skip to main content
10.1145/3537693.3537703acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceegConference Proceedingsconference-collections
research-article

The Effect of Skepticism, Big Data Analytics to Financial Fraud Detection Moderated by Forensic Accounting

Published:09 July 2022Publication History

ABSTRACT

The number of cases of fraud, especially fraud in the preparation and publication of financial statements is increasing. Both in the international world and also in Indonesia. The number of cases that have occurred for several years have only been uncovered, resulting in large losses for users of financial statements and stakeholders. The industrial revolution 4.0 opens up new opportunities, with the existence of big data analytics and forensic audits, which are expected to increase professional skepticism of auditors to be more observant in detecting fraudulent financial reports. Our research is a quantitative study, we tested the hypothesis between the independent variable and the moderating variable on the dependent variable. The independent variables in our research are professional skepticism, and big data analytics, then the moderating variable is forensic accounting, and the dependent variable is financial statement fraud detection. The object of our research is the auditor in a public accounting firm. We used the structural equation modeling partial least square as our data analysis. The results of our study state that professional skepticism, big data analytics have a significant impact on financial statement fraud detection. Forensic accounting moderate both professional skepticism and big data analytics.

References

  1. M. Meuldijk, “Impact of digitization on the audit profession,” KPMG AG Audit Comm. News, vol. 58, pp. 1–3, 2017, [Online]. Available: https://assets.kpmg.com/content/dam/kpmg/ch/pdf/ac-news-8-impact-digitization-en.pdf.Google ScholarGoogle Scholar
  2. J. Dai and M. A. Vasarhelyi, “Imagineering audit 4.0,” J. Emerg. Technol. Account., vol. 13, no. 1, pp. 1–15, 2016, doi: 10.2308/jeta-10494.Google ScholarGoogle ScholarCross RefCross Ref
  3. I. Pedrosa and C. Costa, “Computer assisted audit tools and techniques in real world: CAATT's applications and approaches in context,” Int. J. Comput. Inf. Syst. Ind. Manag. Appl., 2012.Google ScholarGoogle Scholar
  4. A. Rehman and F. Hashim, “Impact of Mature Corporate Governance on Detective Role of Forensic Accounting: Case of Public Listed Companies in Oman,” KnE Soc. Sci., vol. 2019, pp. 637–665, 2019, doi: 10.18502/kss.v3i22.5080.Google ScholarGoogle Scholar
  5. M. Lal Bhasin, “Corporate Accounting Fraud: A Case Study of Satyam Computers Limited,” Open J. Account., 2013, doi: 10.4236/ojacct.2013.22006.Google ScholarGoogle Scholar
  6. S. H. Tahir, M. Saleem, and H. Arshad, “Institutional Ownership and Corporate Value: Evidence From Karachi Stock Exchange ( KSE ) 30-Index Pakistan,” Prakt. menadžment, stručni časopis za Teor. i praksu menadžmenta, vol. 6, no. 1, pp. 41–49, 2015.Google ScholarGoogle Scholar
  7. B. L. Handoko and Natasya, “Fraud diamond model for fraudulent financial statement detection,” Int. J. Recent Technol. Eng., 2019, doi: 10.35940/ijrte.C5838.098319.Google ScholarGoogle Scholar
  8. A. Gepp, M. K. Linnenluecke, T. J. O'Neill, and T. Smith, “Big data techniques in auditing research and practice: Current trends and future opportunities,” J. Account. Lit., vol. 40, pp. 102–115, 2018, doi: 10.1016/j.acclit.2017.05.003.Google ScholarGoogle ScholarCross RefCross Ref
  9. G. L. Vousinas, “Advancing theory of fraud: the S.C.O.R.E. model,” J. Financ. Crime, vol. 26, no. 1, pp. 372–381, 2019, doi: 10.1108/JFC-12-2017-0128.Google ScholarGoogle ScholarCross RefCross Ref
  10. E. MacManus, “The audit of the future,” Account. Irel., 2017.Google ScholarGoogle Scholar
  11. C. E. Nwachukwu, T. O. Usman, S. O. Akhor, and A. O. Oladipupo, “Auditing in the New Age of Industry 4.0,” Int. J. Bus. Strateg. Autom., vol. 2, no. 1, pp. 17–28, 2020, doi: 10.4018/ijbsa.20210101.oa2.Google ScholarGoogle ScholarCross RefCross Ref
  12. D. Appelbaum, A. Kogan PhD, and M. A. Vasarhelyi PhD, “Introduction to Data Analysis for Auditors and Accountants: Certified Public Accountant,” CPA J., 2017.Google ScholarGoogle Scholar
  13. Azham, L. Teck Heang, R. Mohamad, and M. Ojo, “Internship and Audit Expectation Gap Among Undergraduate Students in Universiti Utara Malaysia,” J. Financ. Report. Account., vol. 6, no. 1, pp. 55–74, 2008, doi: 10.1108/19852510880000635.Google ScholarGoogle ScholarCross RefCross Ref
  14. R. Manita, N. Elommal, P. Baudier, and L. Hikkerova, “The digital transformation of external audit and its impact on corporate governance,” Technol. Forecast. Soc. Change, vol. 150, no. December 2018, p. 119751, 2020, doi: 10.1016/j.techfore.2019.119751.Google ScholarGoogle ScholarCross RefCross Ref
  15. B. Alao and O. L. Gbolagade, “An Assessment of How Industry 4.0 Technology is Transforming Audit Landscape and Business Models,” Int. J. Accounting, Financ. Manag. Res., vol. 3, no. 10, pp. 15–20, 2019, [Online]. Available: https://www.researchgate.net/publication/337021641.Google ScholarGoogle Scholar
  16. H. Guénin-Paracini, B. Malsch, and A. M. Paillé, “Fear and risk in the audit process,” Accounting, Organ. Soc., 2014, doi: 10.1016/j.aos.2014.02.001.Google ScholarGoogle Scholar
  17. A. Habib, “A meta analysis of the determinants of modified audit opinion decisions,” Manag. Audit. J., 2013, doi: 10.1108/02686901311304349.Google ScholarGoogle Scholar
  18. E. E. Griffith, J. S. Hammersley, K. Kadous, and D. Young, “Auditor mindsets and audits of complex estimates,” J. Account. Res., 2015, doi: 10.1111/1475-679X.12066.Google ScholarGoogle Scholar
  19. B. L. Handoko, R. L. Tjandra, L. A. A. Mozes, and G. M. Giok, “Model for Predicting Auditor Intention to Adopt Blockchain,” 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. D. Beneish and P. Vorst, “The Cost of Fraud Prediction Errors,” SSRN Electron. J., no. January, 2020, doi: 10.2139/ssrn.3529662.Google ScholarGoogle ScholarCross RefCross Ref
  21. A. Abbasi, C. Albrecht, A. Vance, and J. Hansen, “Metafraud: A meta-learning framework for detecting financial fraud,” MIS Q., vol. 36, no. 4, pp. 1293–1327, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  22. O. Hakan, “An Analysis of Fraudulent Financial Reporting Using the Fraud Diamond Theory Perspective: An Empirical Study on the Manufacturing Sector Companies Listed on the Borsa Istanbul,” in Contemporary Issues in Audit Management and Forensic Accounting, vol. 102, S. Grima, E. Boztepe, and P. J. Baldacchino, Eds. Emerald Publishing Limited, 2020, pp. 131–153.Google ScholarGoogle Scholar
  23. W. S. Albrecht, C. Albrecht, and C. Albrecht, “Current Trends in Fraud and its Detection,” Inf. Secur. J. A Glob. Perspect., vol. 17, pp. 2–12, 2008, doi: 10.1080/19393550801934331.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. T. Roscoe, “Fundamental research statistics for the behavioural sciences (2nd Edition),” Holt Rinehart & Winston, New York. 1975.Google ScholarGoogle Scholar
  25. D. Peltier-Rivest, “A model for preventing corruption,” J. Financ. Crime, vol. 25, no. 2, pp. 545–561, 2018, doi: 10.1108/JFC-11-2014-0048.Google ScholarGoogle ScholarCross RefCross Ref
  26. J. Barnes, “Fraud Detection: Forensic Accounting Education and CFE Designation Impact on Auditor's Confidence Levels,” J. Account. Financ., vol. 20, no. 4, 2020.Google ScholarGoogle Scholar
  27. A. Zarefar, Andreas, and A. Zarefar, “The Influence of Ethics, Experience and Competency toward the Quality of Auditing with Professional Auditor Scepticism as a Moderating Variable,” Procedia - Soc. Behav. Sci., 2016, doi: 10.1016/j.sbspro.2016.05.074.Google ScholarGoogle ScholarCross RefCross Ref
  28. I. Pedrosa and C. J. Costa, “New trends on CAATTs: What are the chartered accountants’ new challenges?,” 2014, doi: 10.1145/2618168.2618190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. I. G. N. A. P. Putra and G. S. Darma, “Is Bitcoin Accepted in Indonesia?,” Int. J. Innov. Sci. Res. Technol., vol. 4, no. 2, pp. 424–430, 2019.Google ScholarGoogle Scholar
  30. S. Patil, V. Nemade, and P. K. Soni, “Predictive Modelling for Credit Card Fraud Detection Using Data Analytics,” Procedia Comput. Sci., vol. 132, pp. 385–395, 2018, doi: 10.1016/j.procs.2018.05.199.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Armenakis and I. Lang, “Forensic Diagnosis and Transformation of an Organizational Culture,” J. Chang. Manag., 2014, doi: 10.1080/14697017.2013.843577.Google ScholarGoogle Scholar
  32. C. M. Lehmann, “Integrating Generalized Audit Software and Teaching Fraud Detection in Information Systems Auditing Courses,” J. Forensic Investig. Account., 2012.Google ScholarGoogle Scholar

Index Terms

  1. The Effect of Skepticism, Big Data Analytics to Financial Fraud Detection Moderated by Forensic Accounting

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICEEG '22: Proceedings of the 6th International Conference on E-Commerce, E-Business and E-Government
      April 2022
      439 pages
      ISBN:9781450396523
      DOI:10.1145/3537693

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 July 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format