Beruflich Dokumente
Kultur Dokumente
The study is intending to examine and evaluate the role and value of auditing as a
professional practice in detecting various forms of fraud at departmental/ divisional/and
organisation level; the extent to which auditing can work as a tool to prevent fraud; and
the authority at which auditing as a professional practice has on reporting or exposing or
disclosing fraud.
All data collect shall be processed using MS-excel. Testing of statistics results shall be
done using Regression analysis and correlation.
The study attempts to reveal that auditing has a paramount role to play in controlling
institutional fraud in Tanzania.
i
LIST OF ABREVIATIONS
ii
TABLE OF CONTENTS
CHAPTER ONE
The report by Ernest & Young 2007 in ‘External Payment Arrears account (EPA)’ in the
Bank of Tanzania (BOT) revealed either outright theft or doubtful transactions leading to
total loss of Tshs 133 billion.
Such examples and many others of similar nature have been uncovered by Auditors in
doing their professional work. No other professional field in Tanzania has ever
reported/disclosed frauds of the amount that has been detected and uncovered by various
auditing engagements.
iii
Relevance of audit as a technique to detect and control fraud comes into the focus when
considering the role that it has played in exposing the vice. The relevance and reliability
of auditing in this role pose a need to be studied and evaluated. Argument in support of
the reliability of auditing in discovering and reporting fraud is supported by the fact that
no audit report to this regard has ever been proven wrong in Tanzania.
Many entities in Tanzania, especially government ministries or its department, were not
properly audited in the past especially due to lack of will or funds to conduct auditing. In
the recent years until present the situation has improved. Where audits have been
conducted, only few government entities have been awarded clean (Unqualified)
certificates. This has been due to irregularities found by auditors in these entities
including misuse of assets, unauthorised transfer of funds, overspending, and lack of
proper procurement systems and improper accounting that does not meet the GAAPs.
Auditing in Tanzania has uncovered serious frauds, completed or in the process of being
committed.
The professional practice of auditing, however, has not received the value or recognition
it deserves and its appropriateness as a tool/weapon to fight fraud in all its forms has not
been fully appreciated.
The main focus this study will take Determining and evaluating the value and
appropriateness of Auditing in controlling fraud and seeing whether and the extent to
which this professional practice can be used as both a social and legal tool in fighting
fraud.
iv
This study takes a case study of the CAG’s Head office, Dar Es Salaam.
v
(4) What are the major problems facing the work of auditing with regards to
prevention, detection and reporting?
(5) What benefits would the society get if auditing was to be given a greater legal
power?
Due to broad work coverage of the departments identified for being studied and a big
volume of data available, the researchers will confine themselves to number, type and
value (in financial terms) of irregularities reported by the CAG for the period of
years and cases that have been taken to court or other method of bringing the implicated
persons to task, during the period under review.
vi
1.7 Limitation of the study
The study is expected to face the following drawbacks.
i. Time Limitation: Time available for this study is only 5 months. This is not well
enough to conduct exhaustive study and analysis of relevant massive
information / data that will be collected.
ii. Inadequate Resources: The research will face two major categories of resource
shortages.
(i) IT systems and experts to process and analyses data using appropriate
hardware and software that could notably simplify the work and take a
lot more data into the study in relatively much shorter period.
(ii) Financial inadequacy: The budget approved for study is only Tshs
10,000,000.This amount is not enough to cater for the all necessary
expenditures that the researchers are supposed to face in the course of
the study.
i. Bureaucratic delay and restrictions: since the study will be conducted in a
Government set up, all long and sometimes troublesome bureaucratic procedure
will have to be followed. Possible restrictions to some information are also
inevitable.
vii
CHAPTER TWO
Literature Review
2.0 Introduction
A literature review surveys scholarly articles, books and other sources including
dissertation, conference proceeding relevant to a particular issue area of research, or
theory, providing description summary and critical evaluation of each work. This is an
important process of research. It is a process of identifying or locating, reading,
summarizing and incorporating in researcher study documents having materials which are
related to the problem under investigation. Literature review includes the review of
books, research reports, journals, articles, papers and magazines, committee minutes,
audio and video tapes, internet publications and other electronic sources such as CD-
ROMs.
Literature review begins with theoretical literature review and thereafter an empirical
framework will be presented.
viii
Fraud
IFAC (2005) page 277 under ISA 240 states that ‘fraud’ is an intentional act by one or
more individuals among management, those charged with governance, employees or third
parties, involving the use of deception to obtain an unjust or illegal advantage.
The term ‘fraud’ is defined in Black’s Law Dictionary (Sixth Edition, 1990) as:
“An intentional perversion of truth for the purpose of inducing another in reliance upon it
to part with some valuable thing belonging to him or to surrender a legal right. A false
representation of a matter of fact, whether by words or by conduct, by false or misleading
allegations, or by concealment of that which should have been disclosed, which deceives
and is intended to deceive another so that he shall act upon it to his legal injury... A
generic term, embracing all multifarious means which human ingenuity can devise, and
which are resorted to by one individual to get advantage over another by false
suggestions or by suppression of truth, and includes all surprise, trick, cunning,
dissembling, and any unfair way by which another is cheated.”
Forms of Fraud
Fraud takes many forms. Some examples include embezzlement, kickbacks, theft,
fraudulent financial reporting, environmental crimes, software piracy, bid rigging,
computer related crime, money laundering, identity theft, credit card fraud, check fraud,
fraudulent compensation claims, ghost employees schemes, exposure report schemes,
dummy vendors, unreported conflicts of interest and the like.
ix
i. Manipulation, falsification (including forgery), or alteration of accounting
records or supporting documentation from which the financial statements are
prepared.
ii. Misrepresentation in or intentional omission from, the financial statements of
events, transactions or other significant information.
iii. Intentional misapplication of accounting principles relating to amounts,
classification, manner of presentation, or disclosure.
x
v. Inappropriate wealth of those charged with management or governance
vi. Protective behaviour, which is trying to hold close and sensitive papers as
personal and at times avoiding getting help from workers even at times of
illnesses or absence.
vii. Lack of sufficient vouchers and supporting documents
viii. Excessive bad debts written off
ix. Too many and common post-dated cheques
x. Excessive spoilage or damaged goods which may indicate a scheme between
some employees and shippers
xi. Failure to reconcile bank statements on time or a conflict of the duties on the part
of the person performing reconciliation.
xii. A significant lack of internal control which indicates that questionable practice
may be hidden.
It is important to note here that the indicators of fraud are not all pervasive and there is a
need to study each entity separately rather taking these indicators a blanket proof. In
many cases the indicators are observed in group or sequence.
Fraud Control
2.1.3 Strength and Weakness of Auditing in Fraud Control
Millichamp (2002) pg 350 and 351 states that; the audit plays a big role on making sure
that the entire organisation funds are proper controlled.
The strength of audit and investigation are;
i. To reduce the chance of fraud, waste and abuse
ii. Lead to proper maintenance of books of accounts and other documents.
iii. Regulation and procedures of public regulations are abided
iv. Proper segregation of duties
Despite of the strength, the audit and investigation has also some weaknesses which
include
xi
i. Possibility of mutual contact between accountants and auditors lead to corruption
during conducting the audit work.
ii. It needs more competent staffs
iii. It is complicate as it needs frequently rotation of staffs to different position
xii
Mwantembe, E. (2002), research report on “Detection and Prevention of Fraud and
Embezzlement” concluded that fraud occurs because of the non-observance of the
existing regulations not necessarily for lack of systems and procedures. Fraud will be
kept to the minimum if governing procedures are regularly reviewed and strictly
observed.
Wells, Joseph T. (2001), contends that it is important for the professionals and the public
in general to understand what motivates people to commit fraud so that they can be better
in assessing risk and assist employers or clients in implementing appropriate preventive
and detective measures.
Facing the fact, one must ask the logical question, how do good people go badly? An
obvious answer is greed. But not all so called greedy people do lie, cheat and steal to get
what they want.
Another reason is related to financial pressure. In the late research it was found that the
great majority committed fraud to meet their financial obligation.
Baree, M. A. (2001) points out the reason as to why employees commit fraud. A
perceived opportunity such as the absence of or circumvention of controls that enable to
be prevented or detected.
An offender with motivation to steal money, whether through cupidity, living beyond
one’s means and the existence of debts sometimes associated with drug or gambling
addiction, presence of financial crisis or various work related pressure.
Farrell, B.R and Franco, J.R (1999), stresses out that, it is the trusted and valid
employee who generally commits fraud. When frauds are discovered there is often shock
and disbelieve that they could have committed such an act.
In most cases, offenders do not view stealing from companies as harmful, they may think
that the crime was victimless, and they do not view their theft as being devastating or
xiii
costly to the business. Many frauds occur because the opportunity exists and the
perpetrator does not believe he or she will be caught.
xiv
CHAPTER THREE
xv
information regarding the accounting and finance department. It might be the head of
department.
3.5. Sample Size
A sample will be selected at random from the population. It will be of a reasonable size.
In our case, a sample of about fifteen will be taken. But for non probability sampling, it
will base mostly from among auditors. Some of them will be interviewed while others
will be given questionnaires to fill in.
3.6.1.1. Interview
This will focus much on the staffs who are working in the auditing department.
Interviewing these people will help in getting relevant information regarding the fraud
control in auditing.
3.6.1.2. Observation
This will involve observing how the auditing process is being carried by CAG’s staffs.
3.6.1.3. Questionnaire
This is the list of questions prepared by the researcher and distributed to the population
sample requesting them to give more information. The questionnaire will also be sent to
those who link with CAG’s office for getting more information.
xvi
3.6.2. Secondary Sources
These are the sources which give information obtained not from the original sources, as
they come from research and studies others have done. For example books, manuals,
journals, articles, etc
3.6.2.1. Documentation
This method involves gathering data from the various books of auditing, manuals and
other related documents concerning fraud control.
xvii
CHAPTER FOUR
ANNEXES
4.1. RESEARCH BUDGET
The researchers will need enough funds so as to conduct the study. The funds will be
provided by HESLB for eleven (11) researchers.
xviii
4.2 FIELD WORK SCHEDULE
This study will take 17 weeks from October to January. The activities which will be done
for the whole period have been summarized below;
Weeks
Activity 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Proposal
writing
Structuring
questionnaire
Data
collection
Literature
review
Data entry
Data
presentation
Hypothesis
testing
Interpreting
findings
Report
writing
Binding and
Submission
xix
4.3 QUESTIONNAIRES
Dear Interviewee,
We are kindly requesting you to answer the under mentioned questions as part of the
fulfillment of my research for academic award in Advanced Diploma in Accountancy
(ADA). The questions are purely for academic demand and not otherwise against you.
The questionnaires include spaces in which to indicate positive (Y) or negative (N)
answers.
This paper consists of two sections A and B. Section A is about research questions and
section B is about comments.
We wish to express sincere appreciation for the assistance you will extend to me in this
regard.
SECTION A:
Questions;
1) Do you know any factors which influence the appropriateness of audit in fraud
control?
Y…….. N……… N/A ………
If Yes, What are they?
Explain
………………………………………………………………………………………
………………………………………………………………………………………
3) Does the auditor meet the directors at least annually to discuss written reports of
audit?
xx
Y ………, N ………., N/A …………
If No,
Explain
………………………………………………………………………………............
………………………………………………………………………………………
4) Do you know any challenges facing the work of auditor in fraud control?
Y………, N ...…, N/A …………
If Yes, What are they?
……………………………………………………………………………………………
…………………………………………………………………………………
5) Does the auditor determine the accuracy of financial reporting systems and other
management systems?
Y……., N ………, N/A …………
If No,
Explain ……………………………………………………………………………..
………………………………………………………………………………………
6) Does the auditor review insurance coverage and determine that property damage
coverage is adequate in relation to book?
Y ………., N ………., N/A ………
If No,
Explain
………………………………………………………………………………………
……………………………………………………………………………………....
7) Does the auditor determine the validity and completeness of out standings?
Y …………., N …………, N/A ……………….
xxi
If No,
Explain
……………………………………………………………………………………………
…………………………………………………………………………………
8) Does the auditor perform periodic audit procedures for significant automated
applications to determine that workflow is processed accurately and is in
conformity with operating manuals?
Y …………, N ………., N/A …………..
If No,
Explain……………………………………………………………………………..
………..…………………………………………………………………………….
SECTION B:
Comments;
Please include your own comment in the blank space provided below on the subject of
the role of auditor in fraud control in the organization.
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………
Thank you in advance for sparing your valuable time to fill in this questionnaire.
xxii
References
xxiii