Professional Documents
Culture Documents
Insa Tönnemann
1
ACKNOWLEDGEMENT
First of all, I would like to express my sincere gratitude and appreciation to my supervisor
Prof. Dr. Franz Isselstein for his advice and useful recommendations.
I would like to express my deepest gratitude to my parents for all their love, patience and
inspiration throughout my life.
2
ABSTRACT
„Financial statements tell a story and the story should make sense. If not, it’s possible
the story is a fake”.
W. Steve Albrecht.
The incentives of fraudsters and their patterns applied to mislead stakeholders were
analysed in this study. By examining SDAX and MDAX listed companies between 2010
and 2016, the risk of financial statement fraud in Germany was investigated. The results
of the study show, that the majority of German shares are disclosing a high quality of
financial information. This seems to be related to an effective audit approach of German
audit firms. Nevertheless, irregularities in financial data could be detected by the
application of two accounting-based models, namely Beneish M-Score and Dechow F-
Score. It is recommended to implement these two models into the audit field work.
3
TABLE OF CONTENTS
1. INTRODUCTION............................................................................................. 11
2. LITERATURE REVIEW.................................................................................. 17
4
2.3.2.4 Lengthen Depreciation Lives .......................................................... 28
5
2.6.3.2 Types of analytical review procedures ............................................. 45
2.6.4.3 First-Order-Tests............................................................................... 49
6
4.5 Model Description.......................................................................................... 67
Appendix……………………………………………………………………………. 86
References……………………………………………………………………………. 95
7
LIST OF TABLES
8
LIST OF FIGURES
9
LIST OF ABBREVIATIONS
10
1. INTRODUCTION
In this paper, I will analyse the motivation and incentives for managers to violate
GAAP and comprehensively explain commonly applied fraud patterns. In this context, it is
important to clearly define the term financial statement fraud and to conceptually distinguish
it from earnings management which not necessarily breaches legal accounting practices.
Subsequently, I would like to examine customary audit procedures adopted to detect
financial statement fraud. Furthermore, I will investigate the incidence of undetected
financial statement fraud in German issued corporations. I will analyse financial statement
data using two commonly known accounting-based models, namely Beneish’s M-Score and
Dechow’s F-Score.
11
misrepresentation of the truth or concealment of a material fact to induce another to act to
his or her detriment”. According to Elliott and Willingham (1980) management fraud is
“deliberate fraud committed by management that injures investors and creditors through
misleading financial statements” (p.4). By simply modifying Healy and Wahlen’s definition
of earnings management (1999), Perols and Lougee (2011) define financial statement fraud
as follows: “Financial statement fraud occurs when managers use accounting practices that
do not conform to GAAP to alter financial reports to either mislead some stakeholders about
the underlying economic performance of the company or to influence contractual outcomes
that rely on reported accounting numbers” (p. 40). GAAP is “a common set of standards and
procedures for the preparation of general-purpose financial statements that have either been
established by an authoritative accounting rule-making body, (…), or over time have become
accepted practice because of their universal application” (Mulford & Comiskey, 2002, p.
52). The terms management fraud and financial statement fraud have been used
interchangeably over the years as management is responsible for financial reporting (Rezaee
& Riley, 2009). All these definitions have in common that financial statement fraud
constitutes an intentional manipulation of financial statements which aims at deceiving
external users.
In the Anglo-American sphere, financial statement users apply the presentation of
the Association of Certified Fraud Examiners (ACFE) to characterise fraud (Hofmann,
2008). ACFE defines financial statement fraud as “the deliberate misrepresentation of the
financial condition of an enterprise accomplished through the intentional misstatement or
omission of amounts or disclosures in the financial statements to deceive financial
statements users”. In this context, ACFE has developed the “Occupational Fraud and Abuse
Classification System” also known as “Fraud tree” which depicts different fraudulent actions
and categorises occupational fraud into corruption, asset misappropriation and financial
statement fraud. Each of these categories is broken down into several subcategories (ACFE,
2016.
Following international aspirations, Institut der Wirtschaftsprüfer (Institute of Public
Auditors in Germany) (IDW) promulgated generally accepted standards for the review of
financial statements in Germany. The auditing standard “IDW PS 210: Zur Aufdeckung von
Unregelmäßigkeiten im Rahmen der Abschlussprüfung” deals with the detection of
misstatements as part of the audit engagement. Its rules and regulations are in accordance
with the International Standard on Auditing (ISA) 240 and ISA 250 codified by the
International Auditing and Assurance Standards Board (IAASB). IDW PS 210 initially
12
separates material misstatements in the financial statements from other violations of law, as
the latter are of no interest for the purposes of IDW. The misstatement of the financial
statements can result from either “fraud” or “error” (IDW PS 210). The latter are an
aftereffect of unintentional actions such as typing and calculation errors, unconscious
misapplication and accidental overlooking of accounting principles (IDW PS 210.7).
Furthermore, they can be caused by incorrect assumptions according transactions (IDW PS
210.7).
On the contrary, fraud always occurs as a consequence of intentional behaviour (IDW
PS 210.7). It includes fraudulent financial reporting and misstatements resulting from
misappropriation of assets. Fraudulent financial reporting is accomplished by the
manipulation, falsification or alteration of accounting records or supporting documentation
from which the financial statements are prepared (IDW PS 210.7, ISA 240.A3).
Furthermore, fraudsters misrepresent events, transactions or other significant information in
the financial statements and deliberately misapply accounting principles (IDW PS 210.7,
ISA 240.A3). Financial statement fraud can be committed by legal representatives,
supervisory bodies, employees and in some cases assisted by third parties (IDW PS 210.7).
It is often characterised by the management override of controls that otherwise may appear
to be operating effectively (IDW PS 210.7, ISA 240.A3). Misappropriation of assets includes
the unlawful appropriation or reduction of corporate assets as well as the increase of legal
obligations. This especially includes embezzlement and theft. It has to be stated that
misappropriations of assets only constitute a misstatement of financial statements in the
sense of IDW PS 210 provided that they reflect a misrepresentation in the financial
statements. In other respects, they have to be classified as other violations of the law.
Following IDW PS 210, this study concentrates on violations of law which result in
misstatements in the financial statements.
13
1.2.1 Fraud Triangle
The “Fraud Triangle” was once created by Donald R. Cressey (1953) who
investigated the origin of fraud within the scope of his dissertation. While interviewing
violators (among them were accountants, bankers, business executives and independent
businessmen), he identifies three common characteristics leading to criminal activities
(Cressey, 1953). Firstly, the perpetrators have the opportunity to commit fraud. Secondly,
they feel an individual perceived, non-shareable financial need (pressure). And thirdly, they
rationalise their behaviour, as “trust violators usually consider the conditions under which
they violated their own positions of trust as the only “justifiable” conditions” (Cressey, 1953,
pp. 140-141). In the following years, many researchers examined the relation between the
three factors of the fraud triangle. Romney, Albrecht and Cherrington (1980), express their
findings in an additive model:
This model hypothesises that it does not depend on the single values of the three
variables to assume fraud (Romney et al., 1980). In fact, the total amount of the formula is
of importance, meaning that one variable has the power to substitute another (Romney et al.,
1980). Following this assumption, “a fraud could theoretically occur under any situation if a
person is motivated enough, even in the absence of outward opportunities or pressures”
(Romney et al., 1980, p. 64). From a logical point of view this cannot be true. If there is no
opportunity to break the rules, it will be impossible for the individual to implement its
preconceived plan of committing fraud (Terlinde, 2005).
Thereupon, Loebbecke et al. (1989) developed another model to assess the likelihood
of fraud, consisting of the three factors condition, motivation and attitude. According to their
interpretation there have to be appropriate conditions in the organisation such that a fraud
can be committed. Additionally, the potential perpetrators have to be motivated (Loebbecke
et al., 1989). The attitude or set of ethical values allowing themselves “to knowingly commit
a dishonest, criminal act” is an absolute precondition of committing fraud (Loebbecke et al.,
1989, p. 4). In contrast to Romney et al. (1980), Loebbecke et al. (1989) come to the
conclusion that the requirements of all single factors have to be fulfilled in order to assume
a high probability of fraud:
14
favourable when the company has a weak board of directors, inadequate internal controls,
or complex, impermanent organisational structures (Albrecht et al., 2008, Hofmann, 2008).
Moreover, managers frequently take advantage of certain responsibilities to circumvent
controls (management override) (Behringer, 2014). Reversely, the likelihood of committing
fraud is low, when managers fear the detection of their unlawful behaviour (Albrecht et al.,
2008).
1.2.1.4 (Rationalisation)
Fraudsters use explanations to justify their behaviour as acceptable. In doing so, they
pretend that their actions pursue an overarching goal and they talk themselves into believing
the legitimacy of their criminal approach (Duffield & Grabosky, 2001). This behaviour
pattern is called neutralisation and includes different techniques (Duffield & Grabosky,
2001). Committing fraud in a large company is often excused on the spurious ground of not
causing damage, arguing “they can afford it” (Duffield & Grabosky, 2001). Furthermore,
fraudsters relativize their practices by pretending to pursue necessary business practices: “all
companies use aggressive accounting practices” (Duffield & Grabosky, 2001, Albrecht et
al., 2004, p. 118). Additionally, many perpetrators reassure themselves by asserting to
support the long-term success of the company, “we need to keep the stock price high” or
“the problem is temporary and will be offset by future positive results” (Albrecht et al., 2004,
p. 118).
1.2.2 Fraud Diamond
Wolfe and Hermanson (2004) supplement the three factors of the fraud triangle by a
fourth element, creating a four-sided fraud diamond.
The researchers argue, that the three factors pressure, opportunity and rationalisation
are not sufficient conditions to commit fraud, rather the individual’s capability would be
decisive (Wolfe & Hermanson, 2004). From their point of view, potential perpetrators must
have specific skills and traits to realise their preconceived plans (Wolfe & Hermanson,
2004). Capability assumes a certain hierarchy level and area of responsibility which allows
the individual to commit fraud (Wolfe & Hermanson, 2004). Moreover, the “capable” person
needs to be smart and confident to outwit the organisation’s control systems while not being
detected (Wolfe & Hermanson, 2004). Therefore, a successful white-collar criminal is
effective in consistent lying and has a high level of stress tolerance in order to deal with the
permanent risk of detection (Wolfe & Hermanson, 2004). Another significant competence
is the ability to coerce others to join or at least not report the activity (Wolfe & Hermanson,
2004).
16
However, it is questionable whether the term “capability” added by the fraud
diamond really constitutes a new research finding in order to explain the occurrence of fraud.
Critics argue that the requirements of capability are already included in the factors
motivation and opportunity of the fraud triangle (Nimwegen, 2009 in Boecker & Zwirner).
In the audit industry, it is a widespread opinion that the three factors presented by the fraud
triangle are adequate to outline the conducive circumstances of fraud (Behringer, 2014). The
IAASB applies the fraud triangle as reference model in IAS 240 regulating “The Auditor’s
Responsibilities relating to fraud in an audit of financial statements”. The same goes for the
American audit profession (Behringer, 2014).
2. LITERATURE REVIEW
2.1 Incentives
After determining the circumstances which in general cause fraudulent actions, one
has to consider employees’ motivations to specifically misstate financial statements.
Understanding the incentives of executives to commit financial statement fraud is “a
necessary precursor to effectively preventing future occurrences” (Erickson et al., 2006, p.
114).
Over the last decades, accounting research has extensively investigated perpetrator’s
motives to manage earnings. Kellog and Kellog (1991) find evidence that the primary
reasons for earnings management are the need to raise capital and the target to continuously
increase shareholder’s value (Dechow et al., 1996, p. 4). Although earnings management
and financial statement fraud are different in so far that the latter invariably violates GAAP,
both have the same objective (Perols & Lougee, 2011). Their shared aim is to “either mislead
some stakeholders about the underlying economic performance of the company or to
influence contractual outcomes that rely on reported accounting numbers” (Perols & Lougee,
2011, p. 40). Therefore, the findings concerning executives’ incentives to manage earnings
are as well applicable in order to explain the occurrence of financial statement fraud. In
accordance with the latest academic research, the most important incentives for earnings
management are the debt covenant hypothesis in connection with borrowing costs, the bonus
hypothesis and the meeting or beating of analysts’ forecasts.
17
the borrower regulating the borrower’s compliance with certain key performance indicators.
The purpose of debt covenants is to restrain managers from courses of action which would
jeopardise the orderly repayment of the loans (DeFond & Jiambalvo, 1994). Managers have
to constantly monitor the financial development of their companies in order to meet the
specific accounting-based requirements (Mulford & Comiskey, 2002). In this context, the
question rises to what extent these conditions exert pressure on employees to exceed legal
limitations. Positive accounting theory hypothesises that debtors engage in earnings
management when facing the violation of contractually agreed financial measures (Debt
Covenant Hypothesis) (Watts & Zimmermann, 1986 in DeFond & Jiambalvo, 1994).
Companies will mislead about their financial performance and their financial position
because interventions by the creditors are feared (Watts & Zimmermann, 1986). This is
particularly the case, when the costs of non-compliance with debt covenants are significant
(Dichev & Skinner, 2002). Even if managers cannot avoid default, they still have the
intention of deceiving creditors in order to “improve their bargaining position in the event
of renegotiation” (DeFond & Jiambalvo, 1993). This behaviour is also applied long before
the first contractual negotiations (Mulford & Comiskey, 2002). By presenting high earnings
power and a strong balance sheet, debtors endeavour to convince creditors of a low default
risk hoping that they are charged less interest. Dechow et al. (1996) coincide with the debt
covenant hypothesis stating that managers employ legally questionable or even illegal
accounting choices in order to observe their contractually-fixed requirements. (Dechow et
al., 1996). However, some kind of short-sightedness is noted in this procedure. The
consequences of detecting earnings manipulation should not be underestimated, as “capital
market imposes substantial costs on firms revealed to be manipulators” (Dechow et al., 1996,
p. 3). Furthermore, the credibility of the fraudulent entity is seriously called into question.
Similar studies of DeFond and Jiambalvo (1994) and Franz et al. (2014) support the debt
covenant hypothesis.
18
have raised concerns about the influence of share-based compensation plans. Critics fear an
opposite effect, as managers could be encouraged to personally enrich themselves and thus
disregard their fiduciary duties. (Cheng & Warfield, 2005, Erickson et al., 2006) Whereas
Dechow et al. (1996) do not find systematic evidence for this hypothesis, Beneish (1999)
ascertains insider trading. Beneish (1999) determines that managers illegally overstate
earnings in order to profit from inflated prices. Therefore, they would have a particular
interest “to sell their equity holdings and cash-in their equity contingent compensation prior
to the public discovery of the overstatement” (Beneish, 1999, p. 454). Fraudsters would
proceed in this way because they know that once earnings manipulation is detected share
prices will decrease resulting in significant shareholder’s losses (Beneish, 1999). Summers
and Sweeny (1998) come to the same conclusion. They uncovered that fraudsters “reduce
their holdings of company through high levels of selling activity as measured by either the
number of transactions, the number of shares sold, or the dollar amount of shares sold”
(Summers & Sweeny, 1998, p. 131). Interpreting these findings, executive incentives seem
to encourage fraudulent behaviour in two stages. Firstly, share-based payment envisages
managers to manipulate earnings (legally or illegally). And secondly, managers exploit the
previously created effect of inflated prices by selling their overvalued shares.
19
of negative earnings surprises (Lakonishok et al., 1994). For this reason, executives regard
earnings management as an acceptable solution (Burgstahler & Dichev, 1996). Later
research of Burgstahler and Eames (2006) supports the previous findings. They confirm that
the high frequency of recognising “zero and small positive surprises” in contrast to the
infrequent reporting of losses results from accountants’ interventions (Burgstahler and
Eames, 1996, pp. 650-651). Arbabanell and Lehavy (2003) further investigate financial
analysts’ stock recommendations to predict the occurrence of earnings management.
Managers of shares receiving “buy” recommendations seem to be regularly involved in
earnings management to meet prospective analysts’ forecasts (Arbabanell & Lehavy, 2003).
On the contrary, companies which receive “sell” recommendations do not hesitate to show
negative unexpected accruals (Arbabanell & Lehavy, 2003). While researchers mostly
concentrate on the relation between analyst’s forecasts and legal earnings management,
Dechow et al. (2011), specifically observed managers’ motivation to commit financial
statement fraud. According to their findings, managers of fraudulent companies report
unusually strong earnings and share price performance over a longer period. Later on, this
puts pressure on managers “covering up a slowdown in financial performance in order to
maintain high stock market valuations” (Dechow et al., 2011, p. 77). Thus, managers are
highly incentivised to legally or even illegally manage earnings for the purpose of meeting
or beating analysts’ forecasts.
20
often closely related to the financial condition of the company (Schirmeister & Siebold,
2008). Although earnings management is mainly associated with earnings overstatement, it
also includes accounting choices which lead to understated earnings (Melumad & Nissim,
2009). During successful fiscal years in which a company generates high profits, earnings
are often adjusted conservatively in order to reduce tax payments and dividend distribution
(conservative accounting). On the contrary, management commonly strives a better
presentation of the real economic situation provided that financial performance is declining
(Schirmeister & Siebold, 2008). In this situation, accountants may aggressively apply
accounting principles, highly extending the scope of GAAP (Mulford & Comiskey, 2002).
The target of aggressive accounting is to mislead about the company’s success, by reporting
higher earnings and presenting a stronger balance sheet (Mulford & Comiskey, 2002).
Whereas some managers exploit legal opportunities, others violate GAAP to deceive
financial statement users. Identifying the line which separates aggressive accounting from
fraudulent financial reporting may be difficult, as it sometimes constitutes a fluent transition
(Mulford & Comiskey, 2002). Fraudulent financial reporting as a special case of earnings
management is under any circumstances outside of GAAP and thus invariably illegal
(Dechow & Skinner, 2000, Erickson et al., 2006). It includes “intentional misstatements or
omissions of amounts or disclosures in financial statements (…) that are determined to be
fraudulent by an administrative, civil, or criminal proceeding” (Mulford & Comiskey, 2002,
p. xx). Provided that fraudulent financial reporting causes a detriment effect on financial
statement users, it constitutes financial statement fraud (Mulford & Comiskey, 2002).
21
It can be stated that most of the world’s capital markets adopt IFRS, which is
promulgated by the IASB (PwC – IFRS Adoption by country). At EU level, IFRS comes
into effect within the scope of a specific endorsement procedure. In contrast, companies with
headquarters in the US apply US GAAP which is published by FASB. Although both
standards contain the same or at least similar basic principles and conceptual frameworks,
leading to comparable accounting results, there are differences as well (US GAAP vs. IFRS
Dec 2011, EY). Against the background that German preparers of financial statements adopt
IFRS, the fraudulent financial reporting methods presented in the following are analysed
according to IFRS. Special fraud schemes, common in the US, are explained by US-GAAP.
23
their computer clocks for the purpose of backdating invoices, packing lists and shipping
records (Sauer, 2002). While content and scope of the ordering processes are displayed
correctly, the time of physical delivery is presented in a manner that is false (Hofmann,
2008). This means, accountants are capable of recognising revenue on product sales, which
actually will be ordered and delivered in the subsequent accounting period (Hofmann, 2008).
However, it has to be stated that most booking software and internal control systems will not
enable such a manipulation.
24
encouragement of retailers to buy products in advance of their actual needs by promising
huge discounts, extended payment terms and favourable financing options (Sauer, 2002).
Channel stuffing constitutes fraud once the collectability of accounts receivable is highly
questionable (Wells, 2011). Therefore, side letters containing rights of return to unburden
retailers from unsaleable products are impermissible (Sauer, 2002). A risk transfer is rejected
in case suppliers offer an unlimited take-back of products with short expected shelf life
(Wells, 2011). The same applies to agreements allowing retailers to delay sales until products
are resold to end customers (Principles of Fraud Examination, Anti-Fraud-Management).
Furthermore, fraudsters preferably abuse exception rules created by the legislator in
order to respond efficiently to an economic approach. IASB specifically regulates the
accounting treatment of revenue and costs from long-term contracts. According to the
percentage-of-completion method, contract revenue and contract costs are allocated to the
respective accounting periods in which construction work is performed (IAS 11). This
approach is justified with the nature of the activity undertaken in construction contracts (IAS
11). Because the construction of an asset or a combination of assets usually extends over a
longer time, beginning and completion fall into different accounting periods (IAS 11). By
gradually recognising revenue, the company’s accomplishments are accurately represented
(Hurtt, 2000). However, the disadvantage of this method is its susceptibility to manipulation
(Wells, 2011). Typically, fraudulent companies deliberately overestimate the respective
project status in order to allocate more revenue to earlier accounting periods (Hurtt, 2000).
2.3.1.4 Misclassification
Against the background that loans and sales are both booked as credits in the
accounts, perpetrators exploit this systematic by classifying loans as income (Jones, 2011).
Moreover, fraudsters attempt to misallocate revenue, by misleading about what has been
sold (Sauer, 2002). Revenue from the rendering of services is illegally declared as revenue
from product sales in order to avoid a stage-of-completion accounting (IAS 18.20, IAS
18.21).
A preferred fraud scheme in the US is the misreporting of hybrid transactions,
consisting of a combination of sale of goods, provision of consulting and development
services (Sauer, 2002). Under US-GAAP, suppliers are not allowed to recognise revenue
from the product sale, for example the sale of a licence or software, unless it can be
interpreted as an independent contract (Sauer, 2002). Otherwise the revenue has to be
recognised over time along with the revenue of the rendering of the services (Sauer, 2002).
25
In order to prevent the misstatement of revenues arising from multiple-element
arrangements, IASB has issued detailed legal regulations in IFRS 15.
26
expenses is limited to their actual amount” in contrast to the enormous potential of creating
fictitious revenue (Sauer, 2002, p. 975). According to Callen et al. (2008), especially for loss
firms expenses are not particularly important because company’s market value is more likely
related to the ability of generating higher revenues. Nevertheless, accountants apply various
strategies to mislead about the actual amount of expenses.
Expenses by definition encompass losses as well as those expenses that arise in the
course of ordinary activities, including, for example, cost of sales, wages and depreciation
(F78). The reporting of expenses underlies the application of the matching principle, which
is “arguably the most important theoretical underpinning for the traditional income statement
approach to financial reporting” (Jin et al., 2014). Under this basis, expenses are recognised
when they occur and reported in the financial statements of the periods to which they relate
(F22). Consequently, expenses have to be reported in the same period as revenue because
these would not have been occurred without the former (Mulford & Comiskey, 2002).
27
of the respective accounts) and cover up the origin of the recorded expenses (Jones, 2011).
Through capitalising expenses, total assets are increased in the amount of the expense and
costs are spread over the following posting periods.
28
2.3.3.1. Misstating Fixed Assets
A typical fraud scheme for the purpose of inflating balance sheets includes the
recognition of fictitious assets (Wells, 2011). Considering balance sheet equilibrium,
perpetrators simultaneously adapt the liabilities side by the same amount. In most cases, the
corresponding account misused for this purpose is the owner’s equity account (Wells, 2011).
29
fictitious inventory or by falsifying physical inventory amounts (Mulford & Comiskey,
2002). In order to disguise the non-existence of faked goods, employees store boxes without
any content or other material worthless for the company’s purposes in the warehouse.
Avoiding the detection in case of inventory observations, inventory is moved from location
to location to mislead the auditor (Byington & Christensen, 2003). Furthermore, accountants
report goods which have defects and are unusable for further processing and sale (Mulford
& Comiskey, 2002). Additionally, warehouse staff forges the count sheets by simply
entering additional non-existing quantities or modifying the number of the real count
(Byington & Christensen, 2003).
Additionally, accountants manipulate the valuation of the company’s inventory by
increasing unsold goods and simultaneously decreasing cost of goods sold (Byington &
Christensen, 2003). Besides the inflation of current assets in the balance sheet, the
company’s gross profit margin is boosted as cost of goods sold are understated (Mulford &
Comiskey, 2002). The fraudster can for example overstate inventory by recognising it at
current supplier costs, regularly exceeding historical costs (Byington & Comiskey, 2002).
Knowing that auditors become suspicious discovering measurement differences,
accountants periodically transfer a portion of inventory to property, plant and equipment
(Mulford & Comiskey, 2002). In the fraudster’s opinion this would be a good solution
believing that the falsely recorded amounts are harder to detect in the property, plant and
equipment account (Mulford & Comiskey, 2002).
Furthermore, perpetrators overstate the number of products manufactured which
results in reduction of unit production costs and an increase in profit margin (Mulford &
Comiskey, 2002). However, the downside of this method is, that more of the production
costs are left in the ending inventory when products are sold which can be easily detected by
a correct inventory count (Mulford & Comiskey, 2002).
Moreover, costing methods are disregarded. According to IFRS, the cost of inventory
shall generally be assigned by using the first-in, first-out (FIFO) or weighted average cost
formula (IAS 2.25). On the contrary, US-GAAP also provides accountants the application
of the last-in, last-out (LIFO) cost formula. According to this formula, the latest items
purchased during the period are recognised in the cost of goods sold account. This means
the amount of cost of goods sold is highly dependent on the volatility of prices on the
procurement markets. When inventory costs are rising, cost of goods sold increase by the
same amount, entailing lower gross margins. A typical fraud pattern which exploits these
fluctuating prices is called LIFO liquidation. In case of rising inventory prices, a company
30
reduces the purchase of inventory needed (Mulford & Comiskey, 2002). The objective is to
limit the cost of goods sold as older inventory is derecognised (Mulford & Comiskey, 2002).
Conversely, when a company aims at a lower income, a higher amount of inventory which
is not in line with demand, is purchased at high prices (Mulford & Comiskey, 2002).
Furthermore, accountants violate GAAP by avoiding to write off over-aged and
damaged inventory or write down slow-moving inventory (Byington & Christensen, 2003).
31
2.3.4 Misstatement of liabilities
An essential characteristic of a liability is that the enterprise has a present obligation
leading to the giving up of resources embodying economic benefits (F.60, F.62). Thus,
fraudsters are motivated to undervalue liabilities or alternatively delete them off their books
(Sauer, 2002). This can be done by misleading about payment transactions and the amounts
due, postponing liabilities into later periods or simply destroying invoices (Sauer, 2002). The
overall aim is to improve the company’s financial position and to create the illusion of a
strong balance sheet.
32
Alternatively, fast growing companies, which heavily rely on external funds may
establish special purpose entities. The objective of a special purpose entity is “to narrow the
scope of risk to the assets and liabilities placed in the SPE, such that potential investors’ or
equity holder’ fortunes or misfortunes will be based entirely and exclusively on what occurs
with respect to the assets and liabilities placed within the SPE” (Newman, 2007, p 99). In
general, the foundation of a SPE results from legitimate business purposes and complies
with GAAP. But companies may violate GAAP when avoiding the consolidation of SPEs in
their financial statements. In case SPEs are organised as separate entities, they rather
constitute shell companies whose only reason for existence is the hiding of debt, which
should be orderly reported on the consolidated balance sheet (Jones, 2011, Feng et al., 2009).
33
characteristics, it is without any doubts more difficult to manipulate cash than earnings
(Jones, 2011). This is also shown by the fraud schemes mentioned in the previous chapters.
Considering the method of overstating revenue for example, an inflation of accounts
receivable is achieved, but an impact on the generation of operating cash flow cannot be
observed. Nevertheless, fraudsters find ways to misstate cash flows (Jones, 2011). They
exploit the presentation format which divides cash flows by its activities and misclassify the
cash inflows and cash outflows (Mulford & Comiskey, 2002). This procedure does not
change the total cash flow, but allows accountants to mislead about the amount of operating
cash flow generated (Mulford & Comiskey, 2002). In this context, accountants try to allocate
as much inflows as possible under the heading of operating cash flows (Jones, 2011). For
this purpose, non-recurring cash inflows and bank loans are classified as operational cash
inflows (Jones, 2011). Additionally, operating cash outflows are minimised by transferring
operating losses or expenses to the disclosure of investing and financing activities (Jones,
2011).
34
Secondly, it was observed that sophisticated investors are capable of outperforming
the market, which is represented by a growing number of short sales two months before
earnings manipulation is initially made public (Dechow et al., 1996). After the
announcement a wider dispersion of analysts’ forecast can be monitored, continuing even
three years later (Dechow et al., 1996). These findings emphasise the markets’ loss of
confidence concerning the truthfulness of financial disclosure (Dechow et al., 1996). Once
investors are informed about misstatements, they correct downwards their previous
estimates. As a consequence, companies substantially lose market value, showing abnormal
return estimates (Dechow et al., 1996, Hribar & Jenkins, 2004). Market returns range from
-4 to -12 % depending on the sample examined (e.g. Dechow et al., 1996; Anderson & Yohn,
2002, Palmrose et al., 2004). Anderson & Yohn (xxxx) find a relatively more negative
market reaction with regard to revenue recognition problems. Palmrose et al. (2004)
emphasise the impact of fraud issues on the share price movement. This is due to the fact
that the integrity of companies which were deliberately misleading market participants is
seriously called into question (Palmrose et al., 2004).
The significant negative returns after announcing restatements prove that capital
market directly penalises companies in case their fraudulent behaviour is detected. On the
downside it suggests that managers are initially able to successfully boost the firms’
perceived value by misstating financial statements, at least in the short run (Gerety & Lehn,
1997, Dechow et al., 1996).
In order to complement the previous research findings, which investigated
characteristics associated with cost of capital, the objective of Hribar and Jenkins (2004) is
to directly estimate the cost of capital effect. Their study shows a relative percentage increase
in the cost of capital ranging between 7 and 19 % which depends on the estimation model
used (Hribar & Jenkins, 2004). Moreover, they report the largest increase in cost of capital
in case the restatements are upon auditor’s request (Hribar & Jenkins, 2004). Interestingly,
after a restatement investors expect the company’s earnings inferring from prices to increase
at a higher rate, which is due to the downwards revised past earnings (Hribar & Jenkins,
2004). Nevertheless, the expected future earnings are discounted at a higher rate which is
the outcome of investors’ increased risk awareness resulting from past misstatements (Hribar
& Jenkins, 2004).
35
earnings (Beneish & Nichols, 2005). This can be explained by the fact that overstated
earnings mislead about the base from which prospective earnings will grow (Melumad &
Nissim, 2009). However investors expect these companies to have higher future earnings
(Beneish & Nichols, 2005). They overestimate next-period return on assets by 490 to 690
basis points (Beneish & Nichols, 2005).
36
restatements. They find that 60 percent of restating firms experience a turnover of at least
one top manager within 24 months after the announcements compared to 35 percent among
age-, size-, and industry-matched firms (Desai et al, 2006). Furthermore, managers of
companies which were obliged to restate their financial statements have subsequently poorer
employment prospects than managers terminated due to other reasons (Desai et al, 2006).
37
(Hofmann, 2008). However, critics forget that not the auditor is primarily responsible of
inhibiting and detecting fraud but rather “those charged with governance of the entity and
management” (ISA 240).
Company’s executive board for example is obliged to take certain organisational
measures such as the implementation of both internal control system and internal audit. In
this context, it has to be ensured that controls are operating effectively and are capable of
reducing the risk of fraudulent actions. Furthermore, executives should set a good example
by creating “a culture of honesty and ethical behaviour” (ISA 240). In addition, executive
board bears responsibility of preparing a code of conduct in order to regulate how to deal
with actual or suspected infringements within the organisation (Schindler & Gärtner, 2004).
Besides, supervisory board is authorised to monitor the operations of the entity’s
management and to approve significant business decisions. With regard to German stock
corporation, this obligation derives from § 111 Abs. 1 AktG and § 90 AktG. Especially,
where legal representatives are involved in fraud schemes (management override of
controls), supervisory board is responsible of intervening and detecting such unlawful
actions, as oversight and supervision can only be exercised by a higher company level
(Schruff in Schindler & Gärtner, 2004).
Nonetheless, the auditor has a certain responsibility empowered by law. According
to § 317 Abs. 1 Satz 3 HGB, an audit has to be conducted such that misstatements materially
affecting the presentation of the net assets, financial position and results of operations in the
annual financial statements are detected with reasonable assurance. Nevertheless, there
remains a residual risk of not uncovering infringements “even though the audit is properly
planned and performed in accordance with the ISAs” (ISA 240.5).
Firstly, this can be explained by the underlying nature of the audit which in contrast
to embezzlement audits for example does not aim at criminal investigations (Ruhnke &
Schwind, 2006). In fact “the auditor may accept records and documents as genuine” (ISA
240.13) provided there is no indication for fraud. By critically evaluating the correct
application of accounting principles and the appropriateness of estimates made by
management (Schindler & Gärtner, 2004), auditors can preclude with moderate assurance
the occurrence of fraudulent reporting. However, foolproof security cannot be guaranteed.
This emerges as well from the limited period and resources of an audit forcing the auditor to
examine samples and not to investigate all transactions of an entity (Schindler & Gärtner,
2004).
38
Secondly, the inherent characteristics of fraud impede auditors to detect possible
violations of law. As fraud regularly consists of highly complex fraud patterns involving
“forgery, deliberate failure to record transactions, or intentional misrepresentations” (ISA
240.7), the risk of overlooking manipulations, is higher than with regards to errors.
Therefore, the auditor’s detection rate is dependent on external factors such as criminal
energy of the fraudster and the frequency and extent of the misstatements (ISA 240.6).
Although the auditor is not responsible of preventing fraud it should be in the interest
of the audit profession to avoid further accounting scandals (Schruff, 2005). The audit
profession is deemed as “last line of defence” which is why investors rely on the
trustworthiness of an audited financial statement. Therefore, the auditor has the duty to
constantly improve the audit approach and apply effective methods to detect fraudulent
financial reporting (Schruff, 2005).
39
namely, fraudulent financial reporting and misappropriation of assets. It is orientated
towards the fraud triangle model classifying red flags into the categories
incentives/pressures, opportunities and attitudes/rationalisation. In addition, ISA
240.appendix3 lists examples of circumstances that indicate the possibility of fraud.
Examples are provided with regard to discrepancies in the accounting records, conflicting or
missing evidence and problematic or unusual relationships between the auditor and
management.
41
members of the supervisory body, but at least the chairman should be interviewed (Schindler
& Gärtner, 2004).
Somehow, with regard to the information quality, inquiries of others within the entity
should not be underestimated as these provide a different perspective (Schindler & Gärtner,
2004). Through this, employees of a lower level of authority are given the opportunity to
uncover violations which would otherwise have not been detected (ISA 240.A16).
42
2.6.3 Analytical Review Procedures
Over the last decades, auditors have commonly applied analytical review procedures
in order to assess the credibility of their clients’ financial figures (Glover et al., 2015).
Adopting an indirect approach, these measures evaluate financial statements on a high level
ignoring the inspection of individual journal entries (Hitzig, 2004). In fact, economic
plausibility is examined by comparing expected relationships among data items to actual
observed relationships (Busta & Weinberg, 1998). Although, the concept of analytical
review procedures can be compared to the approach of financial statement analysis, one
should be aware of a significant difference between these two methods (Hitzig, 2004). In
case of analytical review procedures, the analysis of certain ratios is on the basis of unaudited
financial figures, meaning accuracy of amounts cannot be guaranteed (Hitzig, 2004).
2.6.3.1 Application
Generally speaking, the auditor can apply analytical review procedures during all
phases of the audit engagement (ISA 520, Calderon & Green, 1994). At the beginning and
the final stage of the audit, analytical review procedures might be useful for giving the
auditor an overall, more general impression (Glover et al., 2005). The auditor is able to get
a deepened knowledge of the client and the underlying industry and can identify certain
dependencies and developments (ISA 520). In order to investigate whether companies’
accounts are free from error or fraud, analytical review procedures are part of evidence
gathering activities and implemented in the execution phase (Glover et al, 2005).
44
balance or ratio results from a misstatement” or is triggered by economic changes (Blocher
& Patterson, 1996, p. 54). Changes in value can stem from various negligible reasons,
including for example extraordinary transactions or events, changes in the field of financial
reporting, new business areas or temporary, random fluctuations (Sell, 1999, Gärtner, 1994).
A preferred method chosen by auditors to detect potential material misstatements is
the so called time-series analysis. Time-series analysis evaluates the development of a
company over the years concerning its financial position, financial performance and its
ability of generating cash flows (Baetge et al., 2004). By comparisons with the previous year,
the difference between financial statement items of the current accounting period and the
corresponding previous years’ figures are calculated (Gärtner, 1994). In addition to
comparisons including two years, data can also be collected and analysed over several
periods (Marten, Quick, Ruhnke, 2011). The more extensive trend analysis allows users to
determine whether certain annual accounts figures are plausible on the basis of its evolution
over time (Marten, Quick, Ruhnke, 2011). Although there is no universal rule for the
optimum reference period, a five year period is recommended in order to be capable of
discovering even gradual changes (Baetge et al., 2004). The amounts of the actual financial
figures can be represented graphically by using a scatterplot (Marten, Quick, Ruhnke, 2011).
By means of a trend line, the development of the observed item is shown (Marten, Quick,
Ruhnke, 2011).
In contrast, ratio analysis neglects the time component and concentrates on the strong
correlation between the particular financial statement line items (Marten, Quick, Ruhnke,
2011). The approach is based on the concept of double-entry book-keeping hypothesising
that an increase or decrease of one account causes an increase or decrease of another account
(Marten, Quick, Ruhnke, 2011). The objective of the ratio analysis is to detect material
misstatements by assessing selected financial key figures of a company and analysing them
with regard to their development over time (Sell, 1999, Gärtner, 1994). Conspicuous
deviations which exceed the predetermined limits of tolerance can be a sign for errors or
fraud.
Besides an internal analysis, financial ratios can be assessed by an intercompany
comparison (benchmarking) (Gärtner, 1994). Benchmarking squares financial ratios of one
company with those disclosed by entities in the same industry (Baetge et al., 2004). An
intercompany comparison can be difficult in some cases as comparability can be insufficient
(Baetge et al., 2004). Benchmarking requires that all characteristics of the observed
companies except one have to be similar (Baetge et al., 2004). As structural equality rarely
46
occurs, the interpretation of different financial ratios in connection with other companies
might be difficult (Baetge et al., 2004). Even if companies are serving the same markets,
resemblance is for example limited in case different reporting dates or periods are used or
capital structure and sizes of enterprises are diverging (Gärtner, 1994, Baetge, 2004).
Nevertheless, intercompany comparisons are preferably applied for simple plausibility
checks (Sell, 1999). In case a company reports large revenue increases although both the
economy and the industry is in the midst of a recession, the probability of an overstatement
is high (Coglitore & Berryman, 1988).
47
distribution.” According to Hill (1998, p. 3), there are “many natural sampling procedures
that lead to the same log distribution”.
2.6.4.3 First-Order-Tests
Auditors who aim at testing whether data follows the assumptions of Benford’s law can
apply numerous digital analysis tests to test journal entries (Nigrini & Mittermaier, 1997).
First-order tests constitute basic tests, including tests of the first digits, second digits and
first-two digits (Nigrini, 2011). The first-order tests are usually applied separately for
positive and negative numbers as fraudsters take different actions depending on whether they
want to mislead about the amount of positive earnings or to cover up the extent of losses
(Nigrini, 2011). Generally speaking the first digit and the second digit test are only high-
49
level tests of reasonableness and not suitable for selecting audit samples (Nigrini, 2011,
Nigrini & Mittermaier, 1997). For example, if companies’ observed data perfectly fits to
Benford’s law in the first three quarters but shows deviations in the fourth quarter, this might
be an indicator of a misstatement (Nigrini, 2011).
The first-two digit test contains more focused testing and targets the detection of abnormal
digit distribution for example number duplication and possible bias (Nigrini, 2011).
According to Benford’s law the expected frequency for the first-two digits 10 for example
is 4.14 percent and for the first-two digits 99 it is 0.44 percent. By calculating all frequencies
of the first-two digit combinations pertaining to the observed sample, an auditor can compare
these to the expected Benford distribution. Auditors can use z-statistics in order to determine
whether the deviations from actual and expected frequencies are significant (Nigrini &
Mittermaier, 1997). A graph can show the differences between the actual and the expected
distribution (Nigrini & Mittermaier, 1997). In case that certain digit combinations of the
observed sample are overused it will be visible on the graph, in form of significant spikes
(Nigrini & Mittermaier, 1997).
50
However, some duplications do not constitute fraudulent misstatements but rather
result from rental payments and fixed payments or from obligations due to instalment
contracts (Kronfeld & Krenzin, 2014). By analysing the frequency of the duplicated
amounts, it can be proofed whether the recognised transactions truly reflect recurring
obligations (Kronfeld & Krenzin, 2014). For example a duplication of 4 can reflect a
quarterly payment and an appearance of 12 may stand for a monthly payment.
If necessary, additional tests can be applied in order to analyse the number
duplications (Kronfeld & Krenzin, 2014). The same-same-same test for example is capable
of identifying exact duplicates (Kronfeld & Krenzin, 2014, Nigrini, 2011). Another approach
is the same-same-different test which is effective in identifying errors and fraud in accounts
payable data (Nigrini, 2011). By concentrating on near-duplicates, it can detect when a
wrong vendor is paid first and then the correct vendor is payed afterwards (Nigrini, 2011).
51
own falsified numbers (Nigrini & Mittermaier, 1997). The application of the last-two digit
test requires caution as in general the last two digits of a number cannot be clearly specified
(Nigrini, 2011). A number such as 1,545 could have 45 or 00 as last-two digits, when writing
it as 1,545.00. It depends on the purpose of the analysis, how to define the last two digits
(Nigrini, 2011). In connection with currencies, it will be most appropriate to choose the two
digits right of the decimal point and for data comprising integers one should review the tens
digit and unit (Nigrini, 2011). Against the background that the last-two digits have almost
same frequencies, a significantly higher frequency of occurring might be an indicator for
manipulation (Nigrini, 2011). Deviations can result from rounding up or down of numbers,
the payment on account or the uniform splitting of higher invoice amounts (Odenthal, 2002).
The splitting of invoices or orders is a popular way to misuse the power to sign and
(Odenthal, 2002). In case that there are many payments just below the limit in which
employees are allowed to order items without asking the head of department for permission,
the invoice amounts should be further audited (Odenthal, 2002). Auditors should analyse
whether accumulations exist concerning certain suppliers or individual employees
(Odenthal, 2002).
52
surprise (ISA 240.appendix). Additionally, the dates for requesting external balance
confirmations can be varied and transactions with related parties can be checked (Hofmann,
2008).
Independent of respective risks concerning single financial statement line items,
auditors should think of the following issues when applying audit procedures (ISA 240.32):
First of all, auditors have to evaluate whether journal entries recorded in the general
ledger and adjustments made after closure of accounts are appropriate. For this purpose, the
engagement team can make inquiries about the underlying transactions and test journal
entries if necessary. Secondly, it has to be assessed whether accounting estimates are applied
carefully and in compliance with financial reporting principles. Auditors have to examine if
assets are overstated or liabilities understated. In this context, the team has to review
accounting estimates by performing own calculations. Thirdly, the auditor has to follow up
on unusual transactions or developments. In order to uncover these issues, it is required to
extensively understand the entity and its environment.
All things considered, “the auditor shall maintain professional scepticism throughout
the audit, recognizing the possibility that a material misstatement due to fraud could exist,
notwithstanding the auditor’s past experience of the honesty and integrity of the entity’s
management and those charged with governance” (ISA 240.12).
53
about the client by simply working off the indicators listed. In Pincus (1989) it is stated that
the approach would need little effort or additional costs due to the fact that the results can be
clearly summarised according the red flags published. Furthermore, auditors will be
sensitised towards fraudulent situations for the purpose of efficiently recognising
misstatements in the financial statements (Pincus, 1989).
However, critics warn that the presence of a red flag does not automatically mean
that the client committed fraud, as for example Elliott & Willingham (1980, p. 8) state:
“Red flags do not indicate the presence of fraud. They are conditions believed to be
commonly present in events of fraud and they therefore suggest that concern may be
warranted. For instance, insufficient working capital (…) may predispose some
managements to misstate financial statements. To an honest businessperson the some
conditions would simply be a harsh fact of business life.”
This means the active search for the occurrence of red flags still needs further
interpretation by the auditor in order to decide if and to what extent additional procedures
are required. Moreover, there is a danger that red flags checklists do not the support auditor’s
professional scepticism but rather weaken it (Ruhnke & Schwind, 2006). Auditors might
consider the applied list as conclusive and just tick off the indicators listed (Pincus, 1989,
Ruhnke & Schwind, 2006). As a consequence, specific fraud risks of the respective clients
are not extensively discussed but treated like a “check-the-box-exercise” (Ruhnke &
Schwind, 2006).
54
get the opportunity to talk about assumptions and share their knowledge with regards to
possible infringements (Leinicke et al., 2005).
However, the detection rate of a fraud interview is highly dependent on the
competency of the interviewer (Hofmann, 2008). Auditors have to be trained in order to
learn how to ask the right questions and to accurately interpret the non-verbal expressions of
the interviewee (Leinicke et al., 2006). Interviewers have to recognise whether conversation
partners are acting nervously due to the unfamiliar situation or because they are trying to
hide something (Leinicke et al., 2006). Moreover, it has to be considered that a skilled
fraudster with high criminal creativity could be unaffected by a fraud interview and might
mislead the auditor. Nevertheless, evidence shows that many violations were uncovered by
communication with insiders and not through alternative review procedures (Schindler &
Gärtner, 2004).
55
In addition to the before mentioned survey studies, a number of simulation studies
has been undertaken with the purpose of identifying “the relative frequency of correct or
incorrect signals that result from analytical procedures” (Calderon & Green, 1994).
Knechel highly supports the application of analytical review procedures according to
his studies in 1988. Firstly, Knechel (1988a) evaluated the usefulness of seven different
regression analysis methods by applying them on two samples of simulated accounting data.
He found that these measures were able to detect more frequently occurring errors than an
audit strategy relying on other approaches (Knechel, 1988a). In addition, Knechel (1988b)
assessed the value of non-statistical analytical review procedures, based on simple models
such as ratio and trend analysis. Due to the strong performance within the study, the author
states their efficiency as less other tests are needed in order to guarantee overall assurance
(Knechel, 1988b).
Wheeler and Pany (1990) created a sample, consisting of actual financial data from
five companies seeded with “commonly encountered accounting errors” to test whether these
can be accurately identified by analytical review procedures. They report that the error
signalling of analytical review procedures was very defective, showing an error rate of 96
percent (Wheeler & Pany, 1990). This means in 96 out of 100 cases, the need for an
investigation was signalled although the financial figures of the sample were correctly stated
(Wheeler & Pany, 1990). As a consequence, the workload of the auditors would highly
increase within the framework of the audit procedures leading to large inefficiencies
(Calderon & Green, 1994). Examining analytical review procedures’ capability to detect
misstatements in annual data, somehow, the research findings were more positive (Wheeler
& Pany, 1990).
Similarly, Loebbecke and Steinbart (1987) investigated whether analytical review
procedures accurately detect financial misstatements. The authors criticise that previous
survey studies certainly prove that analytical review procedures are capable of identifying
errors but do not provide evidence about the percentage of undetected errors (Loebbecke &
Steinbart, 1987). Therefore, they conducted four experiments in order to test the “reliability
and effectiveness” of analytical review procedures (Loebbecke & Steinbart, 1987). Finding
very high error rates, the authors reject the application of the tested methods (Loebbecke &
Steinbart, 1987).
Kaminski et al. (2004) examined whether specifically ratio analysis is able to identify
material misstatements in actual accounting data. By comparing 21 financial ratios for
matched fraudulent and non-fraudulent companies for a seven-year time period, Kaminski
56
et al. (2004) could not find significant differences between financial ratios calculated on the
basis of misstated data and financial ratios derived from clean data.
Current research criticises the application of analytical review procedures as a whole
arguing that auditors would “over-rely on weak analytical procedures” (Glover et al., 2005).
During an experiment with participants from a Big 4 accounting firm, Glover et al. (2005)
found that auditors have greater trust in imprecise analytical review procedures that result in
an expectation close to the client’s data than in procedures which are more precise but lead
to a significant difference. As reported by Glover et al. (2005), auditors subconsciously
overestimate the quality of analytical review procedures which display corresponding results
as they want to avoid the extra work needed for additional testing. These findings are in
accordance with a series of papers in accounting and psychology, stating that human beings
have difficulties to reach an objective decision, instead of conclusions are highly influenced
by motivation (Kunda, 1990).
However, evidence shows that a series of “high-profile accounting frauds” could
have been flagged by the accurate application analytical review procedures (Glover et al.,
2015, p. 165, 10, Sell, 1999, p. 185). In case of Parmalat for example, revenue from sales to
Cuba were massively overstated. Auditors could have noticed this as according to Parmalat’s
manipulated exports every Cuban would have drunken 490 litres of milk during that financial
year. (Peemöller & Hofmann, 2005 in Hofmann, 2008, p. 549). Same applies to the German
fraud case of Flowtex. The company reported more than 3400 horizontal drilling machines
in their accounts although the yearly demand of such equipment was estimated at
approximately 400 machines per year (Peemöller & Hofmann, 2005 in Hofmann, 2008).
57
However, a built-in minimum of zero is allowed (Nigrini, 2011). Furthermore, the data set
should not contain data sets used as identification numbers or labels, such as purchase order
numbers, bank account numbers or telephone numbers (Nigrini, 2011). The purpose of their
combination of digits is to place words and solely has meaning to the developers (Nigrini,
2011). A basic assumption is that a data set should have more small items (data elements)
than big items (data elements) in order to comply with Benford’s law (Nigrini, 2011). This
is generally true as there are more towns than big cities, more small cap than large cap
companies and more small financial events than large ones (Nigrini, 2011, Busta &
Weinberg, 1998). Furthermore, the account size, meaning the volume of entries is important,
as the results are more reliable when an entire account is analysed rather than a selected
sample (Durtschi et al., 2003).
Considering a company whose revenue is recognised from customer contracts,
including the same small monthly payments for example, digital analysis would not provide
valid results. Same applies for the application on the expense account, in case the client has
to repeatedly pay the same invoice amounts due to specific contracts.
It is evident from this that, the application of digital analysis to detect financial
statement fraud is only beneficial to a certain extent.
Later on, the two professors Messod D. Beneish (1997, 1999) and Patricia M.
Dechow (2011) expanded these key findings. Besides the consideration of accruals and
future returns, the researchers assessed studies applying financial statement data in other
decisional contexts, including distress analysis (e.g. Altman Z-Score), basic ratio analysis
and contextual analysis (Dechow et al., 2011, Beneish, 2013). They each developed an
accounting-based earnings manipulation detection model, which can be applied by auditors
1
There has been widespread agreement in the literature that the most popular six models are the DeAngelo
(1986) Model, Healy (1985) Model, the Jones (1991) Model, the Modified Jones Model (Dechow, Sloan and
Sweeney 1995), the Industry Model (Dechow, Sloan and Sweeney 1995), and the Cross-Sectional Jones
Model (DeFond and Jiambalvo 1994).
58
to investigate whether the client committed financial statement fraud or by investors to
evaluate the expected return of a share.
The variables are selected on the hypothesis that the probability of accounting
misstatements increases with (1) increasing accruals, (2) declining performance and (3)
increasing market-related incentives.
' '(!()*
&− =
+, ,-()( , ! ' '(!()*
./0123401 56780
' '(!()* = ./0123401 56780
1+
-( ) - % !
= −7.893 + 0.790 "") + 2.518 ℎ + 1.191 ℎ (,:
+ 1.979 " ;) "" )" + 0.171 ℎ " + −0.932 ℎ +
As a first step, the predicted value is calculated by filling the respective variables into
the formula and multiplying them with the estimated coefficients. Secondly, the probability
is derived by inserting the predicted value into the formula. Thirdly, the probability is
divided by the predefined unconditional probability of 0.0037.
An F-Score of 1 means that the firm has the same probability of misstatement as the
unconditional expectation (Dechow et al., 2011).
Similar to M-Score, two types of errors can arise when calculating F-Score. A type
II error occurs when the model incorrectly classifies a misstating firm as non-misstating, and
a type I error arises in case a non-misstating firm is classified as misstating (Dechow et al.,
2011). Generally speaking, although a type I error has as well consequences for the auditor,
a type II error is more costly (Dechow et al., 2011).
61
uncover fraudulent financial reporting? Or do the accounting-based detection methods
developed by researchers give better results and thus should be integrated into the audit
approach?
Therefore, the power of Beneish’s M-Score and Dechow’s F-Score will be tested.
During the last years, it has been indicated that especially M-Score is an extraordinary useful
tool. A group of MBA students at Cornell University applied M-Score for Enron Corporation
and detected its accounting fraud one year before the first professional analysts did (Morris,
2009). However, “evidence is ad hoc and anecdotal” (Beneish et al., 2013).
In order to take this situation into account, initially, it is assessed whether the M-
score as well as the F-score can even today flag fraudulent companies. For this reason, it is
necessary to first check if the two scores are capable of accurately identifying manipulated
financial statements, by applying them on financial statement data of manipulation firms.
Thus the hypotheses of the first research question are formulated as follows:
Secondly, it is tested whether the detection rate of the two scoring models is superior
to the methods applied by German professionals during the audit engagement. In order to
evaluate their potential added value, it will be examined if the M-score or the F-score flag
audited financial statements which have not been identified by auditors as fraudulent. Thus,
the following hypotheses concerning the second research question will be tested:
63
objective is not to statistically test the models as such but rather assess their underlying
design and functioning declared by the developers. From the practitioner’s point of view it
will be examined whether the two scores are useful instruments to be implemented into the
audit approach.
Secondly, audited financial statement data of German corporations is collected to
compute the probability of accounting misstatements. It will be examined whether M-Score
or F-Score flag some of these companies as manipulating.
• EDGAR.
In exceptional cases, data was directly drawn from the financial statements published
by the respective companies on the investor relations pages. Furthermore, existing literature
related to the research on M-Score and F-Score was collected from the online reference
search tool Disco provided by Münster University.
64
statement line items and their respective COMPUSTAT codes necessary for calculating the
variables of the M-Score. The second spreadsheet includes the items and their related
COMPUSTAT codes needed in order to measure the F-Score.
On the basis of both the lists and the spreadsheets, the financial data required for
conducting the research could be drawn from COMPUSTAT. The financial data for the
North American companies was extracted from COMPUSTAT North America;
COMPUSTAT Global was used for all other companies.
Nevertheless it should be noted, that COMPUSTAT in some cases could not provide
the accounting data of the latest fiscal years. One reason for this was that some companies
had to file bankruptcy in consequence of the fraud detection.
65
The selection of the misstating companies was based on the latest press releases by
SEC about firms charged with accounting fraud. Furthermore, a search on Google was
conducted, including the key words “accounting fraud”, “accounting scandal” and “financial
statement fraud”. The financial statements of the sample companies were misstated for the
following reasons: asset overstatement, cost falsification, premature revenue recognition and
fictitious transactions.
66
Score were not available. This leads to a sample of 79 companies (MDAX: 41, SDAX: 38).
The financial statement data from 2010 to 2016 of these 79 companies was examined during
the empirical study.
The DSRI captures the proportion of receivables to sales in the year in which earnings
manipulation was detected (year t) compared to the days sales in receivables ratio of the
prior year (t-1). This variable displays whether there are distortions between the development
of receivables and sales. A large increase of the ratio could be either a sign for a change in
67
credit policy in order to boost sales or it could also indicate improper revenue inflation
(Beneish, 1999). As shown in chapter 2.3.1., overstating revenue is a commonly applied
fraud scheme.
The gross margin index is calculated by dividing the gross margin in the previous
year (t-1) by the gross margin in the current year (t). The gross margin is a company’s sales
minus its cost of goods sold, divided by sales. In line with the research findings of Lev &
Thiagarajan (1993), Beneish (1999) hypothesises that companies with declining margins are
more likely to manipulate earnings.
The AQI is the ratio of asset quality in the current year (t) to the asset quality of the
prior year (t-1). It captures the proportion of noncurrent assets except for property, plant and
equipment in relation to total assets. Thus, the changing in asset realisation is measured,
meaning that an AQI > 1 indicates that the company capitalised more expenses in order to
defer costs. As already stated in 2.3.2.2, the improper capitalisation of expenses is a typical
strategy to increase profit in the current posting period (Jones, 2011, Mulford & Comiskey,
2002). Therefore, an increased AQI can be an indicator for misstated financial figures.
! " ) <12=
=
! ")−1
The SGI measures the development of the companies’ sales growth over a period of
two years. An index > 1 means that the company increased sales, while an index < 1 shows
a sales decline. Although, growth does not automatically imply an overstatement, expansion
will be critically monitored. Explanations for this phenomenon are given in 2.1.3 Meeting
or beating analysts’ forecast.
68
B ( )( , ) − 1 <14 − 65=/ B ( )( , ) − 1 + ) − 1<8=
=
B ( )( , )/ B ( )( , ) + )
The DEPI is the rate of depreciation in the previous year (t-1) divided by the rate of
depreciation in the current year (t). The rate of depreciation is calculated as follows:
depreciation is divided by the sum of depreciation and property, plant and equipment. A
DEPI exceeding 1 indicates a decrease of depreciation. The question is whether this is the
case because of an improper lengthening of useful lives in order to lower expenses (see
chapter 2.3.2.4.). Therefore Beneish (1999) expects “a positive relationship between the
DEPI and the probability of manipulation”.
The SGAI constitutes the development of the ratio of sales, general, and
administrative expenses to sales in current year (t) compared to the proportion of sales,
general, and administrative expenses to sales in the prior year (t-1). As usually the
relationship between costs and sales is relatively constant, a disproportionate increase of
costs might incentivise companies to misstate financial statements (Beneish, 2013).
(7) Accruals
!"
, D ' ; E) -(, * () D" <18= − ? "ℎ ; D B )( ," <308=
=
A ) ! "" )" ) <6=
LEVI is calculated as the ratio of total debt to total assets of the current year (t) divided by
the ratio of total debt to total assets of the prior year (t-1). Total debt consists of long-term
69
debt and current liabilities. According to the debt covenant hypothesis increasing leverage
incentivises the company to manipulate earnings (see 2.1.1.). Thus a LEVI > 1 can be an
indicator for financial statement fraud.
The variables of the M-Score formula were calculated in Excel by inserting the
financial data items which had been previously collected from COMPUSTAT on the basis
of their COMPUSTAT codes. In case elements of the computation were not available
(amortisation of intangibles, COMPUSTAT #65 or SG&A, COMPUSTAT #189), the items
were looked up manually in the respective financial statements published on the investor
relations pages. If the required items could not be found there either, DEPI and SGAI were
set to 1 (its neutral value). This procedure was recommended by Beneish (1999) in order to
avoid a missing observation.
4.5.2 F-Score
This study relies on the F-Score Model 1 developed by Dechow et al. (2011), which
is presented in chapter 3.2.2. In this section, the computation of the single variables will be
described. To test the hypotheses stated, the exact coefficients and same variables as
estimated for F-Score are applied. For the purpose of this study, a cut-off value of 1.85 is
applied in accordance with the research of Dechow et al. (2011) who determined that
companies with F-Scores higher than 1.85 have a substantial risk of being manipulators.
This means, companies with F-Scores > 1.85 are flagged as manipulators and
companies having F-Scores < 1.85 are identified as non-manipulators. The type I and type
II errors with regard to the determination of the cut-off value are explained in chapter 3.2.2.
(1) RSST Accruals
ΔWC + ΔNCO + ΔFIN
"")_ =
: @ A ) ! "" )"
O?P = A ) ! "" )" <6= − ? ,) "" )" <4= − ,: ")D ,)" ,- -: , " <32=
− A ) ! $( '(!()( " <181= − ? ,) $( '(!()( " <5=
− $ ,@ ) D ') <9=
70
&O= ℎ ) ) D (,: ")D ,)" <193= + $ ,@ ) D (,: ")D ,)" <32=
− $ ,@ ) D - ') <9= + ') (, ? ,) !( '(!()( " <34=
+ ; - ) Q <130=
Following the research of Richardson et al. (2005), the variable RSST sums up the
change of non-cash working capital (WC), the change of net non-current operating assets
(NCO) and the change of net financial assets (FIN). The objective of this variable is to assess
the change in non-cash operating assets (Dechow et al., 2011).
This variable is calculated by dividing the change in accounts receivable (t, t-1) by
the average total assets of both years. A large increase of the ratio could be either a sign for
a change in credit policy in order to boost sales or it could also indicate improper revenue
inflation.
∆ ,: ,) * <3=
ℎ_(,: =
: @ ) ) ! "" )"
The variable ch_inv is the change of inventory (t, t-1) divided by the average total assets
(t, t-1). As already stated in chapter 2.3.3.3, fraudsters attempt to overvalue inventory in
order to improve company’s gross margin. Therefore, a disproportionate increase of
ch_inv can be an indicator for misstatement.
This variable is “defined as the percentage of assets on the balance sheet that are
neither cash nor property, plant, and equipment” (Dechow et al., p. 39). According to the
research of Barton & Simko (2002), the amount of net operating assets indicates the level of
earnings manipulation. Thus, an increase of soft assets is associated with a higher risk of
misstatements in order to meet earnings expectation (Dechow et al., 2011).
71
ℎ_ " = ! " <12= − ∆ ,)" (: '! <2=
This variable is calculated by deducting the change of accounts receivable (t, t-1)
from sales of the current period (t) and dividing it by the corresponding measure of the prior
period (t-1). An increase of this variables can be a sign for earnings manipulation as Dechow
et al. (2011) found out that surprisingly not credit sales but rather cash sales are rising when
companies misstate financial statements. It is anticipated that companies “misstate sales
through transaction management” (Dechow et al., 2011, p. 20). One commonly applied and
controversially discussed accounting procedure in this context is the practice of channel
stuffing (chapter 2.3.1.2.).
This variable is calculated by dividing net income of this year (t) by the average of
total assets from this year and last year (t, t-1). Afterwards the corresponding measure of last
year (t-1) is subtracted from the first calculation. A decrease of this variable is caused by a
fall-off of net income. As management attempts to constantly increase earnings growth (see
2.1.3 Meeting or beating analysts’ forecasts) it is anticipated that in case of a declining
ch_roa the risk of earnings manipulation rises.
(""
= , (,-( ) : ( '! - - 1 (; )ℎ ;( D ("" -" ()( " - (,@ * ) A 108
>0 A 111 > 0
Actual issuance is a dummy variable, which is coded 1 if the company issued either
common and preferred stock or long-term debt. The reason behind choosing this variable is
explained as follows (Dechow et al., 2011). Companies which are not generating enough
cash flow are in need of external financing which ideally should occur at lowest cost.
Therefore, some companies misstate earnings in order to increase the stock price
simultaneously reducing the cost of equity. For the purpose of decreasing borrowing costs,
perpetrators mislead about profitability as less risky debtors are capable of borrowing money
at lower rates.
72
5. Empirical Results
5.1 Validity and Reliability
For the purpose of ensuring a high level of validity and reliability with regard to
research, the required data was collected from professional databases. As both Beneish and
Dechow used the database COMPUSTAT from Standard & Poor’s to extract data for
examining and testing their models, this study follows their approach. The financial data of
the companies headquartered in the USA was drawn from COMPUSTAT North America on
the basis of their CUSIP, the financial data of all other companies was collected from
COMPUSTAT Global according to their ISIN.
In order to test the two hypotheses, the provision of original, manipulated financial
data is essential. According to Dechow et al. (2013), who had discussions with Standard &
Poor’s, COMPUSTAT is constantly updating their databases. This means, in case a company
has to restate its financial statements, filing for example an amended 10-K, COMPUSTAT
will backfill the previously uploaded misstated numbers (Dechow et al., 2013). However,
Dechow et al. tested this statement by checking on financial information related to nine
randomly selected companies having published manipulated financial data between 2000
and 2001. They came to the conclusion that COMPUSTAT had replaced financial figures
related to one of the nine companies. Against the background of these results, the author of
this study manually inspected the extracted data of the manipulation companies to guarantee
that only originally published financial figures are included into research. Therefore, the
sample of the fraudulent companies was cross-checked with the SEC filings published on
the database EDGAR. In the event of a replacement, the original financial numbers were
manually drawn from the SEC filings for the respective fiscal years of the companies
concerned.
For testing the hypotheses 3 and 4, financial data of the shares listed in the German
indices MDAX and SDAX was extracted from COMPUSTAT Global. In order to ensure the
completeness of the sample, initially an index composition report of MDAX and an index
composition report of SDAX, in each case dated Dec 30th 2016, was drawn from STOXX
Ltd. On the basis of the included instruments and ISIN listed there, the required financial
figures were collected.
5.2 Research findings
73
6. Concluding Remarks
The master thesis analyses the occurrence and detection of financial statement fraud.
Especially, the instruments applied by auditors are assessed. It is observed that the quality
of financial disclosure in Germany is high and MDAX and SDAX shares seem to be sound
investments by the majority. However, results of this study show deficiencies as well.
According to the two accounting-based detection models tested, M-Score and F-Score,
irregularities were identified. As some of the audited financial statements were flagged as
misstated it is questioned whether managers had incentives to commit financial statement
fraud and auditors were not capable of detecting the misstatements or whether the models
incorrectly classified the respective firms as manipulators.
According to the findings with regard to the hypotheses 1 and 2 tested, this study
recommends the application of M-Score and F-Score within the scope of the audit. Both
models are capable of identifying irregularities by quite simple mathematical calculations
and can therefore be easily implemented in the planning phase of an audit as they are capable
of highlighting risks. Nevertheless, it has to be taken into consideration that these models as
well misclassified manipulators as non-manipulators.
As perpetrators are acting with high criminal energy and create advanced fraud
schemes, it will be even more difficult in future to detect financial statement fraud. Despite
that, the audit profession is expected to examine the quality of financial information in order
to guarantee the efficient functioning of capital markets. One important step is the increasing
benefitting of digitalisation which supports the auditor to inspect large datasets.
85
REFERENCES
Agrawal, A., Jaffe, J. & Karpoff, J. (1999). Management turnover and governance changes
following the revelation of fraud. The Journal of Law & Economics (Vol. 42), 309-
342.
Albrecht, S., Albrecht, C, Albrecht, C. (2004). Fraud and corporate executives: Agency,
Stewardship and broken trust. Journal of Forensic Accounting (Vol. V), 109-130.
Albrecht, S., Albrecht, C., Albrecht, C. (2008). Current Trends in Fraud and its Detection.
Information Security Journal: A global perspective (17), 2-12.
Anderson, K. & Yohn, T. (2002). The effect of 10-K restatements on firm value, information
asymmetries, and investors’ reliance on earnings.
Barth, M., Elliott, J. & Finn, M. (1999). Market rewards associated with patterns of
increasing earnings. Journal of Accounting Research (Vol. 37, No. 2), 387-413.
Batten, J., Khaw, K., Young, M. (2014). Convertible bond pricing models. Journal of
Economic Surveys (Vol. 28, No. 5), 775-803.
Becker, C., Defond, M., Jiambalvo, J. & Subramanyam, K.R. (1998). The Effect of Audit
Quality on Earnings Management.
Beneish, M. (1999). Incentives and Penalties related to earnings overstatements that violate
GAAP. The Accounting Review (Vol. 74, No.4), 425-457.
Beneish, M.D., Nichols, D.C. (2005). Earnings Quality and Future returns. The relation
between accruals and the probability of earnings manipulation.
Beneish, M., Lee, C. & Nichols, C. (2013), Earnings Manipulation and Expected Returns
(Financial Analysts Journal, Vol. 69, No. 2), 57-82).
86
Benford, F. (1937). The law of anomalous numbers.
Bonner, S., Palmrose, Z-V., Young, S. (1998). Fraud type and auditor litigation. An Analysis
of SEC Accounting and Auditing enforcement releases.
Brennan, N. & McGrath, M. (2007). Financial statement fraud: some lessons from US and
European Case studies. Australian Accounting Review (17), 49-61.
Buckhoff, T., Hansen, J. (2001). Using fraud assessment questioning to detect fraud.
Burgstahler, D. & Dichev, I. (1996). Earnings management to avoid earnings decreases and
losses. Journal of Accounting and Economics (24), 99-126.
Busta, B. & Weinberg, R. (1998). Using Benford’s law and neural networks as a review
procedure.
Byington, J. & Christensen, J. (2003). How to prevent inventory fraud. Wiley Periodicals,
33-39.
Callen, J., Robb, S., Segal, D. (2008). Revenue Manipulation and Restatements by loss firms.
Auditing: A journal of Practice and Theory (Vol. 27, No. 2, 1-29).
Cheng, Q & Warfield, T (2005). Equity Incentives and Earnings Management. The
Accounting Review (Vol. 80, No.2), 441-476.
87
Cox, R. & Weirich, T. (2002). Stock market reaction to fraudulent financial reporting.
Managerial Auditing Journal 17/7 (2002), 374-382.
DaSilva, C. & Carreira, P. (2013). Selecting audit samples using Benford’s law. Auditing:
A journal of practice & theory (Vol. 32, No. 2, 53-65).
Dechow, P., Sloan, R. & Sweeney (1996). Causes and consequences of earnings
manipulation: An analysis of firms subject to enforcement actions by the SEC.
Contemporary Accounting Research (Vol. 13, No.1), 1-36.
Dechow, P., Sloan, R & Sweeney, A. (1995). Detecting earnings management. The
Accounting Review (70), 193-226.
Dechow, P., Ge, W., Larson, C., Sloan, R. (2011). Predicting material accounting
misstatements. Contemporary Accounting Research (Vol. 28, No. 1), 17-82.
DeFond, M. & Jiambalvo, J. (1994). Debt Covenant Violation and Manipulation of Accruals.
Journal of Accounting and Economics (17), 145-176.
Deloitte Report (2008). Ten things about bankruptcy and fraud. A review of bankruptcy
filings. Deloitte Forensic Center 2008.
Desai, H., Hogan, C., Wilkins, M. (2006), The reputational penalty for aggressive
accounting: earnings restatements and management turnover. The Accounting
Review, 83-112.
Dicehv, I. Graham, J., Harvey, C.., Rajgopal, S. (2013). Earnings quality: Evidence from the
field. Journal of Accounting and Economics (Vol. 56), 1-33.
Diekmann, A. (2007). Not the first digit! Using Benford’s law to detect fraudulent scientific
data.
88
Duffield, G & Grabosky, P. (2001). No. 199 The Psychology of Fraud. Australian Institute
of Criminology. Trends & Issues, 1-6
Durtschi, C. & Pacini, C. (2004). The effective use of Benford’s law to assist in detection of
fraud.
Erickson, M, Hanlon, M. & Maydew, E. (2006). Is there a link between executive equity
incentives and accounting fraud?. Journal of accounting research, Vol. 44, No. 1,
113-143.
Ettredge & Srivastava (1999). Using digital analysis to enhance data integrity.
Feng, M., Gramlich, J., Gupta, S. (2009). Special purpose vehicles: Empirical Evidence on
Determinants and Earnings Management. The Accounting Review (Vol. 84, No. 6),
1833-1876.
Gerety, M. & Lehn, K. (1997). The causes and consequences of accounting fraud.
Managerial and Decision Economics (Vol. 18), 587-599.
Geyer & Drechsler (2014). Detecting Cosmetic debt management using Benford’s law.
Glover, S., Prawitt, D., Drake, M. (2015). Between a rock and a hard place: A path forward
for using substantive analytical procedures in auditing large P&L accounts.
Glover, S, Prawitt, D., Wilks, T. (2005). Why do auditors over-rely on weak analytical
procedures. Auditing: A journal of practice & theory, 197-220.
Healy, P. & Palepu, K (2000). Information asymmetry, corporate disclosure, and the capital
markets: A review of the empirical disclosure literature. Journal of Accounting and
Economics 31, 405-440.
89
Healy, P. & Wahlen, J (1999). A review of the earnings management literature and its
implications for standard setting. American Accounting Association. Accounting
Horizons Vol. 13 No.4, 365-383.
Hitzig, N (2004). The hidden risk in analytical procedures: What Worldcom revealed.
Hribar, P., Kravet, T. & Wilson, R. (2004). A new measure of accounting quality.
Hribar, P. & Jenkins, N. (2004). The effect of accounting restatements on earnings revisions
and the estimated cost of capital. Review of Accounting Studies (9), 337-356.
Huang, Y. & Scholz, S. (2012). Evidence on the association between financial restatements
and auditor resignations. Accounting Horizons, 439-464.
Hurtt, D., Kreuze, J., Langsam, S. (2000). Auditing to combat revenue recognition fraud.
IFRS Project Summary and Feedack Statement (2016). IFRS 16 Leases. Retrieved from:
http://www.ifrs.org/-/media/project/leases/ifrs/published-documents/ifrs16-project-
summary.pdf
Jin, K., Shahn, Y & Taylor, S. (2014). Matching between revenues and expenses and the
adoption of international financial reporting standards. Pacific-Basin Finance Journal
(35), 90-107.
Kaminski, K., Wetzel, T., Guan, L. (2004). Can financial ratios detect fraudulent financial
reporting? Managerial auditing journal (Vol. 19), 15-28.
Kellog, I. & Kellog, L.B. (1991). Fraud, Window Dressing, and Negligence in Financial
Statements.
90
Knechel, R. (1988). The effectiveness of nonstatistical analytical review procedures used as
substantive audit tests.
Loebbecke, J., Eining, M., Willingham, J. (1989). Auditors’ Experience with material
irregularities. Frequency, nature, and detectability
Macey, J., O’Hara and Pompilio (2008). Down and out in the stock market. The law and
economics of the delisting process. The Journal of Law & Economics (Vol. 51, No.
4), 683-713.
Messier, W., Simon, C. & Smith, J. (2013). Two decades of behavioural research on
analytical procedures: What have we learned?
Morris, G. (2009). Enron 101: How a group of Business students sold Enron a year before
the collapse. Financial History No. 94, 12-15.
Myers, S. (2001). Capital Structure. Journal of Economic Perspectives (Vol. 15, No. 2). 81-
102.
Mulford, C. & Comiskey, E. (2002). The Financial Numbers Game. Detecting Creative
Accounting Practices.
Newman, N. (2007). Enron and the special purpose entities. Use or abuse? The real problem.
The real Focus. Law and Business Review of the Americas, 97-138.
91
Nigrini, M. (2011). Forensic Analytics. Methods and techniques for forensic accounting
investigations.
Nigrini, M. & Mittermeier, L. (1997). The use of Benford’s law as an aid in analytical
procedures. Auditing: A journal of practice & theory.
Palmrose, Z.-V., Scholz, S (2004). The circumstances and legal consequences of non-GAAP
Reporting: Evidence from restatements.
Perols, J & Lougee, B (2011). The relation between earnings management and financial
statement fraud. Advances in Accounting, incorporating Advances in International
Accounting 27, 39-53
Pincus (1989). The efficacy of a red flags questionnaire for assessing the possibility of fraud.
Price Waterhouse (1985). Challenge and Opportunity for the Accounting Profession.
Strengthening the Public’s confidence.
Rezaee, Z & Riley, R (2009). Financial Statement Fraud. Prevention and Detection
Richardson, S., Sloan, R., Soliman, M (2005) The implications of accounting distortions and
growth for accruals and profitability. The accounting review (Vol. 81, No. 3), 713-
743.
Romney, M., Albrecht, S., Cherrington, D. (1980). Auditors and the detection of fraud.
Sauer, R. (2002). Financial Statement Fraud: The Boundaries of Liability under the Federal
Securities Laws. The Business Lawyer (Vol. 57, No. 3). 955-997.
92
Saunders, M., Lewis, P., & Thornhill, A. (2009). Research methods for business students.
Skinner, D. & Sloan, R. (2002). Earnings surprises, growth expectations, and stock returns
or don’t let an earnings torpedo sink your portfolio. Review of Accounting Studies
(7), 289-312.
Summers, S. & Sweeney, J. (1998). Fraudulently misstated financial statements and insider
trading: An Empirical Analysis. The Accounting Review (Vol. 73, No. 1), 131-146.
Thomas, J. (1989). Unusual patterns in reported earnings. The accounting review (Vol. 64,
No. 4), 773-787.
Watrin, C., Struffert, R., Ullmann (2008). Benford’s law: an instrument for selecting tax
audit targets?.
93
Wheeler, S & Pany, K. (1990). Assessing the performance of analytical procedures. A best
case scenario.
Wolfe, D & Hermanson, D. (2004). The Fraud Diamond: Considering the four elements of
fraud. The CPA Journal, 38-42.
94