+ All Categories
Home > Business > Computer aided audit techniques and fraud detection

Computer aided audit techniques and fraud detection

Date post: 14-Sep-2014
Category:
View: 1,369 times
Download: 0 times
Share this document with a friend
Description:
International journals call for papers, http://www.iiste.org/
Popular Tags:
14
Research Journal of Finance and Acco ISSN 2222-1697 (Paper) ISSN 2222-2 Vol.4, No.5, 2013 Computer Aide 1 Department of Management a * E-mail Abstract This study sought to identify the v adoption of Computer Aided Audit CAATs on performance of an organiz Data for the study was collected usin large audit firm in Nigeria. Data obtai The hypothesis of the study was analy respondents agreed that CAATs have minimal level in organizations. 58.1 performance. Furthermore, the cost systems database requirements, are so of CAAT to organizations. Thus, it ca reports within organizations because i Keywords: Fraud, CAAT, Audit soft 1. Introduction Existence of fraud could be found in increase day in day out. Albrecht, Al and includes bribery, political corrupt and divorce fraud, and identity thef individuals among management, emp This could be intentionally misrepres to financial loss. Fraud could likewis misuse or harm the asset of an organiz In 1982, Brink and Witt opined that fr serious concern to management scien place or not should be of paramount i result in a material misstatement of fin important factor that differentiates t intentional or not. Although there are and is seen to be most costly to tack internal controls and easy detection o transparent financial reporting have sp forensic and Investigative Service D survey of fraud detection from a wid discovered that 62 percent of these e Among companies who responded to total of $457 million (KPMG, 2004 misappropriation of assets. According ounting 2847 (Online) 67 ed Audit Techniques and Fraud Omoneye O. OLASANMI 1 * and Accounting Obafemi Awolowo University Ile-Ife, l of the corresponding author: [email protected] various types of fraud encountered during financial Tools (CAATs) in fraud detection in an organizatio zation, and ascertain the problems of CAATs’ applicat ng a well-structured questionnaire which was distrib ined was statistically analyzed using statistical package yzed using regression analysis. The result of this study played a major role in fraud detection, and hence can 1% of the respondents ascertained that CAAT helpe of implementing CAAT, the required skills to be a ome of the problems found to be associated with the i an be reasonably concluded that CAAT can help in th it is a platform where fraudulent and misappropriated p tware, Accounting Information all cycles of life and it is evident enough that if not lbrecht and Dunn (2001), stated that fraud comprises tion, business and employee fraud, consumer theft; ne ft. Hence, in financial establishment, it is an intent ployees or third parties, resulting into misrepresentati enting, concealing, or omission of truth so as to dece se be in form embezzlement, theft or any attempt to zation (Adeniji, 2004). raud serves as set back to utilization of resources in an nce in general. Inefficiency in appropriately ascertaini importance to auditors rather the auditor's interest spe nancial statements. However, there exist difference be the fraud from error is whether misstatement of t e different types of fraud, yet corporate fraud continue kle. A lot of fraud cases primarily occurred because o of fraud by assigned auditors. Increase in awareness f purred the concern of regulatory bodies, as well as the Division of the independent accounting firm of KPM de array of businesses and industries. According to entities had experienced at least one incident of fraud the KPMG survey in 2004, close to half had experien 4). The vast majority of the fraud reported in the g to the Association of Certified Fraud Examinations www.iiste.org Detection Osun State, Nigeria om l transactions, evaluate the on, appraise the impact of tion within an organization. buted to staff members of a e for social sciences (SPSS). y showed that 72.8% of the n be used to curb fraud to a d to improve the auditors’ acquired for its usage and introduction and application he transparency of financial practices are easily detected. checked, it could be on the a large variety of activities etwork hacking, bankruptcy tional act by one or more ion of financial statements. eive and manipulate leading steal or unlawfully obtain, n effective way and this is of ing whether fraud has taken ecifically relates to acts that etween fraud and error. The the financial statements is es to be a pervasive problem of poor or lack of adequate fraud and the importance of accounting profession. The MG conducted an extensive various respondents it was d that year (KPMG, 2004). nced a fraud costing them a KPMG survey related to (ACFE), an estimated $2.9
Transcript
Page 1: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

Computer Aided Audit Techniques and Fraud Detection

1Department of Management and Accounting Obafemi Awolowo University Ile

* E-mail of the corresponding author: [email protected]

Abstract

This study sought to identify the various types of fraud encountered during financial transactions, evaluate the

adoption of Computer Aided Audit Tools (CAATs) in fraud detection in an organization, appraise the impact of

CAATs on performance of an organization, and ascertain

Data for the study was collected using a well

large audit firm in Nigeria. Data obtained was statistically analyzed using statis

The hypothesis of the study was analyzed using regression analysis. The result of this study showed that 72.8% of the

respondents agreed that CAATs have played a major role in fraud detection, and hence can be used

minimal level in organizations. 58.1% of the respondents ascertained that CAAT helped to improve the auditors’

performance. Furthermore, the cost of implementing CAAT, the required skills to be acquired for its usage and

systems database requirements, are some of the problems found to be associated with the introduction and application

of CAAT to organizations. Thus, it can be reasonably concluded that CAAT can help in the transparency of financial

reports within organizations because it

Keywords: Fraud, CAAT, Audit software, Accounting Information

1. Introduction

Existence of fraud could be found in all cycles of life and it is evident enough that if not

increase day in day out. Albrecht, Albrecht and Dunn (2001), stated that

and includes bribery, political corruption, business and employee fraud, consumer theft; network hacking, ba

and divorce fraud, and identity theft.

individuals among management, employees or third parties, resulting into misrepresentation of financial statements.

This could be intentionally misrepresenting, concealing, or omission of truth so as to deceive and manipulate leading

to financial loss. Fraud could likewise be in form embezzlement, theft or any attempt to steal or unlawfully obtain,

misuse or harm the asset of an organiz

In 1982, Brink and Witt opined that fraud serves as set back to utilization of resources in an effective way and this is of

serious concern to management science in general. Inefficiency in appropriately ascertaining whether fraud

place or not should be of paramount importance to auditors

result in a material misstatement of financial statements. However, there exist difference between fraud and error. The

important factor that differentiates the fraud from error is whether misstatement of the financial statements is

intentional or not. Although there are different types of fraud, yet

and is seen to be most costly to tackle

internal controls and easy detection of fraud by assigned auditors. Increase in awareness fraud and the importance of

transparent financial reporting have spurr

forensic and Investigative Service Division of the independent accounting firm of KPMG conducted an extensive

survey of fraud detection from a wide array of businesses and indus

discovered that 62 percent of these entities had experienced at least one incident of fraud that year (KPMG, 2004).

Among companies who responded to the KPMG survey in 2004, close to half had experienced a fra

total of $457 million (KPMG, 2004). The vast majority of the fraud reported in the KPMG survey related to

misappropriation of assets. According to the Association of Certified Fraud Examinations (ACFE), an estimated $2.9

Research Journal of Finance and Accounting

2847 (Online)

67

Computer Aided Audit Techniques and Fraud Detection

Omoneye O. OLASANMI 1*

Department of Management and Accounting Obafemi Awolowo University Ile-Ife, Osun State,

mail of the corresponding author: [email protected]

identify the various types of fraud encountered during financial transactions, evaluate the

adoption of Computer Aided Audit Tools (CAATs) in fraud detection in an organization, appraise the impact of

CAATs on performance of an organization, and ascertain the problems of CAATs’ application within an organization.

Data for the study was collected using a well-structured questionnaire which was distributed to staff members of a

large audit firm in Nigeria. Data obtained was statistically analyzed using statistical package for social sciences (SPSS).

The hypothesis of the study was analyzed using regression analysis. The result of this study showed that 72.8% of the

respondents agreed that CAATs have played a major role in fraud detection, and hence can be used

minimal level in organizations. 58.1% of the respondents ascertained that CAAT helped to improve the auditors’

performance. Furthermore, the cost of implementing CAAT, the required skills to be acquired for its usage and

e requirements, are some of the problems found to be associated with the introduction and application

of CAAT to organizations. Thus, it can be reasonably concluded that CAAT can help in the transparency of financial

reports within organizations because it is a platform where fraudulent and misappropriated practices are easily detected.

Fraud, CAAT, Audit software, Accounting Information

Existence of fraud could be found in all cycles of life and it is evident enough that if not

increase day in day out. Albrecht, Albrecht and Dunn (2001), stated that fraud comprises a large variety of activities

and includes bribery, political corruption, business and employee fraud, consumer theft; network hacking, ba

and divorce fraud, and identity theft. Hence, in financial establishment, it is an intentional act by one or more

individuals among management, employees or third parties, resulting into misrepresentation of financial statements.

entionally misrepresenting, concealing, or omission of truth so as to deceive and manipulate leading

to financial loss. Fraud could likewise be in form embezzlement, theft or any attempt to steal or unlawfully obtain,

misuse or harm the asset of an organization (Adeniji, 2004).

In 1982, Brink and Witt opined that fraud serves as set back to utilization of resources in an effective way and this is of

serious concern to management science in general. Inefficiency in appropriately ascertaining whether fraud

place or not should be of paramount importance to auditors rather the auditor's interest specifically relates to acts that

result in a material misstatement of financial statements. However, there exist difference between fraud and error. The

important factor that differentiates the fraud from error is whether misstatement of the financial statements is

intentional or not. Although there are different types of fraud, yet corporate fraud continues to be a pervasive problem

t costly to tackle. A lot of fraud cases primarily occurred because of poor or lack of adequate

internal controls and easy detection of fraud by assigned auditors. Increase in awareness fraud and the importance of

transparent financial reporting have spurred the concern of regulatory bodies, as well as the accounting profession.

forensic and Investigative Service Division of the independent accounting firm of KPMG conducted an extensive

survey of fraud detection from a wide array of businesses and industries. According to various respondents it was

discovered that 62 percent of these entities had experienced at least one incident of fraud that year (KPMG, 2004).

Among companies who responded to the KPMG survey in 2004, close to half had experienced a fra

total of $457 million (KPMG, 2004). The vast majority of the fraud reported in the KPMG survey related to

According to the Association of Certified Fraud Examinations (ACFE), an estimated $2.9

www.iiste.org

Computer Aided Audit Techniques and Fraud Detection

Ife, Osun State, Nigeria

mail of the corresponding author: [email protected]

identify the various types of fraud encountered during financial transactions, evaluate the

adoption of Computer Aided Audit Tools (CAATs) in fraud detection in an organization, appraise the impact of

the problems of CAATs’ application within an organization.

structured questionnaire which was distributed to staff members of a

tical package for social sciences (SPSS).

The hypothesis of the study was analyzed using regression analysis. The result of this study showed that 72.8% of the

respondents agreed that CAATs have played a major role in fraud detection, and hence can be used to curb fraud to a

minimal level in organizations. 58.1% of the respondents ascertained that CAAT helped to improve the auditors’

performance. Furthermore, the cost of implementing CAAT, the required skills to be acquired for its usage and

e requirements, are some of the problems found to be associated with the introduction and application

of CAAT to organizations. Thus, it can be reasonably concluded that CAAT can help in the transparency of financial

is a platform where fraudulent and misappropriated practices are easily detected.

checked, it could be on the

fraud comprises a large variety of activities

and includes bribery, political corruption, business and employee fraud, consumer theft; network hacking, bankruptcy

Hence, in financial establishment, it is an intentional act by one or more

individuals among management, employees or third parties, resulting into misrepresentation of financial statements.

entionally misrepresenting, concealing, or omission of truth so as to deceive and manipulate leading

to financial loss. Fraud could likewise be in form embezzlement, theft or any attempt to steal or unlawfully obtain,

In 1982, Brink and Witt opined that fraud serves as set back to utilization of resources in an effective way and this is of

serious concern to management science in general. Inefficiency in appropriately ascertaining whether fraud has taken

rather the auditor's interest specifically relates to acts that

result in a material misstatement of financial statements. However, there exist difference between fraud and error. The

important factor that differentiates the fraud from error is whether misstatement of the financial statements is

corporate fraud continues to be a pervasive problem

. A lot of fraud cases primarily occurred because of poor or lack of adequate

internal controls and easy detection of fraud by assigned auditors. Increase in awareness fraud and the importance of

ed the concern of regulatory bodies, as well as the accounting profession. The

forensic and Investigative Service Division of the independent accounting firm of KPMG conducted an extensive

tries. According to various respondents it was

discovered that 62 percent of these entities had experienced at least one incident of fraud that year (KPMG, 2004).

Among companies who responded to the KPMG survey in 2004, close to half had experienced a fraud costing them a

total of $457 million (KPMG, 2004). The vast majority of the fraud reported in the KPMG survey related to

According to the Association of Certified Fraud Examinations (ACFE), an estimated $2.9

Page 2: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

trillion worldwide were lost due to fraudulent financial statements, asset misappropriation, and corruption in 2009.

Employee theft costs $40 billion a year with an average of $1,350 per employee, of which 75% of them are undetected.

The total losses of shoplifting amount

incident. However, only 5,000 incidents were caught. Identity theft is also becoming very serious. In the past five

years there were 27.5 million victims of identity theft. These

point that detecting fraud is a constant challenge for any business (Yang, 2006).

Computer aided audit techniques (CAATs) is a growing field within the financial audit profession in Nigeria. CAATs

are computer tools and techniques that an auditor (external or internal) uses as part of their audit procedure to process

data of audit significance contained in an entity’s information systems (Singleton, Singleton,

2006). CAAT is the process of using computers to automate or simplify the audit process. Computer technology gives

auditors a new set of techniques for examining the automated business environment. As early as 1982, CAATs was a

powerful audit tool for detecting financial

more powerful but also more widely used by auditors. Audit software allows its user to obtain a quick overview of

operations of a business and to drill down into details of specifi

that contain features associated with fraudulent activities. CAAT is the practice of analyzing large volumes of data

looking for anomalies. Using CAATs, the auditor will extract every transaction a

period reviewed. The auditor will then test that data to determine if there are any problems in the data. With audit

software, millions of files can be examined, data’s collected can be used to identify, analyze and compa

made between different locations. Computerized techniques and interactive software can help auditors focus their

efforts on areas of greatest risk. Auditors can choose to exclude low risk transactions from their review and focus on

those transactions that contain a higher probability of fraud. Audit software also provides auditors with the ability to

extract information from several data’s files with different database management systems, in order to search for

underlying patterns or relationships among data (Coderre, 1999). Examples of CAATs include generalized audit

software, custom audit software, test data, parallel simulation, and integrated test facility.

The objectives of this study are to identify the various types of fraud encountered

evaluate the adoption of CAATs in organizations, to appraise the impact of CAATs on performance of organization

and to ascertain the problem of CAATs’ application in organizations. It should be noted that before the advent

computers, there had been occurrences of fraud within organizations. There is a marked difference between traditional

frauds and the modern-day computer frauds, as some of the traditional frauds require violence or a threat of violence.

In addition, the perpetrators of traditional frauds were more visible and detection of such frauds was relatively easy.

Inasmuch as the characteristics of these crimes are different, the motivations of the criminals are much the same;

people still commit fraud within orga

firms/organization. This study thus seeks to find out if CAATs can aid in the detection of frauds for better audit

processes and reports.

2. LITERATURE REVIEW

Fraud detection, unlike a financial statement audit, requires a unique skill set and forensic techniques developed for the

sole purpose of detecting the evidence of fraud (Davia, 2001). Specifically, it requires individuals who are skilled in

the application of investigative and analytical tools related to the areas of accounting records, gathering and evaluating

financial statement evidence, interviewing all parties related to an alleged fraud situation, and serving as an expert

witness in a fraud case (Singleton, 2006).

survey carried out on fraud detection as applied to the United State economy, it was shown that

internal controls was most commonly cited as the factor that allowed fraud to occur

conclusion was that the implementation of anti

organization’s exposure to loss.

Research Journal of Finance and Accounting

2847 (Online)

68

e were lost due to fraudulent financial statements, asset misappropriation, and corruption in 2009.

Employee theft costs $40 billion a year with an average of $1,350 per employee, of which 75% of them are undetected.

The total losses of shoplifting amount to $13 billion a year with 800,000 incidents each day costing $142 loss per

incident. However, only 5,000 incidents were caught. Identity theft is also becoming very serious. In the past five

years there were 27.5 million victims of identity theft. These losses are ever increasing today

point that detecting fraud is a constant challenge for any business (Yang, 2006).

Computer aided audit techniques (CAATs) is a growing field within the financial audit profession in Nigeria. CAATs

are computer tools and techniques that an auditor (external or internal) uses as part of their audit procedure to process

data of audit significance contained in an entity’s information systems (Singleton, Singleton,

the process of using computers to automate or simplify the audit process. Computer technology gives

auditors a new set of techniques for examining the automated business environment. As early as 1982, CAATs was a

powerful audit tool for detecting financial errors. It was in recent years, that analytical techniques became not only

more powerful but also more widely used by auditors. Audit software allows its user to obtain a quick overview of

operations of a business and to drill down into details of specific area of interest; it highlights individual transactions

that contain features associated with fraudulent activities. CAAT is the practice of analyzing large volumes of data

looking for anomalies. Using CAATs, the auditor will extract every transaction a business unit performed during the

period reviewed. The auditor will then test that data to determine if there are any problems in the data. With audit

software, millions of files can be examined, data’s collected can be used to identify, analyze and compa

made between different locations. Computerized techniques and interactive software can help auditors focus their

efforts on areas of greatest risk. Auditors can choose to exclude low risk transactions from their review and focus on

sactions that contain a higher probability of fraud. Audit software also provides auditors with the ability to

extract information from several data’s files with different database management systems, in order to search for

hips among data (Coderre, 1999). Examples of CAATs include generalized audit

software, custom audit software, test data, parallel simulation, and integrated test facility.

The objectives of this study are to identify the various types of fraud encountered during financial transaction, to

evaluate the adoption of CAATs in organizations, to appraise the impact of CAATs on performance of organization

and to ascertain the problem of CAATs’ application in organizations. It should be noted that before the advent

computers, there had been occurrences of fraud within organizations. There is a marked difference between traditional

day computer frauds, as some of the traditional frauds require violence or a threat of violence.

perpetrators of traditional frauds were more visible and detection of such frauds was relatively easy.

Inasmuch as the characteristics of these crimes are different, the motivations of the criminals are much the same;

people still commit fraud within organizations. The advent of the CAATs has thus been advocated for in some

firms/organization. This study thus seeks to find out if CAATs can aid in the detection of frauds for better audit

financial statement audit, requires a unique skill set and forensic techniques developed for the

sole purpose of detecting the evidence of fraud (Davia, 2001). Specifically, it requires individuals who are skilled in

nalytical tools related to the areas of accounting records, gathering and evaluating

financial statement evidence, interviewing all parties related to an alleged fraud situation, and serving as an expert

witness in a fraud case (Singleton, 2006). According to the Association of Certified Fraud Examiners (ACFE),

survey carried out on fraud detection as applied to the United State economy, it was shown that

internal controls was most commonly cited as the factor that allowed fraud to occur (Keller and Owens, 2008)

conclusion was that the implementation of anti-fraud controls appears to have a measureable impact on the

www.iiste.org

e were lost due to fraudulent financial statements, asset misappropriation, and corruption in 2009.

Employee theft costs $40 billion a year with an average of $1,350 per employee, of which 75% of them are undetected.

to $13 billion a year with 800,000 incidents each day costing $142 loss per

incident. However, only 5,000 incidents were caught. Identity theft is also becoming very serious. In the past five

losses are ever increasing today. The above losses prove a

Computer aided audit techniques (CAATs) is a growing field within the financial audit profession in Nigeria. CAATs

are computer tools and techniques that an auditor (external or internal) uses as part of their audit procedure to process

data of audit significance contained in an entity’s information systems (Singleton, Singleton, Bologna, and Lindquist,

the process of using computers to automate or simplify the audit process. Computer technology gives

auditors a new set of techniques for examining the automated business environment. As early as 1982, CAATs was a

errors. It was in recent years, that analytical techniques became not only

more powerful but also more widely used by auditors. Audit software allows its user to obtain a quick overview of

c area of interest; it highlights individual transactions

that contain features associated with fraudulent activities. CAAT is the practice of analyzing large volumes of data

business unit performed during the

period reviewed. The auditor will then test that data to determine if there are any problems in the data. With audit

software, millions of files can be examined, data’s collected can be used to identify, analyze and comparisons can be

made between different locations. Computerized techniques and interactive software can help auditors focus their

efforts on areas of greatest risk. Auditors can choose to exclude low risk transactions from their review and focus on

sactions that contain a higher probability of fraud. Audit software also provides auditors with the ability to

extract information from several data’s files with different database management systems, in order to search for

hips among data (Coderre, 1999). Examples of CAATs include generalized audit

during financial transaction, to

evaluate the adoption of CAATs in organizations, to appraise the impact of CAATs on performance of organization

and to ascertain the problem of CAATs’ application in organizations. It should be noted that before the advent of

computers, there had been occurrences of fraud within organizations. There is a marked difference between traditional

day computer frauds, as some of the traditional frauds require violence or a threat of violence.

perpetrators of traditional frauds were more visible and detection of such frauds was relatively easy.

Inasmuch as the characteristics of these crimes are different, the motivations of the criminals are much the same;

nizations. The advent of the CAATs has thus been advocated for in some

firms/organization. This study thus seeks to find out if CAATs can aid in the detection of frauds for better audit

financial statement audit, requires a unique skill set and forensic techniques developed for the

sole purpose of detecting the evidence of fraud (Davia, 2001). Specifically, it requires individuals who are skilled in

nalytical tools related to the areas of accounting records, gathering and evaluating

financial statement evidence, interviewing all parties related to an alleged fraud situation, and serving as an expert

to the Association of Certified Fraud Examiners (ACFE), a

survey carried out on fraud detection as applied to the United State economy, it was shown that lack of adequate

(Keller and Owens, 2008). The

fraud controls appears to have a measureable impact on the

Page 3: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

Additionally, two studies have explored the determinants of CAATs usage by generalist

2008). These studies find that auditor willingness to employ CAATs in the financial statement audit is impacted by

auditor perceptions of the usefulness of those procedures and concerns regarding the budget impact of CAATs usag

Firms play a significant role in these perceptions through training and other resources they provide, as well as through

their communication of support for CAATs usage (

In Ireland, the Institute of Internal Auditor

revealed hesitation amongst those overseeing internal audit departments as relating to automation. The key reason

cited for this was that they perceived there was a lack of softw

auditors. More than 40% of respondents suggested that they would be willing to adopt an amended audit approach if

they could find a package(s), that otherwise met their needs; this actually led to

Debreceny, Lee, Neo, and Shuling (2004)

Software (GAS) in the banking industry in Singapore.

extraction, querying, manipulation, summarization and analytical tasks (Boritz, 2003).

common uses of GAS in bank audits includes extraction of samples, identification of reactivated dormant accounts and

verification of the completeness and accuracy of data. This study also found that GAS was frequently being used in

special investigation audits and exceptional instances. From their findings, it was concluded that bank auditors do use

GAS, but only to a limited extent because GAS was p

rather than as a general audit tool. A study was carried out by Mahzan and Lymer (2006) on the adoption of computer

assisted audit techniques (CAATs) by internal auditors in the United King

was discovered that three top factors that influenced the respondents’ decision whether to continue or not to continue

using CAATs are the ability to train employees on the software usage, compatibility of the software

departments’ systems, and the ability of software to meet the data manipulation needs of the audit department.

attempts have seen a drastic increase in recent years, making fraud detection more important than ever. Fraud

prevention and detection are related but not the same

and communication that stop fraud from occurring, whereas, detection focuses on activities and techniques that

promptly recognize timely whether fraud ha

fraud will not be committed, they are the first line of defence in minimising fraud risk. Meanwhile, one of the strongest

fraud deterrents is the awareness that effective detective

detective controls enhance the effectiveness of a fraud risk management program by demonstrating that preventive

controls are working as intended and by identifying fraud if it does occur. Although

evidence that fraud has occurred or is occurring, they are not intended to prevent fraud. Every organization is

susceptible to fraud, but not all fraud can be prevented, nor is it cost

organizations consider both fraud prevention and fraud detection (ACFE, 2006).

2.1 Computer Assisted Audit Techniques

During the course of an audit, the auditor is to obtain sufficient, relevant, and useful evidence to evidence. In many

instances, the computer can be used as an aid in obtaining audit evidence.

CAATs are ‘techniques that use the computer as an audit tool’ which are utilized in application of auditing procedures

(Braun and Davis, 2003; IAASB, 2003; ISACA, 1998). CAATs include tools that

expert systems. Computerized audit techniques range from procedures as simple as listing the data in a given file to the

use of Artificial Intelligence tools to predict financial failure or financial statement structure

and Shuling, 2004). Arguably the most widely deployed class of CAATs is Generalized Audit Software (GAS). These

packages are computer programs that contain general modules to read existing computer files and perform

sophisticated manipulations of data contained in the files to accomplish audit tasks. They have a user

that captures users’ audit requirements and translates those user instructions or queries into program code. This is

undertaken by interrogating the client’s file systems or database and performing the necessary program steps

(Debreceny et al., 2004).

Research Journal of Finance and Accounting

2847 (Online)

69

Additionally, two studies have explored the determinants of CAATs usage by generalist auditors (Curtis and Payne,

2008). These studies find that auditor willingness to employ CAATs in the financial statement audit is impacted by

auditor perceptions of the usefulness of those procedures and concerns regarding the budget impact of CAATs usag

Firms play a significant role in these perceptions through training and other resources they provide, as well as through

their communication of support for CAATs usage (Curtis, Jenkins, Bedard, and Deis, 2009).

Auditors (IIA, 2003) conducted a survey touching on CAAT’s usage. This survey

revealed hesitation amongst those overseeing internal audit departments as relating to automation. The key reason

cited for this was that they perceived there was a lack of software available in the market that met the needs of internal

auditors. More than 40% of respondents suggested that they would be willing to adopt an amended audit approach if

they could find a package(s), that otherwise met their needs; this actually led to an increased usage of CAATs.

Debreceny, Lee, Neo, and Shuling (2004) carried out a research on the usage of CAAT and Generalized Audit

Software (GAS) in the banking industry in Singapore. GAS is a class of CAATs that allows auditors to undertake data

ction, querying, manipulation, summarization and analytical tasks (Boritz, 2003).

common uses of GAS in bank audits includes extraction of samples, identification of reactivated dormant accounts and

ss and accuracy of data. This study also found that GAS was frequently being used in

special investigation audits and exceptional instances. From their findings, it was concluded that bank auditors do use

GAS, but only to a limited extent because GAS was perceived as an interrogation tool to perform fraud investigations

A study was carried out by Mahzan and Lymer (2006) on the adoption of computer

assisted audit techniques (CAATs) by internal auditors in the United Kingdom by Birmingham Business School.

was discovered that three top factors that influenced the respondents’ decision whether to continue or not to continue

using CAATs are the ability to train employees on the software usage, compatibility of the software

departments’ systems, and the ability of software to meet the data manipulation needs of the audit department.

attempts have seen a drastic increase in recent years, making fraud detection more important than ever. Fraud

etection are related but not the same concepts. Prevention encompasses policies, procedures, training,

and communication that stop fraud from occurring, whereas, detection focuses on activities and techniques that

promptly recognize timely whether fraud has occurred or is occurring. While prevention techniques do not ensure that

fraud will not be committed, they are the first line of defence in minimising fraud risk. Meanwhile, one of the strongest

fraud deterrents is the awareness that effective detective controls are in place. Combined with preventive controls,

detective controls enhance the effectiveness of a fraud risk management program by demonstrating that preventive

controls are working as intended and by identifying fraud if it does occur. Although detective controls may provide

evidence that fraud has occurred or is occurring, they are not intended to prevent fraud. Every organization is

, but not all fraud can be prevented, nor is it cost-effective to try. It is thus important

organizations consider both fraud prevention and fraud detection (ACFE, 2006).

Computer Assisted Audit Techniques

During the course of an audit, the auditor is to obtain sufficient, relevant, and useful evidence to evidence. In many

e computer can be used as an aid in obtaining audit evidence.

CAATs are ‘techniques that use the computer as an audit tool’ which are utilized in application of auditing procedures

(Braun and Davis, 2003; IAASB, 2003; ISACA, 1998). CAATs include tools that range from basic word processing to

expert systems. Computerized audit techniques range from procedures as simple as listing the data in a given file to the

use of Artificial Intelligence tools to predict financial failure or financial statement structure

). Arguably the most widely deployed class of CAATs is Generalized Audit Software (GAS). These

packages are computer programs that contain general modules to read existing computer files and perform

nipulations of data contained in the files to accomplish audit tasks. They have a user

that captures users’ audit requirements and translates those user instructions or queries into program code. This is

lient’s file systems or database and performing the necessary program steps

www.iiste.org

auditors (Curtis and Payne,

2008). These studies find that auditor willingness to employ CAATs in the financial statement audit is impacted by

auditor perceptions of the usefulness of those procedures and concerns regarding the budget impact of CAATs usage.

Firms play a significant role in these perceptions through training and other resources they provide, as well as through

).

s (IIA, 2003) conducted a survey touching on CAAT’s usage. This survey

revealed hesitation amongst those overseeing internal audit departments as relating to automation. The key reason

are available in the market that met the needs of internal

auditors. More than 40% of respondents suggested that they would be willing to adopt an amended audit approach if

an increased usage of CAATs.

on the usage of CAAT and Generalized Audit

GAS is a class of CAATs that allows auditors to undertake data

ction, querying, manipulation, summarization and analytical tasks (Boritz, 2003). It was discovered that the

common uses of GAS in bank audits includes extraction of samples, identification of reactivated dormant accounts and

ss and accuracy of data. This study also found that GAS was frequently being used in

special investigation audits and exceptional instances. From their findings, it was concluded that bank auditors do use

erceived as an interrogation tool to perform fraud investigations

A study was carried out by Mahzan and Lymer (2006) on the adoption of computer

dom by Birmingham Business School. It

was discovered that three top factors that influenced the respondents’ decision whether to continue or not to continue

using CAATs are the ability to train employees on the software usage, compatibility of the software with other

departments’ systems, and the ability of software to meet the data manipulation needs of the audit department. Fraud

attempts have seen a drastic increase in recent years, making fraud detection more important than ever. Fraud

concepts. Prevention encompasses policies, procedures, training,

and communication that stop fraud from occurring, whereas, detection focuses on activities and techniques that

s occurred or is occurring. While prevention techniques do not ensure that

fraud will not be committed, they are the first line of defence in minimising fraud risk. Meanwhile, one of the strongest

controls are in place. Combined with preventive controls,

detective controls enhance the effectiveness of a fraud risk management program by demonstrating that preventive

detective controls may provide

evidence that fraud has occurred or is occurring, they are not intended to prevent fraud. Every organization is

effective to try. It is thus important that

During the course of an audit, the auditor is to obtain sufficient, relevant, and useful evidence to evidence. In many

CAATs are ‘techniques that use the computer as an audit tool’ which are utilized in application of auditing procedures

range from basic word processing to

expert systems. Computerized audit techniques range from procedures as simple as listing the data in a given file to the

use of Artificial Intelligence tools to predict financial failure or financial statement structures (Debreceny, Lee, Neo,

). Arguably the most widely deployed class of CAATs is Generalized Audit Software (GAS). These

packages are computer programs that contain general modules to read existing computer files and perform

nipulations of data contained in the files to accomplish audit tasks. They have a user-friendly interface

that captures users’ audit requirements and translates those user instructions or queries into program code. This is

lient’s file systems or database and performing the necessary program steps

Page 4: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

CAATs are important tools for the auditor in gathering information from the organizational environment. They are

referred to all techniques that make use

and computer programs. CAATs are computer tools that extract and analyze data from computer applications (Braun

and Davis, 2003). They enable auditors to test 100 percent of the p

the reliability of conclusions based on that test (AICPA, 2001). Recent audit standards encourage auditors to adopt

CAATs to improve audit efficiency and effectiveness (AICPA, 2006).

2.2 Fraud Detection and Prevention

Fraud detection is a topic applicable to many industries including banking and financial sectors, insurance, government

agencies and law enforcement, and more. Fraud attempts have seen a drastic increase in recent years, making fraud

detection more important than ever. Despite efforts on the part of the affected institutions, hundreds of millions of

money are lost to fraud every year in different countries. In banking, fraud can involve using stolen credit cards,

forging checks, misleading accounting practi

resulting in approximately 10% of insurance payout dollars. Fraud can range from exaggerated losses to deliberately

causing an accident for the payout. With all the different methods of frau

While the primary responsibility for fraud prevention and detection remains with the board and management of any

organisation, the auditors can be a significant part of the organization’s anti

published by KPMG, an international accounting and consulting firm, it was found that “almost two thirds of

organizations surveyed reported discovery of fraud”. The results of this and similar studies suggest that while an

internal audit process doesn’t prevent misappropriation of assets or misrepresentation of financial statements from

happening, it does increase the probability of detecting fraud, thus resulting in smaller losses (KPMG, 2004)

prevention and detection are related but not the

and communication that stop fraud from occurring, whereas, detection focuses on activities and techniques that

promptly recognize timely whether fraud has occurred or is occurring. While

fraud will not be committed, they are the first line of defence in minimising fraud risks. Meanwhile, one of the

strongest fraud deterrents is the awareness that effective detective controls are in place. Combined

controls, detective controls enhance the effectiveness of a fraud risk management program by demonstrating that

preventive controls are working as intended and by identifying fraud if it does occur. Although detective controls may

provide evidence that fraud has occurred or is occurring, they are not intended to prevent fraud. Every organization is

susceptible to fraud, thus it is important that organizations consider both fraud prevention and fraud detection (ACFE,

2006).

3. HYPOTHESIS OF STUDY

Ho: CAATs have no role to play in the detection of fraud in an organization.

4. METHODOLOGY

This research work is on the role of computer aided audit technique in the detection of fraud in an organization using

KPMG, Lagos, Nigeria, which is an inde

Swiss entity. KPMG Nigeria is an industry which provides services which include include Audit, Tax, and Advisory

services. KPMG was established in Nigeria in the year 1978. It has 2

locations. It provides multidisciplinary professional services to both local and international organizations within the

Nigeria business community. KPMG professionals are committed to delivering reliable, ind

in fulfilling this there has to be vigilance in making sure audit complies with changing regulations and the professional

standards on the side of the auditor.

Research Journal of Finance and Accounting

2847 (Online)

70

CAATs are important tools for the auditor in gathering information from the organizational environment. They are

referred to all techniques that make use of computer and computer programs. It consists primarily of test data packs

and computer programs. CAATs are computer tools that extract and analyze data from computer applications (Braun

and Davis, 2003). They enable auditors to test 100 percent of the population rather than a sample, thereby increasing

the reliability of conclusions based on that test (AICPA, 2001). Recent audit standards encourage auditors to adopt

CAATs to improve audit efficiency and effectiveness (AICPA, 2006).

and Prevention

Fraud detection is a topic applicable to many industries including banking and financial sectors, insurance, government

agencies and law enforcement, and more. Fraud attempts have seen a drastic increase in recent years, making fraud

nt than ever. Despite efforts on the part of the affected institutions, hundreds of millions of

money are lost to fraud every year in different countries. In banking, fraud can involve using stolen credit cards,

forging checks, misleading accounting practices, etc. In insurance, 25% of claims contain some form of fraud,

resulting in approximately 10% of insurance payout dollars. Fraud can range from exaggerated losses to deliberately

causing an accident for the payout. With all the different methods of fraud, finding it becomes a problem.

While the primary responsibility for fraud prevention and detection remains with the board and management of any

organisation, the auditors can be a significant part of the organization’s anti-fraud team. In a 2003 Fraud

published by KPMG, an international accounting and consulting firm, it was found that “almost two thirds of

organizations surveyed reported discovery of fraud”. The results of this and similar studies suggest that while an

sn’t prevent misappropriation of assets or misrepresentation of financial statements from

happening, it does increase the probability of detecting fraud, thus resulting in smaller losses (KPMG, 2004)

prevention and detection are related but not the same concepts. Prevention encompasses policies, procedures, training,

and communication that stop fraud from occurring, whereas, detection focuses on activities and techniques that

promptly recognize timely whether fraud has occurred or is occurring. While prevention techniques do not ensure that

fraud will not be committed, they are the first line of defence in minimising fraud risks. Meanwhile, one of the

strongest fraud deterrents is the awareness that effective detective controls are in place. Combined

controls, detective controls enhance the effectiveness of a fraud risk management program by demonstrating that

preventive controls are working as intended and by identifying fraud if it does occur. Although detective controls may

vidence that fraud has occurred or is occurring, they are not intended to prevent fraud. Every organization is

, thus it is important that organizations consider both fraud prevention and fraud detection (ACFE,

STUDY

: CAATs have no role to play in the detection of fraud in an organization.

This research work is on the role of computer aided audit technique in the detection of fraud in an organization using

KPMG, Lagos, Nigeria, which is an independent legal entity and is a member of KPMG International Co

Swiss entity. KPMG Nigeria is an industry which provides services which include include Audit, Tax, and Advisory

services. KPMG was established in Nigeria in the year 1978. It has 23 partners, over 700 professionals and 5 office

locations. It provides multidisciplinary professional services to both local and international organizations within the

Nigeria business community. KPMG professionals are committed to delivering reliable, ind

in fulfilling this there has to be vigilance in making sure audit complies with changing regulations and the professional

www.iiste.org

CAATs are important tools for the auditor in gathering information from the organizational environment. They are

of computer and computer programs. It consists primarily of test data packs

and computer programs. CAATs are computer tools that extract and analyze data from computer applications (Braun

opulation rather than a sample, thereby increasing

the reliability of conclusions based on that test (AICPA, 2001). Recent audit standards encourage auditors to adopt

Fraud detection is a topic applicable to many industries including banking and financial sectors, insurance, government

agencies and law enforcement, and more. Fraud attempts have seen a drastic increase in recent years, making fraud

nt than ever. Despite efforts on the part of the affected institutions, hundreds of millions of

money are lost to fraud every year in different countries. In banking, fraud can involve using stolen credit cards,

ces, etc. In insurance, 25% of claims contain some form of fraud,

resulting in approximately 10% of insurance payout dollars. Fraud can range from exaggerated losses to deliberately

d, finding it becomes a problem.

While the primary responsibility for fraud prevention and detection remains with the board and management of any

fraud team. In a 2003 Fraud Survey

published by KPMG, an international accounting and consulting firm, it was found that “almost two thirds of

organizations surveyed reported discovery of fraud”. The results of this and similar studies suggest that while an

sn’t prevent misappropriation of assets or misrepresentation of financial statements from

happening, it does increase the probability of detecting fraud, thus resulting in smaller losses (KPMG, 2004). Fraud

concepts. Prevention encompasses policies, procedures, training,

and communication that stop fraud from occurring, whereas, detection focuses on activities and techniques that

prevention techniques do not ensure that

fraud will not be committed, they are the first line of defence in minimising fraud risks. Meanwhile, one of the

strongest fraud deterrents is the awareness that effective detective controls are in place. Combined with preventive

controls, detective controls enhance the effectiveness of a fraud risk management program by demonstrating that

preventive controls are working as intended and by identifying fraud if it does occur. Although detective controls may

vidence that fraud has occurred or is occurring, they are not intended to prevent fraud. Every organization is

, thus it is important that organizations consider both fraud prevention and fraud detection (ACFE,

This research work is on the role of computer aided audit technique in the detection of fraud in an organization using

pendent legal entity and is a member of KPMG International Co-operative, a

Swiss entity. KPMG Nigeria is an industry which provides services which include include Audit, Tax, and Advisory

3 partners, over 700 professionals and 5 office

locations. It provides multidisciplinary professional services to both local and international organizations within the

Nigeria business community. KPMG professionals are committed to delivering reliable, independent audit reports and

in fulfilling this there has to be vigilance in making sure audit complies with changing regulations and the professional

Page 5: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

4.1 Data Collection

Data collection was accomplished using primary

questionnaire was distributed to 250 randomly selected staff of KPMG Nigeria ranging from both junior and senior

staff in the audit department. The variables of this study are CAATs and fraud. CAATs

software program to capture entire audit process such as scheduling, planning, review, committee reporting, and report

generation while fraud will be measured using the existence of duplicate transactions, missing transaction

negative entries in inventory received fields, voided transactions, etc.

4.2 Data Analysis Techniques

Data for this study was analyzed using descriptive statistics of frequency tables and simple percentages of the SPSS

statistical package. Regression analysis was used to measure the relationship between the dependent and independent

variables, and also to analyze the hypothesis of the study. In order to test the significance of the relationship between

the dependent and independent variables o

and regression analysis, in which the Coefficient of Determinant (R

5. DATA PRESENTATION AND INTERPRETATION

Out of the 250 questionnaires that were distributed for this research, 200 were retrieved back, giving a percentage of

66.7% return. Hence, the analysis will be based on the 200 retrieved questionnaires.

A. Ages, Qualification and Experience of Respondent

The table below shows that majority of the respondents are youths and a dynamic work force, who are well learned

and fit to put in opinion on the role of computer aided audit technique in fraud detection.

the respondents are well grounded in the process of auditing and hence, a reasonable result can be established from the

responses based on their experience on the job.

B. CAATs’ Adoption, Fraud Detection and Employees’ Performance

From Table 2, it could be seen that most of

the responses gathered, management’s reaction to the adoption of CAATs was positive. Thus, there would be a great

advancement in record keeping and recording of various transaction

fraudster due to record keeping which will aid tracing of various transactions which is a large contrast to tradition or

manual audit. Furthermore, a large percentage of the respondents believed that CA

manage fraud thus reducing its occurrence in organizations

credible. This implies that computer aided audit technique is a step worth taking in fighting fraud. This shows

advancement from the crude and traditional way of auditing.

the adoption of CAATs is positive. It is evident that majority of the respondents claimed that there is large economies

of scale in the adoption of CAATs. It was also affirmed that the validity of the truth and fairness of financial statement

could be established through the use

the high side before the introduction o

organizations. Respondents opined that auditors could use CAATs to help detect material misstatements in the

financial statements, particularly in substantive tests of details of tran

general audit objectives of validity, completeness, ownership, valuation, accuracy, classification and disclosure of the

data produced by the accounting system to support financial assertions. Respondents also o

audit techniques had positive effects on organization in terms of employee performance.

reduced their audit risks as compared to traditional audit and the effects of litigation from different organizations

drastically reduced. It was further confirmed that CAATs brought a promising future to organizations in terms of the

validity and fairness of record keeping. The respondents also believe that it could be used to place reliance on the

internal control system as compared to others method so auditing. Therefore, with CAATs, auditors could perform

Research Journal of Finance and Accounting

2847 (Online)

71

Data collection was accomplished using primary sources through the administration of questionnaire. The

questionnaire was distributed to 250 randomly selected staff of KPMG Nigeria ranging from both junior and senior

staff in the audit department. The variables of this study are CAATs and fraud. CAATs will be measured using eAudit

software program to capture entire audit process such as scheduling, planning, review, committee reporting, and report

generation while fraud will be measured using the existence of duplicate transactions, missing transaction

negative entries in inventory received fields, voided transactions, etc.

Data for this study was analyzed using descriptive statistics of frequency tables and simple percentages of the SPSS

gression analysis was used to measure the relationship between the dependent and independent

variables, and also to analyze the hypothesis of the study. In order to test the significance of the relationship between

the dependent and independent variables of this study, the study was subjected to the Student t

and regression analysis, in which the Coefficient of Determinant (R2) and P-value were determined.

DATA PRESENTATION AND INTERPRETATION

Out of the 250 questionnaires that were distributed for this research, 200 were retrieved back, giving a percentage of

66.7% return. Hence, the analysis will be based on the 200 retrieved questionnaires.

Ages, Qualification and Experience of Respondents

The table below shows that majority of the respondents are youths and a dynamic work force, who are well learned

and fit to put in opinion on the role of computer aided audit technique in fraud detection. This table also indicates that

e well grounded in the process of auditing and hence, a reasonable result can be established from the

responses based on their experience on the job.

CAATs’ Adoption, Fraud Detection and Employees’ Performance

From Table 2, it could be seen that most of the respondents believed that fraud was a major concern for business.

the responses gathered, management’s reaction to the adoption of CAATs was positive. Thus, there would be a great

advancement in record keeping and recording of various transactions and this will in turn reduce malicious practices of

fraudster due to record keeping which will aid tracing of various transactions which is a large contrast to tradition or

Furthermore, a large percentage of the respondents believed that CAATs could be used to check

occurrence in organizations. The respondents also agreed

credible. This implies that computer aided audit technique is a step worth taking in fighting fraud. This shows

dvancement from the crude and traditional way of auditing. Due to the responses gathered, it could be implied that

It is evident that majority of the respondents claimed that there is large economies

It was also affirmed that the validity of the truth and fairness of financial statement

of computer audit. Respondents agreed that fraud had been in existence and on

the high side before the introduction of CAATs and that CAATs have been used to curb the occurrence of fraud in

organizations. Respondents opined that auditors could use CAATs to help detect material misstatements in the

financial statements, particularly in substantive tests of details of transactions and balances as part of meeting the

general audit objectives of validity, completeness, ownership, valuation, accuracy, classification and disclosure of the

data produced by the accounting system to support financial assertions. Respondents also o

audit techniques had positive effects on organization in terms of employee performance. They affirmed that CAATs

reduced their audit risks as compared to traditional audit and the effects of litigation from different organizations

drastically reduced. It was further confirmed that CAATs brought a promising future to organizations in terms of the

validity and fairness of record keeping. The respondents also believe that it could be used to place reliance on the

system as compared to others method so auditing. Therefore, with CAATs, auditors could perform

www.iiste.org

sources through the administration of questionnaire. The

questionnaire was distributed to 250 randomly selected staff of KPMG Nigeria ranging from both junior and senior

will be measured using eAudit

software program to capture entire audit process such as scheduling, planning, review, committee reporting, and report

generation while fraud will be measured using the existence of duplicate transactions, missing transactions, anomalies,

Data for this study was analyzed using descriptive statistics of frequency tables and simple percentages of the SPSS

gression analysis was used to measure the relationship between the dependent and independent

variables, and also to analyze the hypothesis of the study. In order to test the significance of the relationship between

f this study, the study was subjected to the Student t-test, Standard error test,

value were determined.

Out of the 250 questionnaires that were distributed for this research, 200 were retrieved back, giving a percentage of

The table below shows that majority of the respondents are youths and a dynamic work force, who are well learned

This table also indicates that

e well grounded in the process of auditing and hence, a reasonable result can be established from the

the respondents believed that fraud was a major concern for business. From

the responses gathered, management’s reaction to the adoption of CAATs was positive. Thus, there would be a great

s and this will in turn reduce malicious practices of

fraudster due to record keeping which will aid tracing of various transactions which is a large contrast to tradition or

ATs could be used to check and

. The respondents also agreed that computer audit was

credible. This implies that computer aided audit technique is a step worth taking in fighting fraud. This shows

Due to the responses gathered, it could be implied that

It is evident that majority of the respondents claimed that there is large economies

It was also affirmed that the validity of the truth and fairness of financial statement

Respondents agreed that fraud had been in existence and on

f CAATs and that CAATs have been used to curb the occurrence of fraud in

organizations. Respondents opined that auditors could use CAATs to help detect material misstatements in the

sactions and balances as part of meeting the

general audit objectives of validity, completeness, ownership, valuation, accuracy, classification and disclosure of the

data produced by the accounting system to support financial assertions. Respondents also opined that computer aided

They affirmed that CAATs

reduced their audit risks as compared to traditional audit and the effects of litigation from different organizations were

drastically reduced. It was further confirmed that CAATs brought a promising future to organizations in terms of the

validity and fairness of record keeping. The respondents also believe that it could be used to place reliance on the

system as compared to others method so auditing. Therefore, with CAATs, auditors could perform

Page 6: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

substantive tests within a shorter time frame resulting in overall efficiency, yet not compromising on the quality of

audit efforts.

Table 1: Distribution of Respondents by Age, Qualification, and Experience on the Job

Ages of Respondents 21-30 years

31-40 years

41-50 years

51-60 years

Above 60 years

Qualification NCE/OND

B.Sc./HND

PhD/M.Sc.

Others

Experience on the Job Less than a year

1 – 5 years

6 – 10 years

11 – 15 years

16 and above

Research Journal of Finance and Accounting

2847 (Online)

72

substantive tests within a shorter time frame resulting in overall efficiency, yet not compromising on the quality of

espondents by Age, Qualification, and Experience on the Job

Frequency Percentage

(%)

30 years 85 42.5

40 years 82 41.0

50 years 32 16

60 years 1 0.5

Above 60 years 0 0

NCE/OND 30 15.0

B.Sc./HND 111 55.5

PhD/M.Sc. 54 27.0

Others 5 2.5

Less than a year 45 22.5

5 years 98 49.0

10 years 38 19.0

15 years 18 9.0

16 and above 1 0.5

www.iiste.org

substantive tests within a shorter time frame resulting in overall efficiency, yet not compromising on the quality of

espondents by Age, Qualification, and Experience on the Job

Total

200

200

200

Page 7: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

Table 2: Adoption of CAATs, Fraud Detection and Employees’ Performance

Description of Variable Items

Fraud is a major concern for business

Management has a positive attitude to

CAATs adoption

CAATs can be meaningfully used to check

fraud occurrences

Computer audit is credible than traditional

audit

Fraud is highly prevalent before the

introduction of CAATs

CAATs has played an improved role in

fraud detection

CAATs has improved employees’

performance

C. Types of Fraud Encountered during Financial Transactions

From Table 3, different respondents selected more than one option. However, top on the list of fraud in financial

transactions are falsification of records, diversification of securities,

terminated employees continuing to be paid.

Research Journal of Finance and Accounting

2847 (Online)

73

Adoption of CAATs, Fraud Detection and Employees’ Performance

Strongly

Agree

(%)

Agree

(%)

Undecided

(%)

Disagree

52.5 36.5 6.0

positive attitude to 38.5 46.0 1.5

CAATs can be meaningfully used to check 23.0 59.0 5.5

Computer audit is credible than traditional 35.5 44.0 17.0

50.0 40.5 0.5

CAATs has played an improved role in 28.5 44.0 6.5

20.0 35.5 22.0

Types of Fraud Encountered during Financial Transactions

From Table 3, different respondents selected more than one option. However, top on the list of fraud in financial

falsification of records, diversification of securities, duplicating invoice numbers/dates, and

ng to be paid.

www.iiste.org

Disagree

(%)

Strongly

Disagree

(%)

5.0 0.0

11.0 3.0

7.5 5.0

1.0 2.5

5.5 3.5

11.0 9.5

11.0 7.0

From Table 3, different respondents selected more than one option. However, top on the list of fraud in financial

duplicating invoice numbers/dates, and

Page 8: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

Table 3: Types of Fraud in Financial Transactions

Variables

Falsification of records

Diversification of securities

Duplicating invoice numbers/dates

Terminated employees continuing to

Producing reports of debit balances

Pay date precedes employment date

Money laundering

Theft of cash receipts

Falsification of employees size

Misuse of cash funds

Unrecorded or understated sales or receivables

Internet fraud

Disbursement to false vendor

Theft of inventory

D. Problems Encountered in the Adoption of CAATs

From Table 4, it is seen that majority of the respondent see the cost, competency in using software, and technical

expertise of the system database as problems that will reduce the adoption of CAATs in organizations. Respondents

claim that potentially expensive maintenance contracts are needed to make CAATs work efficiently. This is also

supported by Coderre (1999). Moreover,

integrate; the more integrated the system, the better the use of C

It is believed that CAATs are too technical and complex for non

in accordance with the findings of Coderre (1999).

be relied on, so the auditor would have to assess the reliability first before adopting CAATs. Furthermore, respondents

claim that clients are afraid that their systems and data will be compromised with the use of CAATs (1

strictly as a result of lack of trust on the part of the clients with their external auditors.

problem of cost in the adoption of CAATs, the respondents opined that a cost

of view should be carried out prior to deciding to use the audit software. Majority of the respondents (92.0%) however

do not support the fact that lack of suitable computer facilities is a major problem to the adoption of CAATs.

Research Journal of Finance and Accounting

2847 (Online)

74

Table 3: Types of Fraud in Financial Transactions

Percentage (%)

96.7

Diversification of securities 87.1

Duplicating invoice numbers/dates 84.3

Terminated employees continuing to be paid 82.1

Producing reports of debit balances 74.5

Pay date precedes employment date 67.3

57.5

55.7

Falsification of employees size 55.2

45.8

Unrecorded or understated sales or receivables 34.3

32.7

Disbursement to false vendor 12.4

11.6

Problems Encountered in the Adoption of CAATs

From Table 4, it is seen that majority of the respondent see the cost, competency in using software, and technical

expertise of the system database as problems that will reduce the adoption of CAATs in organizations. Respondents

nsive maintenance contracts are needed to make CAATs work efficiently. This is also

Moreover, CAATs will be limited depending on how well the computer system is

integrate; the more integrated the system, the better the use of CAATs. Another problem is lack

It is believed that CAATs are too technical and complex for non-IT auditors, even if training is provided. This is also

in accordance with the findings of Coderre (1999). CAATs are only useful methods of auditing only if the system can

be relied on, so the auditor would have to assess the reliability first before adopting CAATs. Furthermore, respondents

clients are afraid that their systems and data will be compromised with the use of CAATs (1

strictly as a result of lack of trust on the part of the clients with their external auditors.

problem of cost in the adoption of CAATs, the respondents opined that a cost-benefit analysis from the audit point

ew should be carried out prior to deciding to use the audit software. Majority of the respondents (92.0%) however

lack of suitable computer facilities is a major problem to the adoption of CAATs.

www.iiste.org

Rank

1st

2nd

3rd

4th

5th

6th

7th

8th

9th

10th

11th

12th

13th

14th

From Table 4, it is seen that majority of the respondent see the cost, competency in using software, and technical

expertise of the system database as problems that will reduce the adoption of CAATs in organizations. Respondents

nsive maintenance contracts are needed to make CAATs work efficiently. This is also

CAATs will be limited depending on how well the computer system is

AATs. Another problem is lack of technical expertise.

IT auditors, even if training is provided. This is also

f auditing only if the system can

be relied on, so the auditor would have to assess the reliability first before adopting CAATs. Furthermore, respondents

clients are afraid that their systems and data will be compromised with the use of CAATs (100.0%). This is

strictly as a result of lack of trust on the part of the clients with their external auditors. In other to overcome the

benefit analysis from the audit point

ew should be carried out prior to deciding to use the audit software. Majority of the respondents (92.0%) however

lack of suitable computer facilities is a major problem to the adoption of CAATs.

Page 9: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

Table 4: Respondents’ view on the problems encountered in the adoption of CAATs

Variables

Str

on

gly

Agre

e

Cost 102

Software Competency 34

Technical Expertise 45

Lack of suitable

Computer Facilities

4

Clients are afraid that their

systems and data will be

compromised with the use

of CAATs

151

6. In order to test the hypothesis, an econometric model showing the relationship between the fraud prevalence

(FRAUD) and Computer Aided Audit Technique (CAAT) was adopted and it was stated thus;

FRAUD = f (CAAT) [Functional Relationship]

FRAUD = b0 + b1CAAT + U

Where FRAUD = Fraud detection and CAAT = Computer Aided Audit Technique

The expectation concerning the sign of the coefficients is: b

Research Journal of Finance and Accounting

2847 (Online)

75

the problems encountered in the adoption of CAATs

Agre

e

Undec

ided

Dis

agre

e

Str

on

gly

Dis

agre

e PERCENTAGES (%)

61 5 29 Nil 51.0 30.5 0.25

112 19 20 13 17.0 56.0 09.5

98 38 18 1 22.5 49.0 19.0

12 Nil 45 139 2.0 6.0 Nil

49 Nil Nil Nil 75.5 24.5 Nil

order to test the hypothesis, an econometric model showing the relationship between the fraud prevalence

(FRAUD) and Computer Aided Audit Technique (CAAT) was adopted and it was stated thus;

FRAUD = f (CAAT) [Functional Relationship]

Where FRAUD = Fraud detection and CAAT = Computer Aided Audit Technique

The expectation concerning the sign of the coefficients is: b0 > 0 and b1 > 0.

www.iiste.org

PERCENTAGES (%)

0.25 14.5 Nil

09.5 10.0 6.5

19.0 9.0 0.5

Nil 22.5 69.5

Nil Nil Nil

order to test the hypothesis, an econometric model showing the relationship between the fraud prevalence

(FRAUD) and Computer Aided Audit Technique (CAAT) was adopted and it was stated thus;

Page 10: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

6.1 Result

Variable

C (Constant)

Effect of CAATs on fraud detection

R-squared

R-value

Sum squared residual

Sum squared regression

F-statistic

Probability (F-statistic)

From the regression analysis, the R-squared shows the extent to which the independent variable explains the variation

in the dependent variable, while the R

that there is a strong positive relationship

that computer aided audit technique explains exactly 65.7% of the variation of fraud. Thus, CAATs have a significant

role to play in fraud detection in organizations. The Student t

the standard error and was used to test the significance of the parameter estimates. According to the results, b

1.96.From this result, we can therefore conclude that T

alternative hypothesis (H1), that is, computer aided audit techniques have a role to play in the detection of fraud in

organizations. Furthermore, the p-value is 0.000 and the standard p

research leaving 5% for uncertainty. Since the p

alternative hypothesis and conclude that there is a significant relationship between CAATs and Fraud. More

Standard Error Test states that for an estimate to be statistically meaningful, the standard error (S.E.) of its coefficient

must be less than half the value of the coefficient, (i.e. S.E. b

while b/2 = 0.335. We therefore accept the Alternative hypothesis (H

buttress on the primary data obtained, it can be depicted from the analysis that information technology is now a way

of life and for organizations to operate well in this computer age and reduce the existence of fraud, computer aided

audit techniques enables auditors or investigators an on the spot overview of business operations, gain in

understanding of the relationship among vario

therefore computer aided audit techniques do have significant roles to play in fraud detection.

6.2 Summary of Findings

In the analysis above we can extract that in auditing, an auditor

shareholders and customers must have an important use of computers to carry out such audit work in other to achieve

speed, accuracy, credibility and reliability of every information which aids management and

making relating to financial policies. From the result of the data collected and analyzed, the standard error was S.E =

(0.090), (0.035) of which the decision rule was if SE (b) < b/2 Accept H

= 0.035 and B2/2 = 0.670/2 = 0.335 which gave the value of 0.035 < 0.335, so H

Research Journal of Finance and Accounting

2847 (Online)

76

Coefficient Standard Error t-Statistics

0.106 0.090 1.176

0.670 0.035 19.375

0.657

0.811

58.513

112.073

375.406

0.000

squared shows the extent to which the independent variable explains the variation

in the dependent variable, while the R-value shows the correlation value. The above R-value is 0.811which implies

that there is a strong positive relationship between fraud detection and CAATs. More so, the R

that computer aided audit technique explains exactly 65.7% of the variation of fraud. Thus, CAATs have a significant

role to play in fraud detection in organizations. The Student t-test, which is at 5% level of significance, is equivalent to

the standard error and was used to test the significance of the parameter estimates. According to the results, b

1.96.From this result, we can therefore conclude that Tcalculated > T tabulated, which leads to the acceptance of the

), that is, computer aided audit techniques have a role to play in the detection of fraud in

value is 0.000 and the standard p-value is 0.05 which indicates 95% assurance of the

research leaving 5% for uncertainty. Since the p-value is less than 0.05, we reject the null hypothesis and accept the

alternative hypothesis and conclude that there is a significant relationship between CAATs and Fraud. More

states that for an estimate to be statistically meaningful, the standard error (S.E.) of its coefficient

must be less than half the value of the coefficient, (i.e. S.E. b2 < b2/2). From the regression result, S.E.(b

while b/2 = 0.335. We therefore accept the Alternative hypothesis (H1) and reject the Null Hypothesis (H

buttress on the primary data obtained, it can be depicted from the analysis that information technology is now a way

anizations to operate well in this computer age and reduce the existence of fraud, computer aided

audit techniques enables auditors or investigators an on the spot overview of business operations, gain in

understanding of the relationship among various data elements and easily drill down to specific areas of interest;

therefore computer aided audit techniques do have significant roles to play in fraud detection.

In the analysis above we can extract that in auditing, an auditor presenting reliable audited financial reports to

shareholders and customers must have an important use of computers to carry out such audit work in other to achieve

speed, accuracy, credibility and reliability of every information which aids management and

making relating to financial policies. From the result of the data collected and analyzed, the standard error was S.E =

(0.090), (0.035) of which the decision rule was if SE (b) < b/2 Accept H1 and if SE (b) > b/2 Accept H

/2 = 0.670/2 = 0.335 which gave the value of 0.035 < 0.335, so H1. was accepted. The t

www.iiste.org

Statistics Probability

0.241

0.000

squared shows the extent to which the independent variable explains the variation

value is 0.811which implies

between fraud detection and CAATs. More so, the R-squared value explains

that computer aided audit technique explains exactly 65.7% of the variation of fraud. Thus, CAATs have a significant

est, which is at 5% level of significance, is equivalent to

the standard error and was used to test the significance of the parameter estimates. According to the results, b1: 19.375 >

, which leads to the acceptance of the

), that is, computer aided audit techniques have a role to play in the detection of fraud in

indicates 95% assurance of the

value is less than 0.05, we reject the null hypothesis and accept the

alternative hypothesis and conclude that there is a significant relationship between CAATs and Fraud. Moreover, the

states that for an estimate to be statistically meaningful, the standard error (S.E.) of its coefficient

2). From the regression result, S.E.(b2) = 0.035

) and reject the Null Hypothesis (H0). To further

buttress on the primary data obtained, it can be depicted from the analysis that information technology is now a way

anizations to operate well in this computer age and reduce the existence of fraud, computer aided

audit techniques enables auditors or investigators an on the spot overview of business operations, gain in-depth

us data elements and easily drill down to specific areas of interest;

therefore computer aided audit techniques do have significant roles to play in fraud detection.

presenting reliable audited financial reports to

shareholders and customers must have an important use of computers to carry out such audit work in other to achieve

speed, accuracy, credibility and reliability of every information which aids management and auditors in quick decision

making relating to financial policies. From the result of the data collected and analyzed, the standard error was S.E =

and if SE (b) > b/2 Accept H0 . The SE for b2

was accepted. The t-test was (1.176),

Page 11: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

(19.375); Tcalculated: b1 = 19.375 and Ttabulated

is 0.05, the null hypothesis was rejected. The use of computer aided audit techniques can thus be seen as very effective

in the detection of fraud in organizations from the result obtained through the tests. The coefficient of determinant R

showed a positive significant relationship of 65.7%. This implies that the changes in fraud are explained by the

introduction of the use of computer aided audit techniques (CAAT) and the remaining variation of 34.3% would be

explained by other factors which have effect

7. CONCLUSION

The findings of the study showed that 72.8% of the respondents agreed that CAATs have played a major role in fraud

detection, and hence can be used to curb fraud to a minimal level in organisations. This result is support

(2011), who carried out a research on how CAATs can be used to detect fraud in journal entries and other areas of

auditing which included the review of unusual transactions, payroll cycle, and procurement cycle. He concluded that

CAATs could be used to address the risk of fraud in all these areas and also detect potentially fraudulent activities. It

was also discovered that CAAT helped to improve the auditors’ performance as corroborated by 58.1% of the

respondents. This impact of CAATs on emplo

conducted on detecting fraud using data analysis techniques. He summarized that CAATs increased personal

performance and productivity of auditors by increasing the efficiency of audit processes

professionals. However, quiet a handful of respondents (23.0%) were undecided in this respect as they claimed that the

improved performance has been associated with much stress and pressure. This could however be explained by

that much is expected from employees to whom better technological facilities are provided for. Furthermore, the cost

of implementing CAAT, the required skills to be acquired for its usage, and systems database requirements, are some

of the problems found to be associated with the introduction and application of CAAT to organisations. Moreover, top

on the list of fraud in financial transactions are

numbers/dates, and terminated employees continuing to be paid. It is therefore concluded that the adoption of

computer aided audit techniques in the preparation and presentation of financial transaction and reports has enhanced

the quality of financial reports. This conclusion is

information and computer technique solutions, matched with intelligence, untiring crime detection and prevention, will

undoubtedly make any organization a pride of all. In a bid for organizat

thus recommended that the use of computer aided audit techniques be encouraged in the preparation of financial

reports. The limitation offered in this study is that this research is restricted to one big

proficient in auditing processes. Future studies are thus encouraged to sample a number of related organizations or

smaller firms, for comprehensive and robust outcomes, in order to identify the prospects and challenges of CAATs

fraud detection, and to determine if the conclusions could be generalized or only limited to some specific software

packages.

REFERENCES

Adeniji, A. (2004) “Auditing and Investigation”, Value Analysis Publishers, Lagos, Nigeria.

AICPA (2001) Web TrustTM Programme

Public Accountant/Canadian Institute of Chartered Accountants, http:// www.aicpa.org, http://www.cica.org

AICPA, (2006) Consideration of Fraud in a Financial Stateme

Examiners, ACFE (2006) Report to the Nation on Occupational Fraud and Abuse, http://www.acfe. com/resources

/publications.asp?copy=rttn, Accessed on 20/08/2011

Albrecht C. C., Albrecht W. S., and. Dunn J

Evidence, Journal of Forensic Accounting, Vol. 2 (1), pp. 1

Albrecht, W. S., Albrecht C. C., and Albrecht C. O. (2004) Fraud and Corporate Executives: Agency, Stewardship and

Broken Trust, Journal of Forensic Accounting, Vol. 5 (1), pp. 109

Albrecht C. C. (2008) Fraud and Forensic Accounting In a Digital Environment, Brigham Young University.

Research Journal of Finance and Accounting

2847 (Online)

77

tabulated = 1.96, so H1. was accepted. The p-value=0.000 and since the standard one

is 0.05, the null hypothesis was rejected. The use of computer aided audit techniques can thus be seen as very effective

in the detection of fraud in organizations from the result obtained through the tests. The coefficient of determinant R

tive significant relationship of 65.7%. This implies that the changes in fraud are explained by the

introduction of the use of computer aided audit techniques (CAAT) and the remaining variation of 34.3% would be

explained by other factors which have effect on fraud detection.

The findings of the study showed that 72.8% of the respondents agreed that CAATs have played a major role in fraud

detection, and hence can be used to curb fraud to a minimal level in organisations. This result is support

(2011), who carried out a research on how CAATs can be used to detect fraud in journal entries and other areas of

auditing which included the review of unusual transactions, payroll cycle, and procurement cycle. He concluded that

used to address the risk of fraud in all these areas and also detect potentially fraudulent activities. It

was also discovered that CAAT helped to improve the auditors’ performance as corroborated by 58.1% of the

respondents. This impact of CAATs on employees’ performance was supported by Setty (2008) in a study he

conducted on detecting fraud using data analysis techniques. He summarized that CAATs increased personal

performance and productivity of auditors by increasing the efficiency of audit processes and the market value of audit

However, quiet a handful of respondents (23.0%) were undecided in this respect as they claimed that the

improved performance has been associated with much stress and pressure. This could however be explained by

that much is expected from employees to whom better technological facilities are provided for. Furthermore, the cost

of implementing CAAT, the required skills to be acquired for its usage, and systems database requirements, are some

s found to be associated with the introduction and application of CAAT to organisations. Moreover, top

on the list of fraud in financial transactions are falsification of records, diversification of securities,

ated employees continuing to be paid. It is therefore concluded that the adoption of

computer aided audit techniques in the preparation and presentation of financial transaction and reports has enhanced

the quality of financial reports. This conclusion is also supported by Lanza (2007) and Kelly (2010)

information and computer technique solutions, matched with intelligence, untiring crime detection and prevention, will

undoubtedly make any organization a pride of all. In a bid for organizations to operate in a fraud free environment, it is

thus recommended that the use of computer aided audit techniques be encouraged in the preparation of financial

reports. The limitation offered in this study is that this research is restricted to one big organization, which is very

proficient in auditing processes. Future studies are thus encouraged to sample a number of related organizations or

smaller firms, for comprehensive and robust outcomes, in order to identify the prospects and challenges of CAATs

fraud detection, and to determine if the conclusions could be generalized or only limited to some specific software

Adeniji, A. (2004) “Auditing and Investigation”, Value Analysis Publishers, Lagos, Nigeria.

TM Programme-Security Principle and Criteria-Version 3.0, American Institute of Certified

Public Accountant/Canadian Institute of Chartered Accountants, http:// www.aicpa.org, http://www.cica.org

AICPA, (2006) Consideration of Fraud in a Financial Statement Audit 169, AICPA. Association of Certified Fraud

Examiners, ACFE (2006) Report to the Nation on Occupational Fraud and Abuse, http://www.acfe. com/resources

/publications.asp?copy=rttn, Accessed on 20/08/2011

Albrecht C. C., Albrecht W. S., and. Dunn J. G. (2001) Can Auditors Detect Fraud: A Review of the Research

Evidence, Journal of Forensic Accounting, Vol. 2 (1), pp. 1-12.

Albrecht, W. S., Albrecht C. C., and Albrecht C. O. (2004) Fraud and Corporate Executives: Agency, Stewardship and

, Journal of Forensic Accounting, Vol. 5 (1), pp. 109-124.

Albrecht C. C. (2008) Fraud and Forensic Accounting In a Digital Environment, Brigham Young University.

www.iiste.org

value=0.000 and since the standard one

is 0.05, the null hypothesis was rejected. The use of computer aided audit techniques can thus be seen as very effective

in the detection of fraud in organizations from the result obtained through the tests. The coefficient of determinant R2

tive significant relationship of 65.7%. This implies that the changes in fraud are explained by the

introduction of the use of computer aided audit techniques (CAAT) and the remaining variation of 34.3% would be

The findings of the study showed that 72.8% of the respondents agreed that CAATs have played a major role in fraud

detection, and hence can be used to curb fraud to a minimal level in organisations. This result is supported by Mehra

(2011), who carried out a research on how CAATs can be used to detect fraud in journal entries and other areas of

auditing which included the review of unusual transactions, payroll cycle, and procurement cycle. He concluded that

used to address the risk of fraud in all these areas and also detect potentially fraudulent activities. It

was also discovered that CAAT helped to improve the auditors’ performance as corroborated by 58.1% of the

Setty (2008) in a study he

conducted on detecting fraud using data analysis techniques. He summarized that CAATs increased personal

and the market value of audit

However, quiet a handful of respondents (23.0%) were undecided in this respect as they claimed that the

improved performance has been associated with much stress and pressure. This could however be explained by the fact

that much is expected from employees to whom better technological facilities are provided for. Furthermore, the cost

of implementing CAAT, the required skills to be acquired for its usage, and systems database requirements, are some

s found to be associated with the introduction and application of CAAT to organisations. Moreover, top

falsification of records, diversification of securities, duplicating invoice

ated employees continuing to be paid. It is therefore concluded that the adoption of

computer aided audit techniques in the preparation and presentation of financial transaction and reports has enhanced

Kelly (2010). Thus, the right

information and computer technique solutions, matched with intelligence, untiring crime detection and prevention, will

ions to operate in a fraud free environment, it is

thus recommended that the use of computer aided audit techniques be encouraged in the preparation of financial

organization, which is very

proficient in auditing processes. Future studies are thus encouraged to sample a number of related organizations or

smaller firms, for comprehensive and robust outcomes, in order to identify the prospects and challenges of CAATs in

fraud detection, and to determine if the conclusions could be generalized or only limited to some specific software

Adeniji, A. (2004) “Auditing and Investigation”, Value Analysis Publishers, Lagos, Nigeria.

Version 3.0, American Institute of Certified

Public Accountant/Canadian Institute of Chartered Accountants, http:// www.aicpa.org, http://www.cica.org

nt Audit 169, AICPA. Association of Certified Fraud

Examiners, ACFE (2006) Report to the Nation on Occupational Fraud and Abuse, http://www.acfe. com/resources

. G. (2001) Can Auditors Detect Fraud: A Review of the Research

Albrecht, W. S., Albrecht C. C., and Albrecht C. O. (2004) Fraud and Corporate Executives: Agency, Stewardship and

Albrecht C. C. (2008) Fraud and Forensic Accounting In a Digital Environment, Brigham Young University.

Page 12: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

Boritz J. E. (2003) “Computer Control and Audit Guide”, 12th ed. Waterloo: University of Wa

Brink V.Z. and Witt, H. (1982) “Internal Auditing”, New York, John Wiley & Sons.

Braun R. L. and Davis H. E. (2003) Computer

Managerial Auditing Journal, Vol. 18 (9), pp.725

Curtis M. B., Jenkins J. G., Bedard J. C. and Deis D. R. (2009) Auditors’ Training and Proficiency in Information

Systems: A Research Synthesis, Journal of Information Systems, Vol. 23, No. 1, pp. 79

Curtis, M. B. and E. A. Payne (2008) An Examination

Technology Implementation Decisions in Auditing, International Journal of Accounting Information Systems, 9(2), pp.

104-121.

Davia, H.R. (2001) “Fraud 101: Techniques and Strategies for Detect

Debreceny R., Lee S. L., Neo W., and Shuling J. T. (2004) Employing Generalized Audit Software in the Financial

Services Sector: Challenges and Opportunities,

http://raw.rutgers.edu/docs/wcars/8wcars/contassurronaldj

IAASB (2003) International Auditing Practice Statement 1006 Audits of the Financial Statements of Banks in

Handbook of International Auditing, Assurance, and Ethics Pronouncements, edited by IAASB. 663

International Auditing and Assurance Standards Board, International Federation of Accountants.

IIA (2003), Internal Audit Automation Survey, The Institute of Internal Auditor UK and Ireland, London.

ISACA (1998) Use of Computer Assisted Audit Techni

Association, Rolling Meadows, IL.

Keller & Owens, LLC, Certified Public Accountants. Preventing and Detecting Fraud in Not

Kelly J. (2010) CAAT Software Powers Fraud Detection Anal

KPMG (2004) Fraud Risk Management: Developing a Strategy for Prevention, Detection, and Response, KPMG

Professional Service, Capability Statement, www.ngkpmg.com, Accessed on 18/8/2011

Lanza R. B. (2007) Using technology to mit

pp 2-3.

Mahzan N. and Lymer A. (2006) Adoption of Computer Assisted Audit Tools and Techniques (CAATTs) by Internal

Auditors: Current Issues in the UK, Birmingham Business School.

Mansoury A. and Salehi M, (Spring 2009). Firm Size, Audit Regulation and Fraud Detection.

Mehra S. (2011) Computer Assisted Tools and Techniques: Examples of Using CAATs to Detect Fraud in Areas other

than Journal Entries, QuadZero, pp. 1-

Olowokere, K. (2007), Fundamentals of Auditing, Silicon Publishing Company. Revised Edition, 2007. Pg 272

283-284.

Setty K. (2008) Detecting Fraud Using Data Analysis Technique, ISACA, pp. 1

Research Journal of Finance and Accounting

2847 (Online)

78

Boritz J. E. (2003) “Computer Control and Audit Guide”, 12th ed. Waterloo: University of Wa

Brink V.Z. and Witt, H. (1982) “Internal Auditing”, New York, John Wiley & Sons.

Braun R. L. and Davis H. E. (2003) Computer-Assisted Audit Tools and Techniques: Analysis and Perspectives,

Managerial Auditing Journal, Vol. 18 (9), pp.725-731.

rtis M. B., Jenkins J. G., Bedard J. C. and Deis D. R. (2009) Auditors’ Training and Proficiency in Information

Systems: A Research Synthesis, Journal of Information Systems, Vol. 23, No. 1, pp. 79–96.

Curtis, M. B. and E. A. Payne (2008) An Examination of Contextual Factors and Individual Characteristics Affecting

Technology Implementation Decisions in Auditing, International Journal of Accounting Information Systems, 9(2), pp.

Davia, H.R. (2001) “Fraud 101: Techniques and Strategies for Detection” New York, John Wiley & Sons, Inc.

Debreceny R., Lee S. L., Neo W., and Shuling J. T. (2004) Employing Generalized Audit Software in the Financial

Services Sector: Challenges and Opportunities,

http://raw.rutgers.edu/docs/wcars/8wcars/contassurronaldjdaigle_files/DebrecenyCAATSBanks_paper.pdf

IAASB (2003) International Auditing Practice Statement 1006 Audits of the Financial Statements of Banks in

Handbook of International Auditing, Assurance, and Ethics Pronouncements, edited by IAASB. 663

International Auditing and Assurance Standards Board, International Federation of Accountants.

IIA (2003), Internal Audit Automation Survey, The Institute of Internal Auditor UK and Ireland, London.

ISACA (1998) Use of Computer Assisted Audit Techniques (CAATs), Information Systems Audit and Control

Keller & Owens, LLC, Certified Public Accountants. Preventing and Detecting Fraud in Not

Kelly J. (2010) CAAT Software Powers Fraud Detection Analysis, TechTarget, pp. 1-5.

KPMG (2004) Fraud Risk Management: Developing a Strategy for Prevention, Detection, and Response, KPMG

Professional Service, Capability Statement, www.ngkpmg.com, Accessed on 18/8/2011

Lanza R. B. (2007) Using technology to mitigate fraud mal practice claims, The Trusted Professional, Vol. 10, No 1,

Mahzan N. and Lymer A. (2006) Adoption of Computer Assisted Audit Tools and Techniques (CAATTs) by Internal

Auditors: Current Issues in the UK, Birmingham Business School.

Mansoury A. and Salehi M, (Spring 2009). Firm Size, Audit Regulation and Fraud Detection.

Mehra S. (2011) Computer Assisted Tools and Techniques: Examples of Using CAATs to Detect Fraud in Areas other

-12.

K. (2007), Fundamentals of Auditing, Silicon Publishing Company. Revised Edition, 2007. Pg 272

Setty K. (2008) Detecting Fraud Using Data Analysis Technique, ISACA, pp. 1-3.

www.iiste.org

Boritz J. E. (2003) “Computer Control and Audit Guide”, 12th ed. Waterloo: University of Waterloo.

Assisted Audit Tools and Techniques: Analysis and Perspectives,

rtis M. B., Jenkins J. G., Bedard J. C. and Deis D. R. (2009) Auditors’ Training and Proficiency in Information

96.

of Contextual Factors and Individual Characteristics Affecting

Technology Implementation Decisions in Auditing, International Journal of Accounting Information Systems, 9(2), pp.

ion” New York, John Wiley & Sons, Inc.

Debreceny R., Lee S. L., Neo W., and Shuling J. T. (2004) Employing Generalized Audit Software in the Financial

Services Sector: Challenges and Opportunities,

daigle_files/DebrecenyCAATSBanks_paper.pdf

IAASB (2003) International Auditing Practice Statement 1006 Audits of the Financial Statements of Banks in

Handbook of International Auditing, Assurance, and Ethics Pronouncements, edited by IAASB. 663-751, New York:

International Auditing and Assurance Standards Board, International Federation of Accountants.

IIA (2003), Internal Audit Automation Survey, The Institute of Internal Auditor UK and Ireland, London.

ques (CAATs), Information Systems Audit and Control

Keller & Owens, LLC, Certified Public Accountants. Preventing and Detecting Fraud in Not-Profit-Organizations.

KPMG (2004) Fraud Risk Management: Developing a Strategy for Prevention, Detection, and Response, KPMG

igate fraud mal practice claims, The Trusted Professional, Vol. 10, No 1,

Mahzan N. and Lymer A. (2006) Adoption of Computer Assisted Audit Tools and Techniques (CAATTs) by Internal

Mansoury A. and Salehi M, (Spring 2009). Firm Size, Audit Regulation and Fraud Detection.

Mehra S. (2011) Computer Assisted Tools and Techniques: Examples of Using CAATs to Detect Fraud in Areas other

K. (2007), Fundamentals of Auditing, Silicon Publishing Company. Revised Edition, 2007. Pg 272-280,

Page 13: Computer aided audit techniques and fraud detection

Research Journal of Finance and AccountingISSN 2222-1697 (Paper) ISSN 2222-2847 (OnlineVol.4, No.5, 2013

Singleton, T. W., Singleton, A. J., Bologna, J. and Lindquist, R.

3rd edition, John Wiley & Sons, New Jersey.

Yang J. G. S. (2006) Data Mining Techniques for Auditing Attest Function and Fraud Detection, Journal of Forensic

and Investigation Accounting, Vol. 1, Issue 1,

Research Journal of Finance and Accounting

2847 (Online)

79

Singleton, T. W., Singleton, A. J., Bologna, J. and Lindquist, R. J. (2006) Fraud Auditing and Forensic Accounting,

3rd edition, John Wiley & Sons, New Jersey.

Yang J. G. S. (2006) Data Mining Techniques for Auditing Attest Function and Fraud Detection, Journal of Forensic

and Investigation Accounting, Vol. 1, Issue 1, pp. 4-10.

www.iiste.org

J. (2006) Fraud Auditing and Forensic Accounting,

Yang J. G. S. (2006) Data Mining Techniques for Auditing Attest Function and Fraud Detection, Journal of Forensic

Page 14: Computer aided audit techniques and fraud detection

This academic article was published by The International Institute for Science,

Technology and Education (IISTE). The IISTE is a pioneer in the Open Access

Publishing service based in the U.S. and Europe. The aim of the institute is

Accelerating Global Knowledge Sharing.

More information about the publisher can be found in the IISTE’s homepage:

http://www.iiste.org

CALL FOR PAPERS

The IISTE is currently hosting more than 30 peer-reviewed academic journals and

collaborating with academic institutions around the world. There’s no deadline for

submission. Prospective authors of IISTE journals can find the submission

instruction on the following page: http://www.iiste.org/Journals/

The IISTE editorial team promises to the review and publish all the qualified

submissions in a fast manner. All the journals articles are available online to the

readers all over the world without financial, legal, or technical barriers other than

those inseparable from gaining access to the internet itself. Printed version of the

journals is also available upon request of readers and authors.

IISTE Knowledge Sharing Partners

EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open

Archives Harvester, Bielefeld Academic Search Engine, Elektronische

Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial

Library , NewJour, Google Scholar


Recommended