855 resultados para fraud triangle


Relevância:

60.00% 60.00%

Publicador:

Resumo:

O presente estudo é uma investigação empírica de natureza qualitativa e tem por objetivo comparar as características das fraudes praticadas por meio de manipulação nas demonstrações contábeis das empresas Daslu, Kmart e Avestruz Master. Buscou-se verificar diferenças entre fraudes no Brasil e nos Estados Unidos, no que se refere às motivações e finalidades da ação fraudulenta, aos métodos de manipulação contábil utilizados e à governança corporativa adotada pelas empresas. O trabalho foi desenvolvido seguindo a metodologia do estudo de casos múltiplos, utilizando-se um protocolo, que contemplou os procedimentos e as regras gerais obedecidas na pesquisa, com a função de incrementar a confiabilidade do estudo e orientar o trabalho do pesquisador. A seleção dos casos estudados foi feita com base em pesquisas anteriores, que mencionaram fraudes praticadas no Brasil e nos Estados Unidos, na última década. Os resultados indicam que as fraudes apresentaram diferenças na natureza e na autoria dos atos fraudulentos, com evidências da aplicação das teorias do triângulo da fraude (TTF) e dos escândalos corporativos (TEC). Considerando que as corporações brasileiras estudadas possuíam sistema de governança corporativa concentrado, similar ao de empresas europeias, as diferenças observadas nas fraudes investigadas podem ser explicadas pela teoria dos escândalos corporativos, defendida por Coffee Jr. (2005).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Com o processo de convergência às normas internacionais, a partir de 2008, a contabilidade brasileira passou por profundas transformações, principalmente, no campo normativo no que diz respeito às práticas contábeis. Os profissionais do segmento contábil, frequentemente, se deparam com dilemas éticos que para serem solucionados exigem a observância dos princípios éticos que regem a categoria. Este estudo teve como objetivo verificar como o profissional de contabilidade se posiciona, em relação aos dilemas morais, envolvendo atos ilícitos em sua atividade profissional no ambiente de convergência aos padrões internacionais de Contabilidade, tendo como objetivo específico identificar a influência dos componentes do triângulo de fraudes no processo decisório do profissional de Contabilidade, avaliar as características do indivíduo que influenciam o posicionamento ético dos profissionais de Contabilidade em relação às fraudes e investigar a flexibilidade sobre a intenção de agir na escolha de práticas contábeis oriunda da convergência aos padrões internacionais de Contabilidade e suas influências no posicionamento ético dos profissionais de contabilidade em relação às fraudes. Foram enviados questionários aos profissionais de contabilidade contendo a escala de likert de 5 pontos, distribuídas em 4 cenários propostos. As 247 respostas recebidas foram compiladas e tratadas através de análises descritivas e estatísticas com o uso da regressão logística multivariada. Os resultados demonstram duas das três variáveis relacionadas aos componentes presentes no triângulo das fraudes (racionalização, oportunidade e pressão) influenciaram o processo decisório ético do profissional em 2 dos quatro cenários, a variável gênero relacionada às características individuais apresentou influência em um dos cenários, e por fim, a investigação a respeito da flexibilidade sobre a intenção de agir na escolha das práticas contábeis não apresentou influencia em nenhum dos cenários. Esse resultado sugere que os profissionais de contabilidade podem se aproveitar de um momento de troca da empresa de auditoria para efetuar ajustes que beneficiarão o resultado da Companhia (Oportunidade). Tenta-se justificar este procedimento pelo fato de ser uma prática comum no mercado, tentando transformar algo antiético em algo aceitável (Racionalização).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Most research on tax evasion has focused on the income tax. Sales tax evasion has been largely ignored and dismissed as immaterial. This paper explored the differences between income tax and sales tax evasion and demonstrated that sales tax enforcement is deserving of and requires the use of different tools to achieve compliance. Specifically, the major enforcement problem with sales tax is not evasion: it is theft perpetrated by companies that act as collection agents for the state. Companies engage in a principal-agent relationship with the state and many retain funds collected as an agent of the state for private use. As such, the act of sales tax theft bears more resemblance to embezzlement than to income tax evasion. It has long been assumed that the sales tax is nearly evasion free, and state revenue departments report voluntary compliance in a manner that perpetuates this myth. Current sales tax compliance enforcement methodologies are similar in form to income tax compliance enforcement methodologies and are based largely on trust. The primary focus is on delinquent filers with a very small percentage of businesses subject to audit. As a result, there is a very large group of noncompliant businesses who file on time and fly below the radar while stealing millions of taxpayer dollars. ^ The author utilized a variety of statistical methods with actual field data derived from operations of the Southern Region Criminal Investigations Unit of the Florida Department of Revenue to evaluate current and proposed sales tax compliance enforcement methodologies in a quasi-experimental, time series research design and to set forth a typology of sales tax evaders. This study showed that current estimates of voluntary compliance in sales tax systems are seriously and significantly overstated and that current enforcement methodologies are inadequate to identify the majority of violators and enforce compliance. Sales tax evasion is modeled using the theory of planned behavior and Cressey’s fraud triangle and it is demonstrated that proactive enforcement activities, characterized by substantial contact with non-delinquent taxpayers, results in superior ability to identify noncompliance and provides a structure through which noncompliant businesses can be rehabilitated.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Private title insurance has been the subject of much debate by law reform bodies and academics. This article adds a new dimension to the discussion by analysing its role against a recent scenario where a nun was betrayed by the actions of her brother, and compensation payable from the assurance fund, after much challenge by the registrar, amounted to in excess of $4 million.We ask whether the slow burning of title insurance into the psyche of Australian home purchasers will see state-based assurance fundings looking to minismise their role in the Torrens system. We also query how the rather more immediate electronic establishment of electronic conveyancing will alter the balance between the assurance fund, private title insurance and the increasing responsibilities on stakeholdes involved in conveyancing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a proposed qualitative framework to discuss the heterogeneous burning of metallic materials, through parameters and factors that influence the melting rate of the solid metallic fuel (either in a standard test or in service). During burning, the melting rate is related to the burning rate and is therefore an important parameter for describing and understanding the burning process, especially since the melting rate is commonly recorded during standard flammability testing for metallic materials and is incorporated into many relative flammability ranking schemes. However, whilst the factors that influence melting rate (such as oxygen pressure or specimen diameter) have been well characterized, there is a need for an improved understanding of how these parameters interact as part of the overall melting and burning of the system. Proposed here is the ‘Melting Rate Triangle’, which aims to provide this focus through a conceptual framework for understanding how the melting rate (of solid fuel) is determined and regulated during heterogeneous burning. In the paper, the proposed conceptual model is shown to be both (a) consistent with known trends and previously observed results, and (b)capable of being expanded to incorporate new data. Also shown are examples of how the Melting Rate Triangle can improve the interpretation of flammability test results. Slusser and Miller previously published an ‘Extended Fire Triangle’ as a useful conceptual model of ignition and the factors affecting ignition, providing industry with a framework for discussion. In this paper it is shown that a ‘Melting Rate Triangle’ provides a similar qualitative framework for burning, leading to an improved understanding of the factors affecting fire propagation and extinguishment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ERP systems generally implement controls to prevent certain common kinds of fraud. In addition however, there is an imperative need for detection of more sophisticated patterns of fraudulent activity as evidenced by the legal requirement for company audits and the common incidence of fraud. This paper describes the design and implementation of a framework for detecting patterns of fraudulent activity in ERP systems. We include the description of six fraud scenarios and the process of specifying and detecting the occurrence of those scenarios in ERP user log data using the prototype software which we have developed. The test results for detecting these scenarios in log data have been verified and confirm the success of our approach which can be generalized to ERP systems in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Immediate indefeasibility is the cornerstone of the Torrens system of land registration. However, when combined with the apparent ease in which forged mortgages become registered, the operation of this doctrine can come into question. This article seeks to argue that, rather than question indefeasibility, the focus should be on the verification of identity of parties to land transactions. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the Torrens system can retain immediate indefeasibility as its paramount principle, yet achieve the optimum level of fairness in terms of allocation of responsibility and loss. With the dawn of a new era of electronic conveyancing about to begin, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The possibility of fraud lurks easily in the context of a mortgage transaction (as recently exemplified by the decision of the Queensland Court of Appeal in Young v Hoger [2001] QCA 461). A relatively novel issue, involving an allegation of fraudulent behaviour, arose for consideration by Justice Wilson in Unic v Quartermain Holdings Pty Ltd [2001] QSC 403

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is no doubt that fraud in relation to land transactions is a problem that resonates amongst land academics, practitioners, and stakeholders involved in conveyancing. As each land registration and conveyancing process increasingly moves towards a fully electronic environment, we need to make sure that we understand and guard against the frauds that can occur. What this paper does is examine the types of fraud that have occurred in paper-based conveyancing systems in Australia and considers how they might be undertaken in the National Electronic Conveyancing System (NECS) that is currently under development. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the conveyancing system adopted can achieve the optimum level of fairness in terms of allocation of responsibility and loss. As we sit on the cusp of a new era of electronic conveyancing, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss. Importantly it also recognises that the electronic environment will see new opportunities for those with criminal intent to undermine the integrity of land transactions. An appreciation of this now, can see the appropriate measures put in place to minimise the risk.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The thesis presented in this paper is that the land fraud committed by Matthew Perrin in Queensland and inflicted upon Roger Mildenhall in Western Australia demonstrates the need for urgent procedural reform to the conveyancing process. Should this not occur, then calls to reform the substantive principles of the Torrens system will be heard throughout the jurisdictions that adopt title by registration, particularly in those places where immediate indefeasibility is still the norm. This paper closely examines the factual matrix behind both of these frauds, and asks what steps should have been taken to prevent them occurring. With 2012 bringing us Australian legislation embedding a national e-conveyancing system and a new Land Transfer Act for New Zealand we ask what legislative measures should be introduced to minimise the potential for such fraud. In undertaking this study, we reflect on whether the activities of Perrin and the criminals responsible for stealing Mildenhall's land would have succeeded under the present system for automated registration utilised in New Zealand.