Detecting Fraudulent Financial Reporting in Manufacture Sector
DOI:
https://doi.org/10.61841/8f2qaa21Keywords:
Financial, target, stability, auditor, change, effective monitoringAbstract
The main purpose of this research is to analyze the influence of Financial Targets, Financial Stability, Auditor Change, and effective monitoring to the detection of financial statements at manufacturing companies in the consumer goods industry sector. This research data uses secondary data from the Indonesia Stock Exchange. The sample is determined by purposive sampling technique and there are 33 companies listed on the stock exchange and 6 companies that do not submit the financial statements in 2015 - 2017 The results of data analysis show that the analysis model produces 12.84% prediction accuracy and there are 1 (one) variables that influence significant and there were 3 (three) significant influential variables namely Financial Target, Financial Stability, Auditor Change to detect fraudulent financial statements.
Downloads
References
[1] B. L. Handoko and Natasya, “Fraud diamond model for fraudulent financial statement detection,” Int. J. Recent Technol. Eng., vol. 8, no. 3, pp. 6865–6872, 2019.
[2] B. L. Handoko, “The Effect of Institutional Ownership and Leverage towards Profit Management in Consumer Goods Industry Listed in BEI,” Binus Bus. Rev., 2015.
[3] M. D. Beneish, “The Detection of Earnings Manipulation,” Financ. Anal. J., vol. 55, no. 5, pp. 24–36, 1999.
[4] N. M. Zaki, “The Appropriateness of Fraud Triangle and Diamond Models in Assessing the Likelihood of Fraudulent Financial Statements - An Empirical Study on Firms Listed in the Egyptian Stock Exchange.,” Int. J. Soc. Sci. Econ. Res., vol. 02, no. 02, pp. 2403–2433, 2017.
[5] A. Abbas, “Earnings Fraud And Financial Stability,” Asia Pacific Fraud J., 2017.
[6] C. M. Lau and K. Roopnarain, “The effects of nonfinancial and financial measures on employee motivation to participate in target setting,” Br. Account. Rev., 2014.
[7] C. M. Hopper, M.J.; Pornelli, “Deterring and Detecting Financial Reporting Fraud; A platform for action,” no. October, p. 55, 2010.
[8] D. Peltier-Rivest, “A model for preventing corruption,” J. Financ. Crime, vol. 25, no. 2, pp. 545–561, 2018.
[9] F. R. Siddiq, F. Achyani, and Zulfikar, “Fraud Pentagon Dalam Mendeteksi Financial Statement,” Semin. Nas. dan 4th Call Syariah Pap., 2017.
[10] I. Erel, Y. Jang, and M. S. Weisbach, “Do acquisitions relieve target firms’ financial constraints?,” J. Finance, 2015.
[11] X. Tian, G. F. Udell, and X. Yu, “Disciplining delegated monitors: When venture capitalists fail to prevent fraud by their IPO firms,” J. Account. Econ., vol. 61, no. 2–3, pp. 526–544, 2016.
[12] T. T. H. Le and M. D. Tran, “The effect of internal control on asset misappropriation: The case of Vietnam,”
Bus. Econ. Horizons, vol. 14, no. 4, pp. 941–953, 2018.
[13] ACFE, “Report to the Nations 2018 Global Study on Occupational Fraud and Abuse,” 2019.
[14] I. Ghozali, “Moderated Structural Equation Modeling,” in Model persamaan struktural. Konsep dan aplikasi dengan program AMOS 19.0, 2011.
[15] R. Kirkham, “Liquidity Analysis Using Cash Flow Ratios and Traditional Ratios: The Telecommunications Sector in Australia.,” J. New Bus. Ideas Trends, vol. 10, no. 1, pp. 1–13, 2012.
[16] H. Kim, H. Lee, and J. E. Lee, “Mandatory audit firm rotation and audit quality,” J. Appl. Bus. Res., 2015.
[17] J. B. Suh, H. S. Shim, and M. Button, “Exploring the impact of organizational investment on occupational
fraud: Mediating effects of ethical culture and monitoring control,” Int. J. Law, Crime Justice, vol. 53, no. October 2017, pp. 46–55, 2018.
[18] C. J. Skousen, K. R. Smith, and C. J. Wright, “Detecting and predicting financial statement fraud: The effectiveness of the fraud triangle and SAS No. 99,” Adv. Financ. Econ., vol. 13, no. 99, pp. 53–81, 2008.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
