Accounting Fraud Prevention in Australia
VerifiedAdded on 2022/11/14
|25
|6135
|281
AI Summary
This report assesses accounting fraud prevention in Australia, including the prevalence of fraud, prevention techniques, and research methodology. The investigation uses qualitative research and statistical data analysis to address the problem of accounting fraud in Australia.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: APPLIED BUSINESS RESEARCH
Accounting fraud prevention in Australia
Accounting fraud prevention in Australia
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLIED BUSINESS RESEARCH 2
Abstract
The aim of this report is to assess accounting fraud prevention in Australia. This investigation
illustrates that a company faces accounting fraud issues highly in Australia. This fraud can occur
intentionally or unintentionally. This investigation aids in declining accounting fraud concerns.
Introduction, literature review as well as, research methodology are part of research methodology
that would be appliedto systematically complete the research practices. Research problem, aim
and objectives, as well as proposal structured, would be discussed in this research. Secondary
sources would be used in a literature review for addressing prevention regarding accounting
failure in Australia.
In third chapter, i.e. research methodology, qualitative research approach would be applied in
order to obtaining the theoretical data related to research concerns. In this investigation, both
primary data collection technique as well as secondary data collection technique would be
entailed such as interview and literature review. Statistical data analysis will be used for
analysing information in significant manner. Along with this, ethical consideration would be
used in relation to conducting investigation in an ethical manner.
Abstract
The aim of this report is to assess accounting fraud prevention in Australia. This investigation
illustrates that a company faces accounting fraud issues highly in Australia. This fraud can occur
intentionally or unintentionally. This investigation aids in declining accounting fraud concerns.
Introduction, literature review as well as, research methodology are part of research methodology
that would be appliedto systematically complete the research practices. Research problem, aim
and objectives, as well as proposal structured, would be discussed in this research. Secondary
sources would be used in a literature review for addressing prevention regarding accounting
failure in Australia.
In third chapter, i.e. research methodology, qualitative research approach would be applied in
order to obtaining the theoretical data related to research concerns. In this investigation, both
primary data collection technique as well as secondary data collection technique would be
entailed such as interview and literature review. Statistical data analysis will be used for
analysing information in significant manner. Along with this, ethical consideration would be
used in relation to conducting investigation in an ethical manner.
APPLIED BUSINESS RESEARCH 3
Table of Contents
Abstract ........................................................................................................................................... 2
Introduction to the research .......................................................................................................... 4
Introduce the topic of the research................................................................................................ 4
What real problem does the research seek to resolve and why is it important to researchthis
topic (project scope) ....................................................................................................................... 5
Outline the structure of this proposal............................................................................................ 5
Introduction.................................................................................................................................... 6
Literature review ............................................................................................................................ 6
Research methodology ................................................................................................................... 6
Research problem and research objectives ................................................................................... 6
Theoretical Background/Literature review ................................................................................... 7
Research Design and Methodology ............................................................................................. 12
Type of research (exploratory, descriptive, causal) .................................................................... 13
Research approach (quantitative, qualitative or mixed approach) ............................................ 13
Type of data will be used (primary or secondary data) ............................................................... 14
Data collection.............................................................................................................................. 14
Sampling ....................................................................................................................................... 15
Data analysis ................................................................................................................................ 15
Ethical consideration ................................................................................................................... 15
References .................................................................................................................................... 17
Appendix ....................................................................................................................................... 20
Table of Contents
Abstract ........................................................................................................................................... 2
Introduction to the research .......................................................................................................... 4
Introduce the topic of the research................................................................................................ 4
What real problem does the research seek to resolve and why is it important to researchthis
topic (project scope) ....................................................................................................................... 5
Outline the structure of this proposal............................................................................................ 5
Introduction.................................................................................................................................... 6
Literature review ............................................................................................................................ 6
Research methodology ................................................................................................................... 6
Research problem and research objectives ................................................................................... 6
Theoretical Background/Literature review ................................................................................... 7
Research Design and Methodology ............................................................................................. 12
Type of research (exploratory, descriptive, causal) .................................................................... 13
Research approach (quantitative, qualitative or mixed approach) ............................................ 13
Type of data will be used (primary or secondary data) ............................................................... 14
Data collection.............................................................................................................................. 14
Sampling ....................................................................................................................................... 15
Data analysis ................................................................................................................................ 15
Ethical consideration ................................................................................................................... 15
References .................................................................................................................................... 17
Appendix ....................................................................................................................................... 20
APPLIED BUSINESS RESEARCH 4
Introduction to the research
Introduce the topic of the research
There have been several fallacious practices in practices of accounting. Moreover, some
guidelines as well as, accounting rehearses are developed for eliminating each one of those
concerns but, these issues are persistent. In addition, principal concerns within the Australian
market is linked to straightforwardness record, as well as, exchange of money to put away
authentic compensation as well as, unfit to stay aware about the current upgradation in the
mechanical system (Shore, 2018).
The key motivation behind this research is to differentiate the illustration for the prevalence
related to such experiences as well as, addresses the measures for controlling it. Moreover, in
order to maintain correct accounting practices in, organisation should take into consideration
some aspects that maintain morals in accounting. Moreover, uprightness is initial thing that
basically intended for maintaining uprightness (Prenzler, 2017).
The bookkeeping structure should consider morality as well as, straightforward in single
exchanges. All accounting data should be confidential and fundamental. It should maintain
secrecy regarding accounting practices. Accountant faces issue related to timing and distribution
of bookkeeping record. However, there should be secrecy regarding the exchange of concerned
parties. In addition, the accounting structure should mirror the conducted expert (Iyer and
Samociuk, 2016).
There are several standard as well as, guidelines in the relation to accounting and it is indicated
through which, exercises are restricted inside as well as, bookkeeping is identical. In addition to
this, accounting exercises that are recorded as well as, prepared should be in accordance with the
standard that are developed bythe company. Moreover, in this separated structure, different
Introduction to the research
Introduce the topic of the research
There have been several fallacious practices in practices of accounting. Moreover, some
guidelines as well as, accounting rehearses are developed for eliminating each one of those
concerns but, these issues are persistent. In addition, principal concerns within the Australian
market is linked to straightforwardness record, as well as, exchange of money to put away
authentic compensation as well as, unfit to stay aware about the current upgradation in the
mechanical system (Shore, 2018).
The key motivation behind this research is to differentiate the illustration for the prevalence
related to such experiences as well as, addresses the measures for controlling it. Moreover, in
order to maintain correct accounting practices in, organisation should take into consideration
some aspects that maintain morals in accounting. Moreover, uprightness is initial thing that
basically intended for maintaining uprightness (Prenzler, 2017).
The bookkeeping structure should consider morality as well as, straightforward in single
exchanges. All accounting data should be confidential and fundamental. It should maintain
secrecy regarding accounting practices. Accountant faces issue related to timing and distribution
of bookkeeping record. However, there should be secrecy regarding the exchange of concerned
parties. In addition, the accounting structure should mirror the conducted expert (Iyer and
Samociuk, 2016).
There are several standard as well as, guidelines in the relation to accounting and it is indicated
through which, exercises are restricted inside as well as, bookkeeping is identical. In addition to
this, accounting exercises that are recorded as well as, prepared should be in accordance with the
standard that are developed bythe company. Moreover, in this separated structure, different
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPLIED BUSINESS RESEARCH 5
things should be entailed as well as, moral equalization should be maintained in bookkeeping
activities. In such event, moral practices could be dropped back through relation with complete
fairness as well as genuineness as compared to, deceptive exercises would not occur (Capezio,
and Mavisakalyan, 2016).
Client organization
This investigation relies on accounting system of one of company in genial reception sector that
focuses on Sydney, Australia. In existing times, 148 employees who are working for association,
and company has annually overturned about a hundred as well as, twelve million dollars.
Companies incorporate system of international financial reporting standard (IFRS) to maintain
records of accounting. It supplies its client to significant conveniences, a strong assurance as well
as, services to its customer. Company is intended in a monopoly market and high challengers
into market. Thus, total revenue of company can be created via its several loyal customers
(Andon, et. al., 2015).
Real problem of research and its importance to research this topic
There is a problem related to accounting fraud problem. In an organization, several types of
accounting fraud could be conducted intentionally or unintentionally. This research supports to
comprehend prevention of accounting failure within an organization. This project has a wider
scope for accountants to gain their understanding of the prevention policies for accounting fraud
in Australia. It would have also wider scope for an academician to create their understanding
regarding issues of accounting failure as well as develops their knowledge about the solution of
accounting failure (Kummer, Singh, and Best, 2015).
Outline structure of proposal
things should be entailed as well as, moral equalization should be maintained in bookkeeping
activities. In such event, moral practices could be dropped back through relation with complete
fairness as well as genuineness as compared to, deceptive exercises would not occur (Capezio,
and Mavisakalyan, 2016).
Client organization
This investigation relies on accounting system of one of company in genial reception sector that
focuses on Sydney, Australia. In existing times, 148 employees who are working for association,
and company has annually overturned about a hundred as well as, twelve million dollars.
Companies incorporate system of international financial reporting standard (IFRS) to maintain
records of accounting. It supplies its client to significant conveniences, a strong assurance as well
as, services to its customer. Company is intended in a monopoly market and high challengers
into market. Thus, total revenue of company can be created via its several loyal customers
(Andon, et. al., 2015).
Real problem of research and its importance to research this topic
There is a problem related to accounting fraud problem. In an organization, several types of
accounting fraud could be conducted intentionally or unintentionally. This research supports to
comprehend prevention of accounting failure within an organization. This project has a wider
scope for accountants to gain their understanding of the prevention policies for accounting fraud
in Australia. It would have also wider scope for an academician to create their understanding
regarding issues of accounting failure as well as develops their knowledge about the solution of
accounting failure (Kummer, Singh, and Best, 2015).
Outline structure of proposal
APPLIED BUSINESS RESEARCH 6
The organization structure related with proposal will be advantageous for an investigator in order
to create a feasible judgment as well as, comprehends the elements that will be entailed with the
purpose of this research. These elements are introduction, literature review, and research
methodology (Van Akkeren, and Buckby, 2017). It can be discussed as given below:
Introduction
Under the introduction part, different elements are consideredfor completing the research like
research problem, aim with objectives, organizational structure, as well as, research scope. It can
be beneficial for completion of research within targeted cost as well as time (Mansor, 2015).
Literature review
In such part, an investigator would be competent for gaining the theoretical knowledge of
research concerns. It can be beneficial in order to attaining targeted aim in less time.
Furthermore, literature review would be considered by using several sources like online
publication, academic publication, textbooks, journal articles, as well as, offline sources. It can
be beneficial to collect the theoretical data associated with research issues. These sources can be
beneficial for obtaining a positive result in terms of existing research issues (Aris, et. al., 2017).
Research methodology
Under this research methodology chapter, several approaches, and techniques as well as,
strategies will be used that supports research concerns. These tools are data gathering method,
research strategies, research type, sample, and research approach. It can be beneficial for
achieving the research practices via selecting the significant mode for completion of research
(Prenzler, 2016).
Research problem and research objectives
The key problem of this investigation is to address accounting fraud prevention in Australia.
The organization structure related with proposal will be advantageous for an investigator in order
to create a feasible judgment as well as, comprehends the elements that will be entailed with the
purpose of this research. These elements are introduction, literature review, and research
methodology (Van Akkeren, and Buckby, 2017). It can be discussed as given below:
Introduction
Under the introduction part, different elements are consideredfor completing the research like
research problem, aim with objectives, organizational structure, as well as, research scope. It can
be beneficial for completion of research within targeted cost as well as time (Mansor, 2015).
Literature review
In such part, an investigator would be competent for gaining the theoretical knowledge of
research concerns. It can be beneficial in order to attaining targeted aim in less time.
Furthermore, literature review would be considered by using several sources like online
publication, academic publication, textbooks, journal articles, as well as, offline sources. It can
be beneficial to collect the theoretical data associated with research issues. These sources can be
beneficial for obtaining a positive result in terms of existing research issues (Aris, et. al., 2017).
Research methodology
Under this research methodology chapter, several approaches, and techniques as well as,
strategies will be used that supports research concerns. These tools are data gathering method,
research strategies, research type, sample, and research approach. It can be beneficial for
achieving the research practices via selecting the significant mode for completion of research
(Prenzler, 2016).
Research problem and research objectives
The key problem of this investigation is to address accounting fraud prevention in Australia.
APPLIED BUSINESS RESEARCH 7
Furthermore, prevention as well as, controlling of fraud are highly challenging for Australia in
current times as well as, in the upcoming year. Success in dealing with fraud would improve the
business reputation of Australia, save resources in public fields, as well as, declines the personal
hardship that can cause fraud to countless victims in each year (Kapardis, and Krambia-
Kapardis, 2016).
Research Aim and Objectives:
There is two aim of research like the primary as well as, secondary aim of the investigation. In
addition, primary aim of this investigation is to assess ways for preventing deception as well as, a
secondary aim is to implement efficient tools to prevent fraud in Australia.
The key objectives for this investigation is listed as follow:
To discover existing element related to prevention technique as well as fraud created
through several association within Australia
To assess familiarities about accounting approaches between professionals within
Australia
To observe system for preventing fraud as well as measurement related to validity
Theoretical Background/Literature review
As per the view of Suyanto (2016), the investors are considered as moderators in which, cluster
sampling is practiced for gathering the information from 73 corporations. Along with this,
companies reveal financial data in order to drive the volume of stock s as it increases the trust of
investors and the public. Hence, it is significant to demonstrate the financial statement i.e. free
from misstatements, frauds as well as, irregularities. Along with this, frauds in the context of
financial statements could be initiated by manager and it can affect the earnings. It could be
demonstrated as non-material however, outcomes in gigantic fraud. This investigation
Furthermore, prevention as well as, controlling of fraud are highly challenging for Australia in
current times as well as, in the upcoming year. Success in dealing with fraud would improve the
business reputation of Australia, save resources in public fields, as well as, declines the personal
hardship that can cause fraud to countless victims in each year (Kapardis, and Krambia-
Kapardis, 2016).
Research Aim and Objectives:
There is two aim of research like the primary as well as, secondary aim of the investigation. In
addition, primary aim of this investigation is to assess ways for preventing deception as well as, a
secondary aim is to implement efficient tools to prevent fraud in Australia.
The key objectives for this investigation is listed as follow:
To discover existing element related to prevention technique as well as fraud created
through several association within Australia
To assess familiarities about accounting approaches between professionals within
Australia
To observe system for preventing fraud as well as measurement related to validity
Theoretical Background/Literature review
As per the view of Suyanto (2016), the investors are considered as moderators in which, cluster
sampling is practiced for gathering the information from 73 corporations. Along with this,
companies reveal financial data in order to drive the volume of stock s as it increases the trust of
investors and the public. Hence, it is significant to demonstrate the financial statement i.e. free
from misstatements, frauds as well as, irregularities. Along with this, frauds in the context of
financial statements could be initiated by manager and it can affect the earnings. It could be
demonstrated as non-material however, outcomes in gigantic fraud. This investigation
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLIED BUSINESS RESEARCH 8
incorporates IT, accounting reporting as well as, dividend policy as an independent variable.
Together with, shareholders are moderators in terms of measuring the effects on prevention of
dependent variable fraud.
In contrast to this, Modugu and Anyaduba (2013) stated that there is a significant gain in up -
surging in relation to financial accounting fraud that has developed forensic accounting more
interesting theme It is evaluated that forensic accounting is key practice related to the
investigation, utilization as well as, accounting practices for increasing the transparency within
legal issues. Moreover, forensic accounting contains the model that investigates in the context of
advisory perspective, attestation, as well as, assurance, which supports in creating the legal
evidence. It is also evaluated that fraud is the consequence of forensic accounting as it contains
property acquisition.
As per the view of Yazid and Suryanto (2017), the auditor should be competent to enhance their
competency level while auditing report practicing the international reporting standards. Agency
conflict is addressed as a key concern in the prevention of fraud because the separation related to
conflicts declines whole efficiency of procedure related to fraud prevention. Along with this,
concentrated ownership can be an effective method for developing stronger control as well as,
the previous investigation has demonstrated that agency conflicts can unfavorably affect fraud
prevention policies.
On the other side, Cockcroft and Russell (2018) evaluated that there is biased in the aspect of
reporting as well as, imperfect accounting. Moreover, errors and bias are two inherent features
related to accounting. In such a way, errors indicate the discouraging bias as it declines the worth
as well as, application of accounting. However, it could be practiced as camouflage for creating
frauds and misstatements in accounting practices. It is addressed that the major implication
incorporates IT, accounting reporting as well as, dividend policy as an independent variable.
Together with, shareholders are moderators in terms of measuring the effects on prevention of
dependent variable fraud.
In contrast to this, Modugu and Anyaduba (2013) stated that there is a significant gain in up -
surging in relation to financial accounting fraud that has developed forensic accounting more
interesting theme It is evaluated that forensic accounting is key practice related to the
investigation, utilization as well as, accounting practices for increasing the transparency within
legal issues. Moreover, forensic accounting contains the model that investigates in the context of
advisory perspective, attestation, as well as, assurance, which supports in creating the legal
evidence. It is also evaluated that fraud is the consequence of forensic accounting as it contains
property acquisition.
As per the view of Yazid and Suryanto (2017), the auditor should be competent to enhance their
competency level while auditing report practicing the international reporting standards. Agency
conflict is addressed as a key concern in the prevention of fraud because the separation related to
conflicts declines whole efficiency of procedure related to fraud prevention. Along with this,
concentrated ownership can be an effective method for developing stronger control as well as,
the previous investigation has demonstrated that agency conflicts can unfavorably affect fraud
prevention policies.
On the other side, Cockcroft and Russell (2018) evaluated that there is biased in the aspect of
reporting as well as, imperfect accounting. Moreover, errors and bias are two inherent features
related to accounting. In such a way, errors indicate the discouraging bias as it declines the worth
as well as, application of accounting. However, it could be practiced as camouflage for creating
frauds and misstatements in accounting practices. It is addressed that the major implication
APPLIED BUSINESS RESEARCH 9
related to errors in reporting that they shape the companies incentive in terms of biases and
fraud. Accounting errors as well as frauds decline the worth of accounting data to the public as
well as, investors. This research has developed the (Fisher and verecchia) FV’s theoretical
structure as well as, aim to addresses the disguise impact related to accounting errors and bias.
This model demonstrates that managers select optimal bias as well as, developing objective
function in terms of capturing the benefits of biasing for managers.
As per the view of Sadaf et al. (2018), an accountant should oversight by the board as well as,
committees. The board is accountable to manage the internal control on financial reporting
developed by process as well as management through which, management can satisfy itself that
those controls are performing significantly. The board is accountable to evaluate the uncertainty
of financial fraud through management as well as makes sure controls are in place for
prevention, detecting as well as deterring the fraud through management. There is a higher
amount of oversight of board, which could be embedded in other components of significant anti-
fraud initiatives. The board of director of an organization as well as the audit committee
significantly affect the controlled atmosphere as well as tone at the top. They should be free from
management’s influences. It is critical that the audit committee along with board
methodologically and periodically reviewing the control of management in over the financial
reporting with other operation. It is also critical that such accountabilities for oversight could be
reflected in their specific charters.
In contrast to this,Halbouni Obeid and Garbou (2016) evaluated that employment screening
should be used by the company for preventing accounting practices. It is addressed that there are
about 71.4% of all fraud was created through internal perpetrators. In addition to this,
employment screening is the first line of defense against the fraud as well as, in the last few
related to errors in reporting that they shape the companies incentive in terms of biases and
fraud. Accounting errors as well as frauds decline the worth of accounting data to the public as
well as, investors. This research has developed the (Fisher and verecchia) FV’s theoretical
structure as well as, aim to addresses the disguise impact related to accounting errors and bias.
This model demonstrates that managers select optimal bias as well as, developing objective
function in terms of capturing the benefits of biasing for managers.
As per the view of Sadaf et al. (2018), an accountant should oversight by the board as well as,
committees. The board is accountable to manage the internal control on financial reporting
developed by process as well as management through which, management can satisfy itself that
those controls are performing significantly. The board is accountable to evaluate the uncertainty
of financial fraud through management as well as makes sure controls are in place for
prevention, detecting as well as deterring the fraud through management. There is a higher
amount of oversight of board, which could be embedded in other components of significant anti-
fraud initiatives. The board of director of an organization as well as the audit committee
significantly affect the controlled atmosphere as well as tone at the top. They should be free from
management’s influences. It is critical that the audit committee along with board
methodologically and periodically reviewing the control of management in over the financial
reporting with other operation. It is also critical that such accountabilities for oversight could be
reflected in their specific charters.
In contrast to this,Halbouni Obeid and Garbou (2016) evaluated that employment screening
should be used by the company for preventing accounting practices. It is addressed that there are
about 71.4% of all fraud was created through internal perpetrators. In addition to this,
employment screening is the first line of defense against the fraud as well as, in the last few
APPLIED BUSINESS RESEARCH 10
years, several companies have focused on its significance. Consequently, pre-employment
screening can be considered in Australian standard as per the corruption and fraud control AS
8001-2003. This transformation in thinking is the outcome of circumstances like publicity
concerning companies who have unintentionally employed criminals in sensitive positions or
security. In several years, different cases from individual experience entailing candidates with
false requirements.
According to Samociuk and Iyer (2017), in current times, different cases have been publicized
that effectively depicts that feasible screening of employees cannot be a luxury alternative.
Moreover. Disaster can have been avoided while feasible screening of employment has been
applied. There is evidence that cost related to feasible screening can be far overweighted through
the expenses of cost of one terrible recruit. In order to decline the experience for preventable
fraudulent practice, a company should have clearly demonstrated the pre-employment standards
that must be satisfied.
On the other side,Popoola et al. (2016) evaluated that a company should keep internal control
that can avoid or eliminate the fraud. It involves the restricting access for certain elements such
as inventory access, overtime, multi-person sign-off related to compensation of expenses, all
check writing activities other accounting or payroll activities, as well as, performing the
overview related to audit logs for making sure the truthfulness of books.
As per the view ofNawawi and Salin (2018), the company should examine business bank
accounts. Moreover, with online banking alternatives, it is simple for viewing the accounting
practice and statement when it is easy. In addition to this, a business manager can perform this
regularly in order to ensure that there would be no manipulation in the paper-based statement of
offices. The primary item i.e. search for are unavailable together with, out of order assessments,
years, several companies have focused on its significance. Consequently, pre-employment
screening can be considered in Australian standard as per the corruption and fraud control AS
8001-2003. This transformation in thinking is the outcome of circumstances like publicity
concerning companies who have unintentionally employed criminals in sensitive positions or
security. In several years, different cases from individual experience entailing candidates with
false requirements.
According to Samociuk and Iyer (2017), in current times, different cases have been publicized
that effectively depicts that feasible screening of employees cannot be a luxury alternative.
Moreover. Disaster can have been avoided while feasible screening of employment has been
applied. There is evidence that cost related to feasible screening can be far overweighted through
the expenses of cost of one terrible recruit. In order to decline the experience for preventable
fraudulent practice, a company should have clearly demonstrated the pre-employment standards
that must be satisfied.
On the other side,Popoola et al. (2016) evaluated that a company should keep internal control
that can avoid or eliminate the fraud. It involves the restricting access for certain elements such
as inventory access, overtime, multi-person sign-off related to compensation of expenses, all
check writing activities other accounting or payroll activities, as well as, performing the
overview related to audit logs for making sure the truthfulness of books.
As per the view ofNawawi and Salin (2018), the company should examine business bank
accounts. Moreover, with online banking alternatives, it is simple for viewing the accounting
practice and statement when it is easy. In addition to this, a business manager can perform this
regularly in order to ensure that there would be no manipulation in the paper-based statement of
offices. The primary item i.e. search for are unavailable together with, out of order assessments,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPLIED BUSINESS RESEARCH 11
unfamiliar recipients of payment as well as, checks that could be signed in over the third party as
compared to deposited in the account of the business. Moreover, staff should comprehend that
assessing check practice can be a key element regarding accounting review procedure that can
support to avoid the fraud.
In opposed to this,SuleYusofand Bahador (2019) evaluated that company can routinely audit
sectors, which deal with product returns, refunds, cash, accounting functions, as well as,
inventory management. Moreover, occasional non-scheduled audit can support in detecting the
fraud with high risk and with critical business sectors. Moreover, ACFE provides the fraud
prevention assessment in order to support business for addressing the fraud risk as well as creates
the measures for preventing losses.
As per the view ofFlynn (2016), the company should train the workforces for preventing the
fraud. Workforces in fraud-probe sectors of business should have awareness about the warning
signs related to fraud, prevention competencies as well as ways for reporting the suspicious
attitude made by customers and co-workers. The company can develop anonymous reporting
practices because it set the mind effectively with respect to letting the managers understand
about fellow staffs. The management such as, owner of the company develops the ethical code
that makes clear unethical attitude would not be accepted by an organization.
On the other side, Ehioghiren and Atu (2016) stated that company could protect data of credit
card. Furthermore, the company should separate the personal account with a business even, in
the case of, smallest home-based practices. Integration related to business funds to personal
finances cannot be prone for high-cost faults. However, it can demonstrate that an employee can
lost funds while credit card data are violated. In addition to this, separating accounts creates
easier tracking business costs. Companies can be worried about whom they offer their credit card
unfamiliar recipients of payment as well as, checks that could be signed in over the third party as
compared to deposited in the account of the business. Moreover, staff should comprehend that
assessing check practice can be a key element regarding accounting review procedure that can
support to avoid the fraud.
In opposed to this,SuleYusofand Bahador (2019) evaluated that company can routinely audit
sectors, which deal with product returns, refunds, cash, accounting functions, as well as,
inventory management. Moreover, occasional non-scheduled audit can support in detecting the
fraud with high risk and with critical business sectors. Moreover, ACFE provides the fraud
prevention assessment in order to support business for addressing the fraud risk as well as creates
the measures for preventing losses.
As per the view ofFlynn (2016), the company should train the workforces for preventing the
fraud. Workforces in fraud-probe sectors of business should have awareness about the warning
signs related to fraud, prevention competencies as well as ways for reporting the suspicious
attitude made by customers and co-workers. The company can develop anonymous reporting
practices because it set the mind effectively with respect to letting the managers understand
about fellow staffs. The management such as, owner of the company develops the ethical code
that makes clear unethical attitude would not be accepted by an organization.
On the other side, Ehioghiren and Atu (2016) stated that company could protect data of credit
card. Furthermore, the company should separate the personal account with a business even, in
the case of, smallest home-based practices. Integration related to business funds to personal
finances cannot be prone for high-cost faults. However, it can demonstrate that an employee can
lost funds while credit card data are violated. In addition to this, separating accounts creates
easier tracking business costs. Companies can be worried about whom they offer their credit card
APPLIED BUSINESS RESEARCH 12
data as well as, can practice secure as well as, online bill payment facilities while feasible.
Moreover, company should eliminate the potential to check theft and fraud.
In support of this, KrambiaKapardis and Papastergiou (2016) stated that one of the key factors is
effective internal control practice is segregation of responsibilities. Management supports in
preventing fraud by declining the incentive of fraud. The primary benefit and opportunity are to
decline the committed fraud while functionsof accounting are separated at the workplace. The
activities related to segregating responsibilities may separate the authorization, recordkeeping as
well as reviewing the function in accounting procedure. The activity of categorizing
responsibilities separates the authorization, review function as well as for recordkeeping from
accounting procedure. In order to categorize responsibility, the company should entail more than
one individual in the preparation procedure of the financial statement. Hence, fraud created by
two individuals can conspire to commit the crime.
According toJohansson and Carey (2016), the company should develop a strong control
atmosphere. It entails enlisting management to depict ethical conduct. It is identified that set
strategies by management can trickle down impact on workforces of corporations. All
compliance and regulation should be set in the written form. The strategies should be concise as
well as involve the consequences while processes are disobeyed by employees. As per the
ACFE’s Fraud Examiners Manual, one of effective mode is to develop a strong moral tone for
the company is to hire ethically sound workforces.
On the other hand, Krambia-Kapardis (2016) illustrated that the company should get the
assistance of an expert. Business can execute the step of fraud prevention, as there are larger
legal implications. The company should also recruit a professional accountant in order to
perform extensive reviews as well as an audit of control procedures and business books. CPAs,
data as well as, can practice secure as well as, online bill payment facilities while feasible.
Moreover, company should eliminate the potential to check theft and fraud.
In support of this, KrambiaKapardis and Papastergiou (2016) stated that one of the key factors is
effective internal control practice is segregation of responsibilities. Management supports in
preventing fraud by declining the incentive of fraud. The primary benefit and opportunity are to
decline the committed fraud while functionsof accounting are separated at the workplace. The
activities related to segregating responsibilities may separate the authorization, recordkeeping as
well as reviewing the function in accounting procedure. The activity of categorizing
responsibilities separates the authorization, review function as well as for recordkeeping from
accounting procedure. In order to categorize responsibility, the company should entail more than
one individual in the preparation procedure of the financial statement. Hence, fraud created by
two individuals can conspire to commit the crime.
According toJohansson and Carey (2016), the company should develop a strong control
atmosphere. It entails enlisting management to depict ethical conduct. It is identified that set
strategies by management can trickle down impact on workforces of corporations. All
compliance and regulation should be set in the written form. The strategies should be concise as
well as involve the consequences while processes are disobeyed by employees. As per the
ACFE’s Fraud Examiners Manual, one of effective mode is to develop a strong moral tone for
the company is to hire ethically sound workforces.
On the other hand, Krambia-Kapardis (2016) illustrated that the company should get the
assistance of an expert. Business can execute the step of fraud prevention, as there are larger
legal implications. The company should also recruit a professional accountant in order to
perform extensive reviews as well as an audit of control procedures and business books. CPAs,
APPLIED BUSINESS RESEARCH 13
as well as Certified Fraud Examiners, can offer larger support in the detection of fraud and
prosecution.
Research Design and Methodology
This section assists investigator to gain depth knowledge about methods, tools, and techniques to
conduct the investigation in a methodical way. Furthermore, it is an advantageous aspect for the
investigator as it aids to accumulate reliable facts as well as figures from various research
participants and sources to accomplish the investigation in targeted time duration. This chapter of
the research consists of certain factors such as research philosophy, research strategy, research
approach, data gathering tool, purpose, and data analysis tool. These tools are profitable for
pooling the essential information to attain aims as well as, objectives of investigation. This
section consists of certain strategies, design, and approaches for the investigation with logical
justification (Popoola, et. al., 2016).
Type of research (exploratory, descriptive, causal)
In the research, three types of techniques have been considered by the researcher named
explanatory, descriptive, and exploratory design. This design will be effective for collecting
favourable research matter. These methods have assisted to get the data in favour of research
matter. In this investigation, an investigator would use the descriptive research design rather than
using another method, which would make competent researcher to determine research concern in
an effective way. It is stated that an investigator will be competent to get views as well as,
opinion regarding selected participants by considering different research matter. It is also
examined that the researcher will not imply exploratory research type as this study is not fresh
for the study. Furthermore, the researchcolor will not practice the explanatory type as there is no
need to evaluate the cause and effect relationship (Nawawi, and Salin, 2018).
as well as Certified Fraud Examiners, can offer larger support in the detection of fraud and
prosecution.
Research Design and Methodology
This section assists investigator to gain depth knowledge about methods, tools, and techniques to
conduct the investigation in a methodical way. Furthermore, it is an advantageous aspect for the
investigator as it aids to accumulate reliable facts as well as figures from various research
participants and sources to accomplish the investigation in targeted time duration. This chapter of
the research consists of certain factors such as research philosophy, research strategy, research
approach, data gathering tool, purpose, and data analysis tool. These tools are profitable for
pooling the essential information to attain aims as well as, objectives of investigation. This
section consists of certain strategies, design, and approaches for the investigation with logical
justification (Popoola, et. al., 2016).
Type of research (exploratory, descriptive, causal)
In the research, three types of techniques have been considered by the researcher named
explanatory, descriptive, and exploratory design. This design will be effective for collecting
favourable research matter. These methods have assisted to get the data in favour of research
matter. In this investigation, an investigator would use the descriptive research design rather than
using another method, which would make competent researcher to determine research concern in
an effective way. It is stated that an investigator will be competent to get views as well as,
opinion regarding selected participants by considering different research matter. It is also
examined that the researcher will not imply exploratory research type as this study is not fresh
for the study. Furthermore, the researchcolor will not practice the explanatory type as there is no
need to evaluate the cause and effect relationship (Nawawi, and Salin, 2018).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLIED BUSINESS RESEARCH 14
Research approach (quantitative, qualitative or mixed approach)
In the investigation, different types of methods have been involved through researcher named
qualitative, quantitative, as well as, mixed research approach. Moreover, qualitative approach is
practiced to gather conceptual information in context of research issues while quantitative aids to
get statistical information towards the research issue. In this investigation, an investigator has
applied qualitative research approach, because it will aid researcher to get conceptual data related
to research issue. This method will be less costly rather than another technique (Sule, Yusof, and
Bahador, 2019).
Type of data will be used (primary or secondary data)
Data collection is a technique which facilitates to the research scholar to select method, which
would be considered by investigator to get information about research issues named primary data
collection technique and secondary data gathering method. Moreover, selection of a suitable
method could assist to the investigator for the attainment of research task. It can also assist
researcher to attain research aim as well as objectives in the context of research concern (Flynn,
2016). In this investigation, the primary, and a secondary data collection technique would be
practiced by researcher to get effective data towards research issue. Moreover, primary data
would be gathered from the direct sources as it could fresh information as compared to another
method. The secondary data will be gathered by considering journal articles, textbooks, and
journals to completionn of organizational task. In addition, data collection can be significant to
obtain reliable facts about the research issue (Ehioghiren, and Atu, 2016).
Data collection
In section of research methodology, data gathering process could play a vital role as it facilitates
for attaining aim and objectives of investigation matter. It is assessed that there are certain tools,
Research approach (quantitative, qualitative or mixed approach)
In the investigation, different types of methods have been involved through researcher named
qualitative, quantitative, as well as, mixed research approach. Moreover, qualitative approach is
practiced to gather conceptual information in context of research issues while quantitative aids to
get statistical information towards the research issue. In this investigation, an investigator has
applied qualitative research approach, because it will aid researcher to get conceptual data related
to research issue. This method will be less costly rather than another technique (Sule, Yusof, and
Bahador, 2019).
Type of data will be used (primary or secondary data)
Data collection is a technique which facilitates to the research scholar to select method, which
would be considered by investigator to get information about research issues named primary data
collection technique and secondary data gathering method. Moreover, selection of a suitable
method could assist to the investigator for the attainment of research task. It can also assist
researcher to attain research aim as well as objectives in the context of research concern (Flynn,
2016). In this investigation, the primary, and a secondary data collection technique would be
practiced by researcher to get effective data towards research issue. Moreover, primary data
would be gathered from the direct sources as it could fresh information as compared to another
method. The secondary data will be gathered by considering journal articles, textbooks, and
journals to completionn of organizational task. In addition, data collection can be significant to
obtain reliable facts about the research issue (Ehioghiren, and Atu, 2016).
Data collection
In section of research methodology, data gathering process could play a vital role as it facilitates
for attaining aim and objectives of investigation matter. It is assessed that there are certain tools,
APPLIED BUSINESS RESEARCH 15
which are entailed by investigator to collect data by entailing case study, literature review,
survey through questionnaire as well as interview method (Kumar, Bhattacharya, and Hicks,
2018). Under this study, interview method will be employed by the investigator to meet the
researcher hence it supports to collect the opinion as well as view of research candidates. It
would be effective in getting valid and reliable information. It is also stated that the secondary
data would be gathered by entailing literature review method, which will lead to getting the data
from the available sources. It will also lead to obtaining positive research in favor of the research
matter (Rajapakse, and Malaba, 2015).
Sampling
A sampling method is a tool that facilitates to the investigator to select the research participants
and supports to get a reliable outcome. Moreover, different methods could be considered in
sampling named as probability random sampling as well as non-probability random sampling
tool (Nawawi, and Salin, 2018).
For conducting this research, non-probability sampling method will be employed by research
investigator due to the limited cost and time. This tool will enable the investigator to consider the
convenience-sampling method, which will lead to getting a positive result. The probability-
sampling tool will not be considered, as it can be complicated as well as time-consuming rather
than non-probability sampling method. Along with this, non-probability sampling technique
would be chosen as it enables to choose participants as per age, gender, education, and region. It
will also increase reliability as well as validity about research outcome. Hence, investigator has
given more value to this method rather than probability sampling method (Zakaria, Nawawi, and
Salin, 2016).
Data analysis
which are entailed by investigator to collect data by entailing case study, literature review,
survey through questionnaire as well as interview method (Kumar, Bhattacharya, and Hicks,
2018). Under this study, interview method will be employed by the investigator to meet the
researcher hence it supports to collect the opinion as well as view of research candidates. It
would be effective in getting valid and reliable information. It is also stated that the secondary
data would be gathered by entailing literature review method, which will lead to getting the data
from the available sources. It will also lead to obtaining positive research in favor of the research
matter (Rajapakse, and Malaba, 2015).
Sampling
A sampling method is a tool that facilitates to the investigator to select the research participants
and supports to get a reliable outcome. Moreover, different methods could be considered in
sampling named as probability random sampling as well as non-probability random sampling
tool (Nawawi, and Salin, 2018).
For conducting this research, non-probability sampling method will be employed by research
investigator due to the limited cost and time. This tool will enable the investigator to consider the
convenience-sampling method, which will lead to getting a positive result. The probability-
sampling tool will not be considered, as it can be complicated as well as time-consuming rather
than non-probability sampling method. Along with this, non-probability sampling technique
would be chosen as it enables to choose participants as per age, gender, education, and region. It
will also increase reliability as well as validity about research outcome. Hence, investigator has
given more value to this method rather than probability sampling method (Zakaria, Nawawi, and
Salin, 2016).
Data analysis
APPLIED BUSINESS RESEARCH 16
The data analysis technique can be generally practiced for evaluating the gathered information
by considering the suitable software and tool. This tool is an essential part of the research
methodology that supports to obtain higher competitive benefits. Hence, in this, the investigator
will use the numerical data analysis technique in which the information will be collected by
considering creation sources namedMS-excel software. The data that will be collected by
interview could be evaluated by considering the literature review method. It will be effective for
getting a higher quality research outcome (Wong, and Venkatraman, 2015).
Ethical consideration
At the time of completion of the study, the investigator could face different ethical issues. It
could be directly affected by the validity and effectiveness of the research. The authentic
information could be examined by the researcher in eliminating the ethical issues in the context
of plagiarism. Furthermore, the investigator could take the prior permission of the research
participants before conducting the study (Kumari Tiwari, and Debnath, 2017). It is also stated
that the researcher will also maintain confidential data about investigation candidates, as it will
facilitate to make the transparent the relationship between the participants and investigators. It
will also increase the possibility of getting quality research. It is also founded that the
investigator will also give the actual value to the author by whom the data has been collected. It
could increase the possibilities of getting a higher valid and reliable result. It is stated that the
researcher could also use the ethical norms for conducting suitable behavior with the research
participants support to get higher competitive benefits (Schuchter, and Levi, 2016).
The data analysis technique can be generally practiced for evaluating the gathered information
by considering the suitable software and tool. This tool is an essential part of the research
methodology that supports to obtain higher competitive benefits. Hence, in this, the investigator
will use the numerical data analysis technique in which the information will be collected by
considering creation sources namedMS-excel software. The data that will be collected by
interview could be evaluated by considering the literature review method. It will be effective for
getting a higher quality research outcome (Wong, and Venkatraman, 2015).
Ethical consideration
At the time of completion of the study, the investigator could face different ethical issues. It
could be directly affected by the validity and effectiveness of the research. The authentic
information could be examined by the researcher in eliminating the ethical issues in the context
of plagiarism. Furthermore, the investigator could take the prior permission of the research
participants before conducting the study (Kumari Tiwari, and Debnath, 2017). It is also stated
that the researcher will also maintain confidential data about investigation candidates, as it will
facilitate to make the transparent the relationship between the participants and investigators. It
will also increase the possibility of getting quality research. It is also founded that the
investigator will also give the actual value to the author by whom the data has been collected. It
could increase the possibilities of getting a higher valid and reliable result. It is stated that the
researcher could also use the ethical norms for conducting suitable behavior with the research
participants support to get higher competitive benefits (Schuchter, and Levi, 2016).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPLIED BUSINESS RESEARCH 17
APPLIED BUSINESS RESEARCH 18
References
Andon, P., Free, C. and Scard, B., 2015. Pathways to accountant fraud: Australian evidence and
analysis. Accounting Research Journal, 28(1), pp.10-44.
Aris, N.A., Othman, R., Bukhori, M.A.M., Arif, S.M.M. and Malek, M.A.A., 2017. Detecting
Accounting Anomalies Using Benford's Law: Evidence from the Malaysian Public
Sector. Management & Accounting Review, 16(2).
Capezio, A. and Mavisakalyan, A., 2016. Women in the boardroom and fraud: Evidence from
Australia. Australian Journal of Management, 41(4), pp.719-734.
Cockcroft, S. and Russell, M., 2018.Big data opportunities for accounting and finance practice
and research. Australian Accounting Review, 28(3), pp.323-333.
Ehioghiren, E.E., and Atu, O.O.K., 2016. Forensic accounting and fraud management: Evidence
from Nigeria. Igbinedion University Journal of Accounting, 2(8), pp.245-308.
Flynn, K., 2016. Financial fraud in the private health insurance sector in Australia: Perspectives
from the industry. Journal of Financial Crime, 23(1), pp.143-158.
Halbouni, S.S., Obeid, N. and Garbou, A., 2016. Corporate governance and information
technology in fraud prevention and detection: Evidence from the UAE. Managerial Auditing
Journal, 31(6/7), pp.589-628.
Iyer, N. and Samociuk, M., 2016. Fraud and corruption: Prevention and detection.Routledge.
Johansson, E. and Carey, P., 2016. Detecting fraud: The role of the anonymous reporting
channel. Journal of business ethics, 139(2), pp.391-409.
Kapardis, A. and Krambia-Kapardis, M., 2016. Applying evidence-based profiling to
disaggregated fraud offenders. In Financial crimes: Psychological, technological, and ethical
issues (pp. 269-294).Springer, Cham.
References
Andon, P., Free, C. and Scard, B., 2015. Pathways to accountant fraud: Australian evidence and
analysis. Accounting Research Journal, 28(1), pp.10-44.
Aris, N.A., Othman, R., Bukhori, M.A.M., Arif, S.M.M. and Malek, M.A.A., 2017. Detecting
Accounting Anomalies Using Benford's Law: Evidence from the Malaysian Public
Sector. Management & Accounting Review, 16(2).
Capezio, A. and Mavisakalyan, A., 2016. Women in the boardroom and fraud: Evidence from
Australia. Australian Journal of Management, 41(4), pp.719-734.
Cockcroft, S. and Russell, M., 2018.Big data opportunities for accounting and finance practice
and research. Australian Accounting Review, 28(3), pp.323-333.
Ehioghiren, E.E., and Atu, O.O.K., 2016. Forensic accounting and fraud management: Evidence
from Nigeria. Igbinedion University Journal of Accounting, 2(8), pp.245-308.
Flynn, K., 2016. Financial fraud in the private health insurance sector in Australia: Perspectives
from the industry. Journal of Financial Crime, 23(1), pp.143-158.
Halbouni, S.S., Obeid, N. and Garbou, A., 2016. Corporate governance and information
technology in fraud prevention and detection: Evidence from the UAE. Managerial Auditing
Journal, 31(6/7), pp.589-628.
Iyer, N. and Samociuk, M., 2016. Fraud and corruption: Prevention and detection.Routledge.
Johansson, E. and Carey, P., 2016. Detecting fraud: The role of the anonymous reporting
channel. Journal of business ethics, 139(2), pp.391-409.
Kapardis, A. and Krambia-Kapardis, M., 2016. Applying evidence-based profiling to
disaggregated fraud offenders. In Financial crimes: Psychological, technological, and ethical
issues (pp. 269-294).Springer, Cham.
APPLIED BUSINESS RESEARCH 19
KrambiaKapardis, M. and Papastergiou, K., 2016.Fraud victimization in Greece: room for
improvement in prevention and detection. Journal of Financial Crime, 23(2), pp.481-500.
Krambia-Kapardis, M., 2016. Corporate Fraud and Corruption: A Holistic Approach to
Preventing Financial Crises.Springer.
Kumar, K., Bhattacharya, S. and Hicks, R., 2018. Employee perceptions of organization culture
with respect to fraud–where to look and what to look for. Pacific Accounting Review, 30(2),
pp.187-198.
Kumari Tiwari, R. and Debnath, J., 2017. Forensic accounting: a blend of knowledge. Journal of
Financial Regulation and Compliance, 25(1), pp.73-85.
Kummer, T.F., Singh, K. and Best, P., 2015. The effectiveness of fraud detection instruments in
not-for-profit organizations. Managerial Auditing Journal, 30(4/5), pp.435-455.
Mansor, N., 2015. Fraud triangle theory and fraud diamond theory. Understanding the
convergent and divergent for future research. International Journal of Academic Research in
Accounting, Finance and Management Science, 1, pp.38-45.
Nawawi, A. and Salin, A.S.A.P., 2018. Employee fraud and misconduct: empirical evidence
from a telecommunication company. Information & Computer Security, 26(1), pp.129-144.
Nawawi, A. and Salin, A.S.A.P., 2018. Internal control and employees’ occupational fraud on
expenditure claims. Journal of Financial Crime, 25(3), pp.891-906.
Popoola, O., Che-Ahmad, A., Samsudin, R.S., Salleh, K. and Babatunde, A., 2016.Accountants’
capability requirements for fraud prevention and detection in Nigeria. International Journal of
Economics and Financial Issues, 6, p.S4.
Prenzler, T., 2016.Welfare fraud prevention in Australia: A follow-up study. Crime Prevention
& Community Safety, 18(3), pp.187-203.
KrambiaKapardis, M. and Papastergiou, K., 2016.Fraud victimization in Greece: room for
improvement in prevention and detection. Journal of Financial Crime, 23(2), pp.481-500.
Krambia-Kapardis, M., 2016. Corporate Fraud and Corruption: A Holistic Approach to
Preventing Financial Crises.Springer.
Kumar, K., Bhattacharya, S. and Hicks, R., 2018. Employee perceptions of organization culture
with respect to fraud–where to look and what to look for. Pacific Accounting Review, 30(2),
pp.187-198.
Kumari Tiwari, R. and Debnath, J., 2017. Forensic accounting: a blend of knowledge. Journal of
Financial Regulation and Compliance, 25(1), pp.73-85.
Kummer, T.F., Singh, K. and Best, P., 2015. The effectiveness of fraud detection instruments in
not-for-profit organizations. Managerial Auditing Journal, 30(4/5), pp.435-455.
Mansor, N., 2015. Fraud triangle theory and fraud diamond theory. Understanding the
convergent and divergent for future research. International Journal of Academic Research in
Accounting, Finance and Management Science, 1, pp.38-45.
Nawawi, A. and Salin, A.S.A.P., 2018. Employee fraud and misconduct: empirical evidence
from a telecommunication company. Information & Computer Security, 26(1), pp.129-144.
Nawawi, A. and Salin, A.S.A.P., 2018. Internal control and employees’ occupational fraud on
expenditure claims. Journal of Financial Crime, 25(3), pp.891-906.
Popoola, O., Che-Ahmad, A., Samsudin, R.S., Salleh, K. and Babatunde, A., 2016.Accountants’
capability requirements for fraud prevention and detection in Nigeria. International Journal of
Economics and Financial Issues, 6, p.S4.
Prenzler, T., 2016.Welfare fraud prevention in Australia: A follow-up study. Crime Prevention
& Community Safety, 18(3), pp.187-203.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLIED BUSINESS RESEARCH 20
Prenzler, T., 2017.Fraud victimisation and prevention.In The Palgrave Handbook of Australian
and New Zealand Criminology, Crime and Justice (pp. 269-283). Palgrave Macmillan, Cham.
Rajapakse, P. and Malaba, N., 2015. Minimising Exposure to Fund Management Fraud in
Australia. Company and Securities Law Journal, 287, p.288.
Sadaf, R., Oláh, J., Popp, J. and Máté, D., 2018. An investigation of the influence of the
worldwide governance and competitiveness on accounting fraud cases: A cross-country
perspective. Sustainability, 10(3), p.588.
Samociuk, M. and Iyer, N., 2017. A short guide to fraud risk: fraud resistance and
detection.Routledge.
Schuchter, A. and Levi, M., 2016. The fraud triangle revisited. Security Journal, 29(2), pp.107-
121.
Shore, C., 2018. How corrupt are universities? audit culture, fraud prevention, and the Big Four
accountancy firms. Current Anthropology, 59(S18), pp.S92-S104.
Sule, S., Yusof, N.Z.M. and Bahador, K.M.K., 2019. Users’ Perceptions on Auditors’
Responsibilities for Fraud Prevention, Detection and Audit Expectation GAP in Nigeria. Asian
Journal of Economics, Business and Accounting, pp.1-10.
Van Akkeren, J. and Buckby, S., 2017.Perceptions on the causes of individual and fraudulent co-
offending: Views of forensic accountants. Journal of Business Ethics, 146(2), pp.383-404.
Wong, S. and Venkatraman, S., 2015.Financial accounting fraud detection using business
intelligence. Asian Economic and Financial Review, 5(11), p.1187.
Zakaria, K.M., Nawawi, A. and Salin, A.S.A.P., 2016. Internal controls and fraud–empirical
evidence from oil and gas company. Journal of Financial crime, 23(4), pp.1154-1168.
Prenzler, T., 2017.Fraud victimisation and prevention.In The Palgrave Handbook of Australian
and New Zealand Criminology, Crime and Justice (pp. 269-283). Palgrave Macmillan, Cham.
Rajapakse, P. and Malaba, N., 2015. Minimising Exposure to Fund Management Fraud in
Australia. Company and Securities Law Journal, 287, p.288.
Sadaf, R., Oláh, J., Popp, J. and Máté, D., 2018. An investigation of the influence of the
worldwide governance and competitiveness on accounting fraud cases: A cross-country
perspective. Sustainability, 10(3), p.588.
Samociuk, M. and Iyer, N., 2017. A short guide to fraud risk: fraud resistance and
detection.Routledge.
Schuchter, A. and Levi, M., 2016. The fraud triangle revisited. Security Journal, 29(2), pp.107-
121.
Shore, C., 2018. How corrupt are universities? audit culture, fraud prevention, and the Big Four
accountancy firms. Current Anthropology, 59(S18), pp.S92-S104.
Sule, S., Yusof, N.Z.M. and Bahador, K.M.K., 2019. Users’ Perceptions on Auditors’
Responsibilities for Fraud Prevention, Detection and Audit Expectation GAP in Nigeria. Asian
Journal of Economics, Business and Accounting, pp.1-10.
Van Akkeren, J. and Buckby, S., 2017.Perceptions on the causes of individual and fraudulent co-
offending: Views of forensic accountants. Journal of Business Ethics, 146(2), pp.383-404.
Wong, S. and Venkatraman, S., 2015.Financial accounting fraud detection using business
intelligence. Asian Economic and Financial Review, 5(11), p.1187.
Zakaria, K.M., Nawawi, A. and Salin, A.S.A.P., 2016. Internal controls and fraud–empirical
evidence from oil and gas company. Journal of Financial crime, 23(4), pp.1154-1168.
APPLIED BUSINESS RESEARCH 21
Appendix
Application for Ethics Approval
Student Details
Name :
Student Number :
Email :
Subject (Code/Name) :
Supervisor Details
Name :
Email :
Proposed Research Details :
Topic: Accounting fraud prevention in Australia
Summary of the proposed research project, including a brief description of the methodology
(bullet points where applicable)
Appendix
Application for Ethics Approval
Student Details
Name :
Student Number :
Email :
Subject (Code/Name) :
Supervisor Details
Name :
Email :
Proposed Research Details :
Topic: Accounting fraud prevention in Australia
Summary of the proposed research project, including a brief description of the methodology
(bullet points where applicable)
APPLIED BUSINESS RESEARCH 22
The key aim of this investigation is to assess accounting fraud prevention in
Australia.
This investigation accomplishes the research aim by applying several elements like
introduction, literature review as well as, research methodology.
Both secondary as well as primary data collection technique would be implemented
for capturing facts as well as figures associated with research issue.
Qualitative research approach will be used to get theoretical data associated with
research concerns.
Moreover, statistical data analysis will be applied to analyzing gathered investigation
data.
Non-probability sampling technique would be implemented to select the sample
through a high amount of population
Ethics Checklist (Participants)
How do you propose to select your participants?
Non-probability sampling technique would be applied for selecting participants
through high amount of population.
Non- probability sampling tool would be implemented through a research scholar to
complete investigation.
Non-probability sampling strategy would be chosen in which all participants would
be selected in a systematic manner.
Will your research involve adults who might be identified by you or anyone else reading the
research? (Yes/No). If yes, how will you obtain their consent?
The key aim of this investigation is to assess accounting fraud prevention in
Australia.
This investigation accomplishes the research aim by applying several elements like
introduction, literature review as well as, research methodology.
Both secondary as well as primary data collection technique would be implemented
for capturing facts as well as figures associated with research issue.
Qualitative research approach will be used to get theoretical data associated with
research concerns.
Moreover, statistical data analysis will be applied to analyzing gathered investigation
data.
Non-probability sampling technique would be implemented to select the sample
through a high amount of population
Ethics Checklist (Participants)
How do you propose to select your participants?
Non-probability sampling technique would be applied for selecting participants
through high amount of population.
Non- probability sampling tool would be implemented through a research scholar to
complete investigation.
Non-probability sampling strategy would be chosen in which all participants would
be selected in a systematic manner.
Will your research involve adults who might be identified by you or anyone else reading the
research? (Yes/No). If yes, how will you obtain their consent?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPLIED BUSINESS RESEARCH 23
No
Does your research involve children under eighteen years old? (Yes/No)
No
Ethics Checklist (Participants)
Will, your research takes place in an institution? (Yes/No)
No
Are in a position of power over participants? (Yes/No), if yes, describe any ethical
implication a dhow you deal with them
No
Describe any risk or harm to participants which might be associated with your research and
No
Does your research involve children under eighteen years old? (Yes/No)
No
Ethics Checklist (Participants)
Will, your research takes place in an institution? (Yes/No)
No
Are in a position of power over participants? (Yes/No), if yes, describe any ethical
implication a dhow you deal with them
No
Describe any risk or harm to participants which might be associated with your research and
APPLIED BUSINESS RESEARCH 24
how would you propose to minimize these risks
a. The respondents will be chosen by convenience sampling where researcher would choose
responses as per their convenience.
b. The interviews would be conducted after taking confirmation with the top accounting
manager in written form as well as their responses would be recorded after taking the
consent.
c. The secondary data would be gathered via genuine sources as well as peer-reviewed
journals in terms of obtaining quality data.
d. All analyzed and interpreted data will be published without any biases and quality would
be kept in the research study.
Privacy and Confidentiality
How will you protect the confidentiality and privacy of your participants?
An investigator would not pressurize the participants for providing personal data and
will not manipulate in these data.
Under this investigation, data protection act 1988 would be applied through an
investigator.
According to this act, the researcher will not demonstrate confidential data to anyone
before, during as well as after research.
Before gathering information, an investigator would take prior consent to the
manager with the purpose of this investigation.
Will it be possible to identify participants from published data? (Yes/No), if yes, is there any
how would you propose to minimize these risks
a. The respondents will be chosen by convenience sampling where researcher would choose
responses as per their convenience.
b. The interviews would be conducted after taking confirmation with the top accounting
manager in written form as well as their responses would be recorded after taking the
consent.
c. The secondary data would be gathered via genuine sources as well as peer-reviewed
journals in terms of obtaining quality data.
d. All analyzed and interpreted data will be published without any biases and quality would
be kept in the research study.
Privacy and Confidentiality
How will you protect the confidentiality and privacy of your participants?
An investigator would not pressurize the participants for providing personal data and
will not manipulate in these data.
Under this investigation, data protection act 1988 would be applied through an
investigator.
According to this act, the researcher will not demonstrate confidential data to anyone
before, during as well as after research.
Before gathering information, an investigator would take prior consent to the
manager with the purpose of this investigation.
Will it be possible to identify participants from published data? (Yes/No), if yes, is there any
APPLIED BUSINESS RESEARCH 25
ethical issue which may arise from such identification.
No
Data Collection and Storage
Who will have access to the data?
The researcher will apply both primary and secondary data gathering technique as it
would support the researcher for obtaining the reliable outcome
The interview would be used for gathering the primary data as it would help to
obtain authentic facts related to the investigation.
How will you store the data in order to ensure its security
All interpretation would be used and results would be published without any personal biases
as well as quality would be maintained in the proposed research.
Note: Ethics Approval Form is not counted toward the word count of the assessment, only
fill in this form if applicable. Include this form as appendices.
ethical issue which may arise from such identification.
No
Data Collection and Storage
Who will have access to the data?
The researcher will apply both primary and secondary data gathering technique as it
would support the researcher for obtaining the reliable outcome
The interview would be used for gathering the primary data as it would help to
obtain authentic facts related to the investigation.
How will you store the data in order to ensure its security
All interpretation would be used and results would be published without any personal biases
as well as quality would be maintained in the proposed research.
Note: Ethics Approval Form is not counted toward the word count of the assessment, only
fill in this form if applicable. Include this form as appendices.
1 out of 25
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.