Impact of Fraud on Nigerian Banks
Impact of Fraud on Nigerian Banks
BY
AUGUST, 2021
DECLARATION
I TIAJNI KEHINDE HUSSEIN do humbly declare that this research work entitled
Jos-Nigeria. It was carried out under the supervision of Mr. Ishaya Lalu. I further
acknowledgement has been made in the text and stands subject to plagiarism
scrutiny.
__________________________ __________________
Tijani Kehinde Hussein Date
ii
CERTIFICATION
Degree in Accounting.
_____________________ ______________________
Mr. Ishaya Lalu Date
iii
DEDICATION
This project is dedicated to Almighty Allah, The Originator, The Producer, and
The Initiator of my life. Also to my ever loving caring wife Mrs. Oluwatoyin B. A.
iv
ACKNOWLEDGEMENTS
My pure gratitude goes to Almighty Allah, my creator, who has been the source
thanks to many people for their contributions and assistance especially Mr.
Ishaya Lalu my supervisor for his immense contributions amidst your tight
schedules and fatherly advice to make the research work a great success.
I equally extend my regards to my level coordinator Mr. Samuel I. and all the
entire staff of Accounting Department especially Mr. Kutus Martins, Mr, Pirdam,
Mr. Lukman, Mr. Osareme and other staff for their understanding and
Oluwatoyin T. and my mother for their support for making this project a
successful one.
I wish to thank my colleagues and boss, Sgt Bamidele Ikoko, Sgt Abdullahi
Ibrahim, Sgt Sani Abdullahi, Cpl Adamu Abdulmalik (Rtd), Cpl Ayodele Olasupo,
Cpl Iyanda Olayinka (Engr), Cpl Etim Odudu-Obasi, LCpl Ogbo Joshua, Daniel,
Oluwafemi and also to my course mate, Moses Kadzia, Adeniyi Favour and many
more for their generosity, prayer and assistance throughout the programme. I say
v
ABSTRACT
vi
TABLE OF CONTENTS
Page
Title Page i
Declaration ii
Certification iii
Dedication iv
Acknowledgements v
Abstract vi
List of Tables x
List of Figures x
vii
CHAPTER TWO: LITERATURE REVIEW
2.1 Introduction 7
3.1 Introduction 46
CHAPTER FOUR
4.1 Introduction 49
5.2 Conclusions 55
5.3 Recommendations 56
viii
Reference 58
Appendix 65
ix
LIST OF TABLES
Table 4.1: Fraud and Forgery cases and amount of money lost by
variables. 52
LIST OF FIGURES
x
CHAPTER ONE
INTRODUCTION
among the most notable being Enron in 2001, the Sarbanes Oxley Act was passed
by the United States of America congress in 2002. The purpose of the Act is to
committed by Transmile Group Berhad, Tat Sang Holding and Megan Media
Holdings Berhad, (2007) have diminished the firms’ value and shareholders’
wealth. This has possibly had a negative impact on foreign direct investments.
Concomitant with the financial and nonfinancial damage, the faith and reliance
(2007), out of every two companies worldwide, one had been a target of
1
In response to the aforementioned crisis, the improvement of financial statement
fraud controls and the integrated strategies of prevention, detection and action to
chief executive officer, chief financial officer, chief operating officer and
(KPMG 2007).To date, most discussions have stressed prevention and detection
previous academic researchers did not examine the actual practices of financial
improvement in such control is required. Johl et al. (2013) studied the actual
Malaysian evidence, Johl et al. (2013) found little attention had been given to
control.
2
statements or financial reports are supposed to be tools upon which users can
free from any material misstatements. This is very important for investors to be
businesses (PWC, 2012). Thus, the research found financial statement fraud has
According to ACFE (2012), financial statement fraud cases triggered the greatest
median loss at $1 million despite the small number of cases involved in the
research investigation. The issue is serious as the actual level of economic crime
and the associated financial and non-financial damage has been reported to be
on the rise as the number of financial statement fraud cases has increased since
5% of its revenue each year due to significant frauds which also include financial
statement fraud. If this rate of loss is applied to 2011 Gross World Product, this
3
causes an anticipated fraud loss of $3.5 trillion (ACFE, 2012). The impact is that
shareholder value and bankruptcies (Center for Audit Quality, 2010). As such, it
leads to the question what is lacking in the internal control system adopted by the
companies?
Strategies in detecting and preventing fraud cases have been presented in the
literature (Vaughan, 2007; Wells, 2007; KPMG, 2009; PWC, 2012; Rejda, 2013).
financial statement fraud control and the awareness of financial statement fraud
The main objective of this study is to examine the effect of financial statement
performance;
effectiveness;
4
To investigate the relationship between bank fraud and organisational
survival.
Specifically, the research focuses on the following questions which are related to
Hypothesis One
organisational performance.
Hypothesis Two
performance.
5
1.6 Significance of the Study
The recommendations in this research work will provide effective roles for
Considering that the management of a company as well as its auditors has to play
statement fraud. These strategies will also help businesses (1) to identify fraud in
a timely manner and minimize the resulting damage, (2) to enhance the
conduct their business ethically. The contribution of this research would enhance
Banks was used as a case study. However, the research was limited to Nigeria
Banks in Ibadan due to the schedule of researcher is from year 2000 to 2017.
6
report suspected fraud because of its imprecise definition, vagueness over
directors’ responsibilities and confusion about the reason for reporting fraud. The
found that most audit reports issued in the year prior to the fraud coming to light
Panel (2009) figures suggest that UK fraud involving false accounting peaked in
the early 1990s, falling until 1996 when reported cases of false accounting rose
again, though not to the same level. Similar data available for Australia suggest
that financial statement fraud peaks in times of recession (Fraud Advisory Panel
2009).
7
Corporate Governance: A set of process, customs, policies, laws etc affecting the
8
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
This chapter presents the literature as well as the conceptual framework and
theoretical framework for the study so as to serve as a link between the past and
the present.
The concept of fraud has been defined in various societies mostly in line with the
culture or prescribed social life of the people. Hornby (2015) defined fraud as an
illegally. Olaoye (2014) noted that fraud consists of both the use of deception to
who defined fraud as any activity that is painted with initial intention to cheat or
deceive.
Association of Certified Fraud Examiners (2014) further defines fraud as the use
9
of one’s occupation for personal enrichment through the deliberate misuse,
false pretence (FBI, 2009). In legal terms, fraud is seen as the act of depriving a
entitled to, but for the perpetration of fraud. In its lexical meaning, fraud is an
advantage. Therefore, for any action to constitute a fraud there must be dishonest
intention to benefit (on the part of the perpetrator) at the detriment of another
person or organization.
concealment of the theft. It also involves the conversion of the stolen assets or
(WOE)” Onibudo, (2012). For any fraud to occur there must be a will, an
opportunity and exit (escape route). A fraud will only occur if the perpetrators
have the will to commit the fraud, if the opportunity to commit the fraud is
institutions that are against fraud or related deviant behaviour. Fraud is a global
phenomenon. It is not unique to the banking industry or for that matter, peculiar
to only Nigeria.
10
With the crash of major multinational corporations like Enron (in the United
States of America) coupled with high level allegations and actual cases of
have resorted to developing ethical guidelines and codes of ethics. The whole
to promote the reputation of such firms in their chosen industry, earn the
and Idolor, 2012). In the present Nigerian epoch, many youths and elder citizens
alike want to make it within the shortest possible time, because banks deal with
money, and money related businesses, it is no wonder that they have become the
implement the act. The following types which are not in any way completely
exhaustive are the most common types of bank frauds in Nigeria identified by
Ovuakporie (2004);
This is a form of fraud which involves the unlawful collection of monetary items
such as cash, traveler’s cheque and foreign currencies. It could also involve the
11
2.2.1.2 Defalcation
is a common form of bank fraud. Where the bank teller and customer collude to
defalcate, such fraud is usually neatly perpetrated and takes longer time to
agent when he/she pays into the customer’s account and when tellers steal some
customers/clients.
2.2.1.3 Forgeries
Forgeries involve the fraudulent copying and use of customer’s signature to draw
huge amounts of money from the customer’s account without prior consent of
shown that most of such forgeries are perpetrated by internal staff or by outsiders
who act in collusion with employees of the bank who usually are the ones who
In some instances, bank employees borrow from the vaults and teller tills
12
postdated cheque or I.O.U. or even nothing. These borrowings are more
prevalent on weekends and during the end of the month when salaries have not
been paid. Some of the unofficial borrowings from the vault, which could run
into thousands of naira, are used for quick businesses lasting a few hours or days
after which the funds are replaced without any evidence in place that they were
taken in the first place. Such a practice when done frequently and without
official records, soon very easily becomes prone to manipulations, whereby they
resort to other means of balancing the cash in the bank’s vault without ever
foreign exchange that has been officially allocated to the bank, to meet
customer’s needs and demand, to the black market using some ‘ghost customers”
and naïve customers at exchange rates that are higher than the official rate and
thus claiming the balance once the unsuspecting customer has departed. These
practices usually find fertile grounds to grow in banks which have weak control,
(Ovuakporie, 2004).
2.2.1.6 Impersonation
Impersonation involves assuming the role of another person with the intent of
13
obtain new cheque books which are consequently utilized to commit fraud is
who can readily make available, the specimen signatures and passport
account to another account being used to commit the fraud. This account would
the banks are transferred. The amounts taken are usually in small sums so that it
will not easily be noticed by top management or other unsuspecting staff of the
inadequate checks and balances such as poor job segregation and lack of detailed
report. This is usually done with the intent of giving undeserved recommendation
and opinion to unsuspecting clients who deal with the bank customers. Some
clients for example will only award contracts to a bank customer if he/she
providers evidence that he/she can do the work and that they are on a sound
footing financially. Such a fraudulent customer connives with the bank staff to
beef up the account all with the aim of portraying himself not only as being
14
capable but also as a persons who will not abscond once the proceeds of the
contracts has been paid. The inflation of statistical data of a customer’s account
(Ovuakporie, 2004).
This involves the deceitful act of legitimizing money obtained from criminal
activity by saving them in the bank for the criminals or helping them transfer it
A common type of fraud in the banking sector is fake payments, which involves
the teller introducing a spurious cheque into his/her cage. It is done with or
without the collaboration of other members of staff or bank customers. This type
examining all vouchers, checks, withdrawal slips and payments on a daily basis
(Egbunike, 2016).
This involves the fraudulent manipulation of the bank’s computer either at the
data collection stage, the input processing stage or even the data dissemination
stage. Computer frauds could also occur due to improper input system, virus,
15
program manipulations, transaction manipulations and cyber thefts. In this
epoch of massive utilization of automated teller machines (ATMs) and online real
time e-banking and commerce; computer frauds arising from cyber thefts and
from it, and a significant proportion of the billions of naira spent annually in the
banking sector to help reduce fraud usually are channeled towards combating
2.2.1.12 Greed
morbid desire to get rich quick in order to live a life of opulence and extravagant
splendor. Greed has in many cases been regarded as the single most important
A poorly staffed bank will usually have a problem of work planning and
assignment of duties.
The bank that is flooded with unqualified and inexperienced staff will of a
necessity have to grapple with the problem of training and supervision of its
officers. This situation can very easily be capitalized upon by the teeming
16
fraudsters that the bank has to contend with in its day to day transactions
(Egbunike, 2016).
Inadequate internal control and checks usually creates a loophole for fraudulent
eliminate frauds, there is a need to always have effective audits, security systems
and ever observant surveillance staff at all times during and after bank official
Lack of adequate training and retraining of employees both on the technical and
the various accounts of the bank on daily, weekly or monthly basis usually will
attract fraud. This loophole can very easily be exploited by bank employees who
pathological desire to steal just for the sake of stealing would naturally not do
17
well as a banker. It is therefore imperative for banks to trace such symptoms
quickly among members of their staff in order to reduce the possibility of fraud
immensely to fraud:
bank staff;
ii. The ease at which the stolen assets are converted after deceitful appropriation;
sanction;
occur. Routine activities are theory of place, where different social actors
intersect in space and time. The people we interact with, the places we travel to,
18
guardians. It is important to note that routine activities theory offers suggestions
about the probability of criminal behavior rather making definite claims about
when crime will occur. The presence of a motivated offender, a suitable target,
and a lack of guardianship does not mean that crime is inevitable. Instead, the
theory argues that the likelihood of crime increases or decreases based on the
existence of these three elements. Moreover, Cohen and Felson (2014) suggest
how their theory applies to studying crime trends at varying macro and micro
location.
Cohen and Felson (2014) state that each successful crime event minimally
requires an offender who is motivated to commit the crime and able to act on this
Routine activities theory does not explain why an offender is motivated to commit
a crime, but instead assumes that motivation is constant. In other words, the
theory presumes that some members of society will be motivated toward criminal
behaviour and will seek to act on these motivations when opportunities arise. If a
motivated offender identifies a viable target, the question becomes whether the
offender is able to carry out his intentions and commit the crime.
19
Presence of
Motivation to commit
opportunities/targets
crime
to commit crime
Absence of capable
guardianship to
prevent crime
In order for a crime to occur, a motivated offender must also identify and engage
a suitable target. Suitable targets can take a number of forms depending on the
nature of the crime (i.e. the particular intent of the offender) and the situational
jewellery who catches the attention of a robber. As noted earlier, one might
consider suitable targets at varying levels of analysis. Cohen and Felson (1979)
suggest how large-scale societal changes influence the quantity of suitable targets
offender.
which bears the potential to dissuade or prevent crime even in the presence of a
20
motivated offender with a selected suitable target. Capable guardianship is an
Formal types of guardianship, such as police officers and other types of law
victimization. Routine activities theory suggests that the presence of these agents
might prevent a crime from happening. Many potential offenders, despite being
Fraud Triangle Theory (FTT) was developed as an idea to investigate the causes of
fraud. It was first coined by Donald R. Cressey (1950) called the FTT (Cressey
2003 in Manurung and Hadian 2013). Cressy in 1950 was troubled with the
question of why people commit financial crime; this is what gives him courage to
21
Pressure
Rationalization Opportunity
FTT describes three factors that are present in every situation of fraud as follows:
committing fraud. Pressure can include almost anything that will motivate
others include financial and non-financial term (Manurung and Hadian 2013).
Statement of Auditing Standards (SAS) No. 99 indicates that there are four
common types of conditions on the pressure that can lead to cheating. The
control weaknesses; poor corporate governance; lack of job rotation and poor
22
supervision among others. According to SAS 99, the chances of financial
statement fraud can occur in three categories of the condition. (i) the nature of
3. Rationalization: This is the attitude, character or set of ethical values that allow
that makes them quite hit rationalize fraudulent actions.(Skousenet, al. 2009).
Rationalization can also be a process through which a fraudster justifies his evil
course of action. Cressey’s findings reveal that all the three elements (perceived
2.3.3 Fraud Diamond Theory (David T. Wolfe and. Dana R. Hermanson 2004)
The Fraud Diamond Theory (FDT) is an extension of FTT that was made by David
T. Wolfe and. Dana R. Hermanson in 2008. They believed that the FTT could be
that play a major in whether fraud may actually occur even with the presence of
the other three elements (Wolfe and Hermanson 2008 in Tugas 2012) FDT can
23
Pressure
Rationalization Opportunity
Capability
The FDT was first published in CPA Magazine in December 2008. The
recognition of the element of capability has involved the six factors expected to
fraud.
ii. The fraud perpetrator must be intellectual to the extent that he/she can be
action.
iii. Fraudster must be egoistic and have strong confident and courage as he will
not be caught.
iv. The fraud perpetrator must be a person who can coerce and pursued other
24
v. Fraudster must be a person who can be able to deceive others or look at
people into their eyes to convincingly and comprehensively tell them lie.
vi. A fraudster must be able to conquer the stress by withholding and hiding the
true face of the matter as well as frequent monitoring the issue in order to
prevent detection.
Wolfe and Hermanson (2008) state, “Opportunity opens the doorway to fraud,
and incentive (i.e. pressure) and rationalization can draw a person toward it.
However, the person must have the capability to recognize the open doorway as
an opportunity and to take advantage of it by walking through, not just once, but
repeatedly”.
transactions and presents the financial results through financial statements. The
statements, namely, (1) the profit and loss account (P&L), (2) the balance sheet,
and (3) notes to the financial statement (Notes). Collectively, the company will
also prepare the cash flow statements of the company (Kwok, 2010). The main
statements are very important to a wide range of internal and external users in
25
making economic decisions, particularly investment decisions (Gordon et al.,
2009). Chapter 2 of the UK Companies Act 2006 requires every company to keep
transactions. Any failure to comply with this provision will be liable to an offence
under section 389 of the Act. To provide reasonable assurance concerning the
the Act further requires the external auditing of the financial statement. In this
case, the company’s shareholders rely upon the reported financial position to
company has responsibility for reporting the outcome of the economic events for
because they will affect the financial condition of the company, including the
The issue of financial statement fraud has been focused upon by the public,
investors, regulators and practitioners due to the huge losses from the reported
26
Crossing (Gomez, 2008) and Adelphia (Barloup et al., 2009), affected the
Consequently, three questions were raised from these accounting scandals in the
US. The first question concerns the reliability of financial information in the US
contain reliable financial information to provide the best tool for investment
statement fraud. The previous studies also discussed the responsibility for
number of global financial statement fraud cases (PWC, 2010). Research done by
group of people that has adequate pressure and opportunity, as this might allow
weak internal controls. The previous cases and studies of financial statement
27
fraud. Besides these reasons, the research differentiates between the two major
involves misleading the company investors, which results in large losses that will
diminish the company’s reputation and the accounting profession. Generally, the
brought to court in 2008 were reported to be £1.1 billion (KPMG, 2009). This
figure indicates the importance of bringing fraud losses under stricter control.
scandals and fraud that started with the savings and loans scandals in late 1980s,
followed by the health care insurance fraud in the late 1990s, and the popularity
Financial statement fraud has been identified as a financial crime, which the UK
Financial Services and Market Act 2000 defines as any offence involving (1)
financial market, or (3) handling the proceeds of crime. The research has viewed
28
financial statement fraud from the perspective of both legislation and academic
literature.
The UK Fraud Act 2006, based on one element of financial statement fraud, states
(2), which includes (2a) false by representation, (2b) fraud by failing to disclose
information and (2c) fraud by abuse of position”. The UK Theft Act 1968 defines
false accounting as “where a person dishonestly with a view to gain for himself
or another or with intent to cause loss to another, which includes (1) destroys,
(2) defaces, conceals or falsifies any accounts or any record or document made
material particular”.
involve the falsification of accounts and records, which, ultimately, misleads the
financial statement users. In the meantime, the UK Financial Services and Market
29
2000, part VIII subsection 7 states that market abuse is recognized when “the
known that the information was false or misleading”. In this case, the false
investors.
statements.
However, KPMG (2010) explains that financial statement fraud occurs when
disclosure will definitely be false. Spathis (2009) and Razaee (2008) add another
30
or unlawful gain. Beasley (2010) argues that financial statement fraud is limited
vice chairperson, chief executive officer, president, chief financial officer and
involves intent and deception by the top management of the company with a set
of well-planned schemes.
The schemes of financial statement fraud may involve the six activities of (1)
recognize, and report economic events and business transactions, (4) intentional
accounting standards, principles, practices and related information, (5) the use
31
and (6) manipulation of accounting practices under the existing rules-based
accounting standards which have become too detailed and easy to circumvent
and contain loopholes that allow companies to hide the economic substance of
their performance’.
Although there are a number of motives for financial statement fraud, the most
(2011) document that financial statement fraud begins with financial and moral
These findings were supported by Carcello and Palmrose (2010), Dechow et al.
(2006) and Lys and Watts (1994) who found that financial distress and poor
financial performance are the most important reasons for the occurrence of
fraud is raised. Brennan and McGrath (2007) state that one of the motives for
(2007) found that financial statement fraud is used to delay the reporting of
statement fraud is achieved through the companies’ stock option (Watts &
32
Zimmerman, 1990). Oppenheimer (2011) argues that corporate manipulation of
The manipulation of a company’s stock options has been widely used as one of
the methods of financial statement fraud. Besides Beasley et al. (2010), Crawford
and Weirich (2010) reported that company committed financial statement fraud
in order to (1) window dress the financial performance and thus evade reporting
a pre-tax loss, (2) improve the value of the share price to attract the company’s
investors, (3) meet the earnings expectation as set by the security analyst, (4)
meet the exchange listing requirement, (5) cover up the asset misappropriation,
and (6) hide the company’s deficiencies. The two reasons from Beasley are highly
supported by Kellogg and Kellogg (2006) who suggested that the two important
reasons of financial statement fraud are to attract the company’s investors and to
increase the value of the share price. Razaee (2008) and Abbott et al. (2000)
found that a company that commits financial statement fraud actually lacks the
companies in which the CEO also serves as a chairperson and where both the
literature. The Federal Bureau of Investigation (FBI) (FBI, 2010) and Telberg
(2009) classify the improper revenue recognition or profit inflation as the most
33
In particular research, improper revenue recognition or profit inflation is also
statement fraud cases. Fifth (2010) states the fraud companies create fictitious
The fraud companies were also overstating revenue and thus inflating the
financial statement fraud cases have proven that public listed companies have
committed financial statement fraud to increase share price and attract company
investors by inflating the company’s profit (Kellogg & Kellogg, 2006). Other
common types of financial statement fraud are delay in financial disclosure and
al., 2011). Such fraud not only breaches the Listing Requirements but also
misleads the existing and potential company’s investors. In relation to this, the
motives of financial statement fraud are mainly found to (1) increase the share
price to attract the company’s investors and (2) “window dress” the company’s
According to Chen et al. (2012), general financial statement fraud includes the
(1) failure to disclose information, (2) delay in disclosure, (3) profit inflation, (4)
false statements and information in the prospectus, and (5) false statements in the
financial reports. These types of financial statement fraud will have a serious
34
recognition. FBI classifies improper revenue recognition as one of the top
The COSO research on fraudulent financial reporting for year 1998-2007 of the
US public companies found that the most common financial statement fraud
but not theft. Another type of financial statement fraud is earnings management
a better, if false, public view of its earnings. Therefore, a company will disclose
achieve its objectives. Xu and Liu’s (2009) study recognizes another source of
fraud in financial statements. According to the study, the fraud in the financial
system could exist in the computer system, network and the key person who is
computer fraud and Internet fraud. In relation to these findings, the detection
35
2.4.5 Indicators and Perpetrators of Fraud Firms
fraud are brought to the attention of the company’s chief executive officer and
chief financial officer. The named fraudsters were found to meet the analyst’s
debt and equity offering. Chen et al. (2011) found that previous fraud cases
show that the conditions of the firm that have a poor performance, suffer more
losses, lower growth and lower stock return. The research findings by Tillman
(2009) indicate the perpetrators of financial statement fraud are from the
supported by the survey done by Ernst and Young (2012) and the research
findings by Brennan and McGrath (2012). Both findings show that the
namely, the Chief Executive Officer (CEO), Chief Financial Officer (CFO) and the
financial statement fraud cases are found to arise from collusion or deceit among
36
Albrecht (2008, 2010) notes that ‘financial statement fraud causes a decrease in
money’. In one case, a $7 million fraud caused a drop in stock value of about $2
billion. In relation to this, the research found the need for every commercial
fraud control possibly reduces the impact of financial statement fraud; therefore,
statement fraud cases. The study of Insurance Fraud in Nigeria indicates the little
towards financial statement fraud control are two important principles that help
37
seen as a major cause of corporate crime, thus ethical top management possibly
(Clinard, 2003). In this case, control among the top management is found to be
companies.
to base them on a set of core values. This will provide a platform upon which a
more detailed code of conduct can be constructed, giving more specific guidance
about permitted and prohibited behaviour, based on the applicable laws and the
employees will be held accountable for acting within the organization’s code of
conduct. The document should identify the measures an organization should take
However, Dion (2008) suggests that the corporate codes of ethics are not
identify the right things and perceive rationalization. In order to strengthen the
The above research believes that strategies and controls in relation to financial
38
has always been a growth industry. According to Biegelman (2009), “[a]n ounce
of prevention does equal a pound of cure”; therefore, the risk of fraud can be
measures.
approximately 45% median larger than the companies with fraud controls. In
statement fraud. The strategy could persuade individuals that they should not
commit fraud because of the increased likelihood of prevention, detection and the
new punishment.
The research believes there are two parties involved in controlling financial
statement fraud, namely, the regulators of the country and the company itself.
These two parties have to play their respective roles in order to mitigate fraud. In
oversee the integrity and quality of the financial statement process. Johnson
(2007, cited in Solaiman, 2011) documents that, ‘good legal rules’ are one of the
indicates that securities regulation and accounting best practices are two
39
In relation to the company’s action, research by Chen et al. (2011) suggest that a
suggests that the longer the tenure of directors in the company, the better the
financial statement fraud. This includes direct oversight functions by the board of
Therefore, the effective role and responsibility of the board of directors in the
company should be to set the “tone at the top” and they should not tolerate any
The effective internal control structure and audit functions are found to be
in the financial statement process. Meanwhile, the internal and external auditors
must ensure that internal control designs are adequate and effective in
40
auditors are responsible for assisting management to design, maintain, and
monitor the internal control system, while external auditors are given the
(Razaee, 2008).
In relation to this, the effective internal control structure and audit functions are
adequate and effective internal controls in the financial statement process. The
internal auditors and external auditors have to ensure that the internal controls
statement fraud. In relation to this, internal auditors are responsible for assisting
management to design, maintain, and monitor the internal controls system. In the
detect any material misstatements in the financial statements. Auditors are also
audit practitioners are considered to have failed in their ethical duty if they do
perform their role as expected by the audit profession (Alleyne et al., 2013).
41
2.4.7 Financial Statement Fraud and Case Profiles
The collapse of Enron caused about $70 billion losses in market capitalization
in US history.
Cotton (2007) found that the estimated total loss of market capitalization resulted
from financial statement fraud committed by Enron, WorldCom, Qwest, Tyco and
Global Crossing is about $460 billion. The profile of fraud cases that are
presented below caused a great shock to the financial market during the 2000s.
The reported fraud cases wiped a billion dollars off the financial markets in
various types of schemes and alternatives. The previous cases of corporate and
accounting fraud, such as Enron, WorldCom, Qwest and Sun Beam led the
The Enron case involved the most complicated accounting transactions in which
the company had used a complex organizational structure to hide the impact of
Enron’s financial statements had been misstated by as much as US$24 billion. The
fraud schemes that had been committed included (1) hiding the company’s debt,
(2) creating the company’s common equity and (3) overstating the company’s
42
earnings. Duncan, who was a partner of Andersen and the auditor of the
company, had overlooked the matter and destroyed the key documents of the
professional fees. Andersen provided both audit work and non-audit work for
Enron. Andersen also acted as the internal and external auditor for the Enron
salary from the company. Apart from this, the CFO and controllers of Enron were
the Enron fraud were ineffective audit functions and failure of corporate
As a result, Enron collapsed, filed for bankruptcy and Arthur Andersen was
dissolved due to its misconduct, which misled investors about the company’s debt
and profitability (Reinstein, 2011). Razaee (2012), in his research, states that
Andersen was claimed by SEC to have “knowingly and recklessly” issued false
and misleading audit reports for Waste Management for years between 1992 and
1996. The SEC (2001) cited in Razaee (2012) states that Andersen agreed to a
almost $1.4 billion. Andersen agreed to the first antifraud injunction in more
than 20 years although it did not admit nor deny the offences. Consequently, this
fraud case became (1) the largest civil penalty among the SEC enforcement
43
against a Big Five firm, (2) the first antifraud injunctions for more than 20 years
In the late 2000s, the Enron Corporation was the seventh largest corporation in
the United States in terms of sales, as it was one of the leading electricity, natural
gas and communications companies in the world. Enron was also named as
magazine (Petra & Loukatos, 2012). As the group suffered economic losses, the
maintain its credit rating (Ayala & Ibarguen, 2011). In addition, Enron focused
on increasing the Earnings per Share (EPS) and manipulating the accounting data
in order to influence the stock price. To secure this purpose, the company hid the
existing debt to finance the EPS growth, and finally, to affect Enron’s stock price,
which struck a high of $90 per share in mid-2000 and fell to below $1 per share
which the financial statements did not include the related party transactions. This
led to Enron’s bankruptcy on 2nd December 2001 with shareholder losses of $11
Justice accused them of giving an unqualified report for Enron in March 2002
(Ayala & Ibarguen, 2011). The directors and corporate officers of Enron also
44
reporting in as much as the management have to sign and affirm certain
Financial statement fraud in WorldCom was the biggest corporate failure and
phone company and largest mover of Internet traffic in America. The founder of
the company was Bernard Ebbers who started with a small company but made
Dyck and Zingles (2012), WorldCom was another accounting fraud that was
revealed in June 2002 after the enactment of SOX 2002. WorldCom was a
employees.
October 2011, the two former independent directors of the company were found
guilty for the misleading statement. Both of them were sentenced for one year’s
2011).
45
2.4.8 Impact of Financial Statement Fraud Cases on the case study (Evans
Publisher Plc.)
than losses of millions in profit, financial statement fraud also increases the
insurance cost and the loss of efficiency that results from the firing and hiring of
employees (Farrell & Franco, 2011). Financial statement fraud also impacts upon
the accounting and auditing professions resulting in a public lack of trust and
The consequences of financial statement fraud are very severe. Other than
decreasing shareholder value, it also has a severe effect upon other factors.
Razaee (2012) reports that financial statement fraud might cause a company (1)
to become bankrupt, (2) to suffer a decline in stock value and (3) be delisted
from the stock exchange. It was further reported that the top executives involved
in committing financial statement fraud (1) lose the stock based compensation
value, (2) are forced to resign or are fired, (3) lose the opportunity to serve as
officers or directors at any other public listed company as well as being barred by
Finally, in the previous cases, the company’s auditors had (1) to surrender their
audit licence, (2) were placed on a probation period, and (3) received fines. The
example of recent cases was Andersen, which was one of the Big Five accounting
46
firms. Andersen was responsible for the audit failures and destroying the audit
(2011), the board of directors of the company has to play its vital role in being
financial reporting process of the company. The board of directors also has to
ensure the adequacy and effectiveness of their internal control structure in terms
statement fraud control has been addressed in Section 280 of the Standards for
The standards give guidance to company management to deter any fraud and
the assurance of the control, the internal auditors have to ensure that in relation
to employee fraud and management fraud, they operate with due professional
care. This section would assist the internal auditors in meeting their
47
from the company are gained from the audit committee of the independent
directors of the company. The audit committee should be the independent ‘eyes
and ears’ of the investors, employees, and other stakeholders. Kang (2011)
suggests that the frequency of audit committee meetings would affect the
of fraud risk, the implementation of anti-fraud measures and provide the tone at
the top that fraud is opposed by the organization. Kang’s (2011) study suggests
that more frequent meetings – at least five times a year – would enhance the
Zhang et al. (2012) found that the effective role of the audit committee is
overseeing the company’s internal control. The audit committee should hire
independent auditors to assess and report on the financial health of the company.
presented to the audit committee but not to the management of the company.
Zhang et al. (2012) also found a relationship between the external auditor’s
independence and the strength of the company’s internal control. The study
The audit committee is also responsible for ensuring that management does not
engage in fraudulent conduct. Although the entire management team shares the
48
responsibility for implementing and monitoring these activities, the entity's chief
executive officer should initiate and support such control measures. According to
They should be staffed with qualified fraud examiners. He believes that “failed
corporations and tougher legislation are forcing entities throughout the world to
According to ACFE (2006), the top five prevention techniques are (1) internal
audits, (4) established fraud policies and (5) willingness to punish. In the
meantime, Chang et al. (2009) state that the company management has to
evaluate the effectiveness of the internal controls and certify that the financial
reports were complying the relevant rules and regulations in order to reduce
control, Hillison et al. (2009) suggest that the role of the internal auditors is to
statement. The analytical review will allow the internal auditor to analyse any
49
and variance analysis are expected to reveal irregular reporting. Another
internal auditors possibly detect illegal profit and conspiracies arising between an
contract files and bidding contract possibly prevent fraud through the internal
auditing process. Peat Marwick (1998) of KPMG suggests that stringent control
of the internal audit function would prevent fraud in the organization. The
company individuals would prevent and control fraud. However, George (2012)
highlights a greater role and quality of audit committee will reduce the
In the meantime, ACFE (2005) suggests that every company should establish and
understand that the organisation will not tolerate any form of fraud.
fraud losses once they are detected. Many companies and their auditors deal with
recent legislation, such as the Sarbanes-Oxley Act of 2002 (SOX), does not do
50
much in terms of fraud prevention; instead, the law focuses on punishment and
(2009) assert that the primary foundation of the Act is important to provide
investors and public with better trust in accounting and financial reporting.
Certified Fraud Examiner (ACFE) (2009) reveals that the most common means by
which fraud is detected includes (1) informers from employees and/or external
parties, (2) internal audits, (3) by accident, (4) internal controls and (5) external
audits. Alternatively, there are also many fraud detection techniques or detection
Techniques”, (2) Digital Analysis, (3) Game Theory and (4) the Strategic
statement. The detection of financial statement fraud turns out to be even more
targeting specific types of fraud and searching for their indicators, symptoms, or
red flags (Albrecht, 2012). In some cases, even though indicators of fraud or ‘red
flags’ exist, it has been found that no fraud occurred. For example, in certain
cases, ‘red flags’ were found to be due to the carelessness of employees. In the
51
meantime, other cases of ‘red flags’ were found to be due to actual fraud in the
These ratios are widely used by the accounting users, such as tax authorities,
financial statement fraud, financial ratios are arguably not a significant tool for
information.
Fraud detection in the financial statement is arguably difficult for new auditors as
they have little knowledge and experience (Grazioli et al., 2011). Therefore,
Brodsky (2011), the issue of fraud detection has attracted great concern and
attention by the government, media and public due to large losses in the financial
statement fraud detection techniques that have been suggested from the
52
empirical research. According to Ravisankar et al. (2016), financial statement
fraud detection is more effectively done by human experts and experience rather
than any detection techniques. However, data mining techniques could assist the
Other detection tools for analysing accounting data have been introduced by
Durtschi et al. (2009). Benford’s Law is used to detect any large volumes of
financial statement fraud. The tool would assist the company auditor in detecting
any irregularities in accounting data and the observation can be made through
accounting data. Benford’s law was initiated by Simon New Comb, (2001).
The law deals with the pattern of numbers and the probability of the occurrence
Benford’s analysis is the most appropriate for examining a set of numbers from a
two types of account that are most useful to analyzed using Benford’s Law. In
addition to accounts receivable and payable, Benford’s Law has also been found
to be useful for analysing the disbursements, sales and expenses transactions. The
53
digital analysis of Benford’s Law has been found to be integrated into a number
of software packages.
action and remedy the harm caused by fraud or misconduct. It should involve
harm caused. In the meantime, the three leading bodies in accounting – the
Accountants and the Association of Certified Fraud Examiners (2008) – state that
appropriate and timely manner. The research found that corrective action would
complement the response control. The corrective actions have been described by
particular fraud case. The corrective actions are important for every company to
examine the root causes of the fraud, and therefore, the particular risk of fraud
and that there is no tolerance for any fraudsters. Therefore, the company would
administer the disciplinary action for any fraud cases. Hence, the corrective
54
actions are essential for achieving effective strategies for financial statement
55
CHAPTER THREE
RESEARCH METHODOLOGY
3.1 Introduction
This chapter looks at the methodology that was used to conduct the study. It
specifies the research design, target population, sample, how data was collected
The research design is a plan of the methods and techniques to be adopted for
the subjects in the study. The research often involves collecting information
through data review. This type of research best describes the way things are
(Mugenda & Mugenda, 2008). This study described the variables associated with
the problem.
equal chance to be included in the final sample that is drawn. The population of
56
3.4 Sample of the study
The sample of this study was chosen through stratified sampling. The study
sampled Nigerian Banks in each sector of the company. The sector is Finance and
Accounts sector.
Secondary sources of data was adopted in this research with data collected from
reports, Nation Bureau of statistics, internet and certain journals and publications
obtained from the financial statements of Nigeria Banks from year 2000 to 2015
carefully examined and verified to ensure that there was any form of abnormality
and inaccuracy. This will ensure a reliable outcome from the data analysis
The usage of Multiple Regression analysis model was used to determine the effect
regression analysis.
57
3.6.1 Analytical Model
The analytical model for the study was a regression analysis for the independent
Whereby;
statement fraud has been chosen as the issue under investigation. From the
58
illegal acts, expenses or liabilities avoided by illegal acts, expenses or liabilities
59
CHAPTER FOUR
4.1 Introduction
research findings. The findings relate to the research questions that guide the
study. Data were analyzed to identify, described and explore the effect of
Table 4.1: Fraud and Forgery cases and amount of money lost by Nigerian Banks
(2000-2015)
60
2010 1,974 24,490.73 6,423.53 36.73
2011 3,852 33,367.80 6,674.20 69.61
2012 5,960 19,743.99 5,758.44 114.3
2013 2,527 29, 534.47 6,543.60 58.42
2014 1,461 9,829.23 2,650.34 26.4
2015 10,734 113,334.49 53,345.45 533.3
Total 36,721 398,691.5 124,485.47 1,115.93
Source: CBN and NDIC Annual Reports for 2000 – 2015
The table above shows the fraud and forgery cases and amount of money lost by
banks during the study period. The actual losses to banks grew steadily from
2000 – 2004. The amount lost increased from 2.6 Million Naira in 2004 to 5.6
Million Naira in 2005. Thereafter, it grew steadily for the remaining years under
review with 2015 recording the highest loss to Nigerian banks with a staggering
amount of 1.6 billion naira. Though 2015 had the highest amount involved, it
recorded a loss of 53.3 million naira. A total of N124 million was lost by banks to
fraud.
that is explained by all the four independent variables (fraud due to behavioral
61
causes, fraud due to technological causes, fraud due to management causes and
The three independent variables that were studied, explain only 66.4% of the
of Nigerian Banks, while other factors not studied in this research contributes
From the ANOVA statistics in table 4.9, the processed data, which are the
population parameters, had a significance level of 0.00116 which shows that the
62
calculated at 5% level of significance was 4.187. Since F calculated is greater
than the F critical (value = 2.64), this shows that the overall model was
performances of
The coefficient of regression in Table 4.4 above was used in coming up with the
model below:
63
FP= 0.426 + 0.479B + 0.761T + 0.617M + 0.501L ---------------------------
(1)
According to the model, all the variables were significant as their P- value was
less than 0.05 at 95% confidence level. The four variables (fraud due to
causes and fraud due to legal causes) were positively correlated with financial
From the model, the four variables are constant at zero, financial performance of
Nigerian Banks was 0.426. Findings from the study also shows that, taking all
unit increase in fraud due to technological causes will lead to a 0.76 increase in
management causes will lead to a 0.61, while a unit increase in fraud due to
Banks. This deduces that fraud due to technological causes have the most
64
fraud due to management causes, then fraud due to legal causes while fraud due
The study correlates with Kanu & Okorafor (2013) who identifies technological
causes of frauds. The study revealed that technology has improved significantly
in the modern world. Everything is nearly computerized. However, fraud has also
without being noticed. This fraud can also take place in a very far distance.
From the regression model, the study found out that there were factors
influencing the financial performance of Nigerian Banks, which are fraud due to
causes and fraud due to legal causes. The study found out that the constant (Y-
intercept) was 0.426 for all years. The four independent variables that were
fraud due to management causes and fraud due to legal causes) explain a
adjusted R2 (0.664). This therefore means that the four independent variables
factors and random variations not studied in this research contributes a measly
The study established that the coefficient for fraud due to behavioural causes was
0.479, meaning that fraud due to behavioural causes influenced the financial
65
performance of Nigerian Banks. The study also deduced that fraud due to
Banks since it had a coefficient of 0.761. The study further deduced that fraud
as it had positive coefficient (0.617). Finally, the study revealed that fraud due to
coefficient of 0.501. All the above findings on the classification of causes of fraud
are in line with Kanu & Okorafor, (2013) and Adebisi (2014) who classifies
66
CHAPTER FIVE
the study found out that there were factors influencing the financial performance
of Nigerian Banks. The factors are fraud due to behavioral causes, fraud due to
technological causes, fraud due to management causes and fraud due to legal
causes. The study found out that the Y-intercept was 0.426 for all years. The four
independent variables that were studied (fraud due to behavioral causes, fraud
due to technological causes, fraud due to management causes and fraud due to
5.2 Conclusions
In view of the craze for money, and the prevailing harsh economic environment,
big time frauds are on the increase in Nigerian Banks, hence bank are losing
cases, when the frauds are detected early; amounts already drawn are usually
difficult to recover. Even where deposit money banks discover fraud and there is
the possibility of recovering some of the frauds, the cooperation of the police has
not been particularly encouraging. Also in some cases, top levels of management
that do not want negative publicity for the deposit money banks try to hide
67
certain cases. A sound and effective control system will not only prevent fraud
From the regression model, the study found out that there were factors
influencing the financial performance of Nigerian Banks, which are fraud due to
causes and fraud due to legal causes. The study found out that the Y-intercept
The four independent variables that were studied (fraud due to behavioral
causes, fraud due to technological causes, fraud due to management causes and
performance of Nigerian Banks while other factors and random variations not
of Nigerian Banks.
The study concludes that fraud due to behavioral causes influenced the financial
performance of Nigerian Banks. The study also concludes that fraud due to
Banks. The study further concludes that fraud due to management causes
that fraud due to legal causes has an effect of financial performance of Nigerian
68
Banks. This is in line with Kanu & Okorafor, (2013) who classifies fraud as
5.3 Recommendations
i. The study recommends that Nigerian Banks should increase their employee
techniques and ascertain that references are not fictitious at the recruitment
stages.
ii. They should also ensure that there is segregation of duties, efficient internal
iii. Nigerian Banks management should create awareness about bank fraud.
This requires more than just sound judgment and dynamic action; it calls for
commitment that can only be gained if the management has ensured that all
iv. Training techniques should be upgraded to test honesty and integrity and
not just technical skills. This should entail extensive training programme
v. The study recommends that Deposit money banks management should come
up with a policy which clearly indicates steps to be taken on any staff found
69
committing fraud. This will help reduce internal fraud which is more
This study has explored the effect of fraud on financial performance of Nigerian
Banks and established that fraud has a strong influence on financial performance
of Nigerian Banks. The overall effect of fraud can therefore not be ignored at any
cost. The study therefore recommends that another study needs to be done with
70
REFERENCES
Albrecht, W. S. (2008, 2010) Business Fraud (The Enron Problem), The American
Ayala, A. & Ibarguan, S. G. (2011) A market proposal for auditing the financial
Barlaup, K, Dronen, H.I and Stuart, I (2014) Restoring trust in auditing: ethical
(2), 183-203
Beasley, M. S., Carcello, J. V., Hermanson, D.R., Neal, T.L. (2010) Fraudulent
71
Research commissioned by the Committee of Sponsoring Organizations of
Brennan, N. M., & McGrath, M. (2012) Financial statement fraud: some lesson
17(2), 49-61
Chen, G., Fifth, M., Gao, D. N., and Rui, O. M (2011). Ownership structure,
Cohen, Lawrence E. & Marcus F. (2014). “Social Change and Crime Rate Trends:
Number: 44-04.
72
Cooper, D. R., & Schindler, P. S. (2008). Business Research Methods, USA:
McGraw-Hill.
Dechow, P. M., Sloan, R. G., and Sweeney, A. P. (2011) Causes and consequences
Dyck, A., Morse, A. and Zingles, L. (2012), Who blows the whistle? Available at:
2010)
Ernst and Young (2012) Growing beyond: a place for integrity, the 12th Global
73
Farrel, B. R. and Franco, J. R. (2011) The role of the auditor in the prevention and
FBI (2004), Uniform Crime Reports. New York: U.S. Government Printing Office.
Fraud Advisory Panel, (2009), Study of Published Literature on the Nature and
15 (2), 111-123
Lessons from the biggest network on earth. Case analyst from the
74
Hornby A. S. (2010) .Oxford Advanced Learner’s Dictionary of Current English.
Oxford: Sally
Kanu, S. I., & Okorafor, E. O. (2013). The nature, extent and economic impact of
Kellog, K. and Kellog, L.B. (2011) Fraud, window dressing and negligence in
Moncarz.E. S., Moncarz, R, Cabello, A and Moncarz, B (2011) the Rise and
75
Mugenda, O. M., & Mugenda, A. G. (2008). Research Methods, Quantitative and
Ovuakporie, V. (2004), Bank Frauds: Causes and Preventions. Ibadan: ATS Books
STV (2009), Silver Bird News. Lagos: Silver Bird Television Studios. 16th
September.
Petra, S. T. and Loukatos, G. (2012) The Sarbanes-Oxley Act 2002: A five year
culture and controls, The 4th Biennial Global Economic Crime. Malaysia
Ravisankar, P., Ravi, P., Rao G.R. and Bose, I. (2016), Detection of financial
76
Reinstein, A. Moehrlr, S.R and Moehrlr, J.R. (2011) Crime and punishment in the
International, U.K.
financial statement fraud: The effectiveness of the fraud triangle and SAS
No.99.
11(3), 509-535
77
Tillman, R. (2009) Reputations and Corporate malfeasance: Collusive networks in
financial statement fraud, Journal of Crime, Law & Social Change, 51(3),
365-382
Weisman, A. and Broadsky, M. (2011) Fighting fraud with both fists, The CPA
Xu, W. and Liu, Q. (2009) A subjective and objective integrated method for fraud
2009)
78
Zhang, Y., Zhou, J. and Zhou, N. (2012) Audit committee quality, auditor
79
APPENDIX
Table 4.1: Fraud and Forgery cases and amount of money lost by Nigerian Banks
(2000-2015)
80
2012 5,960 19,743.99 5,758.44 114.3
Total 14.878 38
81
Table 4.4: Regression coefficients of the relationship between financial
Behavioural
causes
Technological
causes
Management
causes
Legal Causes
82