Integration of Accountability and Fraud Diamond Theories as a Framework to Predict Fraud in the General Education Sector: A Case Study of Zambia
Keywords:Integration, Theory of Accountability, Fraud Diamond Theory, General Education Sector, Zambia
Purpose: The purpose of this paper is to present a critical review of the contributions of more than one theory to fraud research (which is often referred to as “theoretical triangulation or integration” or “theoretical pluralism) in a public organization,”, with a particular focus on the manner in which chosen variables from a given theory could be employed to develop research assumptions.
Design/methodology/approach: The authors conduct an analysis of how to employ theoretical integration and methodological monism in fraud research. To this end, they use three theories for illustrative purposes.
Findings: The authors argue that using theories with varying epistemological notions that are captured by appropriate research methods enables one to explore and account for different layers of theoretical concepts pertaining to fraud in organizations.
Originality/value: The paper contributes to the thinking about the interaction between theory applications by demonstrating that theoretical integration is more meaningful than single theories in order to provide deeper understandings of fraud phenomena.
] Abdullahi, R. and Mansor, N. (2015a). Concomitant Debacle of Fraud Incidences in the Nigeria Public Sector: Understanding the Power of Fraud Triangle Theory. International Journal of Academic Research in Business and Social Sciences. 5 (5): 312-326.
[ 2 ] Abdullahi, R., Mansor, N. (2015b). Fraud Triangle Theory and Fraud Diamond Theory. Understanding the Convergent and Divergent For Future Research International Journal of Academic Research in Accounting, Finance and Management Sciences. 5 (4): 38–45.
[ 3 ] Acemoglu, D., and J. Robinson, (2012). Why Nations Fail: The Origins of Power, Prosperity and Poverty. Profile Books UK. Kindle Edition.
] ACPAA. (2002). SAS No. 99. Consideration of fraud in a financial statement audit. Retrieved from https://www.aicpa.org/content/dam/aicpa/research/standards/auditattest/downloadabledocuments/au-00316.pdf.
[ 5 ] Albrecht, S., Albrecht, C., Albrecht, C. and Zimbelman, M. (2016).Fraud examination, 4th edition, Mason, OH: Cengage Learning.
[ 6 ] Albrecht, W. S., Albrecht, C., and Albrecht, C. C. (2008). Current trends in fraud and its detection. Information Security Journal: A Global Perspective, 17(1). 2-12.
[ 7 ] Anand, V., Ashforth, B., and Joshi, M. (2004). Business as usual: The acceptance and perpetuation of corruption. Academy of Management Executive,18 (2). 39–53.
[ 8 ] Australian Institute of Criminology and Price Waterhouse Coopers (AIC and PwC). (2003). Serious fraud in Australia and Public New Zealand. Research and Policy Series, No. 48. Canberra: Australian Institute of Criminology.
[ 9 ] Bartlett, N., Endo, R., Tonkin, E., and Williams, A. (2004).Audit planning for the detection of fraud.In R. Johnson (Ed.). Readings on auditing. Milton, QLD: J. Wiley and Sons.
[ 10 ] Carrington, W, DeBuse, J and Lee, H.J . (2008). The theory of governance and accountability. Iowa, United States of America: Center for International Finance and Development, University of IOWA. Available at http://cprid.com/pdf/Course%20Material_political%20science/4-Governance_and _Accountability-Theory.pdf. Accessed 12 July 2022.
[ 11 ] Cohen, J., Ding, Y., Lesage, C., and Stolowy, H. (2010). Corporate fraud and managers’ behavior: evidence from the press. Journal of Business Ethics, 95(S2). 271-315. https://doi.org/10.1007/s10551-011-0857-2.
[ 12 ] Cressey, D (1953b). The Fraud Triangle Theory. Emerging Trends in Economics and Management Sciences.
[ 13 ] Cressey, D. R. (1953a). Other People’s Money. Montclair, NJ: Patterson Smith:1-300.
[ 14 ] Dellaportas, S. (2013). Conversations with inmate accountants: Motivation, opportunity and the fraud triangle, Accounting Forum, 37 (1). 29-39.
[ 15 ] Dellaportas, S. (2014).The effect of a custodial sentence and professional disqualification on reintegration, Critical Perspectives on Accounting, 25 (8). 671-682.
[ 16 ] Dorminey, J., Fleming, A., Kranacher, M., and Riley, R. (2010). Beyond the fraud triangle. The CPA Journal, 80 (7): 17-23.
[ 17 ] Døssing H, Mokeki L and Weideman M. (2011). Mapping transparency, accountability and integrity in primary education in South Africa. Berlin, Germany: Transparency International. Available at (http://www.un.org/en/ecosoc/newfunct/pdf/luxembourg_tisda_south_africa_report_web.pdf. Accessed 18 July 2021.
[ 18 ] Dubnick M.J., and Justice, B,J (2004). Accounting for accountability. Paper presented at the Annual Meeting of the American Political Science Association, Chicago, 2-5 September. Available at http://pubpages.unh.edu/dubnick/papers/2004/dubjusacctg2004.pdf. Accessed 18 May 2021.
[ 19] Duffield, G., and Grabosky, P. (2001). The psychology of fraud: Trends and issues in crime and criminal justice. No.199. Canberra: Australian Institute of Criminology.
[ 20 ] Fitzsimons, V. (2009). A troubled relationship: Corruption and reform of the public sector in development. Journal of Management Development, 28 (6): 513–521.
[ 21 ] Frankel, T. (2012). The Ponzi scheme puzzle: A history and analysis of con artists and victims. New York, NY: Oxford University Press.
[ 22 ] Friedman E., Johnson, S., Kaufmann, D., and Zoido-Lobaton, P. (2000). Dodging the grabbing hand: the determinants of unofficial activity in 69 countries. Journal of Public Economics,76, 459-493.
[ 23 ] Hollinger, R., and Clark, J. (1983).Theft by employees. Lexington: Lexington Books.
[ 24 ] Holmes, S.A., Strawser, J.W. and Welch, S.T. (2000). Fraud in the governmental and private sectors. Journal of Public Budgeting, Accounting, and Financial Management. 12 (3): 345-369.
[ 25 ] Holton, C. (2009). Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem. Decision Support Systems, 46 (4). 853–864.
] Hoque, Z., Covaleski, M. A.; Gooneratne, T.N (2013). Theoretical triangulation and pluralism in research methods in organizational and accounting research. Accounting, Auditing and Accountability Journal. 26 (7): 1170-1198.
[ 27] Howe, M., and Malgwi, C. (2006). Playing the ponies: A $5 million embezzlement case. Journal of Education for Business, 82 (1). 27–33.
[ 28 ] Jackson, K., Holland, D., Albrecht, C., and Wolstenholme, D. (2010). Fraud Isn’t Just for Big Business: Understanding the Drivers, Consequences, and Prevention of Fraud in Small Business. Journal of International Management Studies (5:1): 160–164.
[ 29 ] Jacobs, B. (2010). Deterrence and Deterrability. Criminology (48:2): 417–441.
[ 30 ] Kelly, P. and Hartley, C. (2010). Casino gambling and workplace fraud: A cautionary tale for managers. Management Research Review, 33 (3). 224–239.
[ 31 ] Kenyon, W.,and Tilton, P.D. (2006). Potential Red Flags and Fraud Detection Techniques: A Guide to Forensic Accounting Investigation, (First Edit.). New Jersey: John Wiley and Sons Inc.
[ 32 ] Kranacher, M.J, Richard, R., and Joseph W. (2011). Forensic accounting and fraud exa32mination, Hoboken, New Jersey: John Wiley and Sons, Inc.
[ 33 ] Kruger, A.G. (2000). Managing the school as an organization. PhD thesis. Pretoria, South Africa: University of South Africa.
[ 34 ] Lerner, J. and P. Tetlock. (1999). Accounting for the effects of accountability. Psychological Bulletin 125 (2): 255-275.
[ 35 ] Lister, L.M. (2007). A Practical Approach to Fraud Risk. Internal Auditor: 1–30.
[ 36 ] Lokanan, M.E. (2015). Challenges to the Fraud Triangle: Questions on Its Usefulness. Accounting Forum (39:3): 201–224.
[ 37 ] Malimage, K. (2019). Application of Underutilized Theories in Fraud Research: Suggestions for Future Research. Journal of Forensic and Investigative Accounting. 11 (1): 33-49.
[ 38 ] Manurung D. T. H. and Hadian, N. (2013). Detection fraud of financial statement with fraud triangle,” Proceedings of the 23rd International Business Researcher Conference, pp. 18-20.
[ 39 ] Murdock, H. (2008). The Three Dimensions of Fraud: Internal Auditors. Retrieved on May 24, 2021 from www.emerald.com.
[ 40 ] Murphy, P., and Dacin, T. (2011). Psychological pathways to fraud: understanding and preventing fraud in organizations. Journal of Business Ethics, 101 (4). 601-618.
[ 41 ] Neu, D., Everett, J., Rahaman, A., and Martinez, D. (2013).Accounting and networks of corruption. Accounting, Organization and Society, 38 (6–7): 505–524.
[ 42 ] Peterson, B., and Gibson, T. (2003). Student health services: A case of employee fraud. Journal of Accounting Education, 21 (1): 61–73.
[ 43 ] Piquero, N., Tibbetts, S., and Blankenship, M. (2005). Examining the role of differential association and techniques of neutralization in explaining corporate crime. Deviant Behaviour, 26 (2): 159-188.
[ 44 ] Popper, K. (1962). Conjectures and Refutations. New York: Basic Books.
[ 45 ] Popper, K. (1966). A Theorem on Truth Content. Mind, Matter, and Method. Edited by P. K. Feyerabend and G. Maxwell. Minneapolis: University of Minnesota Press.
[ 46 ] Rae, K. and Subramaniam, N. (2008). Quality of Internal Control Procedures: Antecedents and Moderating Effect on Organisational Justice and Employee Fraud,” Managerial Auditing Journal (23:2): 104–124.
[ 47 ] Ramamoorti, S. (2008). The psychology and sociology of fraud: Integrating the behavioural sciences component into fraud and forensic accounting curricula. Issues in Accounting Education, 23 (4). 521–533.
[ 48 ] Ramamoorti, S. (2009). Bringing Freud to fraud: understanding the state-of-mind of the C-level suite/ white collar offender through “A-B-C” analysis. Journal of Forensic and Investigative Accounting, 6(1). 1-35.
[ 49 ] Report of the Auditor General On The Accounts Of The Republic For the Year Ended 31st December, 2016.
[ 50 ] Report Of the Auditor General On The Accounts Of The Republic For The Financial Year Ended 31st December 2017.
[ 51 ] Report Of the Auditor General On The Accounts Of The Republic For The Financial Year Ended 31st December 2018.
[ 52 ] Report Of the Auditor General On The Accounts Of The Republic For The Financial Year Ended 31st December 2019.
[ 53 ] Rezaee, Z. (2005). Causes, consequence, and deterrence of financial statement fraud, Critical Perspectives on Accounting, 16 (3). 277-298.
[ 53 ] Rudewicz, F. (2011). The fraud diamond: use of investigative due diligence to identify the “Capability Element of Fraud”. CTTMA Newsletter, IV (1). 1-13.
[ 54 ] Sauser, W.I. (2007). Employee Theft: Who, How, Why, and What Can Be Done. Advanced Management Journal (72:3): 13–25.
[ 55 ] Schlenker, B. R. (1997). Personal responsibility: Applications of the triangle model. In L. L. Cummings and B. M. Staw (Eds.). Research in Organizational Behaviour (pp. 241–301). Greenwich, CT: JAI Press.
[ 56 ] Scott JC. 1998. Seeing like a state: How certain schemes to improve the human condition have failed. New Haven, CT: Yale University Press.
[ 57 ] Sridharan, U. and Hadley, L. (2018). Internal Audit, Fraud and Risk Management at Wells Fargo. Journal of the Academic Business World (12:1): 49–53.
Teed G. D. (2013). Legislation of ethics in the early years of the Securities and Exchange Commission. Review of Business and Finance Studies, 4 (2). 1-10. Retrieved from http://www.theibfr.com/rbfcs.htm.
[ 58 ] Tetlock, P. E. (1985). Accountability: The neglected social context of judgment and choice. In L. L. Cummings, and B. M. Staw (Eds.). Research in Organizational Behaviour, vol. 7 ( pp. 297 – 332). Greenwich, CT: JAI Press.
[ 59 ] Tetlock, P. E. (1992). The impact of accountability on judgment and choice: Toward a social contingency model. In M. P. Zanna (Ed.). Advances in Experimental Social Psychology. 25 ( pp. 331 – 377). New York: Academic Press.
[ 60 ] Tetlock, P. E., Skitka, L., and Boettger, R. (1989). Social and cognitive strategies for coping with accountability: Conformity, complexity, and bolstering. Journal of Personality and Social Psychology, 57, 632 – 640.
[ 61 ] Vance, A., Lowry, P. B., and Eggett, D. (2013). Using Accountability to Reduce Access Policy Violations in Information Systems. Journal of Management Information Systems (29:4): 263-289.
[ 62 ] Vance, A.O., Lowry, P.B. and Eggett, D. (2015). Increasing accountability through user interface design artefacts: a new approach to addressing the problem of access policy violations. MIS Quarterly. 39(2):345-366.
[ 63 ] Wells, J.T. (2001). Why Employees Commit Fraud. Journal of Accountancy. February 2021.
[ 64 ] Wells, J.T. (2005). Principles of Fraud Examination, Hoboken, N.J.: John Wiley and Sons Inc.
[ 65 ] Wells, J.T. (2011). Corporate Fraud Handbook: Prevention and Detection, Hoboken, New Jersey: John Wiley and Sons Inc.
[ 66 ] Williams, G. W. E. (2012). Policy implications of different theoretical approaches to organized crime. Journal of Financial Crime, 19, 400-409.
[ 67 ] Wolfe, D., and D. R. Hermanson. (2004). The fraud diamond: Considering four elements of fraud. The CPA Journal, 74(12). 38-42.
[ 68 ] Yamane, T. (1967). Statistics: An Introductory Analysis, 2nd Edition, New York: Harper and Row
[ 69 ] Zawawi, S., Jusoff, K., Abdul Rahman, R., and Idris, K. 2008. “Behavioural Intention for Fraudulent Reporting Behaviour Using Cognitive Theory,” Asian Social Science (4:7).
How to Cite
Copyright (c) 2021 Paul Bernandicto Ngosa, Jason Mwanza
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.