This report assesses accounting fraud prevention in Australia, including the prevalence of fraud, prevention techniques, and research methodology. The investigation uses qualitative research and statistical data analysis to address the problem of accounting fraud in Australia.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: APPLIED BUSINESS RESEARCH Accounting fraud prevention in Australia
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLIED BUSINESS RESEARCH2 Abstract The aim of this report is to assess accounting fraud prevention in Australia. This investigation illustrates that a company faces accounting fraud issues highly in Australia. This fraud can occur intentionally or unintentionally. This investigation aids in declining accounting fraud concerns. Introduction, literature review as well as, research methodology are part of research methodology that would be appliedto systematically complete the research practices. Research problem, aim and objectives, as well as proposal structured, would be discussed in this research. Secondary sources would be used in a literature review for addressing prevention regarding accounting failure in Australia. In third chapter, i.e. research methodology, qualitative research approach would be applied in order to obtaining the theoretical data related to research concerns. In this investigation, both primary data collection technique as well as secondary data collection technique would be entailed such as interview and literature review. Statistical data analysis will be used for analysing information in significant manner. Along with this, ethical consideration would be used in relation to conducting investigation in an ethical manner.
APPLIED BUSINESS RESEARCH3 Table of Contents Abstract...........................................................................................................................................2 Introduction to the research..........................................................................................................4 Introduce thetopic of the research................................................................................................4 What real problem does the research seek to resolve and why is it important to researchthis topic (project scope).......................................................................................................................5 Outline the structure of this proposal............................................................................................5 Introduction....................................................................................................................................6 Literature review............................................................................................................................6 Research methodology...................................................................................................................6 Research problem and research objectives...................................................................................6 Theoretical Background/Literature review...................................................................................7 Research Design and Methodology.............................................................................................12 Type of research (exploratory, descriptive, causal)....................................................................13 Research approach (quantitative, qualitative or mixed approach)............................................13 Type of data will be used (primary or secondary data)...............................................................14 Data collection..............................................................................................................................14 Sampling.......................................................................................................................................15 Data analysis................................................................................................................................15 Ethical consideration...................................................................................................................15 References....................................................................................................................................17 Appendix.......................................................................................................................................20
APPLIED BUSINESS RESEARCH4 Introduction to the research Introduce the topic of the research There have been several fallacious practices in practices of accounting. Moreover, some guidelines as well as, accounting rehearses are developed for eliminating each one of those concerns but, these issues are persistent. In addition, principal concerns within the Australian market is linked to straightforwardness record, as well as, exchange of money to put away authentic compensation as well as, unfit to stay aware about the current upgradation in the mechanical system (Shore, 2018). The key motivation behind this research is to differentiate the illustration for the prevalence related to such experiences as well as, addresses the measures for controlling it. Moreover, in order to maintain correct accounting practices in, organisation should take into consideration some aspects that maintain morals in accounting. Moreover, uprightness is initial thing that basically intended for maintaining uprightness (Prenzler, 2017). The bookkeeping structure should consider morality as well as, straightforward in single exchanges. All accounting data should be confidential and fundamental. It should maintain secrecy regarding accounting practices. Accountant faces issue related to timing and distribution of bookkeeping record. However, there should be secrecy regarding the exchange of concerned parties. In addition, the accounting structure should mirror the conducted expert (Iyer and Samociuk, 2016). There are several standard as well as, guidelines in the relation to accounting and it is indicated through which, exercises are restricted inside as well as, bookkeeping is identical. In addition to this, accounting exercises that are recorded as well as, prepared should be in accordance with the standard that are developed bythe company. Moreover, in this separated structure, different
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPLIED BUSINESS RESEARCH5 things should be entailed as well as, moral equalization should be maintained in bookkeeping activities. In such event, moral practices could be dropped back through relation with complete fairness as well as genuineness as compared to, deceptive exercises would not occur (Capezio, and Mavisakalyan, 2016). Client organization This investigation relies on accounting system of one of company in genial reception sector that focuses on Sydney, Australia. In existing times, 148 employees who are working for association, and company has annually overturned about a hundred as well as, twelve million dollars. Companies incorporate system of international financial reporting standard (IFRS) to maintain records of accounting. It supplies its client to significant conveniences, a strong assurance as well as, services to its customer. Company is intended in a monopoly market and high challengers into market. Thus, total revenue of company can be created via its several loyal customers (Andon, et. al., 2015). Real problem of research and its importance to research this topic There is a problem related to accounting fraud problem. In an organization, several types of accounting fraud could be conducted intentionally or unintentionally. This research supports to comprehend prevention of accounting failure within an organization. This project has a wider scope for accountants to gain their understanding of the prevention policies for accounting fraud in Australia. It would have also wider scope for an academician to create their understanding regarding issues of accounting failure as well as develops their knowledge about the solution of accounting failure (Kummer, Singh, and Best, 2015). Outline structure of proposal
APPLIED BUSINESS RESEARCH6 The organization structure related with proposal will be advantageous for an investigator in order to create a feasible judgment as well as, comprehends the elements that will be entailed with the purpose of this research. These elements are introduction, literature review, and research methodology (Van Akkeren, and Buckby, 2017). It can be discussed as given below: Introduction Under the introduction part, different elements are consideredfor completing the research like research problem, aim with objectives, organizational structure, as well as, research scope. It can be beneficial for completion of research within targeted cost as well as time (Mansor, 2015). Literature review In such part, an investigator would be competent for gaining the theoretical knowledge of research concerns. It can be beneficial in order to attaining targeted aim in less time. Furthermore, literature review would be considered by using several sources like online publication, academic publication, textbooks, journal articles, as well as, offline sources. It can be beneficial to collect the theoretical data associated with research issues. These sources can be beneficial for obtaining a positive result in terms of existing research issues (Aris, et. al., 2017). Research methodology Under this research methodology chapter, several approaches, and techniques as well as, strategies will be used that supports research concerns. These tools are data gathering method, research strategies, research type, sample, and research approach. It can be beneficial for achieving the research practices via selecting the significant mode for completion of research (Prenzler, 2016). Research problem and research objectives The key problem of this investigation is to address accounting fraud prevention in Australia.
APPLIED BUSINESS RESEARCH7 Furthermore, prevention as well as, controlling of fraud are highly challenging for Australia in current times as well as, in the upcoming year. Success in dealing with fraud would improve the business reputation of Australia, save resources in public fields, as well as, declines the personal hardship that can cause fraud to countless victims in each year (Kapardis, and Krambia- Kapardis, 2016). Research Aim and Objectives: There is two aim of research like the primary as well as, secondary aim of the investigation. In addition, primary aim of this investigation is to assess ways for preventing deception as well as, a secondary aim is to implement efficient tools to prevent fraud in Australia. The key objectives for this investigation is listed as follow: To discover existing element related to prevention technique as well as fraud created through several association within Australia To assess familiarities about accounting approaches between professionals within Australia To observe system for preventing fraud as well as measurement related to validity Theoretical Background/Literature review As per the view of Suyanto (2016), the investors are considered as moderators in which, cluster sampling is practiced for gathering the information from 73 corporations. Along with this, companies reveal financial data in order to drive the volume of stock s as it increases the trust of investors and the public. Hence, it is significant to demonstrate the financial statement i.e. free from misstatements, frauds as well as, irregularities. Along with this, frauds in the context of financial statements could be initiated by manager and it can affect the earnings. It could be demonstrated as non-material however, outcomes in gigantic fraud. This investigation
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLIED BUSINESS RESEARCH8 incorporates IT, accounting reporting as well as, dividend policy as an independent variable. Together with, shareholders are moderators in terms of measuring the effects on prevention of dependent variable fraud. In contrast to this, Modugu and Anyaduba (2013) stated that there is a significant gain in up - surging in relation to financial accounting fraud that has developed forensic accounting more interesting theme It is evaluated that forensic accounting is key practice related to the investigation, utilization as well as, accounting practices for increasing the transparency within legal issues. Moreover, forensic accounting contains the model that investigates in the context of advisory perspective, attestation, as well as, assurance, which supports in creating the legal evidence. It is also evaluated that fraud is the consequence of forensic accounting as it contains property acquisition. As per the view of Yazid and Suryanto (2017), the auditor should be competent to enhance their competency level while auditing report practicing the international reporting standards. Agency conflict is addressed as a key concern in the prevention of fraud because the separation related to conflicts declines whole efficiency of procedure related to fraud prevention. Along with this, concentrated ownership can be an effective method for developing stronger control as well as, the previous investigation has demonstrated that agency conflicts can unfavorably affect fraud prevention policies. On the other side, Cockcroft and Russell (2018) evaluated that there is biased in the aspect of reporting as well as, imperfect accounting. Moreover, errors and bias are two inherent features related to accounting. In such a way, errors indicate the discouraging bias as it declines the worth as well as, application of accounting. However, it could be practiced as camouflage for creating frauds and misstatements in accounting practices. It is addressed that the major implication
APPLIED BUSINESS RESEARCH9 related to errors in reporting that they shape the companies incentive in terms of biases and fraud. Accounting errors as well as frauds decline the worth of accounting data to the public as well as, investors. This research has developed the (Fisher and verecchia) FV’s theoretical structure as well as, aim to addresses the disguise impact related to accounting errors and bias. This model demonstrates that managers select optimal bias as well as, developing objective function in terms of capturing the benefits of biasing for managers. As per the view of Sadaf et al. (2018), an accountant should oversight by the board as well as, committees. The board is accountable to manage the internal control on financial reporting developed by process as well as management through which, management can satisfy itself that those controls are performing significantly. The board is accountable to evaluate the uncertainty of financial fraud through management as well as makes sure controls are in place for prevention, detecting as well as deterring the fraud through management. There is a higher amount of oversight of board, which could be embedded in other components of significant anti- fraud initiatives. The board of director of an organization as well as the audit committee significantly affect the controlled atmosphere as well as tone at the top. They should be free from management’s influences. It is critical that the audit committee along with board methodologically and periodically reviewing the control of management in over the financial reporting with other operation. It is also critical that such accountabilities for oversight could be reflected in their specific charters. In contrast to this,Halbouni Obeid and Garbou (2016) evaluated that employment screening should be used by the company for preventing accounting practices. It is addressed that there are about 71.4% of all fraud was created through internal perpetrators. In addition to this, employment screening is the first line of defense against the fraud as well as, in the last few
APPLIED BUSINESS RESEARCH10 years, several companies have focused on its significance. Consequently, pre-employment screening can be considered in Australian standard as per the corruption and fraud control AS 8001-2003. This transformation in thinking is the outcome of circumstances like publicity concerning companies who have unintentionally employed criminals in sensitive positions or security. In several years, different cases from individual experience entailing candidates with false requirements. According to Samociuk and Iyer (2017), in current times, different cases have been publicized that effectively depicts that feasible screening of employees cannot be a luxury alternative. Moreover. Disaster can have been avoided while feasible screening of employment has been applied. There is evidence that cost related to feasible screening can be far overweighted through the expenses of cost of one terrible recruit. In order to decline the experience for preventable fraudulent practice, a company should have clearly demonstrated the pre-employment standards that must be satisfied. On the other side,Popoola et al. (2016) evaluated that a company should keep internal control that can avoid or eliminate the fraud. It involves the restricting access for certain elements such as inventory access, overtime, multi-person sign-off related to compensation of expenses, all check writing activities other accounting or payroll activities, as well as, performing the overview related to audit logs for making sure the truthfulness of books. As per the view ofNawawi and Salin (2018), the company should examine business bank accounts. Moreover, with online banking alternatives, it is simple for viewing the accounting practice and statement when it is easy. In addition to this, a business manager can perform this regularly in order to ensure that there would be no manipulation in the paper-based statement of offices. The primary item i.e. search for are unavailable together with, out of order assessments,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPLIED BUSINESS RESEARCH11 unfamiliar recipients of payment as well as, checks that could be signed in over the third party as compared to deposited in the account of the business. Moreover, staff should comprehend that assessing check practice can be a key element regarding accounting review procedure that can support to avoid the fraud. In opposed to this,SuleYusofand Bahador (2019) evaluated that company can routinely audit sectors, which deal with product returns, refunds, cash, accounting functions, as well as, inventory management. Moreover, occasional non-scheduled audit can support in detecting the fraud with high risk and with critical business sectors. Moreover, ACFE provides the fraud prevention assessment in order to support business for addressing the fraud risk as well as creates the measures for preventing losses. As per the view ofFlynn (2016), the company should train the workforces for preventing the fraud. Workforces in fraud-probe sectors of business should have awareness about the warning signs related to fraud, prevention competencies as well as ways for reporting the suspicious attitude made by customers and co-workers. The company can develop anonymous reporting practices because it set the mind effectively with respect to letting the managers understand about fellow staffs. The management such as, owner of the company develops the ethical code that makes clear unethical attitude would not be accepted by an organization. On the other side, Ehioghiren and Atu (2016) stated that company could protect data of credit card. Furthermore, the company should separate the personal account with a business even, in the case of, smallest home-based practices. Integration related to business funds to personal finances cannot be prone for high-cost faults. However, it can demonstrate that an employee can lost funds while credit card data are violated. In addition to this, separating accounts creates easier tracking business costs. Companies can be worried about whom they offer their credit card
APPLIED BUSINESS RESEARCH12 data as well as, can practice secure as well as, online bill payment facilities while feasible. Moreover, company should eliminate the potential to check theft and fraud. In support of this, KrambiaKapardis and Papastergiou (2016) stated that one of the key factors is effective internal control practice is segregation of responsibilities. Management supports in preventing fraud by declining the incentive of fraud. The primary benefit and opportunity are to decline the committed fraud while functionsof accounting are separated at the workplace. The activities related to segregating responsibilities may separate the authorization, recordkeeping as well as reviewing the function in accounting procedure. The activity of categorizing responsibilities separates the authorization, review function as well as for recordkeeping from accounting procedure. In order to categorize responsibility, the company should entail more than one individual in the preparation procedure of the financial statement. Hence, fraud created by two individuals can conspire to commit the crime. According toJohansson and Carey (2016), the company should develop a strong control atmosphere. It entails enlisting management to depict ethical conduct. It is identified that set strategies by management can trickle down impact on workforces of corporations. All compliance and regulation should be set in the written form. The strategies should be concise as well as involve the consequences while processes are disobeyed by employees. As per the ACFE’s Fraud Examiners Manual, one of effective mode is to develop a strong moral tone for the company is to hire ethically sound workforces. On the other hand, Krambia-Kapardis (2016) illustrated that the company should get the assistance of an expert. Business can execute the step of fraud prevention, as there are larger legal implications. The company should also recruit a professional accountant in order to perform extensive reviews as well as an audit of control procedures and business books. CPAs,
APPLIED BUSINESS RESEARCH13 as well as Certified Fraud Examiners, can offer larger support in the detection of fraud and prosecution. Research Design and Methodology This section assists investigator to gain depth knowledge about methods, tools, and techniques to conduct the investigation in a methodical way. Furthermore, it is an advantageous aspect for the investigator as it aids to accumulate reliable facts as well as figures from various research participants and sources to accomplish the investigation in targeted time duration. This chapter of the research consists of certain factors such as research philosophy, research strategy, research approach, data gathering tool, purpose, and data analysis tool. These tools are profitable for pooling the essential information to attain aims as well as, objectives of investigation. This section consists of certain strategies, design, and approaches for the investigation with logical justification (Popoola, et. al., 2016). Type of research (exploratory, descriptive, causal) In the research, three types of techniques have been considered by the researcher named explanatory, descriptive, and exploratory design. This design will be effective for collecting favourable research matter. These methods have assisted to get the data in favour of research matter. In this investigation, an investigator would use the descriptive research design rather than using another method, which would make competent researcher to determine research concern in an effective way. It is stated that an investigator will be competent to get views as well as, opinion regarding selected participants by considering different research matter. It is also examined that the researcher will not imply exploratory research type as this study is not fresh for the study. Furthermore, the researchcolor will not practice the explanatory type as there is no need to evaluate the cause and effect relationship (Nawawi, and Salin, 2018).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLIED BUSINESS RESEARCH14 Research approach (quantitative, qualitative or mixed approach) In the investigation, different types of methods have been involved through researcher named qualitative, quantitative, as well as, mixed research approach. Moreover, qualitative approach is practiced to gather conceptual information in context of research issues while quantitative aids to get statistical information towards the research issue. In this investigation, an investigator has applied qualitative research approach, because it will aid researcher to get conceptual data related to research issue. This method will be less costly rather than another technique(Sule, Yusof, and Bahador, 2019). Type of data will be used (primary or secondary data) Data collection is a technique which facilitates to the research scholar to select method, which would be considered by investigator to get information about research issues named primary data collection technique and secondary data gathering method. Moreover, selection of a suitable method could assist to the investigator for the attainment of research task. It can also assist researcher to attain research aim as well as objectives in the context of research concern (Flynn, 2016). In this investigation, the primary, and a secondary data collection technique would be practiced by researcher to get effective data towards research issue. Moreover, primary data would be gathered from the direct sources as it could fresh information as compared to another method. The secondary data will be gathered by considering journal articles, textbooks, and journals to completionn of organizational task. In addition, data collection can be significant to obtain reliable facts about the research issue (Ehioghiren, and Atu, 2016). Data collection In section of research methodology, data gathering process could play a vital role as it facilitates for attaining aim and objectives of investigation matter. It is assessed that there are certain tools,
APPLIED BUSINESS RESEARCH15 which are entailed by investigator to collect data by entailing case study, literature review, survey through questionnaire as well as interview method (Kumar, Bhattacharya, and Hicks, 2018). Under this study, interview method will be employed by the investigator to meet the researcher hence it supports to collect the opinion as well as view of research candidates. It would be effective in getting valid and reliable information. It is also stated that the secondary data would be gathered by entailing literature review method, which will lead to getting the data from the available sources. It will also lead to obtaining positive research in favor of the research matter (Rajapakse, and Malaba, 2015). Sampling A sampling method is a tool that facilitates to the investigator to select the research participants and supports to get a reliable outcome. Moreover, different methods could be considered in sampling named as probability random sampling as well as non-probability random sampling tool(Nawawi, and Salin, 2018). For conducting this research, non-probability sampling method will be employed by research investigator due to the limited cost and time. This tool will enable the investigator to consider the convenience-sampling method, which will lead to getting a positive result. The probability- sampling tool will not be considered, as it can be complicated as well as time-consuming rather than non-probability sampling method. Along with this, non-probability sampling technique would be chosen as it enables to choose participants as per age, gender, education, and region. It will also increase reliability as well as validity about research outcome. Hence, investigator has given more value to this method rather than probability sampling method(Zakaria, Nawawi, and Salin, 2016). Data analysis
APPLIED BUSINESS RESEARCH16 The data analysis technique can be generally practiced for evaluating the gathered information by considering the suitable software and tool. This tool is an essential part of the research methodology that supports to obtain higher competitive benefits. Hence, in this, the investigator will use the numerical data analysis technique in which the information will be collected by considering creation sources namedMS-excel software. The data that will be collected by interview could be evaluated by considering the literature review method. It will be effective for getting a higher quality research outcome (Wong, and Venkatraman, 2015). Ethical consideration At the time of completion of the study, the investigator could face different ethical issues. It could be directly affected by the validity and effectiveness of the research. The authentic information could be examined by the researcher in eliminating the ethical issues in the context of plagiarism. Furthermore, the investigator could take the prior permission of the research participants before conducting the study (Kumari Tiwari, and Debnath, 2017). It is also stated that the researcher will also maintain confidential data about investigation candidates, as it will facilitate to make the transparent the relationship between the participants and investigators. It will also increase the possibility of getting quality research. It is also founded that the investigator will also give the actual value to the author by whom the data has been collected. It could increase the possibilities of getting a higher valid and reliable result. It is stated that the researcher could also use the ethical norms for conducting suitable behavior with the research participants support to get higher competitive benefits (Schuchter, and Levi, 2016).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPLIED BUSINESS RESEARCH18 References Andon, P., Free, C. and Scard, B., 2015. Pathways to accountant fraud: Australian evidence and analysis.Accounting Research Journal,28(1), pp.10-44. Aris, N.A., Othman, R., Bukhori, M.A.M., Arif, S.M.M. and Malek, M.A.A., 2017. Detecting Accounting Anomalies Using Benford's Law: Evidence from the Malaysian Public Sector.Management & Accounting Review,16(2). Capezio, A. and Mavisakalyan, A., 2016. Women in the boardroom and fraud: Evidence from Australia.Australian Journal of Management,41(4), pp.719-734. Cockcroft, S. and Russell, M., 2018.Big data opportunities for accounting and finance practice and research.Australian Accounting Review,28(3), pp.323-333. Ehioghiren, E.E., and Atu, O.O.K., 2016. Forensic accounting and fraud management: Evidence from Nigeria.Igbinedion University Journal of Accounting,2(8), pp.245-308. Flynn, K., 2016. Financial fraud in the private health insurance sector in Australia: Perspectives from the industry.Journal of Financial Crime,23(1), pp.143-158. Halbouni, S.S., Obeid, N. and Garbou, A., 2016. Corporate governance and information technology in fraud prevention and detection: Evidence from the UAE.Managerial Auditing Journal,31(6/7), pp.589-628. Iyer, N. and Samociuk, M., 2016.Fraud and corruption: Prevention and detection.Routledge. Johansson, E. and Carey, P., 2016. Detecting fraud: The role of the anonymous reporting channel.Journal of business ethics,139(2), pp.391-409. Kapardis, A. and Krambia-Kapardis, M., 2016. Applying evidence-based profiling to disaggregated fraud offenders. InFinancial crimes: Psychological, technological, and ethical issues(pp. 269-294).Springer, Cham.
APPLIED BUSINESS RESEARCH19 KrambiaKapardis, M. and Papastergiou, K., 2016.Fraud victimization in Greece: room for improvement in prevention and detection.Journal of Financial Crime,23(2), pp.481-500. Krambia-Kapardis, M., 2016.Corporate Fraud and Corruption: A Holistic Approach to Preventing Financial Crises.Springer. Kumar, K., Bhattacharya, S. and Hicks, R., 2018. Employee perceptions of organization culture with respect to fraud–where to look and what to look for.Pacific Accounting Review,30(2), pp.187-198. Kumari Tiwari, R. and Debnath, J., 2017. Forensic accounting: a blend of knowledge.Journal of Financial Regulation and Compliance,25(1), pp.73-85. Kummer, T.F., Singh, K. and Best, P., 2015. The effectiveness of fraud detection instruments in not-for-profit organizations.Managerial Auditing Journal,30(4/5), pp.435-455. Mansor, N., 2015. Fraud triangle theory and fraud diamond theory. Understanding the convergent and divergent for future research.International Journal of Academic Research in Accounting, Finance and Management Science,1, pp.38-45. Nawawi, A. and Salin, A.S.A.P., 2018. Employee fraud and misconduct: empirical evidence from a telecommunication company.Information & Computer Security,26(1), pp.129-144. Nawawi, A. and Salin, A.S.A.P., 2018. Internal control and employees’ occupational fraud on expenditure claims.Journal of Financial Crime,25(3), pp.891-906. Popoola, O., Che-Ahmad, A., Samsudin, R.S., Salleh, K. and Babatunde, A., 2016.Accountants’ capability requirements for fraud prevention and detection in Nigeria.International Journal of Economics and Financial Issues,6, p.S4. Prenzler, T., 2016.Welfare fraud prevention in Australia: A follow-up study.Crime Prevention & Community Safety,18(3), pp.187-203.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLIED BUSINESS RESEARCH20 Prenzler, T., 2017.Fraud victimisation and prevention.InThe Palgrave Handbook of Australian and New Zealand Criminology, Crime and Justice(pp. 269-283). Palgrave Macmillan, Cham. Rajapakse, P. and Malaba, N., 2015. Minimising Exposure to Fund Management Fraud in Australia.Company and Securities Law Journal,287, p.288. Sadaf, R., Oláh, J., Popp, J. and Máté, D., 2018. An investigation of the influence of the worldwide governance and competitiveness on accounting fraud cases: A cross-country perspective.Sustainability,10(3), p.588. Samociuk, M. and Iyer, N., 2017.A short guide to fraud risk: fraud resistance and detection.Routledge. Schuchter, A. and Levi, M., 2016. The fraud triangle revisited.Security Journal,29(2), pp.107- 121. Shore, C., 2018. How corrupt are universities? audit culture, fraud prevention, and the Big Four accountancy firms.Current Anthropology,59(S18), pp.S92-S104. Sule, S., Yusof, N.Z.M. and Bahador, K.M.K., 2019. Users’ Perceptions on Auditors’ Responsibilities for Fraud Prevention, Detection and Audit Expectation GAP in Nigeria.Asian Journal of Economics, Business and Accounting, pp.1-10. Van Akkeren, J. and Buckby, S., 2017.Perceptions on the causes of individual and fraudulent co- offending: Views of forensic accountants.Journal of Business Ethics,146(2), pp.383-404. Wong, S. and Venkatraman, S., 2015.Financial accounting fraud detection using business intelligence.Asian Economic and Financial Review,5(11), p.1187. Zakaria, K.M., Nawawi, A. and Salin, A.S.A.P., 2016. Internal controls and fraud–empirical evidence from oil and gas company.Journal of Financial crime,23(4), pp.1154-1168.
APPLIED BUSINESS RESEARCH21 Appendix Application for Ethics Approval Student Details Name: Student Number: Email: Subject (Code/Name): Supervisor Details Name: Email: Proposed Research Details : Topic: Accounting fraud prevention in Australia Summary of the proposed research project, including a brief description of the methodology (bullet points where applicable)
APPLIED BUSINESS RESEARCH22 The key aim of this investigation is to assess accounting fraud prevention in Australia. This investigation accomplishes the research aim by applying several elements like introduction, literature review as well as, research methodology. Both secondary as well as primary data collection technique would be implemented for capturing facts as well as figures associated with research issue. Qualitative research approach will be used to get theoretical data associated with research concerns. Moreover, statistical data analysis will be applied to analyzing gathered investigation data. Non-probability sampling technique would be implemented to select the sample through a high amount of population Ethics Checklist (Participants) How do you propose to select your participants? Non-probability sampling technique would be applied for selecting participants through high amount of population. Non- probability sampling tool would be implemented through a research scholar to complete investigation. Non-probability sampling strategy would be chosen in which all participants would be selected in a systematic manner. Will your research involve adults who might be identified by you or anyone else reading the research? (Yes/No). If yes, how will you obtain their consent?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPLIED BUSINESS RESEARCH23 No Does your research involve children under eighteen years old? (Yes/No) No Ethics Checklist (Participants) Will, your research takes place in an institution? (Yes/No) No Are in a position of power over participants? (Yes/No), if yes, describe any ethical implication a dhow you deal with them No Describe any risk or harm to participants which might be associated with your research and
APPLIED BUSINESS RESEARCH24 how would you propose to minimize these risks a. The respondents will be chosen by convenience sampling where researcher would choose responses as per their convenience. b. The interviews would be conducted after taking confirmation with the top accounting manager in written form as well as their responses would be recorded after taking the consent. c. The secondary data would be gathered via genuine sources as well as peer-reviewed journals in terms of obtaining quality data. d. All analyzed and interpreted data will be published without any biases and quality would be kept in the research study. Privacy and Confidentiality How will you protect the confidentiality and privacy of your participants? An investigator would not pressurize the participants for providing personal data and will not manipulate in these data. Under this investigation, data protection act 1988 would be applied through an investigator. According to this act, the researcher will not demonstrate confidential data to anyone before, during as well as after research. Before gathering information, an investigator would take prior consent to the manager with the purpose of this investigation. Will it be possible to identify participants from published data? (Yes/No), if yes, is there any
APPLIED BUSINESS RESEARCH25 ethical issue which may arise from such identification. No Data Collection and Storage Who will have access to the data? The researcher will apply both primary and secondary data gathering technique as it would support the researcher for obtaining the reliable outcome The interview would be used for gathering the primary data as it would help to obtain authentic facts related to the investigation. How will you store the data in order to ensure its security All interpretation would be used and results would be published without any personal biases as well as quality would be maintained in the proposed research. Note: Ethics Approval Form is not counted toward the word count of the assessment, only fill in this form if applicable. Include this form as appendices.