0% found this document useful (0 votes)
313 views

Forensic Accounting

This document provides an introduction to forensic accounting. It discusses the history and development of forensic accounting over time. Key definitions of forensic accounting emphasize that it applies accounting and auditing skills to legal issues and disputes. Forensic accountants assist in investigations and provide expert analysis in legal cases. The document outlines the concept and need for forensic accounting, as well as the skills required of forensic accountants.

Uploaded by

Yash goyal
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
313 views

Forensic Accounting

This document provides an introduction to forensic accounting. It discusses the history and development of forensic accounting over time. Key definitions of forensic accounting emphasize that it applies accounting and auditing skills to legal issues and disputes. Forensic accountants assist in investigations and provide expert analysis in legal cases. The document outlines the concept and need for forensic accounting, as well as the skills required of forensic accountants.

Uploaded by

Yash goyal
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

CHAPTER 1

INTRODUCTION OF FORENSIC ACCOUNTING

1.1 Introduction of Forensic Accounting


1.2 History & Threads of Forensic Accounting
1.3 Concept of Forensic Accounting
1.4 Definitions of Forensic Accounting
1.5 Need of Forensic Accounting
1.6 Practice of Forensic Accounting
1.7 Types of Fraud
1.8 Forensic Accounting as Prevention
1.9 The Techniques of Prevention of Fraud
1.10 Skills Required for the Forensic Accountant
1.11 Difference between External Auditor and Forensic Auditor
1.12 Why Is Forensic Accounting So Popular?
1.13 Forensic Accounting Implementation in India
1.14 Conclusion
1.15 Chapter References
CHAPTER 1: INTRODUCTION OF FORENSIC
ACCOUNTING

1.1 INTRODUCTION

The point of view of accounting impact on today's general public will keep on being
brilliant as clients anticipate in data suppliers the need of maintaining the mainstays of
corporate administration; that is, responsibility, reasonableness, duty and
straightforwardness. The most recent couple of years have seen an awesome extension in
both intrigue and research in the behavioral and social parts of accounting, and there is
little uncertainty that this territory will be one of the expanding and imperative exercises
in the years ahead. Hopwood (2009). Under the new ideological standards of monetary
advancement power, marketization, and blended proprietorship made ready for an alternate
perspective of accounting to rise. Ezzamel, Xiao and Pan(2007).

Mindful of this pattern of accounting, and especially as it has been understood in all parts
of the world as taking out limits, a battle against debasement and worldwide
misrepresentation that consumes the interruption of the greater part of the creating nations,
accounting must be seen as experiencing another time, with its finished results helping with
the examination and handling of the culprits of extortion. Accepting that one considers
misrepresentation as the primary wellspring of human avarice and outright haughtiness of
the human instinct, and that it is additionally natural in the individuals who sustain it, never
mollified with what they have or continually exploiting an apparent absence of control,
Forensic accounting is viewed as one territory of these fields of accounting that is going to
get more noteworthy consideration in future exploration, be it sociological or humanistic
methodology.

How the Phrase ‘‘Forensic Accounting’’ Is Born

The main individual to come up with the saying in print was likely Maurice E. Peloubet in
1946. Kenneth W. Robinson proposed that there is collaboration to be finished by legal
advisors and accountants. In the next year, George B. Pearson, Jr., a previous judge, gave
10 notices to the bookkeeper who wishes to benefit an occupation on the testimony box.
Max Lourie, a legal advisor utilized in the New York Supreme Court distributed an article
in which he proposes that he most likely designed the term Forensic accounting, despite
the fact that his article seemed seven years after Maurice E. Peloubet had evidently
instituted the term. Joshi(2003)

1.2 HISTORY & THREADS OF FORENSIC ACCOUNTING

As a summarization, Economics as a field of study was the first to say Forensic accounting
a few centuries back. Forensic accountants have been around for about 200 years. The
soonest reference was found in 1824 in a bookkeeper's publicizing round in Glasgow,
Scotland. These exceptional accountants gave declaration in court and in assertion
procedures. Enthusiasm for Forensic accounting spread through the United States and
England ahead of schedule in the twentieth century. One of the principal foundations to
utilize the administrations of such investigative accountants was the IRS. The tale of Al
Capone the popular mobster being gotten on a duty avoidance plan is notable. The FBI
chose to utilize measurable accountants and utilized almost 500 such operators amid World
War II. As a calling, forensic accounting kept on developing amid the last 50% of the
century, as GAAP and expense laws got to be across the board and compulsory.

Forensic accounting (or possibly, accounting master seeing) can be followed as far back as
1817 to a Canadian court choice of Meyer v. Sefton. Therefore, the site of the Association
of Certified Forensic Investigators of Canada keeps up that the field of Forensic and
investigative accounting had its beginning in Canada. Seven years after the Canadian case,
on March 12, 1824, a youthful bookkeeper by the name of James McClelland began his
business in Glasgow, Scotland, and issued a round that publicized the different classes of
measurable sort work he was set up to embrace.

The following are a few major milestones in forensic accounting:–

• 1942: Maurice E. Peloubet distributed "Forensic Accounting: its place in today's


economy."
• 1982: Francis C. Dykman composed "Forensic Accounting: The Accountant as an Expert
Witness."
• 1986: The AICPA issued Practice Aid # 7, delineating six zones of case administrations
– harms, antitrust examination, accounting, valuation, general counselling and
investigations.
• 1988: Association of Certified Fraud Examiners set up
• 1988: another class of criminologist books where the Forensic bookkeeper was the star.
• 1992: The American College of Forensic Examiners was established.
• 1997: The American Board of Forensic Accountants was established
• 2000: The Journal of Forensic Accounting, Auditing, Fraud and Taxation were
established.
Sherlock Holmes, the simulated character made by Sir Arthur Conan Doyle is viewed as
the pioneer of Forensic accounting. Truth be told the idea of Forensic accounting is not
new in India. Kautilya, the main business analyst and Birbal, one of the nine pearls of King
Akbar have broadly talked about the extortion examination techniques.

1.3 CONCEPT OF FORENSIC ACCOUNTING

The principle point of forensic accounting is not just to see how an extortion was submitted,
however to report it with the most astounding conceivable precision. As indicated by
Gomide (2008), a great Forensic accounting consolidates accounting examination
furthermore requires great accounting and investigative aptitudes). In the talk, EFG
referred to that "it falls under general data or certain points, or subjects as it can be sorted,
general articulations that individuals make to portray the subject, as investigative
accounting, or even Forensic auditing".

Forensic accounting can be characterized as help with question in regards to assertions or


suspicion of extortion, which are liable to include case, master assurance, and enquiry by
a fitting power, and examinations of suspected misrepresentation, abnormality or
indecency which could possibly prompt common, criminal or disciplinary procedures. The
emphasis is basically on accounting issues, however the part of the forensic bookkeeper
may stretch out to more broad examination which incorporates proof social affair. It is a
result of the way that by definition, forensic assignments are identified with legal or semi
legal debate determination, that the Forensic specialist requires a fundamental
comprehension of the material statutory and customary law, the law of confirmation and
the law of methodology. The most skilfully led examination will be of no quality to the
customer ought to the confirmation accumulated be ruled to be forbidden or the master
accounting witness be found to miss the mark in appreciation of the necessities of ability,
believability, or autonomy.

1.4 DEFINITIONS OF FORENSIC ACCOUNTING

The definition of forensic accounting is changing in response to the growing needs of


corporations.

Bologna and Lindquist (1985) had defined forensic accounting as “the application of
financial skills, and an investigative mentality to unresolved issues, conducted within the
context of rules of evidence. As an emerging discipline, it encompasses financial expertise,
fraud knowledge, and a sound knowledge and understanding of business reality and the
working of the legal system.” This suggests the forensic accountants ought to be talented
in forensic accounting, as well as in interior control frameworks, the law, other institutional
prerequisites, investigative capability, and interpersonal aptitudes.

According to AICPA (1993): “Forensic accounting is the application of accounting


principles, theories, and discipline to facts or hypotheses at issues in a legal dispute and
encompasses every branch of accounting knowledge.”

Forensic accounting is defined by Zia (2010) as: “The science that deals with the relation
and application of finance, accounting, tax and auditing knowledge to analyse, investigate,
inquire, test and examine matters in civil law, criminal law and jurisprudence in an attempt
to obtain the truth from which to render an expert opinion.”
The integration of accounting, auditing and investigative skills results in the special field
known as forensic accounting. Crumbley (2005).

Forensic accounting is performed for an assortment of customers however in all cases it is


to find the concealed story behind a presentation of an arrangement of records. Forensic
accountants can wind up finding extortion or, regardless of the fact that not illicit, a
deception of a budgetary circumstance. Forensic accounting aptitudes are utilized to settle
shareholder and association question, marital debate, protection claims. Forensic
accountants are likewise utilized as a part of misrepresentation examinations. ( Financial
Times Laxicon)

The integration of accounting, auditing and investigative skills yields a specialty known as
Forensic Accounting”. With respect to the scope of forensic accounting “Forensic
Accounting provides an accounting analysis that is suitable to the court which will form
the basis for discussion, debate and ultimately dispute resolution” Zysman A.(2009).

As per Webster Dictionary, Forensic Accounting “Belonging to, used in or suitable to


courts of judicature or to public discussion and debate”.

I figure by measurable accounting you comprehend accounting aptitude requested inside a


claim, either by the judge, prosecutor, open lawyer (criminal law) or by parts.I figure the
general purpose of such aptitude is to give an exact response to an inquiry inside the claim.
Review and Forensic accounting are as I would like to think two unique things. Review
ought to give sensible confirmation, while measurable accounting ought to give precise
proof. Kleeyman, Y(2006)

1.5 NEED OF FORENSIC ACCOUNTING

Forensic accounting identifies with the use of accounting ideas and systems to lawful
issues. Measurable accountants for the most part research and archive money related
extortion and cushy wrongdoings. The result of the measurable examination, including
appraisals of misfortunes, harms, and resources would be utilized as prosecution backing
to lawyers and law requirement staff. Forensic accounting offers imperative help for
legitimate cases in numerous regions of the law, for example, securities exchange controls,
value altering plans, item risk, shareholder debate, and breaks of agreement.

Forensic accounting, forensic auditing or financial forensics is the forte practice range of
accounting that depicts engagements that outcome from genuine or expected debate or suit.
"Forensic" signifies "appropriate for use in a courtroom", and it is to that standard and
potential result that legal accountants for the most part need to work. Forensic accountants,
additionally alluded to as Forensic examiners or investigative evaluators, frequently need
to give master proof at the inevitable trial. Crumbley, D. Larry; Heitger, Lester E.; Smith,
G. Stevenson (2005) All of the bigger accounting firms, and also numerous medium-sized
and boutique firms, and different Police and Government organizations have pro Forensic
accounting divisions. Inside these gatherings, there might be further sub-specializations:
some Forensic accountants may, for instance, simply represent considerable authority in
protection claims, individual harm claims, extortion, development. Cicchella, Denise
(2005). Alternately sovereignty reviews. Parr, Russell L.; Smith, Gordon V. (2010).

"While Forensic Accountants ("FAs") typically don't give assessments, the work
performed and reports issued will frequently give answers to the how, where, what, why
and who. The FAs have and are keeping on advancing as far as using innovation to help
with engagements to distinguish oddities and irregularities. Remember that it is not the
Forensic Accountants that decide misrepresentation, but rather the court." Bhasin
Madan(2007).

Forensic accountants have been depicted as experienced evaluators, accountants and


specialists of legitimate and money related reports that are employed to investigate
conceivable suspicions of false movement inside an organization; or are procured by an
organization who may simply need to keep deceitful exercises from happening. They
likewise give administrations in zones, for example, accounting, antitrust, harms,
investigation, valuation, and general counseling. Forensic accountants have likewise been
utilized as a part of separations, protection claims, individual damage claims, fake cases,
development, sovereignty reviews, and following psychological warfare by exploring
monetary records. Numerous forensic accountants work intimately with law requirement
faculty and legal counselors amid examinations and frequently show up as master
observers amid trials. Forensic Accounting is an amalgam of forensic science and
accounting. Despite the fact that the instituting of the term Forensic Accounting is said to
go back to 1946, the practice is moderately new in Nigeria. Hopewood, A.G.(2009). The
requirement for forensic accountant has been attributed to the way that the review
framework in an association had neglected to recognize certain mistakes in the
administrative framework.

Forensic Accounting is examination accounting which includes breaking down, testing,


asking and looking at the common and criminal matters lastly giving an impartial and
genuine report. Pretty much as forensic examinations and lab reports are required in the
court to understand the homicide and dacoit puzzles, correspondingly forensic accounting
assumes a key part in following the financial fraud and clerical wrongdoings. Be that as it
may, forensic accounting covers an extensive variety of operations of which
misrepresentation examination is a little part where it is generally predominant.

There are two noteworthy angles inside legal accounting hone; prosecution benefits that
perceive the part of a Chartered Accountant as a specialist or expert and investigative
administrations that make utilization of the Chartered Accountant's abilities, which could
possibly prompt court declaration.

1.6 PRACTICE OF FORENSIC ACCOUNTING

Arnoff, Norman B., and Sue C. Jacobs. (2001) had clarified the administrations rendered
by the forensic accountants are in incredible interest in the accompanying territories:

1.6.1 Fraud detection where employees commit Fraud


Where the employee enjoys fake exercises: Where the representatives are gotten to have
submitted misrepresentation the forensic accountant tries to find any benefits made by them
out of the assets defalcated, then take a stab at questioning them and attempting to discover
the concealed truth.
1.6.2 Criminal Investigation
Matters identifying with money related ramifications the administrations of the forensic
accountants are benefited of. The report of the accountants is considered in get ready and
presentation as proof.

1.6.3 Outgoing Partner's settlement


In the event that the active accomplice is not upbeat about his settlement he can utilize a
forensic accountant who will accurately evaluate his contribution (resources) and also his
liabilities effectively.

1.6.4 Cases relating to professional negligence

Proficient carelessness cases are taken up by the forensic accountants. Non-adaptation to


Generally Accepted Accounting Principles (GAAP) or rebelliousness to examining hones
or moral codes of any calling they are expected to gauge the misfortune because of such
expert carelessness or deficiency in administrations.

1.6.4 Arbitration service


Forensic accountants render assertion and intercession administrations for the business
group, since they experience extraordinary preparing in the region of option question
determination.

1.6.5 Facilitating settlement regarding motor vehicle accident


As the forensic accountant is very much familiar with complexities of laws identifying with
engine vehicles, and other applicable laws in power, his administrations get to be vital in
measuring monetary misfortune when a vehicle meets with a mishap.

1.6.6 Settlement of insurance claims

Insurance agencies connect with forensic accountants to have a precise evaluation of cases
to be settled. Also, policyholders look for the assistance of a legal accountant when they
have to challenge the case settlement as worked out by the insurance agencies. A legal
accountant handles the cases identifying with significant misfortune arrangement, property
misfortune because of different dangers, devotion protection and different sorts of
protection cases.

1.6.7 Dispute settlement


Business firms connect with legal accountants to handle contract debate, development
claims, item risk cases, and encroachment of patent and trademarks cases, obligation
emerging from break of agreements et cetera.

1.6.8 Matrimonial dispute cases


Forensic accountants engage cases relating to matrimonial disputes wherein their part is
simply restricted to following, finding and assessing any type of advantage included.

Aside from learning of accounting, law and criminology, a forensic accountant likewise
should be acquainted with corporate financial management and administration. He
additionally needs PC aptitudes, great correspondence and meeting abilities.

1.7 TYPES OF FRAUD

Extortion is theft of assets as well as an endeavor to cover it. Misappropriation of


advantages without an endeavor to cover is just a theft, which is typically revealed rapidly
through ordinary balanced governance techniques. Camouflage recognizes extortion from
theft. As culprits endeavor to disguise extortion, they may keep on engaging in comparative
misappropriations over an expanded timeframe. A fraud regularly happens once in light of
the fact that the casualty gets to be equipped with the learning of that theft and avoids
potential risk to dissuade future events; the casualty of a cheat, then again, is typically
uninformed of the misfortune, and consequently the culprit can over and over carry out the
wrongdoing. In that sense, misrepresentation is only repeating theft on the comparable sort
of casualty by the same culprit. In the example of corporate extortion, there is a sole
casualty, the association, and typically there are different events of fraud that effect that
organization. The fraud significantly can be of four types. i.e. Management fraud,
Employee fraud, Embezzlement by management & cybercrime. Kuchta (2001).
Management
Fraud
Schemes

Types Employee
Cyber-crime of Fraud
Schemes
Frauds

Embezzlement
by
Management

Figure 1.1: Types of Frauds

1.7.1 Management Fraud Schemes

Management fraud, as the name proposes, is executed by the top management of an


organization who has the goal of deluding financial specialists. The most well-known
structure is through accounting control, which tangibly misquotes the monetary
proclamations of the organization. The inspiration driving the extortion is for the most part
to keep up a high stock cost and consequently bring down the expense of capital for the
organization.

A standout amongst the most widely recognized approaches to blow up profit is by


essentially exaggerating or misclassifying income. There are some notable false plans that
have been utilized to expand income, for example

 Bill and hold sale: In such plans the organization charges the client for the sale,
subsequently making a discernment that a honest to goodness sale was made, however
it never dispatches the merchandise. Rather in the accompanying accounting time
frame it essentially inverts the sale, reporting that there was a client return. Booking
fictitious sales.

 Holding books open toward the end of the period: Through this technique the
following time frame's deals are recorded in the present time frame, consequently
blowing up the income of the present time frame while downplaying income in the
resulting time frame. This plan was utilized by Computer Associates.

 Delaying reporting of client returns: At the point when clients return stock, the income
at first perceived from those sales must be turned around. By postponing the reporting
of profits to the following time frame, management viably reports higher income in
the present time frame.

The exaggerating of revenue would much of the time likewise exaggerate accounts
receivables and subsequently would likewise exaggerate resources.

The exaggeration of revenue may not generally be adequate to blow up pay to the sought
level; thus management may utilize a mix of downplaying costs alongside overstated
income. The regular plans to downplay costs incorporate

 The modest representation of the truth of expense of products sold by cushioning


stock. At the point when an irregular inventory accounting technique is utilized, the
expense of merchandise sold is by implication dictated by measuring finishing
stock. Stock is exaggerated, creating a decrease in the expense of merchandise sold
cost.
 Capitalization of expenses so as to reduce the costs. At the point when expenses
are promoted, the subsequent cost is spread over different years as opposed to
reporting every last bit of it in the present year. Capitalizing costs that ought to be
expensed brings about the modest representation of the truth of costs in current
year, prompting an exaggeration of pay. The promoted expenses are reflected as
resources, thus additionally overstated all resources on the asset report. This plan
was utilized as a part of the WorldCom fraud and is examined in a resulting
segment.
 Extending the depreciable existences of assets, by reducing depreciation expenses..
As depreciation cost is connected to the management's estimation of the useful life
of the asset, overestimating the lives of assets reduces the depreciation expense,
resulting in an overstatement of income. This plan was utilized by Waste
Management.
 Understating expenses additionally prompts exaggeration of assets or
understatement of liabilities. At the point when expenses are capitalized and not
expensed, it prompts higher assets. At the point when accrued expenses are not
recorded, it leads to an understatement of liability.
 Balance sheet fraud is committed with the aim of reporting lower liabilities and
debt than the organization really bears. This is frequently refined using off-Balance
sheet financing.

Fraud at WorldCom

WorldCom was blamed for having inflated profits by $3.8 billion over a time of five
quarters. The organization attempted the gigantic fraud by underwriting costs that ought to
have been expensed. Capitalization of these expenses permitted the organization to spread
the costs more than quite a long while as opposed to recording every one of the expenses
as cost in the current year. Such deferral of costs permitted the organization to report lower
costs and along these lines inflated income.

From 1998 to 2000 WorldCom reduced reserve accounts held to cover the liabilities of
procured organizations bringing about $2.8 billion in extra income. They misclassified
costs and checked working expenses as long term investments. There were undocumented
computer costs of $500 million, which were dealt with assets. The fraud was revealed by
the internal auditors in July 2002; before long WorldCom petitioned for bankruptcy. Swartz
(2007)

Fraud at HealthSouth

HealthSouth, a traded on an open market organization headquartered in Birmingham,


Alabama, with 1,600 areas spread over each of the 50 states and three different nations,
was by numerous records the main organization to be indicted under the arrangements of
the Sarbanes-Oxley Act of 2002. Its previous CEO, CFO, and other senior officers
deceitfully swelled the organization's income to meet Wall Street's income desires. The
fraudstarted in mid-1996 and spread over for around seven years, amid which time their
actual income was $1.7 billion or around 40% of what the organization had reported. The
SEC charged the senior officers in March 2003 for intentionally adulterating Accounting
records and outlining fictitious entry to overstate cash by $300 million and inflated total
assets by at any rate $800 million. Jones (2008)

Proof displayed at the trials demonstrated that offices claimed by HealthSouth submitted
honest to goodness budgetary reports to the central command in Birmingham. Nonetheless,
at the corporate office those numbers were inflated at the time the consolidated financials
were prepared. A fictitious account called contractual adjustments was created to book
fake revenue numbers Moreover, the organization neglected to appropriately record the
offer of innovation to a related organization, bringing about a $29 million fraud.
Additionally HealthSouth twice recorded sale of 1.7 million shares of stock in another
organization, netting a $16 million increase. Analysts additionally discovered fictitious
assets near $2 billion.

Accounting Practices at Lehman

Owojori, A.A (2009)In September 2008, Lehman turned into the biggest organization in
U.S. history to petition for chapter 11. Nine months prior, Lehman had reported record
revenue and earnings for 2007. In mid 2008, Lehman's stock was trading the mid-sixties
with a market capitalization of more than $30 billion. Throughout the following eight
months, Lehman's stock lost 95% of its quality and was trading around $4 by September
12, 2008. In March 2010, Lehman's Bankruptcy Examiner, Anton Valukas, issued a 2,200-
page report that sketched out the purposes behind the Lehman insolvency.

1.7.2 Employee Fraud Schemes

The Association of Certified Fraud Examiners directed a significant study to order word
related fraud cases. The late release distributed in 2010 displayed upgraded distinct
measurements on the event, harms, thus on occupational fraud. The plans talked about in
this area are the regular plans reported in that study. The accompanying segments show a
brief depiction of the normal fraud plans and approaches to recognize and hinder
them.Wallace (2001)

Skimming
Employee Fraud Schemes
Lapping or
Fraudulent Write-offs

Use of a Shell
Company

Inventory Shrinkage

Ghost Employees

Figure1.2 :Employee fraud schemes

1.7.2.1Skimming

Organizations that participate in cash transactions are powerless against skimming by their
employees. Skimming includes theft of cash, generated usually from sales, prior to its entry
into the accounting records. Skimming is a moderately normal event in expert practices
where expenses are gathered in actual cash. The cashier responsible for collection might
pocket the cash and not enter the transaction into the accounting records or subsequently
delete those records after being entered into the system. Medicinal practices are especially
powerless against this kind of fraud, as little measures of co-instalments are gathered in
actual cash, and the patients are not that specific about acquiring receipts as there isn't an
open door for a discount. Founding legitimate internal control frameworks that command
offering receipts to the clients or introducing observation gear can relieve the danger of
fraud brought about by skimming.

1.7.2.2 Lapping or Fraudulent Write-offs

Another basic type of skimming is embraced via mail room workers who are in charge of
receiving payments and can in this manner skim the checks got. That is, rather than storing
the checks in the organization record and logging the installment into the accounting
framework, the representatives would store registers with their records and take the assets.
This sort of plan requires a concealment or distortion of records. Without a concealment
the plan is disentangled immediately when the organization sends a second bill and the
customer furnishes a cancelled check as proof of payment. Thus culprits of such
wrongdoings additionally need to hide the burglary of the checks. Two basic approaches
to hide the robbery are lapping and wrong write offs. In a lapping plan, one client's
installment is posted on another client's account.For instance, accept the culprit stole Mr.
Smith's installment; next, when Mr. Jones makes his installment, it is connected to Mr.
Smith's record, and later when Mr. Wells makes an installment, it is connected to Mr. Jones'
record, et cetera. Consequently, when the culprit laps clients' records, he more than once
changes bookkeeping records, despite the fact that the robbery of assets happened just at
the beginning.

The fake discount of a client's record is another approach to convey the record a la mode
without the association getting the installment. As noted before, the client is going to gripe
in the wake of accepting a second bill for the sum he or she has effectively paid. This can
incite inward examination of the missing assets. To keep clients' protestations, the culprit
of the wrongdoing needs to keep the second bill from being sent to the client. The client
won't be charged by the association if the record is composed off. The culprit would
accordingly attempt to discount the client record and take the assets that the client sent as
installment. Along these lines the assets are stolen, the client isn't charged over and again,
and the bookkeeping records equalization. Since most substantial associations isolate the
obligations of accepting money, keeping up records receivables records, and approving
discounts, conspiracy between representatives needs to happen for this plan to be effective.
With the expanded notoriety of online installments, skimming of receivables is a reducing
risk in most cutting edge associations. Be that as it may, for associations as yet utilizing
customary strategies for accepting installment by checks or money, establishment of
legitimate inner controls can forestall or prompt early recognition of such plans. In
resulting reviews, distinguishing bizarre examples on client records could likewise unwind
such plans.

1.7.2.3 Use of a Shell Company

Abnormal state workers inside an association with power over payment may make shell
organizations that they control. These shell organizations then bill the association for
invented merchandise and administrations. The culprit more often than not is in a position
to support charges or has power over work force who favor installments in the interest of
the association. As the installment is made to the shell organization, the culprit has
adequately stolen stores from the association.

False shell organizations regularly will utilize a P.O. box or private location as a work
locale. In some cases the proprietor of the shell organization could be the mate or other
close relative of the culprit, and their names or delivers could be utilized to set up the shell
organization. Regularly the charging archives from these shell organizations do not have
the realness of honest to goodness organizations. For instance, utilization of a shell
organization was found when a secretary saw that the road location of a merchant was the
place of residence of her boss. In another example, extortion was uncovered when it was
watched that solicitations from a seller that were months separated were consecutively
numbered. The suggestion consequently was that the casualty association was the main
client for this seller. On further examination, the invented seller was uncovered.

Shell organizations can now and again offer real products to the organization yet at an
expanded cost. The shell organization buys the merchandise required by the association
from honest to goodness merchants and afterward exchanges to the association at a swelled
cost. The individual(s) who possess the shell organization take the distinction. Such plans
are known as go through plans.
1.7.2.4 Ghost Employees

A typical deceitful plan including finance is for Human Resource chiefs or Payroll
supervisors to make ghost workers. The apparition worker, while on the finance of the
organization, gathers compensation intermittently however does not really work for the
organization. This could be an invented individual or a relative of the culprit. By method
for distorting faculty and finance records, an apparition representative is added to the
finance and thus gathers month to month compensation. The potential misfortune to the
casualty association of a phantom worker plan could be colossal because of the repeating
way of the robbery. After the culprit has effectively made an apparition worker in the
finance framework, the standard procedure of issuing pay checks guarantees a constant
flow of assets to the culprit. At the point when effectively initiated, not at all like the plans
of a shell organization or skimming, the culprit of an apparition representative plan does
not need to take part in any further upkeep of the false plan. As there are no repeating
activities with respect to the culprit, the information demonstrates no surprising examples.

1.7.2.5 Inventory Shrinkage

At the point when stock is sold and the comparing deal is not recorded (as in skimming
talked about before) or when stock is stolen, the culprit needs to revise the unaccounted
diminish in stock parity. Stock shrinkage is the decrease in the stock funds receivable to
burglary or waste. Exploring the reasons for stock shrinkage can disentangle
misrepresentation plans. Albeit some measure of stock shrinkage is standard and expected
in the ordinary course of business, unusual shrinkage or an example of shrinkage are
warnings. Ordinary stock shrinkage, an irregular occasion, ought to influence all things of
the stock and not only a specific thing. In addition, there ought not be any noticeable
example or pattern of stock shrinkage. Such examples and patterns, if distinguished
through factual methods, require further examination.

Reporting stock shrinkage can be troublesome for some associations because of their
bookkeeping frameworks for stock. There are two normal strategies to represent stock: the
interminable framework and the occasional framework. In the never-ending technique,
each move in and offer of stock is recorded. Then again, in the intermittent strategy, the
stock parity is evaluated or processed at occasional interims. Generally stand out of the two
stock frameworks is utilized as a part of an association. To viably identify stock shrinkage,
a ceaseless framework must be executed to keep up running sums of the stock that can be
confirmed intermittently through physical perception. Disparities between the two
equalizations show the measure of stock shrinkage.

Stock shrinkage, notwithstanding when painstakingly covered, can be recognized by


looking at gross edge rates crosswise over different stores. The area that is taking stock and
reporting it as either sold or ruined would have a curiously bring down gross edge rate with
respect to different stores. Moreover, directing a pattern investigation over various periods
would prompt early discovery of changes in examples because of stock robbery. Factual
techniques, talked about later in the book, can be utilized to direct such examination.

1.7.3 Embezzlement by Management

Three senior officers at Tyco International were indicted stealing a huge number of dollars
from the organization. The CEO and two other top authorities controlled two corporate
credit projects to acquire assets to support their sumptuous ways of life and to give
themselves unapproved rewards. In this manner, so as to cover their burglary, they would
pardon each other's advances and along these lines take the assets from the organization.

The formal charges documented against the officers by prosecutors were for taking $170
million in organization advances and different finances and acquiring more than $430
million through the deceitful offers of securities. The SEC documented a different yet
related charge for their neglecting to unveil the multi-million dollar low premium or
premium free advances they took from the organization and sometimes never reimbursed.
It accused the officers of "regarding Tyco as their private bank, taking out a huge number
of dollars of credits and remuneration while never telling investors."Sigieton Green, B.
(1991)

1.7.4 Cyber-crime
Lamoreaux (2007)In a discourse conveyed at the American Institute of Certified Public
Accountants National Conference on Fraud and Litigation Services in 2007, an Associate
Deputy Director of the FBI, Mr.Joseph Ford best portrayed the expanded danger of money
related violations in the time of globalization and the Internet. He portrayed the Internet
"as much a channel for wrongdoing as it is for business." While opening up new parkways
of wrongdoing in PC hacking, the Internet encourages an extensive variety of customary
offenders that incorporate mobsters, drug traffickers, corporate fraudsters, spies, and
psychological oppressors.

The basic test that digital wrongdoing forces is that not at all like customary wrongdoing,
the physical nearness of the criminal at the scene of the wrongdoing is a bit much. In the
customary days of bank theft, the burglar must be available at the heist and went for broke
of being gotten and dragged away in binds. Be that as it may, in the age of the Internet, a
bank criminal could perpetrate a wrongdoing of much more noteworthy extent without ever
notwithstanding setting foot in the bank. They as a rule work from remote areas, under the
umbrella of lawful security gave by an alternate ward than where the wrongdoing is being
dedicated. These offenders abuse the shortcomings in inside controls to carry out their
violations. The danger they face is that their arrangements may be frustrated, however
typically the distinguishing proof, arraignment, or imprisonment of such lawbreakers is
muddled because of the association of numerous wards. As indicated by the FBI, a huge
rate of digital violations begin in Romania, yet the casualties are in the United States or in
other western countries. These hoodlums, previously utilized by the now ancient
knowledge device of Romania, have focused on cash transmission organizations.
Moreover, one sort of securities extortion, known as a "pump and dump" plan, has been
followed back to crooks in Latvia and Estonia who hack into records of online business
organizations. Despite the fact that these violations begin and are conferred abroad, the
outcomes are felt in the United States and unfavorably affect U.S. financial specialists.

Subsequently, the critical risk experienced by banks and other budgetary establishments is
no more that of an outfitted thief taking part in a heist, however that of a digital criminal
sitting in the solace of his home at a remote area. The weapon of decision for such
hoodlums is not a gun as utilized as a part of customary bank burglaries, yet a couple of
keystrokes on their PCs. Thus, the examination of proof of such wrongdoing doesn't require
assessment of fingerprints or ballistics specialists. They require a monetary examination of
the cash trail and henceforth the ability of bookkeepers.

1.7 FORENSIC ACCOUNTING AS PREVENTION

As respects a suitable reaction to misrepresentation which has been distinguished, each


foundation requires an incorporated corporate methodology. An irreverent business
environment defiles genuine representatives. The economy can't manage the cost of
business to wind up a facilitator for wrongdoing and unscrupulousness, simply in light of
the fact that it has ended up helpful not to convey guilty parties to equity. In building up a
fitting misrepresentation reaction arrangement, it is crucial that a foundation considers the
accompanying strides:

What are the association's real hazard ranges and what is its arrangement position
on culprits of misrepresentation?
To whom is the duty regarding dealing with the reaction apportioned?
What is the level of extortion mindfulness inside an association?
Are controls powerful?
Are clients or exchanging accomplices mindful of the organization's strategy on
misrepresentation?
Do representatives comprehend the organization's state of mind to
misrepresentation and contemptibility?
Can representatives report misrepresentation secretly?
Are enrollment hones perfect with a legit workforce?
Do disciplinary procedures apportion equity fairly and all the more vitally, are the
seen to do as such?

1.9 THE TECHNIQUES OF PREVENTION OF FRAUD (FORENSIC


ACCOUNTING):
The customary bookkeeping and evaluating with the assistance of various bookkeeping
devices like proportion procedure, income strategy, a standard measurable device
examination of proofs are all a player in legal bookkeeping. In cases including critical
measures of information, the present-day legal bookkeeper has innovation accessible to
acquire or source information, sort and investigate information and even evaluate and
stratify comes about through PC review and different strategies. Smith (2005),
Gavish(2007), Dixon (2005), Frost (2004), Cameron (2001) had suggested some of the
methods required in Forensic Accounting to inspect the cheats are:

1.9.1 Benford’s Law:

In 2000, Mark Nigrini distributed a critical book called "Advanced AnalysisUsing


Benford's Law" .Nigrini (2000). In spite of the fact that Benford's Law is presently
exceptionally old and was examined in extortion writing. Slope (1995); Busta (1998);
Nigrini(1999) before the book, Nigrini's work acquainted the procedure with the substantial
group of onlookers of reviewers.

It is a numerical instrument, and is one of the different approaches to figure out if variable
under study is an instance of inadvertent blunders (missteps) or extortion. On
distinguishing any such marvel, the variable under study is subjected to a definite
examination. The law expresses that manufactured figures (as marker of extortion) have an
alternate example from irregular figures. The means of Benford's law are extremely basic.
Once the variable or field of budgetary significance is chosen, the left most digit of variable
under study separated and compressed for whole populace. The rundown is finished by
grouping the main digit field and ascertaining its watched check rate. At that point
Benford's set is connected. A parametric test called the Z-test is completed to gauge the
criticalness of fluctuation between the two populaces, i.e. Benford's rate numbers for first
digit and watched rate of first digit for a specific level of certainty. On the off chance that
the information affirms to the rate of Benford's law, it implies that the information is
Benford's set, i.e. there is68% (right around 2/third) risk of no blunder or extortion. The
principal digit may not generally be the main pertinent field.
Benford has given separate sets for second, 3rdand for last digit also. It likewise works for
blend numbers, decimal numbers and adjusted numbers. There are numerous preferences
of Benford's Law like it is not influenced by scale invariance, and is of help when there is
no supporting archive to demonstrate the legitimacy of the exchanges.

1.9.2 Theory of Relative Size Factor (RSF):

It highlights every strange variance, which might be steered from misrepresentation or


certified blunders. RSF is measured as the proportion of the biggest number to the second
biggest number of the given set. Practically speaking there exist certain cutoff points (e.g.
budgetary) for every element, for example, merchant, client, worker, and so on. These
points of confinement might be characterized or investigated from the accessible
information if not characterized. On the off chance that there is any stray occasion of that
is route past the typical extent, then there is a need to examine further into it. It helps in
better discovery of peculiarities or outliners. In records that fall outside the endorsed extent
are associated with blunders or extortion. These records or fields need to identify with
different variables or components so as to discover the relationship, consequently setting
up reality. Waldrup, et. al. (2004)

1.9.3 Computer Assisted Auditing Tools (CAATs):

CAATs are PC programs that the reviewer use as a major aspect of the review methods to
process information of review criticalness contained in a customer's data frameworks,
without relying upon him. CAAT helps reviewers to perform different evaluating
methodology, for example, (a) Testing points of interest of exchanges and adjusts, (b)
distinguishing irregularities or huge changes, (c)Testing general and application control of
PC frameworks. (d) Sampling projects to concentrate information for review testing, and
(e) Redoing figuring performed by bookkeeping frameworks. Smith (2005).

1.9.4 Data mining techniques:


Black (2002); Paletta (2005); Lovett (1955) It is an arrangement of helped strategies
intended to consequently mine substantial volumes of information for new, covered up or
unforeseen data or examples. Information mining procedures are arranged in three ways:
Discovery, Predictive displaying and Deviation and Link examination. It finds the typical
learning or examples in information, without a predefined thought or theory about what the
example might be, i.e. with no earlier information of fraud. It clarifies different affinities,
affiliation, patterns and varieties as contingent rationale. In prescient displaying, designs
found from the database are utilized to foresee the result and to figure information for new
esteem things. In Deviation examination the standard is discovered initially, and after that
those things are recognized that go amiss from the typical inside an offered edge (to
discover abnormalities by removed examples). Join disclosure has risen as of late to detect
a suspicious example. It for the most part uses deterministic graphical strategies, Bayesian
probabilistic easy going systems. This technique includes "design coordinating"
calculation to "concentrate" any uncommon or suspicious cases.

1.9.5 Ratio Analysis:

Another helpful fraud recognition procedure is the figuring of information investigation


proportions for key numeric fields. Like money related proportions that give signs of the
monetary soundness of an organization, information investigation proportions report on the
extortion wellbeing by distinguishing conceivable side effects of fraud. According to the
perspectives by Albrecht, et. Al (2009) three generally utilized proportions are:

1. The proportion of the most noteworthy quality to the least esteem (max/min);
2. The proportion of the most astounding quality to the second most noteworthy worth
(max/max2); and
3. The proportion of the present year to the earlier year

Utilizing proportion investigation, a money related master concentrates on connections


between indicated expenses and some measure of creation, for example, units sold, dollars
of offers or direct work hours. For instance, to touch base at overhead expenses per direct
work hour – Total overhead expenses may be isolated by aggregate direct work hours.
Proportion investigation may help a forensic accountants to gauge costs.
1.10 SKILLS REQUIRED FOR THE FORENSIC ACCOUNTANT

A few studies have tried to narrative the aptitudes which a Forensic Accountant ought to
have in his kitty to be compelling and stay important. In one study, the accompanying
discoveries were made. The commercial center requires the Forensic Accountant to have
an alternate aptitude set from the conventional Accountant.

More than 60% of the respondents positioned investigative aptitudes, regard for points of
interest and moral introduction as vital for accomplishment as a Forensic Accountant.

According to the study by Davis, Ramona, and Ogliby (2009), Certified Public
Accountants (CPA's), Academicians and Attorneys (speaking to clients). Each of the three
gatherings concurred that scientific aptitudes were the most fundamental. Different
aptitudes recognized by the three gatherings, however not positioned the same, incorporate
successful oral correspondence, capacity to streamline data, examining abilities,
investigative instinct, capacity to distinguish key issues and significant capabilities.

As reviewed by DiGabriele (2007) in a related exploration that studied Forensic


Accounting Practitioners, Accounting professionals and lawyers, the accompanying
abilities were recognized in spite of the fact that observations contrasted among gatherings
with regards to the distinctive rankings of the aptitude sets:

 Deductive Analysis
 Critical Thinking
 Unstructured problem solving
 Investigative flexibility
 Analytical proficiency
 Oral communication
 Written Communication
 Specific legal knowledge and
 Composure
A comparative study in Nigeria which likewise pooled Accounting experts, Academicians
and clients of accounting data touched base at comparative conclusions on the ability set
that will put the Forensic Accountant in great stead .Okoye& Yohanna(2010).

A study by Crawford(2010); Kleeyman (2006); Wells(2003); Zia(2010), the expertise sets


required for Forensic Accountant are Persistence and firmness, Knowledge aptitudes in
criminology, Computer abilities, Confidence Curiosity, Creativity, Discretion, Prudence,
Secrecy, Honesty and Personal strength.

1.11 DIFFERENCE BETWEEN EXTERNAL AUDITOR AND FORENSIC


AUDITOR

Outside Audit is obligatory by organization Act-1956 for each organization. The principle
object of review is to discover in the wake of experiencing the books of records, whether
the Balance Sheet and Profit and Loss A/c are appropriately attracted up as per
organization's Act and whether they speak to genuine and reasonable perspective of the
situation of the worry. However, scientific examining is another idea of examination. It
includes investigating, testing, request and inspecting the common and criminal matters
lastly giving an unprejudiced and genuine report.

Table 1.1: Difference between External Auditor & Forensic Auditor

External Auditor Forensic Auditor

External Auditor is an examination of The forensic Accountant is a bloodhound


books of accounts and other records such of Accounting. These bloodhounds find
as documents, vouchers etc. which out fraud and criminal transactions in bank,
confirms or support the correctness of the corporate entity or from any other
entries in the books of a business or organization’s financial records. They
concern to enable an auditor to satisfy hound for the conclusive evidences.
himself as to whether the P & L A/c and
Balance Sheet exhibit a true and fair view
of state of affairs of the concerns.
External Auditors find out the deliberate The Forensic Accountants find out the
misstatements only. misstatements deliberately.

External auditors look at the numbers. The forensic auditors look beyond the
numbers.

1.12 WHY IS FORENSIC ACCOUNTING SO POPULAR?

As indicated by a few specialists, this expanded premium is a direct result of the battling
securities exchange and absence of speculator certainty which has constrained numerous
associations to take a long, hard take a gander at their budgetary articulations. A drowsy
economy with its orderly issues may likewise be an impetus to submit false acts,
accordingly requiring the administrations of a specialist. The expansion in office
wrongdoing and the challenges confronted by law requirement organizations in revealing
fraud have additionally added to the development of the calling. Numerous accounting
firms trust that the business sector is adequately huge to bolster an autonomous unit
committed entirely to scientific accounting. Whatever the thinking might be, increasingly
measurable accountant are being called upon to utilize their investigative aptitudes to
search out anomalies in their organizations' monetary proclamations.

1.13 FORENSIC ACCOUNTING IMPLEMENTATION IN INDIA:

In India, Forensic Accounting lacks its due acknowledgment even subsequent to disturbing
increment in the complex budgetary wrongdoings and absence of satisfactorily prepared
experts to research and provide details regarding the complex money related violations.
The assignment of Forensic Accountants is taken care of by Chartered Accountants who
separated from taking care of customary routine of examining as required under the
Companies Act, 1956 or Income Tax Act are called upon by the law implementation offices
or the organizations or private people to help with exploring the monetary wrongdoing or
trick. The CA or CWAs in India are most appropriate for this calling because of their
budgetary sharpness obtained amid their thorough preparing which can be further
sharpened by presenting post capability degree or confirmation in Investigating and
Forensic Accounting like one presented by CICA. The CA or CWA who get post capability
in Investigative and Forensic Accounting can utilize the assignment CA-IFA or CWA-IFA
and be lawfully perceived as the Forensic Accounting Experts to handle the examination
of money related violations and give master declaration in the Court of Law. In any case,
no endeavors has so far been made by the ICAI and ICWAI, the two driving statutory
accounting proficient bodies to move in this heading and set up a foundation which can
offer the post capability recognition in Investigative and Forensic Accounting to its
individuals. Nonetheless, developing budgetary fraud cases, late stock marker tricks,
disappointment of non-money related keeping money organizations, marvels of vanishing
organizations and estate organizations and disappointment of the administrative system to
check it has constrained the Government of India to shape Serious Fraud Investigation
Office (SFIO) under Ministry of Corporate Affairs which can be respected the initial step
of Government of India to perceive the significance and development the calling of forensic
accountant. The SFIO is a multidisciplinary association having specialists from budgetary
division, capital business sector, accounting, legal review, tax assessment, law, data
innovation, organization law, traditions and examination. These specialists have been taken
from different associations like banks, Securities and Exchange Board of India,
Comptroller and Auditor General and concerned associations and bureaus of the
Government. In any case, the fundamental essential law requirement office included
straightforwardly in fighting fakes is the Police, CBI, DRI and so forth.

1.14 CONCLUSION

The scandalous tricks of Harshad Mehta, Ketan Parekh, Sanjay Seth and the late India bulls
trick still new in our brains. Whether it is securities exchange extortion or bank fraud or
digital fraud, scientific accounting has turned into an imperative instrument for
examination. With India being positioned as the 88th most degenerate country, the
requirement for measurable accountant turns into all the more significant.

As it were, scientific accountant. are considered as experienced evaluators, accountant and


reviewers of lawful and money related records who are utilized to explore false movement
and avoid it. They additionally give a few administrations in accounting, harms,
examination.

They additionally attempt to give administrations in a few fields, for example, accounting
harms, Valuation and general discussion. Scientific accountants have basic part in
Insurance plan, extortion claims, development, Auditing of distribution rights and
recognizing fear mongering by utilizing budgetary articulations.
1.15 CHAPTER REFERENCES

AICPA (1993). Professional Standards, American Institute of Certified Public


Accountants. New York, USA.

Albrecht, W. S., Albrecht, C. C., Albrecht, C. O., & Zimbelman, M. (2009). Fraud

Examination (3). South Western Cengage Learning.

Arnoff, Norman B., and Sue C. Jacobs. 2001. "Forensic Accountant's Role as Expert Bef
ore and During Trial." New York lawjournal 226 (August 17): 3.

AUS-402 (2002) Risk Assessments and Internal Controls.

Bhasin Madan, 2007, “Forensic Accounting: A New Paradigm for Niche Consulting”,
Journal of Chartered Accountant. PP 1000-1010.

Black, J. (2002). Public Records in Business Week Online.

Bologna, G. Jack, and Robert J. Lindquist. 1985. Fraud Auditing and Forensic Accountig.
2d ed. New York: Wiley.

Busta, B. (1998). Randy Weinberg. Using Benford's law and neural networks as a review
procedure, 13(6), 356366.

Cameron, P. (2001). You Can't Hide from Accruing. Law Technology News, 8(9).

Cicchella, Denise (2005). Construction audit guide: overview, monitoring, and auditing.
Altamonte Springs, FL: IIA Research Foundation. ISBN 0-89413-587-2.

Crawford, C. J. (2010). Can Forensic Accounting Provide The Tools To Restore


Confidence In The Financial Statement Reporting Process? Journal of Business and
Accounting, 3(1), 125-133.
Crumbley, D. Larry; Heitger, Lester E.; Smith, G. Stevenson, Forensic and Investigative
Accounting. CCH Group. ISBN 0-8080-1365-3.

Davis, C., Ramona, F., & Ogliby, S. (2009). Characteristics and Skills of the Forensic
Accountant (p. 277). US: AICPA.

Digabriele, J. A. (2007). Fishbowl the Forensic Accountant: Are There Differences in the
Views of the Relevant Skills of a Forensic Accountant Among Practitioners, Academics
andUsers of Forensic Accounting Services? Mont clair State University.

Dixon, P. D. (2005). An overview of computer forensics. IEEE Potentials, 24(5), 710.

Ernst & Young (2008), Corruption or compliance – weighing the costs. 10th fraud Survey.
Ernst & Young Global Limited.

Ezzamel, Xiao and Pan, (2007), Political ideology and accounting regulation in China.
Accounting, Organizations and Society 32, pp. 669-700.

Financial Times Laxicon - http://lexicon.ft.com/Term?term=forensic-accounting)

Frost, M. (2004). Finding Skeletons in Online Closets. Searcher, 12(6), 5460.

Gavish, A. (2007). The Hidden Costs of Computer Misconduct. Security.

Gomide, E. F. (2008), Forensic Accounting and prevention of fraud: Certain practical


cases. CONTROLLER'S Bulletin Vol. 8 Nº 2, (June) PP. 7- 45.

Hill, T. P. (1995). A Statistical Derivation of the Significant Digit Law. Statistical Science,
10, 354363.
Hopwood, A. G. (2009), Reflections and projections and many, many thanks. Accounting,
Organizations and Society. Vol. 34, Issue 8, Nov, pp. 887-894.

Jones, M. W. (2008). Does Google Have Its Geo Eye On You. . Electronic document

Joshi, M. S. (2003), “Definition of Forensic Accounting.

KPMG (2009), Fraud Survey 2009: Integrity Survey

Kleeyman, Y. (2006). A Course in Forensic Accounting. Pace, U.S.

Kuchta, K. J. (2001). Your Computer Forensic Toolkit. Information Systems Security.

Lamoreaux, M. (2007). Internal Auditor Used Computer Tool to Detect WorldCom Fraud.
Journal of Accountancy, 35

Lovett, R. W. (1955). Looking Around. Harvard Business Review.

Nigrini, M. J. (1999). I've Got Your Number. Journal of Accountancy.

Nigrini, M. J. (2000). Digital analysis using Benford's Law. Global Audit Publications.

Okoye, Emma I, &Yohanna, J. (2010). An Empirical Investigation of the Relevant Skills


of Forensic Accountants in Nigeria. Journal of Knowledge Management, 1(2)

Owojori, A.A (2009). The Role of Forensic Accounting in Solving the Vexed Problem of
Corporate World. European Journal of Scientific Research, Vol.29 No.2 (2009), pp.183-
187

Paletta, D. (2005). Regulating Choice Point: Whose Job Is It, Anyway? American Banker.
Parr, Russell L.; Smith, Gordon V. (2010). Intellectual property: valuation, exploitation,
and infringement damages. Hoboken, N.J.: Wiley. Pp. Chapter 33. ISBN 0-470-45703-1.
Conference, Cowan University.

Preeti Singh, 2012, “Forensic Accounting Concept in India”, International Journal of Trade
and Commerce-IIARTC, Vol. I, NO. I, pp. 100-105.

Sabale R.J, 2011, “Frauds In India – Harmful Matter” , Indian Streams Research Journal
,Vol. .1, pp.128-130.

Saurav K. Dutta introduces Statistical Techniques for Forensic Accounting: Understanding


the Theory and Application of Data Analysis.

Sigieton Green, B. (1991): “The Biggest Fraud In History”. Accounting, September 1991.

Silverstone H, Sheetz, M. Forensic Accounting and Fraud Investigation for Non-Experts.


2nd Edition, 2007. John Wiley & Sons, Inc. USA.

Smith, G. S. (2005). Computer Forensics: Helping to Achieve the Auditor's Fraud Mission.
Journal of Forensic Accounting, VI, 119=134.

Swartz, N. (2004). U.S. States Disagree About Online Access to Court Records. Information
Management Journal, 11.

Wallace, A. (2001): The Role of The Forensic Accountant. Accountant November 2001.

Waldrup, B., Capriotti, K., & Anderson, S. C. (2004). Forensic Accounting Techniques: A
Defensible Investigatory Process for Litigation Purposes. Journal of Forensic Accounting,
V, 116.

Wells, J. T. (2003). The Fraud Examiner. Sleuthing careers bring caps personal and
Professional Satisfaction. Association of Certified Fraud Examiners.
Zia, T. A. (2010). Development, Delivery and Dynamics of a Digital Forensics Subject.
Digital Forensics conference (p. 175). Presented at the 8th Australian Digital Forensics

Zysman, A. (2009), Litigation: Forensic Accounting Demystified.

You might also like