Forensic Accounting Skills in Improving Fraud Detection 浅谈法务会计对控制舞弊的研究.doc

上传人:laozhun 文档编号:3022960 上传时间:2023-03-08 格式:DOC 页数:30 大小:248.50KB
返回 下载 相关 举报
Forensic Accounting Skills in Improving Fraud Detection 浅谈法务会计对控制舞弊的研究.doc_第1页
第1页 / 共30页
Forensic Accounting Skills in Improving Fraud Detection 浅谈法务会计对控制舞弊的研究.doc_第2页
第2页 / 共30页
Forensic Accounting Skills in Improving Fraud Detection 浅谈法务会计对控制舞弊的研究.doc_第3页
第3页 / 共30页
Forensic Accounting Skills in Improving Fraud Detection 浅谈法务会计对控制舞弊的研究.doc_第4页
第4页 / 共30页
Forensic Accounting Skills in Improving Fraud Detection 浅谈法务会计对控制舞弊的研究.doc_第5页
第5页 / 共30页
点击查看更多>>
资源描述

《Forensic Accounting Skills in Improving Fraud Detection 浅谈法务会计对控制舞弊的研究.doc》由会员分享,可在线阅读,更多相关《Forensic Accounting Skills in Improving Fraud Detection 浅谈法务会计对控制舞弊的研究.doc(30页珍藏版)》请在三一办公上搜索。

1、浅谈法务会计对控制舞弊的研究Forensic Accounting Skills in Improving Fraud DetectionAbstractForensic accounting applies not only accounting and auditing, but also economics, business, and legal concepts and procedures to issues in question. The primary purposes of this article are to study forensic accounting in t

2、he area of fraud auditing, thus making the fraud detection more effective and more efficient. In the first section of the article, the author applies the survey results of James L. Bietstaker, Richard G. Brody, Carl Pacini in Accountants perceptions regarding fraud detection and prevention methods,

3、the results suggest that ordinary methods are quite commonly used, but the method of forensic accounting are less often used, despite receiving the high ratings of effectiveness. Consequently, in this paper, forensic accounting is formally introduced to the method pool of fraud detection. In the sec

4、ond part, the concept of forensic accounting is introduced by both domestic and foreign experts. Accordingly, the supply and demand of forensic accountants in our society is studied to show that forensic accounting deserves a comprehensive education all over the world. After that, the three areas of

5、 forensic accounting skills are studied to show how to use forensic accounting in fraud auditing. In the last section of the article, forensic accounting education is suggested by introducing the US education model. The US forensic accounting associations are introduced and compared with the Chinese

6、 association. Moreover, the author suggests the way through which forensic accounting can be integrated into accounting curricula.【Key Words】: Fraud detection; forensic accounting; financial statements; forensic accounting educationTable of Contents普通本科生毕业论文(设计)诚信承诺书iAbstractiiAcknowledgementiii1. I

7、ntroduction12. Fraud22.1 Consequence of Financial Fraud42.2 Methods to Combat Fraud42.2.1 Maintain a fraud policy52.2.2 Establish a telephone hotline52.2.3 Employee reference checks52.2.4Fraud vulnerability reviews52.2.5Perform vendor contract reviews62.3 Test of Use and effectiveness of fraud preve

8、ntion methods and software62.4 Conclusion83 Forensic Accounting83.1 The concept of forensic accounting83.1.1 The concept of forensic accounting by foreign experts83.1.2 The concept of forensic accounting by domestic experts103.2 Difference between forensic accounting and common accounting113.3 The D

9、emand of Forensic Accountants123.4 The Supply of Forensic Accountants133.5 Forensic Accounting Practices153.5.1 Fraud examiner153.5.2 Litigation Consultant173.5.3 Expert Witness174. Forensic accounting education and advises184.1 Forensic Accounting Associations194.1.1 ACFE Association of Certified F

10、raud Examiners194.1.2. The American College of Forensic Examiners ACFEI - The Largest Forensic Membership Association194.1.3 Forensic CPA in China204.2 Forensic Accounting Certifications204.2.1 The Certified Fraud Examiner (CFE)204.2.2 Certified Forensic Accountant, Cr.FA program214.2.3 Certified in

11、 Homeland Security, CHS program214.2.4 Certified Medical Investigator, CMI program214.2.5 Certified Forensic Nurse, CFN program214.2.6 Certified Forensic Consultant, CFC program214.2.7 Sensitive Security Information, Certified program224.2.8 Certified in Disaster Preparedness, CDP-ISM program224.2.9

12、Certified Forensic Physician, CFP program224.3 The Journal of Forensic Examiner224.4 The Forensic Accounting Education in College235. Summary and Conclusion24References261. IntroductionFor many years, corporate financial accounting scandals have increased concerns about fraud. For example, the US co

13、mpanies such as Enron, WorldCom, Global Crossing and Tyco have not only wiped out billions of dollars of shareholder value but also led to the erosion of investor confidence in financial markets. Globally, the average estimated loss per organization from economic crimes is $2,199,930 over a two-year

14、 period PricewaterhouseCoopers (PWC) (2003), Global Economic Crime Survey 2003, available at: In China, the fraud cases of Yuan Ye, Hong Guang also impressed the whole accounting circle. As a result, the general society is demanding the auditors to take more responsibility of these scandals. However

15、, different from the public expectation, how much responsibility should be taken by the auditors are in great argument. There is one thing clear that, a large percent of the firm revenues is lost per year as the result of occupational fraud. In this way, the demand of detecting fraud effectively is

16、increasing day by day.In addition, the damage inflicted by fraud goes beyond direct monetary loss. Collateral damage may include harm to external business relations, employee morale, firm reputation, and branding. Despite the increased incidence of fraud and enactment of new anti-fraud laws, many or

17、ganizational anti-fraud efforts are trying new and different steps to combat fraud (KPMG Forensics, 2003; PricewaterhouseCoopers (PWC), 2003).Forensic accounting, as a new frontier science, which combined with accounting and law, is used to detect fraud, provide litigation consultant or expert witne

18、ss. This profession has now been regarded as an appealing specialization for accountants and law enforcement professionals. It has been more than thirty years since the reform and opening up of China. In these thirty one years, our nation has gained a great success in the economic development. Howev

19、er, the issues of corruption and fraud also stood out from the ever-increasing economy. Litigation costs associated with the settlement of lawsuits against firms for failure to find fraud has been estimated to approach nine percent of accounting and auditing service revenue (Dennis et al., 1996) In

20、this way, the demand of new regulations and method to prevent fraud is weighing more in the economic issues. Three areas of forensic accounting- litigation support, expert witnessing, and fraud auditing- require a common body of knowledge and training. Currently, forensic accounting education has be

21、en limited primarily to continuing professional education sessions for practicing accountants. In the United States, a lot of researchers called on colleges and universities to provide forensic accounting education. In China, even the continuing professional education is not widely accepted. Consequ

22、ently, we can not call on colleges and universities to provide the related curriculum. However, since a lot of Chinese people have realized the importance of forensic accounting to their future professional career, they try hard to learn two majors during their undergraduate, such as accounting and

23、law. In the authors opinion, this situation can be improved by adding an elective class or sharing forensic notes to the auditing teachers.The primary purposes of this study are to:1 review the literatures on fraud detection in the area of forensic accounting;2 review the literatures of accounting e

24、ducation in the area of forensic accounting;3 investigate the methods of forensic accounting in preventing accounting fraud and show how effective forensic accounting is to fraud detection;4 compare and contrast the accounting associations in China and the USA then suggest the model of forensic acco

25、unting education in China.2. FraudFraud is deliberate steps by one or more individual to deceive or mislead with the objective of misappropriating assets of a business, distorting an organizations apparent financial performance or strength, or otherwise obtaining an unfair advantage Rabarits, A. (19

26、78) What the Auditor Needs to Know about Fraud, Accountancy, December, p.46. Fraud involves the use of deception to obtain an unjust or illegal financial advantage The Auditing Practices Committee (APC) Guideline 418, 1990, and encompasses white-collar crime, irregularities and embezzlement. With re

27、gard to company administration fraud is an intentional deception, misappropriation of a companys assets or the manipulation of its financial data to the advantage of the proprietor Levy, M. M. (1985) Financial Fraud: Schemes and Inertia, Journal of Accountancy, August, p. 78.Fraud, in whatever natur

28、e and guise, has to be detected first, since detection is an important prerequisite of rooting out any sort of fraud McNeil, I. (1992) Ruling out an Academic Argument, The Times, 26th March, p.27. On their own, auditors are not necessarily the most suitable group to perform the task of fraud detecti

29、on. The company, by instituting appropriate fraud prevention measures within its organization, can detect and prevent non-management fraud.Management fraud is difficult to detect due to coercion and collusion. Fraud may be perpetrated within a company by an employee or manager or outside the organiz

30、ation by a business contact or a member of the general public, or a combination of the two. Also if a genuine mistake when discovered later is not rectified but covered up, it may become a fraud. Examples of fraud include creation, alteration or suppression of the accounting records, vouchers and do

31、cuments, thereby misappropriating an asset. Fraud may be divided into management fraud and employee fraud. Management fraud involves circumventing internal control procedure and often escapes detection until an enterprise has suffered irreparable damage. Levy, ref. 6 above, p.78 Skillfully executed

32、fraud is hard to detect. A bite fraud occurs when an individual in an organization takes money and disappears. A nibble fraud occurs when a small amount of money or asset is taken each time, thereby making the risk of detection low. In the USA it takes an average of two years before nibble fraud is

33、detected. Towers, D. J. (1986) Detecting FraudA Guide to Effective Audit Procedures, Students Newsletter, December, p.2Some of the causes that enable fraud to occur include failure to allocate responsibility for the prevention of fraud, accepting honesty as inevitable, allowing known cases of fraud

34、to go unpunished, thinking security to be too expensive or adequately covered by a fidelity policy, and the attitude which says that it cant happen to us. Rabarts, ref. 4 above, p.462.1 Consequence of Financial FraudThe corporate financial accounting scandals (e.g. Enron, WorldCom, Global Crossing,

35、Tyco, etc.) have increased concern about fraud, wiped out billions of dollars of shareholder value, and let to the erosion of investor confidence in financial markets. Peterson, B.K. and Buckhoff, T.A. (2004), Anti-fraud education in academia, Advances in Accounting Education: Teaching and Curriculu

36、m Innovations, Vol.6, pp.45-47 Globally, the average estimated loss per organization from economic crimes is $2,199,930 over a two-year period. In the USA, the Association of Certified Fraud Examiners (ACFE) estimates that about six percent of firm revenues, or $660 billion, is lost per year as the

37、result of occupational fraud. Association of Certified Fraud Examiners (2004) Report to the Nation: Occupational Fraud and Abuse, Austin, TX In addition, the damage inflicted by fraud goes beyond direct monetary loss. Collateral damage may include harm to external business relationships, employee mo

38、rale, firm reputation, and branding. In fact, some of the collateral effects of fraud, such as damage to firm reputation, can be long-term. Despite the increased incidence of fraud and enactment of new anti-fraud laws, many organizational anti-fraud efforts are not current and are somewhat superfici

39、al. Hence, many entities are trying new and different steps to combat fraud. PricewaterhouseCoopers (PWC) (2003), Global Economic Crime Survey 2003 2.2 Methods to Combat FraudNumerous fraud prevention and detection techniques are now utilized to reduce the direct and indirect costs associated with a

40、ll forms of fraud. These various techniques include but are not limited to: fraud policies, telephone hot lines, employee reference checks, fraud vulnerability reviews, vendor contract reviews and sanctions, analytical reviews (financial ratio analysis), password protection, firewalls, digital analy

41、sis and other forms of software technology, and discovery sampling. Carpenter, B.W. and Mahoney, D.P. (2001), “Analyzing organizational fraud”, Internal Auditor, April, pp.33-38 Organizations that have not been fraud victims tend to rely more on intangible prevention tools such as codes of conduct o

42、r fraud reporting policies while those that have suffered fraud have implemented more tangible measures such as whistle-blowing policies and fraud prevention and detection training.2.2.1 Maintain a fraud policyEvery organization should create and maintain a fraud policy for guiding employees. A corp

43、orate fraud policy should be separate and distinct from a corporate code of conduct or ethics policy. Such a fraud policy should be clearly communicated to employees. Written acknowledgment by each employee that the policy has been read and understood should be required. 2.2.2 Establish a telephone

44、hotlineA rather novel fraud approach that is becoming more common is the use of anonymous telephone hotlines.Holtfreter, K. (2004), “Fraud in US organizations: an examination of control mechanisms”, Journal of Financial Crime, Vol.12 No.1, pp.88-95 It is a very cost effective means for detecting occ

45、upational fraud and abuse. A hotline allows employees to provide confidential, inside information without the fear of reprisal that accompanies being a whistleblower. Pergola, C.W. and Sprung, P.C. (2005), “Developing a genuine anti-fraud environment”, Risk Management, Vol. 52 No. 3, p.43 2.2.3 Empl

46、oyee reference checksOrganizations should conduct employee reference checks prior to employment. An employee with a history of perpetration of fraud schemes may move from one organization to another. When employee references are not checked, a dishonest person may be hired. Resumes should be scrutin

47、ized and information verified to determine that the information provided is legitimate. Organizations should conduct a second reference check six months after an employee starts work. 2.2.4Fraud vulnerability reviewsA fraud vulnerability review that investigates the organizations exposure to fraud s

48、hould be performed. This includes an assessment of what assets are held and how they could be misappropriated. For those organizations involved in electronic commerce, a vulnerability review should also include an assessment of exposure to employee misappropriation or destruction of such “non-balance” sheet items as confidential customer data and financial information. 2.2.5Perform vendor contract reviewsReview of company contracts and agreements can provide an indication of possible contract fraud, including kickbacks, bribery, or conflicts of interest by an organizations

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 教育教学 > 成人教育


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号