Académique Documents
Professionnel Documents
Culture Documents
CHAPTER 1
INTRODUCTION
whether or not it will happen. To avert this from taking place, countermeasures will
be needed; this is where risk management comes in. Risk management is about
understanding the nature of such events, where they represent threats, and making
2008). Risk management entails forecasting and evaluating possible risks and
coming up with ways on how to minimize the impact of it on the business. Fraud
happens to fall under the scope of risks that businesses face, as it is also uncertain as
to when this could happen. Fraud denotes a false representation of an important fact
made by an individual to another individual with the intention of deceit (Hall, 2011).
fraud prevention and detection methods to avoid, if not lessen the chances of
fraudulent acts from happening. Fraud prevention includes informing the company
suggesting when such controls are ineffective, and also testing procedures which
al., 2015). While fraud detection involves the process of minimizing the probability
A vast majority of coffee shops, not just in Las Piñas City, have adopted the
practice of staying open up until the wee hours of the night; this puts a lot of
responsibility on the employees that are assigned on those shifts and demands a lot
of trust from the employers as well. Even if they are working within the normal
working hours, they still have to live up to the business owner’s faith and
confidence in them. Yet some cases of deceit may still occur within the organization:
one of these may include fraud. This study will help the selected coffee shops,
specifically those within Las Piñas City, since it is closer to our campus and we are
familiar with the location, assess the types of frauds the company may experience
and the extent of how they utilize their risk management and how effective it is in
Several coffee shops have been established around our campus and it’s no
secret as to why this has been a growing trend. For those needing their caffeine fix
either to re-energize from a long day or to stay up finishing some school project;
coffee shops may be considered as overpriced for majority of us students who are
on a budget and can instead opt for another one of those convenient 3-in-1 coffee
sachets but still students lounge around in coffee shops during their leisure time.
Aside from the obvious promise of free Wi-Fi, coffee shops have been considered
as a place for socializing, a place to spend leisure time with friends and it has been
claimed that the ambience of coffee shops encourages productivity (Nguyen, 2013).
fraud in terms of detection and prevention , how they operate on managing these
risks, policies they implement with regards to risk. Risk management aids in
determining and analyzing the risks throughout the course of business operations
for the purpose of minimizing them from occurring in the future, detecting the
possible risks and providing a coherent basis for better decision making, and
providing steps on how to manage and create solutions for it. In this case, fraud is
one of the risks that falls under the scope of risk management, as there is no
guarantee that it would happen but there is a possibility that it could; hence the need
status of the risks, the vulnerability of their fraud preventive measures and how to
In 2011, a study was conducted that analyzed fraud risk assessment and
management. The purpose of this study, as described by the author, was to describe
and evaluate the historical trends of the fraud management in organizations. The
argument raised by the study was that today’s fraud risk management importance is
different because it involves not only detection, but also fraud prevention (Powell,
2011). The role of risk management on fraud is not just a one-time implementation,
instead a continuous process. Based on the outcome of the research, we would then
fraud prevention and detection; it aims to know what and how the existing practices
are being implemented in the selected coffee shops of Las Piñas City, the frequency
OPERATIONAL FRAMEWORK
This conceptual framework shows the inputs and outputs of the study, with the
aid of the data obtained from the respondents in the questionnaires, we can assess
the demographic profile, types of fraud and the extent of practice used in the risk
management of fraud detection and prevention of the selected coffee shops. After
analyzing the necessary data we will evaluate the efficiency and effectivity of the
businesses’ fraud detective and preventive measures against fraud by means of risk
management and how to maintain the effective practices and to identify in which
Demographic profile of
Types of fraud
selected coffee shops
Risk Management
Fraud Detection
Fraud Prevention
With the aid of a descriptive survey we will obtain necessary data for our
research. For instance, on what types of fraud are the selected coffee shops subject
and payroll fraud. We would then assess the extent of their risk management for
accounting records and risk assessment. Another assessment would be on the extent
The purpose of this research study is to assess the risk management on fraud
detection and prevention of selected coffee shops in Las Piñas City. Specifically, it
1.) To know the profile of the selected coffee shops based on their:
a) Years of existence
b) Annual income
c) Number of employees
2.) To know the types of fraud the business is may have experienced in terms
of:
a) Asset misappropriation
b) Vendor fraud
c) Accounting fraud
d) Payroll fraud
3.) To know the extent of the practices of risk management for fraud detection
a) Surveillance
b) Monitoring
c) IT control
d) Physical control
e) Accounting records
f) Risk assessment
4.) To know the extent of the practices of risk management for fraud prevention
a) Segregation of duties
b) Supervision
c) Independent verification
5.) To know the significant difference in the extent of the practices of risk
profile.
1.) To determine what is the demographic profile of the selected coffee shops in
terms of:
a) Years of existence
b) Annual income
c) Number of employees
d) Fraud experience
2.) To determine what type of fraud did the company encountered in terms of:
a) Asset misappropriation
b) Vendor fraud
c) Accounting fraud
d) Payroll fraud
a) Surveillance
b) Monitoring
c) IT control
d) Physical control
e) Accounting records
f) Risk assessment
a) Segregation of duties
b) Supervision
c) Independent verification
the profile.
to the profile.
HYPOTHESIS
Based on the research objectives and questions, the hypotheses have been
developed as followed:
practices of risk management for fraud detection when grouped according to the
profile.
the practices of risk management for fraud detection when grouped according to the
profile.
practices of risk management for fraud prevention when grouped according to the
profile.
the practices of risk management for fraud prevention when grouped according to
the profile.
The limitation of our study is the consistency of the result of this research that is
limited to the respondent's personal thoughts and insights with relation to their
management. The scope of the study is the personnel working in coffee shops in
Las Piñas. For each of the aforementioned coffee shops there will be approximately
population with respect to important variables. With regards to the sensitivity of this
study that involves business policies and practices, we adopted the use of
quantitative data collection methods since this is easier to present, summarize, and
compare. Our study adopted the non-probability sampling type, specifically random
sampling.
fraud will be detected and prevented and to provide possible solutions. Those who
A. The owners of the selected coffee shops. This is beneficial for the owners to
know the status of how the business is in terms of safeguarding it from any
potential loss, by the evaluation of how well their risk management is and
B. The management of the selected coffee shops. This is beneficial for the
given the chance that they invest in certain businesses, particularly in coffee
shops, they will be informed of the appropriate risk management that needs
to be carried out for the purpose of avoiding the chances of fraud from
could experience and ways to prevent it. This increases their confidence in
shops because they can be rest assured that the said coffee shops have
management, and they can have the confidence to know that the
practices.
topics.
F. Future researchers. This is beneficial for the future researchers who desire to
further this study and create a more in-depth or updated research on this
matter.
DEFINITION OF TERMS
financial statements by overstating its revenue or assets, not recording expenses and
under-recording liabilities.
Accounting records. These are certain information about a business, and each
is used for a different purpose, but each type is also linked to another record in your
personal gain for oneself and/or create a loss for another. The term commonly
the rules and not shortcutting internal controls. Internal control verification analyzes
data is reliable and that the organization is in compliance with applicable laws and
regulations.
determining that the controls in place are relevant and effective in addressing new
risks. A monitoring process must be capable of addressing the need for revisions in
the design of controls based on changing risk. For this study, this is the process by
which the quality of internal control design and operation can be assessed. This may
Payroll fraud. It is the theft of cash from a business via the payroll processing
system.
Physical control. This refers to the controlling of physical access such as the
obvious practice of locking doors, desks, and file cabinets so that unauthorized
This can be quite an extensive list. In fact, throughout the course of normal business
situations, processes, etc. that may cause harm, particularly to people. After
identification is made, you analyze and evaluate how likely and severe the risk is,
two people must work together to do so - which is far less likely than if one person
is responsible for all aspects of an accounting transaction. For this study, this is the
to be done, monitoring their efforts and holding them accountable for specific
results.
deemed suspicious on the basis of credible information that they are connected in
carried out involve recording of events, locations, days or times, and patterns of
watching over the behaviour of a group of individuals and how they operate during
business hours.
a company’s accounts payable and payment systems for illegal personal gain.
CHAPTER 2
RELATED LITERATURE
2.1 Introduction
This chapter reviews the definitions and expounds more information about the
probable influences these have on the selected coffee shops in Las Piñas and the
increasingly focus more on identifying risks and managing them before they even
affect the business. The ability to manage risk will help companies act more
confidently on future business decisions. Their knowledge of the risks they are
facing will give them various options on how to deal with potential problems
(Mutetwa, 2015). Although it might seem like a classless topic, its principles and
concepts however are crucial to the survival of your business. Successful risk
There are various types of risks that a business will experience but this study
focused on specific types which are: operational risk, compliance risk, and
reputational risk.
successful also has the possibility of generating risk (Spacey, 2015). It summarizes
the risks a company shoulders when it tries to operate within a given field or
market-wide risk. It is the risk remaining after determining financing and systematic
risk, and includes risks resulting from breakdowns in internal procedures, people
Compliance risk is the potential for losses and legal penalties due to failure to
comply with laws or regulations. In many cases, businesses that fully intend to
comply with the law still have compliance risks due to the possibility of
incompetent. The term tends to be used to describe the risk of a serious loss of
Reputational risk can occur through a number of ways: directly as the result of the
(Investopedia, 2018).
Avoidance is one of the easiest ways to mitigate risk is to put a stop to any
activities that might put your business in jeopardy. However it's crucial to
remember that with nothing ventured comes nothing gained, and therefore this is
often not a realistic option for many businesses (Elders Insurance, 2013).
Avoidance is when you have the option not to take on the risk by avoiding the
steps required to minimize the potential that an incident will occur. If the cost of
risk reduction outweighs the potential cost of an incident occurring, you will need
sometimes incidents do occur, yet ensures that your business will be prepared to
cope with the impact of that in the event that it would actually happen (Elders
Insurance, 2013).
chosen by those who consider the cost of risk transfer or reduction to be excessive
These are the effects of poor risk management: poor user adoption, unrealized
Poor user adoption refers to the process of getting your team members to
actually follow a procedure, use the tools you have delegated and stick to the
methodology. If they don’t do this, you’ll have poor results because your colleagues
are not working to a standard, best practice way of managing risk (Ten Six, 2017) .
In unrealized benefits, risks can kill a project’s benefits overnight, or they could
be slowly eaten away through inefficient management practices. When your team
isn’t working efficiently, every additional admin task adds cost and time to your
project, which in turn has an impact on how quickly your benefits can be delivered
take longer than you expected and they push out other activities on the project
However, the cost of dealing with a risk if it materializes and becomes a real issue
for your business, is usually cost more than expected (Ten Six, 2017).
They need to know what you are doing to mitigate any potential threats and that
you’ve got a sensible alternative plan just in case (Ten Six, 2017).
2.2.1 Fraud
value such as cash, goods, information or services; then fraud may be attempted
(Accountants, 2008).
There is no specific reason as to why fraud occurs, but there are factors as to
why this happens, this can be throroughly illustrated using the fraud triangle. The
fraud triangle is built on the assumption that the possible combination of factors that
results to fraud are situational pressure, opportunity and ethics (Hall, 2011).
drug addiction, etc. (Brumell Group, 2015). For instance an employee who
time or a situation in which something can be done. In cases like these, the
For instance when an employee who happens to be struggling with money problems
is left unattended with the cash register or the safe where the company's daily
revenue is kept.
person has a blurred moral compass of what is right or wrong then tend to
documents, files and etc. We must avoid, stop and prevent it for the business to
The truth of the matter is that no business is exempted from the possibility of
fraud. In order to detect and prevent fraud from happening it is also vital to be
aware of and have a clear understanding of the various types of fraud that could
Asset misappropriation is the most common fraud scheme which assets are
either directly or indirectly diverted to the fraudster’s benefit (Hall, 2011). Simply,
it’s the theft of company assets by an employee, also known as insider fraud.
inventory theft, cash theft, service theft, expense account fraud, procurement fraud,
so that they can be deposited into a bank account under his control. This could
(Bush, 2017), whereas check forgery is when the signature of the drawer is copied
products from the company. Cash theft and service theft are pretty much
self-explanatory; these involve the actual stealing of cash and stealing services
Under expense account fraud, this is where the employee either forges receipts
submitting receipts that personal expenses but claim that they are business-related
(Lomer, 2017).
returning some and pocketing the refund, purchase order fraud where the employee
sets up a phantom vendor account into which are paid fraudulent invoices, or
disability, invents injuries that did not occur or attributes injuries that occurred
2017).
commissions, falsifies sales that did not occur or colludes with customers to record
company’s accounts payable and payment systems for illegal personal gain (Bush,
2017). This type of fraud can also be committed by vendors on their own.
Examples of vendor fraud are billing schemes, bribery and kickbacks (Lomer,
2017).
using the company’s vendor payment system either by creating a fictitious vendor
he or she accepts (or asks for) payments from a vendor in exchange for an
advantage.
the company’s accounts payable and receivable to steal commits accounting fraud
(Lomer, 2017).
Employees involved in these types of fraud are generally those in positions that
purchases (Lomer, 2017). Embezzlement, also called larceny, this is any fraud
conducted by a person who controls the funds being used or someone who has
access to the company’s monetary resources. Accounts payable fraud is among the
most damaging for affected businesses. It’s also among the easiest frauds to
perpetrate, since most of the money leaving a company legitimately goes through
supplier or vendor and bills the company for good or services not provided another
kind of fraud is when an employee uses company funds to pay for personal
accounting system.
one of the most common types of employee fraud (Bragg, 2018). Payroll fraud
schemes include: timesheet fraud and pay check theft (Lomer, 2017).
Timesheet fraud is when an employee alters the details on his or her timesheet
in order to increase his or her wages, whereas the pay check theft involves an
employee getting the pay check of a fellow employee and cashing it out claiming
that it is the formers without the consent or knowledge of the latter (Lomer, 2017).
management system because it poses barriers to fraud, deters fraud, and can
actions and thus screen out abnormal events. When designing internal control
errors and fraud is far more cost-effective than detecting and correcting problems
after they occur. The vast majority of undesirable events can be blocked at this first
control. The logical layout of the document into zones that contain specific data,
such as customer name, address, items sold, and quantity, forces the clerk to enter
the necessary data. The source documents can therefore prevent necessary data
from being omitted. However, not all problems can be anticipated and prevented
(Hall, 2011).
Even if certain fraud prevention takes place, it isn’t a guarantee that fraud can
As with all other components of the fraud risk management system, fraud
desirable results. Documentation should generally exist for all detection controls
and processes and should specifically exist for monitoring processes and results; for
testing procedures used to assess controls; and for the roles and responsibilities that
Detective controls form the second line of defense. These are devices,
techniques, and procedures designed to identify and expose undesirable events that
These are the methods commonly used to detect and prevent fraud: risk
financial reporting (Hall, 2011). It is the process of evaluating the risk resulting
Monitoring is the process by which the quality of internal control design and
ongoing activities (Hall, 2011). This is conducted after a program has begun and
controls are procedures, policies and activities that are conducted to meet IT
(Spacey, 2016) .
accounting systems. These activities may be purely manual, such as the physical
custody of assets, or they may involve the physical use of computers to record
transactions or update accounts (Hall, 2011). Physical access control limits access
to buildings, rooms, areas and IT assets, logical access control limits connections to
by the information system are valid and will be counterchecked by the management
Segregation of Duties can take many forms, depending on the specific duties to
different people that the intent behind doing so is to eliminate instances in which
someone could engage in theft or other fraudulent activities by hindering them from
duties it split the general functions through the physical custody of an asset, record
keeping for an asset and also the authorization to acquire of asset (Bragg, 2018).
with close supervision. For this reason, supervision is often called a compensating
control (Hall, 2011). It is being responsible in assisting the business process owner
on setting up business process disorder and ensure the effective and efficiency
practices being applied within the operation (Danone, 2018). As of the fraud
prevention supervisor job description it includes details about being able to lead
This will include a lot of research of data, as well as documenting procedures which
and ledgers. These records capture the economic essence of transactions and
provide an audit trail of economic events (Hall, 2011). When there are unusual
differences in the accounting records, there are two possible reasons for the
contrast, fraud is intentionally committed in order to render some gain for the
perpetrator. The two means through which fraud is committed include the
(Kennedy, 2012).
These are the effects of poor fraud detection and prevention: failure of
detection and prevention leads to financial loses, negative impact on the business’
(ACFE) in 2008 estimates losses from fraud and abuse to be seven percent of
annual revenues. The actual cost of fraud is, however, difficult to quantify for a
number of reasons: not all fraud is detected; of that detected, not all is reported; in
fraud. Which in turn shows that failure of detection and prevention does eventually
practices will result in lack of trust and confidence of your investors, customers and
auditors in your ability to control the fate of your business. The consequences of
large failures can impose financial, reputational, loyalty, and other brand-related
costs that will persist for a very long time. The cost of a fraud prevention program is
2.5 Synthesis
Companies must have sufficient knowledge of the risks they are facing to give
detect and prevent fraud. There are various types of risks that a business will
experience but this study focused on specific types which are: operational risk,
deceit. There is no specific reason as to why fraud occurs but there are three factors
that play a part in its occurrence: opportunity, situational pressure, and ethics. There
are vast examples of frauds that take place some of these examples include asset
fraud prevention and detection techniques because even if certain fraud prevention
takes place, it isn’t a guarantee that fraud can completely be avoided; therefore a
highly effective fraud detection system must be in place to detect frauds as they
occur. In a certain practices on some fraud would be found and be able to prevail
from getting worsening in the operation of the company. Prevention is the first
line of defense in the control structure. Preventive controls are passive techniques
errors and fraud is far more cost-effective than detecting and correcting problems
Based on the articles, related studies, books and other sources we’ve read, we have
come to realize that there is a wide variety of frauds that could easily go undetected
if the organization is not aware of such and doesn’t have any form of preventive
measurement to ensure that it doesn’t happen. We also realized that frauds don’t
just happen due to mere opportunity or because of the less likelihood of being
caught but it also involves a moral battle. Fraud is definitely something that can’t
completely be avoided but the chances of it from occurring can be minimized with
businesses to prevent the chances of fradulent acts from occurring. Based on the
research we made regarding fraud detection and prevention and risk management
practices in Las Pinas, we found out that there is very limited techniques or methods
being applied by the coffee shops within the vicinity, therefore we opted to further
assess and to evaluate the efficiency and effectivity of the businesses’ current fraud
detective and preventive measures against fraud by means of risk management and
how to maintain the effective practices and to identify in which aspect requires
CHAPTER 3
RESEARCH METHODOLOGY
3.1 Introduction
This chapter identifies the methodology for conducting this research. The
areas to be covered are research design, sampling population, sample size, sampling
method, data collection methods, data instruments, data gathering, and data
analysis.
It is concerned with the conditions or relationships that exist, opinions that are held,
processes that are going on, effects that are evident, or trends that are developing
(Prado et al., 2010). Due to the sensitivity of this study that involves business
policies and practices, we adopted the use of quantitative data collection methods as
quantitative studies are usually easy to present, summarize, and compare. The way
you design and plan your research will have significant implications for the success
of your project. The methodology that you use underpins your entire project, and
the results and may lead to biased results as well (Davies, 2013).
the organizations in this study are situated, these are the coffee shops particularly
We, the researchers, chose one representative per coffee shops. They are of
no particular age, gender, race or ethnicity but are qualified as a respondent due to
The sample size refers to the group of individuals or entities from which the
sample might be drawn (McLeod, 2014). For the purpose of this study, the chosen
respondents from each selected coffee shops would be the managers, supervisors,
accounting staff, and cashiers. We, the researchers, chose these particular personnel
Managers – since they are responsible for maximizing revenue and profit
Supervisors – since they are the ones that are responsible the hiring, training,
2018).
Accounting staff - since they are primarily in charge of managing the payroll
Cashiers – since they are assigned to take customers’ payments and balancing
For the purpose of this study, the non-probability sampling type was adopted,
situations when you need to reach a targeted sample quickly (Crossman, 2018). One
from respondents that are difficult to locate and can be vital to the study can be
researchers who analyze the data and information. It is collected for the first time
since it has not been published before collection. This is more accurate since you
get the actual response and opinions of the respondents. The information is
(Salkind, 2010). For the purpose of this study, we used survey questionnaires as
primary data.
A secondary data is simply data collected by someone else for some other
purpose (Salkind, 2010). In this research we used several accounting books that
derived information from online articles that expounds more on our topic.
For the purpose of this study, a questionnaire was utilized because it provides a
relatively cheap, quick and efficient way of obtaining large amounts of information
from a large sample of people. Data can be collected relatively quickly because the
researchers would not need to be present when the questionnaires are completed
choice questions, meaning there are a selection of possible answers that they get to
choose from. This method was chosen because it would narrow down the answers
and it is an important aspect of any type of research study. Any inaccurate data
collection may lead to invalid result and affect result of study (UK Essays, 2017).
The following steps are how the researchers gathering the necessary data:
often something occurred. This could be how many times an event happened, or
happened within a given time frame. It could be how often a continuous variable,
such as a stock price, was in a certain range in a given amount of time. It also
comes up in a statistical area dealing with the effects of time called time series
One-way ANOVA is a type of statistical test that compares the variance in the
group means within a sample whilst considering only one independent variable or
CHAPTER 4:
DATA ANALYSIS
Frequency Percent
4 1-5 years 17 81
Total 21 100
Based on the table above majority of the coffee shops have existed for at least 1-5
years. This shows that most of the coffee shops in Las Piñas have just started out in
venturing in the coffee shop business. Coffee is enjoyed no matter what age, race or
background. In this day and age, a growing market of people who enjoy espresso
providing a welcoming social space for people in your community never really goes
out of style. Which explains why a lot of entrepreneurs have decided to start opening
up coffee shops over the past couple of years (10 BENEFITS OF STARTING A
Frequency Percent
3 P100,000-P300,000 3 14.3
Total 21 100
Based on the table above, 61.9% of the respondents have an annual net income of less
than P100,000, this is possibly due to the fact that majority of the coffee shops have
The café and bar industry is saturated with choice, so it can be hard, especially for a
new, small business, to stand out in an overcrowded market. The start-up cost
licensing are all large and ongoing expenses (Tashia, 2015).You may say that you
are a very small business and cannot afford to have many employees (Williams,
2015)
Frequency Percent
4 More than 10 4 19
3 5 to 10 4 19
2 3 to 5 6 28.6
1 2 to 3 7 33.3
Total 21 100
Based on the table above majority of the coffee shops only have at least 2-3
employees, this is probably due to the fact that since the selected coffee shops have
just started their businesses and still have insufficient budget to provide salaries for
more employees, as they only have an annual net income of less than P100,000.
Small-scale businesses are typically faced by budget hurdles. They can’t employ
workers with the same level of skill at the required starter salaries, inhibiting their
ability to grow and offer the same quality of products and services to their
Frequency Percent
Total 21 100
Based on the table above most of the coffee shops have policies or practices against
these types of fraud, namely worker’s compensation fraud, cash theft, inventory theft,
and check tampering and forgery. They probably have experience these in the past
Most of the respondents have selected cash theft as the common type of fraud they
have experienced in terms of asset misappropriation. This could mean that the
selected coffee shops may not have experienced an instance where they didn’t have a
very secure method of keeping their cash, lack of supervision of superiors, and
Frequency Percent
1 Others 1 4.8
Total 21 100
Based on the table above, majority of the coffee shops have policies or practices
against receiving counterfeit money, bribery and kickbacks, and billing schemes.
This could be because there have been cases of counterfeit money being distributed
and circulated, also some employees have the tendency to get a share of profit from
some suppliers, or some even go as far as to creating fictitious vendors in which the
orders will be paid for by the company without them knowing that it was all a ruse.
(Lomer, 2017)
Frequency Percent
6 Embezzlement 4 19
Total 21 100
Based on the table above, majority of the coffee shops have policies or practices
against personal purchases, fake supplier fraud, accounts receivable fraud, accounts
payable fraud, and embezzlement. Especially in small businesses with only few
employees with less supervision, accounting fraud could take place. Financial
records could easily be altered, source documents could be tampered with, etc.
(Lomer, 2017)
Frequency Percent
Total 21 100
Based on the table above, majority of the coffee shops have policies and practices
against timesheet fraud and cash advance fraud. Just like accounting fraud, if there is
Legend:
Descriptives
Standard Verbal
Fraud Detection Practice Mean
Deviation Interpretation
Counterchecking if the
inventory received reflects what Highly
3.9 0.301
is stated in the source documents practiced
(receipts, order forms, etc.)
Consistently counterchecking
for the invoice of the inventory Highly
3.62 0.740
bought if it matches the actual practiced
inventory count
Disposing of confidential
information properly, by Moderately
3.1 1.136
shredding documents and practiced
completely removing printed
to the company
The average results of the answers from the respondents is that they always have
Based on the gathered data, most of the companies make use of the surveillance
policies that they implemented to ensure that they can monitor the actions of the
personnel during working hours. This helps reduce the possibility of asset
misappropriations such as inventory theft, cash theft, using company assets for
The average results of the answers from the respondents is that their
management always views and utilizes the use of CCTV footage on a scheduled
basis.
Based on the gathered data, the selected companies really maximize the CCTV
supervision. This helps keep track of the activity of both customers and employees in
the company during work hours and makes employees less prone to doing anything
illegal or against company policy knowing that there is a possibility that the
The average results of the answers from the respondents is that the management
often allows authorized people to handle and check the monitoring of the CCTVs.
Based on the gathered data, the coffee shops do take their surveillance practices
The average results of the answers from the respondents is that they always
verify the authenticity of the suppliers by checking the important details before
making a purchase.
Based on the gathered data, the companies ensure that they are making purchases
to legitimate suppliers by checking their details to check for their authenticity before
The average results of the answers from the respondents is that they always
counter check if the inventory received reflects what it states in the source
documents.
Based on the gathered data, the companies regularly double-check the number of
items received from the supplier to make sure that it is equivalent to the number of
items ordered which was stated in the source documents. This helps identify if the
supplier either committed fraud or error in terms of their services, or one of the
employees made an incorrect count of the physical inventory or if inventory theft has
taken place.
The average results of the answers from the respondents is that they always
Based on the gathered data, the coffee shops want to see how the business
operates during normal working hours to catch them off guard and check what they
have the tendency of slacking off during the job or doing things that are not related to
their work.
The average results of the answers from the respondents is that they often restrict
access to company proprietary information to only those who have authorized access
Based on the gathered data, the selected companies strictly limit the people who
could easily change the data that has been encoded such as the revenue for the day,
The average results of the answers from the respondents is that they always have
a secure password for the databases or any important files or documents saved in
computers.
Based on the gathered data, the companies take their security procedures
seriously to ensure that only restricted people can access the files or confidential data,
so that no one could easily alter the data that has been encoded.
The average results of the answers from the respondents is that they often set up
controls in the computer system that will alert management if there are unauthorized
Based on the gathered data, although majority do try to set up controls to alert
management if an unauthorized person has been trying to access the system, but not
all of the coffee shops are aware of these kinds of controls or they are not able to
The average results of the answers from the respondents is that they often have a
Based on the gathered data, although majority do try to make use of softwares
and programs to better secure their information, but not all of the coffee shop
The average results of the answers from the respondents is that they always
Based on the gathered data, the companies do give importance in checking their
inventory to make sure that there is no occurrence of theft or human error in the
physical count.
The average results of the answers from the respondents is that they always
consistently countercheck for the invoice of the inventory bought if it matches the
Based on the gathered data, the selected coffee shops regularly recounts and
monitors to see if the number of items received from the supplier is equivalent to the
number of items ordered which was stated in the receipt, orders, etc. This helps
identify if the supplier either committed fraud or error in terms of their services, or
one of the employees made an incorrect count of the physical inventory or inventory
The average results of the answers from the respondents is that they often
disposing of them.
confidential information but not all opt for this kind of method because it is time
consuming and sometimes costly to buy a shredder since majority of the coffee shops
The average results of the answers from the respondents is that they always
keep the cash and checks in a locked cabinet or safe that can only be accessed by
Based on the gathered data, the companies maximize the use of locked cabinets
or safes to ensure that their cash, checks or other assets are secure, limited to very few
The average results of the answers from the respondents is that they often assign
Based on the gathered data, the companies are not always consistent in hiring a
trusted outside contractor probably because most coffee shops are still too small to go
to such extreme and costly precautions to ensure the safety and accuracy of their
accounting records.
The average results of the answers from the respondents is that they always
Based on the gathered data, the coffee shops regularly update their financial
records to make sure that it is up-to-date and accurate, decreasing the possibility of
The average results of the answers from the respondents is that they often have
employee.
Based on the gathered data, majority of the coffee shops have automated
biometric scanners but it is not always practiced regularly and it is also quite pricey
for a business that is still growing. Having an automated eme provides a more
efficient way of monitoring the attendance and schedule of employee and has less
attendance.
The average results of the answers from the respondents is that they always
reconcile the balance sheets and payroll accounts for each quarter.
Based on the gathered data, the companies regularly ensure their balance sheets
and payroll accounts are updated so that they can have a quick view of their business’
financial standing, without this business owners and accountants might not be able to
The average results of the answers from the respondents is that they often
conduct meetings to discuss adhering to the policies against possible threats or risks
to the company.
Based on the gathered data, the companies’ management isn’t able to regularly
discuss how they comply with the policies against threats or risks of the company.
The average results of the answers from the respondents is that they often
Based on the gathered data, the companies’ management don’t regularly check
or assess their weakness, areas they need to improve, etc to ensure that they anticipate
and are prepared for certain scenarios that could take place.
The average results of the answers from the respondents is that they always
operations.
Based on the gathered data, the companies’ management regularly analyzes the
extent of how effective they are in their practices during the course of the business to
know what they should start doing or stop doing that will benefit the company’s
operations.
Verbal
Standard
Fraud Prevention Practices Mean Interpret
Deviation
ation
behavior practiced
The average results of the answers from the respondents is that they often assign
and distribute the responsibilities of the staff to avoid unauthorized access to certain
Based on the gathered data, the companies don’t regularly practice delegating
tasks to different staff to ensure the accuracy and authenticity of the records, amount
of financial resources, inventory count, etc. Especially since most companies have
just started and usually only have at least 2-3 employees it is hard to distribute tasks
The average results of the answers from the respondents is that they always
Based on the gathered data, the companies’ management regularly assesses and
checks every individual that they hire to know if they have had any issues in the past
that could affect their performance in the coffee shops, and how they were with their
previous employer.
The average results of the answers from the respondents is that they always
ensure that all the employees are oriented and briefed on the company policies, rules
and regulations.
Based on the gathered data, the companies’ management regularly ensures that
their employees are made aware of the rules & regulations of the company as so that
they could adhere to the policies of the business and be able to know the
The average results of the answers from the respondents is that they often reward
The average results of the answers from the respondents is that they always discipline
Based on the gathered data, the coffee shops regularly adheres to disciplinary
actions for those who fail to comply to company rules and policies, this is to ensure
The average results of the answers from the respondents is that they always
implement an 'open-door policy' for the staff to allow them to share their opinions or
Based on the gathered data, the selected coffee shops’ management encourages
the staff to share their opinions and comments to their superiors or to the
management, which makes the staff feel like their inputs are valued.
The average results of the answers from the respondents is that they always
Based on the gathered data, the companies’ management wants to make sure that they
responsibility. Since health hazards and accidents are inevitable, the company also
has the right to request for proof to ensure that the money does go to the
The average results of the answers from the respondents is that they always
documents.
Based on the gathered data, the company verifies the authenticity and accuracy
of the source documents and financial records, it doesn’t just pass through or
The average results of the answers from the respondents is that they always
Based on the gathered data, the selected coffee shops double-checks the signatures of
The average results of the answers from the respondents is that they often
Based on the gathered data, the companies’ management usually makes a point
to have their superiors such as managers or supervisors to ensure the authenticity and
accuracy of the number of hours the employees worked, their attendance, and if they
indeed worked overtime. This reduces the chances of employees to alter their
4.5.1 Surveillance
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results show that the fraud detection practices of
surveillance obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of surveillance and the years of existence of the
business.
Regardless of how long the coffee shops have been operating, it does not affect
their methods and procedures of surveillance. Over the course of a couple of years,
during working hours, so this does not in any way relate to the existence of the
Table 11: Differences in the extent of practice for monitoring with regard to
years of existence
Variable F Value Sig. Value Decision on H0 Interpretation
CM 1 .810 .460 Accept H0 Not Significant
CM 2 .229 .798 Accept H0 Not Significant
CM 3 .574 .573 Accept H0 Not Significant
4.5.2. Monitoring
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud detection practices of
monitoring obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of monitoring and the years of existence of the
business.
Regardless of how long the company has been operating, it does not affect how
personnel take in performing their duties. It happens over time to observe and gauge
the progress of a business, and it does not take into account how long a business has
existed because this mostly involves how the management and staff carries this out.
(Ibraahim, 2014)
Table 12: Differences in the extent of practice for IT control with regard to
years of existence
Variable F Value Sig. Value Decision on H0 Interpretation
CIC 1 1.787 .196 Accept H0 Not Significant
CIC 2 .306 .740 Accept H0 Not Significant
CIC 3 .441 .650 Accept H0 Not Significant
CIC 4 .587 .566 Accept H0 Not Significant
4.5.3. IT Control
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud detection practices of IT control
obtained f-values greater than the 0.05 level of significance set by the study, thus
the null hypothesis is accepted. This means that there is no significant difference
between the practice of IT control and the years of existence of the business.
Regardless of how long the business has been operating, it does not affect the
way they handle and secure their digital data found in computers or databases. IT
implements them and how the employees comply with the methods, it does not
need to take into consideration how many years a company has existed. (Gatto,
2016)
Table 13: Differences in the extent of practice for physical control with regard
to years of existence
Variable F Value Sig. Value Decision on H0 Interpretation
CPC 1 .488 .622 Accept H0 Not Significant
CPC 2 .631 .544 Accept H0 Not Significant
CPC 3 .909 .421 Accept H0 Not Significant
CPC 4 .265 .770 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation of
One-way ANOVA. The results shows that the fraud detection practice of physical
control obtained f-values greater than the 0.05 level of significance set by the study,
thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of physical control and the years of existence of the
business.
Regardless of how long a business has been operating, it does not affect how they
handle and secure their tangible assets and resources. An effectively implemented
competence in this area with the foundation of ethical values to maintain the
integrity of the work of each and every employee is doing. It is more of an ethical
or habitual factor and does not matter how long a company has been operating.
(Koranteng, 2011)
Table 14: Differences in the extent of practice for accounting records with
regard to years of existence
Variable F Value Sig. Value Decision on H0 Interpretation
CAR 1 1.070 .364 Accept H0 Not Significant
CAR 2 .456 .641 Accept H0 Not Significant
CAR 3 .573 .574 Accept H0 Not Significant
CAR 4 .239 .790 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation of
One-way ANOVA. The results shows that the fraud detection practice of accounting
records obtained f-values greater than the 0.05 level of significance set by the study,
thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of accounting records and the years of existence of
the business.
Regardless of the number of years the company has been operating, it does not
affect how the company records, updates, or check their financial records and other
source documents. They still maintain proper accounting procedures and practices
even if they the company just started or has been ongoing for quite some time.
Table 15: Differences in the extent of practice for risk assessment with regard
to years of existence
Variable F Value Sig. Value Decision on H0 Interpretation
CRA 1 1.295 .298 Accept H0 Not Significant
CRA 2 .922 .416 Accept H0 Not Significant
CRA 3 .738 .492 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation of
One-way ANOVA. The results shows that the fraud detection practices of risk
assessment obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of risk assessment and the years of existence of the
business.
Regardless of how long the business has been operating, the way they assess and
mitigate risks or the methods and procedure they implement since risk assessment is
an ongoing cycle of identifying and preparing for any internal or external risk due
it doesn’t take into account how long a company has existed. (Tan, 2013)
Table 16: Differences in the extent of practice for surveillance with regard to
annual net income
Variable F Value Sig. Value Decision on H0 Interpretation
CS 1 .714 .557 Accept H0 Not Significant
CS 2 1.494 .252 Accept H0 Not Significant
CS 3 .845 .488 Accept H0 Not Significant
4.6.1. Surveillance
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud detection practice of
surveillance obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of surveillance and the annual net income of the
business.
Regardless of how much revenue the company earns, it does not affect their
during working hours, so this does not in any way relate to how much the business
Table 17: Differences in the extent of practice for monitoring with regard to
annual net income
Variable F Value Sig. Value Decision on H0 Interpretation
CM 1 .599 .624 Accept H0 Not Significant
CM 2 1.169 .351 Accept H0 Not Significant
CM 3 .910 .457 Accept H0 Not Significant
4.6.2. Monitoring
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud detection practice of monitoring
obtained f-values greater than the 0.05 level of significance set by the study, thus
the null hypothesis is accepted. This means that there is no significant difference
between the practice of monitoring and the annual net income of the business.
Regardless of how much revenue is being earned by the company over the
course of a year, it does not affect how the company keeps track of business
activities of an entity and other actions personnel take in performing their duties. It
happens over time to observe and gauge the progress of a business, and it does not
consider how much the business earns because this mostly involves how the
Table 18: Differences in the extent of practice for IT control with regard to
annual net income
Variable F Value Sig. Value Decision on H0 Interpretation
CIC 1 .149 .929 Accept H0 Not Significant
CIC 2 .655 .590 Accept H0 Not Significant
CIC 3 2.641 .083 Accept H0 Not Significant
CIC 4 2.868 .067 Accept H0 Not Significant
4.6.3. IT Control
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud detection practice of IT control
obtained f-values greater than the 0.05 level of significance set by the study, thus
the null hypothesis is accepted. This means that there is no significant difference
between the practice of IT control and the annual net income of the business.
Regardless of how much the company earns, it does not affect the way they
implements them and how the employees comply with the methods, it does not
need to take into consideration how much is the company’s yearly revenue.
(Gatto, 2016)
Table 19: Differences in the extent of practice for physical control with regard
to annual net income
Variable F Value Sig. Value Decision on Interpretation
H0
CPC 1 1.041 .400 Accept H0 Not Significant
CPC 2 1.686 .208 Accept H0 Not Significant
CPC 3 .050 .985 Accept H0 Not Significant
CPC 4 .837 .492 Accept H0 Not Significant
specifically physical control, when grouped according to annual net income using
One-way ANOVA. The results shows that the fraud detection practices of physical
control obtained f-values greater than the 0.05 level of significance set by the study,
thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of physical control and the annual net income of the
business.
Regardless of how much the company earns, it does not affect how they handle
and secure their tangible assets and resources. An effectively implemented physical
this area with the foundation of ethical values to maintain the integrity of the work
of each and every employee is doing. It is more of an ethical or habitual factor and
Table 20: Differences in the extent of practice for accounting records with
regard to annual net income
Based on the table above the researchers compared differences in the evaluation
using One-way ANOVA. The results shows that the fraud detection practice of
accounting records obtained f-values greater than the 0.05 level of significance set
by the study, thus the null hypothesis is accepted. This means that there is no
significant difference between the practice of accounting records and the annual net
Regardless of how much the company earns, it does not affect how the company
records, updates, or check their financial records and other source documents. They
still maintain proper accounting procedures and practices even if they gain more
Table 21: Differences in the extent of practice for risk assessment with regard
to annual net income
Variable F Value Sig. Value Decision on H0 Interpretation
CRA 1 .465 .710 Accept H0 Not Significant
CRA 2 1.125 .367 Accept H0 Not Significant
CRA 3 .890 .466 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation
specifically risk assessment, when grouped according to annual net income using
One-way ANOVA. The results shows that the fraud detection practice of risk
assessment obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of risk assessment and the annual net income of the
business.
Regardless of how much the company earns, it does not affect the way they
assess and mitigate risks or the methods and procedure they implement since risk
ongoing process, and it doesn’t take into account how much a business earns. (Tan,
2013)
Table 22: Differences in the extent of practice for surveillance with regard to
number of employees
Variable F Value Sig. Value Decision on H0 Interpretation
CS 1 .462 .712 Accept H0 Not Significant
CS 2 .594 .628 Accept H0 Not Significant
CS 3 .336 .800 Accept H0 Not Significant
4.7.1. Surveillance
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud detection practice of
surveillance obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
Regardless of the number of employees the coffee shops have, it does not affect
their methods and procedures of surveillance. Over the course of a couple of years,
during working hours, so this does not in any way relate to the number of
Table 23: Differences in the extent of practice for monitoring with regard to
number of employees
Variable F Value Sig. Value Decision on H0 Interpretation
CM 1 2.176 .128 Accept H0 Not Significant
CM 2 4.571 .025 Reject H0 Significant
CM 3 .471 .706 Accept H0 Not Significant
4.7.2. Monitoring
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud detection practice of monitoring
obtained f-values greater than the 0.05 level of significance set by the study, thus
the null hypothesis is accepted. Except for one monitoring practice, specifically
counter checking if the inventory received reflects what is stated in the source
documents, which obtained an f-value .025 that is less than the 0.05 level of
significance set by the study, thus the null hypothesis is rejected. This means that
there is a significant difference between the practice of monitoring and the number
of employees.
Due to lack of personnel, since majority of the coffee shops usually have at
least 2 or 3 employees, they are not able to allot time to double-check or recount the
items delivered from suppliers, considering they have other tasks during their
software system, you can keep a closer eye on the movement of your products
without making your employees feel like you’re watching their every move. Having
Table 24: Differences in the extent of practice for IT control with regard to
number of employees
Variable F Value Sig. Value Decision on H0 Interpretation
CIC 1 .201 .894 Accept H0 Not Significant
CIC 2 .600 .624 Accept H0 Not Significant
CIC 3 .522 .673 Accept H0 Not Significant
CIC 4 .640 .599 Accept H0 Not Significant
4.7.3. IT Controls
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud detection practice of IT controls
obtained f-values greater than the 0.05 level of significance set by the study, thus
the null hypothesis is accepted. This means that there is no significant difference
Regardless of the number of employees hired by the business, it does not affect
the way they handle and secure their digital data found in computers or databases.
implements them and how the employees comply with the methods, it does not
need to take into consideration how many number of employees there are. (Gatto,
2016)
Table 25: Differences in the extent of practice for physical control with regard
to number of employees
Variable F Value Sig. Value Decision on H0 Interpretation
CPC 1 .093 .963 Accept H0 Not Significant
CPC 2 .248 .862 Accept H0 Not Significant
CPC 3 .579 .637 Accept H0 Not Significant
CPC 4 .224 .878 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation
using One-way ANOVA. The results shows that the fraud detection practice of
physical control obtained f-values greater than the 0.05 level of significance set by
the study, thus the null hypothesis is accepted. This means that there is no
significant difference between the practice of physical control and the number of
employees.
Regardless of the number of personnel hired by the business, it does not affect
how they handle and secure their tangible assets and resources. The employees
handle these the same way they were trained or instructed, regardless of how many
they are they go through the same training and orientation. An effectively
maintain competence in this area with the foundation of ethical values to maintain
the integrity of the work of each and every employee is doing. It is more of an
ethical or habitual factor and does not matter how many employees are there.
(Koranteng, 2011)
Table 26: Differences in the extent of practice for accounting records with
regard to number of employees
Variable F Value Sig. Value Decision on H0 Interpretation
CAR 1 .423 .739 Accept H0 Not Significant
CAR 2 5.161 .017 Reject H0 Significant
CAR 3 .981 .425 Accept H0 Not Significant
CAR 4 .959 .434 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation
using One-way ANOVA. The results shows that the fraud detection practices of
accounting records obtained f-values greater than the 0.05 level of significance set
by the study, thus the null hypothesis is accepted. Except for one fraud detection
documents on a regular basis, which obtained an f-value of .017 which is less than
the 0.05 level of significance set by the study, thus the null hypothesis is
rejected. This means that there is a significant difference between the practice of
Keeping track of the financial standing of the business helps make sound
business decisions, manage your cash flow, demonstrate your business’s financial
position to suppliers, accountants and prospective buyers, protect your business and
minimize costs. Due to lack of employees, they haven’t been able to regularly
update and review financial records or source documents, since they also have other
tasks that require their attention. Hence, they won’t be able to fully assess or
prepare for any risks that are financially related. (Australian Government, 2018)
Table 27: Differences in the extent of practice for risk assessment with regard
to number of employees
Variable F Value Sig. Value Decision on H0 Interpretation
CRA 1 .454 .718 Accept H0 Not Significant
CRA 2 .759 .532 Accept H0 Not Significant
CRA 3 .265 .850 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation
using One-way ANOVA. The results shows that the fraud detection practices of risk
assessment obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of risk assessment and the number of employees.
Regardless of how many employees they hire, it does not affect the way they
assess and mitigate risks or the methods and procedure they implement since risk
ongoing process, and it doesn’t take into account how many staff are employed.
(Tan, 2013)
Table 28: Differences in the extent of practice for segregation of duties with
regard to years of existence
Variable F Value Sig. Value Decision on H0 Interpretation
DSD .441 .650 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation
using One-way ANOVA. The results shows that the fraud prevention practice of
surveillance obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of segregation of duties and the years of existence
of the business.
does not affect the way they distribute workload or responsibilities among the staff
or how they maximize the delegation of task. When employees are getting
will most likely improve, or at the least, not decrease. When an organization uses
delegation to develop their employees they are better placed to know who has the
competencies in place to take on higher duties. It does not matter how long a
Table 29: Differences in the extent of practice for supervision of duties with
regard to years of existence
Variable F Value Sig. Value Decision on H0 Interpretation
DS1 .484 .624 Accept H0 Not Significant
DS2 .229 .798 Accept H0 Not Significant
DS3 1.429 .265 Accept H0 Not Significant
DS4 1.222 .318 Accept H0 Not Significant
DS5 1.613 .227 Accept H0 Not Significant
DS6 .408 .671 Accept H0 Not Significant
4.8.2. Supervision
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud prevention practice of
supervision obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of supervision and the years of existence of the
business.
Regardless of how long the business has been operating, it does not affect how
the management supervises the employees or the steps taken into ensuring how well
they handle their staff. They are responsible for the establishment of internal control
policies and procedures and responsible for providing governance, guidance and
oversight and all personnel are responsible for reporting problems, such as policy
violations or illegal actions. It has nothing to do with how long a company has been
Table 30: Differences in the extent of practice for independent verification with
regard to years of existence
Variable F Value Sig. Value Decision on H0 Interpretation
DIV1 .527 .599 Accept H0 Not Significant
DIV2 .383 .688 Accept H0 Not Significant
DIV3 .614 .552 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation
using One-way ANOVA. The results shows that the fraud prevention practice of
independent verification obtained f-values greater than the 0.05 level of significance
set by the study, thus the null hypothesis is accepted. This means that there is no
significant difference between the practice of independent verification and the years
Regardless of how long the business has been operating, it does not affect the
the operation of the business. This would depend on the assigned people carrying
out this task and not the number of years a company has existed. (Kuman, 2016)
Table 31: Differences in the extent of practice for segregation of duties with
regard to annual net income
Variable F Value Sig. Value Decision on H0 Interpretation
DSD .780 .521 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation
using One-way ANOVA. The results shows that the fraud prevention practice of
segregation of duties obtained f-values greater than the 0.05 level of significance set
by the study, thus the null hypothesis is accepted. This means that there is no
significant difference between the practice of segregation of duties and the annual
does not affect the way they distribute workload or responsibilities among the staff
or how they maximize the delegation of task. When employees are getting
will most likely improve, or at the least, not decrease. When an organization uses
delegation to develop their employees they are better placed to know who has the
competencies in place to take on higher duties. It does not matter how much the
2014)
Table 32: Differences in the extent of practice for supervision with regard to
annual net income
4.9.1. Supervision
Based on the table above the researchers compared differences in the evaluation of
One-way ANOVA. The results shows that the fraud prevention practice of
supervision obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of supervision and the annual net income of the
business.
Regardless of how much the business earns annually, it does not affect the
employees. They are responsible for the establishment of internal control policies
and procedures and responsible for providing governance, guidance and oversight
and all
personnel are responsible for reporting problems, such as policy violations or illegal
actions. It has nothing to do with the net income of the company because it depends
Table 33: Differences in the extent of practice for independent verification with
regard to annual net income
Based on the table above the researchers compared differences in the evaluation of
using One-way ANOVA. The results shows that the fraud prevention practice of
independent verification obtained f-values greater than the 0.05 level of significance
set by the study, thus the null hypothesis is accepted. This means that there is no
Regardless of the amount of net income, it does not affect the methods or procedure
as there will be no emotional ties or hidden agendas to the operation of the business.
This would depend on the assigned people carrying out this task and not how much
Table 34: Differences in the extent of practice for segregation of duties with
regard to number of employees
Variable F Sig. Value Decision on Interpretation
Value H0
DSD 1.238 .327 Accept H0 Not Significant
Based on the table above the researchers compared differences in the evaluation
using One-way ANOVA. The results show that the fraud prevention practice of
segregation of duties obtained f-values greater than the 0.05 level of significance set
by the study, thus the null hypothesis is accepted. This means that there is no
significant difference between the practice of segregation of duties and the number
of employees.
Regardless of how many employees they hire, it does not affect the way they
distribute workload or responsibilities among the staff or how they maximize the
challenge themselves, their loyalty and productivity will most likely improve, or at
the least, not decrease. When an organization uses delegation to develop their
employees they are better placed to know who has the competencies in place to take
on higher duties. It does not matter if the company only has few staff as long as the
Table 35: Differences in the extent of practice for supervision with regard to
number of employees
4.10.2. Supervision
Based on the table above the researchers compared differences in the evaluation
One-way ANOVA. The results shows that the fraud prevention practice of
supervision obtained f-values greater than the 0.05 level of significance set by the
study, thus the null hypothesis is accepted. This means that there is no significant
difference between the practice of supervision and the number of the employees.
Regardless of how many employees they hire, it does not affect how the
management supervises the employees or the steps taken into ensuring how well
they handle their staff. They are responsible for the establishment of internal control
policies and procedures and responsible for providing governance, guidance and
personnel are responsible for reporting problems, such as policy violations or illegal
Table 36: Differences in the extent of practice for independent verification with
regard to number of employees
Variable F Value Sig. Value Decision on H0 Interpretation
DIV1 2.642 .083 Accept H0 Not Significant
DIV2 1.057 .393 Accept H0 Not Significant
DIV3 3.925 .027 Reject H0 Significant
Based on the table above the researchers compared differences in the evaluation of
employees using One-way ANOVA. The results shows that the fraud prevention
practice of independent verification obtained f-values less than the 0.05 level of
significance set by the study, thus the null hypothesis is rejected. This means that
Due to the fact that majority of the coffee shops only have at least 2 to 3 employees
without any bias. Specifically in terms of verifying the authenticity of the approval
lack of staff, the current employees have no other alternative but to have to verify it
Summary of Finding
1. Demographic Profile
1.1 Years of Existence
1.1.1 2 out of 21 of the coffee shops have existed for more than 10 years
with a percentage of 9.5 out of the total respondents.
1.1.2 2 out of 21 of the coffee shops have existed for at least 6-10 years
with a percentage of 9.5 out of the total respondents.
1.1.3 17 out of 21 of the coffee shops have existed for at least 1-5 years
with a percentage of 81 out of the total respondents.
1.2.1 5 out of 21 of the coffee shops have an annual net income of more than
P300,000 with a percentage of 23.8 out of the total respondents.
1.2.2 3 out of 21 of the coffee shops have an annual net income between
P100,000 and P300,000 with a percentage of 14.3 out of the total
respondents.
1.2.3 13 out of 21 of the coffee shops have an annual net income less than
P100,000 with a percentage of 61.9 out of the total respondents.
1.3.1 4 out of 21 of the coffee shops have more than 10 employees with a
percentage of 19 out of the total respondents.
2. Type of Fraud
2.1.1 2 out of 21 of the coffee shops are aware and have policies
implemented for worker's compensation fraud with a percentage of 9.5 out
of the total respondents.
2.1.2 16 out of 21 of the coffee shops are aware and have policies
implemented for cash theft with a percentage of 76.2 out of the total
respondents.
2.1.3 2 out of 21 of the coffee shops are aware and have policies
implemented for inventory theft with a percentage of 9.5 out of the total
respondents.
2.1.4 1 out of 21 of the coffee shops are aware and have policies
implemented for check tampering and forgery with a percentage of 4.8 out
of the total respondents.
2.2.1 1 out of 21 of the coffee shops are aware and have policies
implemented for receiving counterfeit money sales with a percentage of 4.8
out of the total respondents.
2.2.2 2 out of 21 of the coffee shops are aware and have policies
implemented for bribery and kickbacks with a percentage of 9.5 out of the
total respondents.
2.2.3 18 out of 21 of the coffee shops are aware and have policies
implemented for billing schemes with a percentage of 85.7 out of the total
respondents.
2.3.1 1 out of 21 of the coffee shops are aware and have policies
implemented for personal purchases with a percentage of 4.8 out of the total
respondents.
2.3.2 9 out of 21 of the coffee shops are aware and have policies
implemented for fake supplier fraud with a percentage of 42.9 out of the total
respondents.
2.3.3 3 out of 21 of the coffee shops are aware and have policies
implemented for accounts receivable fraud with a percentage of 14 out of the
total respondents.
2.3.4 3 4 out of 21 of the coffee shops are aware and have policies
implemented for accounts payable fraud with a percentage of 19 out of the
total respondents.
2.3.5 4 out of 21 of the coffee shops are aware and have policies
implemented for embezzlement with a percentage of 19 out of the total
respondents.
2.4.1 11 out of 21 of the coffee shops are aware and have policies
implemented for timesheet fraud with a percentage of 52.4 out of the total
respondents.
2.4.2 10 out of 21 of the coffee shops are aware and have policies
implemented for cash advance fraud with a percentage of 47.6 out of the
total respondents.
3.1 Surveillance
3.1.3 Allowing authorized people to handle and check the monitoring of the
CCTVs
CHAPTER 5:
5.1 Conclusion
Based on the findings of the study, the researchers therefore conclude the following:
a. Majority of the coffee shops have only existed for at least 1-5 years.
b. Majority of the coffee shops have an annual net income of less than
P100,000
(branch).
2. The types of fraud that the coffee shops may have experienced:
b. In terms of vendor fraud, majority of the coffee shops are aware and have
c. In terms of accounting fraud, majority of the coffee shops are aware and
d. In terms of payroll fraud, majority of the coffee shops are aware and have
3. The extent of the practice for fraud detection that is being implemented by the
coffee shops:
4. The extent of the practice for fraud prevention that is being implemented by the
coffee shops:
5. There is a significant difference in the extent of the practice for fraud detection
when grouped according to the profile, specifically the practices of monitoring and
6. There is a significant difference in the extent of the practice for fraud prevention
Recommendation
Based on the findings and analysis of the data gathered, the researchers therefore
to help track or monitor the inventory, without the hassle of physically counting it
every now and then. This inventory system would be accessible to management or
even the business owner without having to check in on the employees or the
inventory on a regular basis. This will ensure an accurate count of the company’s
resources.
2. The coffee shop management should set a scheduled day during the week
where they could update and review all of the financial records that accumulated
over the course of the week. They could also make it a policy to update the sales,
expenses, budget tracker, etc, before the business day ends to ensure the accuracy of
the financial records and be aware of the real time standing of the business.
3. The coffee shop management should assign specific people to a specific task,
taking into consideration the fact that there is a limited number of employees, they
could segregate duties and distribute the tasks among the available staff. With each
one of them assigned to a certain task that does not involve the other, especially
with regards to sensitive tasks like updating timesheets, counter-checking cash sales,
updating sales, inventory counts, etc. This would help ensure the authenticity and
Bibliography
https://rospaworkplacesafety.com/2013/01/21/what-is-a-risk-assessment/
Bush, B. (2017, December 4). Three ways to identify and combat vendor fraud.
Retrieved from RSM:
https://rsmus.com/what-we-do/services/financial-advisory/forensic-accounti
ng-and-fraud-investigations/three-ways-to-identify-and-combat-vendor-frau
d.html
Bush, B. (2017, December 4). Three ways to identify and combat vendor fraud.
Retrieved July 22, 2018, from RSM:
https://rsmus.com/what-we-do/services/financial-advisory/forensic-accounti
ng-and-fraud-investigations/three-ways-to-identify-and-combat-vendor-frau
d.html
Chartered Institute of Management Accountants. (2008). Fraud Risk Management:
A Guide to Good Practice. London.
Costard, S. (2008). Introduction to Risk Analysis.
Crain, M. (2018, March 1). Mitigating Risk Through Fraud Prevention and
Detection. Retrieved from Kaufman|Rossin:
https://kaufmanrossin.com/blog/mitigating-risk-fraud-prevention-detection/
Creswell, J. W. (2013). Research design: Qualitative, quantitative, and mixed
method approaches. Sage Publications, Incorporated.
Crossman, A. (2018, April 1). Understanding Purposive Sampling. Retrieved from
ThoughtCo: https://www.thoughtco.com/purposive-sampling-3026727
DANONE. (2018, july 12). INTERNAL CONTROL SUPERVISOR. Retrieved july
26, 2018, from DANONE:
https://jobs.danone.com/job/Jakarta-Selatan-INTERNAL-CONTROL-SUPE
RVISOR-JK/441012101/
Davies, B. (2013, October 31). Research Design. Retrieved from Antartic Glaciers:
http://www.antarcticglaciers.org/students-3/postgraduate-students/research-d
esign/
Deloitte. (2011). Fraud Risk Management.
Dimitrijevic, D., Milovanovic, V., & Stancic, V. (2015). The Role of a Company's
Internal Control System in Fraud Prevention. eFinanse.
Education Career. (2014, January 3). Fraud Prevention Supervisor Job Description.
Retrieved July 26, 2018, from EducationCareerArticles:
http://educationcareerarticles.com/career-information/job-descriptions/fraud
-prevention-supervisor-job-description/
Elders Insurance. (2013, April 18). The four techniques of risk management.
Retrieved July 22, 2018, from Elders Insurance:
https://www.eldersinsurance.com.au/resources/the-four-techniques-of-risk-
management
Firth, M. (2017, July 5). Coffee Shop Manager Job Description. Retrieved from
Career Trend:
https://careertrend.com/coffee-shop-manager-job-description-2379.html
Fraud Detection And Prediction: Definition, Overview Aand Types. (2015, July 14).
Retrieved July 23, 2018, from Mordor Intelligence:
https://blog.mordorintelligence.com/fraud-detection-and-prevention-definiti
on-and-types/
Gage, A., & Melissa, D. (2009). Monitoring and Evaluating Gender-Based Violence
Prevention and Mitigation Programs.
Garrett, M. (2013, August 6). Entrepreneur. Retrieved from 4 Kinds of Fraud That
Could Destroy Your Business: https://www.entrepreneur.com/article/227689
Gatto. (2016, June 7). ITG General Controls / IT Risk Assessment. Retrieved from
ISACA:
https://www.isaca.org/chapters3/Charlotte/Events/Documents/Event%20Pre
sentations/06072016/IT%20General%20Controls%20-%20John%20Gatto%
20(Part%201).pdf
Gray, R. B. (2017, November 8). Patriot Software. Retrieved from What Is Workers’
Compensation Fraud?:
https://www.patriotsoftware.com/payroll/training/blog/what-is-workers-com
pensation-fraud-fighting-penalties/
Group, Brumell. (2015, March 25). THE FRAUD TRIANGLE THEORY. Retrieved
July 22, 2018, from Brumell Group:
http://www.brumellgroup.com/news/the-fraud-triangle-theory/
Hall, J. A. (2011). Accounting Information Systems.
Hall, J. A. (2011). Accounting Informations Systems (7th Edition). Ohio: Cengage
Learning.
Human Resources. (2018, 8 14). Paychex Worx Knowledge at Work. Retrieved from
Employment Background Checks May Sharpen Your Recruitment Efforts:
https://www.paychex.com/articles/human-resources/importance-of-backgrou
nd-checks
Human Resources. (2018, 2 27). Paychex Worx Knowledge At Work. Retrieved from
How an Open-Door Policy in the Workplace Can Benefit Your Business:
https://www.paychex.com/articles/human-resources/open-door-policy-in-the
-workplace
Ibraahim, A. M. (2014, June). Academia. Retrieved from The Effect of Internal
Control on Financial Performance in Hargeisa Local Government case study:
https://www.academia.edu/9964102/The_Effect_of_Internal_Control_on_Fi
nancial_Performance_in_Hargeisa_Local_Government_case_study
Independent Verification and Validation. (2001).
Investopedia. (2018, July 16). Risk Management. Retrieved from Investopedia:
https://www.investopedia.com/terms/r/riskmanagement.asp
Investopedia. (2018, July 26). T-test. Retrieved from Investopedia:
https://www.investopedia.com/terms/t/t-test.asp
Johnson, S. (2011, December 23). Importance of Data Analysis in Research.
Retrieved from
http://dissertation-help-uk.blogspot.com/2011/12/importance-of-data-analysi
s-in-research.html
Jones, I. J. (2016, November 25). Ethical Advocate. Retrieved from Reward Ethical
Conduct: https://www.ethicaladvocate.com/reward-ethical-conduct/
Joseph, C. (2018, June 23). Chron. Retrieved from Why Is Orientation Important to
the Employees?:
https://smallbusiness.chron.com/orientation-important-employees-11562.ht
ml
Kennedy, K. A. (2012). An Analysis of Fraud: Causes, Prevention, and. Retrieved
July 26, 2018, from University of New Hampshire:
https://scholars.unh.edu/cgi/viewcontent.cgi?article=1099&context=honors
Kim, J. (2017, September 3). jiahkimlaw. Retrieved from What You Should Know
When You Hire Independent Contractors from the Philippines:
http://jiahkimlaw.com/business/philippines-independent-contractors/
Kohanzad, B. (2015, December 30). LnkedIn. Retrieved from Importance of
Keeping Accurate Accounting Records:
https://www.linkedin.com/pulse/importance-keeping-accurate-accounting-re
cords-kohanzad-ea-cfe
raud+schemes+include%3A+timesheet+fraud+and+paycheck+theft+(Lomer
%2C+2017).&aqs=chrome..69i57.2800j0j4&sourceid=chrome&ie=U
Lomer, D. (2017, March 15). 41 Types of Fraud and How to Detect and Prevent
Them. Retrieved July 22, 2018, from i-Sight:
https://i-sight.com/resources/41-types-of-fraud-and-how-to-detect-and-preve
nt-them/
Lowers, M. (2014, July 1). THE RISK MANAGEMENT BLOG. Retrieved July 27,
2018, from Lowers and Associates:
http://blog.lowersrisk.com/why-fraud-prevention-matters/
Mackenzie, R. J. (2018, July 20). Informatics from Technology Netwroks. Retrieved
from One-Way vs Two-Way ANOVA: Differences, Assumptions and
Hypotheses:
https://www.technologynetworks.com/informatics/articles/one-way-vs-two-
way-anova-definition-differences-assumptions-and-hypotheses-306553
Mayhew, R. (2018, May 18). Chron. Retrieved from Types of Discipline Used in
the Workplace:
https://smallbusiness.chron.com/types-discipline-used-workplace-10890.htm
l
McLeod, S. (2014). Sampling Methods. Retrieved from Simply Psychology:
https://www.simplypsychology.org/sampling.html
McLeod, S. (2018). Questionnaire. Retrieved from Simply Psychology:
https://www.simplypsychology.org/questionnaires.html
Medel, M. &. (2014, June 28). Prezi. Retrieved from Descriptive Method:
https://prezi.com/3rdptjum29u9/descriptive-method/
Merchanpro Express. (2017, May 17). What is the Difference Between an
Authorization Fee and a Transaction Fee? Retrieved July 26, 2018, from
Merchanpro Express:
https://news.merchantproexpress.com/what-is-an-authorization-fee-and-a-tra
nsaction-fee
Mutetwa, S. (2015, April 20). IMPORTANCE OF RISK MANAGEMENT FOR ANY
ORGANISATION. Retrieved July 25, 2018, from LinkedIn:
https://www.linkedin.com/pulse/importance-risk-management-any-organisat
ion-shingai-mutetwa
Nguyen, V. (2013, January 24). How Starbucks and Other Coffee Shops May
Spacey, J. (2015, August 27). 6 Types of Compliance Risk. Retrieved July 21, 2018,
from Simplicable: https://simplicable.com/new/compliance-risk
Spacey, J. (2016, October 30). 29 Examples of IT Controls. Retrieved July 26, 2018,
from Simplicable: https://simplicable.com/new/it-control-examples
Tan, L. H. (2013, December). Calhoun. Retrieved from An analysis of internal
controls and procurement fraud deterrence:
https://calhoun.nps.edu/bitstream/handle/10945/39022/13Dec_Tan_Li_Huan
g_Joyce.pdf?sequence=1
Tashia. (2015, March 5). Pros and Cons of opening a Cafe or Bar. Retrieved from
MotivatingMum:
https://www.motivatingmum.com/blog/pros-and-cons-of-opening-a-cafe-or-
bar/
Ten Six. (2017, March 28). 7 IMPACTS OF POOR RISK MANAGEMENT (AND
WHAT YOU CAN DO ABOUT THEM). Retrieved July 27, 2018, from Ten
Six Consulting:
https://tensix.com/2017/03/7-impacts-of-poor-risk-management-and-what-y
ou-can-do-about-them/
Thibodeaux, W. (2018, June 28). Chron. Retrieved from The Importance of
Keeping an Accurate Inventory:
https://smallbusiness.chron.com/importance-keeping-accurate-inventory-23
304.html
Thompson, M. (2017, October 31). Everything You Need to Know about Asset
Misappropriation Fraud – and How to Deal with it. Retrieved from
NewsBlaze:
https://newsblaze.com/business/finance/everything-you-need-to-know-about
-asset-misappropriation-fraud-and-how-to-deal-with-it_88698/
UK Essays. (2017, April 24). The Importance of Data Collection. Retrieved from
UK Essays:
https://www.ukessays.com/essays/construction/the-importance-of-data-colle
ction-construction-essay.php
Veenstra, J. (2017, March 20). Quora. Retrieved from What is “frequency” in
statistics?:
https://www.quora.com/What-is-%E2%80%9Cfrequency%E2%80%9D-in-s
tatistics