FRAUD INHIBITION THROUGH INTERNAL CONTROLS AND CHECKS IN CROSS RIVER STATE, NIGERIA
Abstract
This work aims at providing an answer to the question: what should be the appropriate Internal Control measures in order to redress the problem of fraud? The Local Government Area Councils in Cross River State (CRS) are considered and examined with the aid of Simple percentages, using primary data generated from the administered questionnaires. However, the results obtained revealed that The Local Government staff were aware of the meaning of internal control; Internal control measures aimed at checking fraud existed in the LGA Councils of CRS. The staff were aware of the meaning of checks; Checks which is an internal control measure existed in the LGA Council of CRS. The staff were conscious of the meaning of fraud; Fraud which hinders growth and development of a given system existed in the LGA Council of Cross River State. Therefore, we recommended that in order to strengthen the weak monitoring networks and weak sanctions implementation aimed at redressing the problem of fraud, Internal Control measures such as segregation of duties, authorization and processing of disbursement, managing restricted funds, and check signing should be fully enforced as specified in section five.
References
England and Wales, UK Controls and Fraud Prevention and, “Stealing From the Collection Plate,” Fraud Magazine.
Davis, A. B. and S. K. Goyal (1993). Management of cellular fraud: Knowledge-based detection, classification, and prevention. In Proceedings of the 13th International Conference on Artificial Intelligence, Expert Systems and Natural Language, Avignon, France, Volume 2, pp. 155–164.
Guidance on Control (1995), Canadian Institute of Chartered Accountants, Canada.
Hoath, P. (1998). Telecoms Fraud, The Gory Details. Computer Fraud & Security 20 (1), 10–14
Internal Control: Guidance for Directors on the Combined Code (1999), CanadianInstitute.
Internal Control-Integrated Framework (1992), Committee of Sponsoring Organizations.
Johnson, M. (1996). Cause and effect of telecoms fraud. Telecommunication (International mobile phone networks.
Neural NetworkWorld 6(4), 477–484.
Nwoko, C. O. (1992), ICAN PAC 2, Vol. 10 No. 2 (April/June).
O’Shea, D. (1997). Beating the bugs: Telecom fraud. Telephony 232(3), 24.of the Treadway Commission, US
Parker, T. (1996). The twists and turns of fraud. Telephony 231 (supplement issue), 18–21.
Pequeno, K. A. (1997). Real-time fraud detection: Telecom’s next big step.
Snyder, H. and Clifton, J. (2005). Excerpts from An Elected Official’s Guide to Internal Telecommunications
(Americas Edition)3 1(5), 59–60.
Copyright (c) 2019 IJO- International Journal of Social Science and Humanities Research
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties and that the Article has not been published elsewhere. Author(s) agree to the terms that the IJO Journal will have the full right to remove the published article on any misconduct found in the published article.