##plugins.themes.bootstrap3.article.main##

This study aims to identify methods in the detection of fraud in financial statements conducted by researchers in Indonesia. This research has been published on the website of the Ministry of Research and Technology with the SINTA 1 and SINTA 2 indexes. This research was conducted with a literature study on financial statement fraud in Indonesia. The research method used is a descriptive qualitative method by taking data from literacy studies on the research of fraud detection methods in Indonesia. The results of this study indicate that the fraud detection method used in financial reports in Indonesia is using the fraud Triangle method. The article of these studies is expected to provide input, insight, and information to all parties such as company management, auditors, and users of financial statements about various methods of detecting financial statement fraud in Indonesia.

Downloads

Download data is not yet available.

References

  1. AICPA. (2002). "AU Section 316 Consideration of Fraud in a Financial". October, 99, 113, 167–218.
     Google Scholar
  2. ACFE Indonesia Chapter. (2019). "Survei Fraud Indonesia 2019". ACFE Indonesia, 76.
     Google Scholar
  3. Arens, Alvin A. And Loebecke, J. K. (2005). "Auditing and Assurance Service". Jakarta : Erlangga.
     Google Scholar
  4. Cressey, D.R. (1950), “The criminal violation of financial trust”, American Sociological Review, Vol. 15 No. 6, pp. 738-743.
     Google Scholar
  5. Guan, L., Kaminski, K. A., & Sterling Wetzel, T. (2004). "Can financial ratios detect fraudulent financial reporting?". Managerial Auditing Journal, 19(1), 15–28. doi:10.1108/02686900410509802.
     Google Scholar
  6. Hermanson, W. dan. (2004). "The Fraud Diamond: Considering The Four Element of Fraud". CPA Journal. 74.12: 38-42. The Fraud Diamond: Considering The Four Elements of Fraud. The New York State Society of CPAs.
     Google Scholar
  7. Horwath, C. (2011). "Why the Fraud Triangle is No Longer Enough". Horwath, Crowe LLP.
     Google Scholar
  8. King, W. R., & He, J. (2006). "A meta-analysis of the technology acceptance model. Information and Management", 43(6), 740–755. https://doi.org/10.1016/j.im.2006.05.003.
     Google Scholar
  9. Kotsiantis, S., Koumanakos, E., Tzelepis, D., & Tampakas, V. (2006). using Data Mining. 3(2), 104–110.
     Google Scholar
  10. Meliana, M., & Hartono, T. R. (2019). "Fraud Perbankan Indonesia: Studi Eksplorasi". presented at the expert national seminar 2, 2, 1–7.
     Google Scholar
  11. Omukaga, K. O. (2019). "Is the fraud diamond perspective valid in Kenya ?". https://doi.org/10.1108/JFC-11-2019-0141.
     Google Scholar
  12. Pickard, L. M., Kitchenham, B. A., & Jones, P. W. (1998). "Combining empirical results in software engineering. Information and Software Technology", 40(14), 811–821. https://doi.org/10.1016/S0950-5849(98)00101-3.
     Google Scholar
  13. Repousis, S. (2016). "Using Beneish model to detect corporate financial statement fraud in Greece. Journal of Financial Crime", 23(4), 1063–1073. https://doi.org/10.1108/JFC-11-2014-0055.
     Google Scholar
  14. Sahiti, A., & Bektashi, M. (2015). "Detection Techniques of Fraud in Accounting. European Journal of Economics and Business Studies", 2(1), 96. https://doi.org/10.26417/ejes.v2i1.p96-101.
     Google Scholar
  15. Skousen, C. J., Smith, K. R., & Wright, C. J. (2015). Article information : (Issue 99).
     Google Scholar
  16. Sugiyono. (2009). "Research Methods Quantitative, Qualitative and R&D", Bandung: Alfabeta.
     Google Scholar
  17. Wilson, E. J. (1994). "Meta-analytic procedures for social research. Journal of Business Research", 29(2), 163–165. https://doi.org/10.1016/0148-2963(94)90020-5.
     Google Scholar