Farud Triangle & Diamond

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

European Journal of Business and Management www.iiste.

org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015

Fraud Triangle Theory and Fraud Diamond Theory:


Understanding the Convergent and Divergent for Future
Research
Rabi’u Abdullahi Noorhayati Mansor Muhammad Shahir Nuhu
Universiti Sultan Zainal Abidin, 21300 Kuala Terengganu, Malaysia

Abstract
Many of the world’s most prominent organizations have experienced large-scale frauds. These frauds have had
disturbing effects on our world’s economy in addition to contributing unnecessary suffering and increased
unemployment for the low and middle class. With the aim of further understanding the fundamental motivations
of fraud, this paper takes an in-depth look at the convergent and divergent of two classical fraud theories which
are: (i) fraud triangle theory; and (ii) fraud diamond theory. This comparison is important to assist anti-graft bodies
and organizations in formulating a practical strategy to prevent and investigate organizational frauds. The paper
takes a conceptual approach by first examining the concept of fraud, then discussing the convergence of the two
classical theories, and finally differentiating them. By doing so, the similarities and differences between them are
highlighted and appreciated for fraud prevention purposes. The study uses secondary sources of information
obtained from journal articles, textbooks and the internet. The discussion of the two theories contributes to the
understanding of frauds especially by forensic accountants, auditors, fraud examiners and other anti-fraud bodies.
The study also serves as guidance for further fraud related research.
Keywords: Fraud; fraud diamond theory; fraud triangle theory; forensic accounting.

1.0 Introduction
In recent years, corporate financial accounting scandals no longer become unexpected news of the day. Cases such
as Enron, WorldCom, Global Crossing and Tyco are among the most prominent ones which had suffered from the
devastating impact of fraud. These costly scandals have increased global concerns about fraud, wiping out billions
of dollars of shareholder value, and led to the erosion of investors and public confidence in the financial markets
(e.g., Peterson and Buckhoff, 2004; Rezaee, Crumbley and Elmore 2004 in Bierstaker, Brody and Pacini 2006).
Many studies have discussed fraud-related issues and the general view is that fraud prevention should be
the main focus. It is less expensive and more effective to prevent fraud from happening than to detect it after
occurrence. Usually, by the time the fraud is discovered, the money is unrecoverable or the chance to recover the
full amount of the lost is very slim. Furthermore, it is costly and time consuming to investigate frauds especially
involving large-scale multinational operations. However, if the focus is on fraud prevention all the monetary
losses, time and effort to reconstruct fraudulent transactions, track down the perpetrator, and reclaim missing funds
can be saved. Thanasak (2013:1) states that before making any efforts to reduce fraud and manage the risks
proactively, it is important for the business organizations to identify the factors leading to fraudulent behaviour by
understanding who are the fraudsters, when and why frauds are committed. Various theories have attempted to
explain the causes of fraud and the two most cited theories are the Fraud Triangle Theory (FTT) of Cressey (1950)
and Fraud Diamond Theory (FDT) of Wolfe and Hermanson (2004). Both of them identify the elements that lead
perpetrators to commit fraud. According to Dorminey, Fleming, Kranacher, and Riley (2010), the origin of the
FTT dates to the works of Edwin Sutherland (1939) who coined the term white-collar crime, and Cressey was one
of Sutherland's former students. Cressey (1950) focused his research on the factors that lead individuals to engage
in fraudulent and unethical activity. His research later became known as the FTT. This theory consists of three
elements that are necessary for fraud to occur: (i) perceived pressure, (ii) opportunity, and (iii) rationalization.
David T. Wolfe and Dana R. Hermanson believed that the former FTT has to be enhancing to improve both fraud
prevention and detection by considering an additional element above the three, mentioned elements of FTT. They
considered four sided FDT there by adding capability as the fourth element. Wolfe and Hermanson (2004 pp.38)
state that fraud cannot successfully concealed unless the fraudster has capability: personal traits and abilities that
play a major role in whether fraud may occur even with the presence of other three elements.
In their separate works, Wolfe and Hermanson (2004), Thanasak (2013), Norman and Faizal (2010),
Florenz (2012), Gbegi and Adebisi (2013) examined and discussed the FDT. Their main conclusion was that the
FDT is an extended or improved version of the FTT with an addition of “capability” added to the three basic
elements of fraud in the FTT. Therefore, this paper aims to further explain the convergent and divergent between
the FTT and FDT. The paper is presented as follows: Section 1 discusses the fundamental concept of fraud; while
section 2 examines the classical fraud theories, their convergent as well as divergent in general. In section 3 the
paper was concluded and highlighted the areas likely for future research and the contribution to the existing body
of knowledge.

30
30
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015

2.0 Fundamental Concept of Fraud


Fraud has grown rapidly over the last few years and there is a growing trend for large organisations to consider
hiring professionals such as forensic accountants to reduce the pressure and potential of occupational financial
frauds. According to the Association of Certified Fraud Examiner (ACFE, 2010), occupational fraud is the use of
one’s occupation for personal enrichment through the deliberate misuse of or misapplication of the employing
organization’s resources or assets. Irrespective of the sector, a wide category of crimes, swindles and employee
trust violations fall under the category of fraud (ACFE, 2010; Duffield and Grabosky, 2001 & Levi ,2008, Kiragu,
Wanjau, Gekara, and Kanali 2013).
According to Merriam Webster's Dictionary of Law (1996) as quoted in Manurung and Hadian (2013,
pp. 4), fraud can be defined as:
“Any act, expression, omission, or concealment calculated to deceive another to his or her
disadvantage, specifically, a misrepresentation or concealment with reference to some fact material
to a transaction that is made with knowledge of its falsity. And or in reckless disregard of its truth
or falsity and worth the intent to deceive another and that is reasonably relied on by the other who
is injured thereby”
Ernst and Young (2009) defines fraud as an act of deliberate action or mistake made by person or group
of persons who knows that the error can result in some benefits that are not either to individuals or entities or other
parties. According to Adeneji (2004:354) and Institute of Chartered Accountants of Nigeria (ICAN) (2006:206),
fraud is an intentional act made by one or more individuals among management, employees or third parties who
produce errors in financial reporting. Fraud can also be seen as misrepresentation, storage or negligence of a truth
for the purpose of manipulating the financial statement to harm the company or organization, that also includes
embezzlement, theft or any attempt to steal or unlawfully obtained, abuse or harm assets of an organization (asset
misappropriation).

2.1 The Fraud Triangle Theory


In order to appreciate the similarities and differences between FTT and FDT it is important to begin with Cressey’s
FTT (1950). In1950, Donald Cressey, a criminologist, started the study of fraud by arguing that there must be a
reason behind everything people do. Questions such as why people commit fraud led him to focus his research on
what drives people to violate trust? He interviewed 250 criminals in a period of 5 months whose behaviour met
two criteria: (i) the person must have accepted a position of trust in good faith, and (ii) the person must have
violated the trust. He found that three factors must be present for a person to violate trust and was able to conclude
that:
“Trust violators, when they conceive of themselves as having a financial problem which is non-
shareable, and have knowledge or awareness that this problem can be secretly resolved by violation
of the position of financial trust. Also they are able to apply to their own conduct in that situation
verbalizations which enable them to adjust their conceptions of themselves as trusted persons with
their conceptions of themselves as users of the entrusted funds or property” (Crassey 1953:742).
The three factors illustrated are non-shareable financial problem, opportunity to commit the trust violation,
and rationalization by the trust violator. When it comes to non-shareable financial problem, Cressey (1953) stated
that, “persons become trust violators when they conceive of themselves as having incurred financial obligations
which are considered as non-socially sanction-able and which, consequently, must be satisfied by a private or
secret means” (Crassey 1953: 741).
In addition, Crassey (1953) also mentioned that perceived opportunity arises when the fraudster sees a
way to use their position of trust to solve the financial problem, knowing they are unlikely to be caught. As for
rationalization, he concluded that most fraudsters are first-time offenders with no criminal record. They see
themselves as ordinary, honest people who are caught in a bad situation. This enables them to reason their own
criminal actions to themselves in a way that makes it acceptable or justifiable:
“In the interviews, many trust violators expressed the idea that they knew the behaviour to be illegal
and wrong at all times and that they merely kidded themselves into thinking that it was not illegal”
(Crassey 1953:741).
The three elements of fraud summarized by Cressey (1953) are commonly presented in a diagram shown
in Figure 1. The top element of the diagram represents the pressure or motive to commit the fraudulent act while
the two elements at the bottom are perceived opportunity and rationalization (Wells 2011 in Rasha and Andrew,
2012). Over the years, the fraud hypothesis intiated by Cressey (1950) has become known as the FTT.

31
31
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015

Figure 1: Fraud Triangle


Source: Wells J. T. (2005)
In 1953, Cressey published his research in a book called “Other People’s Money”. According to
Rosefield (1988) in Okezie (2012), employees who commit fraud generally are able to do so because of the
interaction between perceived pressures (usually financial), perceived opportunity and rationalization.

2.2 Perceived Pressure/Incentive/Motive


Perceived pressure or incentive relates to the motivation that leads to unethical behaviors. Every fraud perpetrator
faces some type of pressure to commit unethical behavior. Albrecht et al. (2006) pointed out that, the word
perceived is important because pressure does not have to be real; if the perpetrators believed that they are
pressurized, this belief can lead to fraud. Perceived pressure can result from various circumstances, but it often
involves a non-sharable financial need. Financial pressure has a major impact on an employee’s motivation and is
consider the most common type of pressure. Specifically, about 95% of all cases of fraud have been influenced by
financial pressure (Albrecht et al, 2006). Lister (2007) states that, pressure is a significant factor in committing
fraud. He determines three types of pressure which are personal, employment stress, and external pressure. Vona
(2008) further examines personal and corporate pressures as motivations’ proxies for fraud commitment. Examples
of perceived pressure include greed, living beyond one’s means, large expenses or personal debt, family financial
problem or health, drug addiction and gambling.
Lister (2007:63) defined the pressure/motive to commit fraud as “the source of heat for the fire” but he
believed the presence of these pressures in someone’s life does not mean he or she will commit fraud. Murdock
(2008) also argued that the pressure could be related to financial, non-financial, political and social. Non-financial
pressure can be derived from a lack of personal discipline or other weaknesses such as gambling habit and drug
addiction. On the other hand, political and social pressure occurs when people feel they cannot appear to fail due
to their status or reputation. According to Rae and Subramanian (2008) pressure relates to employees’ motivation
to commit fraud because of greed or personal financial pressure. Along the same line, Vona (2008) as quoted by
Rasha and Andrew (2012:193) believed the motive to commit fraud is often associated with personal pressures or
corporate pressures on the individual. The initial motive to commit fraud may be driven just by the pressure,
rationalization, or by sheer opportunity. Chen and Elder (2007) as cited by Fazli, Mohd and muhammed (2014)
identified six basic categories for pressure including transgression of obligations, problems originated from
individual problems, corporate inversion, position achievement and relationship between employees. Albrecht et
al. (2008) categorized pressure in four groups including economic, vice, job-related and other pressures.
According to Hooper and Pornelli (2010), pressure can be either a positive or a negative force. When
goals are achievable, pressure contributes to creativity, efficiency, and competitiveness. However, temptations for
misconduct arise when goals do not appear to be attainable by normal means, yet pressure continues unabated,
with career advancement, compensation, and even continued employment at risk. When pressure is transformed
into an obsessive determination to achieve goals regardless of the cost, it becomes unbalanced and potentially
destructive. This is a situation where individuals are most likely to resort to questionable activities that may
eventually lead to fraud (Hooper and poenelli 2010). Singleton, Bologna, Lindquist, and Singleton (2006) stated
that pressure, incentive or motivation refers to something that has happened in the fraudster’s personal life that
creates a stressful need for funds and thus, pushes the person to steal. However, this financial strain could also be
a symptom of other types of pressures. According to Kenyon and Tilton (2006), management or other employees

32
32
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015

may find themselves offered incentives or placed under pressure to commit fraud. Singleton et al. (2006) stated
that incentives or pressures might take a variety of forms within an organization. These financial ‘rewards’ include
bonuses or pay-related incentives including employees or group’s compensation and share price targets.

2.3 Perceived Opportunity


The second necessary element for fraud to occur is perceived opportunity. Opportunity is created by ineffective
control or governance system that allows an individual to commit organisational fraud. In the field of accounting,
this is termed as internal control weaknesses. The concept of perceived opportunity suggests that people will take
advantage of circumstances available to them (Kelly and Hartley, 2010). Perceived opportunity is similar to
perceived pressure in that the opportunity does not have to be real. The perpetrator must simply believe or perceive
that the opportunity exists. In most cases, the lower the risk of being caught, the more likely it is that fraud will
take place (Cressey 1953). Other factors related to perceived opportunity can also contribute to fraud, such as the
assumption that, the employer is unaware, the assumption that employees are not checked regularly for violating
organizational policies, the belief that no one will care, and that no one will consider the behaviour to be a serious
offense (Sauser, 2007).
According to Rae and Subramanian (2008) in Rasha and Andrew (2012), opportunity refers to a weakness
in the system where the employee has the power or ability to exploit the situation and, making fraud possible.
Hooper et al. (2010) state that, even when the pressure is extreme, financial fraud cannot occur unless an
opportunity is present. Opportunity has two aspects: (i) the inherent susceptibility of the organization to
manipulation, and (ii) the conditions within the organization that may allow a fraud to occur. Furthermore,
Srivastava, Mock and Turner (2005) argue that even if a person has a motive, he cannot commit fraud if no
possibilities are created. For example, if there is a poor job division, a poor internal control, the audit is not
performed on a regular basis, and the like, then the conditions will be favourable for the employee to commits
fraud. Chen and Elder (2007) and Fazli, Mohd and Muhammad (2014) used three proxies based on TSAS 43 to
measure opportunity including related party transactions, CEO duality and difference between control and cash
flow rights. Moyes et al. (2005) report that the presence of related party transactions ranks the second amongst the
most frequently encountered opportunity. In a study by Wilks and Zimbelman (2004) the related party transactions
was placed the third amongst the most common of opportunity to the fraudster. Similarly, Ming and Wong (2003)
also used related party transactions as a proxy to measure the opportunity. Vance (1983) state that another proxy
for opportunity was ineffective monitoring which was attributed to weak directorship in the public sector. Vance
(1983) suggested that CEO domination decreases the effectiveness of board in providing accurate control over
management activities. Another proxy is organizational structure.
According to Kenyon and Tilton (2006), as quoted by Ewa and Udoayang (2012) absent or ineffective
controls, lack of supervision or inadequate segregation of duties may provide opportunities to commit fraud.
Lindquist and Singleton (2006), stated that the ‘Report To The Nation (RTTN) (2004) research carried out by
Association of Certified Fraud Examiners showed that most employees and managers who commits fraud tend to
have a long tenure with organization. That is what gives the chance to exploit the opportunity therein the
organization. Ewa and Udoayang (2012) deduced, that employees and managers who have been around for years
know quite well where the weaknesses are in the internal controls and have gained sufficient knowledge of how
to commit the crime successfully without fear and stress.

2.4 Rationalization
The third element of the FTT is rationalization. This concept suggests that the perpetrator must formulate some
type of morally acceptable rationalization before engaging in unethical behaviour. Rationalization refers to the
justification that the unethical behaviour is something other than criminal activity. If an individual cannot justify
unethical actions, it is unlikely that he or she will engage in fraud. Some examples of rationalizations of fraudulent
behaviour include “I was only borrowing the money”, “I was entitled to the money”, “I had to steal to provide for
my family”, “I was underpaid/my employer had cheated me” (Cressey, 1953). It is important to note that
rationalization is difficult to observe, as it is impossible to read the perpetrator’s mind (Cressey 1953 in Wells,
2005). Individuals who commit fraud possess a particular mind-set that allows them to justify or excuse their
fraudulent actions (Hooper and Pornelli, 2010).
Rationalization is a justification of fraudulent behaviour because of an employee’s lack of personal
integrity, or other moral reasoning (Rae and Subramanian, 2008). Some individuals are more prone than others to
commit fraud. That the propensity to commit fraud depends on people ethical values as well as on their personal
circumstances. The ethical behaviour is motivated both by a person’s character and by external factors, which
include job insecurity such as during a downsizing, redundancy, a work environment that inspires resentment such
as being, passed over for promotion. Likewise, external environment includes the tone at the top i.e. the attitude
of management toward fraud risk and management’s response to actual instances of fraud. They posited that when
fraud has occurred in the past and management has not responded appropriately, others might conclude that the

33
33
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015

issue is not taken seriously and they can get away with it (Kenyon and Tilton, 2006).
Wilson (2004) explains “opportunity” as the ability to override fraud controls. Similarly, Wilson ibid
describes “pressure” as the motivation to commit the fraudulent act, and “rationalization” as referring to the moral
and ethical argument used to justify the act. The elements of incentive/pressure, opportunity, rationalization and
capability are all inter-related, and the strength of each element influences the others. Howe and Malgwi (2006)
concluded that a bridge between incentive/pressure and opportunity is created when an individual is able to
rationalize the fraudulent behaviour.

3.0 The Fraud Diamond Theory


The FDT was first presented by Wolfe and Hermanson in the CPA Journal (December 2004). It is generally viewed
as an expanded version of the FTT. Figure 2 presents the diagram for FDT. In this theory, an element termed
capability has been added to the three initial fraud elements of the FTT. Wolfe and Hermanson (2004) argued that
although perceived pressure or incentive might coexist with an opportunity to commit fraud and a rationalization
for doing so, it is unlikely for fraud to take place unless the fourth element (i.e., capability) is also present. In other
words, the potential perpetrator must have the skills and ability to commit fraud.

Figure 2.The fraud diamond


Source: Wolfe and Hermanson (2004)
According to Wolfe and Hermanson (2004:38) “Opportunity opens the doorway to fraud, and incentive
(i.e. pressure) and rationalization can draw a person toward it. However, the person must have the capability to
recognize the open doorway as an opportunity and to take advantage of it by walking through, not just once, but
repeatedly”. With the additional element presented in the FDT affecting individuals’ decision to commit fraud, the
organization and auditors need to understand employees’ individual traits and abilities in order to assess the risk
of fraudulent behaviours in the public sector.
The elements of FDT are interrelated to the extent that an employee cannot commit fraud until all of the
elements are present. The theory proposes that pressure can cause someone to seek opportunity, and pressure and
opportunity can encourage rationalization. At the same time, none of these two factors, alone or together,
necessarily cause an individual to engage in activities that could lead to fraud until the fraudster has the capability
to do so (Hooper and Pornelli, 2010). The additional element, i.e., capability is what differentiates the FDT of
Wolfe and Hermanson (2004) from the FTT of Cressey (1950).

3.1 Capability
This is the situation of having the necessary traits or skills and abilities for the person to commit fraud. It is where
the fraudster recognised the particular fraud opportunity and ability to turn it into reality. Position, intelligence,
ego, coercion, deceit and stress, are the supporting elements of capability (Wolfe and Hermanson 2004). According
to Bressler and Bressler (2007) as cited by Mackevicius and Giriunas (2013) not every person who possessed
motivation, opportunities, and realisation may commit fraud due to the lack of the capability to carry it out or to
conceal it. Albrecht, Williams, and Wernz (1995) opine that this element is particularly important when it concerns
a large-scale or long-term fraud. Furthermore, Albrecht et al. (1995) believe that only the person who has an
extremely high capacity will be able to understand the existing internal control, to identify its weaknesses and to
use them in planning the implementation of fraud.

3.2 Position/Function
Wolfe and Hermanson (2004:39) state that the person's position or function within the organization may furnish

34
34
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015

the ability to create or exploit an opportunity for fraud not available to others. In a research conducted as An
Analysis of U.S. Public Companies, Beasley et al. (1999) as quoted by Wolfe and Hermanson (2004) found that
corporate CEOs were implicated in over 70 percent of publicly-company’s accounting frauds. They also report
that many organizations do not implement sufficient checks and balances to mitigate their CEO's capabilities to
influence and perpetuate frauds. Additionally, when people perform a certain function repeatedly, such as bank
reconciliations or setting up new vendor accounts, their capability to commit fraud increases as their knowledge
of the function's processes and controls expands over time.

3.3 Intelligence/Creativity and Ego


The fraudster is someone who understands and capable of exploiting internal control weaknesses and using the
position; function or authorized access to the greatest advantage. Intelligent, experienced, creative people with a
solid grasp of controls and vulnerabilities, commit many of today’s largest frauds. This knowledge is used to
leverage the person's responsibility over or authorized access to systems or assets (Wolfe and Hermanson 2004:40).
According to the Association of Certified Fraud Examiners (2003), 51% of the perpetrators of occupational fraud
had at least a bachelor's degree, and 49% of the fraudsters were over 40 years old. In addition, managers or
executives committed 46% of the frauds based on the Association’s recent study.
The fraudster has a strong ego and great confidence that he will not be detected, or believes that he could
easily take himself out of trouble if caught. Such confidence or arrogance can affect one's cost benefit analysis of
engaging in fraud. The more confident the person, the lower the estimated cost of fraud will be (Wolfe and
Hermanson 2004:40). In an article entitled, "The Human Face of Fraud" it is noted that, one of the common
personality types among fraudsters is the ego. An egoistic person refers to someone who is "driven to succeed at
all costs, self-absorbed, self-confident and narcissistic” (Duffield and Grabosky, 2001). “The Psychology of Fraud"
notes that, in addition to financial strain, an aspect of aspect of motivation that may apply to some or all types of
fraud is ego/power. Wolfe and Hermanson (2004:40) quoting Sutherland (1977) “Theory of White Collar
Criminals” state that, "As fraudsters found themselves successful at this crime, they began to gain some secondary
delight in the knowledge that they are fooling world, that they are showing their superiority to others". The
individuals committing fraud must have a strong ego and great confidence that they will not be detected. The
common personality types include someone who is driven to succeed at all costs, self-absorbed, self-confident,
and often-narcissistic (Rudewicz 2011). According to the Diagnostic and Statistical Manual of Mental
Disorders(DSMMD), as cited by Rudewicz (2011) narcissistic personality disorder is a pervasive pattern of
grandiosity, a need for admiration and a lack of empathy for others. Individuals with this disorder believe they are
superior or unique, and they are likely to have inflated views of their own accomplishments and abilities.

3.4 Coercion, Deceit and Stress


A successful fraudster can coerce others to commit or conceal fraud Rudewicz (2011). A person with a very
persuasive personality may be able to convince others to go along with a fraud or to simply look the other way. In
addition it is noted that, a common personality type among fraudsters is the "bully," who "makes unusual and
significant demands of those who work for him or her, cultivates fear rather than respect and consequently avoids
being subject to the same rules and procedures as others" (Wolfe and Hermanson 2004:41). Many financial
reporting frauds are committed by subordinates reacting to an edict from above to "make your numbers at all costs,
or else."(Wolfe and Hermanson 2004:40).
According to Wolfe and Hermanson (2004) and Rudewicz, (2011) a successful fraudster must also lie
effectively and consistently. To avoid detection, the fraudster must look at the auditors, investors, and others right
in the eye and convincingly tell them lies. Thus, the fraudster should also possess the skill to keep track of the lies,
so that the overall story remains consistent. In the Phai-Mor fraud, the auditors claimed that Phar-Mor had formed
a team of fraudsters made-up of executives and former auditors whose function is to ensure they are working
continuously to hide evidence of frauds. Among other, the auditors claimed that the fraud team not only lying but
also forged documents and 'scrubbed' everything the auditors saw to hide any indications of malfeasance (Cottrell
and Glover, 1997 in Wolfe and Hermanson 2004). Another strong characteristic of fraudsters is their ability to
handle stress (Wolfe and Hermanson, 2004). Committing frauds require and managing the frauds over a long
period of time and can be stressful. There is the risk of detection, with its personal ramifications, as well as the
constant need to conceal the fraud on a daily basis. The individual must be able to control their stress, as committing
the fraudulent act and keeping it concealed can be extremely stressful ( Rudewicz, 2011).

4.0 Future Fraud Research


Further research can be conducted based on the use of the classical fraud theory especially FDT being a new
version of FTT. Moreover, both the two theories converged on the three of the elements as pressure to commit
fraud; Opportunity to exploit the organizational weaknesses as well as the rationalization which is a way to justified
the course of action by the fraudster. Considering the diverged element ‘capability’ which is an addition over the

35
35
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015

three mentioned elements, this makes it quite clear to page a way or sources for further research to be conducted,
such as the influence of capability towards committing fraud.
Contribution to the Knowledge
The study will contribute to the body of existing knowledge through the following ways:
The study contributes to the existing knowledge by expressing the views of different academic scholars with the
regards to the two theories (fraud triangle theory and fraud diamond theory) as such the study may serve as a
source of academic literature. The study will help the forensic accountants, auditors, fraud examiners and other
anti-fraud bodies to understand the two fraud theories thoroughly and clearly choose the one, which will assist
them in identifying and investigating the remote cause of fraud concealment and effective assessment of fraud risk.
The study may serve as guidance for further research to be carried out on the subject matter in areas that the study
did not address.

5.0 Conclusion
This article reviews the existing literature on frauds for the purpose of discussing the similarities and differences
between the FTT and FDT. The level of fraud concealed and its cost is expected to rise over time. In order to
proactively address the fraud risk factors, the anti-graft bodies have to clearly understand the fundamental elements
which contribute to fraudulent acts. Violations of trust are motivated by one’s perceived risk of the surrounding
and the temptations to benefit from the situation. The fundamental factors that contribute to fraud are based on the
well- known FTT of Cressey (1950). However, several new fraud theories were subsequently developed to mitigate
the shortcomings of this theory. FDT of Wolfe and Hermanson (2004) was one of the new fraud theories developed,
which stand to be an extended version of fraud triangle having an additional element “capacity” beside the three
elements identified by Cressey’s fraud triangle as perceived pressure, perceived opportunity, and rationalization.
The argument was Wolfe and Hermanson believed that although the fraudster may have the pressure, opportunity
to commit the fraud and rationalise the ideology of betraying the trust. Yet, he cannot conceal unless he has the
capability to do so.

References
Albrecht, W. S., Albrecht, C. & Albrecht, C. C. (2008). Current Trends in Fraud and its Detection: A Global
Perspective. Information Security Journal Vol.17. Retrieved from www.ebscohost.com on 11th June, 2014.
Association of Certified Fraud Examiners (2010). Report to the Nation on Occupational Fraud. Retrieved May 26,
2014, https://acfe.com/ documents/2010RttN.pdf
Bierstaker, J. L., Brody, R. G. & Pacini C. (2006). Accountants’ perceptions regarding fraud detection and prevention
methods. Managerial Auditing Journal Vol. 21 No. 5 pp. 520-535.
Chen, K. Y. & Elder, R. J. (2007). Fraud Risk Factors and the Likelihood of Fraudulent Financial Reporting: Evidence
from Statement on Auditing Standards No. 43 in Taiwan, Working paper.
Cressey, D. R. (1953). Other People’s Money. Montclair, NJ: Patterson Smith, pp.1-300.
Dorminey, J., Fleming, A., Kranacher, M., & Riley, R. (2010). Beyond the fraud triangle: The CPA Journal, 80(7),
17-23.
Duffield, G. & Grabosky, P. (2001). The psychology of fraud. Trends and issues in crime and criminal justice.
Australian Institute of Criminology, Canberra.
Ernst, & Young, (2009). Detecting financial statement fraud. Retrieved: 2 August 2014 from http:
www.ey.com/Publication/vwLUAssets/FIDSFI Detecting Financial Statement Fraud.pdf/$FILE/FIDS-
FI_detectingFinanceStatementFraud.pdf.
Ewa, U. E, & Udoayang, J. O (2012). The Impact Of Internal Control Design On Banks’ Ability To Investigate Staff
Fraud, And Life Style And Fraud Detection In Nigeria International Journal of Research in Economics &
Social Sciences Volume 2, Issue 2 pp.32-44
Fazli, S. A., Mohd T. I.,& Mohamed M. Z., (2014). Fraud Risk Factors of Fraud Triangle and the Likelihood of Fraud
Occurrence: Evidence from Malaysia. Information Management and Business Review Vol. 6, No. 1, pp. 1-
7, (ISSN 2220-3796).
Florenz , C. T. (2012), Exploring a New Element of Fraud: A Study on Selected Financial Accounting Fraud Cases
in the World. American International Journal of Contemporary Research Vol. 2 No. 6; pp. 112-121.
Gbegi, D. O., & Adebisi, J. F. (2013). The New Fraud Diamond Model - How can it help forensic accountants in
fraud investigation in Nigeria? European Journal of Accounting Auditing and Fiancé Research Vol.1, No.
4, pp.129-138,
Hooper, M. J,. & Pornelli, C. M. (2010). Deterring and detecting financial fraud: A platform for action.
http://www.thecaq.org/docs/reports-and-publications/deterring-and-detecting financial-reporting-fraud-a-
platform-for-action.pdf? Retrieved on 2 August 2014.
Kelly, P. and Hartley, C. A. (2010). Casino gambling and workplace fraud: a cautionary tale for managers.
Management Research Review , Vol. 33, No. 3, 224-239.

36
36
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015

Kenyon, W. and Tilton, P. D. (2006). Potential red flags and fraud detection techniques: A Guide to Forensic
Accounting Investigation, First Edition, John Wiley & Sons, Inc, New Jersey.
Kiragu, D. N., Wanjau, K. L., Gekara, M.,& Kanali, C. (2013). Effects of bank growth on occupational fraud risks in
commercial banks in Kenya. International Journal of Social Sciences and Entrepreneurship, 1 (3), 469-480.
Levi, M. (2008). Organized frauds and organizing frauds: unpacking the research on networks and organization.
Journal of Criminology and Criminal Justice, (7), 389-419.
Lister, L. M. (2007). A Practical Approach to Fraud Risk: Internal Auditors.
Mackevicius, J., & Giriunas, L. (2013). Transformational Research of the Fraud Triangle, ISSN Vol. 92(4)
EKONOMICA, pp. 150-163.
Manurung D. T. H., & Hadian, N. (2013). Detection Fraud of Financial Statement with Fraud Triangle. Proceedings
of the 23rd International Business Research Conference, pp. 18-20 Marriott Hotel, Melbourne, Australia,
ISBN: 978-1-922069-36-8.
Ming, J. J., & Wong, T.J. (2003). Earnings management and tunnelling through related party transactions: Evidence
from Chinese corporate groups. EFA 2003 Annual Conference, Paper No.549.
Moyes G., Lin, P. & Landry-Jr, R. (2005). Raise the red flag: Internal Auditor, October: 47-51.
Murdock, H. (2008). The Three Dimensions of Fraud: Internal Auditors. Retrieved on June 22, 2014 from
www.emerald.com.
Normah, B. O,. & Hesri, F. M. D. (2010). Fraud Diamond Risk Indicator: An Assessment of Its Importance and
Usage, International Conference on Science and Social Research (CSSR 2010), Kuala Lumpur, Malaysia
pp. 607-612.
Okezie A. (2012). An Analysis of Fraud in Nigerian Banks. American Charter of Economics and Finance, Vol. 1 No.
2 pp. 60-73.
Peterson, B. K. & Buckhoff, T. A. (2004). Anti-fraud education in academia. Advances in Accounting Education:
Teaching and Curriculum Innovations, Vol. 6, pp. 45-67.
Rae, K., & Subramaniam, N. (2008), Quality of internal control procedures: Antecedents and moderating effect on
organisational justice and employee fraud. Managerial Auditing Journal, 23(2), 104-124.
Rasha, K., & Andrew, H. (2012). The New Fraud Triangle, Journal of Emerging Trends in Economics and
Management Sciences, Vol. 3(3): Retrieved from google.com July 13, 2014.
Rezaee, Z., Crumbley, D. L., & Elmore, R. C. (2004). Forensic accounting education. Advances in Accounting
Education: Teaching and Curriculum Innovations, Vol. 6, pp. 193-231.
Singleton, T. W., Bologna, G. J., Lindquist, R. J., & Singleton, A. J. (2006). Fraud auditing and forensic accounting,
3rd Ed., John Wiley & Sons, Inc, New Jersey.
Smith, M., Omar, N., Sayed, I. S. I. and Baharuddin, I. (2005). Auditors' perception of fraud risk indicators: Malaysian
Evidence. Managerial Auditing Journal , Vol. 20, No. 1, 73-85.
Srivastava, R. P., Mock T. J., & Turner, J. L. (2005). Fraud Risk Formulas for Financial Statement Audits. Australian
National University Business and Information Management Auditing Research Workshop and from Gary
Monroe, Lei Gao and Lili Sun. pp. 1-48
Thanasak, R. (2013). The Fraud Factors. International Journal of Management and Administrative Sciences (IJMAS)
(ISSN: 2225-7225) Vol. 2, No. 2, pp. 01-05.
Vance, S. (1983). Corporate leadership: Boards, directors and strategy. New York: McGraw-Hill.
Vona, I. W. (2008). Fraud Risk Assessment: Building a Fraud Audit Programme: Hoboken, New Jersey: John Wiley
and Sons.
Wells, J. T. (2005). Principles of fraud examination. Hoboken, N.J.: John Wiley & Sons Inc.
Wells, J. T. (2011). Corporate Fraud Handbook: Prevention and Detection: 3rd Edition: Hoboken, New Jersey: John
Wiley & Sons Inc.
Wilks, T. J., & Zimbelman, M. F. (2004). Decomposition of Fraud-Risk Assessments and Auditors’ Sensitivity to
Fraud Cues. Contemporary Accounting Research, 21(3), 719-745.
Wilson, I. (2007),Regulatory and institutional challenges of corporate governance in Nigeria post consolidation.
Nigerian Economic Summit Group (NESG) Economic Indicators, April-June, Vol. 12, No 2
Wolfe, D., & Hermanson, D. R. (2004). The fraud diamond: Considering four elements of fraud. The CPA Journal,
74 (12), 38-42.

37
37

You might also like