Farud Triangle & Diamond
Farud Triangle & Diamond
Farud Triangle & Diamond
org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015
Abstract
Many of the world’s most prominent organizations have experienced large-scale frauds. These frauds have had
disturbing effects on our world’s economy in addition to contributing unnecessary suffering and increased
unemployment for the low and middle class. With the aim of further understanding the fundamental motivations
of fraud, this paper takes an in-depth look at the convergent and divergent of two classical fraud theories which
are: (i) fraud triangle theory; and (ii) fraud diamond theory. This comparison is important to assist anti-graft bodies
and organizations in formulating a practical strategy to prevent and investigate organizational frauds. The paper
takes a conceptual approach by first examining the concept of fraud, then discussing the convergence of the two
classical theories, and finally differentiating them. By doing so, the similarities and differences between them are
highlighted and appreciated for fraud prevention purposes. The study uses secondary sources of information
obtained from journal articles, textbooks and the internet. The discussion of the two theories contributes to the
understanding of frauds especially by forensic accountants, auditors, fraud examiners and other anti-fraud bodies.
The study also serves as guidance for further fraud related research.
Keywords: Fraud; fraud diamond theory; fraud triangle theory; forensic accounting.
1.0 Introduction
In recent years, corporate financial accounting scandals no longer become unexpected news of the day. Cases such
as Enron, WorldCom, Global Crossing and Tyco are among the most prominent ones which had suffered from the
devastating impact of fraud. These costly scandals have increased global concerns about fraud, wiping out billions
of dollars of shareholder value, and led to the erosion of investors and public confidence in the financial markets
(e.g., Peterson and Buckhoff, 2004; Rezaee, Crumbley and Elmore 2004 in Bierstaker, Brody and Pacini 2006).
Many studies have discussed fraud-related issues and the general view is that fraud prevention should be
the main focus. It is less expensive and more effective to prevent fraud from happening than to detect it after
occurrence. Usually, by the time the fraud is discovered, the money is unrecoverable or the chance to recover the
full amount of the lost is very slim. Furthermore, it is costly and time consuming to investigate frauds especially
involving large-scale multinational operations. However, if the focus is on fraud prevention all the monetary
losses, time and effort to reconstruct fraudulent transactions, track down the perpetrator, and reclaim missing funds
can be saved. Thanasak (2013:1) states that before making any efforts to reduce fraud and manage the risks
proactively, it is important for the business organizations to identify the factors leading to fraudulent behaviour by
understanding who are the fraudsters, when and why frauds are committed. Various theories have attempted to
explain the causes of fraud and the two most cited theories are the Fraud Triangle Theory (FTT) of Cressey (1950)
and Fraud Diamond Theory (FDT) of Wolfe and Hermanson (2004). Both of them identify the elements that lead
perpetrators to commit fraud. According to Dorminey, Fleming, Kranacher, and Riley (2010), the origin of the
FTT dates to the works of Edwin Sutherland (1939) who coined the term white-collar crime, and Cressey was one
of Sutherland's former students. Cressey (1950) focused his research on the factors that lead individuals to engage
in fraudulent and unethical activity. His research later became known as the FTT. This theory consists of three
elements that are necessary for fraud to occur: (i) perceived pressure, (ii) opportunity, and (iii) rationalization.
David T. Wolfe and Dana R. Hermanson believed that the former FTT has to be enhancing to improve both fraud
prevention and detection by considering an additional element above the three, mentioned elements of FTT. They
considered four sided FDT there by adding capability as the fourth element. Wolfe and Hermanson (2004 pp.38)
state that fraud cannot successfully concealed unless the fraudster has capability: personal traits and abilities that
play a major role in whether fraud may occur even with the presence of other three elements.
In their separate works, Wolfe and Hermanson (2004), Thanasak (2013), Norman and Faizal (2010),
Florenz (2012), Gbegi and Adebisi (2013) examined and discussed the FDT. Their main conclusion was that the
FDT is an extended or improved version of the FTT with an addition of “capability” added to the three basic
elements of fraud in the FTT. Therefore, this paper aims to further explain the convergent and divergent between
the FTT and FDT. The paper is presented as follows: Section 1 discusses the fundamental concept of fraud; while
section 2 examines the classical fraud theories, their convergent as well as divergent in general. In section 3 the
paper was concluded and highlighted the areas likely for future research and the contribution to the existing body
of knowledge.
30
30
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015
31
31
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015
32
32
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015
may find themselves offered incentives or placed under pressure to commit fraud. Singleton et al. (2006) stated
that incentives or pressures might take a variety of forms within an organization. These financial ‘rewards’ include
bonuses or pay-related incentives including employees or group’s compensation and share price targets.
2.4 Rationalization
The third element of the FTT is rationalization. This concept suggests that the perpetrator must formulate some
type of morally acceptable rationalization before engaging in unethical behaviour. Rationalization refers to the
justification that the unethical behaviour is something other than criminal activity. If an individual cannot justify
unethical actions, it is unlikely that he or she will engage in fraud. Some examples of rationalizations of fraudulent
behaviour include “I was only borrowing the money”, “I was entitled to the money”, “I had to steal to provide for
my family”, “I was underpaid/my employer had cheated me” (Cressey, 1953). It is important to note that
rationalization is difficult to observe, as it is impossible to read the perpetrator’s mind (Cressey 1953 in Wells,
2005). Individuals who commit fraud possess a particular mind-set that allows them to justify or excuse their
fraudulent actions (Hooper and Pornelli, 2010).
Rationalization is a justification of fraudulent behaviour because of an employee’s lack of personal
integrity, or other moral reasoning (Rae and Subramanian, 2008). Some individuals are more prone than others to
commit fraud. That the propensity to commit fraud depends on people ethical values as well as on their personal
circumstances. The ethical behaviour is motivated both by a person’s character and by external factors, which
include job insecurity such as during a downsizing, redundancy, a work environment that inspires resentment such
as being, passed over for promotion. Likewise, external environment includes the tone at the top i.e. the attitude
of management toward fraud risk and management’s response to actual instances of fraud. They posited that when
fraud has occurred in the past and management has not responded appropriately, others might conclude that the
33
33
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015
issue is not taken seriously and they can get away with it (Kenyon and Tilton, 2006).
Wilson (2004) explains “opportunity” as the ability to override fraud controls. Similarly, Wilson ibid
describes “pressure” as the motivation to commit the fraudulent act, and “rationalization” as referring to the moral
and ethical argument used to justify the act. The elements of incentive/pressure, opportunity, rationalization and
capability are all inter-related, and the strength of each element influences the others. Howe and Malgwi (2006)
concluded that a bridge between incentive/pressure and opportunity is created when an individual is able to
rationalize the fraudulent behaviour.
3.1 Capability
This is the situation of having the necessary traits or skills and abilities for the person to commit fraud. It is where
the fraudster recognised the particular fraud opportunity and ability to turn it into reality. Position, intelligence,
ego, coercion, deceit and stress, are the supporting elements of capability (Wolfe and Hermanson 2004). According
to Bressler and Bressler (2007) as cited by Mackevicius and Giriunas (2013) not every person who possessed
motivation, opportunities, and realisation may commit fraud due to the lack of the capability to carry it out or to
conceal it. Albrecht, Williams, and Wernz (1995) opine that this element is particularly important when it concerns
a large-scale or long-term fraud. Furthermore, Albrecht et al. (1995) believe that only the person who has an
extremely high capacity will be able to understand the existing internal control, to identify its weaknesses and to
use them in planning the implementation of fraud.
3.2 Position/Function
Wolfe and Hermanson (2004:39) state that the person's position or function within the organization may furnish
34
34
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015
the ability to create or exploit an opportunity for fraud not available to others. In a research conducted as An
Analysis of U.S. Public Companies, Beasley et al. (1999) as quoted by Wolfe and Hermanson (2004) found that
corporate CEOs were implicated in over 70 percent of publicly-company’s accounting frauds. They also report
that many organizations do not implement sufficient checks and balances to mitigate their CEO's capabilities to
influence and perpetuate frauds. Additionally, when people perform a certain function repeatedly, such as bank
reconciliations or setting up new vendor accounts, their capability to commit fraud increases as their knowledge
of the function's processes and controls expands over time.
35
35
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015
three mentioned elements, this makes it quite clear to page a way or sources for further research to be conducted,
such as the influence of capability towards committing fraud.
Contribution to the Knowledge
The study will contribute to the body of existing knowledge through the following ways:
The study contributes to the existing knowledge by expressing the views of different academic scholars with the
regards to the two theories (fraud triangle theory and fraud diamond theory) as such the study may serve as a
source of academic literature. The study will help the forensic accountants, auditors, fraud examiners and other
anti-fraud bodies to understand the two fraud theories thoroughly and clearly choose the one, which will assist
them in identifying and investigating the remote cause of fraud concealment and effective assessment of fraud risk.
The study may serve as guidance for further research to be carried out on the subject matter in areas that the study
did not address.
5.0 Conclusion
This article reviews the existing literature on frauds for the purpose of discussing the similarities and differences
between the FTT and FDT. The level of fraud concealed and its cost is expected to rise over time. In order to
proactively address the fraud risk factors, the anti-graft bodies have to clearly understand the fundamental elements
which contribute to fraudulent acts. Violations of trust are motivated by one’s perceived risk of the surrounding
and the temptations to benefit from the situation. The fundamental factors that contribute to fraud are based on the
well- known FTT of Cressey (1950). However, several new fraud theories were subsequently developed to mitigate
the shortcomings of this theory. FDT of Wolfe and Hermanson (2004) was one of the new fraud theories developed,
which stand to be an extended version of fraud triangle having an additional element “capacity” beside the three
elements identified by Cressey’s fraud triangle as perceived pressure, perceived opportunity, and rationalization.
The argument was Wolfe and Hermanson believed that although the fraudster may have the pressure, opportunity
to commit the fraud and rationalise the ideology of betraying the trust. Yet, he cannot conceal unless he has the
capability to do so.
References
Albrecht, W. S., Albrecht, C. & Albrecht, C. C. (2008). Current Trends in Fraud and its Detection: A Global
Perspective. Information Security Journal Vol.17. Retrieved from www.ebscohost.com on 11th June, 2014.
Association of Certified Fraud Examiners (2010). Report to the Nation on Occupational Fraud. Retrieved May 26,
2014, https://acfe.com/ documents/2010RttN.pdf
Bierstaker, J. L., Brody, R. G. & Pacini C. (2006). Accountants’ perceptions regarding fraud detection and prevention
methods. Managerial Auditing Journal Vol. 21 No. 5 pp. 520-535.
Chen, K. Y. & Elder, R. J. (2007). Fraud Risk Factors and the Likelihood of Fraudulent Financial Reporting: Evidence
from Statement on Auditing Standards No. 43 in Taiwan, Working paper.
Cressey, D. R. (1953). Other People’s Money. Montclair, NJ: Patterson Smith, pp.1-300.
Dorminey, J., Fleming, A., Kranacher, M., & Riley, R. (2010). Beyond the fraud triangle: The CPA Journal, 80(7),
17-23.
Duffield, G. & Grabosky, P. (2001). The psychology of fraud. Trends and issues in crime and criminal justice.
Australian Institute of Criminology, Canberra.
Ernst, & Young, (2009). Detecting financial statement fraud. Retrieved: 2 August 2014 from http:
www.ey.com/Publication/vwLUAssets/FIDSFI Detecting Financial Statement Fraud.pdf/$FILE/FIDS-
FI_detectingFinanceStatementFraud.pdf.
Ewa, U. E, & Udoayang, J. O (2012). The Impact Of Internal Control Design On Banks’ Ability To Investigate Staff
Fraud, And Life Style And Fraud Detection In Nigeria International Journal of Research in Economics &
Social Sciences Volume 2, Issue 2 pp.32-44
Fazli, S. A., Mohd T. I.,& Mohamed M. Z., (2014). Fraud Risk Factors of Fraud Triangle and the Likelihood of Fraud
Occurrence: Evidence from Malaysia. Information Management and Business Review Vol. 6, No. 1, pp. 1-
7, (ISSN 2220-3796).
Florenz , C. T. (2012), Exploring a New Element of Fraud: A Study on Selected Financial Accounting Fraud Cases
in the World. American International Journal of Contemporary Research Vol. 2 No. 6; pp. 112-121.
Gbegi, D. O., & Adebisi, J. F. (2013). The New Fraud Diamond Model - How can it help forensic accountants in
fraud investigation in Nigeria? European Journal of Accounting Auditing and Fiancé Research Vol.1, No.
4, pp.129-138,
Hooper, M. J,. & Pornelli, C. M. (2010). Deterring and detecting financial fraud: A platform for action.
http://www.thecaq.org/docs/reports-and-publications/deterring-and-detecting financial-reporting-fraud-a-
platform-for-action.pdf? Retrieved on 2 August 2014.
Kelly, P. and Hartley, C. A. (2010). Casino gambling and workplace fraud: a cautionary tale for managers.
Management Research Review , Vol. 33, No. 3, 224-239.
36
36
European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.7, No.28, 2015
Kenyon, W. and Tilton, P. D. (2006). Potential red flags and fraud detection techniques: A Guide to Forensic
Accounting Investigation, First Edition, John Wiley & Sons, Inc, New Jersey.
Kiragu, D. N., Wanjau, K. L., Gekara, M.,& Kanali, C. (2013). Effects of bank growth on occupational fraud risks in
commercial banks in Kenya. International Journal of Social Sciences and Entrepreneurship, 1 (3), 469-480.
Levi, M. (2008). Organized frauds and organizing frauds: unpacking the research on networks and organization.
Journal of Criminology and Criminal Justice, (7), 389-419.
Lister, L. M. (2007). A Practical Approach to Fraud Risk: Internal Auditors.
Mackevicius, J., & Giriunas, L. (2013). Transformational Research of the Fraud Triangle, ISSN Vol. 92(4)
EKONOMICA, pp. 150-163.
Manurung D. T. H., & Hadian, N. (2013). Detection Fraud of Financial Statement with Fraud Triangle. Proceedings
of the 23rd International Business Research Conference, pp. 18-20 Marriott Hotel, Melbourne, Australia,
ISBN: 978-1-922069-36-8.
Ming, J. J., & Wong, T.J. (2003). Earnings management and tunnelling through related party transactions: Evidence
from Chinese corporate groups. EFA 2003 Annual Conference, Paper No.549.
Moyes G., Lin, P. & Landry-Jr, R. (2005). Raise the red flag: Internal Auditor, October: 47-51.
Murdock, H. (2008). The Three Dimensions of Fraud: Internal Auditors. Retrieved on June 22, 2014 from
www.emerald.com.
Normah, B. O,. & Hesri, F. M. D. (2010). Fraud Diamond Risk Indicator: An Assessment of Its Importance and
Usage, International Conference on Science and Social Research (CSSR 2010), Kuala Lumpur, Malaysia
pp. 607-612.
Okezie A. (2012). An Analysis of Fraud in Nigerian Banks. American Charter of Economics and Finance, Vol. 1 No.
2 pp. 60-73.
Peterson, B. K. & Buckhoff, T. A. (2004). Anti-fraud education in academia. Advances in Accounting Education:
Teaching and Curriculum Innovations, Vol. 6, pp. 45-67.
Rae, K., & Subramaniam, N. (2008), Quality of internal control procedures: Antecedents and moderating effect on
organisational justice and employee fraud. Managerial Auditing Journal, 23(2), 104-124.
Rasha, K., & Andrew, H. (2012). The New Fraud Triangle, Journal of Emerging Trends in Economics and
Management Sciences, Vol. 3(3): Retrieved from google.com July 13, 2014.
Rezaee, Z., Crumbley, D. L., & Elmore, R. C. (2004). Forensic accounting education. Advances in Accounting
Education: Teaching and Curriculum Innovations, Vol. 6, pp. 193-231.
Singleton, T. W., Bologna, G. J., Lindquist, R. J., & Singleton, A. J. (2006). Fraud auditing and forensic accounting,
3rd Ed., John Wiley & Sons, Inc, New Jersey.
Smith, M., Omar, N., Sayed, I. S. I. and Baharuddin, I. (2005). Auditors' perception of fraud risk indicators: Malaysian
Evidence. Managerial Auditing Journal , Vol. 20, No. 1, 73-85.
Srivastava, R. P., Mock T. J., & Turner, J. L. (2005). Fraud Risk Formulas for Financial Statement Audits. Australian
National University Business and Information Management Auditing Research Workshop and from Gary
Monroe, Lei Gao and Lili Sun. pp. 1-48
Thanasak, R. (2013). The Fraud Factors. International Journal of Management and Administrative Sciences (IJMAS)
(ISSN: 2225-7225) Vol. 2, No. 2, pp. 01-05.
Vance, S. (1983). Corporate leadership: Boards, directors and strategy. New York: McGraw-Hill.
Vona, I. W. (2008). Fraud Risk Assessment: Building a Fraud Audit Programme: Hoboken, New Jersey: John Wiley
and Sons.
Wells, J. T. (2005). Principles of fraud examination. Hoboken, N.J.: John Wiley & Sons Inc.
Wells, J. T. (2011). Corporate Fraud Handbook: Prevention and Detection: 3rd Edition: Hoboken, New Jersey: John
Wiley & Sons Inc.
Wilks, T. J., & Zimbelman, M. F. (2004). Decomposition of Fraud-Risk Assessments and Auditors’ Sensitivity to
Fraud Cues. Contemporary Accounting Research, 21(3), 719-745.
Wilson, I. (2007),Regulatory and institutional challenges of corporate governance in Nigeria post consolidation.
Nigerian Economic Summit Group (NESG) Economic Indicators, April-June, Vol. 12, No 2
Wolfe, D., & Hermanson, D. R. (2004). The fraud diamond: Considering four elements of fraud. The CPA Journal,
74 (12), 38-42.
37
37