450 likes | 509 Views
Explore the need for fraud risk models and the importance of detecting and preventing "Dark Triad" fraud risk. Learn about the occurrence and typology of frauds, including financial reporting frauds, asset misappropriations, and external frauds.
E N D
2019 Williamsburg Advanced Fraud AcademyWHEN A TRIANGLE BECOMES A SINGULARITY:ASSESSING AND RESPONDING TO “DARK TRIAD” FRAUD RISK Barry Jay Epstein, Ph.D., CPA and Sridhar Ramamoorti, Ph.D., CPA, CFE
The Need For and Importance of Fraud Risk Models Material losses being incurred every year, world-wide • ACFE estimates 5% of GNP lost annually ($4 trillion of gross world product of $80 trillion) • Given narrow net margins (from 2% to 5%) for many businesses, the up-side potential for profits is enormous Occurrence of fraud a leading indicator of business failure • Once affected, companies often“limp along” for a while, then fail Losses impact every stakeholder group in most instances • Owners always most affected • Creditors usually also affected • Employees at risk of losing jobs • Customers at risk of losing source of supply • Vendors losing customers
The Need For and Importance of Fraud Risk Models Per ACFE’s 2018 “Report to the Nations” • There were almost 2,700 instances of “occupational fraud” identified • Losses from these identified instances totaled $7 billion • Losses from undetected fraud and abuse could be much greater Asset misappropriations (theft) were most common form • Average losses from thefts were $114,000 Losses from financial reporting frauds were much larger • Over $800,000 median loss Smaller businesses suffer disproportionately • Weak or missing internal controls largely responsible for this
External Auditors Continue to be Blamed Efforts to “educate” users to limits of outside audits were doomed to failure • “Expectation Gap” efforts of late-1980s had no impact on exposure • In litigation, the courts, not professional standards, decide on auditors’ role and responsibilities • Our professional standards are only the “floor” for responsibilities • Therefore, improved auditing, including fraud detection, is the only practical way to reduce costs of fraud and abuse Failure to address fraud detection costs the profession enormous sums • Litigation losses, legal fees, insurance premiums • Reputational risk • Opportunity costs: would society enlarge our mandate if seen worthy?
Fraud Detection as Our Raison d’Etre Fraud detection was once seen as a primary purpose for external audits • Early 20th Century focus for audits • Today, few audits find frauds, most (40%) found by whistleblowers Fraud detection faded as goal over past 75 years – why? • Difficult to accomplish, so profession sought to de-emphasize • Expansion of CPA services resulted in other, lucrative pursuits • Certain key tools, once standard in advanced courses, no longer taught • Fraud audits/forensic accounting seen as higher-price “super audit” Unfortunate unintended consequences • Downgraded perception of value of “normal” audits • Diminished value perception of entire range of typical CPA services
Occurrence and Typology of Frauds The three major categories of fraud: • Financial reporting fraud (also known as management fraud) • Misappropriation of assets (also known as employee fraud) • External fraud (i.e., perpetrated against the entity by vendors or others)
Financial Reporting Frauds Intentional misstatements of the financial statements • Occasionally done only for its own sake (management ego, etc.) • More often done to accomplish some bigger goal • May be done as corollary to other forms of fraud, e.g., theft from company Primary purpose is to mislead users of the financial statements • May be done by managers seeking higher bonuses • May be committed by executives holding stock options or stock • Could be done with outsider involvement, e.g., to harm company The least common form of occupational fraud and abuse • But . . . The most costly to the reporting entity, when it occurs
Asset Misappropriations Thefts of company assets by employees • Defalcations, embezzlements, stealing • Often accompanied by financial reporting fraud to cover up thefts • Most common form of fraud, but modest cost per occurrence Can take a variety of forms • Diverting cash sales from customers (skimming) • Manipulation of cash paid on receivables (lapping) • Theft of petty cash, inventory, supplies • Creation of fictitious vendors, billing for phantom goods/services • Unauthorized sales of scrap, inventory, fixed assets, intangibles • Kickback schemes with vendors • Recording fictitious returns or allowance • Ghost employees created and paid
External Frauds Simple frauds • Vendor (or customer) alters a check (refund check) • Vendors deliver substandard goods at full price for quality goods But can also take a variety of more complex forms • Bid rigging to overprice new construction or repair work • Various others, new ones being invented
The Development of the "Cressey Fraud Risk Triangle" Model and its Variants Sutherland’s white collar crime foundational work • Criminology (1924) and subsequent works defined white collar crime • Argued that crime occurs when behaviors learned within different cultures and groups come into conflict • Developed “differential association theory” as explanation • Rejected outright the notion of personality-based causes for crime Sutherland’s work criticized because: • It tied white collar crime to social status of the perpetrator • It made white collar crime an amorphous concept that expanded unreasonably • It uses “situational” explanation exclusively, rejects or ignores “dispositional” explanations for white collar crime Embraced by Sutherland’s student, Donald Cressey, for his Fraud Triangle • Accordingly, dispositional explanations remained ignored until recently
The Development of the "Cressey Fraud Risk Triangle" Model and its Variants Alternatives to Sutherland’s white collar crime assertions (alternative typologies) • Those based on the characteristics of the offender • Violator of fiduciary duties • Other • Those based on the type of offense • Corporate crime • Occupational crime • Governmental crime • State-corporate criminal collusion • Enterprise (corrupt organizations) crime • Those based on the culture or nature of the organization victimized
The Development of the "Cressey Fraud Risk Triangle" Model and its Variants Other proposed criminological theories having academic support • Social structural explanations • Emphasis on abuses by those in power • Marxian perspectives • Focus on ills of capitalistic system, abuse of power • Presumes stress on profit makes it impossible to impose good behavior • Anomie (normlessness) • Technological and other advances result in deviant behaviors • Organizational theories • Those becoming employed have personal norms challenged
The Development of the "Cressey Fraud Risk Triangle" Model and its Variants Other proposed criminological theories having academic support • Differential association and social learning theories • E.g., organizations may impose earnings per share growth as a value • Reinforcement of new norms (e.g., by bonus plans) disrupts values held • This explanation is fairly well supported by research • Control balance theory • Those having control surplus exhibit autonomous deviance • Those having control deficit exhibit repressive forms of deviance • Rational choice/deterrence theories • Crimes less likely if sanctions exist • Even the perception of possible sanctions can be effective • But studies also find contrary effects (e.g., greater desire for control even in the face of known threats of sanctions)
The Cressey Fraud Risk Triangle Model Developed in the context of embezzlement risk • Cressey, who was Sutherland’s student, became co-author with Sutherland • As did Sutherland, Cressey rejected personality factors as causative • Other People's Money: A Study in the Social Psychology of Embezzlement, 1973 • Fraud Triangle has, explicitly or implicitly, become the authoritative explanation embraced by the audit literature (AU-C 240, ISA 240)
Fraud Triangle and Other Models Cressey’s Fraud Triangle widely used, including in auditing standards • Asserts that the confluence of opportunity, motivation and ability to rationalize committing fraud will greatly increase likelihood of fraud actually occurring
Fraud Triangle and Other Models Cressey’s Fraud Triangle Elements • Pressure or incentive Generally, a person has a financial problem, either personal or corporate, that can be functionally addressed through the fraud. Incentive may be non-remuneratory (e.g., for bragging rights) • Opportunity The fraud perpetrator can “solve” his financial problem in secret, using his position, with low risk of being caught • Ability to rationalize the act The perpetrator does not see himself as criminal, merely caught in web of circumstances beyond his control and addressing those circumstances as best he can, in an effort to avoid the pain of affective-cognitive dissonance
Fraud Triangle and Other Models • Cressey’s Fraud Triangle – Rationalization by the Perpetrator • “I am just borrowing the money” for short period, and will return it • “I am entitled to this money” because others are paid more, etc. • “Management itself is dishonest, so what if I am also” BUT – what if the would-be fraudster has no need to rationalize behavior?
The Fraud Diamond • An extension of the Cressey Fraud Triangle • Developed by academicians Wolfe and Hermanson • Adds “capability” factor to the original three elements
The Fraud Pentagon • Another extension of the Cressey Fraud Triangle • Developed by Crowe Horwath, an international accounting firm • Adds “arrogance” factor to the fraud diamond model
The “American Dream” Triangle Model • Another extension of the Cressey Fraud Triangle • Developed by an academician, S. Albrecht • Integrates Fraud Triangle with Agency Theory and Stewardship Theory
Limitations of Traditional Triangle Model • Based on presumption of “normal” personalities • Based on single perpetrator situations
Ramamoorti (2008) Cited Limitations of Traditional Triangle Model and the Need to Include Other Factors • Noted the need to broaden the study of fraud, away from the classical economic models of how markets work and what drives capitalism, and more into the world of human behavior and the behavioral sciences • "Greed" as an explanation for fraud is insufficient • The A-B-C typology
Other Theories:The “Big Five” Personality Traits • Intellect (openness to experience) • Conscientiousness (efficiency and organizational skills) • Extroversion (outgoing and energetic) • Agreeableness (compassion and friendliness) • Neuroticism
The “Big Five” Personality Traits Per research by Alalehto, there are three types of white collar offenders: •• The positive extrovert, driven into economic crime by his manipulative and egocentric characteristics and desire for control •• The disagreeable business man who acts on suspicion and envy and uses deceitful tactics •• The neurotic, characterized by high levels of anxiety, low self-esteem, anger, and hostility, making them susceptible to persuasion
Other Theories of Crime Based on Personality Traits • Neutralization theory •• Typically developed from juvenile delinquency situation •• Involves denial of injury, of victim, of responsibility, et al. • Differential association and social learning theories •• Consistent with Sutherland’s theory that criminal behavior is learned •• Involves peer and managerial influences and interactions • Social control and bonding theories •• Bonding theory reverses perspective: why crime does not occur •• Social control focus on socialization to instill self-control
Other Theories of Crime Based on Personality Traits • General strain theory •• Blocked goals create individual frustration, result in innovations •• Largely consistent with Sutherland but does allow for some personality- based factors • Deterrence and rational thought theories •• Methodological individualism: persons’ own behavioral choices rule •• Coherent set of choices are evaluated by individuals •• See the work of Gary Becker •• Others, such as D. Ariely, hold that behavior is often irrational
The Problem of “Dark Triad” Personalities Research shows a large fraction of executives are “dark triad” types • About 5% of general population are “dark triad” personalities • But 20% of executives fall into one of these three types • Not surprising, because certain traits are needed for career success The problem: normal fraud models assume normal personality types • Auditing processes, such as risk assessments, presume normality • If “dark triad” executives don’t need pressure or rationalization (two of the three elements in the fraud triangle), risk assessments may be ineffective • Can auditors be educated or given tools to diagnose “dark triad” types? There are tools (questionnaires, etc.) that can diagnose “dark triad” types • How to integrate these into normal audit interviews, etc.? • Ignoring these recent research findings is not an answer
The Challenge: Separating “Dark Triad” Management Personnel From Others
The Traits of “Dark Triad” Personalities Narcissism • Grandiosity • Pride • Egotism • Lack of empathy for others Psychopathy • Enduring anti-social behaviors • Impulsivity • Selfishness, callousness, remorselessness Machiavellianism • Manipulation and exploitation of others • Cynical disregard for morality • Focus on self-interest and deception
Are “Dark Triad” Personalities Real? Whether described in the DSM or not is irrelevant! • Copious literature describes the traits • Tests (questionnaires) exist to identify existence • “Trait creep” makes precise delineations difficult What matters is that existence in key positions creates audit risk • Because two of three Fraud Triangle vertices do not matter • Need (monetary or otherwise) is not required • Avoidance of affective-cognitive dissonance also irrelevant For “dark triad” types, mere opportunity is enough to create risk • To deal with this risk, auditors need to assess DT presence • Bottom line is that internal controls are only defense
Urgent Need to Improve Effectiveness of Audits by Explicitly Addressing Personality Issues in Audit Risk Assessment Process The challenge for auditors: how to identify these persons, whose motivations and constraints are not those of “normal” personality types, and who might exhibit different fraud perpetration profiles A secondary objective would be to better advise the client (board audit committee, etc.) of fraud risks that may not have been identified by management. This would be a natural extension of the already-extant auditing requirement to report material weaknesses in controls to those having responsibility for the financial reporting process
Urgent Need to Improve Effectiveness of Audits by Explicitly Addressing Personality Issues in Audit Risk Assessment Process • In the presenters' view, the biggest challenge will be to develop unobtrusive or inconspicuous ways to analyze the personalities of at-risk individuals • A means for drawing operational inferences from the results of those exercises will also need to be developed. •• E.g., if a given CFO scores high on the narcissism scale, there will need to be a mechanism to combine this insight with other risk assessment data so that planned auditing procedures can be altered accordingly • Do identified personality-based risks imply need for expanded audit tests OR application of different procedures?