Factors and Motivation of Fraud in the Corporate Sector:A Literature Review
Subscribe/Renew Journal
Purpose: In the wake of big corporates houses failing to evade corporate frauds, a study was needed to identify primary factors leading to fraud. The main purpose of this paper is to identify the major factors and motivations for fraud in the corporate sector.
Design/Methodology/Approach: There is a big pool of literature regarding the motivation of fraud. This paper aims to consolidate and conduct a literature review to identify the most prominent motivation factors resulting into fraud in the corporate sector. The data for the study was collected from secondary sources such as books, journals, reports etc.
Findings: The study formulated a new fraud motivation model, where the integrity of the manager or the individual is given more importance than other factors. The study also identified various individual and business pressures that could motivate the managers or individuals that could lead to irrational behavior and fraud. The study identifies integrity as the most important factor for that motivates an individual to commit fraud.
Research Limitation/Implications: The study is based on secondary source of data. The model prepared is yet to be applied.
Originality/Value: A new fraud motivation model based on integrity, pressure, opportunity, capability and rationalization was structured.
Keywords
- ACL. (2013). Detecting and preventing Fraud with data analytics. ACL Services Ltd.
- Albrecht, W. S., Albrecht, C. C., & Albrecht, C. O. (2006). Fraud examination. New York, NY: Thomson South-Western.
- Albrecht, W. S., Howe, K. R., & Romney, M. B. (1984). Deterring fraud: The internal auditor’s perspective. Altomonte Springs, FL: The Institute of Internal Auditors’ Research Foundation.
- Amara, I., Amar, A. B., & Anis, J. (2013). Detection of fraud in financial statements: French companies as a case study. International Journal of Academic Research in Accounting, Finance and Management Sciences, 3(3), 40-51.
- Association of Certified Fraud Examiners. (2009). Fraud examiners manual. Austin, TX: ACFE.
- Baker, C. R., Cohanier, B., & Leo, N. J. (2016). Considerations beyond the fraud triangle in the fraud at société générale. Journal of Forensic & Investigative Accounting, 8(3), 462-479.
- Beasens, B., Vlasselaer, V. V., & Verbeke, W. (2015). Fraud analytics. North California: SAS Institute Inc.
- Berry, C. M., Sackett, P. R., & Wiem, S. (2007). A review of recent developments in integrity test research. Personal Psychology, 60, 270-301.
- Betts, G. L. (1947). Biographical case history. Minneapolis, MN: Educational Test Bureau.
- Betts, G. L., & Cassel, R. N. (1957). The life experience inventory. Cincinnati: C.A. Gregory Company.
- Bonny, P., Goode, S., & Lacey, D. (2015). Revisiting employee fraud: Gender, investigation outcomes and offender motivation. Journal of Financial Crime, 22(4), 447-467. doi:https://doi.org/10.1108/JFC-04-2014-0018
- Bukoski, W. J. (1997). Meta-analysis of drug abuse prevention programs. Rockvile: National Institute on Drug Abuse.
- Byle, K. A., & Holtgraves, T. M. (2008). Integrity testing, personality, and design: Interpreting the personnel reaction blank. Journal of Business Psychology, 22, 287-295. doi:10.1007/s10869-008-9059-z
- Cohen, J., Ding, Y., Lesage, C., & Stolowy, H. (2010). Corporate fraud and managers’ behavior: Evidence from the press. Journal of Business Ethics, 95, 271-315. doi:10.1007/s10551-011-0857-2 Cormack, R. W., & Stand, A. L. (1970). Trustworthiness altitude survey. Oakbrook, IL: Personnel Systems Corporation.
- Cressey, D. R. (1950). The criminal violation of financial trust. American Sociological Review, 15(6), 738-743.
- Cressey, D. R. (1953). Other People’s Money: The social psychology of embezzlement. New York, NY: The Free Press.
- Deloitte. (2015). India Banking Fraud Survey-Edition II. India: Deloitte. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/in/Documents/finance/in-fa-banking-fraud-survey-noexp.pdf
- Dorminey, J., Fleming, A. S., Kranacher, M.-J., & Riley, Jr, R. A. (2012). The evolution of fraud theory. Issues in Accounting Education, 27(2), 555-579.
- Durbrow, B. R. (1983). Comparative summary of results of concurrent and predictive studies using the Accutrac Evaluation System. Cincinati, OH: Barbrisons Management Systems.
- Fisher, K. (2015). The psychology of fraud: What motivates fraudsters to commit crime? Texas: Texas Woman’s University.
- Ghazali, M. Z., Rahim, M. S., Ali, A., & Abidin, S. (2014). A preliminary study on fraud prevention and detection at the state and local government entities in Malaysia. Procedia - Social and Behavioral Sciences, 437-444.
- Goodstein, L. D., & Lanyon, R. I. (1999). Applications of personality assessment to the workplace: A review. Journal of Business and Psychology, 13(3), 291-322. Retrieved February 03, 2018, from http://www.jstor.org/stable/25092641
- Gough, H. G. (1972). Manual for the personnel reaction blank. Palo Alto, CA: Consulting Psychologists Press.
- Gough, H. G. (1975). Manual for the California psychological inventory. Palo Alto, CA: Consulting Psycologists Press.
- Grant Thornton India LLP. (2016). Financial and corporate frauds. New Delhi, India: Grant Thornton India LLP. Retrieved from http://www.grantthornton.in/globalassets/1.-member-firms/india/assets/pdfs/financial-and-corporate-frauds.pdf
- Harris, W. G., & Gentry, M. U. (1992). Stanton survey: New edition test manual. Charlotte: Pinkerton Services Group.
- Helenne Doody and Technical Information Service. (2009). Corporate Fraud - Topic Gateway Series No. 57. London, United Kingdom: CIMA. Retrieved from http://www.cimaglobal.com/Documents/ImportedDocuments/cid_tg_corporate_fraud_may09.pdf.pdf
- Hogan, J., & Hogan, R. (1986). Hogan personality series manual.
- Hussain, M. M., Kennedy, P., & Kierstead, V. (2010). Can audit prevent fraudulent financial reporting practices? Study of some motivational factors in two Atlantic Canadian entities. Issues in Social and Environmental Accounting, 4(1), 65-73.
- Kalera, A., & D’cruz, D. (2016). Identity Theft is the largest contributor to Fraud in India. India: Experian. Retrieved from http://www.experian.in/assets/Experian-launches-India-Fraud-Report-2016.pdf
- Kassem, R., & Higson, A. (2012). The new fraud triangle model. Journal of Emerging Trends in Economics and Management Sciences (JETEMS), 3(3), 191-195.
- KPMG. (2016). Global profiles of the fraudster: Technology enables and weak controls fuel the fraud. KPMG International. Retrieved December 13, 2017, from https://assets.kpmg.com/content/dam/kpmg/pdf/2016/05/profilesof-the-fraudster.pdf
- KPMG. (2017). Supply chain fraud. KPMG LLP.
- Kranacher, M. J., Riley, R. A., & Wells, J. T. (2011). Forensic accounting and fraud examination. New York, NY: John Wiley & Sons.
- Kundu, S., & Rao, N. (2014). Reasons of banking fraud - A Case of Indian public sector banks. International Journal of Information Systems Management Research & Development, 11-24. Retrieved from http://www.tjprc.org/publishpapers/2-39-1403249767-Information%20systems%20-%20IJISMRD%20%20-%20Reasons%20of%20banking%20fraud%20%20-%20%20%20Sukanya%20Kandu.pdf
- LexisNexis Risk Solutions. (2012). Fraud and Money Laundering: Can you think like a bad guy? LexisNexis Risk Solutions. Retrieved from https://www.lexisnexis.com/risk/intl/en/resources/whitepaper/Fraud-and-Money-Laundering.pdf
- London House Press. (1980). Emloyee Attitude Inventory. Park Ridge, IL.
- London House Press. (1989). Personnel selection inventory administrators manual. Park Ridge.
- London House, Inc. (1986). The Employment Productivity Index (EPI). Park Ridge, IL: London House Press.
- Lou, Y.-I., & Wang, M.-L. (2009, February). Fraud risk factor of the fraud triangle assessing the likelihood of fraudulent financial reporting. Journal of Business & Economics Research, 7(2), 61-78.
- Lousig-Nont, G. M. (1989). Phase II Profile: Integrity status inventory for prospective employees. Las-Vegas: Lousing-Nont & Associates Inc.
- Manurung, D. T., & Hardika, A. L. (2015). Analysis of factors that influence financial statement fraud in the perspective fraud diamond: Empirical study on banking companies listed on the Indonesia Stock Exchange year 2012 to 2014. International Conference on Accounting Studies (pp. 289-286). Johor, Malaysia: ICAS.
- Mawanza, W. (2014). An analysis of the main forces of workplace fraud in Zimbabwean organisations: The fraud triangle perspective. International Journal of Management Sciences and Business Research, 3(2), 86-94.
- Miller, J. F., & Bradley, P. (1975). Milby Profile. Minneapolis, MN: Milby System.
- Mohd-Sanusi, Z., Khalid, N. H., & Mahir, A. (2015). An evaluation of clients’ fraud reasoning motives in assessing fraud risks: From the perspective of external and internal auditors. Procedia Economics and Finance, 31, 2-12.
- Neuman, G. A., & Baydoun, R. (1998). An empirical examination of overt and covert integrity tests. Journal of Business and Psychology, 13(1), 65-79. Retrieved February 03, 2018, from http://www.jstor.org/stable/2509262
- Nicol, A. A., & Paunonen, S. V. (2002). Validity evidence for the different item styles of overt honesty measures. Journal of Business and Psychology, 16(3), 431-445. Retrieved February 04, 2018, from http://www.jstor.org/stable/25092781
- Olaniyi, T. A., Saad, T., Abiola, W. O., & Adebayo, S. A. (2013). Employee motivation and public sector fraud: Evidence from kwara state, Nigeria. Journal of Humanities, Social Sciences and Creative Arts, 8, 13-24.
- Ones, D. S., Viswesvaran, C., & Schmidt, F. L. (1993). Comprehensive meta-analysis of integrity test validities: Findings and Implications for personnel selection and theories of job performance. Journal of Applied Psychology Monograph, 78(4), 679-703.
- Paajanen, G. E. (1985). PDI employment inventory. Minneapolis: Personnel Decisions.
- PricewaterhouseCoopers Private Limited. (2015). Current fraud trends in the financial sector. PricewaterhouseCoopers Private Limited.
- Ramamoorti, S., & Olsen, W. (2007). Fraud: The human factor. Financial Executive.
- Ramamoorti, S., Morrison, D., & Koletar, J. W. (2009). Bringing Freud to Fraud: Understanding the State-of-Mind of the C-Level Suite/White Collar Offender Through ‘‘A-B-C’’ Analysis. Working paper, Institute for Fraud Prevention., 1-35.
- Reid Psychological Systems. (1951). Reid Report. Chicago, IL.
- Ross, P. (2016). Fraud risk increases in difficult economies. KPMG Forensic Focus.
- Sackett, P. R. (1994). Integrity Testing for Personnel Selection. Current Directions in Psychological Science, 3(3), 73-76. Retrieved Februray 02, 2018, from http://www.jstor.org/stable/20182271
- Saxe, L. (1994). Detection of Deception: Polygraph and Integrity Tests. Current Directions in Psychological Science, 3(3), 66-73. Retrieved Februrary 02, 2018, from http://www.jstor.org/stable/20182270
- Science Research Associates. (1989). Personal Audit Examiner’s Manual. Chicago, IL: Author.
- Sorunke, O. A. (2016). Personal ethics and fraudster motivation: The missing link in fraud triangle and fraud diamond theories. International Journal of Academic Research in Business and Social Sciences, 6(2), 159-165.
- Sutherland, E. H. (1940). White-collar Criminality. American Sociological Review, 5(1), 1-12.
- Swain, S., & Pani, L. K. (2016). Frauds in Indian banking: Aspects, reasons, trend-analysis and suggestive measures. International Journal of Business and Management Invention, 1-9. Retrieved from http://www.ijbmi.org/papers/Vol(5)7/version-2/A05720109.pdf
- Tippett, K. E. (n.d.). The Individual’s Motivation for Fraud. Retrieved 11 4, 2017, from http://www.mclaincalhoun.com/~mclainca/images/MOTIVATION%20FOR%20FRAUD.pd
- West, J., Bhattacharya, M., & Islam, R. (2015, October 24). Intelligent Financial Fraud Detectfion Practices: An Investigation. Retrieved from https://arxiv.org: https://arxiv.org/ftp/arxiv/papers/1510/1510.07165.pdf
- Wolfe, D. T., & Hermanson, D. R. (2004). The fraud diamond: Considering the four elements of fraud. CPA Journal, 74(12), 38-42.
- Zareapoor, M., Seeja, K. R., & Alam, M. A. (2012). Analysis of credit card fraud detection techniques: Based on certain design criteria. International Journal of Computer Applications, 52(3), 35-42.
Abstract Views: 279
PDF Views: 0