There are
many various types of fraud which companies may be exposed to, a summary of the
major types is presented below. In addition to identifying the type of fraud,
prevention measures must be implemented. Additionally below are techniques
which I would recommend for the prevention of fraud based on what I learnt in
AYB115, have researched as part of this blog and fraud cases such as ING and
Queensland Health.
Types of Fraud:
· Employee embezzlement or occupational fraud
involves employees directly or indirectly stealing from employers.
· Management fraud involves top management
providing misrepresentations, usually financial information (misappropriation
of funds).
· Vendor fraud is where organisations overcharge
for goods and services or non-shipment of goods even though payment is made.
· Customer fraud involves customers deceiving
sellers into giving customers something they should not have, such as incorrect
refunds. “The customer is not always right.”
· Kickbacks are when the employer and the vendor
work together to fraud the employer, the employee usually receives a ‘kickback’
when the vendor enters the contract.
Fraud
Prevention:
According to Smith (1998) fraud
prevention and control strategies range from general policies to highly
specific, individually tailored procedures. Below in Figure 1 is a summary of the fraud
prevention outlined by Albrecht, Albrecht, Albrecht, Zimbelman (2009, p.100).
Preventative
policies have been developed by the Government, industry and academics to
manage fraud for organisations. For example, the Government has published the AS8001-2008 guideline which is available for businesses to prevent fraud and
corruption. Grain Corp (2008) has effectively applied the policies of AS
8001-2008 in their approach to mitigate fraud in item 4.4, seen below in Figure 2.
Figure 2 - Grain Corp Fraud and Corruption Procedure (2008) |
Additionally
models of fraud detection have been developed such as the Analysis Led Fraud
Assessment (ALFA) model (Steane and
Cockerell, 2005). The ALFA approach identifies areas of high fraud risk and critical
fraud risk to enable organisations to address the risk of fraud. Furthermore Steane
and Cockerell (2005) have defined critical risks to be area of high fraud risk
where there are poor or no risk controls in place.
Moreover I
have identified specific methods which I would recommend to businesses who want
to prevent fraud. The key methods are to build a good ethical culture, employment
screening process, whistle blowing and employee tips, red flags and fraudster
profiling and developing strong internal controls. My research showed that some
of the methods outlined above have been proven way to prevent fraud. Maeda
(2010, p.270) and Laufer (2011) have identified that creating an ethical corporate
culture and values which are emitted by management and employees is one of the
most effective ways to deter fraud in an organisation. Additionally statistics have
shown that an employee tip and whistle blowing schemes is a common way internal
fraud is discovered (Coenen, 2009, p.199). Furthermore internal controls are
another effective way to mitigate fraud. Coenen (2009, p.199) have shown that
the most basic internal control, segregation of duties, is one of the most
basic fraud prevention controls that all companies should implement.
Segregation of duties allows for separation of responsibilities and reduces the
chances of fraud as collusion between two or more people is less likely.
Finally two key ways to identify fraud occurring, as outlined during the
lecture, include red flags and fraud profiling. A summary of both is outlined
below.
Several types of red flags were
outlined in the lecture. Below in Figure 3 is a summary of these:
Figure 3 - Types of Red Flags (AYB115, Lecture 11) |
Fraud profiling was outlined in
the lecture and below is my summary:
· Model employees and good timekeeper who stay late working long
hours. Such behaviour would indicate that the employee wants to cover up
their fraud while no one is working alongside them.
· Doesn’t take holidays would indicate that the employee is hiding
something that someone else might discover by taking over their role while
on holiday.
· Change in behaviour such as insomnia, increased drinking, unable
to relax, inability to look people in the eyes, sweating and increased smoking
may indicate the person is up to something.
· Cognitive dissonance – “the
feeling of discomfort that results from holding two conflicting beliefs.”
Lastly
education and awareness of fraud must be used in conjunction with the above
methods outlined. According to Maeda (2010, p.273) antifraud education should
become an integral part of the organisation with regular review to keep
employees informed and deter fraud.
Further Readings:
Albrecht,
S., Albrecht, C., Albrecht, C., & Zimbelman, M. (2009). Fraud Examination. Mason,
OH: South-Western Cengage Learning.
Australian Standards 8001-2008.
(2008).Fraud and corruption control.
Retrieved from: http://fraud.govspace.gov.au/files/2010/12/Australian-Standard-8001-2008.pdf
Coenen, T.
(2009). Expert fraud investigation a
step-by-step guide. Hoboken, New Jersey: John Wiley & Sons
Grain Corp
(2008). Fraud & corruption control: corporate governance procedure.
Retrieved from: QUT Blackboard.
Johnson, S., Ryan, H., & Tian,
Y. (2009). Managerial incentives and coporate fraud: the source of incentives
matter. Review of Finance, 13(1),
115-145. doi: 10.1093/rof/rfn014
Laufer, D.
(2011). Small business entrepreneurs: a focus on fraud risk and prevention. American Journal of Economics and Business
Administration, 3(2), 401-404. doi: 10.3844/ajebasp.2011.401.404
Maeda, M.
(2010). The complete guide to spotting accounting
fraud and cover-ups. Ocala, Florida: Atlantic Publishing
Smith, R. (1998). Best practice in fraud prevention.
Retrieved from: http://www.aic.gov.au/documents/F/3/2/%7BF3256DEB-9A04-4416-9D11-156922F22EC8%7Dti100.pdf
Steane, P., & Cockerell, R. (2005). Developing a fraud profile
method – a step in building institutional governance. Retrieved from: http://soc.kuleuven.be/io/ethics/paper/Paper%20WS3_pdf/Peter%20Steane.pdf
No comments:
Post a Comment