3,804
Views
2
CrossRef citations to date
0
Altmetric
FINANCIAL ECONOMICS

Application of forensic accounting techniques in the South African banking industry for the purpose of fraud risk mitigation

, &
Article: 2153412 | Received 30 Jul 2022, Accepted 27 Nov 2022, Published online: 16 Feb 2023

References

  • Akinbowale, O. E., Klingelhöfer, H. E., & Zerihun, M. F. (2020a). Analysis of cyber-crime effects on the banking industry using balance score card: A survey of literature. Journal of Financial Crime, 27(3), 945–21. https://doi.org/10.1108/JFC-03-2020-0037
  • Akinbowale, O. E., Klingelhöfer, H. E., & Zerihun, M. F. (2020b). An innovative approach in combating economic crime using forensic accounting techniques. Journal of Financial Crime, 27(4), 253–1271. https://doi.org/10.1108/JFC-04-2020-0053
  • Albano, P., Castiglione, A., Cattaneo, G., & De Santis, A. 2011. A novel anti-forensics technique for the android OS. Proceedings of the 2011 International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 380–385. Maui: IEEE.
  • Aldasoro, I., Gambacorta, L., Giudici, P., & Leach, T. (2022). The drivers of cyber risk. Journal of Financial Stability, 60(100989), 1–13. https://doi.org/10.1016/j.jfs.2022.100989
  • American Institute of Certified Public Accountants (AICPA)., 2012. Fraud Prevention. Availableat:www.Aicpa.org/interestareas/forensicandvaluation/resources/fraudpreventiondetectionresponse/, [Accessed: 1st August 2021]
  • Amigo-Dobaño, L., Garza-Gil, M. D., & Varela-Lafuente, M. M. (2020). Analyzing the attitudes of Spanish firms towards brexit’s effects on the management of European fisheries. Sustainability, 12(5819), 1–17. https://doi.org/10.3390/su12145819
  • Andoh, C., Quaye, D., & Akomea-Frimpong, I. (2018). Impact of fraud on Ghanaian SMEs and coping mechanisms. Journal of Financial Crime, 25(2), 400–418. https://doi.org/10.1108/JFC-05-2017-0050
  • Apau, R., & Koranteng, F. N. (2019). Impact of cybercrime and trust on the use of e-commerce technologies: An application of the theory of planned behaviour. International Journal of Cyber Criminology, 13(2), 288. https://dx.doi.org/10.5281/zenodo.3697886
  • Assessment Capacities Projects (ACAPS)., 2012. Qualitative and quantitative research techniques for humanitarian needs assessment: An introductory brief https://reliefweb.int/sites/reliefweb.int/files/resources/qualitative_and_quantitative.research_techniques.pdf. [Accessed: 3rd December, 2021]
  • Ayers, R., Brothers, S., & Jansen, W. (2014). Guidelines on cell phone forensics. NIST Special Publication, 800(101), 1–75. https://doi.org/10.6028/NIST.SP.800-101r1
  • Bankscope. 2018. Bankscope internet quick guide. https://www.bankscope.bvdep.com [Accessed: 19th October, 2018]
  • Bassey, B. E., & Ahonkhai, O. E. (2017). Effect of forensic accounting and litigation support on fraud detection of banks in Nigeria. Journal of Business and Management, 19(6), 56–60. https://dx.doi.org/10.9790/487X-1906055660
  • Boateng, A. A., Boateng, G., & Acquah, H. (2014). A literature review of fraud risk management in micro finance institutions in Ghana. Research Journal of Finance and Accounting, 5(11), 42–52. https://ssrn.com/abstract=2537768
  • Brockett, P. L., Golden, L. L., & Wolman, W. 2012. Enterprise cyber risk management. Management for the future - theory and cases, D. J. Emblemsvåg (Ed.), InTech, Available from: http://www.intechopen.com/books/risk-management-for-the-future-theory-andcases/enterprise-cyber-risk-management [Accessed on 20th June, 2020]. pp. 319–341
  • Brown, C. S. D. (2015). Investigating and prosecuting cyber crime: forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), 55–119. https://dx.doi.org/10.5281/zenodo.22387
  • BusinessTech., 2021. How South Africa’s 5 biggest banks continue to dominate. https://businesstech.co.za/news/banking/506740/how-south-africas-5-biggest-banks-continue-to-dominate/ [Accessed: 13th September, 2021]
  • Chalil, K. (2000). Statistical methods for development research (pp. 1–21). Central University of South Bihar.
  • Chih-Hao, Y., & Kuen-Chang, L. (2020). Developing a strategy map for forensic accounting with fraud risk management: An integrated balanced scorecard-based decision model. Evaluation and Program Planning, 801 1–10. https://doi.org/10.1016/j.evalprogplan.2020.101780
  • Choi, J., Peters, M., & Mueller, R. O. (2010). Correlational analysis of ordinal data: From pearson’s r to bayesian polychoric correlation. Asia Pacific Education Review, 11(4), 459–466. https://doi.org/10.1007/s12564-010-9096-y
  • Clough, J. (2010). Principles of cybercrime. Cambridge University Press.
  • Coetzee, J. (2018). Strategic implications of FinTech on South African retail banks. South African Journal of Economic and Management Sciences, 21(1, a2455), 1–11. https://doi.org/10.4102/sajems.v21i1.2455
  • Constitution of the republic of South Africa No. 108 of 1996. https://www.gov.za/sites/default/files/images/a108-96.pdf [Accessed: June 29, 2022]
  • Cusack, B., & Ahokov, T. 2016. Improving forensic software tool performance in detecting fraud for financial statements. In C. Valli (Ed.). The Proceedings of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, pp. 17–24.
  • Dagada, R. 2013. Digital banking security, risk and credibility concerns in South Africa. The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013). Kuala Lumpur, Malaysia, 4 - 6March2013. 978-0-9853483-7-3. The Society of Digital Information and Wireless Communication.
  • Dellaportas, S. (2013). Conversations with inmate accountants: Motivation, opportunity and the fraud triangle. Accounting Forum, 37(1), 29–39. https://doi.org/10.1016/j.accfor.2012.09.003
  • Dlamini, S., Mbambo, C., & Ma, W. W. K. (2019). Understanding policing of cybercrime in South Africa: The phenomena, challenges and effective responses. Cogent Social Sciences, 5(1675404), 1–13. https://doi.org/10.1080/23311886.2019.1675404
  • Dzomira, S. (2015). Cyber-banking fraud risk mitigation conceptual model. Banks and Bank Systems, 10(2), 7–14.
  • Dzomira, S. (2017). Internet banking fraud alertness in the banking industry: South Africa. Banks and Bank Systems, 12(1), 143–151. https://doi.org/10.21511/bbs.12(1-1).2017.07
  • Efosa, E. E., & Kingsley, A. O. (2016). Forensic accounting and fraud management: Evidence from Nigeria. Igbinedion University Journal of Accounting, 2(8), 245–308.
  • Enofe, A. O., Okpako, P. O., & Atube, E. N. (2013). The impact of forensic accounting on fraud detection. European Journal of Business and Management, 5(26), 61–72.
  • Giudici, P., & Raffinetti, E. (2022). Explainable AI methods in cyber risk management. Quality Reliability Engineering International, 38(3), 1318–1326. https://doi.org/10.1002/qre.2939
  • Henderson, W. M., & Greaves, P. J. (2011). Anonymous communications. In A guide to forensic accounting investigation (Second Edition). T. W. Golden, S. L. Skalak, M. M. Clayton, & J. S. Pill. PricewaterhouseCoopers. pp. 313–330.
  • Herselman, M., & Warren, M. (2004). Cyber crime influencing businesses in South Africa. Issues in Informing Science and Information Technology, 1, 253–266. https://doi.org/10.28945/736
  • Hopkin, P. (2010). Fundamentals of risk management: Understanding, evaluating and implementing effective risk management (pp. 1–357). Kogan Page Limited.
  • Houck, M. M., Kranacher, M.-J., Morris, B., Riley, J. R., Robertson, J., & Well, J. T. (2006). Forensic accounting as an investigative tool. The CPA Journal, 76(8), 68.
  • Jackson, R. L., II, Drummond, D. K., & Camara, S. (2007). What is qualitative research? Qualitative Research Reports in Communication, 8(1), 21–28. https://doi.org/10.1080/17459430701617879
  • Kampen, J., & Swyngedouw, M. (2000). The ordinal controversy revisited. Quality & Quantity, 34(1), 87–102. https://doi.org/10.1023/A:1004785723554
  • Kim, H. Y. (2017). Statistical notes for clinical researchers: Chi-squared test and fisher’s exact test. Open Lecture on Statistics, https://doi.org/10.5395/rde.2017.42.2.152.152–155.
  • Kopp, E., Kaffenberger, L., & Wilson, ca.2017. Cyber risk, market failures, and financial stability. IMF Working Paper No 17/185. The International Monetary Fund (IMF).
  • KPMG. 2010. Fraud and misconduct survey. Austria and New Zealand pp. 1–48. https://www.aph.gov.au [Accessed on 16th July 2019]
  • KPMG. 2019. The multifaceted threat of fraud: are banks up to the challenge? Global banking fraud survey. www.kpmg.com. [Accessed: 2nd February 2020]
  • Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77–81. https://doi.org/10.1080/1097198X.2019.1603527
  • Leo, M., Sharma, S., & Maddulety, K. (2019). Machine learning in banking risk management: A literature review. Risks, 7(29), 1–21. https://doi.org/10.3390/risks7010029
  • Lueg, R., & Knapik, M. (2016). Risk management with management control systems: A pragmatic constructivist perspective. Corporate Ownership and Control, 13(3), 72–81. https://doi.org/10.22495/cocv13i3p6
  • Mishkin, F. S., & Serletis, A. (2011). The economics of money, banking, and financial markets (4th edn) ed.). Pearson Canada Inc.
  • Modugu, K. P., & Anyaduba, J. O. (2013). Forensic accounting and financial fraud in Nigeria: An empirical approach. International Journal of Business and Social Science, 4(7), 281–289.
  • Mohajan, H. K. (2018). Qualitative research methodology in social sciences and related subjects. Journal of Economic Development, Environment and People, 7(1), 23–48.
  • Mohammed, H. K., & Knapkova, A. (2016). The impact of total risk management on company’s performance. Procedia - Social and Behavioral Sciences, 220, 271–277. https://doi.org/10.1016/j.sbspro.2016.05.499
  • Moyo, B. (2018). An analysis of competition, efficiency and soundness in the South African banking sector. South African Journal of Economic and Management Sciences, 21(1), 1–14. https://doi.org/10.4102/sajems.v21i1.229
  • Nissan, E. (2012). The forensic disciplines: some areas of actual or potential application [Nissan 2012. In Computer applications for handling legal evidence, police investigation and case argumentation Vol. 5(1) (pp. 841–989). Springer. https://doi.org/10.1007/978-90-481-8990-8
  • Okoye, E. I., & Gbegi, D. O. (2013). Forensic accounting: A tool for fraud detection and prevention in the public service. (A study of selected ministries in Kogi State). International Journal of Academic Research in Business and Social Sciences, 3(3), 1–18.
  • Omar, N. B., Mohamed, N., & Jomitin, B. 2013. The relevance of forensic accounting in public sector (A study of selected government agencies in Klang Valley). The 5th International Conference on Financial Criminology (ICFC), Malaysia. “Global Trends in Financial Crimes in the New Economies” pp. 225–232.
  • Oppenheim, A. N. (1992). Questionnaire design, interviewing and attitude measurement. Pinter.
  • Ospina, S. (2004). Qualitative Research. In G. Goethals, G. Sorenson, & J. MacGregor (Eds.), Encyclopedia of Leadership (pp. 1279–1284). London: SAGE.
  • Peshori, K. S. (2015). Forensic accounting a multidimensional approach to investigating frauds and scams. International Journal of Multidisciplinary Approach and Studies, 2(3), 26–35.
  • Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2018). Future developments in cyber risk assessment for the internet of things. Computers in Industry, 102, 14–22. https://doi.org/10.1016/j.compind.2018.08.002
  • Report, P. 2019. The Future of Banking: A South African Perspective. www.pwc.ac.za. [Accessed on 20th June 2020]
  • Rowlingson, R. (2004). A ten step process for forensic readiness. International Journal of Digital Evidence, 2(3, vol), 1–28.
  • Ruan, K. (2017). Introducing cybernomics: A unifying economic framework for measuring cyber risk. Computer & Security, 65, 77–89. https://doi.org/10.1016/j.cose.2016.10.009
  • Saddiq, S. A., & Bakar, A. S. A. (2019). Impact of economic and financial crimes on economic growth in emerging and developing countries a systematic review. Journal of Financial Crime, 26(3), 910–920. https://doi.org/10.1108/JFC-10-2018-0112
  • Santos Filho, C. R., Carlos, F. A., & Costa, F. M. (2017). Relevant skills for criminal accounting expertise: The perception of federal police experts and delegates. Journal of Education and Research in Accounting, 11(1), 69–88. https://dx.doi.org/10.17524/repec.v11i1.1446
  • Saunders, A., & Cornett, M. M. (2017). Financial institutions management: A risk management approach (9th edn) ed.). McGraw Hill.
  • Shah, S., Weintraub, D., & Miller, F. R. (2011). Foreign corrupt practices act. In T. W. Golden, S. L. Skalak, M. M. Clayton, & J. S. Pill (Eds.), A guide to forensic accounting investigation, second edition (pp. 527–546). PricewaterhouseCoopers.
  • Shin, J., Son, H., Heo, G., & Heo, G. (2015). Development of a cyber security risk model using Bayesian networks. Reliability Engineering and System Safety, 134, 208–217. https://doi.org/10.1016/j.ress.2014.10.006
  • Smith, G. S., & Crumbley, D. L. (2009). Defining a forensic audit. Journal of Digital Forensics, Security and Law, 4(1), 61–80. https://doi.org/10.15394/jdfsl.2009.1054
  • South African Banking Report. 2019. https://www.globenewswire.com/news-release/2019/02/20/1738270/0/en/South-Africa-Banking-Industry-Report-2018.html. [Accessed 1st June, 2019].
  • South African Reserve Bank (SARB). 2020. Management of the South African money and banking system https://www.resbank.co.za/AboutUs/Functions/Pages/Management-of-the-South-African-money-and-banking-system.aspx. [Accessed: 2nd February, 2020]
  • Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems. National Institute of Standards and Technology Special Publication, 800(30), 1–53.
  • Sutherland, E. (2017). Governance of cybersecurity – the case of South Africa. The African Journal of Information and Communication, 20, 83–112. https://dx.doi.org/10.23962/10539/23574
  • Ugoni, A., & Walker, B. F. (1995). The chi-square test: An introduction. Comsig Review 62, 4(3), 61–64. https://pubmed.ncbi.nlm.nih.gov/17989754/
  • von Solms, S., Louwrens, C. P., Reekie, C., & Grobler, T. (2006). A control framework for digital forensics. In O. M. & S. Shenoi (Eds.), International Federation for Information Processing, Voltulle 222, Advances in Digital Forensics II (pp. 343–355). Boston: Springer.
  • Wanemba, M. A. (2010). Strategies applied by commercial banks in Kenya to combat fraud. A management research project submitted in partial fulfilment of the requirements for the award of the degree of master of business administration. Department of Business Administration, School of Business, University of Nairobi.
  • Wells, J. T. (2003). The fraud examiners. Journal of Accountancy, 196(4), 76.
  • Wilson, T. P. (1977). Critique of ordinal variables. Social Forces, 49(3), 432–444. https://doi.org/10.2307/3005735
  • Wilson, N., & Mcclean, S. (1994). Questionnaire design: A practical introduction. University of Ulster. Copies available from: UCoSDA, Level Six (pp. S10 2TN). University House, University of Sheffield.
  • Wright, R. E. (2011). Finance, banking and money. Sioux falls, S.D (pp. 1–525).
  • Zakaria, K. M., Nawawi, A., & Salin, A. S. A. (2016). Internal controls and fraud – empirical evidence from oil and gas company. Journal of Financial Crime, 23(4), 1154–1168. https://doi.org/10.1108/JFC-04-2016-0021