Accounting Itai Mbwende.pdf - Bindura University of Science ...
-
Upload
khangminh22 -
Category
Documents
-
view
2 -
download
0
Transcript of Accounting Itai Mbwende.pdf - Bindura University of Science ...
BINDURA UNIVERSITY OF SCIENCE EDUCATION
FACULTY OF COMMERCE
DEPARTMENT OF ACCOUNTANCY
EVALUATION OF THE EFFECTIVENESS OF FORENSIC AUDIT TO RISK
REDUCTION: A CASE OF ZESA NOTHERN REGION – BINDURA
BY
ITAI MBWENDE
(B1646600)
SUBMITTED TO BINDURA UNIVERSITY OF SCIENCE EDUCATION IN PARTIAL
FULFILMENT OF THE REQUIREMENTS FOR BACHELOR OF ACCOUNTANCY
DEGREE
BINDURA, ZIMBABWE
YEAR 2019
ii
RELEASE FORM
Registration Number: B1646600
Dissertation Title:
Evaluation of the effectiveness of forensic audit to risk reduction: A case of ZESA Holdings
(Pvt) Ltd – Bindura
Year granted : 2019
Permission is granted to the Bindura University of Science Education Library and the
Department of Accounting to produce copies of this dissertation in an effort it deems necessary
for academic use only.
Signature of student …………………………………………………………
Date signed
Permanent Address:
3030 AERODROME, BINDURA
iii
APPROVAL FORM
TO BE COMPLETED BY THE STUDENT
I certify that the dissertation meets the preparation guidelines as presented in the faculty
guide and instruction for preparing dissertation.”
(Signature of student)……………… …………………Date…………………………………
TO BE COMPLETED BY THE SUPERVISOR
“This dissertation is suitable for presentation to the faculty .It has been checked for conformity
with the faculty guideline”.
(Signature of Supervisor ……………….Date ……………………………………………….
TO BE COMPLETED BY THE DEPARTMENTAL CHAIRPERSON
I certify to the best of my knowledge that the required procedures have been fulfilled and the
preparation criteria was met in this dissertation
(Signature of Chairperson ……Date ………………………………..……………………….
iv
DECLARATION
I, ITAI MBWENDE, declare that am a bonafide producer and owner of this research paper and
the work presented therein is my own. I do also affirm that it has not been submitted by any
other student to any academic institution. The contents of this paper have been submitted in
partial fulfillment of the Bachelor of Accountancy Degree.
Supervisor: ___________________Date: ___/___/___Signature: _______________
Student: ____________________Date: ___/___/____Signature: _______________
v
ACKNOWLEDGEMENTS
Firstly, l would like to praise and worship the Almighty God for His daily guidance, leadership
and providence. This piece of work has been made a success through the unfailing support and
assistance of a number of people whom I am heavily indebted to. My heartfelt gratitude and
appreciation goes to my supervisor Mr. ONIAS ZIVANAI for his untiring support, it has been
a pleasure working with you Sir. I would also like to extent my heartfelt appreciation to all
those who afforded me a helping hand be it in responding to my questionnaires or providing
all the relevant information essential for the victorious completion of this project.
To God, the Almighty I thank you for guiding me through up to this present day and affording
me a chance to be surrounded by caring people.
vi
DEDICATION
I would like to dedicate this project to my beloved family, thank you for seeing me succeed
before even I had started. I greatly appreciate your love and unwavering support throughout
my college life. You loved me when everybody else hated me, you stood by me when
everybody else stood out, you walked in when everybody else walked out and you listened
when everybody else shut me up. I want to thank you and nobody else will ever I compare with
you.
I am truly indebted to you, may God Richly bless you. I love you.
vii
ABSTRACT
Failure by financial audit to unearth financial crimes committed in many organisations both
private and public entities have called for more advanced methods to reduce these problems
and forensic audit is not an exception. This study sought to evaluate the effectiveness of
forensic audit in risk reduction using ZESA Holdings as a case study. The researcher employed
both quantitative and quantitative research methods. In order to carry out the research a sample
of 50 participants was drawn from a population of 60 employees from auditing department,
accounting, information systems and management departments using stratified random
sampling. Data was collected using both self-administered questionnaires and interviews.
Study findings indicated forensic audit can identify reversible insider transactions, can verify
unauthorised transfer of money and it is effective in assessing, monitoring and evaluation of
internal control systems. Since it was also found out that its application is still limited in
Zimbabwe the study recommended that there is need for providing a comprehensive framework
that involves the use of forensic audit methodology in areas like audit planning and execution
and there is need for an establishment of an independent forensic audit team in all government
owned entities
Key words: auditing, forensic audit, fraud, risk
viii
TABLE OF CONTENTS RELEASE FORM ...................................................................................................................... ii
APPROVAL FORM ................................................................................................................ iii
DECLARATION ...................................................................................................................... iv
ACKNOWLEDGEMENTS ....................................................................................................... v
DEDICATION .......................................................................................................................... vi
ABSTRACT ............................................................................................................................. vii
LIST OF TABLES ................................................................................................................. viii
CHAPTER 1 .............................................................................................................................. 1
1.0 Introduction .......................................................................................................................... 1
1.1 Background of the Study ..................................................................................................... 1
1.2 Statement of the Problem ..................................................................................................... 4
1.3 Purpose of the study ............................................................................................................. 5
1.4 Objectives of the study......................................................................................................... 5
1.4.1 Primary objective .............................................................................................................. 5
1.4.2 Secondary objectives ........................................................................................................ 6
1.5 Research questions ............................................................................................................... 6
1.6 Significance of the study .................................................................................................. 6
1.6.1 Benefits to the University ................................................................................................. 6
1.6.2 To the researcher ............................................................................................................... 6
1.6.3 To ZESA Holdings Pvt Ltd............................................................................................... 6
1.7 Delimitation of the study ..................................................................................................... 7
1.8 Assumptions ......................................................................................................................... 7
1.9 Limitations of the Study....................................................................................................... 7
1.10 Definition of terms and acronyms...................................................................................... 8
1.11 Project outline .................................................................................................................... 8
1.12 Chapter Summary .............................................................................................................. 8
CHAPTER II ............................................................................................................................ 10
LITERATURE REVIEW ........................................................................................................ 10
2.0 Introduction ........................................................................................................................ 10
2.1.1 What is Auditing ............................................................................................................. 10
2.1.2 Concept of Forensic audit ............................................................................................... 10
2.1.3 Fraud risks in organisations ............................................................................................ 12
2.1.4 Forensic Audit and Fraud risk......................................................................................... 13
2.1.5 Interrelationship between auditing, fraud investigation and forensic accounting .......... 14
2.1.6 Activities undertaken in forensic audit ........................................................................... 16
2.1.6.1 Investigations ............................................................................................................... 16
ix
2.1.6.2 Analysis of financial statements .................................................................................. 16
2.1.6.3 Reconstruction of incomplete accounting records ....................................................... 16
2.1.6.4 Embezzlement investigation ........................................................................................ 16
2.1.7 Role of a forensic auditor ................................................................................................ 17
2.1.8 Importance of forensic auditing ...................................................................................... 18
2.1.9 How forensic audit help in mitigating risk ..................................................................... 19
2.1.10 Application of forensic auditing in developing countries ............................................. 19
2.2 Theoretical framework ....................................................................................................... 20
2.2.1 Fraud Triangle theory ..................................................................................................... 20
2.2.1.1 Opportunity .................................................................................................................. 21
2.21.2 Pressure/Incentive ......................................................................................................... 21
2.2.1.3 Rationalization ............................................................................................................. 22
2.2.2 White collar crime theory ............................................................................................... 22
2.3 Conceptual framework ....................................................................................................... 23
2.4 Empirical Review............................................................................................................... 24
2.4 Summary ............................................................................................................................ 25
CHAPTER IV .......................................................................................................................... 26
RESEARCH METHODOLOGY............................................................................................. 26
3.0 Introduction ................................................................................................................... 26
3.1 Research Design............................................................................................................ 26
3.1.1 Qualitative research design ............................................................................................. 26
3.1.2 Quantitative research ...................................................................................................... 27
3.2 Target Population ............................................................................................................... 27
3.3 Population sample ......................................................................................................... 28
3.4 Sampling techniques .......................................................................................................... 28
3.4.1 Probability sampling ................................................................................................. 29
3.4.1.1 Stratified random sampling method ............................................................................. 29
3.5 Data collection sources ...................................................................................................... 29
3.5.1 Secondary sources of data ............................................................................................... 29
3.5.2 Primary sources of data ............................................................................................. 30
3.6 Research Instruments ......................................................................................................... 30
3.6.1 Questionnaires................................................................................................................. 31
3.6.1.1 Questionnaire Pre-testing or Pilot testing .................................................................... 31
3.6.1.2 Designing the Questionnaire ........................................................................................ 32
3.6.2 Interviews ........................................................................................................................ 32
3.6.2.1 Structured Interviews ................................................................................................... 33
3.6.2.2 Interview administration .............................................................................................. 33
x
3.7 Data collection procedures ................................................................................................. 33
3.8 Data presentation ............................................................................................................... 33
3.9 Data analysis ...................................................................................................................... 34
3.10 Reliability and validity ..................................................................................................... 34
3.11 Ethical considerations ................................................................................................... 35
3.12 Chapter summary .......................................................................................................... 35
CHAPTER IV .......................................................................................................................... 36
DATA PRESENTATION, ANALYSIS AND DISCUSSION ................................................ 36
4.1 Data Presentation and Analysis ......................................................................................... 36
4.2 Response rate ..................................................................................................................... 36
4.3 Demographic information .................................................................................................. 37
4.3.1 Gender distribution ......................................................................................................... 37
4.3.2 Educational qualifications ............................................................................................... 39
4.3.3 Working experience ........................................................................................................ 40
4.3.4 Department worked ......................................................................................................... 41
4.4 Reasons for having a forensic audit ................................................................................... 42
4.4.1 To provide evidence for litigation purposes ................................................................... 42
4.4.2 To attract more stakeholders into the business ............................................................... 42
4.4.3 To improve stakeholder trust and confidence in corporate financial statement ............. 43
4.4.4 To detect errors and deter fraud ...................................................................................... 43
4.5 Awareness of the use forensic audit................................................................................... 43
4.5.1 Forensic auditing is more advanced than financial auditing ........................................... 43
4.5.2 In forensic auditing investigative activities are undertaken ............................................ 44
4.5.3 Application of forensic auditing is still limited in many government entities in
Zimbabwe ................................................................................................................................ 45
4.6 Forensic audit in detecting and preventing risk ................................................................. 46
4.6.1 Forensic audit can identify misappropriated assets ........................................................ 46
4.6.2 Forensic audit can verify unauthorised transfer of money .............................................. 46
4.6.3 Forensic auditing can identify reversible insider transaction ......................................... 47
4.6.4 Forensic auditing can enhance disclosure of forward looting information..................... 47
4.7 Ability of forensic auditing to reduce risks........................................................................ 48
4.7.1 Forensic auditing is solely enough as a tool to prevent suspicious or fraudulent
transactions .............................................................................................................................. 48
4.7.2 Forensic auditing is effective in assessing, monitoring and evaluation of internal control
systems ..................................................................................................................................... 48
4.7.3 Forensic investigations deals directly with fraud investigation and this reduces financial
reporting expectations gap ....................................................................................................... 49
4.7.4 Forensic auditing can help avert corporate failures ........................................................ 49
xi
4.7.5 Forensic auditing is an effective tool to reduce management theft ................................ 50
4.8 Interviews ........................................................................................................................... 51
4.8.0 Data analysis of the interview ......................................................................................... 51
4.8.1 Causes of fraud in organisations ..................................................................................... 51
4.8.2 Reasons for carrying out forensic audit .......................................................................... 52
4.8.3 Challenges of forensic auditing application .................................................................... 52
4.8.4 The importance of carrying out forensic audit ................................................................ 52
4.8.5 What do you think are the benefits accrued to organisations that employ forensic
auditing .................................................................................................................................... 53
4.9 Summary ............................................................................................................................ 53
CHAPTER V ........................................................................................................................... 54
SUMMARY, CONCLUSION AND RECOMMENDATIONS .............................................. 54
5.0 Introduction ........................................................................................................................ 54
5.1 Summary of the study ........................................................................................................ 54
5.2 Summary of major findings ............................................................................................. 54
5.3 Conclusion ......................................................................................................................... 55
5.4 Recommendations .............................................................................................................. 56
5.5 Suggestions for further research ........................................................................................ 57
5.6 Summary ............................................................................................................................ 57
REFERENCES ........................................................................................................................ 58
QUESTIONNAIRE ................................................................................................................. 62
INTERVIEW GUIDE .............................................................................................................. 64
xii
LIST OF FIGURES
FIGURE PAGE
Figure 1.1: Project Outline 8
Fig 2.2 Interrelationship between auditing, fraud investigation and forensic accounting 15
Fig 2.1: Fraud triangle 21
Figure 1.1: Conceptual framework 23
Figure 4.1: Gender distribution 39
Figure 4.2 Educational qualification 41
Figure 4.3: Forensic auditing is more advanced than financial auditing 45
Figure 4.4 Application of forensic audit in Zimbabwe 46
Figure 4.4: Forensic auditing can identify reversible insider transactions 48
Figure 4.5: Forensic auditors can help averting corporate failures 51
Figure 4.6: Forensic auditing is an effective tool to reduce management theft 52
xiii
LIST OF TABLES
TABLE PAGE
Table 4.1 Response rate 38
Table 4.2 Working experience 42
Table 4.3 Department worked 42
Table 4.4 Reasons for having a forensic audit 43
Table 4:5: In forensic auditing investigative activities are undertaken 45
Table 4.6 Forensic audit can identify misappropriated assets 47
Table 4.7: Forensic auditing can verify unauthorized transfer of money 47
Table 4.8: Forensic auditing can enhance disclosure for forward looting information 49
Table 4.9 Forensic auditing is tool to prevent suspicious or fraudulent transactions 49
Table 4.10: Forensic auditing is effective in monitoring of internal control systems 50
Table 4.11: Forensic investigations deals directly with fraud investigation 50
1
CHAPTER 1
1.0 Introduction
The level of fraud in Zimbabwean public entities has assumed an epidemic dimension ((Auditor
General Report, 2016). Fraud is the number one enemy of the business world, no company is
immune to it and it is in all works of life. The fear is now rife that the increasing wave of fraud in
the public sector in recent years, if not arrested might pose certain threats to stability and the
survival of individual financial institution and the performance of the industry as a whole and no
area of the economy is immune from fraudsters. The purpose of this study was to evaluate the
extent to which forensic audit can effectively reduce fraud risk in Zimbabwe’s public sector.
The study used ZESA Holdings Pvt Ltd as a case study. This chapter begins by giving the
background of the study; it then gives the statement of the problem, the purpose of the study,
research objectives, research questions, and significance of the study, definition of terms,
assumptions, delimitations and limitations of the study.
1.1 Background of the Study
Fraud and financial crimes are global phenomena. They run across all human race irrespective
of their social and economic status. Financial crime includes money laundering, bribery,
looting, embezzlement, fraud; tax evasion, foreign exchange malpractice and oil bunkering
(Mukoro, Yamusa & Faboyede, 2014). Rise in financial scandals at the beginning of the
twenty-first century was associated with increased fraud incidence and awareness, thereby
questioning the role of auditor in fraud prevention and detection (Bhalla Mohit 2018). Onuorah
and Appah (2016) also affirmed that the widespread frauds in modern organizations have made
traditional auditing and investigation inefficient and ineffective in the detection and prevention
of the various types of frauds confronting businesses world-wide especially in financial
institutions. Fraud is an endemic that are gradually becoming a normal way of life in both
public and private sectors, from the presidential cabinets, down to the political officer, to the
ward councillors, from managing directors of companies, through middle management cadre
and to lower managers (Gbegi and Adebisi, 2014). In order to counter, stop and prevent the
perpetration of such risks comes forensic auditing or accounting.
Forensic auditing is perceived to have evolved to tackle fraud related cases and financial
crimes. According to Zaden and Ramazani (2015), forensic auditing is a specialized field of
accounting which deals with legal claims and complaints. Adegbie and Fakiel (2017) posited
2
that forensic auditing is the practice of utilizing accounting, auditing and investigative skill to
assist in legal matter. Forensic auditing is generally acclaimed to be capable of preventing,
detecting and controlling fraud. Forensic auditing is a specialization within the field of
accounting, and forensic auditors often provide expert testimony during trial proceedings
(Strayer, 2015). Forensic tools, techniques and procedures conducted aid auditors in detecting
abnormalities such as misstatement of financial facts, prevention and detection of fraud.
Forensic audit techniques, tools and procedures are used to identify and to gather evidence to
prove a case at a court of law.
United States and Canada were the pioneers in the development and implementation of forensic
auditing. Countries that are utilizing the forensic accounting expertise to address the
different financial fraud cases they are experiencing, have managed to reduce fraud risk.
Owojori and Asoula (2019) states that the failure of statutory audit to prevent and reduce
misappropriation of corporate fraud and increase in corporate crime has put pressure on
the professional accountant and legal practitioner to find a better way of exposing fraud in
business world. The failure by some formerly prominent public companies such as Enron
and Tyco in the late 1990s fuelled the prominence of forensic auditing, creating a new,
important and lucrative specialty (Mandeya, 2019). Forensic auditing procedures target
financial and operational fraud, discovery of hidden assets and adherence to statutory
provisions.
Forensic auditing has proven to be an effective weapon in the fight against financial crimes in
developed countries. Statements recently released by the Director of the Department of
Income and Sales during the dialogue session held by the Transparency International have
shown that the value of tax evasion for 2016 amounted to about 1.5 JD billion while the
value of collected tax revenues reached 3.828 billion dinars for the same year
(http://assabeel.net/news/4947/2017/3/19)). According to Ifath Shaheen et al (2014) Forensic
auditing in India has come to limelight only recently due to rapid increase in white collar
crimes. It helps companies in accomplishing their organization’s objectives, with a systematic,
disciplined approach to evaluate and improve the effectiveness of risk management, control
and governance processes.
Both in US common law or in French codified law, Forensic Accountants aim to serve justice,
by illuminating technical, financial facts in the context of a dispute or a trial (Crumbley, 2016).
According to the American Institute of Certified Public Accountants (AICPA), Forensic
3
accounting services “generally involve the application of specialized knowledge and
investigative skills possessed by CPAs to collect, analyze, and evaluate evidential matter and
to interpret and communicate findings in the courtroom, boardroom, or other legal or
administrative venue. In Africa the use forensic auditing in Nigeria proves that it is an effective
tool for fraud detection and prevention. According to Okafar and agbiogwu (2016) possession
of basic forensic skills significantly reduce the occurrence of fraud cases in the banking sector
in Nigeria and there is a significant difference between services of forensic accountants and
external auditors. They further argued that the presence of forensic accountants in Banks can
aid in reducing fraud cases. Akhidime and Uagbala-Ekatah (2014), in their exploration of the
growing relevance of forensic accounting in Nigeria, found that though forensic accounting in
Nigeria have helped fraud detection, it is lacking statutory back up.
Although forensic audit has been around for a long time now its use in Zimbabwe is still
limited however the rate at which financial irregularities is spreading especially in parastatals
has put the focus on the need for forensic audit techniques to be utilized. Fraud in many
government owned enterprises in Zimbabwe have resulted in government losing millions of
dollars. Regardless of internal auditing as well as external auditing carried out in each and
every publicly owned company in Zimbabwe cases of fraud continues to rise on daily basis.
Findings of the forensic audit by Grant Thornton at the Zimbabwe National Roads Authority
(ZNARA) concluded in 2017 reveals that the parastatal failed to account for expenditure
vouchers amounting to US$2,4 million and other massive financial abuse including payment
of $71 million and R31 million to contractors cherry-picked without going to
tender, among many other irregularities (www.zimferrets.com). In another case a forensic audit
on the operations of the Zimbabwe Revenue Authority (ZIMRA) that covers the period January
2014 to August 2016 has revealed endemic corruption, violation of Government laws and poor
corporate governance among other shenanigans. The audit has unearthed irregularities
regarding the revenue collector’s vehicle loan scheme and the importation of cars by the five
executives, executive perquisites, salaries, loans to senior management, staff secondment and
the procurement of goods and services, among others. Findings of the audit are coming at a
time the government’s revenue collector is losing (www.zimferrets.com).
Zimbabwe Electricity Power Supply Holdings (Zesa) has been rocked by massive tender
scandals. According to the Zimbabwe Independent energy tenders were inflated to over
US$500 million. At one point three solar plants which were initially pegged at US$549 million
4
were inflated to around US$720 million after tenders were awarded and this create a variance
of US$171 million. In addition the Gairezi Project which was initially pegged at US$90 million
was also heavily inflated to US$248 million, creating a variance of US$158 million according
Elton Mangoma former Energy Minister. Further to that the Kariba South Power Extension
project was initially pegged at US$355 million, but shot up to US$533 million. The cost
escalation was US$178 million (www.zimferrets.com). The inflated costs totalled US$507
million.
However the use of forensic auditing in Zimbabwe is still limited as well as its awareness
therefore it is against this background that this study will be undertaken to evaluate the
effectiveness of forensic auditing to risk reduction. This study will use Zimbabwe electricity
Supply Authority Holdings (Private) Limited (ZESA) as a case study since it is among some
of the parastatals that have been affected by financial irregularities and fraud. ZESA Holdings
(Private) Limited is incorporated under the Companies Act [Chapter 24:03]. ZESA Holdings
(Pvt) LTD is a state-owned company whose task is to generate, transmit, and distribute
electricity in Zimbabwe. The Company is governed by the Electricity Act [Chapter 13:19].
1.2 Statement of the Problem
Financial irregularities, frauds and corruptions are a severe problem of concern globally. It is
the major concern to developing nations and as well as Zimbabwe. Serious problems have
emerged in the state enterprises in Zimbabwe from the period 2014 to 2019 (Godana and
Hlatshwayo 2019). It is of key insight to note that the major source of problems encountered
by state owned enterprises is derived from failure of both internal and external audit to detect
and deter risks of fraud and corruptions. Fraud has become one of the major risks that has
entrenched itself in state owned enterprises especially at ZESA holdings PVT LTD. This shows
that internal controls are either non-existent or if they do, they are not serving the intended
purpose. Massive tender scandals at ZESA have resulted in the parastatal losing over US$507
million (Auditor General Report, 2019). Apart from being engulfed in tender scandals
surrounding the controversial energy deals, Zesa is also hamstrung by a giant debt overhang
estimated at US$1 billion in arrears owed to international and domestic suppliers (Auditor
General Report, 2019). This has negatively affected service delivery by the parastatal since one
of the South African power utility Eskom has persistently threatened to switch off its northern
neighbour for non-payment of electricity imports through Zesa. Among the number of
fraudulent deals the Auditors General’s 2018 report revealed that ZESA entered into contracts
5
in 2010 for supply of transformers worth USD 4 962 722 and USD 561 935 in 2016 with Pito
Investments which are not delivered to date (2019) according to AG’s Report. In addition the
company’s subsidiary ZPC paid ZAR 196 064 in 2014 for gas to York International not yet
supplied again. The company’s current liabilities exceeded its current assets by US$65,321,490
(2013: US$67,367,127), by $67 998 471 (2015: $66 178 819), by USD 92 118 178 (2017: USD
84 167 798) and by US$92 118 178 (2018) (Auditor General’s Report on paras tatals,
2015, 2017 and 2019). In addition the company is failing to service its foreign loans
amounting to $29 878 40. ZESA owes its local and international suppliers close to US$1
billion and is only managing to service interest accrued on loans without settling
premiums (Zimbabwe Independent, November 2018). This also has been worsened by
corruption and incompetence at the state entity which resulted in the company reporting loss
before tax of $111 474 084 (2014: $118 312 961) for the year ended December 31, 2015
and as of that date its current liabilities exceeded its current assets by $771 383 372
(2014: $958 567 146) (Audit Report, 2016). According to the Auditor General Chiri
these conditions along with other matters indicate the existence of a material uncertainty
that may cast significant doubt about the ability of the company to continue operating as
a going concern. The financial statements indicate that some of the institutions' debts have
gone for nearly two decades without being repaid and are long overdue (The Independent,
November 2018).
1.3 Purpose of the study
The main purpose of this research study is to find out whether using forensic can be an effective
way of reducing risk.
1.4 Objectives of the study
The objectives of the study are what the researcher aims to achieve at the end of the research.
According to Malhotra (2015) an objective is the short frame goal which is specific,
measurable, achievable, result oriented and time framed (SMART). This study was be guided
by the following objectives.
1.4.1 Primary objective
The primary objective of this study is to assess the effectiveness of forensic audit to risk
reduction.
6
1.4.2 Secondary objectives
1. To determine the reasons for having forensic audits in an organization
2. To ascertain the level of awareness of the use of forensic auditing for risk reduction
3. To establish how well fraud investigation help in detecting and preventing risk.
4. To ascertain whether forensic audit is able to reduce risks.
1.5 Research questions
1. What are the reasons for having forensic auditing in an organisation?
2. What awareness effort has been created on the use of forensic accounting in risk
reduction?
3. What fraud investigation does which can help in detecting and preventing risk?
4. What level of depth can forensic audit go in reducing risks?
1.6 Significance of the study
The significance of the study is its importance to various stakeholders; this study is useful to
the student (researcher), the organization (ZESA Holdings Pvt Ltd) as well as the university.
1.6.1 Benefits to the University
The research will provide valuable literature on forensic auditing and its impact risk reduction.
The research will enrich the University library by adding value and contributing to the existing
body of knowledge as well as providing scope for further research on areas that this research
did not cover in the field of forensic accounting.
1.6.2 To the researcher
The study assisted the researcher in enhancing her researching skills and practical aspects
forensic audit. It enabled her to have a deeper understanding of how forensic audit can be used
to reduce risk in organisations.
1.6.3 To ZESA Holdings Pvt Ltd
This study will be of great importance as it will give a clear picture to the company on the
concept of forensic audit, its importance, and advantages and when it can be used. In addition
to that the findings of the study will shed light on how risks faced by the parastatal can be
reduced through use of forensic audit. Finally management will be able to understand the extent
to which the use of forensic audit can reduce fraud and all sorts of irregularities it faces.
7
1.7 Delimitation of the study
Delimitation of the study is the area to be covered by the study. Suanders (2016) defines
delimitations as the research precise limit of the issues he/she wants to cover. This study was
limited to a geographical entity known as Zimbabwe and specifically ZESA Holdings Pvt Ltd
Particular consideration was ZESA offices in Mashonaland West Region. The study was
limited to investigate the effectiveness of forensic audit to risk reduction. The research covered
the financial period 2014-2019 for ZESA Holdings Pvt ltd and it was undertaken for a period
of one year January 2019 to December 2019.
1.8 Assumptions
Saunders et tal (2015) views an assumption as a condition which is taken without which the
research effort would be impossible. The study was undertaken under the following
assumptions.
Enough information for carrying out the research can be gathered
Internal and external audit fails to uncover some of the irregularities and fraud
committed
Respondents responded wholly and truthfully and were willing to give full information
Sufficient time was available to carry out the research in a stipulated time
1.9 Limitations of the Study
Burker et al (2014) defines limitations as hindrances which block the researcher to go further
than the expected borders or boundaries. The researcher expected to face a time constraint since
this was an academic paper and needs to be completed according to the academic almanac;
hence it was a short period of time for the compilation, review and analysis of the research,
however the researcher effectively managed the available time so as to meet the required
deadlines. Limited financial resources were another hindrance, however cost effective
strategies were employed and concentration was given to important areas of the study so as to
minimize costs. Access to confidential information was also a limiting factor. The researcher
guaranteed confidentiality of volunteered data as this would be used for academic purposes.
1.10 Definition of terms and acronyms
Auditing- is an independent systematic examination, evaluation-and investigation of an
entity’s business transactions, procedures, operations and performance results (Borthakur
Shristi, 2017).
8
Risk- It is a chance of loss or any other negative occurrence that is caused by external or
internal vulnerabilities and that may be avoided through pre-emptive action.
Fraud- means an intentional and dishonest act involving deception or misrepresentation by a
person, to obtain or potentially obtain an advantage for themselves or any other person (CPA
Australia Ltd, 2015). The term “fraud” commonly includes activities such as theft, corruption,
conspiracy, embezzlement, money laundering, bribery and extortion.
Forensic audit- is a technique to legally determine whether accounting transactions are in
consonance with various accounting, auditing and legal requirements and eventually determine
whether any fraud has taken place.
Risk reduction – is the process of reducing the likelihood of occurrence of loss and severity
of loss should it occur.
ZESA - Zimbabwe Electricity Supply Authority
1.11 Project outline
The project outline has been organised as shown in the diagram below, foundation of the entire
study has been constructed in chapter I followed by chapter II, chapter III, chapter IV and
finally chapter V.
CHAPTER V
CHAPTER IV
CHAPTER III
CHAPTER II
CHAPTER I
Source: Researcher
Figure 1.1: Project Outline
1.12 Chapter Summary
This introductory chapter looked at the background of the study, including statement of the
problem, research objectives and questions, research hypothesis, justification of the study,
limitations as well as the assumptions upon which the study is based. The following chapter
(Chapter II) reviews literature on the effectiveness of forensic audit in risk reduction.
Research
problem and its
background
Literature
review
Research
methodology
Data
presentation
and analysis
Summary and
conclusions and
recommendations
9
CHAPTER II
LITERATURE REVIEW
2.0 Introduction
This chapter prompts answers to the sub research questions by taking a comprehensive review
on the literature propounded by various authors and reputable authorities in prior studies on the
effectiveness of forensic audit to risk reduction. Conceptual, theoretical as well as empirical
studies have been reviewed in this chapter
2.1.1 What is Auditing
The word ‘audit’ is usually used to refer to the process of providing an opinion on the accuracy
or validity of some subject matter specifically in this matter, financial information (Chandler
2014). Auditing is also explained as an independent systematic examination, evaluation-and
investigation of an entity’s business transactions, procedures, operations and performance
results (Anichebe, 2015). The international Auditing and Assurance Standard Board defined
an audit as precise examination and coming up with an independent opinion concerning
financial performance of a business by a selected evaluator as stated by those state of the
arrangement and appropriate statutory and execution procurements. In support literature
reviewed by Salome and Rotim (2016) contends that the motivation behind an audit is to
provide sensible certification on whether the financial statement of an entity present fairly in
all material aspects the financial position, performance and cash flows of an entity in
accordance with the generally accepted accounting principles, and also to evaluate internal
control system put in place by management of the entity in question. The auditor is actually an
independent third party who is there to establish a degree of correspondence between the
assertions made and presented by management and user criteria (Soltani, 2017).
2.1.2 Concept of Forensic audit
The term forensic means “relating to the application of scientific knowledge to legal problems
or usable in a court of law” (Chandra Shekhar, 2017). Webster dictionary defines forensic as
belonging to, used in, or suitable to courts of judicature or to public discussions and debate.
Forensic auditing and forensic accounting can be used interchangeably. According to AICPA
(2018) forensic auditing services generally involve application of special skills in auditing,
accounting, quantitative methods, finance, specific areas of the law, information and computer
technologies research and investigative skills to collate, analyze, and evaluate evidential
matter which in the forensic area is called the evidence. Crumbley (2015) defined forensic
10
auditing as an accounting analysis that can uncover possible fraud that is suitable for
presentation in court. Also known as investigative accounting, forensic accounting is a detailed
examination and analysis of financial documents and records for use as evidence in a court of
law. Dalal and Bhakti (2017), described forensic auditing as the utilization of specialized
investigative skills in carrying out an enquiry conducted in such a manner that the outcome
will have application to the court of law. They further stated that the primary aim of forensic
auditing is fraud detection, unlike the traditional auditing that focuses on review of internal
control system, error identification and prevention.
The American institute of certified public accountants defines forensic accounting as “the
ability to identify, collect, analyse, and interpret financial and accounting data and information;
apply the relevant data and information to a legal dispute or issue; and render an opinion”
(AICPA, 2018). Dalal and Bhakti (2017), agree with AICPA definition and buttresses that
forensic accounting is not “accounting for dead people”, rather it is the use of a wide range of
accounting, auditing, and investigative skills to measure and verify economic damages and
resolve financial disputes. Forensic auditing arises from the integration of accounting,
investigative auditing, criminology, and litigation services (Gbegi, D.O and Adebisi, J.F.
2014). Singleton et al (2016) and Levi (2015) concluded that a forensic accountant is part cop,
part lawyer, part auditor and part psychologist and a skeptic. Hence forensic auditing is the
application of accounting, investigative, criminology, and litigation services skills for the
purpose of identifying, analyzing, and communication of evidence of underlying reporting
event. According to Institute of Forensic Accountants of Nigeria (IFA, 2014) Forensic audit
is the activity that consists of data gathering, verifying, processing, analyzing and reporting in
order to obtain material facts and/or evidence in the area of legal or financial disputes and or
financial irregularities including fraud and giving preventive advice.
Forensic auditing is regarded as a comprehensive auditing tool which stakeholders should
capitalize by implementing controls to reduce the risk associated with the event identified as
having material and significant ratings and being most likely to occur. In so doing the strength
of either current preventive or detective controls should be taken into consideration (Gupta and
Gupta, 2015). Forensic auditing combines legalities alongside the techniques of propriety
(VFM audit), regularly, investigate and financial audits (Iyer Sriram, 2018). The main aim is
to find out whether or not true business value has been reflected in the financial statements and
whether any fraud has taken place.
11
2.1.3 Fraud risks in organisations
According to Oxford Advanced Learner`s Dictionary, fraud can be defined as the crime
of deceiving somebody in order to get money or goods illegally. EFCC Act (2014)
defines fraud as illegal act that violates existing legislation and these include any form of
frauds, narcotic drug, trafficking, money laundering, embezzlement, bribery, looting and any
form of corrupt malpractices and child labour, illegal oil bunkering and illegal mining, tax
evasion, foreign exchange malpractice including counterfeiting, currency, theft of intellectual
property and piracy, open market abuse, dumping of toxic waste and prohibited good etc.
This definition is all-embracing and conceivably includes financial crimes in corporate
organization (Joshi Apporva (2017).
Naik Devesh (2015), highlighted the types of fraud in occurrence to include tax fraud,
bankruptcy fraud, theft of intellectual property and proprietary information, embezzlement,
fraudulent substitution, unauthorized lending, tempering with reserves, insider abuses and
forgeries, defalcation, suppression, unofficial borrowing, impersonation, teeming and lading,
fraudulent use of the company’s documents, use of fictitious accounts, manipulation of
vouchers, over invoicing, dry posting, inflation of statistical data, ledger accounts manipulation
or falsified account information, duplication of cheque books, fictitious contracts
award/execution, lending to ghost workers, kite flying and cross firing, misuse of suspense
accounts, computer fraud and false declaration of cash shortage.
According to Joshi Apporva (2017), it is seen that fraud committed in businesses are of two
types and these are; personal use of business resources and the drawing up of false financial
statement for the business. The latter is to give the business a robust look in order to boost
investors’ confidence on the business. There are classical examples such as embezzlement of
company’s cash during its collection before it is recorded in the book of accounts. Another
example is when the bank records are tampered with so as to gain advantage of the system in
monetary terms. Added to this is gaining advantage through forgery of documents, making
payments which ordinarily should not be made or payment that has been previously been made
(Olanike, B. & Adebola, J. 2014). The creation of fictitious debt, inventory and scrap theft,
office supplies and fixed assets theft or creating fictitious expenses are avenues through which
fraud is perpetrated.
12
2.1.4 Forensic Audit and Fraud risk
Forensic audit’s focus is on the detection, analysis, and communication of evidence of
underlying financial and reporting events. Unlike the traditional audit which is rule-base and
single-event based, forensic audit is not conducted for the purpose of rendering audit opinion.
Hence, forensic audit operates in a principle-based environment (Public Company Accounting
Oversight Board, 2007; Simth and Crumbley, 2014). Basically, forensic accounting aims at
using accounting report in a form suitable for legal purposes (Dhar and Sarkar, 2010). Bhasin
(2017) notes that the objectives of forensic accounting include:
assessment of damages caused by an auditor`s negligence,
fact finding to see whether an embezzlement has taken place, in what amount, and
whether criminal proceedings are to be initiated;
collection of evidence in a criminal proceedings;
Computation of asset values in a divorce proceedings.
Forensic audit is one of the most effective and efficient approach to reduce and prevent
fraudulent activities as it is concerned with the evidentiary nature of accounting data, and as a
practical field concerned with accounting fraud and forensic auditing; compliance, due
diligence and risk assessment; detection of financial misrepresentation and financial statement
fraud (Rasey, 2011)
Fraud is rarely seen, but what is observed or noticed are the symptoms, hence forensic audit
services provide firms with the necessary tools to detect and deter fraudulent practices (Godiwn
2015). Thus forensic audit can be adapted as internal audit strategy to prevent fraudulent
activities. According to Olanike, B. & Adebola, J. (2014) forensic accounting services offer
banks with the necessary tools to deter fraudulent activities. Similarly, Onodi, B. E., Okafor,
T. G. & Onyali, C. I. (2015) agreed that forensic accounting is a critical tool in the fight against
corruption, detection and prevention of fraud. Concurring, Njanike, Dube, and Mashayanye
(2016) recognized forensic accounting as administrative function in Zimbabwe whilst they
identified forensic auditor’s duties to include detection and prevention of fraud as well as
detection of potential red flag. Centre for Forensic Studies (2010) report that forensic
accounting could be used to reverse the leakages that cause corporate failures. Shah Bhavesh
(2014), noted that forensic accounting has to do with the comprehensive fraud investigation
consisting of preventing frauds and analyzing antifraud control, the audit of accounting records
in search of evidence of fraud and fraud audit.
13
Many cases against corrupt officers could not be established in the court of law partly as a
result of improper investigation and on the other hand due to the absence of combined skills of
accounting/auditing and legal/litigation services by the investigator (Lokanan, 2014).
However, with the advent of forensic accounting a sigh of relief is expected (Silverstone and
Pedneault, 2013) and that forensic accounting marks the beginning of a new era and with its
investigative techniques perpetrators of corruption can easily be brought to justice. Curtis
(2018) noted that one of the grey areas where forensic accounting is needed most and more
frequently is in the area of investigation and subsequently the prosecution of corrupt
officers. Forensic accounting approach specifically encompasses all other forms of
investigation that have bearing with the discovery of fraud and corruption. The ever increasing
as well as the sophistication of corrupt practices (Tapang, A.T., Bessong, P.K. & Ujah, P.I.
2015) require the use of forensic accounting as the necessary means for successful corruption
investigation and prosecution of fraudsters.
2.1.5 Interrelationship between auditing, fraud investigation and forensic accounting
14
Fig 2.2 Interrelationship between auditing, fraud investigation and forensic accounting
Source: National Institute of Justice Special Report 2017
The diagram above shows the knowledge and skills of traditional accounting, auditing, fraud,
and forensic accounting interrelationship is articulated. Traditional auditing procedures address
fraud to the extent as prescribed by Statement on Auditing Standards; however, auditors have
no responsibility to plan and perform auditing procedures to detect misstatements that are not
judged to be material (including those caused by error as well as fraud) (Tapang, A.T., Bessong,
P.K. & Ujah, P.I. 2015). Where fraud issue is reported, the required action is investigation into
the subject matter. This is because it is a more in-depth fact finding in specific area of concern
than the regular audit. Fraud detection and prevention is a specific search to ascertain whether
fraud took place or not to determine the extent of fraud perpetuated. Even though, allegations
of fraud are often resolved through court action that may include calculated estimates of losses
(damages), it suggests that fraud investigation and forensic accounting often overlap. However,
both encompasses activities unrelated to the other: fraud professionals often assist in fraud
prevention and deterrence efforts that do not directly interface with the legal system, and
forensic accountants work with damage claims, valuations, and legal issues that do not involve
allegations of fraud (Soni Bhagwan Lal (2016).
2.1.6 Activities undertaken in forensic audit
2.1.6.1 Investigations
In combating fraudulent activities forensic auditors conduct investigations. The forensic
auditor does not carry out procedural audit, but carries an audit which conducts investigation
as to detect fraud or crime using computer programs or scientific knowledge (Soni Bhagwan
Lal, 2016). Thus by using the computer forensic tools in carrying out his responsibilities,
sophisticated fraudulent activities can be combated.
2.1.6.2 Analysis of financial statements
Forensic auditors analyze financial transaction involving unauthorized transfers of money
between companies (Owojori and Asolu 2016). Cole (2017) opines that forensic auditors are
required to have special skills in inspecting documents for authenticity, alteration, forgery or
counterfeiting. Hence, by possessing such skills, the forensic auditor in carrying out his/her
duties can easily detect errors, fraudulent activities and omissions thereby preventing and
reducing fraudulent activities (Prakash et al (2018). Prakash et al (2018), states that the forensic
15
auditor is responsible for analyzing, identifying the kinds of fraud that could occur and their
symptoms.
2.1.6.3 Reconstruction of incomplete accounting records
In addition forensic auditors reconstruct incomplete accounting records. In carrying out his
function an auditor reconstructs incomplete accounting records as to settle insurance claims,
over inventory valuation, proving money laundering activities by reconstructing cash
transactions (Owojori and Asaolu 2016). With both technological and communication skills an
auditor can combat fraudulent activities by reconstructing incomplete accounting records,
hence helping to detect and prevent fraud and ensuring good internal control system and good
corporate governance.
2.1.6.4 Embezzlement investigation
Forensic auditors also carry out embezzlement investigation in order to detect the culprit and
amount embezzled. According to Cabole (2016) forensic auditors calculate economic damages;
trace income and assets, often in an attempt to find hidden assets or income. The auditor also
reconstructs financial statement that may have been destroyed or manipulated.
2.1.7 Role of a forensic auditor
Basing on several definitions of forensic auditing it could be said that a forensic auditor is an
expert in financial matters who can detect, investigate and deter fraud and white collar crimes
which are to be presented to court for legal action or to public discussion and debate. An
understanding of effective fraud and forensic accounting techniques can assist Professional
Forensic Accountants in identifying illegal activity and discovering and preserving evidence
(Houck et al 2016). Hence, it is important to understand that the role of a forensic accountant is
different from that of regular auditor.
Forensic auditors are experienced auditors, accountants, and investigators of legal and financial
documents that are hired to look into possible suspicion of fraudulent activity within a company
or are hired by a company who may just want to prevent fraudulent activities from occurring
(Crumbley, 2014). It demands reporting, where accountability of the fraud is established and
the report is considered as evidence in the court of law or in administrative proceedings. A
forensic accountant uses his knowledge of accounting, law, investigative auditing,
criminology, and psychology to uncover fraud, find evidence and present such evidence in
court if required (Carnes & Gierlasinski, 2014).
16
The forensic auditor draw conclusions, calculate values and identify irregular patterns or
suspicious transactions by critically analyzing the financial data. This auditor provides an
accounting analysis to the court for dispute resolution in certain cases and also provides the
courts with explanation the fraud that has been committed (Naik Devesh, 2015). Forensic
auditors investigate beyond the figures, make him different traditional accountants and
auditors, in fact, while the traditional accountants look at the numbers, Forensic auditors look
behind the numbers and the mind of the culprits. Forensic audit is a concept that link accounting
system to legal system. Thus, we can say that forensic auditing is an accounting that is used to
help the court to arrive at the truth about a particular case in a court of law.
Krell (2012) says forensic accounting often involves an exhaustive, detailed effort to penetrate
concealment tactics. Seliskar (2013) says, “in terms of the Sheer labor, the magnitude of effort,
time and expense required to do a single, very focused (forensic) investigation –as contrasted
to auditing a set of the financial statements-the difference is incredible. As an investigator a
Professional Forensic Accountant can be seen as those who are specialist in fraud detection,
and particularly in documenting exactly the kind of evidence required for successful criminal
prosecution; able to work in complex regulatory and litigation environments; and with
reasonable accuracy, can reconstruct missing, destroyed, or deceptive accounting records
(Ibrahim Kabir, 2016). In regard to the above arguments, forensic accounting should play an
important role as expert witnesses and fraud investigators. Accordingly, forensic accountant
should possess a specific skills and training that enable them to play their roles as expert
witnesses and fraud investigators. The area of forensic accounting, as Houck et al (2006) argue,
consists of a rather unique skill set that ordinarily requires additional expertise and training
beyond an academic degree in accounting, and beyond being a CPA (Certified Public
Accountant), a CFE (Certified Fraud Examiner) or CIRA (Certified Insolvency and
Restructuring Advisor).
2.1.8 Importance of forensic auditing
Zimbabwe is a country which has a well constituted statutory instruments and national accounting
standards. Despite all these measures still there are financial scams and financial losses due to
company’s practicing creative accounting techniques and able to take advantages of the loopholes
of International Accounting Standards (IAS’s) and Generally Accepted Accounting Principles
(GAAP’s). because of failure by both internal and external audits to unearth some of the scams, it
is better to have a forensic cell and as external audit is mandatory to make such forensic audit also
17
mandatory for the publicly listed companies so that financial scams may be minimized and have a
healthy financial and sound environment of investment and accounting practices.
A basic use of forensic auditing skills can enable an organization to take the proper steps in the
event of a suspected fraud. The point about proactive forensic auditing is worth reinforcing
(Gbegi, D.O and Adebisi, J.F. (2014). Keating further on added that, a forensic audit will
always take the uncovering of misconduct as its primary theme. This is the reason why there
is need for forensic audit in organizations. Stephen (2012), states that a standard accounting
audit is not a true forensic audit designed to uncover wrong doing but rather only a sampling
audit that may entirely miss the problem, this showing that the existence of forensic audit is
really of great help in today's commercial world. There is also need for forensic auditing
because according to, Crumbley and Hitger (2017), forensic auditors are often asked to provide
litigation support where they are called on to give expert testimony about financial data and
accounting activities forensic audit also give a measure of comfort to the shareholders.
According to Smith et al (2012), forensic auditors help is needed in price fixations, stock
market manipulations and at times even manipulation of the financial figures by the
managements to window dress the balance sheet and profit and loss account figures to hide real
facts from the stake holders and general public, for the funds misused or misappropriated by
the top management. Statutory audit is an audit required by law to ensure that proper and
adequate financial records have been maintained as required by statutes an GAAP and also to
lay credence to financial statements (Eyisi and Ezuwsore, 2014).
2.1.9 How forensic audit help in mitigating risk
Forensic auditing plays an important role in detecting, reducing and eliminating risks
(Al-Shami, S. S. A., Majid, A., Bin, I., Rashid, N. A., Hamid, B. A., & Rizal, M. S. 2014).
They added on to say that forensic auditing reduces both overall business risk and information
risks. Some even see forensic accounting as practiced by skilled accounting specialists
becoming part and parcel of most financial audits an extra quality control step in the auditing
process that will help reduce financial statement fraud. Crumbley, et al, (2012) assert that
because of its nature forensic audit reduces risks of misappropriation of assets by management.
Many researchers have attempted to examine the effect of forensic auditing on fraud detection,
for example, Madumere and Onumah, (2013) revealed that corporate fraud is on the increase
because most managers want to be independent at the expense of their employers. Aduwo,
18
(2016) further explained that forensic auditing can go a long way to influence financial
scandals in corporate organization. Modugu and Anyaduba (2013) found that there is
significance agreement amongst stakeholder on the effectiveness of forensic auditors in fraud
control, financial reporting and internal control quality.
2.1.10 Application of forensic auditing in developing countries
Though financial fraud in Zimbabwe has witnessed highly publicized cases especially in the public
sector, Kosmas (2017) suggests that the application of forensic accounting applies to all scenes
where fraud is a possibility. Okoye and Akenbor (2013) commenting on the application of forensic
auditing in developing economies and Zimbabwe is not an exception, notes that forensic accounting
is faced with so many bottlenecks. These includes inability to operate more independently and
effectively, lack of technical capabilities and inability of gathering information that is admissible
in a court of law, less focus on offering service quality, conflicting regulatory codes and standards,
lack of harmonization and unification of all the existing sectoral corporate governance codes
applicable (Okoye, 2017).
Crumbly et al (2014) revealed the following challenges confronting the application of forensic
accounting/ in developing countries.
A significant challenge that faces a forensic accountant is the task of gathering
information that is admissible in a court of law.
The admissibility, of evidence in compliance with the laws of evidence is crucial
to successful prosecutions of criminal and civil claims.
Globalization of the economy and the fact that a fraudster can be based anywhere in the
world has led to the problem of inter-jurisdiction.
The law is not always up to date with the latest advancements in technology. Therefore,
lawyers and forensic accountants have to rely on outdated acts, laws that are of
general nature, or on acts that have not yet proven their effectiveness in prosecuting
fraudsters.
Forensic investigations often wind up as evidence in legal proceedings, including full-
fledged trails.
2.2 Theoretical framework
2.2.1 Fraud Triangle theory
Forensic auditing relies on the fraud triangle to identify weak points in the business systems
and find possible suspects in cases of fraud. It consists of three core concepts which together
create a situation ripe for fraud: incentive, opportunity, and rationalization. People must have
19
the incentive and opportunity to commit financial fraud, as well as the ability to justify it
(Rasey, 2015). Recent analysis has suggested adding a fourth concept to make a diamond
capability.
Fig 2.1: Fraud triangle
Source: Kassem and Higson, (2012)
2.2.1.1 Opportunity
Employees use their position to commit fraud when internal controls are weak, or where there
is poor management oversight on internal control implementation. Rae and Subramaniam
(2018) suggested that, if a susceptible individual perceives opportunities due to a lack of or
inefficient internal controls and has the ability or power to exploit these opportunities, that
individual may perpetrate a fraud. Most Employees who commit fraud do so, because they
have the opportunity to access assets and information that allows them obscure their fraudulent
deeds (Hill et al, 2016). It is true that employees need access to certain platform to perform
their jobs. The same access can provide the employee with opportunity to commit fraud.
20
2.21.2 Pressure/Incentive
Pressure can be defined as the motivation that leads the perpetrator to engage in unethical
behaviours. Perceived pressures can happen for different reasons and also that it can happen to
employees at any level in companies. Pressure does not only mean financial pressure. Lister
(2017), state that there are three types of motivation or pressure: Personal pressure to pay for
lifestyle, employment pressure from continuous compensation structures, or management’s
financial interest, and external pressure such as threats to the business financial stability,
financier covenants, and market expectations. Akhidime, E. A & Uagbale-Ekatah, R. E. (2014)
argued that although an individual may demonstrate different motives, research has shown that
fraud often occurs as a response to economic pressures, and most pressures involve a financial
need such as greed, living beyond one’s means, large expenses or personal debt, poor credit,
personal financial losses, and an inability to meet a financial. The identified matters are the
motivation that can influence fraud.
2.2.1.3 Rationalization
Rationalization is an attempt by an employee to justify why they commit fraud. Rationalization
is an act of employee who commits fraud to give reasons for his action (Bhalla Mohit, 2018).
It is a way of covering up for the wrong done to the employer. In other words, rationalization
allows the fraudster to view his or her illegal actions as acceptable. Das Sandeep (2016)
concluded that, if a person cannot justify unethical actions, it is unlikely that he or she will
engage in fraud. That person, however, may rationalize those actions in different ways using
various justifications.
2.2.2 White collar crime theory
This theory result from the work by Sutherland in 1949 as cited in Michael (2014). The term
white-collar crime dates back to 1939. Sutherland as cited in Michael (2014) was the first to
coin the term, and hypothesis white-collar criminals, attributed different characteristics and
motives than typical street criminals. According to Sutherland white collar crime is crime
committed by a person respectability and high social status in the course of his occupation
(Sutherland 1949, cited in Michael 2014). Federal Bureau of Investigation (FBI) defines white-
collar crime as those illegal acts which are characterized by deceit, concealment, or violation
of trust and which are not dependent upon the application or threat of physical force or violence.
Sutherland’s goal was to prove a relation between money, social status, and likelihood of going
to jail for a white-collar crime, compared to more visible, typical crimes. According to him
21
white-collar criminals are opportunists, who over time learn they can take advantage of their
circumstances to accumulated financial gain. They are educated, intelligent, affluent,
individuals who are qualified enough to get a job which allows them the unmonitored access
to often large sum of money. Compared to blue collar crime, white collar crimes have gone a
long way undetected since it requires more skills to unearth it. According to this theory it is
estimated that a great deal of white-collar crimes is undetected or if detected, it is not reported
(Gangully Jagdish (2015). Because of the high status of the perpetrators of these crimes, a
highly trained and experienced examiner or investigator like the Professional Forensic
Accountant is needed to forestall the occurrence of such high profile fraud (Freidrihs, 2016).
2.3 Conceptual framework
The Conceptual framework was designed to show the relationship between utilisation of
forensic audit and risk reduction. The term forensic means “relating to the application of
scientific knowledge to legal problems or usable in a court of law” (Bolgana and Robert
2015).
Figure 1.1: Conceptual framework
Source: Researcher
Gangully Jagdish (2015) described forensic auditing involves utilization of specialized
investigative skills in carrying out an enquiry conducted in such a manner that the outcome
will have application to the court of law. Forensic auditing is fraud detection, unlike the
traditional auditing that focuses on review of internal control system, error identification and
prevention. Forensic audit’s focus is on the detection, analysis, and communication of evidence
of underlying financial and reporting events. Where fraud issue is reported, the required action
22
is investigation into the subject matter. This is because it is a more in-depth fact finding in
specific area of concern than the regular audit. Fraud detection and prevention is a specific
search to ascertain whether fraud took place or not to determine the extent of fraud perpetuated.
Even though, allegations of fraud are often resolved through court action that may include
calculated estimates of losses (damages), it suggests that fraud investigation and forensic
accounting often overlap. However, both encompasses activities unrelated to the other: fraud
professionals often assist in fraud prevention and deterrence efforts that do not directly
interface with the legal system, and forensic accountants work with damage claims, valuations,
and legal issues that do not involve allegations of fraud (Ibrahim Kabir (2016). When forensic
accounting practices are incorporated into a separate forensic audit, they have the potential to
overcome problems associated with identifying financial malfeasance within the traditional
audit-reporting model.
2.4 Empirical Review
Nigeria
Aduwo, (2016) conceptually review the impact of forensic accounting toward utilizing
professional judgments, accounting skills, auditing and law procedures to fight the dreaded
disease of corporate liquidation and the paper concluded that forensic auditing can go
a long way to influence financial scandals in corporate organization.
Eyisi and Ezuwore (2014) on their paper considered the roles of forensic auditors in
combating fraudulent activities, distinction of forensic auditor and statutory auditor,
characteristic of forensic auditor and impact of forensic auditor on corporate governance. The
paper concludes that forensic auditors having improved management accountability,
strengthened external auditor’s independence and assisting audit committee members in
carrying out their oversight function by providing them assurance on internal audit report
have impacted positively to corporate governance, thereby reducing corporate failure and
impoverishment of investors.
Malaysia
Rosmawati Haron (2014) carries a study on “Forensic accounting and its prospect in Malaysian
public sector”. His findings indicated that forensic auditor draws conclusions which calculate
values and identify irregular patterns or suspicious transactions by critically analysing the
financial data. He added that forensic audit provides an accounting analysis to the court of law
for any dispute resolution and also the economic investigative explanations to the fraud that
has been committed. Due to this, it could be said that forensic accounting plays a vital role in
23
detecting and minimising accounting frauds and finally eliminate it existence in the
organisation. From the above findings, it can be concluded that, in the fast pace current
economic requirement, forensic accountant function is an important measures in an
organisation in order to curtail and eliminate the number of fraud occurrences in public sector
(Haron, 2014). Forensic accountant will avail and investigate beyond the numbers compared
to an ordinary auditor or accountant approaches.
Bangladesh
Dr. Asif Mahbub Karim (2017) examines the importance of the emergence of forensic
accounting as well as the applicability of this technique in detecting frauds committed in
corporate sectors of Bangladesh. It has been established that forensic audit is an efficient and
effective tool against corporate fraud. Based on his analyses and findings, the frequent
utilization of forensic audit services will significantly help in the detection and prevention of
cases of fraud in businesses. Thus, with forensic audit services, incidence of fraudulent
practices in and against businesses would have drastically reduced.
Jordan
Ola Mohammad Khersia (2018) examined the role of the Forensic Accountant in the Detection
of Tax Fraud in Financial Statements in the Jordanian Accounting and Auditing Offices and
Firms and the results show that the forensic accountant uses investigative techniques and
necessary analytical skills objectively and appropriately in order to have a powerful tool that
can detect fraud and manipulation of financial statements in companies that misinform on
revenues, delay reporting on revenues, reduce and misappropriate the values of assets,
manipulate estimates of reserves and other fraudulent methods.
Zimbabwe
Kosmas et al (2014) investigated the effectiveness of forensic auditing in detecting and
preventing bank frauds in Harare, Zimbabwe. The study employed questionnaires, personal
interview and documentary review to obtain information from respondents in thirteen
commercial banks, four building societies, and four audit firms. The study revealed that
forensic auditing department lacked material resources and technical know- how. As well that
forensic auditing is confronted with interference from management and the profession has no
clear recognition.
2.4 Summary
Chapter two has highlighted on what other scholars and other researchers have said about the
effectiveness of forensic auditing in risk reduction. The chapter clearly highlighted the concept
of forensic audit, roles and activities undertaken by a forensic auditor, importance of forensic
24
audit, its application as well as the theories upon which the study was based. The next chapter
will look into the research methodology.
25
CHAPTER III
RESEARCH METHODOLOGY
3.0 Introduction
This chapter explains the research methods which were used to accomplish the objectives of
this study. A research methodology defines what the activity of research is, how to proceed,
how to measure progress and what constitute success. It is the process used to collect
information and data for the purpose of making business decisions. It elucidates how the
researcher conducted the research; the research methodologies employed that is primary and
secondary data collection methods and various techniques under these methodologies utilized
and the justifications for their use, and the challenges met and how they were managed.
3.1 Research Design
A research design is a specific method and procedure for collecting information (Saunders
2012). Malhotra (2014) define research design as “a framework or blueprint for conducting
the marketing research project. It specifies the details of the procedures necessary for obtaining
the information needed to structure and or solve marketing research problems.” Farrant (2014)
also explains research design as a set of carefully constructed framework within which data is
collected. It encompasses the methodology and procedures employed to conduct scientific
research. There are various research design methods which include experimental designs, non-
experimental designs (such as surveys), ethnographies, case studies or mixed methods
(Creswell, 2013). This study used descriptive research design. Lavrakas (2015) describes a
descriptive survey research design as a systematic research method for collecting data from a
representative sample of individuals using instruments composed of closed ended and/or open-
ended questions, observations, and interviews. It is one of the most widely used non-
experimental research designs across disciplines to collect large amounts of data from a
representative sample of individuals sampled from the targeted population. In this research
both the quantitative and qualitative were used, even though these research approaches have
their strengths and weaknesses, they can be extremely effective in combination with one
another when interpolated and triangulated.
3.1.1 Qualitative research design
The qualitative research design involves recording what the respondents were saying during
interviews. The qualitative research aims to gather in depth understanding of human behaviour
26
and reason that governs such behaviour. Patten (2014) says, ‘that qualitative research produces
richer and more valid data in comparison with data found using quantitative research’. Eisner
(2013), advocates that a good qualitative research study can be helpful in understanding a
situation that would be otherwise mysterious and confusing. The qualitative research is
necessary in recording verbal and written information from the participants. This research
design helped the researcher in the collection of emotional information from the employees.
This was achieved through studying things like postures, gestures, symbols, facial expressions,
words and body movement among other variables.
However according to Cassell and Simon (2013) the qualitative research design have its own
disadvantages such as being subjective and lack of vigour in the techniques used. It is further
stated that qualitative design may depart from the original objectives. Again this method is time
consuming and expensive.
3.1.2 Quantitative research
Quantitative research is a formal, objective, systematic process in which numerical data are
utilised to obtain information about the world (Cormack, 2015). It is applicable to phenomena
that can be expressed in terms of quantity. It is the research that presents results in numbers
(McMillan and Schumacher, 2013). In other words, quantitative research is based on logical
positivist and positivist philosophy that assumes there are social facts with a single objective
reality separated from the feelings and beliefs of individuals (Neumann, 2016). Quantitative
research seeks to establish relationships and explain causes and changes in measured social
facts.
3.2 Target Population
The term population is used to mean the set of elements of interests under considerations for a
particular study (Brink 2012). Fraenkel et al; (2013) claim that it is upon this group that the
researcher would generalize the results of the study. The population includes all individuals
whom the researcher is interested in obtaining the information and making inferences on. The
population can be in two categories, the target and the study population (Fraenkel et al; 2013).
The target population is the actual population to which the researcher would really like to
generalize. The target population was 60 employees at ZESA Holdings Bindura offices in
Mashonaland West Region. The targeted population of the research consist of all Directors,
Chief Accountants, Accountants, Internal auditors, information and technology staff,
Accounting Assistants, Administration Staff and Legal advisors.
27
3.3 Population sample
A sample to represent the population was used. Saunders et al; (2012) views a sample as a
“small proportion of a population selected for observations”. A sample is a subset of the target
population from which information is gathered to estimate something about the population.
According to Kato (2015), the aim of sampling is to obtain a representative that looks like the
population within an acceptable margin of error. From a target population of 60 workers the
researcher used a sample of 50 participants. The sample size was determined through the
approach based on precision rate and confidence level as follows: Calculator: Sample Size
Sample size (n) = z2 x p (1-p)
e2
z = confidence level at 95% (standard value 1.96)
p = estimated proportion of the study population with similar characteristics
e= acceptable error,
The estimated confidence level was 95% (z=1.96), estimated proportion of the population set
at 95% and the acceptable error falls within ±6% therefore sample size for the study was
calculated as follows:
Sample size (n) = z2 x p (1-p)
e2
= 1.962 x 0.95 (1-0.95)
0.062
=50
Sample size needed 50
In general the larger the sample size, the more likely the responses will reflect the true picture
of the population under study according to the Central Limit Theorem. For any sample to be a
true representative of the population it must bear some proportional relationship to the
population from which it would have been drawn. The researcher thus developed an adequate
size of sample and made an effort to balance between the dangers of having an under or over-
sized sample, without over straining the limited resources available.
3.4 Sampling techniques
Adams et-al (2013) defines sampling as the process or technique of selecting a suitable sample
for the purpose of determining parameters or characteristics of the whole population. Thus a
sample is a segment of the whole population selected for marketing research to represent the
population as a whole. Kato; (2012) noted that in certain types of sampling strategies, it is
possible to estimate through statistical procedures the margin of error in the data obtained from
28
samples. Kato; (2012) further noted that researchers should choose a sampling design that has
the least amount of associated error. The major groups of sample designs are probability
sampling and non-probability sampling:
3.4.1 Probability sampling
Includes some form of random selection in choosing the elements. Greater confidence can be
placed in the representativeness of probability samples. This type of sampling involves a
selection process in which each element in the population has an equal and independent chance
of being selected. Four main methods include: 1) simple random, 2) stratified random, 3)
cluster, and 4) systematic (Kato; 2012). This study adopted stratified random sampling.
3.4.1.1 Stratified random sampling method
Stratified random sampling procedure was used because the population under consideration
contains some well-defined groups. This size of the random sample was proportional to stratum
size. Stratified random sampling ensures that a representative cross section of the strata in the
population is obtained and one can study each stratum separately. It is economical and allows
for higher representatives leading to more accurate results. Departments worked and
managerial levels were used in formulating stratus. Those stratus contributed proportionally to
the sample size basing on their contributions to the target population. Stratification will always
achieve greater precision provided that the strata have been chosen so that members of the same
stratum are as similar as possible in respect of the characteristic of interest. The results from
each stratum may be of intrinsic interest and can be analyzed separately and it ensures better
coverage of the population than simple random sampling. Dividing the population into distinct
strata enabled the researcher to draw inferences about specific subgroups that is likely to be
lost in a more generalized random sample. Stratified sampling helped to avoid the likelihood
of selecting respondents from the same department.
3.5 Data collection sources
Fraenkel et al; (2014) noted that there are two sources of data in research which are secondary
and primary sources.
3.5.1 Secondary sources of data
Secondary data is information gathered for purposes other than the completion of a research
project. Secondary data is also used to gain initial insight into the research problem. Secondary
data is classified in terms of its source – either internal or external. Internal, or in-house data,
29
is secondary information acquired within the organization where research is being carried out.
External secondary data is obtained from outside sources (Wilson, 2016).
According to Kotler (2013) secondary data exists in many forms and the onus is usually on the
researcher to assemble and select the most appropriate pieces of information. Secondary data
incorporated for this study include internal audit reports, external audit reports, auditor
general’s annual reports on parastatals, management reports, minutes for board meetings, stock
count reports and the financial statements of ZESA Holdings.
Using secondary data allows multiple research projects to be conducted using the same data
set. This can help the researchers build on each other’s findings and can help verify the findings
of a particular researcher. Since it is an inexpensive way of collecting and processing data
secondary data can also provide venues for discussions. Usually the discussion go about the
loopholes or strengths tapped or untapped in the previous studies. Further to that volumes of
information are available which gives the researcher a wider and more appropriate choice and
this saves time as it is easy to access in a relatively shorter period of time.
3.5.2 Primary sources of data
Best, (2012) postulated that primary sources of data consists of the collection of original data
sources from field work. It is often undertaken after the researcher has gained some insight into
the issue by reviewing secondary research or by analyzing previously collected primary data.
It can be accomplished through various methods, including questionnaires and telephone
interviews in market research, or experiments and direct observations in the physical sciences,
amongst others (Wilson, 2013). The main advantage primary data sources is that it addresses
specific research issues as the researcher controls the search design to fit their needs. There is
great control; not only does primary research enable the researcher to focus on specific
subjects; it also enables the researcher to have a higher control over how the information is
collected. Taking this into account, the researcher can decide on such requirements as size of
project, time frame and goal (Wilson, 2013).
3.6 Research Instruments
A research instrument is what is used to collect data in a qualitative field of study according to
Tadu (2014). Several methods were used for collecting data in the field. In this project,
information were elicited from respondents through questionnaires and face to face interviews.
30
3.6.1 Questionnaires
A questionnaire is an instrument of research consisting of a series of questions and other
prompts for the purpose of gathering information from respondents (Malhotra, 2012). A
questionnaire was used to gather written responses from the targeted population which are then
reviewed, tabulated and analyzed. However, the researcher is aware that, with a questionnaire
some respondents may not submit the forms or may return them too late and /or some
questionnaires may be wrongly completed; particularly if they feel the research will not benefit
them. In addition a questionnaire relies more on the respondents’ literacy levels; depending on
their literacy levels and their command of the language used; respondents may interpret and
answer some questions from varied angles. Questionnaires guarantee confidentiality; hence,
respondents act without any fear or embarrassment. Another advantage is that the interviewee,
whose personal appearance, mood or conduct may influence the results of an interview, is not
present when the questionnaire is being completed (Burns, 2015). Furthermore, a questionnaire
is a quick and efficient way to obtain information from a large number of consumers. However,
designing a questionnaire is complex and time-consuming, and the quality of the data that are
collected is determined by the quality of the questionnaire.
Questionnaires are restricted to two basic types of question that is closed ended and open ended
questions; however the researcher used closed ended questions: Closed-ended (or “closed
question”) is a question for which a researcher provides a suitable list of responses (for example
Yes / No, agree or disagree). This produces mainly quantitative data (Fraenkel et al; 2014).
Closed-ended questions are more easily analyzed. Every answer can be given a number or
value so that a statistical interpretation can be assessed. Closed-ended questions are also better
suited for computer analysis. They can be more specific, thus more likely to communicate
similar meanings.
3.6.1.1 Questionnaire Pre-testing or Pilot testing
Pilot testing is done to identify and eliminate weaknesses and/or ambiguities in the research
instrument according to Green and Brown (2016). It is an essential way of testing for validity,
reliability and practicability of the instrument. Kumar (2015) says the purpose of a pilot
exercise is to get rid of problems out of the instrument so that subjects in the main study will
experience no difficulties in completing it. A draft questionnaire was prepared and distributed
to different departments at random. After this pilot study, some questions were rephrased to
31
ensure that they communicate and gather the intended data, and correctly decoded by the
respondents.
3.6.1.2 Designing the Questionnaire
A semi structured questionnaire was designed by the researcher in such a way that there are
several questions designed on the basis of scaling namely Likert Scales. According to Leedy
(2014) Likert scale can be termed Rating scale and it was developed by Rensis Likert in 1930.
He stated that a rating scale is more useful when behaviour, attitude, or other phenomenon of
interest needs to be evaluated on a continuum of say, “inadequate to excellent”, “never to
always”, or “strongly disapprove to strongly approve” or “strongly agree to strongly disagree”.
The use of Likert scales is usually based on four point or five point responses (Davies 2012).
The bases of measurement that was used in Likert scale are as follows:
Strongly disagree Disagree Uncertain Agree Strongly agree
1 2 3 4 5
The Likert scale was used for questionnaires. The reason why the Likert scale was chosen is
because it is easily understood by the respondents. The responses are easily quantifiable and
subjective to computation of some mathematical analysis; these responses can be easily coded
and analyzed in SPSS and Excel. Likert scale does not force the respondent to stand on a
particular topic but allows them to respond in degree of disagreement (Davies, 2012). It is
because of the above reasons that the researcher uses Likert scale.
3.6.2 Interviews
Interviews were conducted with supervisors from different departments at Zesa Holdings
Bindura. Cohen (2013) defined an interview as a direct method of obtaining information in a
face to face situation. Interviews provide in- depth information about the particular research
issue or system. Since the information cannot be quantified (not amenable to statistical
analysis) the interview is often described as a qualitative research method. Qualitative research
methods for example the experiment, gather a small amount of information from many subjects
while interviews gather a broad range of information from a few subjects. There are two types
of interview, structured and unstructured which the researcher opted to use. For this study the
researcher used structured interviews because of its several advantages over unstructured
interviews.
32
3.6.2.1 Structured Interviews
Structured interviews consisted of a list of specified structured questions. The interviewer did
not deviate from the list or inject an extra remark into the interview process (Weirs, 2017). The
interviews were done to selected respondents since it was impossible to interview the whole
sample. The researcher used structured interviews because they are useful for untangling
complex topics within the research area and the interviewer can go on to probe deeper into a
response given by an interviewee. In addition to that interviews provide the researcher with
instant feedback from the questions paused. In some cases the researcher could simplify or
clarify statements in the interview to the interviewee which in turn can produce a high response
rate.
3.6.2.2 Interview administration
With the agreement of the respondents, the researcher set up the interview dates, venue and
time. The researcher gave the interviewees the interview guide in advance a day before the
confirmed and agreed date to allow for familiarization with the agenda of the personal
interview by the respondents. All visits to the respondents’ premises were strictly by
appointment. During the personal interviews, the researcher provided both the subject matter
and direction. Using this data collection technique, the researcher was able to adapt the
questions as necessary and clarify doubts.
3.7 Data collection procedures
Hussen, (2017) defined data collection procedure as steps taken in administering instruments
and collection of data from subjects under study. Appointments were made with research
subjects through telephone, and via social media (whatsapp groups) and email. Distribution
and administering of instruments (questionnaire) was done by hand. Retrieval of instruments
was done in an orderly and justified manner. Hussen (2017) argued that retrieval of instruments
has to be a well thought out strategy meant to enhance timely collection of comprehensive data.
In retrieving questionnaires the researcher did follow ups and persuasion.
3.8 Data presentation
The data was presented in forms of tables and figures such as bar and pie charts. Percentages
were used to analyze the data. The tables made it easier for the researcher to make inferences.
This helped the researcher in coming up with views on the subject under discussion.
Percentages helped the researcher to make sure that, the data was compact and easy to
33
understand and comment upon. The other advantage of using tables and figures such as bar
graphs was that, it made it easier to understand the trends (Woolcott et al; 2012).
3.9 Data analysis
Analysis of data is a process of inspecting, cleaning, transforming, and modelling data with the
goal of highlighting useful information, suggesting conclusions, and supporting decision
making (Khothari, 2012). Data analysis has multiple facets and approaches, encompassing
diverse techniques under a variety of names, in different business, science, and social science
domains (Woolcott et al; 2012). The researcher compiled findings thoroughly. She put together
similar answers from the two separate questionnaires. Data from interviews were compared
with data from questionnaires. The study used Statistical Package for Social scientists (SPSS)
for analysing data. The SPSS package enabled the application of mean, mode, standard
deviation, cumulative percentages and presentation bar graphs and pie charts.
3.10 Reliability and validity
Reliability is defined by Saunders et al; (2014) as the replicability of the research under similar
conditions elsewhere. Bell (2010) states that reliability measures to what degree an instrument
or line of action would give the same results at different occasions if duplicated under similar
circumstances. According to Joppe (2012), reliability is the extent to which results are
consistent over time and an accurate representation of the total population under study is
referred to as reliability and if the results of a study can be reproduced under a similar
methodology, then the research instrument is considered to be reliable. According to Bell
(2010), validity is concerned with ensuring that questions measure or describe what they intend
to find. Even though a question has a high reliability it does not necessarily have a high validity,
however if the questionnaires has low reliability then it will also lack validity (Bell, 2010).
Considering trustworthiness of a study Anderson (2018) states that it is important to gain a high
validity. Trustworthiness can further be described in two forms; relevance and validity
(Anderson 2018). Where relevance covers how relevant the theoretical framework and
empirical finding are concerning the purpose and problem of the paper. Validity is to evaluate
the level of relation, between theoretical framework and empirical work, which also represents
the aspect of representation and trustworthiness of the thesis (Brymen and Bell, 2014). In this
research, the author ensured that questionnaire is clear and understandable so the questionnaire
is sent for pre-test. Moreover, to avoid misunderstanding, all questions contained no technical
terms because those kinds of errors can reduce the sources of information to check the
information in order to confirm findings.
34
3.11 Ethical considerations
According to Hussey et al; (2015) suggested that ethics of research include debriefing, informed
consent, confidentiality, protection of privacy, protection against harm and protection of
identity. The researcher was guided by the above mentioned principles so as to get valuable
information in an ethical way. Respondents were not coerced into participating in the research
as there was an informed consent meaning that prospective research participants were fully
informed about the procedures involved in the research. Furthermore participants were assured
that information obtained will not be made available to anyone who is not directly involved in
the study. Participants were also assured that they will remain anonymous throughout the study
even to the researcher.
3.12 Chapter summary
This chapter looked at various approaches to research. The chapter explored research
philosophies were positivists and interpretivist. Later the chapter discussed about population
and sampling methods. The study considered the stratified random sampling where participants
were put in strata with each department worked contributing proportionally to the sample.
Sources of data to be used were explored, were the study made use primary data and secondary
data. Research instruments and data collection procedures were explored. The later subsections
looked at reliability, validity, ethical considerations, data presentation and data analysis
procedure. The next chapter explores data presentation and analysis.
35
CHAPTER IV
DATA PRESENTATION, ANALYSIS AND DISCUSSION
4.0 Introduction
This chapter focuses on the presentation, analysis, and interpretation of the data collected
through the questionnaires and interviews. The presentation and analysis is done according to
the design and structure of the research instrument. The discussion of findings was done in
conjunction with the major research objectives as well as the research sub-objectives, which
were outlined in the first chapter. The data was first prepared and edited where necessary before
it was presented in forms of tables, charts and graphs for analysis. The chapter ended
highlighting the outcome as perceived by the respondents.
4.1 Data Presentation and Analysis
As indicated earlier in the previous chapter, the questionnaires were administered personally by
the researcher. The researcher now focuses on data presentation, analysis and discussion of the
data gathered during the research process. This provided a sound meaning to the findings so as
to provide answers to the research questions that would permit drawing conclusions and action
taking. Both qualitative and quantitative means were employed by means of tables, pie charts,
graphs and comments. First, the researcher presents frequency distributions on the response rate
and respondents’ demographic profile, which were followed by a presentation of results on the
impact of forensic audit on risk reduction at ZESA Holdings. The analysis of data was done
using the SPSS version 20.
4.2 Response rate
The response rate, usually known as the completion or return rate, is the ratio of number of
people who answered the questions divided by the number of people in the sample Leedy
(2014). It is usually expressed as a percentage. Most questionnaires sent out were successfully
filled in and returned. The summary of responses from questionnaires is given in table 4.1
below.
36
Table4.1 Response rate
Gender Total
Male Female
Response
Returned Count 24 20 44
% within column 96.0% 80.0% 88.0%
Not returned Count 1 5 6
% within column 4.0% 20.0% 12.0%
Total Count 25 25 50
% within column 100.0% 100.0% 100.0%
Source: Primary data
Table 4.1 above shows the response rate of the study. The results show that 50 questionnaires
were issued to participants drawn from employees, 44 were satisfactory completed representing
88% response rate overlay. The acceptable response rate varies with the circumstances,
according to Leedy (2009) a questionnaire response rate of 50% is considered adequate
whereas a response rate of above 60% is satisfactory. Wagennar and Babbie (2014) share the
same view with Leedy and confirm that a response rate of fifty percent is considered adequate
while that of sixty percent is good. As a result, the 44 returned questionnaires were considered
valid for data analysis.
4.3 Demographic information
4.3.1 Gender distribution
The respondents were asked to respond to questions on their gender profiles and the results are
presented below. Here the researcher’s aim was to determine distribution of the gender of her
respondents so as to make sure that the results are not gender bias. The results are shown in the
pie chart below.
37
Figure 4.1: Gender distribution
Source: Primary data
As shown from the pie chart above the majority of respondents were males 54.5% and females
make up the remaining part 45.5%. This indicates that males were more willing to provide
information than their female counterparts. This means that the researcher managed to collect
more data from males than from females. However since the gender distribution imbalance is
not significant this does not affect quality of results.
4.3.2 Educational qualifications
This section aims to evaluate respondents’ educational qualifications as this can influence
quality of results. It is one’s educational qualification which enables him or her to understand
what has been asked and to answer questions properly. Below is a figure showing distribution
of respondents’ educational qualifications
38
Figure 4.2 Educational qualification
Source: Primary data
From the results presented above it can be noted that a large proportion of respondents are
holders of first degrees 38.6% followed by holders of a master’s degree 25.0%. Those with
national diploma constituted 11.4%, higher national diploma holders 15.9% while those with
doctorates constituted 9.1%. These results indicated that the researcher was able to gather data
from educated people who understand better the topic under study.
4.3.3 Working experience
This section was designed to establish respondents working experience with ZESA Holdings
as the researcher believes that respondent’s working experience has an influence on the quality
of research results. Below is a table showing research findings.
39
Table 4.2 Working experience
Frequency Percent Valid Percent Cumulative Percent
Valid
less than 2
years 4 9.1 9.1 9.1
3 to 4 years 11 25.0 25.0 34.1
5 to 8 years 17 38.6 38.6 72.7
above 8 years 12 27.3 27.3 100.0
Total 44 100.0 100.0
Source: Primary data
The results in the table above shows that 9.1% of the sample have less than 2 years of working
experience with ZESA, 25.0% have working experience of 3 to 4 years, 5 to 8 years constituted
38.6% while above 8 years 27.3%. This shows information was collected from experienced
respondents since majority of them have more than two years working experience. This
supported Balkaran, (2013)’s view who cited that, any worker who has more than two years
operation experience with the same organization can provide reliable information about that
organization.
4.3.4 Department worked
The thrust of this section was to determine departments worked by the respondents. It is the
researcher’s belief that one’s understanding of forensic audit depends on the department he or
she works. Study results are presented in the table below.
Table 4.3 Department worked
Frequency Percent Valid Percent Cumulative Percent
Valid
Management 7 15.9 15.9 15.9
Auditing 10 22.7 22.7 38.6
Finance 7 15.9 15.9 54.5
Accounts 11 25.0 25.0 79.5
Information and
technology 9 20.5 20.5 100.0
Total 44 100.0 100.0
Source: Primary data
Respondents working in the management department constituted 15.9% of the total sample,
auditing 22.7%, finance 15.9%, accounts 25.0% and information technology 20.5%. From the
40
above results it can be concluded that all departments that take part in the auditing process were
represented therefore the research was able to get reliable information.
4.4 Reasons for having a forensic audit
The thrust of this section was to investigate reasons why forensic audit is needed in
organisations, Below is a table showing study findings of the reasons for having a forensic
audit;
Table 4.4 Reasons for having a forensic audit
Reason Responses Total
SD D UN A SA
To provide enough evidence
for litigation purposes
Count 1 10 5 21 7 44
% 2.3% 22.7% 11.4% 47.7% 15.9% 100.0%
To attract more stakeholders
into the business
Count 6 6 0 25 7 44
% 13.6% 13.6% 0.0% 56.8% 15.9% 100.0%
To improve stakeholder trust
and confidence in corporate
financial statement
Count 6 7 4 8 19 44
% 13.6% 15.9% 9.1% 18.2% 43.2% 100.0%
To detect errors and deter
fraud
Count 5 3 2 12 22 44
% 11.4% 6.8% 4.5% 27.3% 50.0% 100.0%
Source: Primary data
4.4.1 To provide evidence for litigation purposes
Respondents agreed that organisations conduct forensic audit in order to provide evidence for
litigation purposes, this was captured in 47.7% and 15.9% of the respondents who agreed and
strongly agreed respectively while 2.3% strongly disagreed and 22.7% disagreed and only
11.4% being not sure. According to Institute of Forensic Accountants of Nigeria (IFA, 2014)
Forensic audit is the activity that consists of data gathering, verifying, processing, analyzing
and reporting in order to obtain material facts and/or evidence in the area of legal or financial
disputes and or financial irregularities including fraud and giving preventive advice.
4.4.2 To attract more stakeholders into the business
Study results above indicated that respondents agreed that forensic audit results can be used to
attract more stakeholders into the business this has been deduced from 56.8% and 15.9% of the
respondents who agreed and strongly agreed respectictively while 13.6% and 13.6% strongly
disagreed and disagreed respectively. According to Mohamed and Salad (2013), applying
forensic auditing services reports of fraud are minimised and this attract more stakeholders into
41
the organisation since no one stakeholder want to be associated with companies who have bad
reputation.
4.4.3 To improve stakeholder trust and confidence in corporate financial statement
43.2% and 18.2% of the respondents strongly agreed and agreed respectively, 13.6% and
15.9% strongly disagreed and disagreed respectively while 9.1% were uncertain. This
demonstrates that forensic audit is be used to improve stakeholder trust and confidence in the
corporate financial statements. These study results were in support to the findings by
Rosmawati (2014) who asserted that financial statements audited by forensic auditors give a
better picture of the fair view of the organisation and this improve confidence and trust in the
company.
4.4.4 To detect errors and deter fraud
Respondents were asked whether forensic audit is used to detect errors and deter fraud. Their
responses indicated that 50.0% and 27.3% strongly agreed and agreed respectively while 11.4%
and 6.8% strongly disagreed and disagreed respectively and only 4.5% indicated that they were
not sure this demonstrates majority of respondents agreed that forensic audit is used to detect
errors and deter fraud. Forensic auditing plays an important role in detecting, reducing and
eliminating risks (Mohumud and Salad, 2013). Dalal and Bhakti (2017), described forensic
auditing as the utilization of specialized investigative skills in carrying out an enquiry
conducted in such a manner that the outcome will have application to the court of law. They
further stated that the primary aim of forensic auditing is fraud detection, unlike the traditional
auditing that focuses on review of internal control system, error identification and prevention.
4.5 Awareness of the use forensic audit
This section of the study was designed to examine the extent to which respondents are aware
of forensic audit. The researcher asked respondents three questions.
4.5.1 Forensic auditing is more advanced than financial auditing
Respondents were asked the extent to which they agreed or disagreed with the view that forensic
auditing is more advanced than financial auditing and their responses were analysed and
presented in the figure below:
42
Figure 4.3: Forensic auditing is more advanced than financial auditing
Source: Primary data
Study results above indicate that 29.5% and 20.5% of the respondents strongly agreed and
agreed respectively, 22.7% and 15.9% strongly disagreed and disagreed respectively while
11.4% indicate that they are not certain as to whether forensic auditing is more advanced than
financial auditing. These results demonstrate that majority of respondents agreed that forensic
auditing is more advanced. In support of these findings Aduwo, (2016) explained that forensic
auditing can go a long way to influence financial scandals in corporate organization.
4.5.2 In forensic auditing investigative activities are undertaken
Respondents were asked whether investigative activities are undertaken in forensic auditing
and their responses were presented in the table below:
43
Table 4:5: In forensic auditing investigative activities are undertaken
Frequency Percent Valid Percent Cumulative Percent
Valid
Strongly
disagree 2 4.5 4.5 4.5
Disagree 3 6.8 6.8 11.4
Uncertain 8 18.2 18.2 29.5
Agree 17 38.6 38.6 68.2
Strongly agree 14 31.8 31.8 100.0
Total 44 100.0 100.0
Source: Primary data
Results above show that 38.6% and 31.8% of the respondents agreed and strongly agreed
respectively while 4.5% and 6.8% strongly disagreed and disagreed respectively and 18.2% of
the respondents were uncertain that in forensic auditing investigative activities are undertaken.
This shows that respondents were in agreement that investigative activities are carried out in
forensic auditing. Adegbie and Fakiel (2017) posited that forensic auditing is the practice of
utilizing accounting, auditing and investigative skill to assist in legal matter.
4.5.3 Application of forensic auditing is still limited in many government entities in
Zimbabwe
The aim of this section was to investigate respondents’ responses on the view that application
of forensic auditing is still limited in Zimbabwe’s government entities. Respondents’ results
were presented in the figure below:
44
Figure 4.4: application of forensic audit is still limited in many government entities in
Zimbabwe
Source: Primary data
There was a general consensus from respondents that application of forensic auditing is still
limited in many government entities in Zimbabwe this was deduced from 50% of the
respondents who strongly agreed, 18.2% who agreed while 9.1%, 6.8% and 15.9% strongly
disagreed, disagreed and were uncertain respectively. Okoye and Akenbor (2013) commenting
on the application of forensic auditing in developing economies and Zimbabwe is not an exception,
notes that forensic accounting is faced with so many bottlenecks.
4.6 Forensic audit in detecting and preventing risk
4.6.1 Forensic audit can identify misappropriated assets
The aim of this section of the study was to establish whether forensic audit can identify
misappropriated assets, views from respondents were analysed in the table below.
45
Table 4.6 Forensic audit can identify misappropriated assets
Frequency Percent Valid Percent Cumulative Percent
Valid
Disagree 7 15.9 15.9 15.9
Uncertain 2 4.5 4.5 20.5
Agree 15 34.1 34.1 54.5
strongly agree 20 45.5 45.5 100.0
Total 44 100.0 100.0
Source: Primary data
There was a general consensus from the respondents that forensic audit can identify
misappropriated assets since majority of them strongly agreed (45.5%) and agreed (34.1%).
With only 15.9% disagreed and 4.5% uncertain it can be concluded that forensic audit help in
reducing misappropriation of assets. Crumbley, et al, (2012) assert that because of its nature
forensic audit reduces risks of misappropriation of assets by management.
4.6.2 Forensic audit can verify unauthorised transfer of money
This section of the study was designed to investigate whether forensic audit can verify
unauthorised transfer of money and the study findings were presented in the table below;
Table 4.7: Forensic auditing can verify unauthorized transfer of money
Frequency Percent Valid Percent Cumulative Percent
Valid
Strongly
disagree 6 13.6 13.6 13.6
Disagree 11 25.0 25.0 38.6
Uncertain 4 9.1 9.1 47.7
Agree 12 27.3 27.3 75.0
Strongly agree 11 25.0 25.0 100.0
Total 44 100.0 100.0
Source: Primary data
25.0% and 27.3% of the respondents indicate that they strongly agreed and agreed respectively,
13.6% and 25.0% strongly disagreed and disagreed respectively while a paltry of 9.1% were
uncertain that forensic auditing can verify unauthorised transfer of money. This shows that
forensic auditing can verify unauthorised transfer of money. Forensic auditors analyze financial
transaction involving unauthorized transfers of money between companies (Owojori and Asolu
2019). Cole (2015) opines that forensic auditors are required to have special skills in inspecting
documents for authenticity, alteration, forgery or counterfeiting.
46
4.6.3 Forensic auditing can identify reversible insider transaction
The researcher asked respondents the extent to which they agree or disagreed to the view that
forensic auditing can identify reversible insider transactions and respondents’ responses were
analysed and presented in figure below;
Figure 4.5: Forensic auditing can identify reversible insider transactions
Source: Primary data
From the above figure it can be noted that majority of respondents agreed that forensic auditing
can identify reversible insider transactions, this has been captured in 34.1% and 22.7% of the
respondents who agreed and strongly agreed while 11.4% and 9.1% strongly disagreed and
disagreed respectively. However 22.7% indicated that they are not sure.
4.6.4 Forensic auditing can enhance disclosure of forward looting information
Respondents were asked whether forensic auditing can enhance disclosure of forward looting
information and their responses were analysed and presented in the below.
47
Table 4.8: Forensic auditing can enhance disclosure for forward looting information
Frequency Percent Valid Percent Cumulative Percent
Valid
Strongly disagree 2 4.5 4.5 4.5
Disagree 6 13.6 13.6 18.2
Uncertain 6 13.6 13.6 31.8
Agree 18 40.9 40.9 72.7
Strongly agree 12 27.3 27.3 100.0
Total 44 100.0 100.0
Source: Primary data
Study results above indicated that there was a general agreement between participants that
forensic auditing can enhance disclosure of forward looting information this was supported by
40.9% and 27.3% of the respondents who agreed and strongly agreed respectively with 13.6%
indicating that they were uncertain while 13.6% and 4.5% strongly disagreed and disagreed
respectively.
4.7 Ability of forensic auditing to reduce risks
4.7.1 Forensic auditing is solely enough as a tool to prevent suspicious or fraudulent
transactions
This section of the study aims to investigate whether forensic audit on its own can be enough
tool to prevent fraud. Respondents’ views were presented in the table below.
Table 4.9 Forensic auditing is solely enough as a tool to prevent suspicious or fraudulent
transactions
Frequency Percent Valid Percent Cumulative Percent
Valid
Strongly
disagree 11 25.0 25.0 25.0
Disagree 20 45.5 45.5 70.5
Agree 8 18.2 18.2 88.6
Strongly agree 5 11.4 11.4 100.0
Total 44 100.0 100.0
Source: Primary data
The above results indicated that there was a disagreement between respondents that forensic
audit on its own can prevent fraud. This was captured in 25.0% and 45.5% of the respondents
who strongly disagreed and disagreed respectively. With only 11.4% and 18.2% of the
48
respondents strongly agreeing and agreeing respectively it can be concluded that there is need
for some other measures to work with forensic audit in order to reduce fraud risk.
4.7.2 Forensic auditing is effective in assessing, monitoring and evaluation of internal
control systems
Respondents were asked whether forensic audit is effective in assessing, monitoring and
evaluating internal control systems and their views have been presented in the table below;
Table 4.10: Forensic auditing is effective in assessing, monitoring and evaluation of
internal control systems
Frequency Percent Valid Percent Cumulative Percent
Valid
Disagree 7 15.9 15.9 15.9
Uncertain 13 29.5 29.5 45.5
Agree 15 34.1 34.1 79.5
Strongly agree 9 20.5 20.5 100.0
Total 44 100.0 100.0
Source: Primary data
20.5% and 34.1% of the respondents strongly agreed and agreed while 29.5% were uncertain
and 15.9% disagreed with the above. It can be concluded that forensic audit is effective in
assessing, monitoring and evaluation of internal control systems. Thus forensic audit can be
adapted as internal audit strategy to prevent fraudulent activities. According to Onuorah and
Ebimobowei (2015) forensic accounting services offer banks with the necessary tools to deter
fraudulent activities. Similarly, Islam, Rahman, and Hossan (2017) agreed that forensic
accounting is a critical tool in the fight against corruption, detection and prevention of fraud.
4.7.3 Forensic investigations deals directly with fraud investigation and this reduces
financial reporting expectations gap
The table below presents research findings concerning the above question;
Table 4.11: Forensic investigations deals directly with fraud investigation and this
reduces financial reporting “expectations gap”
Frequency Percent Valid
Percent
Cumulative Percent
Valid
Strongly disagree 7 15.9 15.9 15.9
Disagree 4 9.1 9.1 25.0
Agree 20 45.5 45.5 70.5
Strongly agree 13 29.5 29.5 100.0
Total 44 100.0 100.0
49
Source: Primary data
45.5% agreed and 29.5% strongly agreed while 15.9% strongly disagreed and 9.1% disagreed
that forensic investigations deal directly with fraud investigation and this reduces financial
reporting expectations gap.
4.7.4 Forensic auditing can help avert corporate failures
Respondents were asked whether forensic audit can help to avert corporate failures and their
responses were analysed and presented in a pie chart below:
Figure 4.6: Forensic auditors can help averting corporate failures
Source: Primary data
36.6% and 25.0% of the respondents strongly agreed and agreed respectively, 13.6% and 9.1%
strongly disagreed and disagreed respectively while 13.6% indicated that they were not sure
whether forensic auditing can help in averting corporate failure. This demonstrates that forensic
auditors can help in averting corporate failure. These findings agreed with the Centre for
Forensic Studies (2010) report which showed that forensic accounting could be used to reverse
the leakages that cause corporate failures.
50
4.7.5 Forensic auditing is an effective tool to reduce management theft
This section of the study was designed to investigate whether forensic auditing is an effective
tool to reduce management theft, the respondents’ views were analysed and presented in the as
shown in the figure below:
Figure 4.7: Forensic auditing is an effective tool to reduce management theft
Source: Primary data
The above results indicate that there was a general consensus between respondents that forensic
auditing is an effective tool to reduce management theft, this was captured in 43.2% and 25.0%
of the respondents who strongly agree and agreed respectively while 9.1%, 15.9% and 6.8%
strongly disagreed, disagreed and were uncertain respectively. To this end it can be concluded
that forensic auditing can reduce management theft. According to the findings by Mahbub
Karim (2017) in Bangladesh the emergence of forensic accounting as well as the applicability
of this technique in detecting frauds committed in corporate sectors is an efficient and effective
tool against corporate fraud hence management theft can be reduced.
51
4.8 Interviews
4.8.0 Data analysis of the interview
On top of the questionnaires, the researcher managed to do interviews with some of the ZESA
workers and it was to a greater extent successful. The researcher managed to conduct interviews
with 6 heads of department who did not take part in answering the questionnaire.
4.8.1 Causes of fraud in organisations
On causes of fraud interviewees were of the view that greedy, need for status in society, poor
internal control systems, pressure from top management, pressure for a better life, opportunity
and personal debts were the cause of fraud. These findings support views by Albrecht, et al
(2014) who argues fraud often occurs as a response to economic pressures, and most pressures
involve a financial need such as greed, living beyond one’s means, large expenses or personal
debt, poor credit, personal financial losses, and an inability to meet a financial.
4.8.2 Reasons for carrying out forensic audit
Discussions with interviewees indicated that most organisations especially ZESA Holdings
carry out forensic audit because financial audit fails to reveal some of the fraudulent activities
done by various stakeholders within organisations. Other reasons mentioned in discussions
include providing a better evidence of some concealed information. The interviewees cited that
it is essential to have the forensic auditor role in managing, preventing and curbing the fraud
in public sector especially in areas such as taxation, procurement, payroll and recruitment and
claims in public sector. The respondents also agree that fraud such as embezzlement breach of
trust, cheating, theft of assets or supplies, bribery and abuse of power does happen in public
sector.
4.8.3 Challenges of forensic auditing application
Interviewees cited that application of forensic auditing services in public sector has been
hindered by lack of technical capabilities, conflicting regulatory codes and standards, lack of
harmonization and unification of all the existing sectoral corporate governance codes
applicable in Zimbabwe. Respondents also pointed out that statutory regulation are not always
up to date with the latest advancements in technology. In addition interviewees were of the
view that another challenge facing application of forensic audit is that it as an expensive service
that only big organizations can afford. These findings were in agreement with views by
Crumbly (2014) who noted that the challenges confronting the application of forensic
52
accounting is such that it lack the admissibility, of evidence in compliance with the laws of
evidence which is crucial to successful prosecutions of criminal and civil claims.
4.8.4 The importance of carrying out forensic audit
The objective of this question was to determine if management and staff see if it is really
important to carry out forensic audit. On this question, all the participants that is 100% were of
the opinion that forensic audit is very important to carry out. Most of the members mentioned
that before ZESA engaged in doing Forensic audits, they saw it as not important and as a worst
of money not knowing that it was really going to save a lot for the company and for the
pensioners. Respondents mentioned that it helps to control management theft, it provides better
information for litigation purposes and also helps in revealing insider transaction.
4.8.5 What do you think are the benefits accrued to organisations that employ forensic
auditing
The researcher wanted to find out if there are any benefits enjoyed by organisations utilising
forensic auditing services. Most of the members mentioned that the way forensic audit
is revealing a lot of crimes, has helped the employees to work together in a great way, enhance
team spirit and they are now so motivated doing their work and enjoy the benefit of protecting
their treasured employment. Interviewees also added that, this will benefit the society by
realizing good service delivery.
4.9 Summary
The chapter focused on the analysis and presentation of the data that was collected in the
previous chapter. The findings and analysis were oriented towards evaluating the
effectiveness of forensic audit to risk reduction and the information was presented in form
of text, graphs, charts and tables. The next chapter, that is chapter five will summarise the
research findings and also outline recommendation suggested by the researcher.
53
CHAPTER V
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.0 Introduction
This chapter marks the end of the research, it covers the summary of the whole study, followed
by conclusions and recommendations. The study evaluates the effectiveness of forensic audit
to risk reduction at ZESA Holdings. This chapter also provides the findings which are based
on the results of this research.
5.1 Summary of major findings
The study found out that to a larger extent forensic audit is very effective in reducing
risk as it can uncover diverted fraudulent practices, identify misappropriated asset and
reversible insider transactions, it can verify unauthorised transfer of money, and can
enhance disclosure of forward looting information; this significantly influence fraud
detection and control. The study further revealed that forensic auditing is an effective
tool for assessing, monitoring and evaluating internal control systems and also
uncovers diverted fraudulent practices
The study also aimed to determine the reasons for having forensic audit in organisations
and the findings indicated that organisations use forensic audit to provide enough
evidence for litigation purposes as the evidence provided by financial audit is normally
not sufficient. In addition it was also revealed that evidence provided by forensic
auditing about the state of affairs of the organisation is very useful in attracting more
stakeholders as it improves trust and confidence in corporate financial statements.
Study results revealed that application of forensic audit is still limited in Zimbabwe
especially in parastatals because the law is not in support with the procedures of
forensic auditing. It was further revealed that the level of awareness that forensic
auditing can reduce risk is very low.
In addition to the above it was also found out that forensic auditing on its own is deals
directly with fraud investigation and this reduces financial reporting expectations gap
therefore it is solely enough as a tool to prevent suspicious or fraudulent transactions.
By so doing corporate failures and management theft are averted.
5.2 Conclusion
The major purpose of the study was to evaluate the effectiveness of forensic audit to risk
reduction. From the findings above the researcher concluded that forensic audit is an effective
54
tool in risk reduction. Organisations carry on forensic audits for various reasons such as
preventing management theft, provide a more detailed evidence for courts, identify
misappropriated asset and reversible insider transactions. Forensic auditing carries out
investigative activities and this enables it to effectively dig down the problem and then come
up with best solutions. In addition it was also concluded that because of its investigative
approach forensic audit have managed to reduce risk, it proves to be an effective tool to risk
reduction however the awareness of it is very low hence its application of is still limited.
5.3 Recommendations
The researcher makes the following recommendations basing on the conclusions.
There is need of providing a comprehensive framework that involves the use of forensic
audit methodology in areas like audit planning and execution.
The several professional accountancy bodies in Zimbabwe should ensure that forensic
accountants are trained with modern skills of forensic accounting procedures, the financial
reporting council should ensure harmonization and unification of the conflicting regulatory
codes that will guarantee best standards and regulations are established for best practice
and service delivery.
The government to put in place the statutory instrument that governs the forensic audit
which is separate from that of general auditors.
Management should develop fraud awareness and appropriate fraud risk-management
program supported by senior management and an appropriate oversight process from
the Board of directors or Audit committee as the potential of management override
increases.
The laws of our country to be revised and incorporate the procedures of forensic audit.
There is need for an establishment of an independent forensic audit team in all
government owned entities. Government must assist in the formation of this committee.
This will help in setting forensic auditing standards, monitoring compliance with
accounting standards, reviewing auditors’ practice and reviewing reporting practices
and enforcing sanctions for violations. The government should ensure capacity and
effectiveness of this regulatory regime to provide a real sense of security to
stakeholders.
There should be firms of forensic audit and standards that govern the forensic auditors
different from those of general auditors so that they work separately with other auditors
only focusing on investigating while other auditors focus on their duties.
55
Introduce forensic audit as a degree program in tertiary schools here in Zimbabwe.
5.4 Suggestions for further research
This research focused much on effectiveness of forensic audit in fraud risk reduction and was
limited to public entities. It does not cover private entities as well as the factors affecting
application of forensic audit services therefore the researcher proposes that further studies
should be carried on factors affecting application of forensic audit in all sectors of Zimbabwe.
5.5 Summary
This chapter focuses on the summary of the whole study, the findings which were based on the
data in chapter four, conclusion and recommendations. The findings were oriented on the
evaluation of the effectiveness of forensic audit to risk reduction. This marks the end of the
research.
56
REFERENCES
Akhidime, E. A & Uagbale-Ekatah, R. E. (2014). The growing relevance of forensic accounting
as a tool for combating fraud and corruption: Nigeria experience. Research Journal of Finance
and Accounting, 5(2), 2222 – 2847.
Al-Shami, S. S. A., Majid, A., Bin, I., Rashid, N. A., Hamid, B. A., & Rizal, M. S. (2014).
Conceptual framework: The role of microfinance on the wellbeing of poor people cases studies
from Malaysia and Yemen. Asian Social Science, 1 (1), 12 – 20.
Albrecht W.S, Hill N.C and Albrecht C. (2016). The ethics development Model Applied to
Declining Ethics in Accounting. Australian Accounting Review
Anichebe, A. S. (2017) ‘Auditor Independence in the Global Environment’ Journal of Certified
National Accountants of Nigeria, A Quarterly Journal of National Accountants of Nigeria,
July-September,
Barton.J. Hodder.L.D.and Sherpadson.M.L (2014) Audits and Bank failure:Do Financial
Audits Constrain Exerssive Risk Taking.
Bhalla Mohit (2018), PNB asks BDO to conduct forensic audit of Nirav Modi companies, The
Economic Times.
Botha.H and Boon.J.A(2013) The Information Audit:Principles and Guidelines vol,
Borthakur Shristi (2017), What is Forensic Audit and How are they Done? IPleaders
Chandler.R (2014) Auditing Assuarance: London school of ECONONICS and Political
science. London
Bologana and Robert (2013), Fraud Auditing and Forensic Accounting: New Tools and
techniques, 2nd Edition
Chandra Shekhar (2017), Why Growth has not Hit Corruption Hard in India. The Livemint,
July 5, 2017.
Creswell J.W (2014), Research Design; Qualitative and Quantitative Approaches, Sage
publications, London,
Dalal and Bhakti (2017), The Forensic Accountants Hand Book, ICSI-WIRC Seminar on
Frauds and Forensic Accounting.
Das Sandeep (2016), Case Study on Forensic Audit, SBS and Company LLP.
Deccan Chronicle (2017), India Sees Rise in Corporate Frauds, Business News, The Deccan
Chronicle.
57
Deccan Chronicle (2017), India Sees Rise in Corporate Frauds, Business News, The Deccan
Chronicle.
Dhar, P. And A. Sarkar, (2015). Forensic accounting: Anaccountant’s vision. Vidyasagar
University J.Commerce, 15(3): 93-104
Donald R (2013), Business Research Methods, McGrawHill ltd
Dr Catherine Dawson (2013) Practical Research Newtec Place,
ET Bureau (2017), What Does Forensic Audit Achieve?, The Economic Times, February 28,
2017.
3. Ibid
FD Scam: Forensic Audit Ordered on Dena Bank, OBC, The Hindu. Available at
https://economictimes.indiatimes.com/et-now/corporate/fd-scam-forensic-audit-ordered-on-
dena-bank-obc/videoshow/40486570.cms
Gangully Jagdish (2015), Lecture Notes on Forensic Accounting Investigations, Acc 551 at
SUNY Albany.
Gbegi, D.O and Adebisi, J.F. (2014). Forensic Accounting Skills and Techniques in Fraud
Investigation in the Nigerian Public Sector. Mediterranean Journal of Social Sciences 5(3);
244-253.
Gupta and Gupta (2015), Corporates Frauds in India – Perceptions and Emerging Issues,
Journal of Financial Crime, 22(1): 79 -103.
Hubar Dennis (2016), Forensic Accounting, Fraud Theory, and the End of the Fraud Triangle
Journal of Theoretical Accounting Research, 12(2), 28-48, 2017
Ibrahim Kabir (2016), Forensic Audit, Forensic Tools and Techniques for Internal Auditors.
Iyer Sriram (2018), Nine Ways in Which the PNB Scam will affect India’s Economy, The
Bitter Truth, Quartz India.
Ibrahim Kabir (2016), Forensic Audit, Forensic Tools and Techniques for Internal Auditors.
Ifath Shaheen et al (2014) Forensic Accounting and Fraud Examination in India
Joshi Apporva (2017), Definition and Basics of Forensic Audit, The Riskpro Management
Consulting
Kotler P, (2013), Marketing Management, Millennium Edition, Tenth Edition, Pearson Custom
Publishing, United States of America
Leedy. P.D. (2012) Practical Research: Planning and design, Macmillan, Newyo
Naik Devesh (2015), A Report on Forensic Accounting and Auditing, The LinkedIn.
Naik Devesh (2015), A Report on Forensic Accounting and Auditing, The LinkedIn
58
Okafor, M. C. & Agbiogwo, A. A. (2016). Effects of forensic accounting skills on the
management of bank fraud in Nigeria. European Journal of Accounting, Auditing and Finance
Research, 4(6),70-80
Olanike, B. & Adebola, J. (2014). Prime lending rates and the performance of microfinance
banks in Nigeria. Evaluation Review, 6 (12), 131 – 137.
Onodi, B. E., Okafor, T. G. & Onyali, C. I. (2015). The impact of forensic investigative
methods on corporate fraud deterrence in banks in Nigeria. European Journal of Accounting,
Auditing and Finance, 3(4), 69 – 85.
Oyedokun Godwin (2015), Forensic Investigation and Forensic Audit Methodology in a
Computerized Work Environment, Research
Prakash et al (2018), Prevention Of Corruption (Amendment) Act 2018 – Booster For The
Honest Or The Corrupt?, Mondaq
Saunders M, Lewis P, Thornhill A (2012). Research Methods for Business Students, Essex:
Pearson Education
Shah Bhavesh (2014), Basics about Fornsic Accounting and Auditing, The LinkedIn.
Shah Sandeep (2016), Fraud Reporting under Companies Act, 2013, Bombay Chartered
Accountants’ Association.
Shaheen et al. (2014), Forensic Audit and Fraud Examination in India, International Journal of
Innovative Research and Development, Vol 3, Issue 12
Silverstone and Pedneault (2013), Forensic Accounting and Fraud Investigation for Non-
Experts, 3rd Edition, ISBN-13: 978-0470879597.
Soni Bhagwan Lal (2016), Forensic Audit, Fraud Detection and Investigation Techniques,
International Centre for Environment Audit and Sustainable Development
Tadu R (2014), Research Methodology, National University Of Science and Technology
Tapang, A.T., Bessong, P.K. & Ujah, P.I. (2015). Management influence and auditor’s
independence in Nigerian Banks. International Journal of Economics, Commerce and
Management. 3(4), 1-
Zigmund, W.G. (2013), BUSINESS Research methods
Newspapers and journals
The Herald 8 February (2014).
The Sunday Mail 12-18 February (2014
The Zimbabwean, 3 February 2014.
The Zimbabwe Independent 11 October 2013.
The Financial Gazette, August 14-19, 2017.
60
QUESTIONNAIRE
Instructions
1. Do not write your name on this questionnaire
2. May you please attempt all the questions
3. Please place a tick ( √) in the box of your preferred answer and or a narrative answer in
the space provided below each question
SECTION A: DEMOGRAPHICS AND GENERAL INFORMATION
1. Gender
Male Female
2. Age
Below 30 years [ ], 31 to 40 years [ ], 41 to 50 years [ ], above 50 years [ ]
3. Working experience?
Less than 2 years [ ], 3 to 4 years [ ], 5 to 8 years [ ], above 8 years [ ]
4. Educational qualifications
National Diploma Higher national Diploma First degree
Masters Doctorate
5. Department worked
Management Auditing Finance Information Technology
SECTION B: General Opinion Section
Please choose the most suitable answer to indicate the extent to which you agree or disagree with
each of the statements given below. Please tick the number that represents your opinion
1-Strongly Disagree, 2- Disagree, 3- Neutral, 4-Agree, 5- Strongly agree
6. Reasons for having a forensic audit
Reason SD D UN A SA
To provide enough evidence for litigation purposes
To attract more stakeholders into business
To improve stakeholder trust and confidence in
corporate financial statement
To detect and deter fraud
61
7. Awareness of the use forensic audit
SD D UN A SA
Forensic auditing is more advanced than financial auditing
Forensic audit go beyond numbers
Forensic auditing carries out investigative activities
Application of forensic audit is still limited in many
government entities in Zimbabwe
8. Forensic audit in detecting and preventing risk
SD D UN A SA
Forensic auditing can identify misappropriated assets
Forensic auditing can verify unauthorized transfer of money
Forensic auditing can identify reversible insider
transaction
Forensic auditing can enhance disclosure for forward
looting information
9. Ability of forensic auditing to reduce risks
SD D UN A SA
Forensic auditing is solely enough as a tool to prevent
suspicious or fraudulent transactions
Forensic auditing is effective in assessing, monitoring and
evaluation of internal control systems
Forensic investigations deals directly with fraud
investigation and this reduces financial reporting
“expectations gap
Forensic auditors can help avert corporate failures
Forensic auditing is an effective tool to reduce
management theft
THE END
THANK YOU
62
INTERVIEW GUIDE
1. What are the causes of fraud in organisations?
2. What are the reasons of carrying out of forensic audits in most organisations?
3. What do you think are the benefits accrued to organisations that employ forensic auditors?
4. What are the challenges encountered by parastals in applying forensic auditing services?
5. Is forensic audit an effective tool for risk reduction?