Ads
-
Related paper
- Analysis of Fraud Triangle, Fraud Diamond and Fraud Pentagon Theory to Detecting Corporate Fraud in Indonesia
- COMPUTER FRAUD
- Criminal law and criminological counteraction to fraud in the field of computer information
- Embedded Computer Application Software for Secured Voter Card Transfer: An Approach to Improve Electoral Integrity & Electoral Fraud Prevention Mechanism
- The Effect of Fraud Diamond Theory and Level of Religiosity toward Academic Fraud to Undergraduate Students
- ACCOUNTABILITY AND FRAUD TYPE EFFECTS ON FRAUD DETECTION RESPONSIBILITY
- Analysis of Fraud Hexagon and Machiavellian on Village Fund Fraud
- EFFECT OF FRAUD RISK REDUCTION STRATEGY ON THE LEVEL OF EMPLOYEE FRAUD IN NIGERIAN PUBLIC SERVICE ORGANIZATIONS
- THE RELATIONSHIP OF INDIVIDUAL MORALITY AND AUDITOR PERCEPTIONS OF FRAUD TENDENCY: TESTING OF THE FRAUD PENTAGON THEORY APPROACH
- Analysis of Financial Statement Fraud: The Vousinas Fraud Hexagon Model Approach and the Audit Committe as Moderating Variable