Titulo:

Risks and fraud: A theoretical approach
.

Guardado en:

2389-8186

2389-8194

8

2021-12-15

7

21

info:eu-repo/semantics/openAccess

http://purl.org/coar/access_right/c_abf2

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.

Revista Perspectiva Empresarial - 2021

id metarevistapublica_revistasceipaco_revistaperspectivaempresarial_80-article-712
record_format ojs
spelling Risks and fraud: A theoretical approach
8
Artículo de revista
Núm. 2 , Año 2021 : Julio-diciembre
Sabaneta: Fundación Universitaria Ceipa, 2014-
2
Portugal Dias, Alcina Augusta De Sena
Revista Perspectiva Empresarial
Flowers, A. and Zeadally, S. (2014). US Policy on Active Cyber Defense. Journal of Homeland Security and Emergency Management, 11(2), 289-308. https://doi.org/10.1515/jhsem-2014-0021
Gengler, B. (1999). Cyber attacks from outside and inside. Computer Fraud & Security, 5, 6-7. https://doi.org/10.1016/S1361-3723(99)90142-2
Hall, J. (2011). Accounting Information Systems. Boston, USA: Cengage Learning.
Fay, R. and Negangard, E. (2017). Manual journal entry testing: Data analytics and the risk of fraud. Journal of Accounting Education, 38, 47-49. https://doi.org/10.1016/j.jaccedu.2016.12.004
Dustan, J. (2016). U.S. Critical Infrastructure Cybersecurity: An Analysis of Threats, Methods, and Policy-Past, Present, and Future (Graduate Thesis). University of South Carolina, Columbia, USA.
Dilla, W., Harrison, J. and Mennnecke, E. (2013). The assets are virtual but the behavior is real: an analysis of fraud in virtual worlds and its implications for the real world. Journal of Information Systems, 27(2), 131-158. https://doi.org/10.2308/isys-50571
Hathaway, O.A. et al. (2012). The Law of Cyber- Attack. California Law Review, 100(4), 817-885.
IIA. (2020). OnRisk 2021: A Guide to Understanding, Aligning, and Optimizing Risk. Bruxelles, Belgium: IIA.
Kirkosa, E., Spathis, C. and Manolopoulos, Y. (2007). Data Mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications, 32(4), 995-1003. https://doi.org/10.1016/j.eswa.2006.02.016
Ngai, E.W.T. et al. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559-569. https://doi.org/10.1016/j.dss.2010.08.006
Power, M. (2013). The apparatus of fraud risk. Accounting Organizations and Society, 38(6- 7), 525-543. https://doi.org/10.1016/j.aos.2012.07.004
Spink, J. et al. (2017). Food fraud prevention shifts the food risk focus to vulnerability. Trends in Food Science & Technology, 62, 215-220. https://doi.org/10.1016/j.tifs.2017.02.012
Vogel, R. (2016). Closing the cybersecurity skills gap. Salus Journal, 4(2), 32-46.
Spink, J. et al. (2019). The application of public policy theory to the emerging food fraud risk: Next steps. Trends in Food Science & Technology, 85, 116-128. https://doi.org/10.1016/j.tifs.2019.01.002
Suh, J., Nicolaides, R. and Trafford, R. (2019). The effects of reducing opportunity and fraud risk factors on the occurrence of occupational fraud in financial institutions. International Journal of Law, Crime and Justice, 56, 79-88. https://doi.org/10.1016/j.ijlcj.2019.01.002
Cressey, D.R. (1953). Other people's money: a study in the social psychology of embezzlement. Belmont, USA: Wadsworth Publishing Company.
Wolfe, D. and Hermanson, D. (2004). The Fraud Diamond: Considering the Four Elements of Fraud. CPA Journal, 74(12), 38-42.
Zaini, M., Carolina, A., & Setiawan, A. R. (2015). Analisis Pengaruh Fraud Diamond dan Gone
Theory Terhadap Academic Fraud (Studi Kasus Mahasiswa Akuntansi Se-Madura). In Simposium Nasional Akuntansi XVIII, Medan, Indonesia.
info:eu-repo/semantics/article
http://purl.org/coar/resource_type/c_6501
info:eu-repo/semantics/publishedVersion
http://purl.org/coar/version/c_970fb48d4fbd8a85
info:eu-repo/semantics/openAccess
http://purl.org/coar/access_right/c_abf2
Text
Crowe, H. (2011). Why the Fraud Triangle is No Longer Enough. Retrieved from www. crowehorwath.com.
Boyle, M., DeZoort, T. and Hermanson, D. (2015). The effect of alternative fraud model use on auditors' fraud risk judgments. Journal of Accounting and Public Policy, 34(6), 578-596. https://doi.org/10.1016/j.jaccpubpol.2015.05.006
Chen, J. et al. (2015). Big data based fraud risk management at Alibaba. The Journal of Finance and Data Science, 1(1), 1-10. https://doi.org/10.1016/j.jfds.2015.03.001
text/xml
Objective. To explain fraud occurrence —under three theoretical models— and apply it to the organization’s hierarchy. Methodology. Based on the IIA risk outlook for 2021, an exploratory theoretical scope of analysis was constructed. Risks were considered under the umbrella of three fraud theories: Triangle of Cressey; Diamond of Wolfe and Hermanson; and Pentagon of Crowe. Results. Fraud occurrence may be explained by the perpetrator’s position across the hierarchical organization chart: where it is stressed that arrogance from the Pentagon fits the top management position; competence from the Diamond fits the middle management; and need, opportunity and pressure from the Triangle fit mainly the lower management. Conclusions. Fraud was considered under three main models, concluding that it may be explained through different worker motivations related to their management position in the company.
Risks
fraud triangle
fraud diamond
fraud pentagon
management level
Journal article
application/pdf
Chayes, A. (2015). Rethinking Warfare: The Ambiguity of Cyber Attacks. Harvard National Security Journal, 6(2), 474-519.
text/html
https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/view/712
https://creativecommons.org/licenses/by-nc-sa/4.0
Risks and fraud: A theoretical approach
Abdullahi, R. and Mansor, N. (2015). Fraud Triangle Theory and Fraud Diamond Theory. Understanding the Convergent and Divergent for Future Research. International Journal of Academic Research in Accounting, Finance and Management Sciences, 5(4), 38-45. https://doi.org/10.6007/IJARAFMS/v5-i4/1823
Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.
Revista Perspectiva Empresarial - 2021
Publication
Inglés
2021-12-15T11:40:16Z
2021-12-15T11:40:16Z
https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/download/712/966
2389-8194
https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/download/712/1032
2021-12-15
https://doi.org/10.16967/23898186.712
7
21
10.16967/23898186.712
2389-8186
https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/download/712/976
institution CEIPA BUSINESS SCHOOL
thumbnail https://nuevo.metarevistas.org/CEIPABUSINESSSCHOOL/logo.png
country_str Colombia
collection Revista Perspectiva Empresarial
title Risks and fraud: A theoretical approach
spellingShingle Risks and fraud: A theoretical approach
Portugal Dias, Alcina Augusta De Sena
Risks
fraud triangle
fraud diamond
fraud pentagon
management level
title_short Risks and fraud: A theoretical approach
title_full Risks and fraud: A theoretical approach
title_fullStr Risks and fraud: A theoretical approach
title_full_unstemmed Risks and fraud: A theoretical approach
title_sort risks and fraud: a theoretical approach
title_eng Risks and fraud: A theoretical approach
description_eng Objective. To explain fraud occurrence —under three theoretical models— and apply it to the organization’s hierarchy. Methodology. Based on the IIA risk outlook for 2021, an exploratory theoretical scope of analysis was constructed. Risks were considered under the umbrella of three fraud theories: Triangle of Cressey; Diamond of Wolfe and Hermanson; and Pentagon of Crowe. Results. Fraud occurrence may be explained by the perpetrator’s position across the hierarchical organization chart: where it is stressed that arrogance from the Pentagon fits the top management position; competence from the Diamond fits the middle management; and need, opportunity and pressure from the Triangle fit mainly the lower management. Conclusions. Fraud was considered under three main models, concluding that it may be explained through different worker motivations related to their management position in the company.
author Portugal Dias, Alcina Augusta De Sena
author_facet Portugal Dias, Alcina Augusta De Sena
topic Risks
fraud triangle
fraud diamond
fraud pentagon
management level
topic_facet Risks
fraud triangle
fraud diamond
fraud pentagon
management level
citationvolume 8
citationissue 2
citationedition Núm. 2 , Año 2021 : Julio-diciembre
publisher Sabaneta: Fundación Universitaria Ceipa, 2014-
ispartofjournal Revista Perspectiva Empresarial
source https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/view/712
language Inglés
format Article
rights info:eu-repo/semantics/openAccess
http://purl.org/coar/access_right/c_abf2
https://creativecommons.org/licenses/by-nc-sa/4.0
Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.
Revista Perspectiva Empresarial - 2021
references_eng Flowers, A. and Zeadally, S. (2014). US Policy on Active Cyber Defense. Journal of Homeland Security and Emergency Management, 11(2), 289-308. https://doi.org/10.1515/jhsem-2014-0021
Gengler, B. (1999). Cyber attacks from outside and inside. Computer Fraud & Security, 5, 6-7. https://doi.org/10.1016/S1361-3723(99)90142-2
Hall, J. (2011). Accounting Information Systems. Boston, USA: Cengage Learning.
Fay, R. and Negangard, E. (2017). Manual journal entry testing: Data analytics and the risk of fraud. Journal of Accounting Education, 38, 47-49. https://doi.org/10.1016/j.jaccedu.2016.12.004
Dustan, J. (2016). U.S. Critical Infrastructure Cybersecurity: An Analysis of Threats, Methods, and Policy-Past, Present, and Future (Graduate Thesis). University of South Carolina, Columbia, USA.
Dilla, W., Harrison, J. and Mennnecke, E. (2013). The assets are virtual but the behavior is real: an analysis of fraud in virtual worlds and its implications for the real world. Journal of Information Systems, 27(2), 131-158. https://doi.org/10.2308/isys-50571
Hathaway, O.A. et al. (2012). The Law of Cyber- Attack. California Law Review, 100(4), 817-885.
IIA. (2020). OnRisk 2021: A Guide to Understanding, Aligning, and Optimizing Risk. Bruxelles, Belgium: IIA.
Kirkosa, E., Spathis, C. and Manolopoulos, Y. (2007). Data Mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications, 32(4), 995-1003. https://doi.org/10.1016/j.eswa.2006.02.016
Ngai, E.W.T. et al. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559-569. https://doi.org/10.1016/j.dss.2010.08.006
Power, M. (2013). The apparatus of fraud risk. Accounting Organizations and Society, 38(6- 7), 525-543. https://doi.org/10.1016/j.aos.2012.07.004
Spink, J. et al. (2017). Food fraud prevention shifts the food risk focus to vulnerability. Trends in Food Science & Technology, 62, 215-220. https://doi.org/10.1016/j.tifs.2017.02.012
Vogel, R. (2016). Closing the cybersecurity skills gap. Salus Journal, 4(2), 32-46.
Spink, J. et al. (2019). The application of public policy theory to the emerging food fraud risk: Next steps. Trends in Food Science & Technology, 85, 116-128. https://doi.org/10.1016/j.tifs.2019.01.002
Suh, J., Nicolaides, R. and Trafford, R. (2019). The effects of reducing opportunity and fraud risk factors on the occurrence of occupational fraud in financial institutions. International Journal of Law, Crime and Justice, 56, 79-88. https://doi.org/10.1016/j.ijlcj.2019.01.002
Cressey, D.R. (1953). Other people's money: a study in the social psychology of embezzlement. Belmont, USA: Wadsworth Publishing Company.
Wolfe, D. and Hermanson, D. (2004). The Fraud Diamond: Considering the Four Elements of Fraud. CPA Journal, 74(12), 38-42.
Zaini, M., Carolina, A., & Setiawan, A. R. (2015). Analisis Pengaruh Fraud Diamond dan Gone
Theory Terhadap Academic Fraud (Studi Kasus Mahasiswa Akuntansi Se-Madura). In Simposium Nasional Akuntansi XVIII, Medan, Indonesia.
Crowe, H. (2011). Why the Fraud Triangle is No Longer Enough. Retrieved from www. crowehorwath.com.
Boyle, M., DeZoort, T. and Hermanson, D. (2015). The effect of alternative fraud model use on auditors' fraud risk judgments. Journal of Accounting and Public Policy, 34(6), 578-596. https://doi.org/10.1016/j.jaccpubpol.2015.05.006
Chen, J. et al. (2015). Big data based fraud risk management at Alibaba. The Journal of Finance and Data Science, 1(1), 1-10. https://doi.org/10.1016/j.jfds.2015.03.001
Chayes, A. (2015). Rethinking Warfare: The Ambiguity of Cyber Attacks. Harvard National Security Journal, 6(2), 474-519.
Abdullahi, R. and Mansor, N. (2015). Fraud Triangle Theory and Fraud Diamond Theory. Understanding the Convergent and Divergent for Future Research. International Journal of Academic Research in Accounting, Finance and Management Sciences, 5(4), 38-45. https://doi.org/10.6007/IJARAFMS/v5-i4/1823
type_driver info:eu-repo/semantics/article
type_coar http://purl.org/coar/resource_type/c_6501
type_version info:eu-repo/semantics/publishedVersion
type_coarversion http://purl.org/coar/version/c_970fb48d4fbd8a85
type_content Text
publishDate 2021-12-15
date_accessioned 2021-12-15T11:40:16Z
date_available 2021-12-15T11:40:16Z
url https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/view/712
url_doi https://doi.org/10.16967/23898186.712
issn 2389-8186
eissn 2389-8194
doi 10.16967/23898186.712
citationstartpage 7
citationendpage 21
url2_str_mv https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/download/712/966
url4_str_mv https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/download/712/1032
url3_str_mv https://revistas.ceipa.edu.co/index.php/perspectiva-empresarial/article/download/712/976
_version_ 1813593177434619904