SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Research Journal of Finance and Accounting
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.4, No.17, 2013

www.iiste.org

Evaluation of Fraud and Internal Control Procedures:Evidence
from Two South East Government Ministries in Nigeria
Eze, Joseph C. M.sc
Department of Accountancy,School of Financial studies
Institute of Management and Technology, Enugu, Nigeria
E-mail: josepheze@yahoo.com
Ani Wilson** PhD (Corresponding author)
Department of Banking and Finance, Michael Okpara University of Agriculture,Umudike, Abia State, Nigeria.
E-mail: wilsoani2007@yahoo.com, doctorani2010@gmail.com
Abstract
The paper evaluates internal control procedures as a weapon for fraud detection, deterrence and prevention in an
emerging democracy after decades of Military incursion in governance. Using a sample consisting of about fifty
per cent of the population of the study, selected through random sampling techniques, new light has been shed
on how internal control procedures can assisit in fraud detection, deterrence and prevention in
Nigeria.Specifically it was found that the degree of internal control in ministries and departments leaves much to
be desired. There were clear cases of failure of the system of internal check and absence of actual segregation of
duties. To surmount these outstanding handicaps, it has been recommended, among other things, that ministries
and extra-ministerial department should improve on fraud management and internal control system to make it
very active in operation in order to ensure improved accountability, transparency, and probity in the civil service.
Keywords: Fraud, Internal control, Internal Check, civil service, government.
1. Introduction
The Nigerian civil service to a considerable extent influences and forms part of the total economic structure of
the nation. It is a Government-owned institution constituted not only for service-seeking motive but apparently
as an instrument of social welfare and service and, must work toward achieving government set objectives. To
ensure optimum performance for the public interest, government makes regular provisions to it through its
Ministries by way of financial and material grants. Further to this, the civil service also generates revenues,
(though not as a major objective) for the government to undertake various activities for the upliftment of the
citizenry. The legal restrictions which have been placed on the operations of the civil service require it to give
account of its stewardship to enable the government and the entire citizenry to assess its performance in terms of
the public property entrusted to it. That is, all resources flowing in must be accounted for and all disbursements
must be checked against the authority to use the resources. The history of public administration is filled with
incidences of the misuse of public funds, fraud and improper use of internal control system. The difficulty and
complexity associated with the human element in public administration necessitate further the installation of
organizational or operational relationships and conditions, which will invariably assure accountability. The need
for aaccountability arises when a man takes charge of the property of another, or of several others, or of the
community at large. In the civil service, therefore, there has been a tremendous concern to successive
governments and the entire public about its performance, which has been described as frustratingly poor over the
years. Many opinions both fascinating and educative have been given adducing reasons for the poor
performance, notably among these were lack of effective internal control system, low level of accountability,
increasing cases of fraud, etc. The gross mismanagement of the economy in the eighties (80's) could be traced to
these. The function of Government is to organize, plan and regulate the society for the common good of the
entire citizenry. Government, therefore, cannot afford to ignore any measure, which will promote the
operational efficiency of its organizations set up to discharge this responsibility on behalf of the government and
the entire populace. Ministry and extra-ministerial fraud is a national problem that threatens the economic and
financial viability of the country. A sound fraud control technique must provide continuous and complete check
to the growing rapidly changing behaviour and techniques of fraudsters in our government Ministries and extra
ministerial departments. Although a great deal of responsibility for compliance is placed on Financial
Instructions which provide government Ministries and extra ministerial departments with common standard
procedure guides by which the ministries can control and maintain up to date records of all financial
transactions, we still have cases of financial irregularities in ministries and extra ministerial departments. It is
therefore the concern of this paper to evaluate fraud management and internal control in government Ministries
and Extra Ministerial Departments in Nigeria, using two key states in the south East geographical configuration.
These states are Enugu and Ebonyi States. The specific objective of undertaking this study is to appraise the state
of Internal Control techniques, including the level of compliance and the adequacy of enabling laws. It attempts

63
Research Journal of Finance and Accounting
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.4, No.17, 2013

www.iiste.org

to answer the question “To what extent is the internal control system in our government ministries and extra –
ministerial departments weak”? Accordingly it is hypothesized that Public sector internal control systems in
Enugu and Ebonyi states are not significantly effective in deterrence of fraud. The ensuing sections of the paper
capture firstly the review of related literaure. The methodology adopted follows it while the results as well as the
conclusions and recommendations form the rear of the paper .
2.
Review of Related Literature
One of the simplest ways of economizing efforts in an inquiry is to review and build upon the works already
done by others. Such works would include books, journals, newspapers, articles and official documents. This is
the concern of this section of the paper.
2.1
Conceptual and Theoretical Foundation
Millichamp (1996) opines that fraud is “intentional misstatements, in, or omissions of amounts or disclosures
from, an entity’s accounting records or financial statements”. He went further to buttress the point that fraud is
an illegal act that is any act, which is contrary to the law.
Attwood and Stein (1986) express that fraud is used to refer to “irregularity involving the use of criminal
deception to obtain an unjust or illegal advantage". Rittenberg, and Schwieger (2000) explain that fraud is an
"Intentional concealment or misrepresentation of a material fact that causes damage to those deceived". Jenfa,
(2002) defines fraud as "misappropriation, theft or embezzlement of corporate assets in a particular economic
environment". He proceeded to state that fraud could be seen as stealing by tricks and that it has always existed
with the nature and life of mankind. The researcher is of the view that most standard definitions of fraud are
more or less along the lines of quoted authors above. The researcher sees fraud as an irregularity; an act of
deliberate deception with the design of securing something by taking unfair advantage of another. For example,
the researcher observed in the course of his study, that there were claims that some non – existing workers are on
the payroll of some ministries. At times, an imposture is designed to obtain money, credit, or position to which
he/she is not entitled to.
2.1.1
Various Types of Fraud
Jenfa, (2002) outlines various types of fraud as:- (i) Bite fraud
(ii) Nibble fraud, (iii) Management fraud and
(iv) Con - Artist or "419". Okolo, (1987) explains various types of fraud that may be discovered as Teeming and
Lading or Carry-Over fraud, Fraudulent Manipulation of Account Not Involving Defalcation, Defalcation of
Money and Goods. Attwood and Stein (1986) emphasize that the responsibility for the prevention and detection
of fraud rests with management, and that this responsibility is fulfilled mainly through the implementation and
continued operation of an adequate system of Internal Control. Attwood and Stein (1986) express further that the
engagement letter should make this clear. Furthermore, the engagement should explain that the auditor will
endeavour to plan his audit so that he (the auditor) has a reasonable expectation of detecting material
misstatements in the financial statements resulting from fraud.
It is believed that that the responsibility for fraud prevention and detection rests with every staff of an
organization, whether on managerial position or not. Eze (2005) pointed out, “that detection of fraud is a
secondary object of an audit, an auditor does not set out with a declared intention of detecting fraud, this comes
to light in the normal course of his examination of vouchers, ledger and other available evidence in support of
the financial statements he is auditing. As a means of fraud prevention, Millichamp (1996) avers that an
effective internal audit is an essential element of a system of internal control and should be a prevention to fraud.
The researcher is of the view that if the government auditor wishes to place valiance on the internal audit
function in the ministries and extra – ministerial departments, the auditor will need to assess its effectiveness and
degree of independence. Millichamp (1996) opines that Internal control is "the whole system of Controls,
financial and otherwise, established by the management in order to carry on the business of the enterprise in an
orderly and efficient manner, ensure adherence to management policies, safeguard the assets and secure as far as
possible the completeness and accuracy of the records". Rittenberg and Schwieger (2001) define Internal Control
as "a process, effected by an entity's board of directors, management, and other personnel, designed to provide
reasonable assurance regarding the achievement of objectives in the following categories: (1) reliability of
financial reporting, (2) compliance with applicable laws and regulations, (3) effectiveness and efficiency of
operations and (4) safeguarding of assets". The researcher agrees with the explanation made by the above
authors on internal control. However, the researcher is of the view that internal control when transacted into
public sector environment is a “Process designed by our government financial administrators in order to carry on
the financial activities of government in an orderly and efficient manner, ensure compliance to government
policies, protect the assets and secure as far as possible the completeness and accuracy of the government
financial statements”. In other words, Internal Control may be a government system installed, to effectively and
efficiently prevent, detect and control material accounting errors or frauds on a timely basis.

64
Research Journal of Finance and Accounting
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.4, No.17, 2013

www.iiste.org

2.2
Review of Empirical Literature
A number of empirical works have been carried out on internal control and fraud prevention procedures in
government agencies. Ishola (1997) opined that causes of fraud could be grouped into two major classes viz: i.
Institutional factors and ii. Environmental/Social factors.
The author further highlighted that
institutional factors are those traceable to the internal environment of the institution or organization, while the
environmental/social factors are those which result from the influence of the environment/society. Commenting
further Ishola (1997) avers that poor and inadequate internal control system could also be a tempting source to a
rather previously honest staff. In another paper Jenfa (2005) quoting Ejiofor (1987), in one of Osisioma’s
papers wrote “The average Nigerian is corrupt, dishonest, Nepotic, triabalistic and lazy, and is all the time
seeking for opportunities to cheat his employer”. Pam (2008) expressed that where the possession of wealth
determines the reputation and recognition ascribed to a person, that society is bound to witness illegal acquisition
of wealth. Pam went on to emphasize that misplacement of societal values, the unquestioning attitude of the
society towards sources of wealth, the rising exceptions from the well placed and the subsequent desire of such
well – placed to live up to such expectations are contributory factors to frauds. Jenfa (2005) emphasized again,
that Osisioma quoting Ejiofor, wrote that “the Nigeria society does not reward hard work, diligence, objectivity,
selflessness, patience and inventiveness. The emphasis is on short – cuts, Hot cash, Me – first, Now – now and
Quick – Quick – Quick. The researcher’s view is in line with the views of the above authors. The researcher
noticed in the course, of his study that societal values play a major factor in influencing government workers into
perpetrating frauds in government ministries. On the usefulness of plans of action, Ejiofor (1987) pointed out
‘No plan no matter how sound cannot be thwarted, No rule no matter how intricate cannot be twisted, No law no
matter how well drafted cannot be circumvented, No programme no matter how grounded cannot be run down;
by well placed men of questionable integrity’.
3. Methodology
The paper adopted a survey research method predicated on the need to get more precise comprehensive,
acceptable and reliable information. The area of study consists of Government Ministries and Extra-Ministerial
Departments in Nigeria taking a case study of Enugu and Ebonyi States.Nigeria gained independence from Great
Britain in 1960 and presently has a thirty six states structure organized into six political configurations. The area
of study falls under the South East geographical zone with a combined population of about 20 million citizens.
The civil service operates on uniform lines across the states in a structure fundamentally similar to the legacies
of the British colonial office with significant modifications coming only in 1988.
The population of study consists of civil-servants in Enugu and Ebonyi States. The members of the population
are in their professional/occupational groupings. The groupings that were considered to be relevant to the study
are the Accounting, Auditing and Management Staff in Enugu and Ebonyi States. The total population consists
of: Accounting Personnel = 605, Auditing Personnel = 280, and Management=126. Addition of different
groupings brings the total population to 1011. The sample was drawn from the Accounting, Auditing and
management personnel, from the Ministries and Extra-Ministerial Departments, which include Ministry of
Finance and Economic Planning, Ministry of Education, Ministry of Health, Ministry of Justice, Ministry of
Commerce and Industries Ministry of Science and Technology, Ministry of Agriculture, Ministry of works and
Housing, Ministry of Information and Culture, Ministry of Environment, Women Affairs and Poverty
Alleviation, State Education management Board, water corporation, states Board of Internal Revenue and States
Auditor General offices. In view of this, a random sampling of these personnel was carried out. Each member of
the population has an equal chance of being included in the sample (Spiecel, 1972). Given the following data as
the Accounting, Auditing and Management personnel employment record of the selected Ministries, thus:
Considering the various activities of the selected ministries and extra ministerial department under study, it
becomes necessary to select a sample from the above distribution of personnel.
3.1 Determination of Sample Size
In determining the sample size that was studied the following formula was applied.
n =

N
1 + N (e )

2

Where:
n
=
Sample Size.
N
=
Population Size
e
=
Level of Significance.
Substitution into the formula;
For The Accounting Personnel, n is derived as 241.

65
Research Journal of Finance and Accounting
ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.4, No.17, 2013

www.iiste.org

For auditing Personnel, n is derived as 165
For the management personnel, n is derived as 96
However, in order to determine the sample size from each state a statistical approach was employed using the
Bowley's proportional allocation formula.
nh

=

nNh
N

Where: nh = the number of units allocated to each stratum
N= the total sample size
Nh= the number of items in each stratum in the population
N = the population size.
For the states, the allocation of Accounting personnel to study from the sample.
nh

=

nh

=

nh

=

Enugu State

nNh
N

241

× 298
605

= 119

241

× 307
605

= 122

Ebonyi State

Auditing personnel
Enugu State
nh

=

nh

=

165

× 96
280

= 57

Ebonyi State
165

× 184
280

=

108

Management Personnel
Enugu State
nh

=

nh

=

96 × 66
126

= 50

Ebonyi State
96

× 60
126

=

46

Insert Table 1
The Table shows the details of the distribution and return of the Questionnaire.
Sources of Data
The primary data was collected by means of research questionnaire and interview. The questions were uniformly
designed for the selected ministries and extra ministerial departments, with the aim of utilizing the data after
careful analysis in arriving at the research findings and validate the hypotheses earlier stated. However, a total of
502 copies of the questionnaire were distributed while 466 copies were returned. Data were also collected from
the secondary sources and these formed the major sources. Most of the secondary data employed were collected
from libraries, Audit departments, Government Printers, Newspapers, Journal and Internet.
FINDINGS
Data were presented in tables and further analyzed with the aid of some statistical tools. The data were analyzed
sequentially as they relate to research questions and hypotheses.
RESEARCH QUESTION ONE (1)
To what extent is there weak internal control system in our government ministries?
Insert Tables 3 to 5

( )
Table 2 Shows Extent of Internal Control Utilization in Enugu State while Table 3 shows Mean x and
Standard Deviations (SD) of Internal Control Utilization in Enugu State. The purpose of Table 4 is to show
Response on Internal Control Utilization in Ebonyi State. While Table 5 indicatesMean
Deviation (SD) of Response on Internal Control Utilization in Ebonyi

x

and Standard

TESTING OF HYPOTHESES
HO1: Public sector internal control systems in Enugu and Ebonyi states are not significantly effective in
deterrence of fraud.

66
Research Journal of Finance and Accounting

www.iiste.org

ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.4, No.17, 2013

HYPOTHESES TESTING
Insert Tables 7 to 9.
To test the formulated hypothesis, the researcher used t-test statistic. Tables 7 to 9 show the details regarding the
hyothesis tests.
HYPOTHESIS : Public sector internal control system in Enugu and Ebonyi States are not largely ineffective in
deterrence of fraud.
The null hypothesis one (Ho1) is rejected because the tcal = 8.51 is greater than the t-critical Value = 1.645 at the
significant level (x) of 5%.
Therefore, the researcher concluded that public sector internal control system in Enugu State is largely
ineffective in deterrence of fraud.
Here, the null hypothesis one (HO1) is rejected because the
tcal = 15.38 is greater than the t-critical value =
1.645 at a significant level of 5%.
Therefore, the researcher concluded that public sector internal control system for Ebonyi State is largely
ineffective in deterrence of fraud in the ministries and extra ministerial departments.
Hypothesis I. Then for Enugu state ,
=	

= 2.938	 	0.05

F.critical value = 3.38
Decision
The null hypothesis one (HO1) is accepted because the Fcal = 2.938 is less them the F critical value 3.38 at the
significant level (x) of 5%. Therefore, the researcher concluded that public sector internal control system in
Enugu is significantly effective in deterrence of fraud.
=	

= 13.098	 	0.05

Fcritical value = 3.38
Decision: The null hypothesis one (HO1) is rejected because the Fcal = 13.098 is greater than the Fcritical value
= 3.38 at a significant level of 5%.
Therefore, the researcher concluded that public sector internal control system in Ebonyi State is significantly
ineffective in deterrence of fraud in the ministries and extra-ministerial departments.
FINDINGS, RECOMMENDATIONS AND CONCLUSIONS
It was found that the degree of internal control in ministries and departments leaves much to be desired. No
proper system of internal check obtains in sections of ministries and departments handling cash and stores, a
system whereby staff duties are so arranged that one person's job serves as a check on another and no one person
is allowed to carry through and to record every aspect of a transaction. Some junior staff having responsibility
for cash and stores are not strictly supervised. Internal audit units, where they exist, are not often manned by
properly trained staff and, therefore, are not effective. Evidence abounds of flagrant neglect of built-in
safeguards contained in the financial instructions. A case in point is the failure in most establishments to keep
proper revenue and expenditure records and to reconcile such records with the Accountant general's monthly
accounts. From the results of the investigation, these ministries and extra ministerial departments engaged in
unhealthy fraud management and internal control system. For instance, they did not utilize internal control
system effectively to minimize regular cases of frauds pervading every place in our ministries, and accuracy and
dependability of accounting and financial data used in making decision in the ministries and extra-ministerial
departments are seriously affected. To surmount these prevailing handicaps, it has been recommended that
ministries and extra-ministerial department should improve on their fraud management and internal control
system to make it very active in operation in order to ensure improved accountability, transparency, and probity
in our civil service.
References
Attwood, F. A. and Stein, N. D. (1986). De Paula’s Auditing 7th Ed. London Pitman 682 P
Ejiofor, P. (1987).Fundamental, Theories and Practice in Management Ibadan African Feb Publishers 296 P
Eze .J.C. (2005). Principles and Techniques of Auditing 1st Edition, Enugu J.T.C. Publishers. 545 P
Jenfa B. I. (2002).Tips on Principles and Practice of Auditing, Investigation and Professional Practice. Jos,
Plateau State Amazing Concept Ltd 210 P.
Jenfa B. I. (2004).Elements of professionalism and Practice of Accountancy, 1st Ed. Jos Plateau State Amazing
concept Ltd Jos. 230 P
Ishola, K. A. (1997). Bank Frauds: Causes and Control The National Accountants number 4 July - Aug. Lagos.
Millichamp A.H. (1996). Auditing 7th Edition London Letts Educational, Aldine. 566 P

67
Research Journal of Finance and Accounting

www.iiste.org

ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.4, No.17, 2013

Okolo, J. U. T., (1987). The Concept and Practice of Auditing, Ibadan, Evans Brothers (Nig) Publisher Ltd 322
P.
Osisioma, B. C. (2008). Transparency, corruption and Governance in Nigeria. A challenge for civil service.
Lagos. 7 – 17.
Pam P. A (2008) Fighting Corruption in Nigeria: A Renewed Priority. The Certified National Accountant July –
September, 2008, Lagos. 39 – 45.
Rittenbeg, W.E. and Schwieger, B. J. (2000). Auditing Concepts for a Changing Environment 3rd ed. Orlando
Florida, USA Harcourt College Publishers. 855 P
Table 1 Distribution and Return of the Questionnaire.
States
Accounting
Auditing
Management
D
R
%
D
R
%
D
R
Enugu
119
117
98
57
48
84
50
35
Ebonyi
122
120
98
108
105
97
46
41
Total
241
237
98
165
153
93
96
76
Sources: distributed and returned questionnaire 2009
Key: D = distribution
R = Returned.
Table 2 Shows Extent of Internal Control Utilization in Enugu State.
Scale
Accounting
Auditing
Management
Total
personnel
personnel
personnel
VGE
9
1
0
10
GE
20
7
2
29
UN
3
0
8
11
LE
75
39
19
133
VLE
10
1
6
17
Total
117
48
35
200
Source: Survey Data 2009
VGE
=
Very great extent GE
=
Great extent UN =
Undecided
LE
=
Low extent VLE =
Very Low Extent

( )
Table 3. Mean x and Standard Deviations (SD) of Internal Control Utilization in Enugu State.
Scale
Fx
Frequency (f)
x− x
x− x2
(x)
1
10
10
-2.6
6.56
2
29
58
-1.6
2.56
3
11
33
-0.6
0.36
4
133
532
0.4
0.16
5
17
85
1.4
1.96
Total
200
718
SD

2

f (x − x)
65.6
74.24
3.96
21.28
33.32
198.4

1984
199
= 0 . 998
=

SD
= 3.6
tcal = 8.51
Table 4. Response on Internal Control Utilization in Ebonyi State.
Scale
Accounting
Auditing personnel
personnel
VGE
5.0
4
GE
10.0
12
VLE
0
0
LE
100
81
NE
5.0
8
Total
120
105

	 =	

68

Management
personnel
2
0
4
33
2
41

%
70
89
79

Total
11
22
4
214
15
266
Research Journal of Finance and Accounting

www.iiste.org

ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.4, No.17, 2013

Table 5 Mean
Scale
(x)
1
2
3
4
5
Total

x

and Standard Deviation (SD) of Response on Internal Control Utilization in Ebonyi
2
Frequency (f)
fx
x− x
11
22
4
214
15
266

11
44
12
856
75
998

f (x − x)

7.84
3.24
0.64
0.04
1.44

86.24
71.28
2.56
8.56
21.6
190.24

-2.8
-1.8
-0.8
0.2
1.2

190 . 24
265
SD = 0 . 85

3 . 75
998
x =
=
≈ 3 .8
266

SD =

tcal = 15.38
Table 2 Shows Extent of Internal Control Utilization in Enugu State.
Scale
Accounting
Auditing
Management
personnel
personnel
personnel
VGE
9
1
0
GE
20
7
2
UN
3
0
8
LE
75
39
19
VLE
10
1
6
Total
117
48
35
Source: Survey Data 2009
VGE
=
Very great extent GE
=
Great extent UN =
Undecided
LE
=
Low extent VLE =
Very Low Extent

Total
10
29
11
133
17
200

( )
Table 3. Mean x and Standard Deviations (SD) of Internal Control Utilization in Enugu State.
Scale
Fx
Frequency (f)
x− x
x− x2
(x)
1
10
10
-2.6
6.56
2
29
58
-1.6
2.56
3
11
33
-0.6
0.36
4
133
532
0.4
0.16
5
17
85
1.4
1.96
Total
200
718
SD

	 =	

2

(x − x )

1984
199
= 0 . 998
=

SD
= 3.6
tcal = 8.51
Table 4. Response on Internal Control Utilization in Ebonyi State.
Scale
Accounting
Auditing personnel
personnel
VGE
5.0
4
GE
10.0
12
VLE
0
0
LE
100
81
NE
5.0
8
Total
120
105

69

Management
personnel
2
0
4
33
2
41

Total
11
22
4
214
15
266

2

f (x − x)
65.6
74.24
3.96
21.28
33.32
198.4
Research Journal of Finance and Accounting

www.iiste.org

ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online)
Vol.4, No.17, 2013

Table 5 Mean
Scale
(x)
1
2
3
4
5
Total

x =

998
266

=

x

and Standard Deviation (SD) of Response on Internal Control Utilization in Ebonyi
2
Frequency (f)
fx
x− x

2

(x − x )

11
22
4
214
15
266
3 . 75
≈ 3 .8

11
44
12
856
75
998
SD
SD

tcal = 15.38
Table 7. t – test for Ho1 (Ebonyi)
SD
Variables
µ
x
Values
3.8
3.00
0.85
Source: Analysis of Empirical Data
Table 8 ANOVA for HO1 (Enugu)
Source of variance
Between groups
Within groups
Error (E)
Total
(Source: Analysis of Empirical Data)

7.84
3.24
0.64
0.04
1.44

-2.8
-1.8
-0.8
0.2
1.2

f (x − x)
86.24
71.28
2.56
8.56
21.6
190.24

190 . 24
265
= 0 . 85
=

N
266

Significance
level (x)
5%

df
265

tcal
15.38

Tcv
p<0.05
1.645

SS
1141.33
776.93
3667.07
5585.33

Df
2
4
15
21

Ms
570.67
194.23
244.47
-

Fcal
2.938
0.7945

Table 9 ANOVA for HO1 (Ebonyi)
Source of variance
SS
Between groups
4611.33
Within groups
704.13
Error (E)
8015.47
Total
13330.93
Source: Analysis of Empirical Data

Df
2
4
15
21

Ms
2305.67
176.03
534.36
-

Fcal
13.098
0.33

70

Decision
Reject

fcv
3.38
-

fcv
3.38
-
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Contenu connexe

Tendances

Corruption, illicit financials flows and governance ethics
Corruption, illicit financials flows and governance ethicsCorruption, illicit financials flows and governance ethics
Corruption, illicit financials flows and governance ethicsCosty Costantinos
 
A2120110
A2120110A2120110
A2120110aijbm
 
Informality, growth, and development in Africa
Informality, growth, and development in Africa Informality, growth, and development in Africa
Informality, growth, and development in Africa Dr Lendy Spires
 
Putting an end to corruption
Putting an end to corruptionPutting an end to corruption
Putting an end to corruptionOECD Governance
 
Anti corruption in afghanistan
Anti corruption in afghanistanAnti corruption in afghanistan
Anti corruption in afghanistanahmadrashidjamal
 
Bad governance
Bad governanceBad governance
Bad governancegure05
 
Anti corruption, enhancing the rule of law and asset declarations
Anti corruption, enhancing the rule of law and asset declarationsAnti corruption, enhancing the rule of law and asset declarations
Anti corruption, enhancing the rule of law and asset declarationsAustin Msowoya, Esq
 
Combating corruption and fraud for sustainable developmen beyond audit proced...
Combating corruption and fraud for sustainable developmen beyond audit proced...Combating corruption and fraud for sustainable developmen beyond audit proced...
Combating corruption and fraud for sustainable developmen beyond audit proced...Alexander Decker
 
Fraud, Waste, Abuse, and Corruption - Week 1
Fraud, Waste, Abuse, and Corruption - Week 1Fraud, Waste, Abuse, and Corruption - Week 1
Fraud, Waste, Abuse, and Corruption - Week 1Bob Tarwacki
 
Klibel5 acc 47_
Klibel5 acc 47_Klibel5 acc 47_
Klibel5 acc 47_KLIBEL
 
Corruption in develeoping countries challenges &amp; response
Corruption in develeoping countries challenges &amp; responseCorruption in develeoping countries challenges &amp; response
Corruption in develeoping countries challenges &amp; responseShahid Hussain Raja
 
Impact of ict on tax administration in nigeria
Impact of ict on tax administration in nigeriaImpact of ict on tax administration in nigeria
Impact of ict on tax administration in nigeriaAlexander Decker
 
Systemic barriers to the fight against corruption new
Systemic barriers to the fight against corruption newSystemic barriers to the fight against corruption new
Systemic barriers to the fight against corruption newSYCHRISTO
 

Tendances (20)

Corruption, illicit financials flows and governance ethics
Corruption, illicit financials flows and governance ethicsCorruption, illicit financials flows and governance ethics
Corruption, illicit financials flows and governance ethics
 
B034107017
B034107017B034107017
B034107017
 
A2120110
A2120110A2120110
A2120110
 
Informality, growth, and development in Africa
Informality, growth, and development in Africa Informality, growth, and development in Africa
Informality, growth, and development in Africa
 
Putting an end to corruption
Putting an end to corruptionPutting an end to corruption
Putting an end to corruption
 
Chapter 10: Crosscutting Concerns
Chapter 10: Crosscutting Concerns Chapter 10: Crosscutting Concerns
Chapter 10: Crosscutting Concerns
 
Anti corruption in afghanistan
Anti corruption in afghanistanAnti corruption in afghanistan
Anti corruption in afghanistan
 
Bad governance
Bad governanceBad governance
Bad governance
 
Ijciet 10 02_034
Ijciet 10 02_034Ijciet 10 02_034
Ijciet 10 02_034
 
Corruption-Draft 2
Corruption-Draft 2Corruption-Draft 2
Corruption-Draft 2
 
Fraud & corruption
Fraud & corruptionFraud & corruption
Fraud & corruption
 
Anti corruption, enhancing the rule of law and asset declarations
Anti corruption, enhancing the rule of law and asset declarationsAnti corruption, enhancing the rule of law and asset declarations
Anti corruption, enhancing the rule of law and asset declarations
 
Economics 11
Economics 11Economics 11
Economics 11
 
Corruption
CorruptionCorruption
Corruption
 
Combating corruption and fraud for sustainable developmen beyond audit proced...
Combating corruption and fraud for sustainable developmen beyond audit proced...Combating corruption and fraud for sustainable developmen beyond audit proced...
Combating corruption and fraud for sustainable developmen beyond audit proced...
 
Fraud, Waste, Abuse, and Corruption - Week 1
Fraud, Waste, Abuse, and Corruption - Week 1Fraud, Waste, Abuse, and Corruption - Week 1
Fraud, Waste, Abuse, and Corruption - Week 1
 
Klibel5 acc 47_
Klibel5 acc 47_Klibel5 acc 47_
Klibel5 acc 47_
 
Corruption in develeoping countries challenges &amp; response
Corruption in develeoping countries challenges &amp; responseCorruption in develeoping countries challenges &amp; response
Corruption in develeoping countries challenges &amp; response
 
Impact of ict on tax administration in nigeria
Impact of ict on tax administration in nigeriaImpact of ict on tax administration in nigeria
Impact of ict on tax administration in nigeria
 
Systemic barriers to the fight against corruption new
Systemic barriers to the fight against corruption newSystemic barriers to the fight against corruption new
Systemic barriers to the fight against corruption new
 

Similaire à Evaluation of fraud and internal control procedures

Forensic Accounting - Tool for Fraud Prevention
Forensic Accounting - Tool for Fraud PreventionForensic Accounting - Tool for Fraud Prevention
Forensic Accounting - Tool for Fraud PreventionCA. Sanjay Ruia
 
Effectiveness of internal auditor in controlling fraud and other financial ir...
Effectiveness of internal auditor in controlling fraud and other financial ir...Effectiveness of internal auditor in controlling fraud and other financial ir...
Effectiveness of internal auditor in controlling fraud and other financial ir...Alexander Decker
 
Fraud Prevention, Mitigation and Management Practices In Nigerian Firms
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsFraud Prevention, Mitigation and Management Practices In Nigerian Firms
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsIOSR Journals
 
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
Forensic Auditing and Public Sector Fraud Detection in Rivers State, NigeriaForensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeriaijtsrd
 
Forensic_Accounting_and_Fraud_Mitigation.pdf
Forensic_Accounting_and_Fraud_Mitigation.pdfForensic_Accounting_and_Fraud_Mitigation.pdf
Forensic_Accounting_and_Fraud_Mitigation.pdfOsarenrenAigienohuwa1
 
Nigerian banking fr
Nigerian banking frNigerian banking fr
Nigerian banking frKinfe Teka
 
Effect of Internal Control on Fraud Detection and Prevention in District Tre...
	Effect of Internal Control on Fraud Detection and Prevention in District Tre...	Effect of Internal Control on Fraud Detection and Prevention in District Tre...
Effect of Internal Control on Fraud Detection and Prevention in District Tre...inventionjournals
 
Initiation of Forensic Accounting Investigation of Public Sector Corruption (...
Initiation of Forensic Accounting Investigation of Public Sector Corruption (...Initiation of Forensic Accounting Investigation of Public Sector Corruption (...
Initiation of Forensic Accounting Investigation of Public Sector Corruption (...Premier Publishers
 
Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Premier Publishers
 
The impact of forensic accounting on fraud detection
The impact of forensic accounting on fraud detectionThe impact of forensic accounting on fraud detection
The impact of forensic accounting on fraud detectionAlexander Decker
 
Empirical Analysis of the Relationship between Public Financial Control and A...
Empirical Analysis of the Relationship between Public Financial Control and A...Empirical Analysis of the Relationship between Public Financial Control and A...
Empirical Analysis of the Relationship between Public Financial Control and A...inventionjournals
 
Application of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reportsApplication of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reportsAlexander Decker
 
Forensic Accounting and Fraud Prevention and Detection in Nigerian Banking In...
Forensic Accounting and Fraud Prevention and Detection in Nigerian Banking In...Forensic Accounting and Fraud Prevention and Detection in Nigerian Banking In...
Forensic Accounting and Fraud Prevention and Detection in Nigerian Banking In...crimsonpublisherscojrr
 
Analysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAnalysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAlexander Decker
 
Analysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAnalysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAlexander Decker
 
Computer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionComputer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionAlexander Decker
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Newman Enyioko
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Newman Enyioko
 

Similaire à Evaluation of fraud and internal control procedures (20)

Forensic Accounting - Tool for Fraud Prevention
Forensic Accounting - Tool for Fraud PreventionForensic Accounting - Tool for Fraud Prevention
Forensic Accounting - Tool for Fraud Prevention
 
Effectiveness of internal auditor in controlling fraud and other financial ir...
Effectiveness of internal auditor in controlling fraud and other financial ir...Effectiveness of internal auditor in controlling fraud and other financial ir...
Effectiveness of internal auditor in controlling fraud and other financial ir...
 
Fraud Prevention, Mitigation and Management Practices In Nigerian Firms
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsFraud Prevention, Mitigation and Management Practices In Nigerian Firms
Fraud Prevention, Mitigation and Management Practices In Nigerian Firms
 
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
Forensic Auditing and Public Sector Fraud Detection in Rivers State, NigeriaForensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
 
Forensic_Accounting_and_Fraud_Mitigation.pdf
Forensic_Accounting_and_Fraud_Mitigation.pdfForensic_Accounting_and_Fraud_Mitigation.pdf
Forensic_Accounting_and_Fraud_Mitigation.pdf
 
Nigerian banking fr
Nigerian banking frNigerian banking fr
Nigerian banking fr
 
Effect of Internal Control on Fraud Detection and Prevention in District Tre...
	Effect of Internal Control on Fraud Detection and Prevention in District Tre...	Effect of Internal Control on Fraud Detection and Prevention in District Tre...
Effect of Internal Control on Fraud Detection and Prevention in District Tre...
 
Initiation of Forensic Accounting Investigation of Public Sector Corruption (...
Initiation of Forensic Accounting Investigation of Public Sector Corruption (...Initiation of Forensic Accounting Investigation of Public Sector Corruption (...
Initiation of Forensic Accounting Investigation of Public Sector Corruption (...
 
Fraud and Governance: A Review June 2020
Fraud and Governance: A Review June 2020Fraud and Governance: A Review June 2020
Fraud and Governance: A Review June 2020
 
Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...
 
Fraud risk assessment
Fraud risk assessmentFraud risk assessment
Fraud risk assessment
 
The impact of forensic accounting on fraud detection
The impact of forensic accounting on fraud detectionThe impact of forensic accounting on fraud detection
The impact of forensic accounting on fraud detection
 
Empirical Analysis of the Relationship between Public Financial Control and A...
Empirical Analysis of the Relationship between Public Financial Control and A...Empirical Analysis of the Relationship between Public Financial Control and A...
Empirical Analysis of the Relationship between Public Financial Control and A...
 
Application of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reportsApplication of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reports
 
Forensic Accounting and Fraud Prevention and Detection in Nigerian Banking In...
Forensic Accounting and Fraud Prevention and Detection in Nigerian Banking In...Forensic Accounting and Fraud Prevention and Detection in Nigerian Banking In...
Forensic Accounting and Fraud Prevention and Detection in Nigerian Banking In...
 
Analysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAnalysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experience
 
Analysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAnalysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experience
 
Computer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionComputer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detection
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...
 

Plus de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Plus de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Evaluation of fraud and internal control procedures

  • 1. Research Journal of Finance and Accounting ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online) Vol.4, No.17, 2013 www.iiste.org Evaluation of Fraud and Internal Control Procedures:Evidence from Two South East Government Ministries in Nigeria Eze, Joseph C. M.sc Department of Accountancy,School of Financial studies Institute of Management and Technology, Enugu, Nigeria E-mail: josepheze@yahoo.com Ani Wilson** PhD (Corresponding author) Department of Banking and Finance, Michael Okpara University of Agriculture,Umudike, Abia State, Nigeria. E-mail: wilsoani2007@yahoo.com, doctorani2010@gmail.com Abstract The paper evaluates internal control procedures as a weapon for fraud detection, deterrence and prevention in an emerging democracy after decades of Military incursion in governance. Using a sample consisting of about fifty per cent of the population of the study, selected through random sampling techniques, new light has been shed on how internal control procedures can assisit in fraud detection, deterrence and prevention in Nigeria.Specifically it was found that the degree of internal control in ministries and departments leaves much to be desired. There were clear cases of failure of the system of internal check and absence of actual segregation of duties. To surmount these outstanding handicaps, it has been recommended, among other things, that ministries and extra-ministerial department should improve on fraud management and internal control system to make it very active in operation in order to ensure improved accountability, transparency, and probity in the civil service. Keywords: Fraud, Internal control, Internal Check, civil service, government. 1. Introduction The Nigerian civil service to a considerable extent influences and forms part of the total economic structure of the nation. It is a Government-owned institution constituted not only for service-seeking motive but apparently as an instrument of social welfare and service and, must work toward achieving government set objectives. To ensure optimum performance for the public interest, government makes regular provisions to it through its Ministries by way of financial and material grants. Further to this, the civil service also generates revenues, (though not as a major objective) for the government to undertake various activities for the upliftment of the citizenry. The legal restrictions which have been placed on the operations of the civil service require it to give account of its stewardship to enable the government and the entire citizenry to assess its performance in terms of the public property entrusted to it. That is, all resources flowing in must be accounted for and all disbursements must be checked against the authority to use the resources. The history of public administration is filled with incidences of the misuse of public funds, fraud and improper use of internal control system. The difficulty and complexity associated with the human element in public administration necessitate further the installation of organizational or operational relationships and conditions, which will invariably assure accountability. The need for aaccountability arises when a man takes charge of the property of another, or of several others, or of the community at large. In the civil service, therefore, there has been a tremendous concern to successive governments and the entire public about its performance, which has been described as frustratingly poor over the years. Many opinions both fascinating and educative have been given adducing reasons for the poor performance, notably among these were lack of effective internal control system, low level of accountability, increasing cases of fraud, etc. The gross mismanagement of the economy in the eighties (80's) could be traced to these. The function of Government is to organize, plan and regulate the society for the common good of the entire citizenry. Government, therefore, cannot afford to ignore any measure, which will promote the operational efficiency of its organizations set up to discharge this responsibility on behalf of the government and the entire populace. Ministry and extra-ministerial fraud is a national problem that threatens the economic and financial viability of the country. A sound fraud control technique must provide continuous and complete check to the growing rapidly changing behaviour and techniques of fraudsters in our government Ministries and extra ministerial departments. Although a great deal of responsibility for compliance is placed on Financial Instructions which provide government Ministries and extra ministerial departments with common standard procedure guides by which the ministries can control and maintain up to date records of all financial transactions, we still have cases of financial irregularities in ministries and extra ministerial departments. It is therefore the concern of this paper to evaluate fraud management and internal control in government Ministries and Extra Ministerial Departments in Nigeria, using two key states in the south East geographical configuration. These states are Enugu and Ebonyi States. The specific objective of undertaking this study is to appraise the state of Internal Control techniques, including the level of compliance and the adequacy of enabling laws. It attempts 63
  • 2. Research Journal of Finance and Accounting ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online) Vol.4, No.17, 2013 www.iiste.org to answer the question “To what extent is the internal control system in our government ministries and extra – ministerial departments weak”? Accordingly it is hypothesized that Public sector internal control systems in Enugu and Ebonyi states are not significantly effective in deterrence of fraud. The ensuing sections of the paper capture firstly the review of related literaure. The methodology adopted follows it while the results as well as the conclusions and recommendations form the rear of the paper . 2. Review of Related Literature One of the simplest ways of economizing efforts in an inquiry is to review and build upon the works already done by others. Such works would include books, journals, newspapers, articles and official documents. This is the concern of this section of the paper. 2.1 Conceptual and Theoretical Foundation Millichamp (1996) opines that fraud is “intentional misstatements, in, or omissions of amounts or disclosures from, an entity’s accounting records or financial statements”. He went further to buttress the point that fraud is an illegal act that is any act, which is contrary to the law. Attwood and Stein (1986) express that fraud is used to refer to “irregularity involving the use of criminal deception to obtain an unjust or illegal advantage". Rittenberg, and Schwieger (2000) explain that fraud is an "Intentional concealment or misrepresentation of a material fact that causes damage to those deceived". Jenfa, (2002) defines fraud as "misappropriation, theft or embezzlement of corporate assets in a particular economic environment". He proceeded to state that fraud could be seen as stealing by tricks and that it has always existed with the nature and life of mankind. The researcher is of the view that most standard definitions of fraud are more or less along the lines of quoted authors above. The researcher sees fraud as an irregularity; an act of deliberate deception with the design of securing something by taking unfair advantage of another. For example, the researcher observed in the course of his study, that there were claims that some non – existing workers are on the payroll of some ministries. At times, an imposture is designed to obtain money, credit, or position to which he/she is not entitled to. 2.1.1 Various Types of Fraud Jenfa, (2002) outlines various types of fraud as:- (i) Bite fraud (ii) Nibble fraud, (iii) Management fraud and (iv) Con - Artist or "419". Okolo, (1987) explains various types of fraud that may be discovered as Teeming and Lading or Carry-Over fraud, Fraudulent Manipulation of Account Not Involving Defalcation, Defalcation of Money and Goods. Attwood and Stein (1986) emphasize that the responsibility for the prevention and detection of fraud rests with management, and that this responsibility is fulfilled mainly through the implementation and continued operation of an adequate system of Internal Control. Attwood and Stein (1986) express further that the engagement letter should make this clear. Furthermore, the engagement should explain that the auditor will endeavour to plan his audit so that he (the auditor) has a reasonable expectation of detecting material misstatements in the financial statements resulting from fraud. It is believed that that the responsibility for fraud prevention and detection rests with every staff of an organization, whether on managerial position or not. Eze (2005) pointed out, “that detection of fraud is a secondary object of an audit, an auditor does not set out with a declared intention of detecting fraud, this comes to light in the normal course of his examination of vouchers, ledger and other available evidence in support of the financial statements he is auditing. As a means of fraud prevention, Millichamp (1996) avers that an effective internal audit is an essential element of a system of internal control and should be a prevention to fraud. The researcher is of the view that if the government auditor wishes to place valiance on the internal audit function in the ministries and extra – ministerial departments, the auditor will need to assess its effectiveness and degree of independence. Millichamp (1996) opines that Internal control is "the whole system of Controls, financial and otherwise, established by the management in order to carry on the business of the enterprise in an orderly and efficient manner, ensure adherence to management policies, safeguard the assets and secure as far as possible the completeness and accuracy of the records". Rittenberg and Schwieger (2001) define Internal Control as "a process, effected by an entity's board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: (1) reliability of financial reporting, (2) compliance with applicable laws and regulations, (3) effectiveness and efficiency of operations and (4) safeguarding of assets". The researcher agrees with the explanation made by the above authors on internal control. However, the researcher is of the view that internal control when transacted into public sector environment is a “Process designed by our government financial administrators in order to carry on the financial activities of government in an orderly and efficient manner, ensure compliance to government policies, protect the assets and secure as far as possible the completeness and accuracy of the government financial statements”. In other words, Internal Control may be a government system installed, to effectively and efficiently prevent, detect and control material accounting errors or frauds on a timely basis. 64
  • 3. Research Journal of Finance and Accounting ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online) Vol.4, No.17, 2013 www.iiste.org 2.2 Review of Empirical Literature A number of empirical works have been carried out on internal control and fraud prevention procedures in government agencies. Ishola (1997) opined that causes of fraud could be grouped into two major classes viz: i. Institutional factors and ii. Environmental/Social factors. The author further highlighted that institutional factors are those traceable to the internal environment of the institution or organization, while the environmental/social factors are those which result from the influence of the environment/society. Commenting further Ishola (1997) avers that poor and inadequate internal control system could also be a tempting source to a rather previously honest staff. In another paper Jenfa (2005) quoting Ejiofor (1987), in one of Osisioma’s papers wrote “The average Nigerian is corrupt, dishonest, Nepotic, triabalistic and lazy, and is all the time seeking for opportunities to cheat his employer”. Pam (2008) expressed that where the possession of wealth determines the reputation and recognition ascribed to a person, that society is bound to witness illegal acquisition of wealth. Pam went on to emphasize that misplacement of societal values, the unquestioning attitude of the society towards sources of wealth, the rising exceptions from the well placed and the subsequent desire of such well – placed to live up to such expectations are contributory factors to frauds. Jenfa (2005) emphasized again, that Osisioma quoting Ejiofor, wrote that “the Nigeria society does not reward hard work, diligence, objectivity, selflessness, patience and inventiveness. The emphasis is on short – cuts, Hot cash, Me – first, Now – now and Quick – Quick – Quick. The researcher’s view is in line with the views of the above authors. The researcher noticed in the course, of his study that societal values play a major factor in influencing government workers into perpetrating frauds in government ministries. On the usefulness of plans of action, Ejiofor (1987) pointed out ‘No plan no matter how sound cannot be thwarted, No rule no matter how intricate cannot be twisted, No law no matter how well drafted cannot be circumvented, No programme no matter how grounded cannot be run down; by well placed men of questionable integrity’. 3. Methodology The paper adopted a survey research method predicated on the need to get more precise comprehensive, acceptable and reliable information. The area of study consists of Government Ministries and Extra-Ministerial Departments in Nigeria taking a case study of Enugu and Ebonyi States.Nigeria gained independence from Great Britain in 1960 and presently has a thirty six states structure organized into six political configurations. The area of study falls under the South East geographical zone with a combined population of about 20 million citizens. The civil service operates on uniform lines across the states in a structure fundamentally similar to the legacies of the British colonial office with significant modifications coming only in 1988. The population of study consists of civil-servants in Enugu and Ebonyi States. The members of the population are in their professional/occupational groupings. The groupings that were considered to be relevant to the study are the Accounting, Auditing and Management Staff in Enugu and Ebonyi States. The total population consists of: Accounting Personnel = 605, Auditing Personnel = 280, and Management=126. Addition of different groupings brings the total population to 1011. The sample was drawn from the Accounting, Auditing and management personnel, from the Ministries and Extra-Ministerial Departments, which include Ministry of Finance and Economic Planning, Ministry of Education, Ministry of Health, Ministry of Justice, Ministry of Commerce and Industries Ministry of Science and Technology, Ministry of Agriculture, Ministry of works and Housing, Ministry of Information and Culture, Ministry of Environment, Women Affairs and Poverty Alleviation, State Education management Board, water corporation, states Board of Internal Revenue and States Auditor General offices. In view of this, a random sampling of these personnel was carried out. Each member of the population has an equal chance of being included in the sample (Spiecel, 1972). Given the following data as the Accounting, Auditing and Management personnel employment record of the selected Ministries, thus: Considering the various activities of the selected ministries and extra ministerial department under study, it becomes necessary to select a sample from the above distribution of personnel. 3.1 Determination of Sample Size In determining the sample size that was studied the following formula was applied. n = N 1 + N (e ) 2 Where: n = Sample Size. N = Population Size e = Level of Significance. Substitution into the formula; For The Accounting Personnel, n is derived as 241. 65
  • 4. Research Journal of Finance and Accounting ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online) Vol.4, No.17, 2013 www.iiste.org For auditing Personnel, n is derived as 165 For the management personnel, n is derived as 96 However, in order to determine the sample size from each state a statistical approach was employed using the Bowley's proportional allocation formula. nh = nNh N Where: nh = the number of units allocated to each stratum N= the total sample size Nh= the number of items in each stratum in the population N = the population size. For the states, the allocation of Accounting personnel to study from the sample. nh = nh = nh = Enugu State nNh N 241 × 298 605 = 119 241 × 307 605 = 122 Ebonyi State Auditing personnel Enugu State nh = nh = 165 × 96 280 = 57 Ebonyi State 165 × 184 280 = 108 Management Personnel Enugu State nh = nh = 96 × 66 126 = 50 Ebonyi State 96 × 60 126 = 46 Insert Table 1 The Table shows the details of the distribution and return of the Questionnaire. Sources of Data The primary data was collected by means of research questionnaire and interview. The questions were uniformly designed for the selected ministries and extra ministerial departments, with the aim of utilizing the data after careful analysis in arriving at the research findings and validate the hypotheses earlier stated. However, a total of 502 copies of the questionnaire were distributed while 466 copies were returned. Data were also collected from the secondary sources and these formed the major sources. Most of the secondary data employed were collected from libraries, Audit departments, Government Printers, Newspapers, Journal and Internet. FINDINGS Data were presented in tables and further analyzed with the aid of some statistical tools. The data were analyzed sequentially as they relate to research questions and hypotheses. RESEARCH QUESTION ONE (1) To what extent is there weak internal control system in our government ministries? Insert Tables 3 to 5 ( ) Table 2 Shows Extent of Internal Control Utilization in Enugu State while Table 3 shows Mean x and Standard Deviations (SD) of Internal Control Utilization in Enugu State. The purpose of Table 4 is to show Response on Internal Control Utilization in Ebonyi State. While Table 5 indicatesMean Deviation (SD) of Response on Internal Control Utilization in Ebonyi x and Standard TESTING OF HYPOTHESES HO1: Public sector internal control systems in Enugu and Ebonyi states are not significantly effective in deterrence of fraud. 66
  • 5. Research Journal of Finance and Accounting www.iiste.org ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online) Vol.4, No.17, 2013 HYPOTHESES TESTING Insert Tables 7 to 9. To test the formulated hypothesis, the researcher used t-test statistic. Tables 7 to 9 show the details regarding the hyothesis tests. HYPOTHESIS : Public sector internal control system in Enugu and Ebonyi States are not largely ineffective in deterrence of fraud. The null hypothesis one (Ho1) is rejected because the tcal = 8.51 is greater than the t-critical Value = 1.645 at the significant level (x) of 5%. Therefore, the researcher concluded that public sector internal control system in Enugu State is largely ineffective in deterrence of fraud. Here, the null hypothesis one (HO1) is rejected because the tcal = 15.38 is greater than the t-critical value = 1.645 at a significant level of 5%. Therefore, the researcher concluded that public sector internal control system for Ebonyi State is largely ineffective in deterrence of fraud in the ministries and extra ministerial departments. Hypothesis I. Then for Enugu state , = = 2.938 0.05 F.critical value = 3.38 Decision The null hypothesis one (HO1) is accepted because the Fcal = 2.938 is less them the F critical value 3.38 at the significant level (x) of 5%. Therefore, the researcher concluded that public sector internal control system in Enugu is significantly effective in deterrence of fraud. = = 13.098 0.05 Fcritical value = 3.38 Decision: The null hypothesis one (HO1) is rejected because the Fcal = 13.098 is greater than the Fcritical value = 3.38 at a significant level of 5%. Therefore, the researcher concluded that public sector internal control system in Ebonyi State is significantly ineffective in deterrence of fraud in the ministries and extra-ministerial departments. FINDINGS, RECOMMENDATIONS AND CONCLUSIONS It was found that the degree of internal control in ministries and departments leaves much to be desired. No proper system of internal check obtains in sections of ministries and departments handling cash and stores, a system whereby staff duties are so arranged that one person's job serves as a check on another and no one person is allowed to carry through and to record every aspect of a transaction. Some junior staff having responsibility for cash and stores are not strictly supervised. Internal audit units, where they exist, are not often manned by properly trained staff and, therefore, are not effective. Evidence abounds of flagrant neglect of built-in safeguards contained in the financial instructions. A case in point is the failure in most establishments to keep proper revenue and expenditure records and to reconcile such records with the Accountant general's monthly accounts. From the results of the investigation, these ministries and extra ministerial departments engaged in unhealthy fraud management and internal control system. For instance, they did not utilize internal control system effectively to minimize regular cases of frauds pervading every place in our ministries, and accuracy and dependability of accounting and financial data used in making decision in the ministries and extra-ministerial departments are seriously affected. To surmount these prevailing handicaps, it has been recommended that ministries and extra-ministerial department should improve on their fraud management and internal control system to make it very active in operation in order to ensure improved accountability, transparency, and probity in our civil service. References Attwood, F. A. and Stein, N. D. (1986). De Paula’s Auditing 7th Ed. London Pitman 682 P Ejiofor, P. (1987).Fundamental, Theories and Practice in Management Ibadan African Feb Publishers 296 P Eze .J.C. (2005). Principles and Techniques of Auditing 1st Edition, Enugu J.T.C. Publishers. 545 P Jenfa B. I. (2002).Tips on Principles and Practice of Auditing, Investigation and Professional Practice. Jos, Plateau State Amazing Concept Ltd 210 P. Jenfa B. I. (2004).Elements of professionalism and Practice of Accountancy, 1st Ed. Jos Plateau State Amazing concept Ltd Jos. 230 P Ishola, K. A. (1997). Bank Frauds: Causes and Control The National Accountants number 4 July - Aug. Lagos. Millichamp A.H. (1996). Auditing 7th Edition London Letts Educational, Aldine. 566 P 67
  • 6. Research Journal of Finance and Accounting www.iiste.org ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online) Vol.4, No.17, 2013 Okolo, J. U. T., (1987). The Concept and Practice of Auditing, Ibadan, Evans Brothers (Nig) Publisher Ltd 322 P. Osisioma, B. C. (2008). Transparency, corruption and Governance in Nigeria. A challenge for civil service. Lagos. 7 – 17. Pam P. A (2008) Fighting Corruption in Nigeria: A Renewed Priority. The Certified National Accountant July – September, 2008, Lagos. 39 – 45. Rittenbeg, W.E. and Schwieger, B. J. (2000). Auditing Concepts for a Changing Environment 3rd ed. Orlando Florida, USA Harcourt College Publishers. 855 P Table 1 Distribution and Return of the Questionnaire. States Accounting Auditing Management D R % D R % D R Enugu 119 117 98 57 48 84 50 35 Ebonyi 122 120 98 108 105 97 46 41 Total 241 237 98 165 153 93 96 76 Sources: distributed and returned questionnaire 2009 Key: D = distribution R = Returned. Table 2 Shows Extent of Internal Control Utilization in Enugu State. Scale Accounting Auditing Management Total personnel personnel personnel VGE 9 1 0 10 GE 20 7 2 29 UN 3 0 8 11 LE 75 39 19 133 VLE 10 1 6 17 Total 117 48 35 200 Source: Survey Data 2009 VGE = Very great extent GE = Great extent UN = Undecided LE = Low extent VLE = Very Low Extent ( ) Table 3. Mean x and Standard Deviations (SD) of Internal Control Utilization in Enugu State. Scale Fx Frequency (f) x− x x− x2 (x) 1 10 10 -2.6 6.56 2 29 58 -1.6 2.56 3 11 33 -0.6 0.36 4 133 532 0.4 0.16 5 17 85 1.4 1.96 Total 200 718 SD 2 f (x − x) 65.6 74.24 3.96 21.28 33.32 198.4 1984 199 = 0 . 998 = SD = 3.6 tcal = 8.51 Table 4. Response on Internal Control Utilization in Ebonyi State. Scale Accounting Auditing personnel personnel VGE 5.0 4 GE 10.0 12 VLE 0 0 LE 100 81 NE 5.0 8 Total 120 105 = 68 Management personnel 2 0 4 33 2 41 % 70 89 79 Total 11 22 4 214 15 266
  • 7. Research Journal of Finance and Accounting www.iiste.org ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online) Vol.4, No.17, 2013 Table 5 Mean Scale (x) 1 2 3 4 5 Total x and Standard Deviation (SD) of Response on Internal Control Utilization in Ebonyi 2 Frequency (f) fx x− x 11 22 4 214 15 266 11 44 12 856 75 998 f (x − x) 7.84 3.24 0.64 0.04 1.44 86.24 71.28 2.56 8.56 21.6 190.24 -2.8 -1.8 -0.8 0.2 1.2 190 . 24 265 SD = 0 . 85 3 . 75 998 x = = ≈ 3 .8 266 SD = tcal = 15.38 Table 2 Shows Extent of Internal Control Utilization in Enugu State. Scale Accounting Auditing Management personnel personnel personnel VGE 9 1 0 GE 20 7 2 UN 3 0 8 LE 75 39 19 VLE 10 1 6 Total 117 48 35 Source: Survey Data 2009 VGE = Very great extent GE = Great extent UN = Undecided LE = Low extent VLE = Very Low Extent Total 10 29 11 133 17 200 ( ) Table 3. Mean x and Standard Deviations (SD) of Internal Control Utilization in Enugu State. Scale Fx Frequency (f) x− x x− x2 (x) 1 10 10 -2.6 6.56 2 29 58 -1.6 2.56 3 11 33 -0.6 0.36 4 133 532 0.4 0.16 5 17 85 1.4 1.96 Total 200 718 SD = 2 (x − x ) 1984 199 = 0 . 998 = SD = 3.6 tcal = 8.51 Table 4. Response on Internal Control Utilization in Ebonyi State. Scale Accounting Auditing personnel personnel VGE 5.0 4 GE 10.0 12 VLE 0 0 LE 100 81 NE 5.0 8 Total 120 105 69 Management personnel 2 0 4 33 2 41 Total 11 22 4 214 15 266 2 f (x − x) 65.6 74.24 3.96 21.28 33.32 198.4
  • 8. Research Journal of Finance and Accounting www.iiste.org ISSN 2222-1697 (Paper) ISSN 2222-2847 (Online) Vol.4, No.17, 2013 Table 5 Mean Scale (x) 1 2 3 4 5 Total x = 998 266 = x and Standard Deviation (SD) of Response on Internal Control Utilization in Ebonyi 2 Frequency (f) fx x− x 2 (x − x ) 11 22 4 214 15 266 3 . 75 ≈ 3 .8 11 44 12 856 75 998 SD SD tcal = 15.38 Table 7. t – test for Ho1 (Ebonyi) SD Variables µ x Values 3.8 3.00 0.85 Source: Analysis of Empirical Data Table 8 ANOVA for HO1 (Enugu) Source of variance Between groups Within groups Error (E) Total (Source: Analysis of Empirical Data) 7.84 3.24 0.64 0.04 1.44 -2.8 -1.8 -0.8 0.2 1.2 f (x − x) 86.24 71.28 2.56 8.56 21.6 190.24 190 . 24 265 = 0 . 85 = N 266 Significance level (x) 5% df 265 tcal 15.38 Tcv p<0.05 1.645 SS 1141.33 776.93 3667.07 5585.33 Df 2 4 15 21 Ms 570.67 194.23 244.47 - Fcal 2.938 0.7945 Table 9 ANOVA for HO1 (Ebonyi) Source of variance SS Between groups 4611.33 Within groups 704.13 Error (E) 8015.47 Total 13330.93 Source: Analysis of Empirical Data Df 2 4 15 21 Ms 2305.67 176.03 534.36 - Fcal 13.098 0.33 70 Decision Reject fcv 3.38 - fcv 3.38 -
  • 9. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar