skip to main content
10.1145/3377817.3377831acmotherconferencesArticle/Chapter ViewAbstractPublication PagesebimcsConference Proceedingsconference-collections
research-article

The Responsibility Of Internal Auditors In Preventing Fraud In Malaysia Listed Companies

Authors Info & Claims
Published:19 March 2020Publication History

ABSTRACT

Nowadays, fraud has been one of the main issues and concern of regulators, auditors, investors, and researchers. The internal audit today plays a vital role to manage the company risk as well as to help the company to decrease the cost, enhance the company's performance to achieve higher stakeholder demands. Auditors play a crucial role in validating and providing assurance. The purpose of this study is to understand the responsibilities of internal auditors in preventing fraud. This study analyzed the relationship between staff training, the effects of continuous monitoring internal control system, protection software and the protection software on fraud prevention in Malaysia listed companies. The authors used the hypothesis and quantitative method to test the relationship between the responsibilities of internal auditors and fraud prevention.The targeted population were internal auditors who are working in the listed companies in Malaysia. Questionnaire was be sent out to 100 listed companies in Malaysia. Data were analysed using SPSS software in term of pearson correlation analysis and multiple regression test. Result of this work showed that there is a relationship between staff training, continuous monitoring internal control system protection software and fraud prevention in Malaysia listed companies.

References

  1. Fountain, L. (2016). Leading the Internal Audit Function (Vol. 1). CRC Press.Google ScholarGoogle Scholar
  2. Pickett, K. S. (2011). The essential guide to internal auditing. John Wiley & Sons.Google ScholarGoogle Scholar
  3. Mubako, G., & Mazza, T. (2017). An examination of internal auditor turnover intentions. Managerial Auditing Journal, 32(9), 830--853.Google ScholarGoogle ScholarCross RefCross Ref
  4. Smith, G., Button, M., Johnston, L., & Frimpong, K. (2010). Studying fraud as white collar crime. Macmillan International Higher Education.Google ScholarGoogle Scholar
  5. Levi, M. (2016). The phantom capitalists: The organization and control of long-firm fraud. Routledge.Google ScholarGoogle Scholar
  6. Coderre, D. (2009). Computer Aided Fraud Prevention and Detection: A Step by Step Guide. John Wiley & Sons.Google ScholarGoogle Scholar
  7. Petrascu, D., & Tieanu, A. (2014). The role of internal audit in fraud prevention and detection. Procedia Economics and Finance, 16, 489--497.Google ScholarGoogle ScholarCross RefCross Ref
  8. Ghazali, M. Z., Rahim, M. S., Ali, A., & Abidin, S. (2014). A preliminary study on fraud prevention and detection at the state and local government entities in Malaysia. Procedia- Social and Behavioral Sciences, 164, 437--444.Google ScholarGoogle ScholarCross RefCross Ref
  9. Rahman, R. A., & Anwar, I. S. K. (2014). Effectiveness of fraud prevention and detection techniques in Malaysian Islamic banks. Procedia-Social and BehavioralGoogle ScholarGoogle Scholar
  10. Sciences, 145, 97--102.Google ScholarGoogle Scholar
  11. Omar, M., Nawawi, A., & Puteh Salin, A. S. A. (2016). The causes, impact and prevention of employee fraud: A case study of an automotive company. Journal of Financial Crime, 23(4), 1012--1027.Google ScholarGoogle ScholarCross RefCross Ref
  12. Mat, T., Zainun, T., Nazri, S. M., Faiza, S. N., Mohd Fahmi, F., Ismail, A. M., & Smith, M. (2013). Assessing the fraud prevention mechanisms in Malaysian government agencies/Tuan Zainun Tuan Mat..[et al.]. Malaysian Accounting Review, 12(2), 141--169.Google ScholarGoogle Scholar
  13. Hanim Fadzil, F., Haron, H., & Jantan, M. (2005). Internal auditing practices and internal control system. Managerial Auditing Journal, 20(8), 844--866.Google ScholarGoogle ScholarCross RefCross Ref
  14. Whittington, O. R. (2015). Wiley CPAexcel Exam Review 2016 Study Guide January: Auditing and Attestation. John Wiley & Sons.Google ScholarGoogle Scholar
  15. Grabosky, E. P., Grabosky, P., Smith, R. G., Smith, R. G., & Dempsey, G. (2001). Electronic theft: Unlawful acquisition in cyberspace. Cambridge University Press.Google ScholarGoogle Scholar
  16. Dutta, S. K. (2013). Statistical Techniques for Forensic Accounting: Understanding the Theory and Application of Data Analysis. New Jersey: FT PressGoogle ScholarGoogle Scholar
  17. KPMG. (2013). KPMG Malaysia Fraud, Bribery and Corruption Survey 2013. Retrieved from https://assets.kpmg.com/content/dam/kpmg/pdf/2016/03/frau d-survey-report.pdfGoogle ScholarGoogle Scholar
  18. Siregar, S. V., & Tenoyo, B. (2015). Fraud awareness survey of private sector in Indonesia. Journal of Financial Crime, 22(3), 329--346.Google ScholarGoogle ScholarCross RefCross Ref
  19. Abu Bakar, K. M. (2009). Fraud Prevention Mechanisms in Government-linked Companies: An assessment of the level of existence and effectiveness (Doctoral dissertation, Master Dissertation, Faculty of Accountancy, Universiti Teknologi Mara, Shah Alam).Google ScholarGoogle Scholar
  20. Rosli, R., Mohamad, I. S., Mohamed, N., & Rahman, S. A. (2017). Fraud Prevention Framework in Malaysia Local Authorities. Business & Management Quarterly ReviewGoogle ScholarGoogle Scholar
  21. Agbejule, A., & Jokipii, A. (2009). Strategy, control activities, monitoring and effectiveness. Managerial Auditing Journal, 24(6), 500--522.Google ScholarGoogle ScholarCross RefCross Ref
  22. Cascarino, R., & Esh, S. v. (2007). Internal Auditing: An Integrated Approach, Second Edition. South Africa: Juta and Co Ltd.Google ScholarGoogle Scholar
  23. Youngblood, J. R. (2015). A Comprehensive Look at Fraud Identification and Prevention. Boca Raton: Taylor & Francis Group, LLC.Google ScholarGoogle Scholar
  24. Desai, M. S., Richards, T. C., & von der Embse, T. (2002). System insecurity-firewalls. Information management & computer security, 10(3), 135--139.Google ScholarGoogle Scholar
  25. Goldmann, P. (2010). Financial services anti-fraud risk and control workbook. John Wiley & Sons.Google ScholarGoogle Scholar

Index Terms

  1. The Responsibility Of Internal Auditors In Preventing Fraud In Malaysia Listed Companies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        EBIMCS '19: Proceedings of the 2019 2nd International Conference on E-Business, Information Management and Computer Science
        August 2019
        175 pages
        ISBN:9781450366496
        DOI:10.1145/3377817

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 March 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        EBIMCS '19 Paper Acceptance Rate31of142submissions,22%Overall Acceptance Rate143of708submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader