Next Article in Journal
Comparison of Deep Transfer Learning Models for the Quantification of Photoelastic Images
Previous Article in Journal
Enhancing Precision in Magnetic Map Interpolation for Regions with Sparse Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Auditing the Risk of Financial Fraud Using the Red Flags Technique

by
Victor Munteanu
1,
Marilena-Roxana Zuca
2,
Adriana Horaicu
1,*,
Laura-Andreea Florea
1,
Cristina-Elena Poenaru
1 and
Gabriela Anghel
1
1
Economic Doctoral School, Valahia University of Targoviste, 130004 Targoviste, Romania
2
Faculty of National and International Banking and Financial Relations, Romano-Americana University, 012101 Bucharest, Romania
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(2), 757; https://doi.org/10.3390/app14020757
Submission received: 9 December 2023 / Revised: 6 January 2024 / Accepted: 10 January 2024 / Published: 16 January 2024

Abstract

:
Major financial irregularities have contributed significantly to the destabilization of the world economy and the financial environment, by short circuiting investment flows and discrediting financial markets, with significant financial, social, and political consequences. Through the auditor’s key role of providing an independent, objective and professional opinion on the correctness of financial statements, the accounting profession has promoted a new procedure, the anti-fraud audit, which is responsible solely for financial prevention and fraud detection. Fraud detection audits have a methodology and a set of customized tools that help auditors in their mission to ensure the smooth execution of their audits. The purpose of this research is to conduct a comprehensive examination of both theoretical and practical aspects, with the objective of determining the risk profile of financial fraud among auditors. This will aid in preventing, detecting, and correcting such harmful practices. Through an empirical study of a fraudulent corporate entity, the quality of information contained within financial reports will be assessed, as well as the effectiveness of managerial decision-making substantiation. The data processing was carried out using the statistical software SPSS 19.0. when making graphs and interpreting the obtained results.

1. Introduction

At the global level, following large financial scandals, the attention of public opinion has been directed towards auditors, who have been found responsible, to a lesser or greater extent, for the reported frauds [1]. The relevance of this topic derives from the identification of the ways in which managerial decisions can be made more efficient, based on information from financial reports, in order to ensure their quality and correctness. This is extremely important information in a constantly changing economic environment. There is a need for transparency and ethics in business in order to reduce information asymmetry and for principles of corporate governance to determine the presence and continuous training of experts so as to prevent and combat financial fraud. To face these new challenges, the United States of America has developed a new profession, the fraud auditor, or certified fraud examiner, whose main role is to prevent and detect financial fraud with the aim of reducing the consequences regarding the number of illegal financial documents. As part of their mission, the fraud auditor has their own working methods (standards, methods, tools, principles) so that they can ultimately express their opinion on the existence or non-existence of fraud, the associated risks and the damage that it can produce.
The concept of financial fraud represents illegal acts that seek to distort economic realities in a deliberate manner, misappropriate monetary assets or falsify documents in order to obtain certain undue benefits [2]. Therefore, the International Standard on Auditing 240 (ISA 240) recognizes only two types of fraud: fraudulent reporting and misappropriation of assets. To combat these, a new professional association was established in the United States, the Association of Certified Fraud Examiners (ACFE), which aims to provide services in the form of fraud audit missions, a methodological approach through which auditors will issue a document comprising a professional, objective and independent opinion on the presence or absence of fraud within the audited entities.
In ISA 240, it is emphasized that preventing and detecting fraud is primarily the responsibility of those in charge of governance and management. When conducting an audit in accordance with an ISA, the auditor has a duty to provide reasonable assurance that the financial statements are free from fraudulent activity. It is important to note that the “expectation gap” issue is commonly analyzed in audits of financial statements or audit tasks. However, given the changes in international standards and the introduction of the concept of “assurance tasks”, it is necessary to consider the various types of tasks that authorized auditors may perform during the audit process.
The issue of the “expectation gap” is often not thoroughly examined in relation to other tasks due to their unique nature. However, it is crucial to investigate this issue considering the various engagement portfolios that currently fall under the published International Standards for Quality Control, Audits, Limited Reviews, Other Assurance Engagements and Related Services, which includes audits of historical financial information, limited reviews of historical financial information, assurance engagements other than audits or reviews of historical financial information, and related services. Conversely, certain types of consulting or advisory services fall outside the regulation of IAASB standards. Therefore, we recognize the need for a comprehensive study of the expectation gap that considers the full scope of tasks performed by certified auditors. This gap has been acknowledged since the 1970s and has been extensively studied by both academics and professionals. Its components were initially proposed by Porter [3,4] and were further analyzed by others [5,6].
Activity is carried out in an objective and independent manner by anti-fraud experts, to detect or prevent criminal acts of an economic nature at the level of an entity [2]. In short, ACFE’s mission is to reduce the incidence of fraud and economic crimes committed by white collar workers and to support its members in detecting and inhibiting these illegal acts [7]. The process of carrying out such a mission, which can be structured in well-defined stages, includes establishing an anti-fraud policy (at the official level, as well as by establishing responsibility grids), detecting and evaluating risks (through established controls and key indicators), integrating prevention and detection devices, and, finally, designing an oversight process (to audit and collect evidence on the compliance and functionality of anti-fraud policies) [7].
Serious violations include administrative misconduct, employee misconduct, negligence, willful misconduct and other unlawful conduct, and, finally, intentional but not fraudulent misrepresentation or other unlawful misrepresentation [8]. The act of using deception/inaccuracy to gain an illegal advantage defines fraud. A series of well-documented surveys indicate an increase in the incidence and value of fraud against entities [9,10,11]. In addition to the financial cost to victims, the cost of fraud includes the financial costs of lawsuits against auditors who fail to detect fraud, as well as damage to the confidence of the accounting profession. In addition to all of this, a key approach to the study of fraud should be to highlight diversity as well as to improve the quality of accounting reporting in order to deter the commission of financial statement fraud [12].
Thus, the link between International Standards on Auditing and Fraud Risk Assessment (FRA), outlined in paragraph 4of ISA 240 [13], indicates that the three elements of Donald Cressey’s fraud triangle theory [14] must be incorporated into an audit plan in most cases of professional fraud.
If the two types of fraud mentioned above, misappropriation of assets and fraudulent reporting, are important for auditors, ISA 240, point 3 and ISA 320, point 3 also indicate corruption and misrepresentation. Some requirements and enforcement materials reflect the extent of public interest in certain entities, referred to as public interest entities because they have a large number and a varied range of stakeholders. Factors to consider include the nature of the business, such as whether it holds assets in a fiduciary capacity for a large number of stakeholders; size; and number of employees [15].
Jackson and Stent (2010) state that common financial crimes in developed and developing countries include asset embezzlement, financial statement fraud and corruption [16]. Seven key principles are included in the ISA laws and regulations that apply to forensic and traditional auditors when assessing fraud risk and gathering persuasive evidence. In addition to the above, Eze and Okoye (2019) argue that auditors are not adequately trained to detect, assess, and identify theft, corruption, and accounting manipulation because they rely on their judgment and make estimates, and fraud detection is not their main purpose [17]. Thus, all entities are encouraged to use forensic audit services as a strategic tool by which to combat all types of financial and economic crimes. Forensic auditors are involved in different types of investigations and use different strategies and procedures to question specific investigations. Otherwise, audit and accounting entities (independent auditors) must provide extraordinary services in addition to mandatory audits [18].
Crain et al. (2019) have found that auditors face significant challenges when detecting, preventing, and responding to fraud [19]. Thus, they conclude that forensic auditing is a more appropriate response to this scourge because forensic auditors’ dictions and strategies never assume that the client complies with International Financial Reporting Standards (IFRS) and accounting policies and procedures, or that the audit will result in the discovery of fraud.
Based on our preceding statements, we, as authors of this scientific approach, have contributed by assessing the fraud risk associated with a financial profile. This achievement leads to the prevention and detection of potentially fraudulent activities through the identification of signal elements using the red flags technique, as illustrated in the case study.
After analyzing the factors mentioned above, it is important to note that financial indicators play a significant role in detecting fraud during an audit. These indicators act as red flags and signal the presence of fraudulent activity, allowing for timely detection [20]. Red flags can be identified through various means, such as analyzing annual financial statements and calculating indicators of liquidity, solvency, profitability, and structure. Quantitative methods can provide valuable insights into the risk and fraud mechanisms at play. It is crucial for entities to disclose the possibility of financial fraud and continuously raise awareness to prevent potential risks, including the latest fraud schemes. Additionally, having a crisis management strategy in place is essential when dealing with any crisis situation. This should include a structured response protocol and a specific action plan tailored to the situation at hand, in order to minimize potential financial losses and reputational damage.

2. Materials and Methods

The specialized literature and professional standards indicate that, to form an opinion, the auditor must document and substantiate each conclusion by gathering sufficient and appropriate audit evidence. According to ISA 500, audit evidence is defined as those factors that can support the auditor’s judgment when issuing a qualified opinion and, in addition, when making decisions. Sufficiency of evidence is determined precisely from the necessary quantity (number) and available validity to support an opinion, and adequacy defines the quality and value as a probative element (to be justified and to integrate the intended purpose) [21]. In terms of the method of obtaining evidence, evidence can be obtained either from direct observations of the analyzed phenomena and processes, from checks or investigations, from confirmations received from third parties, or by performing analytical procedures. Analytical procedures, as described in ISA 520 (Analytical Procedures), are defined as a series of comparisons based on financial and non-financial indicators, used to establish certain significant deviations between the financial data proposed by the entity and those of the auditor or the branch of activity to which the audited entity belongs, from a previous or forecasted period [21].
Within the fraud audit mission, financial indicators are associated with the concept of “red flags” (red flags or signals of the presence of fraud). These are elements assimilated to fraud fingerprints and will signal the presence and manifestation of fraudulent acts, the detection of which is the aim of the audit mission [2].
Red flags serve as warnings or indications that a company’s financial reports or statements may be problematic, indicating risks of economic or financial information manipulation. To mitigate risk, different activity levels and geographical areas must be considered [22]. The term “red flags” is a metaphor, commonly used to signify concerns or warning signs in a particular situation, such as business or investments. These flags can alert investors and analysts about a company’s future financial health and economic troubles. However, there are no universal standards for identifying red flags, as it depends on the analytical method used by the investor, analyst, or economist. Red flags can be found in quarterly financial statements and may require additional research and analysis to recognize. It is advisable to review triennial reports to make informed investment decisions [23].
In most cases, red flags derive from the annual financial statements of the audited entities. Calculations of the financial indicators of liquidity, solvency, profitability and structure, and their analysis, based on quantitative methods, can significantly contribute to obtaining an idea about the associated risk and the fraud mechanism. Among the financial and non-financial signals of the presence of fraud at the level of reporting, one can note the following: anomalies in accounting, a rapid and unreasonable increase in commercial margins, unusual profits, defects in the control system, and the remunerative dependence of executive managers on the financial performance of the entity and hence a motivation to maintain an attractive stock market price of the company’s shares [2].
In terms of asset fraud, financial and non-financial fraud signals refer to unusual decreases in the firm’s bank deposits, significant differences between reported cash and cash equivalent accounts and confirmations sent by banks, the frequency with which rounding of account amounts is used, the unusual increase in expenses regarding goods sold, unjustified values of the structure and liquidity ratios, and the occurrence of extraordinary expenses [2]. Based on the quality diagnostics of financial reporting, it will be possible to analyze and identify possible errors committed at the level of reporting.
In this context, there is a pressing need to introduce innovative fraud theories that consolidate various fraud models and risk factors contributing to fraudulent activities. This will enable external auditors and forensic practitioners to conduct thorough fraud risk assessments. Extensive research suggests that identifying and responding to risk factors is key to helping auditors detect, deter, prevent, and investigate financial statement fraud. In this section, we will explore the risk factors associated with financial statement fraud, a major concern in the accounting industry [18].
Other researchers have correlated significant fraud risk factors with notable fraud risk indicators [24]. Comprehending the fundamental elements shaping fraud provides forensic auditors with valuable insights into the underlying causes of its occurrence. The problem of fraud has been, is, and will always be, a commendable issue of debate for specialists and researchers in the field. By analyzing problems related to the risk of fraud from previous periods, especially concerning the current economy, these specialists have been able to reach a multitude of conclusions that are beneficial for audit professionals.
In one relevant study, fraud is determined as likely to occur when three factors align: pressure, opportunity, and rationalization [25]. In the case of fraudsters, an opportunity arises when they can exploit a position of power or when internal controls and monitoring are insufficient. As argued by other researchers, this can lead to a belief that the chances of being caught are low [26].
One researcher notes that the fraud triangle theory can provide insight into fraud risk factors, but that it may not be entirely applicable today [27]. This is because the model is almost half a century old and considerable social changes have been observed over the years. Furthermore, other studies contend that this model is inadequate in explaining the contemporary reasons for fraud in today’s business environment, as the pressure and rationalization elements have become difficult to observe [26,28].
The concept of the fraud diamond theory was initially presented in 2004 [29] as an extended version of the fraud triangle theory from 1953 [25]. However, we have found other researchers that have also argued that many fraud cases would not have occurred if fraudsters had not committed the crime [26]. It has been argued that an individual’s personality traits and ability would have an impact on the likelihood of fraud.
According to the results of one study, arrogance denotes an individual’s belief in their superiority and entitlement, leading them to ignore internal controls [30]. When incorporated into the fraud triangle, this concept expands into the new fraud theory, which consists of five components: pressure, opportunity, rationalization, ability, and arrogance. This theory considers all of the crucial factors that contribute to fraudulent behavior. One of Romania’s biggest challenges in fiscal policy and regulation is the lack of cohesion between these laws. Additionally, the laws themselves are often unclear and lack proper guidance for implementation. This creates opportunities for both financial auditors and user entities to evade tax laws and avoid fulfilling their financial obligations. Unfortunately, this can lead to fraudulent activities and the falsification of financial reports. The impact of these risks can have far-reaching consequences, including social inequality, a lack of trust in public authority, and a general distrust of those responsible for governing. To combat these issues, policies should be put in place that assess existing and potential risks, provide specific measures for the prevention, detection, investigation, and prosecution of fraud, and allocate clear responsibilities for implementation and monitoring [31].
Management should also adopt a formal anti-fraud policy or statement, which outlines strategies for developing an anti-fraud culture and mechanisms for reporting suspected fraud. While red signals alert managers of potential issues, they are only an indication and require additional checks to confirm or deny potential fraud.
The topic of fraud has become increasingly important today and has been the subject of many reports and studies [15,32,33]. Occupational fraud, which involves the intentional misuse or misapplication of an organization’s resources for personal gain, is a particularly concerning type of fraud, as defined by international institutions [31].
Numerous challenges and obstacles confront technology’s ability to prevent financial crime and ensure compliance. These include a high rate of false positives, incomplete data from unstructured sources, a lack of analytical insight, and outdated rule-based detection methods. Additionally, delayed warning mechanisms can contribute to an increase in fraudulent activity. To address these concerns, data on previously detected fraud can be incorporated into the analysis, revealing patterns and trading techniques and leading to better decision-making that reduces both fraud and false positives [34].
Employee misconduct can lead to significant losses for an organization. Any employee, regardless of their position, has the potential to commit fraud if they possess a strong understanding of the business and have the power to override established protocols [35]. Employee fraud in financial institutions is a major contributor to global banking crises. A number of relevant studies have noted that fraud within financial institutions is diverse, ranging from employee and consumer fraud to corporate and individual fraud, as well as accounting and transactional fraud [36,37].
According to a 2018 study, occupational fraud can be classified into two types: management fraud and employee fraud [38]. Previous research has also indicated that no company is impervious to employee fraud, which may entail falsifying financial records to mislead stakeholders and potentially impact stock prices, executive compensation, and loan conditions [39]. Fraudulent behavior among employees can take many shapes and occur at any level of an organization, but departments responsible for purchasing and procurement may be especially susceptible [40]. This type of misconduct has been a major factor in causing global banking crises. In 2019, another study pointed out the challenges organizations face in preventing fraud due to the non-shareable nature of certain financial pressures and rationalizations that contribute to fraudulent behavior [41]. It is crucial for organizations to eliminate opportunities for fraud to minimize the risk of such misconduct.
According to a 2021 study, there is a clear connection between fraud and the capabilities of those who commit it [42]. Additional research has shown that there is a positive correlation between elements of the fraud pentagon model and fraud risk ratings but a negative correlation between streamlining and fraud risk ratings [43]. Furthermore, some authors have discovered that robust governance policies can effectively reduce the risk of fraud [44]. Several studies have demonstrated a correlation between identifying high-risk areas and reducing the likelihood of fraud, while other research has produced mixed results [45,46]. Additionally, there is evidence that the elements of the “fraud triangle” can have a negative impact on the occurrence of fraudulent activity [47]. Effective internal controls, which are a key component of corporate governance, can help entities prevent and detect fraud [48].
The auditor is aware that management has a unique ability to engage in fraudulent activities by manipulating accounting records and producing fraudulent financial statements, all while avoiding controls that appear to be effective. This risk exists in all entities, although the degree of risk may vary. These fraudulent actions pose a material risk of misstatement in financial statements, which can be intentional or unintentional. Asset embezzlement, which often involves small amounts stolen by employees, can also be committed by management who are better equipped to conceal their actions [49].
As part of this approach, the financial auditor has a series of indicators (financial ratios) that will signal these errors, inconsistencies or speculations that are made and then embellished by accounting artifices regarding the nature of manipulating sales, operating expenses, and the level of assets, liabilities and capital owned [50]. In this sense, the analysis of the balance sheet through the system of financial indicators provides information on the relative composition of the property and the contribution of capital to the financing of the enterprise, as well as the analysis of the profit and loss account, provides information on previous and current performance and for estimating the future results of the company [51].
Identifying and assessing risks is a crucial component of risk management for any entity. Establishing risk culture, limits, and early warning signs for violations is equally important. Monitoring and supervising activities that may pose risks, proposing risk mitigation actions, and reporting to designated authorities is the next step. In addition, entities can promote good corporate governance by implementing ethical practices and cultivating risk awareness [52].

3. Research Methodology

This article promotes the auditing and detection of the risk of fraud by using the “red flags” method through a contextual approach to the increasingly assiduous need to present working practices of some managers and to make publicly known, permanently, their entire activity, ethics, and responsibility in business. This to reduce information asymmetries and encourage principles of corporate governance that dictate the need for the presence and continuous training of professionals who are able to prevent and eradicate financial fraud. The present research consists of an empirical study, for the period 2018–2022, based on the financial indicators of a corporate IT entity producing “Intelligent Business Tools for Management”.
The decision taken is based on the fact that this entity uses its own information systems, with or without a significant impact on the quality of accounting information, which have an extremely important role in managing the risk of fraud. Through their activity, these systems make available the produced instruments to a large number of entities and ensure their ongoing efforts to prevent, detect and react to fraud and professional misconduct by designing, implementing and evaluating applicable programs and controls. The data collection is carried out from financial and sustainability reports that have been made public by the entity in question. The processing and interpretation of these data are undertaken according to the related variables and calculation formulas, presented in Table 1, by the authors of this scientific approach based on their professional experience. To achieve the research objectives of the study, a positivist approach was used [53], which is a logical model [54], carried out with the help of economic models for the factor analysis of multiple correspondences and the assessment of the risk of fraud in the financial audit mission. Factorial analysis of multiple correspondences is a complex mathematical technique that is part of the group of tools for quality management, established by Japanese scholars under the name matrix data analysis. The factor analysis diagram allows one to give a visual representation of the correlations between multiple variables and make it possible to visualize, on a plane, what is happening in a space with n dimensions. Thus, robust correlation (non-parametric correlation) is used to detect monotonic relationships between variables, e.g., when one variable increases only when the other increases, or decreases only when the other increases, but not necessarily in a linear manner.
Drawing from the challenges highlighted in specialized literature surrounding the analysis and evaluation of fraud risk in financial audit missions, a set of comprehensive and practical testing and verification studies are recommended. Given the significance of financial indicators, including factors such as structure, profitability, solvency, and liquidity, in identifying errors in financial statements, we suggest leveraging this information to gauge the potential for fraud related to the examined entity. At the same time, we state that the variables are certain, obtained as a result of the conversion of continuous numerical variables, into certain variables, reserved for the analyzed financial rates. The conversion involves obtaining categories, based on the intervals defining the values for a given continuous numerical variable. The conversion of continuous variables and derived categories was undertaken by coding, considering the ranges indicated in Table 1.
Based on a sample of financial indicators of a corporate entity that includes fraudulent and non-fraudulent elements, we sought to test the general hypothesis about the possibility of obtaining the financial profile of a fraudulent entity by analyzing predetermined financial ratios.
In order to understand the significance of financial reports in the present scientific endeavor we analyze their usefulness, auditing, and presentation of asset fraud signals. The present study is an empirical one, based on the financial indicators of a corporate IT entity producing “Intelligent Business Tools for Management”, for the period 2018–2022. This is a company that offers IT software, maintenance services and technical support for businesses. Its object of activity falls under CAEN code 6201: Activities to create custom software (customer-oriented software).
The basic principles of the company are to continuously develop new products at the highest standards; to provide correct, accurate and up-to-date information that facilitates the understanding and interpretation of data, the identification of trends and the realization of analyzes within entities; and to solve important business needs of clients in a way that delights them, makes their work easier and forms the basis for solving the problems they face in the activity they carry out. The goal pursued by users is to improve performance and to make strategic decisions in order to optimize operations and achieve better results in the segment of the market of which they are a part. However, in order to highlight some characteristics of the fraud risk profile, obtained on the basis of financial ratios, the work methodology requires that these data be compared with each other to prove the performance of the analyzed entity. To this end we examine the years from which the best financial results were recorded.
The method can be applied to a sample of n individuals, on the values recorded for a series of m associated variables, based on which the profile of an individual from a certain period or group can be obtained, following the study of the associations between the analyzed variables. This method summarizes the initial information by studying the associations between the variables, highlighted by a scatter diagram built on a system of factorial axes ranked in descending order, according to their importance in explaining the total variance of the diagram. Knowing the significance of the financial ratios analyzed in the present study and their usefulness in signaling the existence of fraud on assets and on reporting, we propose to test the following hypotheses, formulated based on experimental data (Figure 1).
In Figure 2, the necessary indicators are presented for the categories of variables that must be audited in order to identify fraud risks. First developed in France by J. P. Benzécri, and then Lebart, L., Piron, M., and Morineau, A., factor analysis of multiple correspondences is a multivariate analysis method for studying associations between three or more nominal variables. This is a generalized variant of factor analysis of correspondences [55,56].
The financial indicators in Figure 2 represent the results obtained by the analyzed entity for the mentioned period, and the bases of their processing are the variables in Table 1.
Table 1. The categories of analyzed variables.
Table 1. The categories of analyzed variables.
SymbolVariablesMethod of
Calculation
Risk Level Framing Limits
RmnNet margin rateNet result/turnover(−∞; 0.1) Rmn low; (0.1; 0.25) Rmn medium; (0.25; +∞) Rmn high.
RfFinancial profitabilityNet result/equity(−∞; 0.33) Rf low; (0.33; 0.66) Rf medium; (0.66; +∞) Rf high.
RaiThe rate of self-financing of fixed assetsEquity/net fixed assets(−∞; 0.25) Rai low; (0.25; 0.75) Rai medium; (0.75; +∞) Rmn high.
RfeiThe rate of external financing of fixed assetsLong-term liabilities/net fixed assets(0; 0.5) Rfei low; (0.5; 1) Rfei medium; (1; +∞) Rmn high.
RîtTerm debt rateLong-term liabilities/equity(−∞;0) U (1;+∞) Rît high; (0; 0.5)Rît low; (0.5; 1) Rît medium.
RlgGeneral liquidity ratioCurrent assets/current liabilities(0; 66) Rlg low; (0.66; 1) Rlg medium; (1; +∞ Rlg high.
RliImmediate liquidity rateTreasury assets/current liabilities(−∞; 0.25) Rli low; (0.25; 0.5) Rli medium; (0.5; +∞) Rli high.
RatTotal asset rate (treasury uses)Treasury assets/total assets(−∞; 0.05) Rat low; (0.05; 0.1) Rat medium; (0.1; +∞) Rat high.
VracCurrent assets turnover rateTurnover/current assets(0; 1) Vrac low; (1; 2) Vrac medium; (2; +∞) Vrac high.
Source: Authors’ projection, adapted from [57].
The variables used to achieve the research objectives were achieved by validating the hypotheses formulated on the basis of experimental data. It should be noted that these variables are indisputable, obtained following the conversion (transformation of continuous numerical variables into indisputable discrete variables) of the analyzed financial ratios. The conversion involves obtaining the categories of variables, based on the intervals of defining values for a given continuous numerical variable. The conversion of continuous variables (obtaining the categories) was achieved by recoding them, considering the intervals specified in Table 1.
These meet the conditions of the multivariate analysis method, for the study of chains between several nominal variables, a generalized variant that extends the scope of the factorial analysis of correspondences [55,58].

4. Results

The application of multiple correspondence factor analysis (AFCM) takes into account the nature of the analyzed financial indicators and, therefore, we proposed dividing them into four categories: profitability indicators (Rmn and Rf), financing and liability indicators (Rai, Rfei, Rît), liquidity indicators. (Rlg, Rli, Rat) and the operational activity report (Vrac). The results obtained following the application of AFCM to the data in Table 2, which are the bases of this scientific study, allowed the generation of graphs regarding the association between the proposed financial rates (red flags) and the presence or absence of fraud.
These associations are necessary to determine the fraud risk of a financial profile, helping to prevent and combat fraud. At the same time, these associations are necessary to determine a financial profile of the risk of fraud, useful in preventing and combating fraud through the audit trails that the signal elements can indicate. Regarding the correlation between profitability and the presence or absence of fraud, it can be observed, at the level of the analyzed indicators, how an entity suffers from financial fraud (theft of assets or fraudulent financial reporting) when it records low rates of financial profitability and profitability net margins.
The results obtained, based on the calculations performed and on the financial indicators in Table 1, illustrate the results obtained in the next figures, which are presented and explained in detail.
In Figure 3, the nature of the values of these rates may be due either to the declaration of an undersized net result, in order to escape certain tax charges (see the case of Rf and Rmn), or to the declaration of an oversized turnover in relation to the activity carried out. These declarations would be made precisely to mislead shareholders in terms of the entity’s solvency and its ability to continue its activity in a foreseeable time horizon without going into insolvency or a suffering a significant reduction in activity (see the Rmn case). These signal elements can contribute to the identification of audit tracks with reference to the application of international financial reporting standards (IAS-IFRS), financial statement presentation (IAS 1), income tax calculation (IAS 12), revenue recognition and recording (IAS 18) and earnings per share (IAS 33).
The level of association between funding rates, self-financing rates, and the presence or absence of fraud indicates how the entities affected by fraud had average and above-average term debt rates in the data sample analyzed. Adopting a funding policy based on external resources undermines the resources themselves, but the credibility of the reported information must also be assessed. In the case of the association between the chosen financing method and the presence or absence of fraud, it can be observed how fraudulent entities use several financing strategies (only on own resources and/or only on external resources). Entities applying anti-fraud strategies maintain a balance between borrowed/external resources and own resources (Figure 4).
In Figure 4, recording external financing/self-financing ratio values that differ significantly from the average can be a clear signal of the presence of financial fraud. Thus, the main IAS-IFRS, which will form the basis of the analysis of these audit trails, refer to the accounting and valuation of tangible assets (IFRS 16), the registration of financial leasing contracts (IFRS 17), the accounting of government subsidies (IFRS). 20), the nature of borrowing costs (IFRS 23), and the valuation and recording of intangible assets (IFRS 38).
An analysis of the association between liquidity indicators and the manifestation of financial fraud at the level of the analyzed sample leads us to the following results: during the analyzed period, the entity registered average values of the general liquidity indicator. This may be due to an unbalanced ratio of current assets to current liabilities (Figure 5).
Though the large volume of current assets will lead to the coverage of current external resources (increasing the level of liquidity), it may actually lead to the theft of current assets by the entity. These indicators therefore lead to an analysis of the nature of current assets (inventories, customer accounts or cash and bank accounts) to assess the entity’s susceptibility to fraud risk related to asset theft. Therefore, an increase in the speed of the rotation of current assets based on the turnover of stocks and finished products will lead to operational efficiency (in terms of collecting receivables from customers) and an increase based on treasury assets will lead to the entity’s tendency to defraud (or to embezzle funds). In this case, the auditor must analyze the audit trails identified in the standards and also consider the methods chosen for inventory accounting (IAS 2) and depreciation of assets (IAS 36), cash flow statements (IAS 7) and income registered totals (IAS 2, IAS 18), the type of current assets (nature and structure), and accounting methods and their recognition and management. An analysis of current asset structure can be undertaken by studying cash flow ratios and cash flow utilization. In this case, one can see how the defrauded entity has a high value of treasury assets in relation to short-term loans and general assets, which leads to the predisposition of the entity to expose itself to the risk of defrauding assets. The main IAS-IFRS standards that will form the basis of the audit trail analysis regarding liquidity levels concern inventories (IAS 2), depreciation (IAS 36) and the statement of cash flows (IAS 7).
Analyzing the activity of operating operations, through the association between the speed of rotation of current assets and the presence or absence of fraud, one can observe how a fraudulent entity records above-average values of this indicator, which in turn leads to an increase in the efficiency of operational activities (increase in stock turnover that leads to an increase in customer receipts and to oversized values of the turnover and implicitly to higher values of the accounting result). In addition, the auditor must analyze the nature of current assets (inventory, receivables or treasury items, cash and bank accounts) to assess the entity’s fraud risk in terms of asset theft. Therefore, the increase in the speed of rotation of current assets based on the turnover of stocks and finished products leads to operational efficiency (if receivables from customers will also be collected), and an increase based on treasury assets makes the entity prone to the risk of fraud, as can be seen from the results obtained in the present scientific study (Figure 6).
In this case, the auditor must analyze the audit trails identified in the standards, also considering the methods chosen for inventory accounting (IAS 2) and depreciation of assets (IAS 36), cash flow statements (IAS 7) and recorded total income (IAS 7, IAS 18).
Various risks, including business, financial, and economic risks, can have a notable adverse effect on dividend payments and other areas. Our analysis, as shown in Figure 3, Figure 4, Figure 5 and Figure 6, suggests a linear robustness that does not necessitate additional tests or alternative estimation procedures. Furthermore, we have found that risk has a statistically significant negative impact on payment policies and exploitation activities [59].
While some risks may be unforeseeable, they should not be overlooked. Instead, managers should allocate separate budget lines for unexpected situations and create reserves. Essentially, they should prepare for rainy days.
Risk management is a continuous, cyclical process, and the results obtained must be regularly monitored. Changes in context or new information can render the original assessment outdated.
As part of the auditing process, it is important for specialized studies to be consulted to determine the nature of debts, including associated costs, and the use of foreign resources. The accuracy of reported equity must also be evaluated. By analyzing the financing method used and the existence of fraud, it is possible to draw relevant conclusions about the entity’s financial situation. In this case, the presence of financial fraud can be signaled by financing/self-financing rate values that differ from the norm. For instance, a high Rai (self-financing rate of fixed assets) and a low Rfei (rate of external financing of fixed assets) may indicate fraud. The trend lines presented in Figure 4 for Rai, Rfei, and Rît (total debt ratio) show an exponential or representative relationship for the analyzed financial indicators, which indicates a linear relationship between the independent and dependent variables.
After comparing these results to similar studies involving food trading activity, where low levels indicate fraud (Rai) and average levels indicate non-fraud (Rfei), the trend lines for the analyzed financial indicators show an exponential or representative pattern. Additionally, there is a linear relationship between the independent and dependent variables, indicating that entities affected by fraud had higher than average rates of term debt in the data sample. This extended working method, along with investigative tools, can provide a new solution to the challenge of fraud in the accounting profession. The use of statistical methods in financial and fraud auditing, as well as their interconnections with financial analysis and accounting, can lead to a broader and more sophisticated direction of research, including a more extensive range of indicators by which to accurately assess entity performance.

5. Conclusions

Identifying and quantifying the impact of qualitative factors on the risk of fraud is an effective way to prevent or detect acts of economic crime. In accordance with the validation of the working hypotheses of this scientific approach, the level of the study shows, through empirical records, that the object of activity of an entity can constitute a factor that can determine the occurrence of fraud.
Based on the results obtained from our scientific approach and the validation of the proposed hypothesis (that there is a significant relationship between the rates proposed by the analysis and the presence or absence of financial fraud), the purpose of this study was fulfilled by identifying the financial profile of the risk of fraud. This feature is useful for auditors in financial audit operations, especially fraud audit operations, when testing the presence of fraud at the level of audited entities. Finally, this feature can also be used for programs of prevention and control for sensitive areas that may generate fraud in entities vulnerable to fraud risks.
While analyzing “red flags” and combating financial signals may be seen as a daunting task, it is an essential part of an audit trail that helps fraud auditors detect and prevent culprits. If left unchecked, fraudulent actions can have a negative impact on an entity’s profits, profitability, and overall sustainability. To perfect decision-making models, it is crucial to have access to reliable information and to continually adapt to new dynamics and factors. The cost of obtaining and preserving this information must also be taken into consideration, as well as the time available for decision-making. By gathering and utilizing relevant information, entities can make informed decisions that maximize benefits and ensure long-term success.
This information is primarily intended for those making decisions about new product development and future marketing campaigns, which rely heavily on the power of information. However, when it comes to investors and other stakeholders, providing every possible detail and value is not necessary. Instead, they may prefer a clear overview of trends and perspectives that are relevant to their needs.
In today’s world, where investors balance short-term financial results with long-term economic entity goals, it is crucial for businesses to prioritize their performance. The decision-making process is at the heart of management activities and affects all functions, as is the integration of the entity into the competitive environment and its ability to navigate economic crises. High-quality decision-making also leads to reduced costs, efficient use of funds, increased profits, and more.
In conclusion, the role of financial analysis and factor analysis in the study of fraud from the perspective of causes and caused effects can lead an auditor to identify areas with a high risk of fraud. Another important element of the profile is the establishment of links between financial red flag indicators and International Financial Reporting Standards, indicating accounting rules and areas where financial manipulations can be made. Given the current economic situation, characterized by financial scandals, accounting manipulations, and the collapse of financial markets, financial corruption is the main factor responsible for the negative effects of financial crises.
One potential avenue for future research is to conduct a comparative analysis of red flags in this topic or in related topics across various industries or countries. Additionally, further investigation into identifying potential fraud or major financial risks through the analysis of “red flags” in company financial reports, as well as studies exploring how investor reactions to these signals impact investment decisions, could be valuable. Finally, evaluating the efficacy of financial education and training in recognizing and managing “red flags” in investment contexts may also be worth exploring.
Therefore, through its investigative tools as well as its work process, the field of accounting fraud is the accounting professional’s response to this new challenge (fraud) and can be considered as a form of pain reliever. Finally, the use of graphical/statistical techniques in financial accounting for fraud and the connection between financial analysis and accounting can open new research directions. This relatively new field proposes an analysis of economic–financial phenomena from financial accounting based on specific indicators.

Author Contributions

Conceptualization, V.M., A.H. and C.-E.P.; methodology, G.A. and L.-A.F.; software, M.-R.Z. and A.H.; validation, V.M., A.H. and G.A.; formal analysis, C.-E.P.; investigation, L.-A.F.; resources, A.H. and M.-R.Z.; data curation, L.-A.F.; writing—original draft preparation, L.-A.F. and A.H.; writing—review and editing, V.M.; visualization, M.-R.Z.; supervision, V.M.; project administration, A.H.; funding acquisition, C.-E.P., G.A. and A.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Restrictions apply to the availability of these data. Data was obtained from BVB Romania and are available at https://bvb.ro/Services/DataVending/ForProfessionals with the permission of BVB Romania.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Amor, K. Uncovering Creative Accounting; Pearson Education: London, UK, 2003. [Google Scholar]
  2. Singleton, T.W.; Singleton, A.J. Fraud Auditing and Forensic Accounting, 4th ed.; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar]
  3. Porter, B.A. Narrowing the audit expectation-performance gap: A Contemporary approach. Pac. Account. Rev. 1991, 3, 1–36. [Google Scholar]
  4. Porter, B.A. An empirical study of the audit expectation-performance gap. Account. Bus. Res. 1993, 24, 49–68. [Google Scholar] [CrossRef]
  5. Humphrey, C.; Moizer, P.; Turley, S. The audit expectations gap—Plus ca change, plus c’est la meme chose? Crit. Perspect. Account. 1992, 3, 137–161. [Google Scholar] [CrossRef]
  6. Shalimova, N.; Androshchuk, I. Approaches to the Interpretation of the Term “Historical Financial Information” As the Criterion for the Classification of Audit, Review, and Other Assurance Engagements. Balt. J. Econ. Stud. 2018, 4, 333–342. [Google Scholar] [CrossRef]
  7. Gallet, O. Halte Aux Fraudes: Guide Pour Auditeurs et Dirigeants, 2nd ed.; Dunod: Paris, France, 2010. [Google Scholar]
  8. International Auditing Practices Committee International Federation of Accountants. The Auditor’s Responsibility to Consider Fraud and Error in an Audit of Financial Statements; International Federation of Accountants: New York, NY, USA, 2001. [Google Scholar]
  9. Krambia-Kapardis, M. Fraud Victimisation Study: Cyprus’ Experience; Ernst and Young: Mesa Geitonia, Cyprus, 2002. [Google Scholar]
  10. PricewaterhouseCoopers. Economic Crime Survey, European Report; PricewaterhouseCoopers: London, UK, 2001. [Google Scholar]
  11. Ernst and Young. 2000 International Fraud Survey; Ernst and Young International: London, UK, 2000. [Google Scholar]
  12. Meidijati, M.; Amin, M.N.A. Detecting Fraudulent Financial Reporting Through Hexagon Fraud Model: Moderating Role of Income Tax Rate. Int. J. Soc. Manag. Stud. 2022, 3, 311–322. [Google Scholar]
  13. IFAC. ISA-240—Auditor’s Responsibilities Regarding Fraud in an Audit of Financial Statements; International Federation of Accountants: New York, NY, USA, 2009. [Google Scholar]
  14. Tickner, P.; Button, M. Deconstructing the origins of Cressey’s Fraud Triangle. J. Financ. Crime 2021, 28, 722–731. [Google Scholar] [CrossRef]
  15. CAFR. The Manual of the International Code of Ethics for Professional Accountants; Council for International Ethical Standards for Accountants: New York, NY, USA, 2021. [Google Scholar]
  16. Jackson, R.D.C.; Stent, W.J. Auditing Notes for South African Students; Audit Education: Hilton, South Africa, 2010. [Google Scholar]
  17. Eze, E.; Okoye, E.I. Forensic accounting and fraud detection and prevention in Imo state public sector. Account. Tax. Rev. 2019, 3, 12–26. [Google Scholar]
  18. Mvunabandi, J.D.J. How can new fraud combination theory help forensic auditors and external auditors in fraud risk assessments? J. Akunt. Dan Audit. 2023, 19, 1–21. [Google Scholar]
  19. Crain, M.A.; Hopwood, W.S.; Gendler, R.S.; Young, G.R.; Pacini, C. Essentials of Forensic Accounting; John Wiley & Sons: Hoboken, NJ, USA, 2019. [Google Scholar]
  20. Afriyie, S.O.; Akomeah, M.O.; Amoakohene, G.; Ampimah, B.C.; Ocloo, C.E.; Kyei, M.O. Forensic accounting: A novel paradigm and relevant knowledge in fraud detection and prevention. Int. J. Public Adm. 2023, 46, 615–624. [Google Scholar] [CrossRef]
  21. IFAC. The Manual of International Regulations for Quality Control, Audit, Review, Other Assurance Services and Related Services; IAASB Manual; International Federation of Accountants: New York, NY, USA, 2020. [Google Scholar]
  22. Rose, K.J. De-risking or recontracting—The risk dilemma of EU money laundering regulation. J. Risk Finance 2020, 21, 445–458. [Google Scholar] [CrossRef]
  23. Kepramareni, P.; Pradnyawati, S.O.; Muliahati, K.A. Analysis of the effect using financial ratios, ownership and corporate size on corporate value in food and beverage corporate. Int. J. Appl. Bus. Int. Manag. IJABIM 2023, 8, 101–112. [Google Scholar] [CrossRef]
  24. Mock, T.J.; Srivastava, R.; Turner, J. Bayesian Fraud Risk Formula for Financial Statement Audits. Abacus J. Account. Finance Bus. Stud. 2009, 45, 66–87. [Google Scholar]
  25. Cressey, D.R. Other People’s Money: The Social Psychology of Embezzlement; The Free Press: New York, NY, USA, 1953. [Google Scholar]
  26. Kassem, R.; Higson, A. The new fraud triangle model. J. Emerg. Trends Econ. Manag. Sci. 2012, 3, 191–195. [Google Scholar]
  27. Vousinas, G.L. Advancing theory of fraud: The SCORE model. J. Financ. Crime 2019, 26, 372–381. [Google Scholar] [CrossRef]
  28. Sorunke, O.A. Personal ethics and fraudster motivation: The missing link in fraud triangle and fraud diamond theories. Int. J. Acad. Res. Bus. Soc. Sci. 2016, 6, 159–165. [Google Scholar]
  29. Wolfe, D.T.; Hermanson, D.R. The fraud diamond: Considering the four elements of fraud. CPA J. 2004, 74, 38–42. [Google Scholar]
  30. Horwath, C. Putting the Freud in Fraud: Why the Fraud Triangle Is No Longer Enough; Crowe: Horwath, IN, USA, 2011. [Google Scholar]
  31. Gallud Cano, J.; Baumgärtler, T.; Eudelle, P. Fighting Fraud and Corruption in European Structural and Investment Funds. In Fraud and Corruption in EU Funding: The Problematic Use of European Funds and Solutions; Springer International Publishing: Cham, Switzerland, 2022; pp. 57–123. [Google Scholar]
  32. Said, J.; Alam, M.; Ramli, M.; Rafidi, M. Integrating ethical values into fraud triangle theory in assessing employee fraud: Evidence from the Malaysian banking industry. J. Int. Stud. 2017, 10, 170–184. [Google Scholar] [CrossRef]
  33. Kazemian, S.; Said, J.; Nia, E.H.; Vakilifard, H. Examining fraud risk factors on asset misappropriation: Evidence from the Iranian banking industry. J. Financ. Crime 2019, 26, 447–463. [Google Scholar] [CrossRef]
  34. Baader, G.; Krcmar, H. Reducing false positives in fraud detection: Combining the red flag approach with process mining. Int. J. Account. Inf. Syst. 2018, 31, 1–16. [Google Scholar] [CrossRef]
  35. Deloitte, B. Shutting Down Fraud, Waste, and Abuse. Available online: https://www.deloitte.com/global/en/our-thinking/insights/industry/government-public-services/fraud-waste-and-abuse-in-entitlement-programs-benefits-fraud.html (accessed on 3 December 2023).
  36. Sanusi, Z.M.; Rameli, M.N.F.; Isa, Y.M. Fraud schemes in the banking institutions: Prevention measures to avoid severe financial loss. Procedia Econ. Finance 2015, 28, 107–113. [Google Scholar] [CrossRef]
  37. Bonsu, O.A.M.; Dui, L.K.; Muyun, Z.; Asare, E.K.; Amankwaa, I.A. Corporate fraud: Causes, effects, and deterrence on financial institutions in Ghana. Eur. Sci. J. 2018, 14, 315–335. [Google Scholar] [CrossRef]
  38. Dadzie-Dennis, E.N.; Ghansah, K.; Korletey, J.T. Employee fraud in the banking sector of ghana. SBS J. Appl. Bus. Res. 2018, 6, 4–17. Available online: https://jabr.sbs.edu/SBS_JABR_Vol6.pdf#page=6 (accessed on 16 October 2023).
  39. Mohamed, N.; Handley-Schachelor, M. Financial statement fraud risk mechanisms and strategies: The case studies of Malaysian commercial companies. Procedia Soc. Behav. Sci. 2014, 145, 321–329. [Google Scholar] [CrossRef]
  40. Nawawi, A.; Salin, A.S.A.P. Employee fraud and misconduct: Empirical evidence from a telecommunication company. Inf. Comput. Secur. 2018, 26, 129–144. [Google Scholar] [CrossRef]
  41. Suh, J.B.; Nicolaides, R.; Trafford, R. The effects of reducing opportunity and fraud risk factors on the occurrence of occupational fraud in financial institutions. Int. J. Law Crime Justice 2019, 56, 79–88. [Google Scholar] [CrossRef]
  42. Khamainy, A.H.; Ali, M.; Setiawan, M.A. Detecting financial statement fraud through new fraud diamond model: The case of Indonesia. J. Financ. Crime 2021, 29, 925–941. [Google Scholar] [CrossRef]
  43. Devi, P.N.; Widanaputra, A.A.; Budiasih, I.G.; Rasmini, N.K. The Effect of Fraud Pentagon Theory on Financial Statements. J. Asian Finance Econ. Bus. 2021, 8, 1163–1169. [Google Scholar]
  44. Fitriyah, R.A.; Novita, S. Fraud Pentagon Theory for Detecting Financial Statement Fraudulent. J. Ris. Akunt. Kontemporer 2021, 13, 20–25. [Google Scholar] [CrossRef]
  45. Saluja, S.; Aggarwal, A.; Mittal, A. Understanding the fraud theories and advancing with integrity model. J. Financ. Crime 2022, 29, 1318–1328. [Google Scholar] [CrossRef]
  46. Mohamed, N.; Zakaria, N.B.; Nazip, N.S.B.M.; Muhamad, N.F. The influencing factors of employee fraud in Malaysian financial institution: The application of the fraud pentagon theory. Acad. Strateg. Manag. J. 2021, 20, 1–12. [Google Scholar]
  47. Kagias, P.; Cheliatsidou, A.; Garefalakis, A.; Azibi, J.; Sariannidis, N. The fraud triangle–an alternative approach. J. Financ. Crime 2022, 29, 908–924. [Google Scholar] [CrossRef]
  48. Rashid, M.A.; Al-Mamun, A.; Roudaki, H.; Yasser, Q.R. An Overview of Corporate Fraud and Its Prevention Approach. Australas. Account. Bus. Finance J. 2022, 16, 101–118. [Google Scholar] [CrossRef]
  49. Munteanu, V.; Ibănișteanu, D.M.; Gheorghe, C.F.; Stancu, M.V.; Ardeleanu, N.; Dîndăreanu, V.I. The Financial-Accounting Audit: Methodological Approach and Practical Cases; University Publishing House: Bucharest, Romania, 2020. [Google Scholar]
  50. Penman, S.H. Financial Statement Analysis and Security Valuation, 3rd ed.; McGraw Hill: New York, NY, USA, 2007. [Google Scholar]
  51. Mironiuc, M. Economic-Financial Analysis: Theoretical-Methodological Elements and Applications; Sedcom Libris: Iasi, Romania, 2006. [Google Scholar]
  52. Akinbowale, O.E.; Klingelhöfer, H.E.; Zerihun, M.F.; Mashigo, P. Development of a policy and regulatory framework for mitigating cyberfraud in the South African banking industry. Heliyon 2023, 10, e23491. [Google Scholar] [CrossRef] [PubMed]
  53. Smith, M. Research Methods in Accounting; SAGE Publication: London, UK, 2003. [Google Scholar]
  54. Caldwell, B. Beyond Positivism: Economic Methodology in the Twentieth Century, 2nd ed.; Routledge: London, UK, 2003. [Google Scholar]
  55. Benzécri, J.P. Statistical analysis as a tool to make patterns emerge from data. In Methodologies of Pattern Recognition; Academic Press: Cambridge, MA, USA, 1969; pp. 35–74. [Google Scholar]
  56. Lebart, L.; Piron, M.; Morineau, A. Statistique Exploratoire Multidimensionnelle. Visualisation et Inférences en Fouille de Données, 4th ed.; Dunod: Paris, France, 2006. [Google Scholar]
  57. Jaba, E.; Grama, A. Statistical Analysis with SPSS under Windows; Polirom: Iasi, Romania, 2004. [Google Scholar]
  58. BinSaeed, R.H.; Yousaf, Z.; Grigorescu, A.; Radu, V.; Nassani, A.A. Digital Revolution and Digitization Process to Promote AIS as a Vector of Financial Performance. Systems 2023, 11, 339. [Google Scholar] [CrossRef]
  59. Athari, S.A. The effects of institutional settings and risks on bank dividend policy in an emerging market: Evidence from Tobit model. Int. J. Finance Econ. 2021, 26, 4493–4515. [Google Scholar] [CrossRef]
Figure 1. Sample level of analyzed data.
Figure 1. Sample level of analyzed data.
Applsci 14 00757 g001
Figure 2. Financial indicators analyzed for the period 2018–2022. Note: RN = net result; CA = turnover, CP = equity; Ain = net fixed assets; Around = current assets; Dtl = long-term debt; DC = current liabilities; Awake = treasury assets; AT = total assets.
Figure 2. Financial indicators analyzed for the period 2018–2022. Note: RN = net result; CA = turnover, CP = equity; Ain = net fixed assets; Around = current assets; Dtl = long-term debt; DC = current liabilities; Awake = treasury assets; AT = total assets.
Applsci 14 00757 g002
Figure 3. Using the “red flags” technique regarding profitability. Note: Rmn medium, Rf medium = non-fraud, 2019; Rmn medium, Low Rf = situation of uncertainty, indicating a volatile situation which in turn indicates fraud trends that may indicate asset theft or fraudulent financial reporting 2018–2022. The trend lines presented in Figure 3, for Rmn as well as for Rf, show us an exponential/representative decrease for the analyzed financial indicators.
Figure 3. Using the “red flags” technique regarding profitability. Note: Rmn medium, Rf medium = non-fraud, 2019; Rmn medium, Low Rf = situation of uncertainty, indicating a volatile situation which in turn indicates fraud trends that may indicate asset theft or fraudulent financial reporting 2018–2022. The trend lines presented in Figure 3, for Rmn as well as for Rf, show us an exponential/representative decrease for the analyzed financial indicators.
Applsci 14 00757 g003
Figure 4. Using the “red flags” technique regarding financing and debt. Note: High Rai, Low Rfei = fraud 2018, 2019, 2021; Low rate, High Rai = fraud 2018, 2019, 2021; Rfei low, Rît medium = non-fraud 2020, 2022; Rai medium, Rît medium = non-fraud, 2020, 2022. The trend lines presented in Figure 4, for Rai, Rfei, as well as for Rît, show us an exponential/representative for the analyzed financial indicators, while there is also a linear relationship between the independent dependent variables (there is a linear relationship between the variables).
Figure 4. Using the “red flags” technique regarding financing and debt. Note: High Rai, Low Rfei = fraud 2018, 2019, 2021; Low rate, High Rai = fraud 2018, 2019, 2021; Rfei low, Rît medium = non-fraud 2020, 2022; Rai medium, Rît medium = non-fraud, 2020, 2022. The trend lines presented in Figure 4, for Rai, Rfei, as well as for Rît, show us an exponential/representative for the analyzed financial indicators, while there is also a linear relationship between the independent dependent variables (there is a linear relationship between the variables).
Applsci 14 00757 g004
Figure 5. Using the “red flags” technique regarding liquidity. Note: Medium Rat, Medium Rlg = no fraud, 2018, 2020–2022; Low Rat, Medium Rlg = non-fraud, but indicates a situation of volatility and uncertainty, 2019, 2019, 2021; Low Rat, Low Rli = no fraud, 2019; Low Rli, Medium Rat = non-fraud, but indicates a situation of volatility and uncertainty, 2018, 2020–2022. The trend lines shown in Figure 5, for Rat, Rlg, and Rli, indicate an exponential growth/ representative for the analyzed financial indicators. The trend line clearly demonstrates an upward acceleration towards fraud.
Figure 5. Using the “red flags” technique regarding liquidity. Note: Medium Rat, Medium Rlg = no fraud, 2018, 2020–2022; Low Rat, Medium Rlg = non-fraud, but indicates a situation of volatility and uncertainty, 2019, 2019, 2021; Low Rat, Low Rli = no fraud, 2019; Low Rli, Medium Rat = non-fraud, but indicates a situation of volatility and uncertainty, 2018, 2020–2022. The trend lines shown in Figure 5, for Rat, Rlg, and Rli, indicate an exponential growth/ representative for the analyzed financial indicators. The trend line clearly demonstrates an upward acceleration towards fraud.
Applsci 14 00757 g005
Figure 6. The “red flags” technique regarding exploitation activity. Note: analyzing the exploitation activity of the IT entity producing “Intelligent Business Tools for Management”, based on financial indicators for the period 2018–2022 from Figure 2, and on the variables analyzed for the same period from Table 2, we are facing a case of fraud.
Figure 6. The “red flags” technique regarding exploitation activity. Note: analyzing the exploitation activity of the IT entity producing “Intelligent Business Tools for Management”, based on financial indicators for the period 2018–2022 from Figure 2, and on the variables analyzed for the same period from Table 2, we are facing a case of fraud.
Applsci 14 00757 g006
Table 2. The categories of analyzed variables after the method of calculation.
Table 2. The categories of analyzed variables after the method of calculation.
Method of Calculation20182019202020212022
Rmn = RN/CA0.120.190.120.250.14
Rf = RN/CP0.280.350.190.310.16
Rai = CP/Ain1.020.820.690.810.65
Rfei = Dtl/AIn 0.330.370.400.230.34
Rît = Dtl /CP0.320.450.570.290.53
Rlg = ACirc./DC0.830.810.760.810.82
Rli = Rli = ATrez./DC0.200.200.230.240.25
Rat = ATrez.AT0.0840.0490.0510.0660.056
Vrac = CA/ACirc.4.745.995.463.593.12
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Munteanu, V.; Zuca, M.-R.; Horaicu, A.; Florea, L.-A.; Poenaru, C.-E.; Anghel, G. Auditing the Risk of Financial Fraud Using the Red Flags Technique. Appl. Sci. 2024, 14, 757. https://doi.org/10.3390/app14020757

AMA Style

Munteanu V, Zuca M-R, Horaicu A, Florea L-A, Poenaru C-E, Anghel G. Auditing the Risk of Financial Fraud Using the Red Flags Technique. Applied Sciences. 2024; 14(2):757. https://doi.org/10.3390/app14020757

Chicago/Turabian Style

Munteanu, Victor, Marilena-Roxana Zuca, Adriana Horaicu, Laura-Andreea Florea, Cristina-Elena Poenaru, and Gabriela Anghel. 2024. "Auditing the Risk of Financial Fraud Using the Red Flags Technique" Applied Sciences 14, no. 2: 757. https://doi.org/10.3390/app14020757

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop