帳號:guest(3.129.15.234)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士以作者查詢全國書目勘誤回報
作者(中):馬蕭
作者(英):Ma, Xiao
論文名稱(中):中國大陸上市公司現金舞弊甄別模型研究
論文名稱(英):Assessing the Likelihood of Cash Fraud on Listed Companies in China
指導教授(中):林宛瑩
指導教授(英):Lin, Wan-Ying
口試委員:鄭桂蕙
汪瑞芝
口試委員(外文):Cheng, Kuei-Hui
Wang, Jui-Chih
學位類別:碩士
校院名稱:國立政治大學
系所名稱:會計學系
出版年:2021
畢業學年度:109
語文別:中文
論文頁數:84
中文關鍵詞:現金舞弊舞弊三角舞弊甄別模型
英文關鍵詞:Cash FraudFraud Triangle TheoryFraud-Detecting Model
Doi Url:http://doi.org/10.6814/NCCU202101115
相關次數:
  • 推薦推薦:0
  • 點閱點閱:31
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:15
  • gshot_favorites title msg收藏:0
本研究以2010年至2019年因財務違規而受到處罰的中國大陸上市公司為研究對象,篩選出133份涉嫌現金舞弊的年度樣本,設置404份配比樣本,並將樣本按時間分為控制組和測試組。本文使用分層邏輯分析的方法,構建舞弊甄別模型。
首先, 本文根據舞弊三角理論,將舞弊三角之誘因或壓力、機會及態度和行為合理化以代理變數衡量,測試這些代理變數是否與現金舞弊相關聯,並辨認出12個存在顯著差異的變量,據此構建現金舞弊事前預警模型,此為企業現金舞弊之內在原因。
其次,本文根據發生現金舞弊公司的財務報表中各種財務和非財務比率的異常表現,辨認出10個具有顯著差異的現金舞弊風險因子,據此構建現金舞弊事後偵查模型,此為企業現金舞弊之外在表現。
分層迴歸分析中的第一層次模型為事前預警模型和事後偵查模型, 並產生相應的舞弊風險因子。在此基礎上, 本文將事前預警風險因子和事後偵查風險因子結合在一起, 構建出中國大陸上市公司現金舞弊綜合甄別模型,該模型總體判別準確率進一步提高到83.07%。
This study screens 133 observations of suspected cash frauds from listed companies in mainland China that were punished for financial violations over the period 2010 to 2019, and 404 non-fraud observations are also selected as the matched sample. A cascaded logit approach is adopted to construct the fraud-detecting model.
First of all, based on the fraud trinagle theory, this study employs proxy variables to measures incentives or pressures, opportunities and rationalization (or justification or attitude) and further tested whether these proxy variables are related to the occurrence of cash frauds. The cash fraud pre-warning model is then built on these implicit factors for cash fraud.
Secondly, based on the abnormal performance of various financial ratios found in the financial statements of companies that have committed cash fraud, this study is able to find 10 financial and nonfinancial varibles. The cash fraud post-detection model is then built on these explicit factors for cash fraud.
The pre-warning model and the post-detection model represent the first-level model in the cascaded logit analysis, and each of these first-level model generates a risk index. On this basis, this study incorporates these two risk indices into the second-level model to construct an integrative fraud-detecting model. The overall discrimination accuracy is further improved to 83.07%.
第壹章 緒論 - 1 -
第一節 研究動機與目的 - 1 -
第二節 研究議題 - 4 -
第三節 論文架構 - 6 -
第貳章 文獻回顧 - 7 -
第一節 財務報表舞弊 - 7 -
第二節 財務報表舞弊理論分析 - 15 -
第三節 財務報表舞弊的特性 - 19 -
第四節 現金舞弊 - 21 -
第五節 舞弊預警模型研究 - 25 -
第叁章 研究方法與模型建立 - 29 -
第一節 研究方法 - 29 -
第二節 事前預警模型 - 30 -
第三節 事後偵查模型 - 38 -
第四節 綜合甄別模型 - 42 -
第五節 樣本選取 - 43 -
第肆章 實證結果與分析 - 46 -
第一節 事前預警模型 - 46 -
第二節 事後偵查模型 - 57 -
第三節 綜合甄別模型 - 63 -
第伍章 研究結論及建議 - 67 -
第一節 研究結論 - 67 -
第二節 研究限制及研究建議 - 70 -
參考文獻 - 73 -
附錄一 配比樣本公司代碼 - 79 -
附錄二 SAS No. 99 、中國註冊會計師審計準則1141號應用指南 舞弊風險因數範例 - 81 -
王立彥及劉軍霞,2004,A-H股雙重報告差異與公司治理,北京大學出版社。
王健姝及陳漢文,2010,財務報告舞弊公司事務所任期與審計品質——基於非財務資料的實證研究,山西財經大學學報,032(001):115-124。
余臻蔚,2010,上市公司股權結構與財務報告舞弊實證分析,江蘇科技大學碩士論文。
吳聯生及李辰,2004,人類有限性與會計資訊行為性失真,會計研究,2004(02):16-22。
宋夏雲、陳麗慧及況玉書,2019,康得新財務造假案例分析,財務管理研究, 1(2):62-67。
李承諺,2013,應用舞弊三角理論偵測及預測財務報表舞弊-以台灣上市(櫃)公司為例,成功大學會計學學位論文。
李清及黨正磊,2019,會計舞弊風險指數構建和評價研究——基於因數分析,數理統計與管理,2019(06): 1048-1061。
李清及任朝陽,2015,基於案例推理的財務報告舞弊識別研究,財經理論與實踐,36(3): 84-89。
李連華及張雪瑤,2017,企業超額持有現金是否導致高管腐敗,會計論壇,540(001): 8-30。
辛宇及徐莉萍,2006,公司治理机制与超额现金持有水平,管理世界,2006(005):136-141。
李政、張文修及鐘永紅,2006,我國上市公司信息披露違規預警模型的缺陷及修正,當代經濟科學,28(2):104-109。
韋德洪及張榮艷,2006,上市公司貨幣資金佔比與業績相關性實證分析,經濟與管理研究,2006(012):56-62。
孫健,2007,終極控制權與超額現金持有,中國會計學會2007年學術年會。
秦江萍,2006,會計舞弊的市場反應與識別:理論分析與經驗證據,北京:經濟科學出版社。
馬賢明及鄭朝暉,2006,凱撒的歸凱撒人民的歸人民—上市公司五大現金舞弊手法揭秘,新財經,2006(02): 64-68。
張思偉,2012,基於現金流量視角的上市公司盈餘品質研究,安徽財經大學會計系碩士論文。
張曾蓮及高雅,2017,財務舞弊識別模型構建及實證檢驗,統計與決策,2017(09) :172-175。
許存興,張芙蓉及王大江,2009,上市公司股權結構與財務舞弊識別關係實證分析,金融與經濟,2009(11): 54-57。
連竑彬,2008,中國上市公司財務報表舞弊現狀分析及甄別模型研究,廈門大學博士論文。
陳亮及王炫,2003,會計資訊欺詐經驗分析及識別模型,證券市場導報,2003(16):92-96。
陳莫,2007,公司超額現金持有與業績的相關性研究—來自A股製造業的經驗證據,上海財經大學會計系碩士論文。
陸建橋,2002,中國虧損上市公司盈餘管理實證研究,北京:中國財政經濟出版社。
黃世忠及葉豐瀅,2006,上市公新司報表粉飾動向:手段、案例與啟示,財會通訊,2006(01):14-19。
瑞紮伊及朱國泓譯,2005,《財務報表舞弊:預防與發現》,中國人民大學出版社。
葉郡慈,2016,超額現金持有與盈餘管理的關係,國立政治大學會計系碩士論文。
葛家澍及黃世忠,1999,反映經濟真實是會計的基本職能,會計研究,1999(12):02-07。
劉立國及杜瑩,2003,公司治理與會計資訊質量關係的實證研究,會計研究,2003(02):28-36。
蔡少玲,2016,CFO性別與公司舞弊行為研究,對外經濟貿易大學碩士論文。
蔡寧及梁麗珍,2003,公司治理與財務舞弊關係的經驗分析,財經理論與實踐,2003(06):80-84。
魏明海,2000,盈餘管理基本理論及其研究述評,會計研究,2000(09):34-42。
蘇華董,2013,財務舞弊之現金流量表作假篇,現代經濟資訊,2013(07): 173-177。
Aziz, A., D. C. Emanuel, and G. H. Lawson. 1988. “Bankruptcy Prediction-An Investigation of Cash Flow Based Models,” Journal of Management Studies 25(5): 419-437.
Beasley, M. S. 1996. An Empirical Analysis of the Relation Between the Board of Director Composition and Financial Statement Fraud. Journal of Accounting and Economics,71(04):443-465.
Bell, T. B., and J. V. Carcello. 2000. A Decision Aid for Assessing the Likelihood of Fraudulent Financial Reporting, Auditing: A Journal of Practice & Theory, 19(1):169-185.
Bell, T. B., S. Szykowny, and J. Willingham. 1991. Assessing the likelihood of fraudulent financial reporting: A cascaded logit approach, Working Paper, KPMG Peat Marwick, Montvale, NJ.
Beneish, M. D. 1997. Detecting GAAP violation: Implications for assessing earnings management among firms with extreme financial performance, Journal of Accounting and Public Policy, 16(3): 271-309.
Beneish, M. D. 1999. The Detection of Earnings Manipulation, Financial Analysts Journal, 55(05): 24-36.
Bologna, G. J., R. J. Lindquist and J. T. Wells. 1993. Accountant's Handbook of Fraud and Commercial Crime. New York: NY 10158.
Burgstahler, D. and M. Eames. 1998. Management of earnings and analysts forecasts. Working paper. University of Washington.
Casterella, J., W. R. Knechel, and P. L. Walker. 2002. The relationship of audit failures and auditor tenure. Working Paper, University of Florida.
Cressey, D. R. 1953. Other People’s Money: a Study in the Social Psychology of Embezzlement, Glencoe, IL: Free Press.
DeAngelo, L. E. 1981. Auditor size and auditor quality. Journal of Accounting and Economics, 3(3): 183-199.
Dechow, P. M., and P. J. Skinner. 2000. Earnings Management: Reconciling the Views of Accounting Academics, Practitioners and Regulators, Accounting Horizons, 14(2): 235-250.
Dechow, P. M., R. G. Sloan, and A. P. Sweeney. 1996. Causes and consequences of earnings manipulation: An analysis of firms subject to enforcement actions by the SEC. Contemporary accounting research, 13(1): 1-36.
Defond M. L., and J. Jiambalvo. 1991. Incidence and circumstances of accounting errors. The Accounting review, 66(3): 643-655.
Dittmar A., J. Mahrt-Smith, and H. Servaes. 2003. International Corporate Governance and Corporate Cash Holdings. Journal of Financial and Quantitative Analysis, 38(1): 111-133.
Elliott, R. K., and J. J Willingham. 1980. Management Fraud : Detection and Deterrence. New York : Petrocelli Books.
Farber D. B. 2005. Restoring Trust after Fraud: Does Corporate Governance Matter? Accounting Review, 80(2): 539-561.
Francis, J., and J. Krishnan. 1999. Accounting accruals and auditor reporting conservatism. Contemporary Accounting Research, 16 (2): 135-165.
Hajeka, P., and R. Henriquesb. 2017. Mining corporate annual reports for intelligent detection of financial statement fraud-A comparative study of machine learning methods. Knowledge-Based Systems, 128(7): 139-152.
Healy P. M. and J. M. Wahlen. 1999. A Review of The Earnings Management Literature and Its Implications for Standard Setting. Accounting Horizons, 13(4):365-383.
insider trading: An empirical analysis. The Accounting Review, 73(1) : 131-146.
Jensen , M. C. 1993. The modern industrial revolution , exit , and the failure of internal control systems , Journal of Finance , 48(3) : 831-880.
Kasznik. 1999. On the association between voluntary disclosure and earnings management. Journal of Accounting Research, 37(1):57-81.
Kim J. B., and C. H. Yi. 2006. Ownership structure , Business group affiliation, Listing status, and Earnings management : Evidence from Korea, Contemporary Accounting Research ,23(2): 427-464.
Kirkos E., C. Spathis, and Y. Manolopoulos. 2007. Data mining techniques for the detection of fraudulent financial statements, Expert Systems with Applications, 32(4):995-1003.
Kirkos, E., C. Spathisb, and Y. Manolopoulosc. 2007. Data mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications, 32(4): 995-1003.
La Porta R., F. Lopez-De-Silanes, A. Shleifer, and R. W. Vishny. 1998. Law and Finance. Journal of Political Economy, 106(6): 1113-1155.
La Porta R., F. Lopez-De-Silanes, A. Shleifer, and R. W. Vishny. 1997. Legal Determinants of External Finance. The Journal of Finance, 52(3): 1131-1150.
Lee, T. A., R. W. Ingram, and T. P. Howard. 1999. The Difference between Earnings and Operating Cash Flow as an Indicator of Financial Reporting Fraud. Contemporary Accounting Research,16 (4): 749-787.
Loebbecke. J. K., M. M. Eining, and J. J. Willingham. 1988. Review of SEC Accounting and Auditing Enforcement Releases. Working paper, Utah University.
Loebbecke. J. K., M. M. Eining, and J. J. Willingham. 1989. Auditors’ experience with material irregularities: Frequency, nature, and detestability. Auditing: A Journal of Practice & Theory , 9 (Fall) : 1-28.
Michael, R. Y. 2000. Accounting Irregularities and Financial Fraud: A Corporate Governance Guide. Independent Pub Group.
Mossman, C. E., G. Bell, L. M. Swartz, and H. Turtle. “An empirical comparison of bankruptcy modal,” The Financial Review, 33(2): 35-54.
Mulford, C. W., and E. E. Comiskey. 2002. The Financial Numbers Game: Detecting Creative Accounting Practices. New York: John Wiley & Sons.
Myers J., L. A. Myers, and T. C. Omer. 2003. Exploring the term of auditor-client relationship and the quality of earnings: a case for mandatory auditor rotation? The Accounting Review, 78 (3): 779-799.
Opler T., L. Pinkowitz, R. Stulz, and R. Williamson. 1999. The determinants and implications of corporate cash holdings. Journal of Financial Economics, 52(1), issue1:3-46.
Pearce J. A. and S. A. Zahra. 1989. Boards of Directors and Corporate Financial Performance: A Review and Integrative Model. Journal of Management, 15(2): 291-334.
Persons, O. 1995. Using financial statement data to identify factors associated with fraudulent financial reporting. Journal of Applied Business Research, 11(3): 38-46.
Press, E. and J. Weintrop. 1990. Accounting constraints in public and private debt agreements: Their association with leverage and impact on accounting choice. Journal of Accounting and Economics ,12(1-3) : 65-95.
Rezaee, Z. 2002. Financial statement fraud: prevention and detection. New York, NY: Wiley; 2002.
Robertson, J. C. 2000. Fraud Examination for Managers and Auditors, TX: Viesca Books.
Schipper, K. 1989. Commentary on Earnings Management. Accounting Horzions, 3(4):91-102
Scott, W. R. 2000. Financial Accounting Theory. Scarborough, Ontario: Prentice Hall Canada Inc.
Skousen, C. J. and C. J. Wright. 2006. Contemporaneous Risk Factors and The Prediction of Financial Statement Fraud. Working paper. Oklahoma State University .
Skousen, C. J., K. R. Smith, and C. J. Wright. 2008. Detecting and Predicting Financial Statement Fraud: the Effectiveness of the Fraud Triangle and SAS No. 99. Advances in Financial Economics, 13(6) : 53-81.
Spathis, C.T. 2002. Detecting false financial statements using published data: Some evidence from Greece. Managerial Auditing Journal, 17(4): 179-191.
Summers, S. and J. Sweeney. 1998. Fraudulently misstated financial statements and insider trading: An empirical analysis. The Accounting Review, 73(1): 131-146.
Wells, J. 1997. Corporate Fraud Handbook: Prevention and Detection. Hoboken, New Jersey: Wiley.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *