skip to main content
10.1145/3556089.3556105acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemeConference Proceedingsconference-collections
research-article

Forensic Accountant Data Analytical Skills Opportunity as Fraud Investigator in Industry 4.0 Era

Published:30 November 2022Publication History

ABSTRACT

In industry 4.0, the era as it is today, fraud has expanded from crimes that are visible and tangible such as theft, robbery, to subtle and hidden crimes such as financial statement manipulation which requires techniques such as data mining and financial data analysis to detect it. In the midst of the current development of the fraud investigator profession in Indonesia, we see that the parties who pursue it are mostly from a legal education background, and very rarely from an accountant background. This contrasts with the fact that in developed countries detective certifications such as the Certified Fraud Examiner (CFE) and Certified Fraud Auditor (CFrA) actually come from an accountant or auditor background. This is the basis research gap for making this paper. This paper is a descriptive qualitative research that discusses phenomenology. We collect facts about the fraud investigator profession and how an accountant or auditor can become a qualified investigator. We use primary data from observations and interviews with fraud investigator community members, while secondary data from international publications relate to our topic. The results of our study state that accountants or auditors have the advantage of being able to uncover subtle and covert cases of fraud such as manipulation of financial statements, but also have a weakness, namely the lack of knowledge of science related to the legal realm. In addition, the fraud investigator profession in Indonesia, does not yet have a legal license from the government body. In the future, it is hoped that it will be licensed with requirement from certification for someone who wants to become a fraud investigator.

References

  1. M. Jane, L. Karin, A. P. Pervaiz, A. Bing, and B. Yu, “Indicators of audit fees and fraud classification: impact of SOX,” 2012, doi: 10.1108/02686901211228002.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. W. Ng and B. K. B. Kwok, “Emergence of Fintech and cybersecurity in a global financial centre: Strategic approach by a regulator,” Journal of Financial Regulation and Compliance. 2017, doi: 10.1108/JFRC-01-2017-0013.Google ScholarGoogle ScholarCross RefCross Ref
  3. C. E. Nwachukwu, T. O. Usman, S. O. Akhor, and A. O. Oladipupo, “Auditing in the New Age of Industry 4.0,” Int. J. Bus. Strateg. Autom., vol. 2, no. 1, pp. 17–28, 2020, doi: 10.4018/ijbsa.20210101.oa2.Google ScholarGoogle ScholarCross RefCross Ref
  4. R. Ariyanto, “Comparative Analysis of Auditor Certification: Certified Fraud Examiner (CFE) and Certified Forensic Auditor (CFrA),” Account. Bus. Inf. Syst. J., vol. 7, no. 4, 2019.Google ScholarGoogle Scholar
  5. K. Deniswara, B. L. Handoko, and A. N. Mulyawan, “Big data analytics: Literature study on how big data works towards accountant millennial generation,” Int. J. Manag., vol. 11, no. 5, pp. 376–389, 2020, doi: 10.34218/IJM.11.5.2020.037.Google ScholarGoogle ScholarCross RefCross Ref
  6. R. Kumari Tiwari and J. Debnath, “Forensic accounting: a blend of knowledge,” Journal of Financial Regulation and Compliance. 2017, doi: 10.1108/JFRC-05-2016-0043.Google ScholarGoogle ScholarCross RefCross Ref
  7. E. I. Okoye, Fiia, and F. Fsm, “Forensic Accounting: A Tool for Fraud Detection and Prevention in the Public Sector. (A Study of Selected Ministries in Kogi State),” Int. J. Acad. Res. Bus. Soc. Sci., 2013.Google ScholarGoogle Scholar
  8. N. Kurnaz, I. Koksal, and T. Ulusoy, “Forensic Accounting in Financial Fraud Control in Digital Environment: A Research on Independent Auditors,” J. Turkish Stud., vol. 14, no. 3, pp. 1609–1627, 2019, doi: 10.29228/turkishstudies.22536.Google ScholarGoogle ScholarCross RefCross Ref
  9. E. Kreuter, “Forensic Accounting: A Vlue-Adding Skill for the CPA,” CPA J., no. November, pp. 523–539, 2017, doi: 10.4324/9781420058116-40.Google ScholarGoogle ScholarCross RefCross Ref
  10. Ernst & Young Global Limited, “Cyber Threat Intelligence - How To Get Ahead Of Cybercrime,” 2014.Google ScholarGoogle Scholar
  11. P. Singh and M. Singh, “Fraud Detection by Monitoring Customer Behavior and Activities,” Int. J. Comput. Appl., vol. 111, no. 11, pp. 23–32, 2015, doi: 10.5120/19584-1340.Google ScholarGoogle ScholarCross RefCross Ref
  12. B. L. Handoko, A. T. Marpaung, and N. Ayuanda, “Development of Cryptocurrency in the Indonesian Economy,” ACM Int. Conf. Proceeding Ser., pp. 54–59, 2021, doi: 10.1145/3457640.3457648.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Muliavka, “Problems in Determination of the Essence and the Components of Administrative and Legal Status of the Subjects of Private Detective Activity,” Innov. Solut. Mod. Sci., vol. 9, no. 36, pp. 71–80, 2020, doi: 10.26886/2414-634X.9(36)2019.5.Google ScholarGoogle ScholarCross RefCross Ref
  14. B. Tic and A. Sotlar, “Private intelligence in the Republic of Slovenia: theoretical , legal , and practical aspects,” 2017, doi: 10.1057/s41284-017-0107-0.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. Barnes, “Fraud Detection: Forensic Accounting Education and CFE Designation Impact on Auditor's Confidence Levels,” J. Account. Financ., vol. 20, no. 4, 2020.Google ScholarGoogle Scholar
  16. U. Sekaran and R. Bougie, Research Methods For Business: A Skill Building Approach, 7th, abrigat ed. John Wiley & Sons, 2016, 2016.Google ScholarGoogle Scholar
  17. Sugiyono, Metode Education Research. Approach Quantitative, Qualitative, and R & D. Bandung: Alfabeta, 2011.Google ScholarGoogle Scholar
  18. W. Nix and M. Morgan, “Chief Financial Officers Give Credit to Certified Fraud Examiners ’ Fight again st Fraud.”Google ScholarGoogle Scholar
  19. D. Cumming and T. Y. Leung, “Gender Diversity and Securities Fraud,” Acad. Manag. J., 2013.Google ScholarGoogle Scholar
  20. O. Raiter, “Applying Supervised Machine Learning Algorithms for Fraud Detection in Anti-Money Laundering Omri Raiter,” vol. 1, no. 1, pp. 14–26, 2021.Google ScholarGoogle Scholar
  21. G. M. M. Sujeewa, M. S. A. Yajid, S. M. F. Azam, and I. Dharmaratne, “the New Fraud Triangle Theory - Integrating Ethical Values of Employees,” Int. J. Business, Econ. Law, vol. 16, no. 5, pp. 52–57, 2018, [Online]. Available: http://ijbel.com/wp-content/uploads/2018/08/ijbel5_216.pdf.Google ScholarGoogle Scholar
  22. D. A. Ivanov, E. N. Кleshchina, and P. V. Fadeev, “Civil Action and Pretrial Procedures in Criminal Cases,” vol. 11, no. 4, pp. 1515–1522.Google ScholarGoogle Scholar
  23. H. Dianto, P. Sinaga, F. X. A. Samekto, and J. Emirzon, “Ideal Corporate Criminal Liability for the Performance and Accreditation of Public Accountant Audit Report in Indonesia,” vol. VII, no. 4, pp. 451–463, 2019.Google ScholarGoogle Scholar
  24. M. King, “What Makes a Successful Corporate Investigator An Exploration of Private Investigators Attributes,” J. Financ. Crime, 2020, doi: 10.1108/JFC-02-2020-0019.Google ScholarGoogle ScholarCross RefCross Ref
  25. M. Kwak, Y. J. Choi, and L. NamKung, “A Comparative Study on Private Investigators in the United Kingdom and South Korea,” Korean Secur. Guard Soc., vol. 59, pp. 189–215, 2019.Google ScholarGoogle Scholar

Index Terms

  1. Forensic Accountant Data Analytical Skills Opportunity as Fraud Investigator in Industry 4.0 Era

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICEME '22: Proceedings of the 2022 13th International Conference on E-business, Management and Economics
      July 2022
      691 pages
      ISBN:9781450396394
      DOI:10.1145/3556089

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 November 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader