Unmasking “Capability” - the fourth element in the Fraud Diamond Theory - as a cause of frauds leading to corporate failure. Takamirira Taruberekera Department of Auditing University of Pretoria Abstract Capability abuse is seen as a leading cause of corporate failure both in South Africa and globally. The purpose of this paper is to broaden the understanding of “Capability”, the fourth element in the Fraud Diamond construct as proposed by Wolfe & Hermanson (2004:1-4). To accomplish this, the paper addresses two areas. First, the literature on the components of capability is reviewed, noting specifically from a more theoretical perspective, those factors that facilitate or promote the idea of committing fraud, and their associated red flags. The processes and outcomes of six fraud cases - three in South Africa and three from other jurisdictions - are then analysed to confirm the theoretical observations and determine more specifically how components of capability were abused by the perpetrators of these frauds.. The second area of focus addressed in this paper is ways of managing the risk of abuse of capability. The article concludes that management’s abuse of its privileged capabilities has a significant role to play in corporate failures, and therefore efforts to manage capability must be independently and consciously taken to mitigate corporate failures. Key words Capability; Capability abuse; fraud; fraud risk; corporate failure; fraud diamond; causes of fraud. 1 1 INTRODUCTION Until the early 19th century, most organisations were relatively small and were owned and operated as sole proprietorships or partnerships, with limited accountability to outside parties (Crous, Lamprecht, Eilifsen, Messier, Glover & Prawitt, 2012:6). Nevertheless, during the industrial revolution businesses were growing from these owner-managed entities into increasingly large corporations in which the owners (shareholders) and management (executive directors) were separate and unrelated parties (Crous et al., 2012:6). It has now become common practice that shareholders (principals) appoint directors (agents) to manage their investments in companies (Crous et al., 2012:6). The dynamics of this relationship are now commonly studied as the principal-agent-theory. (Von Wielligh, Prinsloo, Penning, Butler, Nathan, Kunz, Motholo, O’Reilly & Scholtz, 2014:5). It is a commonly held assumption that principals take great care when appointing agents, to ensure they are trust-worthy, loyal and honest, as well as capable of managing their investments; however, this relationship is often characterised by information asymmetry (where an agent knows more about the business than the principle does), and the emergence of conflicts of interest (arising from conflicting goals and objectives) (Crous et al., 2012:6; Von Wielligh et al., 2014:13). Thus, managers may not always act in the best interest of the owners: funds may be spent on projects accruing excessive benefits to managers in their personal capacities; or reported performance may have been manipulated to earn managers higher bonuses (Crous et al., 2012:6). Efforts to address the information asymmetry and to manage the relationship between principals and agents has led to several interventions, such as the development of accounting standards and professional and regulatory bodies’ development of formal guidance and principles, the appointment of independent auditors, and governments’ enactment of legislation and, regulations to protect the public interest (Crous et al., 2012:7-9; Von Wielligh et al., 2014:8-15). However, despite the variety and intensity of the interventions implemented over the years to manage the principal-agent relationship, the historic record still shows that fraudulent behaviour by agents remains a significant risk to companies, often leading to severe financial loss and/or their eventual bankruptcy (Association of Certified Fraud Examiners (ACFE) 2014:14; 2018:33-37). The Association of Certified Fraud Examiners (ACFE) has noted a significant correlation between authority and the value of company losses in each of their biannual fraud surveys, dating back to 1996 (ACFE 2018:33). The 2016-17 ACFE study indicates that despite the fact that owners/executives were responsible for only 19% of the total number of fraud events reported in this study, their schemes contributed to a median loss which was nearly six times larger than the median loss arising from fraudulent actions of lower-level employees (ACFE 2018:33). This is ascribed to the fact that high-level employees have greater access to their organisation’s assets, and possess greater technical ability to commit and conceal fraud; the latter includes the authority and ability to override normal controls, and thus to conceal their crimes more effectively than lower-level employees can (ACFE 2018:33). These are all factors associated with ‘capability’, the fourth element of the Fraud Diamond Theory (Wolfe & Hermanson, 2004:2-3). 2 2 RESEARCH PURPOSE AND METHODOLOGY It is true that fraud has devastated big and apparently robust companies in South Africa and the rest of the world: examples include Enron, Global Crossings, WorldCom, Sunbeam, Fidentia, Regal, and African Bank (James, Bierstaker, & Pacini, 2006: 521; S v Brown, 2014; Myburgh, 2002:1-3; Fin24 2014 & 2015) and most recently, Steinhof (Fin24 2018). Recognising from the introduction that most corporate failures happen at the hands of those charged with its stewardship, this paper aims to broaden the debate on capability as a significant cause of fraud that has led to notable corporate failures both in South Africa and globally. The purpose of this study is to broaden the understanding of “capability” – one of the elements of the fraud diamond construct - as proposed by Wolfe & Hermanson (2004:1-4). The study unpacks capability to shed more light on two research questions. First: What are the distinct components of capability and the circumstances that promote or cultivate capability to commit fraud? Secondly: What strategies could organisations employ to manage the risk of fraud with specific emphasis on the element of capability? Answers to the first question aid in understanding the concept of capability and forms a basis for identifying signals (red flags) of the presence of this element in an organisation, while answering the second question assists in managing the risk associated with capability. It is hoped that knowledge of these factors will assist forensic investigators and organisations to manage more effectively their investigations of and strategies against fraud involving top management. The study employs a non-empirical, qualitative review of published academic literature and other relevant documents, including local and international court cases decided between 2001 and 2018, in order to build on the theoretical argument that capability is a fourth common cause of fraud that explains that corporate failures happen while in the care of those (mostly in senior management positions) charged with its stewardship. While the purpose of this study was to shed more light on “capability” as a significant cause of fraud leading to corporate failures, there are nevertheless other, usually external factors, also implicated in some failures, over which organisations may have more or less control. Thus, as this study has limited its analysis to only six corporate failures with a focus on “capability” as the determining factor, a broader analysis would be necessary to determine the relevance of other elements of the fraud diamond as causes of fraud leading to corporate failures. As mentioned earlier, this study acknowledges the findings of previous research that the root cause of fraud is empirically rooted in the so-called fraud diamond. Specifically, it is the fourth element, “capability”, which is linked to corporate failure. This is discussed next. 3 3 DEVELOPMENT OF THE FRAUD DIAMOND THEORY 3.1 Fraud Triangle (Cressey’s Theory) In his quest to understand why people violate trust by committing fraud, Cressey (1953:973) interviewed 250 criminals in 5 months of research, and noted that their behaviour met two criteria: first, people accepted responsibilities of trust in good faith, and second, circumstances persuaded them to violate that trust (Kassem & Higson, 2012:192). Cressey’s study resulted in the formulation of the “fraud triangle” theory, recognising the interconnectedness of the three factors that push people to commit fraud, namely pressure, opportunity and rationalisation (Cressey, 1953:973-979, 1973:24). Cressey’s theory remains relevant and is widely regarded in anti-fraud literature such as Biegelman and Bartow (2012:23); ACFE, (2014:14) Abdullahi, and Mansor (2015a:312); Albrecht (2003:141), Albrecht, Albrecht and Albrecht (2004:110). Abdullahi and Mansor (2015a:312-313) explain the elements of the fraud triangle, pointing out that pressure refers to the factors that lead to unethical behaviour, and can be both financial and non-financial; opportunity refers to the circumstances which makes the commission of fraud more attractive, particularly where there is little or no chance of the fraudster being caught; and rationalisation, the mental processes the fraudster engages to justify the commission of fraud. Although Cressey’s theory is still widely recognised and applied, a forth element “capability”, is now strongly identified by authors to explain the impetus that triggers the commission of particularly the more dramatic and devastating frauds (Wolfe & Hermanson, 2004:1-4; Bressler & Bressler, 2007:23-26; Kassem & Higson, 2012: 191195). Justifying the need to add a fourth cause of fraud to Cressey’s triangle, Bressler and Bressler (2007: 23-36) argue that the mere presence of the three elements suggested in Cressey’s theory cannot lead to the commission of fraud: capability is required to give ideas and opportunities real-world form, and to execute and conceal the fraudulent act. Similarly, Kassem and Higson (2012:191-195) argue that fraud cannot merely happen: it requires the impetus of a fraudster with the requisite skills and capacity. Other authors agree that personal traits and skills determine when and how fraud is perpetrated in a given environment (Baz, Samsudin, Che-Ahmad & Popoola, 2016:68-71; Khan & Varma, 2016: 83-92). Wolfe and Hermanson (2004:12), explain that the eventual fraudulent act only occurs when the “right person with the right capability” (personal traits and abilities) is in place. 3. 2 The Fraud Diamond Wolfe and Hermanson’s (2004:1-4) Fraud Diamond Theory proposes that a fraudster requires a thought process which recognises an incentive (motive) to satisfy a personal need; an opportunity (which could be a maliciously exploitable weakness in the operational cycle); rationalisation (justification to himself for the fraudulent act), and lastly, capability, his personal command of the traits and abilities to instigate and sustain the act of fraud. These observations are also supported by Kassem and Higson (2012:191-195). These four elements have become known as The Fraud Diamond. (See Figure 1.) 4 Figure 1: The Fraud Diamond Source: Wolfe & Hermanson (2004:2) It is now widely agreed that capability triggers fraud: morality aside, fraud is a “business opportunity” that requires the would-be fraudster to consciously and explicitly consider whether his abilities and traits are sufficient for the task. The components of capability abuse - the factors that present the fraud as an opportunity to the fraudster, and the red flags that should be looked for by those charged with oversight and policing are discussed next. This is followed by an analysis of court cases to substantiate and perhaps broaden the theoretical observations with examples from practice. 4 COMPONENTS OF CAPABILITY Wolfe and Hermanson (2004:2) describe capability as the personal traits and abilities a person requires to commit fraud, having already rationalised the act to him-self, and identified an opportunity. The National Association of State Auditors, Comptrollers and Treasurers (NASACT) and the Oregon State Controller’s Division (2018: online) provide examples of the following personal traits associated with fraud: greed, weakness of character, excessive pride, and dishonesty; with an example of a facilitating ability being a knowledge of the entity’s processes and controls. The International Accounting Education Standards Board (2011:14), defines capabilities as “content knowledge; technical and functional skills; behavioural skills; intellectual abilities (including professional judgment); and professional values, ethics, and attitudes”. Wolfe and Hermanson (2004:2-3) expanded their understanding of the components of capability as: perpetrator’s position or function within the organisation; possession of a brain that is experienced and crafty in the person’s area of dominance or expertise; arrogance; cohesive power; effectiveness as a liar, and lastly, being able to manage stress. Each of these components is discussed in more detail below. 5 4.1.1 Position / function Wolfe and Hermanson (2004:3) argue that fraud perpetrators usually abuse the position they occupy, particularly when it is in a specialist field or is in a relatively isolated part of the organogram. In this position or function they have direct access to the financial and other systems and are thus more easily tempted to commit fraud for personal gain through manipulation and abuse of their positions of power. This is supported by Kassem and Higson (2012:194) and Rudewicz (2011:2), who recognise that positions of authority or specialist functions within an organization can be manipulated to deliver personal benefits. Wolfe and Hermanson, (2004:4) add that, as the person increases his knowledge of the functions over which he presides, the temptation to abuse this position of authority increases as well. This contention is supported by Abdullahi and Mansor (2015b:42), who identify that it is the position and role occupied by the employee that may tempt him to breach the trust the organization has placed in him. The position of an individual within the organisation, therefore, contributes directly to the occurrence of fraud: as the person increases in knowledge of the functions he presides over, and as his access to assets increases, according to Kovacich (2007:36), so does the likelihood that this person will be convinced to commit fraud. 4.1.2 Brains The fraudster is someone who understands and is capable of exploiting internal control weaknesses (Wolfe & Hermanson, 2004:3). As Rudewicz (2011:2) notes, the fraudster is smart enough to exploit his understanding of these internal control weaknesses, and to abuse his unique position or function to the greatest personal advantage. Wolfe and Hermanson (2004:3) explain that fraudsters are experienced and crafty specialists in their areas of dominance. The belief that his fraud will be successful rests on the fact that the manager/fraudster’s skills and influence are unique (Wolfe & Hermanson, 2004:3). Alternatively, the manager might want to demonstrate to his peers that he has exceptional skills (despite the organisation having rejected his claims) thereby triggering his desire “to show them” by deploying his skills to commit fraud (Wolfe & Hermanson, 2004:3). Abdullahi and Mansor (2015b:42) acknowledge that intelligent, experienced, creative people with a solid grasp of their entity’s controls and vulnerabilities, commit many of today’s largest frauds. Considering it from a different angle, Kassem and Higson (2012:194) conclude that the capacity to understand and exploit accounting systems and internal control weaknesses for personal benefit is frequently sufficient to justify the abuse of trust in the minds of uniquely skilled or specialist managers. 4.1.3 Arrogance/Ego This component refers to the high levels of confidence fraudsters demonstrate, and which is usually a reflection of an over-inflated ego (Wolfe & Hermanson, 2004:3; Allan, 2003:39; Duffield & Grabosky, 2001:33). Ego typically manifests in a desire to always prove oneself more worthy, competent or deserving than one’s peers and/or superiors (Allan, 2003;39-40; Duffield & Grabosky, 2001:22), and is pushed by the fear of losing one’s reputation and the desire to be credited with improving the organisation which a manager leads (Rubasundram, 2015:102-106; Khan & Varma, 2016:83-99). 6 Rudewicz, (2011:2) agrees and identifies key common personality types of egoistic managers: being driven to succeed at all costs; self-absorbed; self-confident; often narcissistic. Wolfe and Hermanson, (2004:3) argue that a perpetrator may commit fraud because he believes he can always talk himself out of the consequences of his fraudulent actions. Kassem and Higson (2012:194) support this argument, noting that confidence is demonstrated by a manager when he rationalises that he is unlikely to be detected, and if caught, he believes he will easily talk his way out of trouble. Abdullahi and Mansor (2015b:42) reached the same conclusions. Wolfe and Hermanson (2004:4) argue further that confidence reduces the ability of a fraudster to estimate the potential cost of the fraud, and thus affects his earlier resistance to the act: in other words, the over-confidence compromises his ability to perform a logical, rational cost-benefit analysis of his intention to engage in fraud that might otherwise have persuaded him to remain “on the straight and narrow”. 4.1.4 Cohesive power Fraudsters can coerce others to commit and/or conceal fraud (Wolfe & Hermanson, 2004:2-3; Rudewicz, 2011:2). This coercive power is derived from the manager’s position of authority and is in large part the essence of his ability to ensure his subordinates remain a cohesive unit carrying out his plan, and is a power that if not mitigated, leads management to commit fraud either by themselves or through others (Wolfe & Hermanson, 2004:3). Abdullahi, and Mansor, (2015b:43) further argue that a person with a very persuasive character may recruit others to commit fraud or to ignore the fraudulent acts of others. They further identify these personality types as “bullies” who make unusual and significant demands on their subordinates; they cultivate an environment of fear rather than mutual respect, thereby avoiding being held personally subject to the organisation’s rules and procedures (Abdullahi & Mansor, 2015b:43). 4.1.5 Effective liar This component is essentially a mask of innocence behind which the fraudster hides to avoid detection (Wolfe & Hermanson, 2004:2-3). A fraudster will continuously and effectively lie to conceal a fraud and to prevent his being identified with it, if the fraud is discovered (Wolfe & Hermanson, 2004:2-3). Rudewicz, (2011:3) concurs, arguing that a successful fraudster (manager) is also able to lie effectively and consistently, even to the point of being able to look the auditors, investors, and other oversight bodies right in the eye while convincingly tell them lies. Abdullahi, and Mansor (2015b: 43), add that the fraudster usually also possesses exceptional memory skills enabling him to keep track of the lies he builds up and to ensure that the overall narrative remains consistent and convincing, and to his advantage. 4.1.6 Effective stress management Wolfe and Hermanson (2004:3), argue that managers who commit fraud have to be able to manage continuous stress to avoid having their fraudulent acts detected (Wolfe & Hermanson, 2004:4). Abdullahi and Mansor (2015b:43), posit that fraudsters end up managing and hiding their frauds over a long period of time, which can be excessively 7 stressful. Kassem and Higson (2012:194), compare the ability of fraudsters to deal with the stress created within themselves, to that required of someone remaining composed in a burning house. Rudewicz (2011:2), points out that the “successful” fraudster must be able to control their stress responses as well as emotion swings. Wolfe and Hermanson (2004:4), observe that the components of capability are present in all successful managers. However, for as long as they are not monitored by an independent oversight body (with authority to enforce appropriate punishment when necessary), this situation provides the potential fraudster with opportunity to indulge his/her fraudulent desires. However, despite having the capability and all the traits associated with it, not all managers necessarily abuse their capabilities and opportunities. The factors that persuade management to abuse their capabilities are discussed next. 4.2 Factors that cultivate capability abuse A fraudster commits fraud because there are factors that trigger belief in the necessity to use his/her capability to execute the fraudulent act (Khan & Varma, 2016:83). It is important to note that the factors that trigger one person to commit fraud, may not necessarily generate the same response in another (Kovacich, 2007:36). The factors that typically result in the abuse of a manager’s unique set of capabilities are identified and discussed in the next sections. 4.2.1 The desire to better/protect their organizations Rubasundram (2015:102), claims that management’s capability abuse may be driven by the desire to present their organizations in a better light. Ebbers, in his United States court case, argued that he had to capitalise the expenses of WorldCom in order to protect the strength of the company’s balance sheet (US v. Ebbers, 2006). Ebbers’ argument was echoed by African Bank CEO and chairman Kirkinis: the International Accounting Standards regarding provision for bad debts was “not fair and correct” in African Bank’s case, since their religious application was seen as detrimental to the bank’s stated financial position. Implementing this rationalisation, he adjusted the provision for bad debts to his “acceptable level”, in order to “save” the bank from excessive losses (Myburgh Report, 2014). Loebbecke, Einning and Willingham (1989:12), point out that poor profitability may also persuade management to abuse their capability (authority) by adjusting the entity’s figures so as to present an enhanced (fraudulent) financial picture, “for the good of the company”. 4.2.2 Management pressure to meet the requirements of third parties American Institute of Certified Public Accountants (AICPA) (2002:1749 –1751) in its Statement on Auditing Standards (SAS) No-99 notes that excessive pressure on management to meet the requirements of third parties is one of the factors that can lead to fraud through capability abuse. The perceived need to keep a promise, even if the operating environment does not permit it, leads executives to abuse their positions/functions and to coerce others to commit management fraud (Sawyer, Dittenhoffer & Scheiner, 2003:1203). Boyle et al., (2012:65), explain that a CEO’s equity incentives can create strong pressure for management to meet targets, even if it is commercially impossible to do so. This could nevertheless be achieved through 8 the manipulation of the results, as was the case with Ebbers of WorldCom (US v. Ebbers, 2006). A study conducted by the USA’s Security Exchange Commission (SEC), titled “Fraudulent Financial Reporting: 1998–2007”, examined 347 alleged accounting fraud cases and found that financial statement fraud often involves the company’s top executives. CEOs were implicated in 72% of the cases, and CFOs in 65% (Boyle, Carpenter & Hermanson, 2012:62-63). In another study on frauds perpetrated by CEOs, it was observed that the perpetrator, by virtue of his position, felt compelled to make “adjustments” in an effort to meet the expectations of the market (Beasley, Carcello & Hermanson, 1998:online). These findings show that CEOs are commonly involved in cases of fraudulent financial reporting, and that they normally revert to this type of fraud because of the need to meet the expectations of 3 rd parties, usually the market. 4.2.3 Ineffective monitoring of top management by shareholders and regulatory authorities AICPA (2002:1749 –1751), notes ineffective monitoring of management as one of the factors that enables management to abuse their capability/authority. Executive management should thus be monitored by the body tasked with representing the shareholders, as any slack in monitoring systems is seen as increasingly fertile ground for capability abuse (Gershon & Alhassan, 2004:8). 4.2.4 Lust for personal gain by those charged with governance Kovacich (2007: 32), explains that capability, when driven by a lust for personal gain, and peer recognition manifests itself in the forms of financial gain, and knowledge or information control. Sawyer et al., (2003:1204), have identified that a manager’s need to succeed can result in deception, while at its extreme, corporate leaders’ excessive need to succeed may result in a complete betrayal of their stewardship responsibilities, and the destruction of the resources entrusted to them by the stockholders. An examination of corporate fraud cases in the USA and South Africa, shows that executive managers (CEOs and CFOs) have become extremely rich through the abuse of their privileged positions that enabled them to grant themselves unmerited and illegal gratuities (US v Ebbers, 2006; S v Brown, 2013; Skilling v US, 2010). As mentioned previously, Kovacich (2007: 66) argues that managers abuse their capability in the commission of fraud mostly in pursuit of personal financial gains, and to a lesser extent to obtain recognition from their peers. In line with Kovacich, Boyle, et al., (2012:63), observe that CEOs’ preferred fraud methodology is in the accounting field and is related to enhancing their equity incentive-linked bonuses, thereby achieving significant personal financial advantages. Boyle, et al., (2012:63) acknowledge that this financial objective can also contain overtones of abuse of power, and unbridled narcissism. 4.2.5 Excessive pressure on management and operating personnel to meet financial targets set by board of directors AICPA (2002:1749 –1751) notes the presence of excessive pressure for management to meet the requirements of the board of directors as a factor that cultivates capability 9 abuse. In support of this observation, Sawyer et al., (2003:1204) argue that management (whether intrinsically competent or not) that has been pressured to meet possibly unrealistic financial targets may resort to fraudulently manipulating the books in order to survive in their positions for another day. Boyle, et al., (2012:65) have identified that CFOs appear to engage in accounting fraud in response to pressure exerted on them by their CEOs, rather than in pursuit of their own financial benefit. 4.2.6 Personal, political and religious beliefs Roebuck (2016:66), argues that capability fraud is often triggered when a person’s secular belief system is “flexible” enough to justify the commission of acts of fraud. Religion can also be a cultivating factor that triggers the abusive use of an executive’s capability, particularly if there is a perceived conflict between the religious beliefs of the manager and the ethos of the business entity. Kovacich (2007: 67- 71), recognises pressures from motivations that include political (including terrorism and revenge), religious conviction, secular bodies (including peer and social groups), the desire for personal gain and simple curiosity as factors leading to the abuse of capability and fraud. The employees who have a strong belief in their ability to conceal a fraudulent act for the long term are also more likely to commit fraud. Lastly Kovacich (2007:36) has identified revenge as a factor that triggers capability abuse. He argues that disaffected members of staff may seek revenge against the organisation they work for either in financial terms or by causing reputational damage. In the arena of conflict between personal (usually extremist) religious beliefs and an entity’s business ethics, Sawyer et al., (2003:1204-1205), recognise that such conflict of interests leads to the commission of fraud in support of terrorism, and/or response to corruption, or nepotism. 4.2.7 Fear of losing personal reputation Another factor giving rise to capability abuse could be the perpetrator’s fear of “losing face” or having his reputation compromised (Kovacich, 2007:67). Ebbers, the former CEO of WorldCom, felt he had to protect his reputation as “the Cowboy of Wall Street”, and the most shrewd and successful CEO in the USA, and this persuaded him to abuse his position of authority and to coerce his accounting staff to falsify records (US v Ebbers, 2006). The fear of losing one’s reputation is linked to personal ego, the threat to which is sufficient to push/persuade the manager to abuse their capability by committing fraud (Rubasundram, 2015:102-106; Khan & Varma, 2016:83-99). 4.2.8 Complex or unstable organisational structures operated with little regard for corporate governance AICPA (2002:1749 –1751) recognises a complex or unstable organizational structure as a cultivating factor for fraud. The Standard suggests that unstable organisational structures promote opportunities for fraud, and entice people to commit fraud. If executives realise that the organisation is likely to continue in a state of flux, undergoing changes in technology, and human resources, and experiencing fluctuations in market share price, management might be tempted to abuse their capability to commit fraud. Adu-Gyamfi (2016:145) argues that poor risk management, ineffectiveness of internal and external audit and a weak board of directors contributes 10 to the possibility that fraud will be committed by those prepared to abuse their specialist capabilities. This section discussed the factors that facilitate the abuse of capability. Understanding the components and facilitating factors of capability abuse is an important component of being able to manage this type of risk in organisations. This knowledge is useful in identifying red flags indicating potential fraud (Institute of Internal Auditors (IIA), 2009:8): these indicators are discussed next. 4.3 Factors that cultivate fraud and their associated red flags One way to address the probability of fraud within organisations is to understand its red flags (Gullkvist & Jokipii, 2012:45; IIA, 2009:8). Prompt identification of red flags and immediate follow-up is important in detecting and limiting the impact of fraud: the longer it takes to identify an opportunity for or the occurrence of fraud, the higher the eventual loss becomes (ACFE 2018:13). Since management has the capability to withhold evidence or conceal the traces of their fraud, either by collusion with colleagues or by the abuse of the authority of their positions in the organisation (AICPA 2002:1749 –1751), it is even more important that oversight bodies (directors, internal audit, and external audit amongst others) are alert to the possibilities associated with fraud associated with capability abuse. Singleton and Singleton (2010:95-112), define red flags as "…fingerprints of fraud". They reflect the traces of the commission of fraud which have occurred or are likely to occur. Albrecht, et al., (2012:137-144) define red flags as unique symptoms of fraud and claim that they may range from accounting anomalies to behavioural abnormalities. Although no red flag by itself may mean that an employee is actually committing fraud, a combination of red flags indicates the need to further investigation (IIA:2009:9). Table 1 below provides a summary of red flags associated with the cultivating factors discussed in the previous section. Table 1: Factors cultivating fraud, and associated red flags Factor 4.2.1 Desire to better or protect managers’ organizations Associated red flags 4.2.2 Consistently late reporting of the corporate financial results (Sawyer, et al. 2003:1207) Consistent lies as a cover to protect the employer organisation (Gershon & Alhassan, 2004:6) Autocratic leadership (Gershon & Alhassan, 2004:2) Management pressure to meet the requirements of third parties Associated red flags senior managers fulfilling the duties of their subordinates (Sawyer, et al., 2003:1207) “Wheeler-dealer” attitude (shrewd or unscrupulous behaviour); unwillingness to share duties; irritability and defensiveness; unusual closeness with a vendor. (ACFE, 2016: 26, 2018:43-46, Singleton 2010:95) 11 4.2.3 lack of moral fibre; poor management attitude towards internal controls, and a weak and compromised internal control environment. (Gullkvist & Jokipii 2012: 58) aggressive company culture (Li 2010:39) Ineffective monitoring of top management Associated red flags 4.2.4 domination of management in operational decision-making by a single person or small group, without effective compensating controls (AICPA, 2002:1751) compromised/manipulative financial reporting system (AICPA, 2002:1751) compromising or overriding of monitoring controls (AICPA, 2002:1751) non-cooperation or late co-operation with regulators by the corporate management team (Girgenti & Hedley, 2011:260) inadequate separation of duties and independent checks; inadequate recordkeeping with respect to assets, and a lack of clear organizational responsibilities (AICPA, 2002:1753) non-cooperation or late co-operation with regulators (Girgenti & Hedley, 2011:260) key manager(s) having questionable or criminal backgrounds; dishonest or unethical management; presence of significant and unusual related-party transactions; illegal acts within the operations of the business, and failure to record transactions accurately and on time (Gullkvist & Jokipii, 2012:58) corporate executives’ failure to declare their interests in third party transactions (Gershon & Alhassan, 2004:3) Lust for personal gain by those charged with governance Associated red flags 4.2.5 non-compliance with corporate procedures and directives (Sawyer, et al., 2003:1207) pressure from personal financial obligations (AICPA, 2002:1752) changes in behaviour or lifestyle of the management (key managers living beyond their means) (AICPA, 2002:1752; Gullkvist & Jokipii, 2012:58) complex web of partnerships which do not fit well in the normal business operations (Gershon & Alhassan, 2004:4) blatant disregard for the need for monitoring and risk management (AICPA, 2002:1753) Excessive pressure on management and/or operating personnel to meet financial targets set by board of directors Associated red flags 4.2.6 management becomes dishonest or unethical; management extends their efforts to boost revenue by embracing significant and unusual related-party transactions which may not be relevant to the core operations of the corporate, and fail to record transactions accurately and on time (Gullkvist & Jokipii, 2012:58) corporate culture of intimidation (Gullkvist & Jokipii, 2012:58) resignation of external auditors and increased cases of whistleblowing (Gershon & Alhassan, 2004:4) Personal, political and religious beliefs Associated red flags key manager(s) have questionable or criminal background (Gullkvist & Jokipii, 2012:58) 12 4.2.7 extreme fundamentalism in religious beliefs (Gullkvist & Jokipii, 2012:58) presence of significant and unusual related-party transactions (Gullkvist & Jokipii, 2012:58) need to cover up an illegal act; not recording transactions accurately (Gullkvist & Jokipii, 2012:58) bank accounts or operations are registered in tax-havens (Gullkvist & Jokipii, 2012:58). questionable trans-border money transfers (Gullkvist & Jokipii, 2012:58) Individual’s fear of compromising reputation Associated red flags 4.2.8 aggressiveness of the potential fraudster (Li, 2010:37) key manager(s) becoming dishonest or unethical and aggressive on a personal level (Gullkvist & Jokipii, 2012:58) Complex or unstable organisational structure Associated red flags inconsistency in the application of accounting principles by managers (Girgenti & Hedley, 2011:33) significant related-party transactions not relevant to the ordinary course of business (Li, 2010:37) significant operations located or conducted across international borders (Li, 2010:37) 4.4 Analysis of Fraud Cases: Case studies Sections 4.1 to 4.3 above discussed the importance of capability as a possible cause of fraud and explained the components of capability as well as the cultivating factors leading to its abuse. Some red flags associated with each cultivating factor was also identified and presented. The discussion of prominent cases of fraud (economic crime) which follow below, aims to substantiate the theoretical observations from the literature discussed in these sections. The South African cases reviewed are Fidentia, Regal Treasury Private Bank and African Bank. The review of these cases aims to determine the impact of capability abuse as a component of those crimes. Each analysis identifies the nature of the crime, the position of the perpetrator in the organisation, and the aspects of the perpetrator’s unique capabilities that enabled or enticed the perpetrator to commit fraud. 4.4.1. South African corporate fraud cases 4.4.1.1 Fidentia (Joseph Arthur Walter Brown), Summary of the fraud case: Brown, as the head of Fidentia Asset Management, misrepresented material facts to shareholders by asserting that the assets were intact and that the records showed the true state of affairs (S v Brown, 2013). In fact, he was fraudulently misrepresenting the facts to institutional investors to get large sums of capital, purportedly in return for favourable investment returns and safeguards for the acquired capital amounts; in fact he, through Fidentia, invested the funds recklessly and also misappropriated large amounts for himself, close associates and other companies, for their personal benefit (S v Brown, 2014; Financial Services Board 13 Inspection Report, 2004:24). Institutional investors and shareholders lost large amounts of money. Brown abused his position of influence over the preparation and presentation of Fidentia’s financial statements by misrepresenting material facts to shareholders and investors, and by running Fidentia with “brute force” (S v Brown, 2013:3). 4.4.1.2 Regal Treasury Private Bank Ltd (Jeffery Israel Levenstein) Summary of the fraud case: Levenstein was the Chairman of the Board and CEO of Regal Bank. He was found, as a director, to be in breach of regulations issued in terms of the Companies Act (Myburgh, 2002:12). In particular, Levenstein commanded that corporate financial statements were not to show monthly depreciation above R200 000, despite the different reality that was revealed when accepted accounting principles were applied (Myburgh, 2002:12). By 2001, about R20 million worth of expenses had been hidden in treasury accounts. He falsified the accounting records (management fraud) thereby misleading investors and shareholders (Myburgh, 2002:12). According to the report of the Myburgh Commission (Myburgh, 2002:1-152) it was concluded that Levinstein was not a fit and proper candidate for the positions of CEO and Director of Regal Bank. The bank had been placed under curatorship in June 2001 because the depositors and shareholders had lost confidence in the financial institution (Myburgh, 2002:12). The bank, under the leadership of Levinstein, failed for a number of reasons, the main reason noted in the Myburgh report (2002:1-3) being that he carried out the business of the bank recklessly. Levenstein did not exercise "reasonable care and skill, he did not always act in the best interest of the bank, shareholders and depositors, he acted dishonestly and fraudulently, his management was incompetent and amateurish, and he confused corporate governance with thuggery" (Myburgh, 2002:1-3). 4.4.1.3 African Bank (Leon Kirkinis) Summary of the fraud case: On 10 August 2014, African Bank, together with its holding company ABIL, were placed under curatorship (Myburgh, 2014:1-53). The bank was experiencing severe liquidity challenges, exacerbated by poor policies on bad debt provisioning and impairment, and a ballooning debtors book. The bank experienced massive losses (R4.9 billion) in 2013 and 2014 (Myburgh, 2014:11). Kirkinis, the CEO of the bank, appointed unqualified directors to the board. The Chief Risk Officer and the MD were all handpicked by the CEO (Myburgh, 2014:9). They did not have the appropriate and necessary competencies, experience or skills for their positions (Myburgh, 2014:9). The directors who were qualified, like the Finance director, were not allowed to participate in executive decision-making processes: the CEO was, to all intents and purposes, the kingpin in the affairs of the bank (Myburgh, 2014:3). Kirkinis led the bank as it incurred massive losses (R4.9 billion) in 2013 and 2014 (Myburgh, 2014:3). He did not follow the regulatory standards in accounting for bad debts (Myburgh, 2014:7). It was he who masterminded the adoption of the incorrect method of accounting for bad debts (IAS 39) and their provisioning (Myburgh, 2014:3–17). Myburgh, (2014:3) had this to say: “… the bank was conducted in a manner not to intentionally defraud creditors but was run in a reckless manner”. 14 4.4.2 International corporate fraud cases The international cases of fraud under review in this section are Enron, WorldCom and Lehman Brothers. They are analysed in the same way as the South African cases. 4.4.2.1 Enron (Lay, Skilling, Fastow) Summary of the fraud case: Skilling headed Enron from the 1990s to 2000 (Rapaport, 2003:1373). Enron was the third largest energy company in USA at the time (Rapaport, 2003:1373). Surprisingly, four months after Skilling's departure from Enron, the company crashed into bankruptcy. This prompted the Department of Justice to put together an Enron Task Force (Skilling v. US, 2010). The taskforce found that the company had been manipulating its short-term stock price through overstating Enron’s financial position. This led to the indictment of Skilling (Skilling v. US, 2010). Skilling and two other directors were then charged with deceiving the investing public and shareholders by manipulating the company's financial statements, and by making public statements which were false and meant to deceive the investing public (Skilling v. US, 2010). Skilling was charged with a further 25 counts of securities fraud, making misrepresentations to external auditors, and insider trading (Skilling v. US, 2010). Skilling, the CEO, and Lay, the former President and CEO of Enron, were also charged with creative accounting, accepting illegal gratuities, and side dealing (Rapaport, 2003:1376). Lay had received $152 million in payments and stock. Fastow, the CFO, had covered the $1 billion debt by deceptive accounting practices. Skilling was found guilty of conspiracy, 12 counts of securities fraud, 5 counts of making false representations to auditors, and 1 count of insider trading, (Skilling v. US, 2010). 4.4.2.2 WorldCom (Ebbers & Sullivan) Summary of the fraud case: Ebbers, the former CEO of WorldCom, was sentenced to 25 years in prison for his involvement in conspiracy and wire fraud while he was the head of WorldCom (US v. Ebbers, 2006). Prior to the discovery of WorldCom’s bankruptcy, Ebbers had been under increasing personal financial pressure: he owed the banks US$ 400 million which he had borrowed to pay for his WorldCom shares (US v. Ebbers, 2006). As the market was in a downward trend at the time, the shares were losing value and banks were calling for the margins to be filled by more shares Scharff (2005:109). Ebbers’ approach was to look after his own interests, not those of the company’s investors (Scharff, 2005:110). He abused his position by ordering that the financial statements to be adjusted to reflect a more desirable and advantageous position – for himself (US v. Ebbers, 2006). Scharff (2005:109) notes that WorldCom reported accounting irregularities of $11 billion at the time. Securities Exchange Commission (SEC) (2003:3) says WorldCom practised public company accounting fraud to a value of more than $ 9 billion, with its use of false or unsupported accounting entries (which then found their way into the financial reports), achieved a desired financial outcome. Sullivan (CFO and co-conspirator), fraudulently accounted for $3.8 billion of operational expenses as capital expenses (management fraud) (SEC 2003:5). 4.4.2.3 Lehman Brothers Holdings (Fuld) Summary of the fraud case: Fuld was the Chief Executive Officer of Lehman (Valukas, 2010:4). Under his stewardship, he pursued highly leveraged operations financing risky business models through Lehman’s operations (Wiggins, Piontek & 15 Metrick, 2014:2). In September 2008, Lehman filed for bankruptcy, with investors loosing over US$ 639 billion in assets (Wiggins et al., 2014:1). Among the several reasons for its collapse was the fact that Lehman had pursued a significantly aggressive business model, underpinned by high leverage ratios and a significant number of balance sheet manipulations. All this was done to earn short-term rewards, most of which accrued directly to the executive management, including Fuld, by way of performance bonuses and other incentives (Valukas, 2010:4). Maux and Morin (2011:15), and Mawutor (2014:87) argue that the management intentionally manipulated financial statements, and this view is supported by Chadha (2016: 4). Illegal gratuities amounting to over $500 million were clandestinely paid to “favoured” management (Ross & Gomstyn, 2008:11). 4.4.3 Summary of how capability components were abused in these six fraud cases Position/ Function: In all six cases, the perpetrators of fraud were the CEOs who abused their privileged positions by pushing their colleagues and staff members to implement their self-serving and ill-advised decisions, which were blatant conflicts of interest (Financial Services Board, 2004; S v Brown, 2013; Myburgh, 2002:5; Chadha, 2016:3; Mawutor, 2014:85; Skilling v. US, 2010). Brains: use of experience and cunning: The fraud experience and cunning of the fraud perpetrators enabled their schemes to escape immediate notice. All of them were experienced in their businesses’ specialist areas of operations, and because of that experience they were able to push colleagues to support the questionable decisions and actions which caused the corporate failures (Adu-Gyamfi, 2016:133; Chadha, 2016:2; Duncan, 2012:13; US v. Ebbers, 2006; Myburgh, 2014: 15; Myburgh, 2002: 10) Confidence and ego: In the Fidentia, Lehman brothers and WorldCom cases, the executive management had full control of the board of directors, and they were thus able to get what they wanted out of their corporations - including ostentatious luxuries (Financial Services Board, 2004:12; Ross & Gomstyn, 2008:6; US v. Ebbers, 2006). Levenstein at Regal Treasury bank exhibited confidence, managing to convince his board of directors that they had nothing to worry about: as he was always ‘on top of the situation’ (Myburgh, 2002:11). Fundamental his initial success, Brown was described as being very persuasive and focussed (S v Brown, 2014). Cohesive power: The management at Fidentia, Lehman Brothers, WorldCom and Lehman Brothers abused their fiduciary obligations by either coercing their subordinates or recruiting them to falsify accounting records (S v Brown, 2013:15; US v. Ebbers, 2006; Valukas, 2010:4). They also rewarded their recruited accomplices including members of the boards of directors to keep quiet (Chadha, 2016:3; Valukas, 2010:3; Skilling v. US, 2010).Ebbers in particular, created and exerted pressure on employees to participate in and sustain the fraud (Gershon & Alhassan, 2004:2-4). Effective liars: The CEOs of Lehman Brothers Holdings, Enron, Fidentia and Regal Treasury Bank were able to consistently lie to institutional investors, their directors, senior colleagues, and the regulatory bodies, (Ross & Gomstyn, 2008:5; Skilling v. US, 2010; Myburgh, 2002:4-6). They were thus able to conceal the frauds which were brewing in their corporates (Financial Services Board, 2004:22). As the pressure of concealing the fraud became unbearable for an individual to cope with, WorldCom 16 management, for example, created a group of liars called "Close the Gap" who would meet monthly to distort the financial figures in order to meet the market's expectations (US v. Ebbers, 2006). Ability to handle stress: The perpetrators of fraud all exhibited immense talent in being able to handle stress (US v. Ebbers, 2006; Skilling v. US, 2010; Ross & Gomstyn, 2008:11; Myburgh, 2002: 8; Myburgh, 2014: 17; S v Brown, 2013). In the storms caused by their collapsing "deck of cards" both Ebbers and Brown remained calm and focussed; right through to his last court appearance, Brown never looked fatigued in public (S v Brown, 2013). 4.4.4 Practical deductions from these fraud cases Fraud case similarities: The main frauds committed in all the six cases were: fraudulent financial reporting; illegal gratuities; non-compliance with statutory regulations (Financial Services Board Inspection Report, 2004; S v Brown, 2013; Myburgh, 2002: 5; Chadha, 2016:3; Mawutor, 2014:85; Skilling v. US, 2010; US v. Ebbers, 2006), and securities fraud were prominent in Enron and WorldCom (Skilling v. US, 2010; US v. Ebbers, 2006). The CEOs in all cases were integral to the initial successes and daily operations of the companies they led, and they all managed to coerce the boards of directors into accepting their way of thinking, either by intimidation, manipulation or by ensuring the board members were intellectually inferior to themselves (Financial Services Board Inspection Report, 2004; S v Brown, 2013; Myburgh, 2002: 5; Chadha, 2016:3; Mawutor, 2014:85; Skilling v. US, 2010; US v. Ebbers, 2006). All CEOs in the fraud cases analysed above had already developed a culture of fear within their organisations two years prior to the downfall of their companies. Kirkinis of African Bank, Levenstein of Regal Bank, Brown of Fidentia, Ebbers of WorldCom, Fuld of Lehman and Lay, Skilling and Fastow of Enron were all successful in manipulating their boards of directors, rendering them useless by overriding or ignoring their oversight functions (Financial Services Board Inspection Report, 2004; S v Brown, 2013; Myburgh, 2002: 5; Chadha, 2016:3; Mawutor, 2014:85; Skilling v. US, 2010; US v. Ebbers, 2006). All CEOs successfully misrepresented the qualitative and financial information presented to the boards of directors to conceal their management fraud and the misrepresentation arose because management was driven by unbridled ego and unrestrained personal drive to succeed, and when the operating environment became tougher for their companies, they became consummate liars and excellent at handling stress (Financial Services Board Inspection Report, 2004; S v Brown, 2013; Myburgh, 2002: 5; Chadha, 2016:2; Mawutor, 2014:85; Skilling v. US, 2010; US v. Ebbers, 2006). Factors enabling capability abuse: The CEOs had a mandate to nurture the companies they led, to preserve the assets while maximising returns for shareholders. In addition, they were psychologically and emotionally attached to “their” companies, having helped to bring them to their positions of standing within their industries (this was particularly evident in the case with Ebbers, Kirkinis, Fuld, Brown, and Levenstein) (Myburgh, 2002: 5; Myburgh, 2014:14; S v Brown, 2013; US v. Ebbers, 2006; Chadha, 2016:4) . Further to this, the majority of CEOs believed they had to manage their entities’ stock prices (rather than the businesses themselves), to ensure that the stock price did not drop, because the company and the CEOs personally would suffer massive losses as they all had significant allocations of stock and options (Financial Services Board Inspection Report, 2004; Myburgh, 2002:5; Mawutor, 2014:84-85; 17 Skilling v. US, 2010; US v. Ebbers, 2006). In other words, the CEOs chose to manage their wealth through the companies they were leading (conflict of interest). Enabling environment: The most noticeable factor that enabled the frauds to be committed was that management (CEOs) had complete control of the so-called four pillars of good corporate governance (Institute of Directors, 2016:17). These pillars are the board of directors and senior management; risk management; internal audit, and the external auditors (Institute of Directors, 2016:18). The pillars were incapacitated (board of directors, internal audit), giving the miscreants the latitude to commit fraud (Myburgh, 2002: 5; Myburgh, 2014:14; S v Brown, 2013; US v. Ebbers, 2006; Chadha, 2016:4). Mawutor (2014:84-85) argues on the Lehman’s case that the Wall Street business operating environment encouraged greed and deceit, and rewarded handsomely the achievement of the corporate profit targets. This system pushed the CEOs of WorldCom to misrepresent financial results in order to secure their rewards. In summary, the reward system appears to have promoted deceit (Ashraf, 2011:23). The perpetrators in the three South African fraud cases were the founders of their organisations, and because of this, they were respected and feared (Financial Services Board Inspection Report, 2004; Myburgh, 2002: 5; Myburgh, 2014:14; S v Brown, 2013). This environment persuaded them to believe they could do whatever they wanted. 4.5 Summary The research thus far points out that key management and the board of directors are associated with high median losses per fraud, and that executives and owners commit more severe acts of fraud than do ordinary employees. The reason for this appears to be capability abuse. The Chief Executive Officers, Chief Financial Officers and senior managers abuse their positions, exercise coercive power, let egos run unchecked, handle stress effortlessly and have the ability to lie convincingly to commit fraud. They have the capability to collude with or coerce colleagues and employees, and to override even tight internal controls. Where executives are involved in crimes, the board of directors’ oversight role has usually been severely weakened. Thus, by the time the economic crime is discovered, its effects are usually severe, if not catastrophic (total collapse of the business). The regulatory authorities are informed too late to enable them to act in a preventative or mitigatory manner: the perpetrators have employed their capability to conceal their fraudulent acts until the crime collapses the entity. The concealment measures are well crafted with the perpetrator’s egodriven perception being that if caught, he can talk himself out taking responsibility for the crime. This establishes the need for organisations to manage the risk of capability more intentionally and directly. Possible ways of managing this risk are discussed next. 5 MANAGING CAPABILITY A task force of representatives from the IIA, AICPA and ACFE (2008:7 & 55) concluded that only through diligent and on-going effort, is an organisation able to protect itself against significant acts of fraud. The task force proposed five principles for managing an organisation’s fraud risk: putting a fraud risk management program in place; performing periodic fraud risk exposure assessments; establishing prevention techniques to avoid potential fraud; establishing detection techniques to uncover 18 fraudulent events where preventative measures fail, and having a formal approach to ensure fraud is addressed appropriately and promptly. Guidance issued by IIA, AICPA and ACFE (2008:7 & 55) indicates that it is management’s responsibility to give effect to these principles, making management responsible for identifying the risks of fraud as well as managing these risks. This view is supported by Ernst and Young (2013:3) and Committee of Sponsoring Organisations of the Treadway Commission (COSO) (2013: 2), who define risk assessment as a systematic approach by management, where managers identify risks to business operational cycles, evaluate such risks, and quantify them against the control activities in place. Although it is generally accepted that the responsibility for managing the risk of fraud in organisations rests with management, this study has pointed out that, it is management itself that poses the biggest fraud risk associated with capability. The remainder of this literature review addresses strategies to manage the risks associated with capability. 5.1 Risk assessment The appropriate use of abilities and traits needs to be monitored to ensure that they are not abused by management to commit fraud. The following steps, according to the IIA, AICPA and ACFE (2008:7, 55), and Cotton (2016:9), forms part of a risk management plan which focuses on risk identification, risk assessment (determining probability and impact) and risk response. 5.1.1 Risk identification The IIA, AICPA and ACFE (2008:8), define risk identification as the gathering of external information from regulatory bodies, industry sources, key guidance-issuing groups, and professional organizations; the Association of Insurance and Risk Managers (AIRMIC), the public sector risk management association (Alarm) and the Institute of Risk Management (IRM) (2010:8), summarize risk identification as establishing an organisation’s risk exposure. Rollason (2011: 3-5), advises that the full list of the potential fraud risks and schemes that may face the organization must be enumerated. The internal risk identification also includes a review of whistle-blower complaints, and analytical procedures to address such information (IIA et al., 2008:7). The IIA et al., (2008:8) direct that an effective fraud risk identification process aimed at controlling capability, also includes an assessment of the incentives, pressures, and opportunities management faces in their operations which may drive (or tempt) them to abuse their capability and to commit fraud. The IIA et al., (2008:8) advise that management incentive programs and how they are calculated and structured, may provide an effective basis for risk assessments that address capability abuse. The IIA et al., (2008:8) further direct that, while engaged with the process of risk identification, the fraud risk practitioners need to consider the risk that management might potentially override controls; the process includes identifying areas where controls are weak and where there is insufficient separation between management’s duties and the business’ operational processes, thus enabling management to abuse their capabilities and to commit fraud. 19 51.2 Risk assessment - Likelihood /probability To effectively manage the risk of capability abuse, COSO (2013:6) advises that the organisation needs to assess the probability of capability abuse and the impact on the organisation, should it happen. The IIA et al., (2008:8) advises that management (and fraud risk practitioners) need to effectively assess the probability of a capability abuse risk materialising. It is advisable that the likelihood of each risk materialising be assessed as either remote, reasonably possible, or probable (IIA, AICPA and ACFE, 2008:55). McNeal (2011:3) is in full agreement with the literature reviewed above, and recommends that the setting up of independent structures to assess the risk of capability abuse by senior management be put in place by the board of directors, and approved by shareholders. This ensures that the likelihood of capability abuse is always controlled. 51.3 Risk assessment - Significance/ impact ACFE (2018:5) notes in their most recent assessment that senior executives accounted for 19% of the total number of reported cases of fraud, but that the median loss per fraud committed by these executive is $850 000. The IIA et al., (2008:8) advises that although assessing risk significance is a subjective process, nevertheless, management as well as fraud risk practitioners need to assess the significance (impact) of the occurrence of a perceived risk (in this instance capability abuse). Ernst and Young (2013:10) describe risk significance as the probable impact on the operations and profitability of the company of the risk, should it materialise. Management and fraud practitioners must therefore seriously evaluate the financial effect, damage to reputation, and ability to achieve key goals and objectives when assessing fraud arising from capability abuse (Ernst and Young, 2013:10). Fraud practitioners should not only consider monetary significance when they assess the impact of capability abuse, but also its impact on the corporate’s reputation (particularly with regard to its financial reporting), and operations, and its standing with regard to legal and regulatory compliance requirements (McNeal 2011:9). International Standards Organisation (ISO) 31000 (2009:13) advocates that corporates should develop benchmarks against which to establish the significance or materiality of the identified fraud risks, and then respond to those risks that are above the agreed materiality levels. Materiality can be categorised in terms of financial brackets for financial risks, days of disruption for operational risks, and share price declines as a measure of reputational risk (ISO 31000, 2009:13). The IIA et al., (2008:56) also advises that, just as management is required to identify fraud risks associated with capability abuse, it is also important to identify the people both in- and outside the organization that are at risk of abuse or are at risk of abusing their unique capabilities. The knowledge will assist the organisation in fashioning its fraud risk response, which may include “establishing appropriate segregation of duties, proper review and approval chains of authority, and proactive fraud auditing procedures” (IIA et al., 2008:56). 5.1.4 Risk response 20 Risk responses are the steps taken by management to mitigate the identified fraud risks associated with capability abuse, so as to reduce the probability that the risk will occur, and thus to decrease the significance (impact) of the risk (ISO 31000, 2009: 15). The ISO 31000 risk standard elaborates that the monitoring of the effectiveness of the existing controls and the implementation of additional controls, are fundamental components of the fight against fraud arising from capability abuse. ISO 31000 (2009:15) notes that risk assessment is best managed through the creation of a risk register. The risk register is an action plan which considers currently active controls and any further mitigatory actions that could or should be implemented to reduce the probability of the risks occurring, and how to counteract their significance/impact. Cotton (2016:11) argues that management (and fraud risk practitioners) need to identify who might be tempted to abuse their capabilities, and to determine what the fraud schemes or expense manipulations they are likely to engage in. Cotton (2016:12) further says that there is a need to identify existing anti-fraud control procedures with respect to identified fraud schemes or capability abuse risk, and thereafter to assess the effectiveness of each existing control procedure, establish the residual risk after considering the effectiveness of the existing controls, and then to decide on the response to the residual risks that remain above the materiality levels. Risk response can take the form of controls that reduce the probability of capability abuse happening, and putting in place measures that reduce the impact of capability abuse on the organisation (COSO, 2013:12). Should the risk of capability abuse be realised, then the board of directors must authorise and monitor investigations into the alleged capability abuse case (McNeal, 2011:8). Specifically, McNeal (2011:9) advises that the board should put in place a system that permits “timely, competent, and confidential evaluation, investigation, and resolution of allegations” involving potential fraud arising from capability abuse, and that the procedures for this system are formally documented. 5.2 Internal Controls The ACFE (2018:26), indicates that fraud cases are prevalent in organisations where internal controls are non-existent or are being imperfectly implemented, and where internal controls are able to be overridden by the perpetrators. In the same vein, the IAA et al., (2008:52) identify that management is responsible for implementing controls and therefore have the opportunity to exercise their capability, including the manipulation of the internal control system. To mitigate this risk, Gershon and Alhassan, (2004:7), as well as the ACFE (2018:18) and McNeal (2011:8-9) suggest that external third party controls are more effective: examples of such controls include internal and external reviews; audit committee appointments; engaging independent directors to serve on boards; establishment of whistle-blowing and other fraud reporting lines; ethical codes of conduct with formal acknowledgement being required from each member of staff, and strict and rigorously instituted action against management found to be in contravention of the entity’s policies. The ACFE (2016:17), suggests that organizations may reduce the duration and cost of fraud events by implementing internal control processes that increase the likelihood of active (real-time) detection, thus, “active management review, attentive account reconciliation, and surveillance or monitoring techniques". The ACFE (2018:4), further recommends that constant data monitoring and analysis, and surprise internal and 21 external audits, may limit management’s opportunities to commit fraud by detecting the red flags promptly, and quickly addressing them. The probability of detection should therefore be increased by increased frequency of active management reviews and account reconciliations (Dorminey, Fleming, Kranacher & Riley, 2010:23). Both active and passive detection methods must be instituted and supported by the board of directors through the executive management of the organisation. A review of such detection methods must be independently verified by an expert from outside the organisation who is appointed by the Board, like external auditors (Cotton, 2016:13). 5.3 Anonymous reporting line for fraud and ethics violations The ACFE (2016:17), found that external audits and whistle-blowers are impactful in the control of fraud since their actions correlate with lower fraud losses and reduce the time taken for their detection. Whistle-blowing and fraud/ethic hotlines are essential in an organisation of any size, and should preferably be implemented and administered from outside the corporate set-up (Dorminey, et al., 2010:22). The facility may be out-sourced or handled internally without compromising the effectiveness of the concept (Radebe and Another v Premier, 2012). The management of the facility must be ethical and professional, and as a fundamental service it must afford the utmost protection for the whistle-blowers from retaliation by the perpetrators he/she reports (Kranacher, Riley & Wells, 2011:112). The whistle-blowing frame-work must be handled by trained personnel (Institute of Directors, 2008:78), and the potential users must regularly be reminded of its availability, the situations in which it can be used, and particularly that the system protects the confidentiality of the whistle-blower (McMahon, Pence, Bressler & Bressler, 2016:18-19). Furthermore, action taken in response to reported cases of fraud that turn out to be genuine, and the final outcome of the case, must be shared with the whistle-blower (Albrecht et al., 2012:97-110, Kranacher et al., 2011:111). This facility keeps the management excesses in check and reduces the commission of fraud by directly checking and reporting on capability abuse by management. 5.4 Operational policies To manage fraud risk from the top down, organisations need to consider reviewing their various operational policies, including their human resource policies. Kranacher et al., (2011:95-97) have noted a direct correlation between senior managers’ length of employment by an organisation and the likelihood that they will abuse their position/authority and commit fraud. They therefore recommend a fixed term employment contract as a way to reduce the probability of the commission of fraud. Albrecht et al., (2012:75-83) similarly recommend that management (who must always be exemplary), must regularly be required to sign binding documents addressing conflict of interest, and confirming their adherence to a professional code of ethics, in an effort to dissuade them from committing fraud. McMahon et al., (2016:18) suggest, as the best way to reduce the likelihood of fraud due to capability abuse, the rigorous enforcement of all policies including the prosecution of fraudsters, and the publicizing of successful convictions. Companies must implement a code of ethics as part of operational policies, and have employees read and sign such policies periodically, again to reinforce ethical conduct and to emphasise that it is important to the company, and as a way of ensuring 22 employees are fully aware of the operational and other controls that comprise a conscious corporate culture (Albrecht et al., 2004; Hopwood, Leiner & Young, 2011: 53). AICPA (2002:1756–1766), supports the implementation of policies that control for opportunities to commit fraud. SAS No-99 maintains further that fraud can be contained by creating a culture of integrity and the practice of a high level of ethics within the organisation. The auditing standard further maintains that antifraud processes and controls must be frequently evaluated to identify points of weaknesses so as to take remedial action before the weaknesses are exploited. 5.5 Oversight Structures AICPA (2002:1756–1766) suggests putting in place an appropriate oversight process which includes at the absolute minimum: a sub-committee of directors; an independent audit committee; internal and external auditors, and certified fraud examiners, supported by ethical management, to extinguish any temptation to commit fraud by those charged with stewardship of the organisation they lead. Krambia‐Kapardis (2002:267) recommends that a strong-willed, committed and investigative board of directors, together with satisfactory internal control systems and proactive and skilled independent auditors must be continuously engaged in the operations of the organisations. In line with the assertion above, Wolfe and Hermanson (2004:3) suggest that the directors, charged with oversight of the business entity, need to reassess the capabilities of top executives and key personnel periodically. Jones (2011:28) recommends that with regard to the oversight structures, there must be a clear division of responsibility between the Chief Executive Officer and the Board of Directors’ chairman. This enforces segregation of duties: those executives who are tempted to abuse their capability to commit fraud might thus be controlled by the knowledge that others are overseeing high level operations and themselves. Jones (2011:28) says “this prevents the unmitigated exercise of power (component of capability) by one person”. Going hand-in-hand with the above observations, the board members so appointed must be proactive, skilled, experienced, independent and diligent in exercising their duties free of any limitation (McNeal, 2011:8-10). To attain this, the board members themselves must participate in continuous professional development in order to prepare them to appraise management’s anti-fraud risk assessment methodology (Silver, Fleming & Riley, 2008:46-48). Jones (2011:18) argues that the board must be allowed to report red-flag incidents directly to the regulatory authority should the executive management show signs of insubordination or reluctance to implement the board’s recommendations. He further recommends that a structured report, with analytics designed to find and highlight red-flag events and situations, and designed by and distributed by the regulators to organisations as part of their reporting compliance, could prevent the commission of fraud, provided that the regulators promptly investigate all red-flag events. Boards of directors must be empowered, according to Jones and Welsh (2012:354), to provide sufficient oversight and to exercise restraint over management to prevent maleficence. This is achieved by promoting robust and independent risk assessment of management’s operations, including the activities of the CEO and other executive directors (Hopwood, 2011:55). The Board’s performance must periodically be independently evaluated by the shareholders through a shareholders-appointed agent and in conjunction with the external auditors (Institute of Directors, 2016:58). 23 In managing executive management’s opportunities and proclivities for capability abuse, there must be a committee responsible for risk oversight (of both the board of directors and management), whose most important duty is to “assess and respond to risk of fraud”, and in particular management fraud, because management has the capability to override operational controls to the detriment of the organisation (IIA et al., 2008:12). In this joint paper the IIA et al., (2008:12) further recommend that the committee charged with risk oversight must meet regularly and for long enough periods, after having thoroughly prepared for the meetings, to deliberate on and respond to risks that threaten the organisation’s operational efficiency. Preparation for the meetings ensures that the committee members have a comprehensive understanding of what is happening in the operational areas of the business, and have prepared pertinent and robust questions for those responsible for operational management. Wolfe and Hermanson (2004:3), explicitly recommend that management and the board of directors must independently assess the capabilities of key substantive managers by analysing “situations offering capability and opportunity". If it is observed that there are situations indicating the possibility of capability abuse, then the governing body must respond promptly and appropriately. Ongoing reassessments of capability must be done in order to discourage/reduce the abuse of capability by top executives and key corporate managers (Wolfe & Hermanson, 2004:4). The response to capability abuse must be decisive and swift in order to dissuade further commission of fraud through capability abuse. 5.6 Responding appropriately to fraud Dellaportas (2012:29-33), argues that senior managers/executives who generally commit fraud are fearful of the risk of prosecution, high litigation costs, the severity of the stigmatization and its impact on their social and professional standing. In view of this observation, the propensity of executives to commit fraud can be countered if the penalties arising from the commission of fraud are high enough, and the probability of detection is also high (Votey & Phillips, 1973:223-224). It is therefore necessary to prosecute the offenders. The authorities, including those enforcing the regulatory frameworks, must encourage the reporting of fraud to law enforcement agents, and insist that thorough investigations are carried out. This alone will ensure that appropriate punishment is levied on offenders (Dellaportas, 2012:29-33; Dorminey, et al., 2010:22). The severity of the punishment must be deterrent enough to discourage further commission of the offences (Votey & Phillips, 1973:223-224). Merely dismissing the perpetrator from employment, or requiring/allowing the fraudster to resign, is not sufficiently severe punishment to dissuade others from committing similar frauds. 5.7 Effective and efficient legislation and regulations addressing capability abuse As pointed out earlier, management is responsible for risk management in organisations, while also being in a position to abuse their capability. One of the ways to effectively control fraud arising from capability abuse, is to successfully prosecute offenders, a process that requires efficient and sufficiently severe deterrent legislation (McMahon et al., 2016:18). Some of the South African legislation directed at curbing fraud related to capability abuse, are the Companies Act, No 71 of 2008, the Financial Intelligence Centre Act (FICA), No 38 of 2001, and the Prevention and Combating of 24 Corrupt Activities Act, No 12 of 2004 (PRECCA). These pieces of legislation are discussed below. 5.7.1 The Companies Act, No 71 of 2008 Davis (2010:411), observed that the Companies Act’s objective is to ensure that wrong-doing is discouraged and punished, through an effective system of corporate governance, and disclosures. Werksmans Attorneys (2018:1), also claim that the Companies Act increases the accountability of directors to the company’s shareholders. Meskin (2011), adds that holding directors to account for their actions also dissuades the directors from committing fraud by intentionally abusing their capabilities. Deloitte (2013:23), notes that section 76 of the Companies Act sets out guidelines on the standards of conduct directors should be required to adhere to in order to eliminate fraud arising from capability abuse. Deloitte (2013:23) further observes that section 76 (2) (a) provides guide lines for directors, including that they should not to abuse their positions as directors; should refrain from using any information obtained while acting as directors to gain a personal advantage, and should not knowingly cause prejudice to the company or its subsidiaries. These provisions aim to constrain the capability components of position/ function, cohesive power and unique skills, which are very often those attributes abused by directors tempted to commit fraud. Section 218 (2), as cited by Meskin (2011), exposes convicted directors to civil action by the aggrieved party or parties. The provision is intended to control the excesses of the fraudulent acts of the director/ senior management by limiting their abuse of power, position, and reckless ambitions. It is a given that any breach of the fiduciary duty of a director can, under statutory and common law, be regarded as fraud (S v Gardener, 2011). 5.7.2 The Financial Intelligence Centre Act (FICA), No 38 of 2001 De Koker (2005:715–745), notes that FICA compels certain persons and institutions, identified as "accountable institutions'', “to identify and verify the identity of a new client” before any transaction may be concluded or any business relationship established. This general objective of FICA is to discourage directors and senior management from committing fraud by claiming ignorance and/or innocence, since the Act stipulates that it is the directors who must identify and verify a new client in order to avoid being implicated in suspicious and/or fraudulent transactions. De Koker (2003:3) draws attention to the fact that section 21(1) of FICA specifies that the accountable institution must identify and verify the truthfulness of the client’s intended transactions, and must verify whether the transaction is legitimate or not. Sections 27 and 28, compel the directors of an accountable institution to report cash transactions above a prescribed limit, and report suspicious and unusual transactions. In this respect, de Koker (2003:8) additionally interprets the section to mean that directors of accountable institution must report transactions in which the institution itself is a party, and which exceeds the prescribed limits. In the same vein, section 28 recommends that the institution also reports suspicious transactions in the form of conveyance of cash to and from South Africa, electronic transfers of money to and from South Africa and any other suspicious and unusual transactions (de Koker 2003:7-9). Maroun and Gowar (2013:181–182) contend that section 29 of FICA imposes a general duty on all businesses, and every employee, to report transactions which are known to involve, or are suspected to involve, the proceeds of crime or to constitute tax evasion. Failure to identify persons, to keep records, or to report suspicious transactions, and the 25 destruction of records, are all prosecutable offences under sections 46-52 of FICA (De Koker 2003:15). 5.7.3 The Prevention and Combating of Corrupt Activities Act, No 12 of 2004 (PRECCA) According to Corruption Watch (2015), PRECCA defines the general offence of corruption and similar specific offences, and also provides guidance on the investigative and preventative measures legally employable in the fight against corruption. Sections 3 to 21 of PRECCA define offences in respect of corrupt activities committed by employees or senior managers of businesses (Burchell, 2013:782). Corrupt activities are defined in section 3; sections 4 to 21 thereafter identify offences of corruption relating to specific individuals (Burchell, 2013:782). Section 26 then specifies penalties for persons found guilty of contravening the provisions of PRECCA: these range from a fine or a maximum term of imprisonment of 5 years for offences tried in the Magistrate Courts, and to life imprisonment if found guilty in a case referred to the High Court ((Burchell, 2013:785; Wakefield, nd:167-168). 5.8 Summary This study responds to the problem that senior management commit frauds that are more severe than those committed by ordinary employees. The losses associated with such frauds have a high median value far greater than that for frauds committed by lower ranked employees, and often lead to the ultimate failure of organisations. The purpose of this study is to broaden the understanding of “Capability” – the fourth element in the Fraud Diamond construct - as proposed by Wolfe & Hermanson (2004:1-4). The aim of this part of the study was to analyse the components of and cultivating factors resulting in capability abuse as a significant cause of the frauds that led to significant corporate failures both in South Africa and in the USA. The study reviewed the impact of capability abuse by top executives on the organisations they lead. The study identified the components of capability: position or function of the perpetrator; a brain that is experienced and demonstrates craftiness in the area of a person’s dominance; arrogance; cohesive power; being an effective liar, and lastly being able to manage stress. The study discovered that a perpetrator of fraud does so because there are factors in addition to the advantages his professional skills afford him that make it attractive for him to execute the fraudulent act. Some of the cultivating factors noted are the desire to protect their organizations or present them in a better light; management feels pressured to meet the requirements of third parties; ineffective monitoring of management; lust for personal gain by those charged with governance; excessive pressure on management/ operating personnel to meet financial targets set by the board of directors; unusual and strongly held personal, political and religious beliefs; fear of losing their reputation, and a complex or unstable organisational structure. Red flags associated with these cultivating factors were identified as they are important in directing the attention of fraud practitioners to sources of capability abuse. The discussion of fraud risk assessment evaluated how a fraud practitioner would do risk identification (capability abuse in this instance), establish the likelihood or 26 probability of a risk materialising and the risk’s significance or likely impact, and evaluate the entity’s response to risk. To affirm and substantiate the views obtained from the literature review, an analysis was performed of six prominent court cases involving commercial fraud. Three prominent South African court cases involving economic crime (Fidentia, Regal Treasury Private Bank and African Bank), as well as three court cases settled in the USA (Enron, WorldCom and Lehman Brothers) were reviewed. The latter part of the study looked at strategies that are independent of management and which must be instituted to prevent fraud linked to capability abuse. Such strategies include internal controls monitored from outside the corporate; anonymous reporting line for fraud and ethics violations; well-crafted and publicised operational policies; effective oversight structures; appropriate responses to the discovery that fraud has been committed, and effective and efficient legislation and regulation which addresses capability abuse from a public benefit point of view. More specifically, this part of the study gave the following pointers for managing capability: Sections 5.2, 5.3 and 5.4, pointed out that it is essential for corporate entities must implement a fraud policy and a dedicated telephone/email hotline. Where suspicion of management can be reported, there must be protection of the identity of the whistleblower. This should be accompanied by the implementation of a code of ethics which should be signed periodically by employees, to reinforce their understanding of the constituents of ethical conduct and promoting of a corporate culture that abides by the provisions of the code of conduct, and thereby reducing fraud arising from capability abuse. Section 5.5 explained the necessity for a clear division of responsibility between the Chief Executive Officer and the Board of Directors’ chairman as this enforces the segregation of duties to curtail the abuse of capability and prevent the unmitigated exercise of power (component of capability) by one person. Furthermore, the oversight authorities within the entity’s structure, as well as the statutory regulatory agencies’ investigative and prosecutorial divisions must encourage the reporting of suspected fraud in form of capability abuse to the designated whistle-blower hot line mentioned above, and/or to law enforcement agents. Thorough investigations must be promptly conducted if there is predication. Section 5.5 of this article also points out that the regulatory framework including the board of directors must be highly responsive to the situations indicating capability abuse. The various aspects of capability need to be watched closely for aberrations that might indicate the abuse of a manager’s capabilities. This can be structured so as to be included in the monthly/ quarterly returns submitted by the reporting entity to the regulatory body; such a policy, where a review of the components of capability is evaluated by management themselves and the board of directors of the reporting entities, before submission to regulatory bodies, would focus directors’ attention on what is actually happening in the business. As alluded to in section 5.6 above, the penalties under statutory and regulatory provisions, and by extension the courts, should impose punitive penalties on perpetrators of fraud to discourage executives from leveraging their capabilities for 27 personal or other non-company benefits. Punishment must be severe enough to serve as a deterrent to others contemplating the commission of similar offences. Dismissal from the normal form of employment is not a sufficient punishment, and has proven ineffective in deterring the subsequent commission of economic crimes 28 References Abdullahi, R. & Mansor, N. 2015a. Concomitant debacle of fraud incidences in the Nigeria public sector: understanding the power of fraud triangle theory. International Journal of Academic Research in Business and Social Sciences, 5(5): 312-326. Abdullahi, R. & Mansor, N. 2015b. Fraud triangle theory and fraud diamond theory. Understanding the convergent and divergent for future research, International Journal of Academic Research in Accounting, Finance and Management Science, Vol. 5, No.4, Oct 2015: 38- 45. ACFE - see Association of Certified Fraud Examiners Adu-Gyamfi. M. 2016. The bankruptcy of Lehman Brothers: causes, effects and lessons learnt. Journal of Insurance and Financial Management. Vol.1 No.4: 132-149. AICPA - see American Institute of Certified Public Accountants AIRMIC – see Association of Insurance and Risk Managers Albrecht, W. S. 2003. Fraud examination. Chicago: South Western/ Thompson Albrecht, W.S., Albrecht, C.C. & Albrecht, C.O. 2004. Fraud and corporate executives: agency, stewardship and broken trust. Journal of Forensic Accounting. (5):109 – 130. Albrecht W.S., Albrecht C.O., Albrecht C.C. & Zimbelman F. 2012. Fraud Examination. 4th ed. USA: South Western Cengage Learning. Allan R. 2003. Fraud- the human face of fraud: understanding the suspect is vital to any investigation. CA Magazine-Chartered Accountant, 136(4): 39-40. American Institute of Certified Public Accountants (AICPA).2002. Statement on Auditing Standards (SAS) No. 99: 1719 – 1770. Ashraf, J. 2011. The accounting fraud at WorldCom the causes, the characteristics, the consequences, and the lessons learned. HIM 1990 (2015): 1107. Association of Certified Fraud Examiners. 2014. Report to the Nations on Occupational Fraud, and Abuse. Texas: ACFE Publishers. Association of Certified Fraud Examiners. 2018. Report to the Nations on Occupational Fraud, and Abuse. Texas: ACFE Publishers. Association of Insurance and Risk Managers (AIRMIC), the public sector risk management association (Alarm) and the Institute of Risk Management (IRM). 2010. A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000. London: Alarm Publishers Baz, R., Samsudin, R. S., Che-Ahmad, A.B. & Popoola. O.M. J. 2016. Capability component of fraud and fraud prevention in the Saudi Arabian banking sector. International Journal of Economics and Financial Issues, 6(S4): 68-71. 29 Beasley. M. S., Carcello, J. V. & Hermanson D. R.1998. Fraudulent Financial Reporting: 1987-1997. An Analysis of U.S. Public Companies. (Online). Available on: http://www.coso.org/publications/FFR_1987_1997.PDF/ . (Accessed on 2018-09-10): 71-82 Bierstaker J.L., Brody, R.G. & Pacini. C. 2006. Accountants' perceptions regarding fraud detection and prevention methods. Managerial Auditing Journal, 21(5):520-535 Burchell, J. 2013. Principles of Criminal Law. 4th Edition, Cape Town, Juta, Boyle, D. R., Carpenter B. W. & Hermanson, D. 2012. CEOs, CFOs, and Accounting Fraud. CPA Journal, 82(1): 62 - 65. Biegelman, M. T., Bartow, J. T. 2012. Executive roadmap to fraud prevention and internal control: creating a culture of compliance. Johannesburg: Wiley. Bressler, M. S, & Bressler, L. A. 2007. A model for prevention and detection of criminal activity impacting small business. The Entrepreneurial Executive, (12): 23–36. Corruption Watch. 2015. Understanding PRECCA. (Online) Available from: https://www.corruptionwatch.org.za/wp-content/uploads/2015/06/Corruption-WatchUnderstanding-PRECCA.pdf (Accessed on: 2018-11-07) Chadha, P. 2016. What caused the failure of Lehman Brothers? Could it have been prevented? How? Recommendations for going forward. Int J Account Res S1: (002): 1-8 Committee of Sponsoring Organisations of the Treadway Commission. 2013. COSO’s Internal Control – Integrated Framework. Cotton, D. 2016. The ACFE-COSO fraud risk management framework, unpublished Cressey D. R. 1953. Why Do Trusted Persons Commit Fraud? A Social-Psychological Study of Defalcators," Journal of Accountancy, (22): 973-979 Cressey, D.R. 1973. Other people’s money: a study in the social psychology of embezzlement. New Jersey: Patterson-Smith Crous C., Lamprecht J., Eilifsen A., Messier W., Glover S. & Prawitt D. 2012. Auditing and assurance service. First South African edition. McGraw-Hill Higher Education. Berkshire, UK. Davis. 2010. Dealing with corporate defaulters: Curbing the unfettered exercise of criminal law. Acta Juridica (411): 10. Deloitte. 2013. Duties of directors. (Online) Available from: https://www2.deloitte.com/content/dam/Deloitte/za/Documents/governance-riskcompliance/ZA_DutiesOfDirectors2013_16042014.pdf/. (Accessed on: 2018-08-12) De Koker, L, 2003, Money laundering control: the South African model, unpublished 30 De Koker, L. 2005. Client identification and money laundering control: perspectives on the Financial Intelligence Centre Act 38 of 2001. Journal of South African law, (4): 715745. Dellaportas. S. 2012. Conversations with inmate accountants: Motivation, opportunity and the fraud triangle, unpublished Dorminey J.W, Fleming A.S, Kranacher, M, and Riley, R.A. 2010. Beyond the Fraud Triangle, Enhancing Deterrence of Fraud. The CPA Journal. 80(July):17-23 Duffield, G. & Grabosky, P. 2001. The psychology of fraud. Trends & issues in crime and criminal justice. No. 199. Canberra: Australian Institute of Criminology. (Online) Available from: https://aic.gov.au/publications/tandi/tandi199/ (Accessed on: 2018-0812) Duncan, S. 2012. Causes of collapse: the failure of Lehman brother holdings, Inc. SSRN. 10(2139):11-20 Ernst and Young, 2013. Perspectives on risk assessment, (Online). Available from: https://www.ey.com/za/en/issues/business-environment/assessing-risk-andopportunity-in-africa/ (Accessed on: 2018-08-12) Financial Services Board. 2004. Inspection Report: Fidentia Asset Management, FSP No 569, 1-56 Fin24. 2014. African Bank not out of the woods yet, (Online). Available from: https://www.fin24.com/Companies/Financial-Services/African-Bank-not-out-of-thewoods-yet-20141107/ (Accessed on: 2018-10-13) Fin24. 2015. African Bank narrows loss to R2.8bn. (Online). Available from: https://www.fin24.com/Companies/Financial-Services/African-Bank-narrows-loss-toR28bn-20150626/ (Accessed on: 2018-10-13) Fin24. 2018. Jooste advised friends to sell Steinhoff stock before collapse, (Online). Available from: https://www.fin24.com/Companies/Retail/jooste-advised-friends-tosell-steinhoff-stock-before-collapse-20181010/ (Accessed on: 2018-10-13) Gershon, R. A. & Alhassan, A. D. 2004. Corporate Governance and Diffusion of Authority. Paper presented at the 6th World Media Economics Conference, HEC Montréal, Montréal, Canada, 12-15 May: 1-12. Girgenti R.H., & Hedley T. P. 2011. Managing the risk of fraud and misconduct. New York, McGraw Hill Gullkvist, B. & Jokipii A. 2012. Perceived importance of red flags across fraud types, Critical Perspectives on Accounting. 24 (2013) 44–61 Hopwood, W. S, Leiner, J. J, & Young, G. R. 2011. Forensic accounting and fraud examination, Second Edition, Illinois, USA 31 Institute of Directors in Southern Africa. 2016. King IV Report for Corporate Governance for South Africa, (Online) Downloaded from: https://www.adamsadams.com/wp-content/uploads/2016/11/King-IV-Report.pdf/ . (Accessed on: 2018-08-28) International Standards Organisation. 2009. principles and guidelines. Geneva. ISO 31000:2009, risk management International Accounting Education Standards Board. 2011. International Education Standard 8 (IES8), competence requirements for audit professionals, Institute of Internal Auditors, 2011. International Standard on Auditing 240: 1-78 Institute of Internal Auditors-IIA, The American Institute of Certified Public Accountants- AICPA & Association of Certified Fraud Examiners. Undated. Managing the business risk of fraud- a practical guide. (Online) Available from: https://www.acfe.com/uploadedfiles/acfe_website/content/documents/managingbusiness-risk.pdf. (Accessed on: 2018-09-22): 1-79 Institute of Internal Auditors. 2009. Consideration of Fraud in a Financial Statement Audit, (Online) Downloaded from: https://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AU -00316.pdf, (Accessed on: 2018-09-22) James, L., Bierstaker, R. G. & Brody, C. P. 2006. Accountants' perceptions regarding fraud detection and prevention methods. Managerial Auditing Journal, 21 (5): 520- 535 Jones, M. 2011. Creative accounting, fraud and international accounting scandals, Jones Michael (Ed), Texas. John Wiley and Sons Ltd. Jones R. M & Welsh, M. 2012. Toward a Public Enforcement Model for Directors' Duty of Oversight. Vanderbilt Journal of Transnational Law. 45 (2):343-403. Kassem, R. & Higson, A. 2012. The new fraud triangle model. Journal of Emerging Trends in Economics and Management Sciences (JETEMS), 3 (3):191–195. Khan, D.A. & Varma, T.N. 2016. Greed an attribute of fraudster. National Institute of Technology, Jamshedpur. 10 (2): 83-99 Kranacher, M. Riley. Jr. R.A, & Wells, J.T. 2011. Forensic accounting and fraud examination, USA, Wiley Krambia‐Kapardis M. 2002. A fraud detection model: A must for auditors. Journal of Financial Regulation and Compliance. 10(3): 266-278, Kovacich, G.L. 2007. Fighting fraud: how to establish and manage an anti-fraud program. Brussels, Butterworth-Heinemann Mawutor, J.K.M. 2014. The failure of Lehman brothers: causes, preventive measures and recommendations. Research Journal of Finance and Accounting 5(4): 85-91. 32 Loebbecke, J.K., Einning, M. M. & Willingham, J. J. 1989. Auditors’ experience with material irregularities: frequency, nature and detectability auditing. A Journal of Practice & Theory. 9 (1):1–28. Li, Y. 2010. The case analysis of the scandal of Enron. International Journal of Business and Management. 5 (10): 37-41 Maroun, W. & Gowar, C. 2013. South African auditors blowing the whistle without protection: a challenge for trust and legitimacy. International Journal of Auditing. 17: 177–189 Maux, J. & Morin, D. 2011. Black and white and red all over: Lehman brothers' inevitable bankruptcy splashed across its financial statements. International Journal of Business & Social Science, 2(20): 39-65. McMahon, R., Pence, D., Bressler. L. & Bressler. M. 2016. New tactics in fighting financial crimes: moving beyond the fraud triangle. Journal of Legal, Ethical and Regulatory Issues, 19 (1): 16 -25 McNeal, A. 2011. The role of the board in fraud risk management. Director Notes, The Conference Board. (Online) Assessed from: https://www.conferenceboard.org/competencies/publicationdetail.cfm?publicationid=2025&competencyID=4/ (Accessed on: 2018-10-13) Meskin PM (Ed) Hennopsberg on the Companies Act 71 of 2008 (Butterworth’s Durban 2011). Myburgh. S. C.2002 in terms of s 69A (11) of the Banks Act, 94 of 1990: Regal Treasury Private Bank Ltd, (in curatorship) Myburgh. S. C. 2014 in terms of s 69A (11) of the Banks Act, 94 of 1990: African Bank Limited, (Investigation) National Association of State Auditors, Comptrollers and Treasurers (NASACT) and the Oregon State Controller’s Division. (Online). Assessed from: https://www.agacgfm.org/Tools-Resources/intergov/Fraud-Prevention/FraudAwareness-Mitigation/Fraud-Triangle.aspx/ (Accessed on: 2018-09-22) Radebe and Another v Premier, Free State and Others 2012 (5) SA 100 (LAC) Rapoport, Nancy B. 2003. Enron, Titanic, and the Perfect Storm. Fordham Law Review, 71 (1): 1373 -1395 Rollason, V. 2011. Applying the ISO 31000 risk assessment framework to coastal zone management. BMT WBM Brisbane, QLD Ross, B., & Gomstyn, A. 2008. Lehman Brothers Boss Defends $484 Million in Salary, Bonus. (Online) Assessed from: 33 http://abcnews.go.com/Blotter/Story?id=5965360&page=1. (Accessed on: 2018-10- 01) Roebuck, S. 2016. Examining motivational factors that influence the likelihood of fraud. Unpublished Honour’s thesis. USA: East Carolina University. Rubasundram, A. G. 2015. Perceived “tone from the top” during a fraud risk assessment. Procedia Economics and Finance, 28(1): 102 –106, Rudewicz. F. 2011. The fraud diamond: use of investigative due diligence to identify the “capability element of fraud”. CTTMA Newsletter, 15(1): 1-12 Sawyer. L. B., Dittenhoffer M, A., & Scheiner. J. H. 2003. Sawyer’s internal auditing, the practice of modern internal auditing. 5th ed. Florida: Institute of Internal Auditors. Scharff, M. M. 2005. Understanding WorldCom’s accounting fraud: did groupthink play a role? Journal of Leadership and Organizational Studies, 11 (3): 105-116. Securities and Exchange Commission. 2003. Report of investigation by the special investigative committee of the board of directors of WorldCom, Inc. Washington, DC. (Online) Available from: https://www.google.com/search?rlz=1C1RNVH_enZA631ZA631&ei=GftSXPqHN8isg weLo5ioDQ&q=Securities+and+Exchange+Commission.+2003.+Report+of+investig ation+by+the+special+investigative+committee+of+the+board+of+directors+of+Worl dCom&oq=Securities+and+Exchange+Commission.+2003.+Report+of+investigation +by+the+special+investigative+committee+of+the+board+of+directors+of+WorldCo m&gs_l=psy-ab.3...1903643.1903643..1905071...0.0..0.0.0.......1....2j1..gwswiz.qAH95nOjgls/ (Accessed on: 2018-10-01) Skilling v. US, 130 S. Ct. 2896 - Supreme Court 2010, S v Brown (681/2013) [2014] ZASCA 217 (1 December 2014) S v Gardener 2011 (4) SA 79 (SCA) South Africa. 2001. Financial Intelligence Centre Act, No 38 of 2001. Government Gazette, (438) 22886: 1-28. (Online) Available from: http://saflii.org/za/legis/num_act/fica2001243.pdf/ (Accessed on: 2017-10-21) South Africa. 2004. Prevention and Combating of Corrupt Activities Act, No 12 of 2004, Government Gazette, (466) 26311: 1-46. (Online) Available from: https://www.saps.gov.za/dpci/downloads/prevention_combating_corrupt_activities_a ct.pdf (Accessed on: 2017-10-21) South Africa. 2008. Companies Act, No 71 of 2008, Government Gazette, (526)32121: 1-172. (Online) Available from: https://www.gov.za/sites/default/files/32121_421_0.pdf , (Accessed on: 2017-10-21) 34 Singleton, T. W. & Singleton, A.J. 2010. Fraud auditing and forensic accounting. 4th ed. USA: Wiley. Silver S.E, Fleming A.S, and Riley R.A. 2008. Preventing and detecting collusive management fraud. The CPA Journal, 78 (10):46-48 US v. Ebbers, 458 F. 3d 110 - Court of Appeals, 2nd Circuit 2006. Valukas, A. R. 2010. Lehman Brothers Holdings Inc. Chapter 11 Proceedings Examiner’s Report. (Online) Accessed from: https://old.datahub.io/dataset/lehman-brothers-report-valukas/resource/251fbd20a664-4cec-9796-b69d42f9452e/ (Accessed on: 2018-08-12): 4 Von Wielligh P., Prinsloo F., Penning G., Butler R., Nathan D., Kunz R., Motholo V., O’Reilly G., Rudman R. & Scholtz H. 2014. Auditing fundamentals in a South African context. Oxford University Press. South Africa. Votey, H. L., & Phillips, L. 1973. Social goals and appropriate policy for corrections: An economic appraisal. Journal of Criminal Justice, 1: 219–240. Wakefield, R. undated. No free lunches, a review of the law on corruption. The Quarterly Law Review for people in business, 13(4):167 – 168. Werksmans Attorneys. 2018. Companies Act No. 71 of 2008, Duties and Liabilities of Directors. (Online) Accessed from: https://www.werksmans.com/wpcontent/uploads/2013/04/Director-duties-and-liabilities-FINAL-updatedelectronic.pdf/. (Accessed on: 2018-10-22). Wolfe, D., & Hermanson, D. 2004. The fraud diamond: considering the four elements of fraud. CPA Journal, 74(12):1-4 Wiggins, R., Piontek, T. & Metrick. A. 2014. The Lehman brothers’ bankruptcy an overview. (Online) Available at: SSRN: https://ssrn.com/abstract=2588531/ (Accessed: 2018-08-22) 35