skip to main content
10.1145/3472349.3472359acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemcConference Proceedingsconference-collections
research-article

Theory and Factors Influencing Fraud in Financial Statements: A Systematic Literature Review

Published:05 October 2021Publication History

ABSTRACT

Financial statements fraud is an effort made on purpose by management of a company to deceive and mislead the financial report. Employing a systematic literature review method, this study examines theories and determinants of financial statements fraud. We find four prominent theories in relation to fraud in financial statements, namely, “Fraud Triangle Theory”, “Fraud Diamond Theory”, “Fraud Scale Theory”, and “Fraud Pentagon Theory”. Based on fraud diamond theory, there are three factors affect fraud which are Nature of industry, Total accrual and Capability. Based on fraud scale theory, there are three factors affect fraud which are Pressure, Opportunity and Personal integrity. Based on fraud pentagon theory, there are five factors affect fraud which are Competence, Arrogance, Pressure, Opportunity and Rationalization. We also document a common theme among four different theories, such as opportunity, incentive, pressure, integrity, competence and rationalization as factors influencing financial statements fraud).

References

  1. Abbasi, A., Albrecht, C., Vance, A., & Hansen, J. (2012). MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud. Mis Quarterly, 36(4), 1293-1327.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Albrecht, Chad. Holland, Daniel. Malagueno, Ricardo. Dolan,Simon. Tsafrir, Shay. 2015. The Role of Power in Financial Statement Fraud Schemes. Journal of Business Ethics 131 : 803-813.Google ScholarGoogle ScholarCross RefCross Ref
  3. Aghghaleh, S. F., Mohamed, Z. M., & Rahmat, M. M. (2016). Detecting Financial Statement Frauds in Malaysia: Comparing the Abilities of Beneish and Dechow Models. Asian Journal of Accounting and Governance, 57 - 65.Google ScholarGoogle Scholar
  4. Aris, N. A., Arif, S. M., Othman, R., & Zain, M. M. (2015). Fraudulent Financial Statement Detection Using Statistical Techniques: The Case Of Small Medium Automotive Enterprise. The Journal of Applied Business Research, 31(4), 1469-1478.Google ScholarGoogle ScholarCross RefCross Ref
  5. Asyiqin, W. A., Razali, W. M., & Arshad, R. (2014). Disclosure of corporate governance structure and the likelihood of fraudulent financial reporting. Elsevier, 145, 243-253.Google ScholarGoogle Scholar
  6. Awang, Y., Ismail, S., Rahim, A., & Rahman, A. (2016). Measuring The Potential for Financial Reporting Fraud In a Highly Regulated Industry. The International Journal of Accounting and Businiess Society, 24(1), 81-97.Google ScholarGoogle Scholar
  7. Beasley, M. S., Carcello, J. V., & Hermanson, D. R. (n.d.). Fraudulent Financial Reporting: 1987-1997 An Analysis of U.S Public Companies.Google ScholarGoogle Scholar
  8. Beasley, M. S., Carcello, J. V., Hermanson, D. R., & Lapides, P. D. (2000). Fraudulent Financial Reporting: Consideration of Industry Traits and Corporate Governance Mechanisms. American Accounting Association, 14(4), 441 - 454.Google ScholarGoogle Scholar
  9. Bell, T. B., & Carcello, J. V. (2000). A Decision Aid for Assessing the Likelihood of Fraudulent Financial Reporting. A Journal of Practice and Theory, 19(1), 169-184.Google ScholarGoogle ScholarCross RefCross Ref
  10. Calegari, B. B., Avila, E. F., Reis, R. E., & Alho, C. S. (2019). DNA barcode authentication reveals highly fraudulent Cod commerce in Porto Alegre, Brazil. Elsevier, 2, 1-5.Google ScholarGoogle Scholar
  11. Carcello, J. V., & Nagy, A. L. (2004). Audit Firm Tenure and Fraudulent Finanical Reporting. Auditing: A Journal of Practice and Theory, 23(2), 55-69.Google ScholarGoogle ScholarCross RefCross Ref
  12. Carcello, J. V., & Nagy, A. L. (2004). Client size, auditor specialization and fraudulent financial reporting. Managerial Auditing Journal, 19(5), 651- 668.Google ScholarGoogle ScholarCross RefCross Ref
  13. Chen, S. (2016). Detection of fraudulent financial statements using the hybrid data mining approach. SpringerPlus, 5(89), 1-16.Google ScholarGoogle Scholar
  14. Chen, S., Goo, Y.-J. J., & Shen, Z. D. (2014, September 11). A Hybrid Approach of Stepwise Regression,Logsitic Regression, Support Vector Machine, and Decision Tree for Forecasting Fraudulent Financial Statements. Hindawi Publishing Corpotation, 2014, 1-9.Google ScholarGoogle Scholar
  15. Dalnial, H., Kamaluddin, A., Sanusi, Z. M., & Khairuddin, K. S. (2014). Accountability in financial reporting: detecting fraudulent firms. Elsevier, 145, 61-69.Google ScholarGoogle Scholar
  16. Dalnial, H., Kamaluddin, A., Sanusi, Z. M., & Khairuddin, K. S. (2014). Detecting Fraudulent Financial Reporting through Financial Statement Analysis. Journal of Advanced Management Science, 2(1), 17 - 22.Google ScholarGoogle ScholarCross RefCross Ref
  17. Fung, M. K. (2016). Fraudulent Financial Reporting and Technological Capability in the Infrormation Technology Sectoor: A Resource-Based Perspective. CrossMark.Google ScholarGoogle Scholar
  18. Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., & Felix, W. F. (2011). Identification of fraudulent financial statements using linguistic credibility analysis. Elsevier, 50, 585-594.Google ScholarGoogle Scholar
  19. Hung, D. N., Ha, H. V., & Binh, D. T. (2017). Application of F-Score in Predicting Fraud, Errors: Experimental Research in Vietnam. International Journal of Accounting and Financial Reporting, 7(2), 303 - 322.Google ScholarGoogle ScholarCross RefCross Ref
  20. Johansson, E., & Carey, P. (2015, May 08). Detecting Fraud: The Role of the Anonymous Reporting Channel. CrossMark.Google ScholarGoogle Scholar
  21. Kanapickiene, R., & Grundiene, Z. (2015). The Model of Fraud Detection in Financial Statements by Means of Financial Ratios. Elsevier, 213, 321-327.Google ScholarGoogle Scholar
  22. Kirkos, E., Spathis, C., & manalopoulos, Y. (2007). Data Mining techniques for the detection of fraudulent financial statements. Elsevier, 32, 995-1003.Google ScholarGoogle Scholar
  23. Kitchenham, B., Brereton, O. P., Budgen, D., Turner, M., bailey, J., & Linkman, S. (2008). Systematic literature reviews in software engineering – A systematic. Elsevier, 51, 7-15.Google ScholarGoogle Scholar
  24. Kotsiantis, S., Koumanakos, E., Tzelepis, D., & Tampakas, V. (2006). Forecasting Fraudulent Financial Statements using Data Mining. International Journal of Computational Intelligence, 3(2), 104 - 110.Google ScholarGoogle Scholar
  25. Lin, J. W., Hwang, M. I., & Becker, J. D. (2003). A fuzzy neural network for assessing the risk of fraudulent financial reporting. Managerial Auditing Journal, 18(8), 657-665.Google ScholarGoogle ScholarCross RefCross Ref
  26. Liodorova, J., & Voronova, I. (2019). Z-Score and P-Score for Bankruptcy Fraud Detection: A Case of The Construction Sector In Latvia . International Scientific Conference, 284-295.Google ScholarGoogle ScholarCross RefCross Ref
  27. Lou, Y. I., & Wang, M. L. (2009). Fraud Risk Factor Of The Fraud Triangle Assessing The likelihood of Fraudulent Financial Reporting. Journal of Business & Economics Research, 7(2), 61- 78.Google ScholarGoogle Scholar
  28. Lui, X. K., Wright, A. M., & Wu, Y.-J. (2013). Managers' Unethical Fraudulent Financial Reporting: the Effect of Control Strength and Control Framing. 1-49.Google ScholarGoogle Scholar
  29. Maka, K., Pahanirajan, S., & Mallapur, S. (2020). Selection of most significant variables to detect fraud in financial statements. Elsevier, 1-7.Google ScholarGoogle ScholarCross RefCross Ref
  30. Md Nasir, N. A., Ali, M. J., & Ahmed, K. (2019). Corporate governance, board ethnicity and financial statement fraud: evidence from Malaysia. Accounting Research Journal, 32(3), 514-531.Google ScholarGoogle ScholarCross RefCross Ref
  31. Meiryani, Azhar Susanto. 2018. The Influence of Business Process and Risk Management on The Quality of Accounting Information System. Journal of Theoretical and Applied Information Technology. 96(9), pp.2626-2637.Google ScholarGoogle Scholar
  32. Misra, S., Thakur, S., Ghosh, M., & Saha, S. K. (2020). An Autoencoder Based Model for Detecting Fraudulent Credit Card Transaction. Elsevier, 167, 254-262.Google ScholarGoogle Scholar
  33. Mohamed Zawawi, S. H., Idris, K. M., & Rahman, R. A. (2011). Determinants of Behavioral Intention of Fraudulent Financial Reporting: Using The Theory of Reasoned Action. 10(1), 43-62.Google ScholarGoogle Scholar
  34. Munawer, Z., Yahya, S., & Nabiha, S. (2012). Sell-side security analysts: Re-reporting of Enron corporation fraudulent financial data. Elsevier, 62, 749-760.Google ScholarGoogle Scholar
  35. Nieschwietz, R. J., Schultz, J. J., & Zimbelman, M. F. (2000). Empirical Research on External Auditors' Detection of Financial Statement Fraud. Journal of Accounting Literature, 19, 190-246.Google ScholarGoogle Scholar
  36. Nizamani, S., Memon, N., Glasdam, M., & Nguyen, D. D. (2014). Detection of fraudulent emails by employing advanced feature abundance. Egyptian Informatics Journal, 15, 169-174.Google ScholarGoogle ScholarCross RefCross Ref
  37. Onza, G. D., & Lamboglia, R. (n.d.). The relation between the corporate governance characteristics and financial statement frauds: an empiricla analysis of Italian listed companies. 1-21.Google ScholarGoogle Scholar
  38. Persons, D. S. (n.d.). Using Financial Statement Data to Identify Factors Assosciated with Fraudulent Financial Report. Journal of Applied Business Research, 11(3), 38 - 46.Google ScholarGoogle Scholar
  39. Price III, R. A., Sharp, N. Y., & Wood, D. A. (2011). Detecting and Predicting Accounting irregularities: A Comparison of Commercial and Academic Risk Measures. American Accounting Association, 25(4), 755-780.Google ScholarGoogle Scholar
  40. Rezaee, Z. (2005). Causes, consequences, and deterence of financial statement fraud. Elsevier, 16, 277-298.Google ScholarGoogle Scholar
  41. Soepriyanto Gatot and Zudana Arfian Erma. (2020). PCAOB Sanction and Client Stock Market Reactions : Evidence from the case of Ernst and Young Indonesia. Pertanika Journal of Social Sciences and Humanities, 2020, 28, pp. 167-179.Google ScholarGoogle Scholar
  42. Sulaiman, S., Danbatta, B. L., & Rahman, R. A. (2014). Figure massaging practices in Malaysian firms: are they fraudulent? Elsevier, 145, 29-39.Google ScholarGoogle Scholar
  43. Summers, S. L., & Sweeney, J. T. (1998). Fraudulently Misstated Financial Statements and Insider Trading: An Empirical Analysis. The Accounting Review, 73(1), 131-146.Google ScholarGoogle Scholar
  44. Troy, C., Smith, K. G., & Domino, M. A. (2011). CEO demographics and accounting fraud: Who is more likely to rationalize illegal acts? Strategic Organization, 9(4), 259-282.Google ScholarGoogle ScholarCross RefCross Ref
  45. Tsaih, R. H., Lin, W. Y., & Huang, S. Y. (2009). Exploring Fraudulent Financial Reporting with GHSOM. 31-32.Google ScholarGoogle Scholar
  46. Wyrobek, J. (2020). Application of machine learning models and artificial intelligence to analyze annual financial statements to identify companies with unfair corporate culture. Elsevier, 176, 3037-3046.Google ScholarGoogle Scholar
  47. Zager, L., Malis, S. S., & Novak, A. (2016). The Role and Responsibility of Auditors in Prevention and Detection of Fraudulent Financial Reporting. Elsevier, 39, 693-700.Google ScholarGoogle Scholar
  48. Zaki, N. M. (2017). The Appropriateness of Fraud Triangle and Diamond Models in Assessing The Likelihood of Fraudulent Financial Statements- An Empirical Study on Firms Listed in The Egyptian Stock Exchange. International Journal of Social Science and Economic Research, 02(02), 2403 - 2433.Google ScholarGoogle Scholar
  49. Zhou, W., & Kapoor, G. (2010). Detecting evolutionary financial statement fraud. Elsevier, 50, 570-575.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICEMC '21: Proceedings of the 2021 International Conference on E-business and Mobile Commerce
    May 2021
    118 pages
    ISBN:9781450376013
    DOI:10.1145/3472349

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 5 October 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format