Professional Documents
Culture Documents
REFERENCES
Linked references are available on JSTOR for this article:
https://www.jstor.org/stable/40397733?seq=1&cid=pdf-reference#references_tab_contents
You may need to log in to JSTOR to access the linked references.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Taylor & Francis, Ltd. is collaborating with JSTOR to digitize, preserve and extend access to
International Studies of Management & Organization
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
Int. Studies ofMgt. & Org., vol. 38, no. 3, Fall 2008, pp. 10-42.
© 2008 M.E. Sharpe, Inc. All rights reserved.
ISSN 0020-8825 / 2008 $9.50 + 0.00.
DOI 10.2753/IMO0020-8825380301
Abstract: Prior research studies have examined the detection of fraudulent fi-
nancial reporting using either financial ratios or nonfinancial factors relating to
corporate governance. Are both types of factors relevant for such fraud detection?
In this paper, we consider both types of factors, using experiences of fraudulent
financial reporting companies as a learning opportunity for management, govern-
ment regulators, investors, and auditors to develop early warning systems or red
flags for fraudulent financial reporting.
Hugh Grove is a professor and Elisabetta Basilico is a lecturer in the School of Accountancy
Daniels College of Business, University of Denver, 2101 South University Boulevard, Den-
ver, CO 80208 (tel.: 303-871-2026; fax: 303-871-2016; e-mail: hgrove@du.edu, ebasilic®
du.edu). The authors thank the participants at the European Institute for Advanced Studies
in Management's First Workshop on Corporate Governance, Brussels, November 4-5, 2004,
for their comments.
10
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 1 1
Literature review
Major work took place over 30 years ago regarding the use of financial ratios to
detect corporate financial difficulties (Beaver 1967; Deakin 1972). Although such
studies anticipated the potential prediction power of financial ratios, they were
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
12 HUGH GROVE (USA) AND ELISABETTA BASILICO (USA)
Only one study has investigated both financial and nonfinancial red flags.
Dechow, Sloan, and Sweeney (1996) examined a sample of 92 earnings manipulators
in AAERs from 1982 to 1992 and 92 nonmanipulators, matched by three-digit SIC
codes. Their correlation models tested 19 variables. The only financial ratios that
were significant were leverage and ex-ante finance (cash from operations-average
capital expenditures/current assets). They found that firms with weak governance
structure were more likely to manipulate earnings. Also, they discovered that ma-
nipulators experienced significant increases in their costs of capital after public
announcement of their malpractices.
Concerning just nonfinancial factors, Beasley, Carello, and Hermanson (1999)
analyzed a random sample of 200 manipulators in AAERs from 1987 to 1997.
They found that these companies were mainly small and not listed on major stock
exchanges. Concerning internal controls, they found that top senior executives
were usually involved in the fraud. Also, boards of directors were composed
mainly of insiders, and family relationships among directors and officers were
fairly common.
Also concerning just nonfinancial factors, Cullinan and Suttom (2002) used
the AAERs from 1987 to 1999 to identify 276 manipulators. They found that the
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 13
chief executive officer was involved in 70 percent of these frauds and anoth
percent involved senior managers. They concluded that external audit me
were not designed to detect fraudulent financial reporting by senior manag
because external auditors claimed that senior management effectively hid the
from them.
Again concerning mainly nonfinancial factors, Bell and Carello (2000) dev
a logit model that estimated the likelihood of fraudulent financial reporting
the presence of several fraud-risk factors. The significant risk factors were
internal control environment, rapid company growth, inconsistent or inad
profitability, undue management focus on meeting earnings projections, o
evasive or lying management, private ownership status, and an interactio
tor between weak controls and aggressive management attitude toward fin
accounting. In a study of just one no-financial fraud-risk factor, Beasley
found that no-fraud firms have boards with significantly higher percenta
outside members than fraud firms, based on a logit model analysis of 75 fra
75 matched no-fraud firms.
In summary, the literature primarily has used either financial or nonfin
factors for detecting financial statement fraud and earnings manipulation
and Wahlen 1999). However, in developing a framework for classifying acc
manipulation from an extensive literature review, Stolowy and Breton (2
found more academic empirical research is needed for both types of factor
help address this deficiency, our study empirically analyzed companies' fin
statements for both types of factors, starting with the year prior to the frau
nouncement, in five industries.
Key fraud ratios (Beneish 1999; Cook and Grove 2004) were calculated fro
most recent financial statements of these fraud companies before their inv
tions became publicly known. From Beneish's 1999 study of companies cite
fraudulent financial reporting and earnings management in the AAERs fro
through 1996, Wells (2001) developed analytical explanations for why Ben
five fraud detection ratio indexes should work. First, a material increase in th
sales in receivables index (DSRI) could indicate that a company's receivable
phony, or alternatively, a legitimate explanation could be liberalized credit p
Second, concerning the gross margin index (GMI), if a company's gross ma
on sales shrink from one period to the next, the risk is higher that manag
will engage in fraud to offset declining operating performance. Third, an in
in the amount of intangible assets or asset quality index (AQI) may indicate
company is capitalizing costs into intangible assets to offset declining econ
performance. Fourth, an increase in the sales growth index (SGI) reflects an in
in sales, which may or may not be legitimate. Fifth, an increase in total ac
to total assets index (ACC) may indicate that larger accruals and, thus, le
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
14 HUGH GROVE (USA) AND ELISABETTA BASILICO (USA)
(net income = operating cash flow + accruals) are associated with a higher risk of
earnings manipulation.
For each of these five ratio indexes, Beneish calculated benchmarks for the
nonmanipulators' mean index and the manipulators' mean index and developed a
statistical model for predicting fraudulent financial reporting, using empirical data
for these five ratio indexes:
Z = -4.840 + 0.920 DSRI + 0.528 GMI + 0.404 AQI + 0.892 SGI + 4.679 ACC
Beneish determined a cutoff score of -1.49 to be used as a classification tool for
fraud detection. A probit model can make two types of errors: Type I (classifying a
company as a "nonmanipulator" when in fact it manipulates) or Type II (classifying
a company as a "manipulator" when in fact it does not manipulate). The probability
cutoff scores that minimize the expected costs of misclassification depend on costs
associated with the relative cost of making an error of either type (Maddala 1983).
On the one hand, most likely investors have high Type I error costs because mis-
classifying a manipulator can cause a dramatic loss of value for its stock. On the
other hand, regulators are also concerned with Type II errors because they prefer
not to falsely accuse a company of fraudulent financial reporting.
In Beneish's study, the typical manipulator (and investors) lost approximately
30 percent of its market value on a risk-adjusted basis in the quarter containing the
discovery of the manipulation as compared with a 1 to 2 percent appreciation occur-
ring on a regular term. Based on this assumption, Beneish determined the probability
cutoffs that would minimize the expected costs of misclassification. However, the
stock drop for manipulators was much higher for more recent, spectacular frauds
(Grove and Cook 2004). Examples included WorldCom (with a 90 percent stock
price decrease and related market capitalization destruction of $180 billion), Enron
(100 percent and $67 billion), Global Crossing (100 percent and $54 billion), Qwest
(90 percent and $77 billion), and Parmalat (97 percent and $3 billion). Thus, instead
of using relative costs in the 20-30: 1 range, we chose higher relative costs in the
40:60: 1 range to acknowledge investors' higher losses and calculated a higher Z-
score cutoff of -1.99 for fraud predictive purposes in the probit model.
Our sample consisted of 42 companies from five industries: global energy, tele-
communication, food service, software, and computer equipment. These specific
industries were chosen because they were the industries with the most companies
under SEC or European investigations. The 19 fraud or manipulator companies
were Enron, Dynegy, Duke Energy, El Paso, and Reliant in the global energy in-
dustry; WorldCom, Global Crossing, and Qwest in the telecommunication industry;
Ahold, Parmalat, and Cirio in the food service industry; Microstrategy, Tenfold,
Unify, Indus International, and First Virtual in the software industry; and Centennial
Technologies, Xerox, and Cylink in the computer equipment industry.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 15
Major competitors from these same industries were used as control grou
nonfraud or nonmanipulator companies, defined as companies not under
or European investigations. The 23 nonfraud companies were ENI Spa, Bri
Petroleum, Exxon, Entergy, and Xcel Energy in the global energy industry
South, SBC, Alltel, AT&T, Verizon, and Sprint in the telecommunication
try; Sara Lee, Conagra, Kraft Foods, and Unilever in the food service ind
Progress Software, Scientific Learning, Neomedia, Vital Works, and Nest
the software industry; and Eagle Point, Scansoft, and Netsmart in the com
equipment industry.
The financial statement manipulator companies had statistically signifi
smaller values for both sales and total assets, using a i-test at a 10 percen
nificance level. However, if the two very large companies, Indus Internatio
software company, and Xerox, an office equipment company, were elimina
outliers, then the /-test was significant at a 5 percent level. The probit mod
applied to financial statement data (income statement, balance, and stateme
cash flow) for the above companies starting from the year prior to the fraud
made public by SEC or European investigators (Year 1) and going back ano
year (Year 2). The Compustat database (2003) provided most of the data, a
financial statements of foreign companies provided the rest of the data.
The fraudulent financial reporting detection analysis is presented in Tab
through 6, using the five financial ratio indexes discussed above for the five i
tries analyzed. The probit model was used to analyze the combined effect of al
ratios in detecting fraudulent financial reporting. Also, Beneish's nonmanipu
and manipulators' mean index numbers for each of the five ratio indexes (
2001) were used to analyze each ratio separately.
Applied to the global energy industry (Table 1), the probit model corr
classified 80 percent (8/10) of the companies with one Type I error of 10 p
(1/10) and one Type II error of 10 percent (1/10). In the telecommunication in
(Table 2), the probit model correctly classified 78 percent (7/9) of the com
with two Type I errors of 22 percent (2/9) and no Type II errors. In the food
industry (Table 3), the probit model correctly classified 86 percent (6/7)
companies with one Type I error of 14 percent (1/7) and no Type II errors.
software industry (Table 4), the probit model correctly classified 60 percent
of the companies in Year 1 with one Type I error of 10 percent (1/10) and
Type II errors of 30 percent (3/10). In the computer equipment industry (T
the probit model correctly classified 83 percent (5/6) of the companies in
with one Type I error of 17 percent (1/6) and no Type II errors.
In Table 6, the results are summarized for each of the five industries an
for Type I and Type II errors in both Year 1 and Year 2. In Year 2, the accurac
reduced because the frauds had usually not grown large enough to be detec
the financial statements. The percentages of accuracy for identifying both ma
lator and nonmanipulator companies in all five industries were consistentl
high in Year 1 and still high in Year 2: global energy (80 percent and 56 pe
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
16
|o • | fe i g i
><
LU
I >< S "»-05 | § O
"»-05
i- O
O
T-^
o)
O
O
T-I
Z
û_ CL.
^)
i- o O) O)
ä ^ § ^ £ d
00 O -s O
û_
e Is* co ^t
I "i fesso
(o co s ^ s o
ûj ^ £ ^ £ d
¿¿ i? co Jß o)o coo
D <D C0«P "^"Z f^Z
UJ T- O O
II P 1 5
C Û ^ £
I S! i
O) C5)
_® t- evi d
-g C CO S CO í-
Oc °?co °P^ ^Z
s> LU "»- O t- O
0)
0)
(0
li li f
75
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
17
I o § o 9 I I II
il g i SÌÌ ¡I
"D "O
,- rn ^. 3 3 © <D
8 ,- o $ rn o 8 ^. £ 2 g §
S o z S z ^ o S S o zz
o <p cji o o
1 s ¡ ¿g|] 1 i
3; o o OC022 oo
oZ oZcvi§§
1 ' z z
Z2
§8 § o » ? E II
^> dzd££ zz
o
°9z
o
^zEo^S
co o ü-
^z
<go
^Z ^Z oo§22 ZZ
Ö2-LJ_U_ oo
° I I
a> ? Sal 22
o 1 I
in^ o z§22 zz
CU O Ö LL li-
w iS w
S 2 S S
iífÍsl Mls> a ¡
co |2(§ ñ£<u] O
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
18
C <O -r- J5 CO
CO O i- ^ O
1 si § 1 i i
5 d ^ £ d
g
<<o
fe -¿ 8
o göS i
3 o o co ~ i- o
^^ C3 1"~ O T~
.. m co -s-
ü .. m o co o co ^
CD m -^ co -7 cm w
§
O <*
O>-g
-Û-Û
O5O5
_ CO
CM o
co q « cd o _ 9 z
cû
"05 £
^ CM 1-0 1-
^ O
^
8ZSo
i-
° I Ö
e/)
8 I
ö o
1 ¡1 5 i II i ê
E
O
"õO coo -st- ooo
"5
o
^p °9z
o
coo
O i-
9$ O
ooo
O
°^Z
'E
Io
I
I ^ç 9^: 9t o w
fi
S
(O
(O
75
II ccc-ofcccc-ocTccc-a
coce I ccc-ofcccc-
-Ä > CDOCuOCOcDOCOq^-qoCOq
SÍ
F LU
^õmzsoc
co
Û
y
gcûz^cc
i-
2
co
gcûz^tr
O <
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
19
So 8 o 8 1 1 £ Z
"-Z "" Z °> *£ *c OO
? Z 7 *£ | *c
-o -o
co o s o o 2 2 ce
O 2 O ^ ^ *c= *c= OO
o evi o o 2 2
> i z z
"O TD
co cm ^t m m Q)o
o> o oí oco22 ^t m m ce
O O CM O O Z Z
jph-
jp co o 2O0)£5
O CM 5 ©CC0
92 9 Z - ^ "Ê oo
i- O CM O O 2 Z
1 I Z Z
■D TD
S o S oo22 ce
°9 Z PZO*:^ OO
o ? ' co§§
' ' z z ' ZZ
§ o I 28|¡ ¡ ¡ 1 ' z z
cd © r^ "5
5 1 oiSsE »g
îi S S ^ II 1 ¡
O O CM O U- 2
28 ES cvjÍM °è SjÍM S^
co iS w
S o o ë
"^coi^wo^iSço g*
!!lf!i_»!i
« |5(o n£<Ö O
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
20
> LO CO O) O)
cd h^o eoo loo r^o
= °9 Z oqz: o>z °9Z
^ ö ö ö ö
O o oo h» h^
£
<e
&■£
o^
S° go
d"^ d^
oo
^
*-
*-
O) °°^ ^^ LO5 T-
co i^jg o>5 ""-to po
g d*2 d^ t^ co ,_:Z
S ^
j CO ^ O) CVJ ,_ O
-1 j ^íõ ^ COO "•- ,_ Í8 COO
CO T- O O 1- T-
s
E o5 S5 §5 cS-S
£ - d - d
O
I ^^ ^^ ^ ^ "^
o
Ï
co
£
CO
I 82 Ã 5 ©2 cío
(O
(O
¡liS fllS lliS z £% %
col l|g|£¡|g¿£s1g¿£Íig¿a coccc-o^ccc-oo-ccc
coccc-o^ccc-oo-ccc-oOccc-d
=1
|2u S ö ^ ^
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
21
JOD ■§ "O
§ Uli I !
ö o c'¡ o o ^^
Û- I Z Z
i
1 ¡i i 2 2 2
1 z z
£ o £ ! ! * *
oi co
coc croo
■§ 2 2
-§ z
z
■O T3
CO LO 2 3 (DO
OO
§ SSlí
C'JC'J LOO
O OO
2§2
(DO Z
|Z
T l z Z
"O "O © 0)
§ P
P > °í u: û: z z S § °í i û: g B §
° T
2 s 2 ? ? g?
cm ^^-22 o o
o o il il Z Z
CO CO ^ T3 di
CO S S 3 CO 1 T3 3 | §
o evi I £ 2
öS sSPjoC 5Spä5P
!
I 1
liti* 3 S
Biiîï§ii aï 1 1 1
F Ñ CL < LU O
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
22
Z
II C'i
M g ! 8 2
^fr O
•> l|
.9 .9
I^Z OW§co I^Z
Z
•> ^5 ö OW - £ co ö
® ^ CL Ö d
«83 odd
S 2 «
25 r^^ oo T- o
£ co ^ a. d d
> C'i O ^ CL
ü)í_2 cm ^"S ^"5
||| ü)í_2 Si
tf g £ & î 1 5
g»
I
S ,„ 1! 61 %l 8 ¿
S
i
(0
£
(g| S» ° - ©
CD
Cx "^ IO ^"CO C3>^"
COQ COCO t-OÏ COLO
©■g P ^t Pt P0^
0)
^ - î2 Ejg~î2 ~c £ - &
• « 1 î 1 s? i I î I s? = I î I s»
(0
75
*■£ cococcc-o^ccc-oo-ccc-o
û2 Õ <
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
23
si i isll ^ 1 Z I
C'Í©
Cj> CD ^ ^ Z
"o
co =9 ° w ¡S "§ 2 c <"
- £ o Tz
sÖ
-
* y
aiiïl
Z
li
2 1 ? zçîs « *
"D T3
2o c^joo22 ce
?z 8 z 8 1 i li
O O 7 Z Z
§£
^
o z-22 55
o d "- "- zz
CO t-3t-T3"D (DO
T- O h--^:^tI3D CC
°?z °N <8t22 oo
Ó OOt- LLLL ZZ
73
CDZ CO Z CM C 2 >-O
d o ^|-
12 § i §11 ||
if § Mil 1Í
°- ? T
$ § Ï !
I Ì £ 1 - 1 I Î 1 - S §
jiilïSalgSïSsIël | 1 ,
CO FU NÛ-<IU O
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
24
? s
c m 55 i- o co o
¿2 co w co Z co Z
0 O O 00 O)
Z T-" û. ö d
S ^8 S > o 2
1 2 co^O
Q_C0
co°^.-Q
v m^o
©I
O)
S O
z S O
8 d z
«CO CL
-
- oo
>%"55 cooq
p co Z o
Z ^
h-Z Z
o
O -r-' g o d
■? © CD
li So 5 1 SI
II S 2 Si 5 §
3 û_ CL
S"
0
Ü
I CC
il C 2* C 2* CM O) ^>
C0C.2 ^o coco 050
0) 5 c £ d z evi >- d Z
Q.
o. o^>
O" O
O
s
1 CX
co©
©■o
T-IT)
coco
^tCO
T-o)
9^: Pt
O)^t
coin
9°^
(0
Q.
w x co ço
'co
S | x S go ço g
co
| I g -s S "5 g I S 3 g .1 S
-i cococcc-oCj-j-c-oo-ccc-ocdc
=î Ss ô S. &
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
25
"S •dL
•dL ? dL dL CD CD
S i SI ¿fell § §
o) i- oq o o 2. Z
Ö o c'i Z Z
"O T3
I * 8 MÜ II
- ? ? z z
So z a o & i I ¡i
ö z ? t s s i z
co OT ^ i« io ^ 22
5 | OT ^ 2|^22 i«
CO O ÄI^"O"D <D<D
m o co tßojDD ce
o) 2 P «$^22 ^ oo
O O ^ y L IL ZZ
^J- 00 CD U -o m
^J- 8 § R 00 g 3 C
^ 2 d d ¿E°S coE gè
CO
ÇO iS ÇO
o 2 o
■I | - 1 1 -I j - | |
Itili Itigli, | i l * »
zSdc^cûz^dcO^^I^ ^ |2 s
1^ N ûl < UJ O
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
26
~(0
££HHOO (0
~ ^^
I-I-<M
<M
I ^° I ^°
II Is
CM CM CM
CO o^ CO o^ CO o^-
XÛ CO ^CD ^ ^D Is-
>- m >- ^ > co
CO o^ CO o^ CO o^
I g- i;
i ¿s. ?
«5
^' - '^^>jC > m O ^ w> - 2;
gS-llf 8 II* ¡ M II
^ OÙ LU I LU X OOLLJUJ >^OO<
03
Í î _ s ï I
I îlîsslll _
(0 g^3QÈzg^8 t CL g^OQ^
^ÛÛŒUJLULULIJX LUCÛ >- ü W <
§
'S
xi s II
I "S* c C § c
mJ (D <d O CD
¡i il I I ¿
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
27
ali ill I
fi fi
8. £ 8. ^
CD Q) ^
<D vP © vP
1-1- T- T-
^R¡ 28 PZ 28
s _ _ ^ _ I
¿ S- g o¿^ 3 § if J 22 S f
í 'S. 1 §m© Scoli:!« oË Sil
Í ìil II g s ! s S s s 5 S^S
.s1
CD 0 CD -^ CD
I
= 8 8 = c 8
c co c c fe Ç
8 "§ â ila
£ fi í í 8 í
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
28
CD vP
CM O- £
H
CD
ÏÊ
CM vO Csl CM
co 9 iõ ^ co ^
£ § £ & 2 8
*- ^O *- vP ^- vP
03 o^ CO o^ CO o^
.CD O ID CO XD h-
>• ^ >- oo >■ i-
5 ¿ ¿ _
1 I I I 5¿¿^ ¿ff I
§ 1 « 3 o-^jg^ ^ç-I?-- «
fill SŒQ-W
SŒQ-W till ^XÜUJCOZ
3Z>Z ^XÜUJCOZ O
8 I i„ § I
? E 11 H c
á 8 |f 8 8
|2 £ 8S & <£
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 29
Various short sellers, fund managers, investors, and financial analysts hav
used corporate governance, relating to board of directors' responsibilities, and
qualitative red flags in making their investment decisions (Anders 2002; Bryan
and Opdyke 2002; Mulford and Comiskey 2002; Schilit 2002; Willis 2002).
corporate governance factors have been leading indicators of fraud prob
many of our 19 fraud companies, as these factors have occurred well befo
stock prices of these companies dropped down near zero. For example, m
Enron's qualitative factors (weak controls, senior management turnover, i
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
30 HUGH GROVE (USA) AND ELISABETTA BASILICO (USA)
Table 7
Significant corporate governance variables
Manipulators Nonmanipulators
f 3.5
t 2.99
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 31
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
32 HUGH GROVE (USA) AND ELISABETTA BASILICO (USA)
one year before the frauds became public knowledge, this model had overall 76
percent accuracy with 14 percent Type I errors and 10 percent Type II errors. The
overall accuracy slipped to 66 percent two years ahead of the frauds with 17 percent
Type I errors and 17 percent Type II errors. For both fraud and nonfraud companies
in specific industries, this model had accuracies of 80 percent, 78 percent, 86 percent,
60 percent, and 83 percent for the global energy, telecommunication, food service,
software, and computer equipment industries, respectively, in the year prior to the
frauds being publicly announced.
Qualitative red flags included corporate governance factors and worked well
for the fraudulent companies, particularly the following: all-powerful CEO, weak
system of management control, senior management turnover, insider stock trading,
and questionable business strategies with opaque disclosures.
For future research, the ten corporate governance factors might be measured or
operationalized with dummy variables ("on" if the factor exists or "off" if it does
not exist) as follows:
6. Insider stock sales: review insider stock sales reported to the SEC.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 33
References
American Institute of Certified Public Accountants. 2003. The CPA's Handbook of Fraud
and Commercial Crime Prevention. New York.
Anders, G. 2002. "How to Spot the Next Enron." Fast Company, April 24: 1-3.
Beasley, M. 1996. "An Empirical Analysis of the Relation Between Board of Director
Composition and Financial Statement Fraud." Accounting Review (July): 443-465.
Beasley, S., J. Carrello, and D. Hermanson. 1999. "Fraudulent Financial Reporting:
1987-1997: An Analysis of U.S. Public Companies." Committee of Sponsoring Orga-
nizations of the Treadway Commission, New York.
Beaver, W. 1967. "Financial Ratios as Predictors of Failure." Accounting Review (Janu-
ary): 31-35.
Bell, T., and J. Carello. 2000. "A Decision Aid for Assessing the Likelihood or Fraudulent
Financial Reporting." Journal of Practice and Theory 19: 169-178.
Beneish, M. 1999. "The Detection of Earnings Manipulation. Financial Analyst s Jour-
nal (September/October): 24-36.
Bryan-Low, C, and J. Opdyke. 2002. "How to Predict the Next Fiasco in Accounting and
Bail Early." Wall Street Journal January 24: Cl.
Cook, T., and H. Grove. 2004. "Statistical Analysis of Financial Ratio Red Flags." Oil
Gas & Energy Journal (December): 321-346.
Cullinan, C, and S. Sutton. 2002. "Defrauding the Public Interest: A Critical Examina-
tion of Reengineered Audit Processes and the Likelihood of Detecting Fraud." Critical
Perspectives in Accounting (June): 1-17.
Deakin, E. 1972. "A Discriminant Analysis of Predictors of Business Failure." Journal of
Accounting Research (March): 330-345.
Dechow, P., R. Sloan, and A. Sweeney. 1996. "Causes and Consequences of Earnings Ma-
nipulation: An Analysis of Firms Subject to Enforcement by the SEC." Contemporary
Accounting Research (spring): 1-36.
Grove, H., and T. Cook. 2004. "Lessons for Auditors: Quantitative and Qualitative Red
Flags." Journal of Forensic Accounting 5(1): 131-146.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
34 HUGH GROVE (USA) AND ELISABETTA BASILICO (USA)
Healy, P., and J. Wahlen. 1999. "A Review of the Earnings Management Literature and Its
Implications for Standard Setting." Accounting Horizons (December): 365-383.
Maddala, G. 1983. Limited- Dependent and Qualitative Variables in Econometrics. Cam-
bridge, MA: MIT Press.
McLean, B. 2001. "Is Enron Overpriced?" Fortune (March): 123-126.
Mulford, C, and E. Comiskey. 2002. The Financial Numbers Game: Detecting Creative
Accounting Practices. New York: John Wiley.
Schilit, H. 2002. Financial Shenanigans. New York: McGraw-Hill.
Standard & Poor's. Compustat Data Guide. 2003. New York: McGraw-Hill.
Stolowy, H., and G. Breton. 2000. "A Framework for the Classification of Accounts
Manipulations." Paper presented at the European Accounting Association Annual
Meeting, Graz, Austria, April.
Wells, J. 2001. "Irrational Ratios." Journal of Accountancy (August): 80-83.
Willis, G. 2002. "What Evil Lurks in the Heart of Corporate America?" SmartMoney
(April): 126-128.
1. All-powerful CEO
The CEO is also the chairperson of the board of directors. Insiders (senior company
managers) on the board have majority control, and there is a failure of corporate
governance by the board to protect shareholders.
Corporate examples
The original CEO, usually the company founder, was also the chairman of the
board at Enron, WorldCom, and Global Crossing. The Qwest Chairman of the
Board who was the largest single shareholder, hand-picked the CEO. In Europe,
Parmalat began as a family-owned meat company that grew into a global food gi-
ant. The CEO, who was the company founder, the CFO, and the company lawyer
continued to run the corporation together. Thus, insiders controlled the board of
directors even after it went public and rapidly expanded.
The SEC can ban, temporarily or permanently, individuals from serving as of-
ficers or directors of public companies if the individuals have committed securi-
ties fraud.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 35
Corporate examples
Parmalat's CEO has admitted shifting over €500 million ($400 million) cash
the company to other businesses. However, a recent Parmalat report prepared
independent auditor for prosecutors in Milan put that number closer to €1
($800 million) cash. Although Parmalat had reported profits each year, this
said that Parmalat had only one profitable year between 1990 and 2002. An
example is the Swiss company Adecco, the world's largest temporary emp
agency. It had a board of directors and three-person audit committee, comp
only Europeans. Meanwhile, 20% of total revenues were in the United States
the fraud occurred from overstated revenues, billing errors, lack of internal co
and poor information technology security.
The CEO and the CFO are required to discuss their firm's internal controls and proce-
dures in place to prevent fraud. CEOs and CFOs are required to state that establishing
and maintaining the internal control structure is their responsibility and to provide an
annual assessment of the effectiveness of those procedures in annual reports.
Audit committee members must be independent and are prohibited from receiving
compensation from the firm, except for board service. In addition, audit committees
must have at least one member who is a financial expert.
The overriding performance goal is to "make the numbers" for each quarter and
each year. More performance emphasis is given to revenue, or "top-line" growth,
than earnings, or "bottom-line" growth.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
36 HUGH GROVE (USA) AND ELISABETTA BASILICO (USA)
Corporate examples
Qwest's CEO was criticized by his own board for having a short-term focus on
making the numbers, particularly double-digit revenue growth. For example, to
help make its revenue goals in one year, Qwest recorded 13 months of advertising
revenues from its telephone directories, instead of the normal 12 months. Qwest
also did quarter and year-end swaps of its fiber optic networks with other compa-
nies, such as Global Crossing and Enron, to make its double-digit revenue targets.
To make its revenue goals, the Dutch company Ahold recorded supplier rebates as
revenues. A German firm rejected a proposed merger with Enron, citing Enron's
huge off-balance-sheet debt and other aggressive accounting practices. Another
German firm rejected a proposed merger with Qwest, citing its huge on-balance
sheet debt and aggressive accounting practices.
CEOs and CFOs are required to certify that they have reviewed all quarterly and
annual reports filed with the SEC. Also, in a written report, they must state that, to
the best of their knowledge, the reports present fairly the financial condition and
operations of the firm and do not omit material information. Individuals can be
fined up to $5 million and be sentenced to up to 20 years in prison for violating
this requirement.
This enabled the SEC to adopt Regulation G governing the use of non-Generally
Accepted Accounting Principles (GAAP) financial measures, including disclosure
and reconciliation requirements. Thus, many U.S. technology companies that used
pro-forma (non-GAAP) accounting to make revenue and earnings targets in their
press releases have to reconcile such numbers to GAAP financial statement numbers
in an 8-K report to the SEC.
When questioned by outsiders, like financial analysts during conference calls, the
CEO is defensive and abusive to these outsiders. The CEO and senior managers,
like the CFO, may wind up lying to outsiders.
Corporate examples
Enron's CEO was uncomfortable with criticism. In a conference call with financial
analysts, he called one financial analyst an "asshole" when questioned about En-
ron's performance. Jim Chanos, who was the first hedge fund manager to question
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 37
The CEO and other senior managers, especially the CFO, quit their "drea
and many say they are doing so "to spend more time with their families."
Corporate examples
Enron's CEO, Jeffrey Skilling, resigned only six months after being prom
his "dream job," and called it a "purely personal" decision, elaborating t
wanted to devote more time to his family. One investment-fund manage
Hammerschmidt, said, "That was the worst excuse I've ever heard. As so
heard that, I dumped my shares" (Bryan-Low and Opdyke 2002). Others,
ing Sherron Watkins, the Enron whistleblower, have speculated that Skilli
that Enron's falling stock price would cause Enron's loan guarantees of
partnerships to be exposed and then lead to Enron's bankruptcy. Similarly
CFO resigned over one year in advance of its accounting problems surfac
Parmalat's CFO quit nine months before it went into bankruptcy after a bo
was surprisingly pulled out.
Senior managers, especially the CEO and the CFO, are selling their own company's
common stock at current prices, rather than holding these shares for the long term.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
38 HUGH GROVE (USA) AND ELISABETTA BASILICO (USA)
At the same time, they are misleading investors by saying that the company's stock
is undervalued and has a great future.
Corporate examples
Significant insider trading occurred at Enron in the second half of 2000 and the
first half of 2001 before its stock crashed in the last half of 2001. Top managers
voted with their feet. The former CEO (Kenneth Lay), and the current CEO (Jef-
frey Skilling), the general council, the CFO, and other chief executives all sold
large blocks of stock. In 2000, Lay made $66.3 million and Skilling made $60.7
million from exercising stock options and selling the shares, roughly double the
amounts the year before. A shareholder lawsuit has alleged that 29 Enron execu-
tives made $1.1 billion in profits on insider sales. Since the selling at Enron was
prolific and it persisted even as the stock fell throughout 2001 , one financial analyst
at Thomson Financial, Paul Elliot, called such insider sales a "screaming red flag,"
and questioned: "if Lay and Skilling believed that the stock was undervalued and
headed for $120, as they repeatedly told investors, then why were they cashing in
so heavily?" (McLean 2001, 124). Lay and Skilling have since been indicted by
the U.S. Department of Justice on numerous counts of conspiracy and securities
fraud. Similar insider trading occurred at Qwest where eight Qwest senior execu-
tives made $2.2 billion in profits while still "touting" the stock price prospects
at Qwest. Qwest's CEO has also been indicted on numerous counts of securities
fraud. Similarly, WorldCom's CEO and CFO have been convicted of securities
fraud for insider trading.
This mandated that the SEC address executive trades of company stock. The SEC has
now required that such trades be reported electronically to it within two days as well
as being posted on the company's Web site. The old requirement was 45 days.
This required forfeiture of bonuses and profits from equity sales by CEOs and CFOs
when firms restate financial statements for material noncompliance with financial
reporting requirements as a result of misconduct.
Officers and directors are prohibited from purchasing or selling company stock
during blackout periods when employees are prohibited from selling their
company stock in 401(k) retirement plans while plan administrators are being
changed.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 39
Corporate examples
Firms are required to disclose whether they have adopted a code of ethics for their
CEO, CFO, and senior accounting personnel. Also, they have to file a report (8-K)
with the SEC whenever there is a change or waiver in the code.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
40 HUGH GROVE (USA) AND EL1SABETTA BASILICO (USA)
ternal controls, and auditing. This section made retaliation against whistleblowers
a criminal act.
The company often pays the audit firm additional consulting fees that may exceed
the audit fees. Using the same audit partner as the chief engagement partner is often
a condition for retaining the audit firm.
Corporate examples
Italian securities laws require that a company change its external auditors every five
years. Parmalat got around that requirement in two ways: (1) it initially had its lead
audit partner change auditing firms, and (2) it subsequently switched 51 percent of
its business to the Cayman Islands where the former lead audit firm had been rotated.
Thus, the same audit partner had signed various parts of Parmalat's audits for 20 years.
There were also independence problems with Enron's auditor, Arthur Andersen (AA).
AAs consulting fees with Enron were $27 million, larger than its audit fees of $25
million. Many former AA auditors worked for Enron, and Enron outsourced its entire
internal auditing work to AA. AA was also the auditor of Qwest, Global Crossing,
and WorldCom and earned large consulting fees from those firms. The HealthSouth
auditors charged about $1 million annually for audit fees while earning slightly less
from performing janitorial inspections of HealthSouth's 1,800 health-care facilities.
Lead audit partners, but not firms, must rotate off an audit engagement every five
years. Also, a company is prohibited from hiring anyone who has worked for its
audit firm during the one-year period preceding an audit. The prohibited jobs are
CEO, CFO, controller, chief accounting officer, and equivalent positions. Sec-
tion 508 also prohibited audit firms from designing and implementing financial
information systems, providing internal audit services, and offering valuation and
appraisal services to audit clients. Basically, only the major services of audit and
income-tax preparation may be performed by a firm's auditors.
Public accounting firms now have to retain documents prepared to support their
audit reports for at least seven years.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
FRAUDULENT FINANCIAL REPORTING DETECTION 41
Corporate examples
The sell-side financial analysts who worked for the investment bank firms tha
earned significant fees from Enron and Parmalat had the same independence
problems as the auditors. Typically, investment fees are much higher than equi
research fees. As one example of independence problems, 17 of the 18 sell-sid
analysts following Enron still had buy recommendations the day after the C
Jeffrey Skilling resigned, ignoring that red flag. One investment bank fired
financial analyst for changing his investment rating to a "sell" recommenda-
tion on Enron at $38 per share. Another big firm told its financial analysts t
maintain a "buy" recommendation for Enron no matter what. One of Parmalat
investment bankers upgraded its investment recommendation from hold to buy
November 2003, saying the current price of €2.20 ($1.76) was a bargain becau
Parmalat's restructuring was attractive for its stock price. That bank has bee
sued in two lawsuits.
This enabled the SEC to create rules governing research analysts' conflicts of inter-
est, but the SEC has not yet acted on this section.
In December 2002, the twelve largest U.S. investment banking firms agreed to pay
$1 billion in fines to end SEC and other investigations into whether they issued
misleading stock recommendations and handed out hot new shares to obtain favor
with corporate clients. These firms also have to pay an additional $500 million
over five years to buy stock research from independent analysts and distribute it
to investors. New York Attorney General Eliot Spitzer, the lead negotiator of the
settlement, said, "Hopefully, these rules will restore investor confidence by restor-
ing integrity to the marketplace" (Grove and Cook 2004, 140).
An opaque (unclear) disclosure strategy may exist for the company's business
model and related financial reporting. The well-known investors, Warren Buffett
and Peter Lynch, have both given the following advice: "If you don't understand
what a company does, don't invest in it. If management refuses to fill in holes
and keeps investors in the dark, run!" (Buffett, Berkshire Hathaway annual report
2003, 18).
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms
42 HUGH GROVE (USA) AND ELISABEJTA BASILICO (USA)
Corporate examples
This enabled the SEC to adopt rules requiring disclosure of all material off-balance
sheet transactions and debt.
Section 409
Firms have to report material changes in their financial condition on a "rapid and
current basis." This section encouraged real time reporting, as opposed to the
current 35-day and 90-day delays in quarterly and annual reporting to the SEC.
It also encouraged continuous assurance and auditing which is already enabled
by enterprise reporting systems (ERPs), provided by software vendors like SAP,
Baan, and Oracle.
To order reprints, call 1-800-352-2210; outside the United States, call 717-632-3535.
This content downloaded from 179.6.215.76 on Thu, 29 Aug 2019 03:29:38 UTC
All use subject to https://about.jstor.org/terms