproved payments, transactions and incorrectly recorded transaction, etc.

 

 

SPECIALIZED EQUIPMENT AND MACHINE FRAUD

In the recent times, there have been incidences of fraud perpetrated in organizations of which billions of naira is being lost. Many of these frauds are not detected and huge sums of funds are siphoned into the perpetrator’s pocket of such frauds not being detected are those committed using specialized equipment and machines. The most common of these is what is called computer fraud. A computer is designed to aid and provide efficiency to the activities of an organization. This it does by proving speed, accuracy and manipulation of large information storage.

Today, computer is being manipulated to the advantage of “criminals” and to the disadvantage and detriment of the organization. This is called computer fraud. Computer is capable of carrying out any task under the sun as long as the software that will enable it is available.
Computer can be used for the benefit of the organization and also can be used with equal speed and accuracy against the organization to defraud it. The three important units of the computer are:

        i.            Input unit

      ii.            Processing unit

    iii.            Output unit

Through each of these units, fraud can be perpetrated, therefore activities in these units must be identified, and monitored so as to detect fraud and to a large extent prevent computer fraud.

DETECTION OF COMPUTER FRAUD

The following are examples of computer fraud:

a)      Fraudulent input of data

b)      Unauthorized and fraudulent input of data (Fraudulent Personnel bye-pass the authority by all means so that the fraudulent data is not being verified before the input.

c)      Unauthorized and fraudulent amendment of files: Fraudsters will naturally alter the facts in the file to favor him/her. This is done when the facts of data in the tile can incriminate the fraudster and when such fraudulent personnel is not the one to input the data.

d)     Unauthorized and fraudulent amendment to programs. Program experts who are fraudulent commit fraud here, they simply make amendment to the program, to the effects that the program will start malfunctioning and somebody else will start benefiting.

e)      Output falsification: This is in the area of manipulation of data and code.

f)       Falsification or deliberate delays in processing list and balances with the aim of allowing fraudulent activities before early detection

g)      Deliberate introduction of computer viruses into the computer, with the aim of destroy.ing the content of computer before detection.

PREVENTION

Computer fraud can be perpetrated in diverse ways so also there are ways through which it can be controlled and prevented.

To combat fraud, an organization should try to ensure the following:

·         Staff integrity and qualification: The quality of staff must be improved upon. The mind-set of the average worker should be made anti-fraud and pro-integrity and contentment.

·         There is the need for segregation/rotation of duties.

·         Good organization/distribution of work

·         Physical access/fire prevention

·         Security planning and operating instructions.

Further advise for computer fraud prevention:

i.                    You must protect file integrity (unauthorized access must be guided against).

ii.                  Input controls: Authorization, approval, control totals.

iii.                Processing/opening controls e.g. password system at the 3 levels of the compulsory.

iv.                Output controls: You must ensure proper distribution to authorized persons.

v.                  Install data encryption security measure. Of course, the level of data encryption software used, determines the overall safely of these systems.

THE IMPORTANCE OF AUDITING

The Origin of Auditing

The practice of auditing had its origin in the necessity for the institution of some systems of check upon person who had the responsibility to record the receipt and disbursement of money on behalf of others. The ancient states and empires applied some systems of check, to their public accounts, evidence abound that the ancient Egyptians, the Greeks, and Romans utilized systems of check and counter check as between the various financial officials.

The person whose duty it was to carry out such an examination of accounts became known as the auditor, the word being derived from the Latin word “audire” to hear. Originally the accounting parties were required to appear before the auditor who heard their statement of accounts etc. Auditors protect the interest of the investing public. Audit of the accounts of limited liability companies virtually in all economics is statutorily compulsory.

In Nigeria, we have two major laws governing the operations of limited liability companies and these laws make the audit of limited liability companies compulsory.

These laws arc:

1.      The Companies Act, 1968

2.      The Companies and Allied Matters Decree 1990.

However, in the case of public sector organizations, the constitution of the Federal Republic of Nigeria provides for their audit.

DEFINITION OF AN AUDIT

An audit is a process whereby accounts of business entities etc. are subjected to scrutiny in such detail as will enable the auditor form an opinion as to their accuracy, truth and fairness. This opinion is then embodied in an audit report addressed to those interested parties who commissioned the audit or to whom the auditor is responsible under statue. (Emile Woolf). The International audit practice committee simply defines audit as an independent examination of financial statements of an enterprise by an appointed auditor in accordance with terms of his engagement and in compliance with relevant statutory and professional requirements.

THE AUDITOR

For all intent and purpose the auditor is a professional accountant, licensed by a statutorily recognized accounting body as possessing sufficient skill, knowledge, experience and integrity, to audit financial statements and allied Matters and express an independent opinion as to their truth and fairness. Bearing in mind, that owners and outsiders interested in the affairs of the organization audited shall rely on such opinion expressed by him.

IMPORTANCE OF AUDITING

The sole purpose of any audit is to obtain and evaluate the assertions made by the management of the organization. The five assertions assumed to be made by any management are:

1.      Existence and/or occurrence: This is to establish that assets and liabilities are in existence; revenue and expense transactions occurred. One of the significant sign post of this is the cut—off i.e. recognizing assets and liabilities, is of proper date and accounting for revenue expenses and other transactions in the relevant period.

2.      Completeness: This is to establish that all transactions and accounting for them arc covered by the financial statements.

3.      Rights and Obligations: This is to establish that assets are property rights; and liabilities are obligations of the client. Due regards must be paid to contingencies.

4.      Valuation and/or Allocation: This is to establish whether or not proper values have been placed on assets, liabilities, revenues and expenses.

5.      Presentation and Disclosure: This is to establish that appropriate Generally accepted Accounting Practice (GAAP) are consistently applied and disclosed in compliance with appropriate law and regulations.

In obtaining and evaluating these assertions in the above mentioned the auditor obtains Audit evidence, Evidence is the valid, relevant and unbiased procedure used through the auditors direct and personal knowledge, examinations and enquiries to establish each audit assertion, by and large form an opinion about them which are basis of his report.

        i.            The fact that the accounts of a concern/business have been audited by a professional accountant, stamps them as correct and authentic record of transactions and a fair portrayal of the state of affairs of the business at a particular date. Therefore other interested parties place reliance on the audited account for future investments in thebusiness

      ii.            It also enables government to assess the correct tax payable by the organization. etc

CONCLUSION
In an organization, it is important that these concepts outlined be incorporated in the
operations namely:

·         Cash handling

·         Staff recruitment

·         Project implementation

·         Project monitoring and other areas as may be deemed necessary.

If these ideas arc applied much areas of waste and abuse of authorities would be reduced to the minimum.

 


Subscribe by Email

Follow Updates Articles from This Blog via Email

No Comments

comment section

About

All Bizinfo, aims to inspire the Entrepreneurial spirit, highlighting business ideas, researching business information ranging from technology, finance, banking, productivity, digital media marketing, fintech, crypto, agriculture and commodities, manufacturing, and discussing the possibilities of building S.M.E.S from locally sourced materials , centered around value chain addition to ultimately create wealth. Minerals , Geoscience, mining, small scale export business.

IMPORTANCE OF ORAL COMMUNICATION SKILLS

  In today’s world, the emergence of different forms of technology in media has led to the communication process to take place through diffe...