English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 112880/143846 (78%)
Visitors : 50054629      Online Users : 300
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 會計學系 > 學位論文 >  Item 140.119/136287
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/136287


    Title: 中國大陸上市公司現金舞弊甄別模型研究
    Assessing the Likelihood of Cash Fraud on Listed Companies in China
    Authors: 馬蕭
    Ma, Xiao
    Contributors: 林宛瑩
    Lin, Wan-Ying
    馬蕭
    Ma, Xiao
    Keywords: 現金舞弊
    舞弊三角
    舞弊甄別模型
    Cash Fraud
    Fraud Triangle Theory
    Fraud-Detecting Model
    Date: 2021
    Issue Date: 2021-08-04 14:28:39 (UTC+8)
    Abstract: 本研究以2010年至2019年因財務違規而受到處罰的中國大陸上市公司為研究對象,篩選出133份涉嫌現金舞弊的年度樣本,設置404份配比樣本,並將樣本按時間分為控制組和測試組。本文使用分層邏輯分析的方法,構建舞弊甄別模型。
    首先, 本文根據舞弊三角理論,將舞弊三角之誘因或壓力、機會及態度和行為合理化以代理變數衡量,測試這些代理變數是否與現金舞弊相關聯,並辨認出12個存在顯著差異的變量,據此構建現金舞弊事前預警模型,此為企業現金舞弊之內在原因。
    其次,本文根據發生現金舞弊公司的財務報表中各種財務和非財務比率的異常表現,辨認出10個具有顯著差異的現金舞弊風險因子,據此構建現金舞弊事後偵查模型,此為企業現金舞弊之外在表現。
    分層迴歸分析中的第一層次模型為事前預警模型和事後偵查模型, 並產生相應的舞弊風險因子。在此基礎上, 本文將事前預警風險因子和事後偵查風險因子結合在一起, 構建出中國大陸上市公司現金舞弊綜合甄別模型,該模型總體判別準確率進一步提高到83.07%。
    This study screens 133 observations of suspected cash frauds from listed companies in mainland China that were punished for financial violations over the period 2010 to 2019, and 404 non-fraud observations are also selected as the matched sample. A cascaded logit approach is adopted to construct the fraud-detecting model.
    First of all, based on the fraud trinagle theory, this study employs proxy variables to measures incentives or pressures, opportunities and rationalization (or justification or attitude) and further tested whether these proxy variables are related to the occurrence of cash frauds. The cash fraud pre-warning model is then built on these implicit factors for cash fraud.
    Secondly, based on the abnormal performance of various financial ratios found in the financial statements of companies that have committed cash fraud, this study is able to find 10 financial and nonfinancial varibles. The cash fraud post-detection model is then built on these explicit factors for cash fraud.
    The pre-warning model and the post-detection model represent the first-level model in the cascaded logit analysis, and each of these first-level model generates a risk index. On this basis, this study incorporates these two risk indices into the second-level model to construct an integrative fraud-detecting model. The overall discrimination accuracy is further improved to 83.07%.
    Reference: 王立彥及劉軍霞,2004,A-H股雙重報告差異與公司治理,北京大學出版社。
    王健姝及陳漢文,2010,財務報告舞弊公司事務所任期與審計品質——基於非財務資料的實證研究,山西財經大學學報,032(001):115-124。
    余臻蔚,2010,上市公司股權結構與財務報告舞弊實證分析,江蘇科技大學碩士論文。
    吳聯生及李辰,2004,人類有限性與會計資訊行為性失真,會計研究,2004(02):16-22。
    宋夏雲、陳麗慧及況玉書,2019,康得新財務造假案例分析,財務管理研究, 1(2):62-67。
    李承諺,2013,應用舞弊三角理論偵測及預測財務報表舞弊-以台灣上市(櫃)公司為例,成功大學會計學學位論文。
    李清及黨正磊,2019,會計舞弊風險指數構建和評價研究——基於因數分析,數理統計與管理,2019(06): 1048-1061。
    李清及任朝陽,2015,基於案例推理的財務報告舞弊識別研究,財經理論與實踐,36(3): 84-89。
    李連華及張雪瑤,2017,企業超額持有現金是否導致高管腐敗,會計論壇,540(001): 8-30。
    辛宇及徐莉萍,2006,公司治理机制与超额现金持有水平,管理世界,2006(005):136-141。
    李政、張文修及鐘永紅,2006,我國上市公司信息披露違規預警模型的缺陷及修正,當代經濟科學,28(2):104-109。
    韋德洪及張榮艷,2006,上市公司貨幣資金佔比與業績相關性實證分析,經濟與管理研究,2006(012):56-62。
    孫健,2007,終極控制權與超額現金持有,中國會計學會2007年學術年會。
    秦江萍,2006,會計舞弊的市場反應與識別:理論分析與經驗證據,北京:經濟科學出版社。
    馬賢明及鄭朝暉,2006,凱撒的歸凱撒人民的歸人民—上市公司五大現金舞弊手法揭秘,新財經,2006(02): 64-68。
    張思偉,2012,基於現金流量視角的上市公司盈餘品質研究,安徽財經大學會計系碩士論文。
    張曾蓮及高雅,2017,財務舞弊識別模型構建及實證檢驗,統計與決策,2017(09) :172-175。
    許存興,張芙蓉及王大江,2009,上市公司股權結構與財務舞弊識別關係實證分析,金融與經濟,2009(11): 54-57。
    連竑彬,2008,中國上市公司財務報表舞弊現狀分析及甄別模型研究,廈門大學博士論文。
    陳亮及王炫,2003,會計資訊欺詐經驗分析及識別模型,證券市場導報,2003(16):92-96。
    陳莫,2007,公司超額現金持有與業績的相關性研究—來自A股製造業的經驗證據,上海財經大學會計系碩士論文。
    陸建橋,2002,中國虧損上市公司盈餘管理實證研究,北京:中國財政經濟出版社。
    黃世忠及葉豐瀅,2006,上市公新司報表粉飾動向:手段、案例與啟示,財會通訊,2006(01):14-19。
    瑞紮伊及朱國泓譯,2005,《財務報表舞弊:預防與發現》,中國人民大學出版社。
    葉郡慈,2016,超額現金持有與盈餘管理的關係,國立政治大學會計系碩士論文。
    葛家澍及黃世忠,1999,反映經濟真實是會計的基本職能,會計研究,1999(12):02-07。
    劉立國及杜瑩,2003,公司治理與會計資訊質量關係的實證研究,會計研究,2003(02):28-36。
    蔡少玲,2016,CFO性別與公司舞弊行為研究,對外經濟貿易大學碩士論文。
    蔡寧及梁麗珍,2003,公司治理與財務舞弊關係的經驗分析,財經理論與實踐,2003(06):80-84。
    魏明海,2000,盈餘管理基本理論及其研究述評,會計研究,2000(09):34-42。
    蘇華董,2013,財務舞弊之現金流量表作假篇,現代經濟資訊,2013(07): 173-177。
    Aziz, A., D. C. Emanuel, and G. H. Lawson. 1988. “Bankruptcy Prediction-An Investigation of Cash Flow Based Models,” Journal of Management Studies 25(5): 419-437.
    Beasley, M. S. 1996. An Empirical Analysis of the Relation Between the Board of Director Composition and Financial Statement Fraud. Journal of Accounting and Economics,71(04):443-465.
    Bell, T. B., and J. V. Carcello. 2000. A Decision Aid for Assessing the Likelihood of Fraudulent Financial Reporting, Auditing: A Journal of Practice & Theory, 19(1):169-185.
    Bell, T. B., S. Szykowny, and J. Willingham. 1991. Assessing the likelihood of fraudulent financial reporting: A cascaded logit approach, Working Paper, KPMG Peat Marwick, Montvale, NJ.
    Beneish, M. D. 1997. Detecting GAAP violation: Implications for assessing earnings management among firms with extreme financial performance, Journal of Accounting and Public Policy, 16(3): 271-309.
    Beneish, M. D. 1999. The Detection of Earnings Manipulation, Financial Analysts Journal, 55(05): 24-36.
    Bologna, G. J., R. J. Lindquist and J. T. Wells. 1993. Accountant`s Handbook of Fraud and Commercial Crime. New York: NY 10158.
    Burgstahler, D. and M. Eames. 1998. Management of earnings and analysts forecasts. Working paper. University of Washington.
    Casterella, J., W. R. Knechel, and P. L. Walker. 2002. The relationship of audit failures and auditor tenure. Working Paper, University of Florida.
    Cressey, D. R. 1953. Other People’s Money: a Study in the Social Psychology of Embezzlement, Glencoe, IL: Free Press.
    DeAngelo, L. E. 1981. Auditor size and auditor quality. Journal of Accounting and Economics, 3(3): 183-199.
    Dechow, P. M., and P. J. Skinner. 2000. Earnings Management: Reconciling the Views of Accounting Academics, Practitioners and Regulators, Accounting Horizons, 14(2): 235-250.
    Dechow, P. M., R. G. Sloan, and A. P. Sweeney. 1996. Causes and consequences of earnings manipulation: An analysis of firms subject to enforcement actions by the SEC. Contemporary accounting research, 13(1): 1-36.
    Defond M. L., and J. Jiambalvo. 1991. Incidence and circumstances of accounting errors. The Accounting review, 66(3): 643-655.
    Dittmar A., J. Mahrt-Smith, and H. Servaes. 2003. International Corporate Governance and Corporate Cash Holdings. Journal of Financial and Quantitative Analysis, 38(1): 111-133.
    Elliott, R. K., and J. J Willingham. 1980. Management Fraud : Detection and Deterrence. New York : Petrocelli Books.
    Farber D. B. 2005. Restoring Trust after Fraud: Does Corporate Governance Matter? Accounting Review, 80(2): 539-561.
    Francis, J., and J. Krishnan. 1999. Accounting accruals and auditor reporting conservatism. Contemporary Accounting Research, 16 (2): 135-165.
    Hajeka, P., and R. Henriquesb. 2017. Mining corporate annual reports for intelligent detection of financial statement fraud-A comparative study of machine learning methods. Knowledge-Based Systems, 128(7): 139-152.
    Healy P. M. and J. M. Wahlen. 1999. A Review of The Earnings Management Literature and Its Implications for Standard Setting. Accounting Horizons, 13(4):365-383.
    insider trading: An empirical analysis. The Accounting Review, 73(1) : 131-146.
    Jensen , M. C. 1993. The modern industrial revolution , exit , and the failure of internal control systems , Journal of Finance , 48(3) : 831-880.
    Kasznik. 1999. On the association between voluntary disclosure and earnings management. Journal of Accounting Research, 37(1):57-81.
    Kim J. B., and C. H. Yi. 2006. Ownership structure , Business group affiliation, Listing status, and Earnings management : Evidence from Korea, Contemporary Accounting Research ,23(2): 427-464.
    Kirkos E., C. Spathis, and Y. Manolopoulos. 2007. Data mining techniques for the detection of fraudulent financial statements, Expert Systems with Applications, 32(4):995-1003.
    Kirkos, E., C. Spathisb, and Y. Manolopoulosc. 2007. Data mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications, 32(4): 995-1003.
    La Porta R., F. Lopez-De-Silanes, A. Shleifer, and R. W. Vishny. 1998. Law and Finance. Journal of Political Economy, 106(6): 1113-1155.
    La Porta R., F. Lopez-De-Silanes, A. Shleifer, and R. W. Vishny. 1997. Legal Determinants of External Finance. The Journal of Finance, 52(3): 1131-1150.
    Lee, T. A., R. W. Ingram, and T. P. Howard. 1999. The Difference between Earnings and Operating Cash Flow as an Indicator of Financial Reporting Fraud. Contemporary Accounting Research,16 (4): 749-787.
    Loebbecke. J. K., M. M. Eining, and J. J. Willingham. 1988. Review of SEC Accounting and Auditing Enforcement Releases. Working paper, Utah University.
    Loebbecke. J. K., M. M. Eining, and J. J. Willingham. 1989. Auditors’ experience with material irregularities: Frequency, nature, and detestability. Auditing: A Journal of Practice & Theory , 9 (Fall) : 1-28.
    Michael, R. Y. 2000. Accounting Irregularities and Financial Fraud: A Corporate Governance Guide. Independent Pub Group.
    Mossman, C. E., G. Bell, L. M. Swartz, and H. Turtle. “An empirical comparison of bankruptcy modal,” The Financial Review, 33(2): 35-54.
    Mulford, C. W., and E. E. Comiskey. 2002. The Financial Numbers Game: Detecting Creative Accounting Practices. New York: John Wiley & Sons.
    Myers J., L. A. Myers, and T. C. Omer. 2003. Exploring the term of auditor-client relationship and the quality of earnings: a case for mandatory auditor rotation? The Accounting Review, 78 (3): 779-799.
    Opler T., L. Pinkowitz, R. Stulz, and R. Williamson. 1999. The determinants and implications of corporate cash holdings. Journal of Financial Economics, 52(1), issue1:3-46.
    Pearce J. A. and S. A. Zahra. 1989. Boards of Directors and Corporate Financial Performance: A Review and Integrative Model. Journal of Management, 15(2): 291-334.
    Persons, O. 1995. Using financial statement data to identify factors associated with fraudulent financial reporting. Journal of Applied Business Research, 11(3): 38-46.
    Press, E. and J. Weintrop. 1990. Accounting constraints in public and private debt agreements: Their association with leverage and impact on accounting choice. Journal of Accounting and Economics ,12(1-3) : 65-95.
    Rezaee, Z. 2002. Financial statement fraud: prevention and detection. New York, NY: Wiley; 2002.
    Robertson, J. C. 2000. Fraud Examination for Managers and Auditors, TX: Viesca Books.
    Schipper, K. 1989. Commentary on Earnings Management. Accounting Horzions, 3(4):91-102
    Scott, W. R. 2000. Financial Accounting Theory. Scarborough, Ontario: Prentice Hall Canada Inc.
    Skousen, C. J. and C. J. Wright. 2006. Contemporaneous Risk Factors and The Prediction of Financial Statement Fraud. Working paper. Oklahoma State University .
    Skousen, C. J., K. R. Smith, and C. J. Wright. 2008. Detecting and Predicting Financial Statement Fraud: the Effectiveness of the Fraud Triangle and SAS No. 99. Advances in Financial Economics, 13(6) : 53-81.
    Spathis, C.T. 2002. Detecting false financial statements using published data: Some evidence from Greece. Managerial Auditing Journal, 17(4): 179-191.
    Summers, S. and J. Sweeney. 1998. Fraudulently misstated financial statements and insider trading: An empirical analysis. The Accounting Review, 73(1): 131-146.
    Wells, J. 1997. Corporate Fraud Handbook: Prevention and Detection. Hoboken, New Jersey: Wiley.
    Description: 碩士
    國立政治大學
    會計學系
    107353117
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0107353117
    Data Type: thesis
    DOI: 10.6814/NCCU202101115
    Appears in Collections:[會計學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    311701.pdf2026KbAdobe PDF2282View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback