<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0186-1042</journal-id>
<journal-title><![CDATA[Contaduría y administración]]></journal-title>
<abbrev-journal-title><![CDATA[Contad. Adm]]></abbrev-journal-title>
<issn>0186-1042</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Facultad de Contaduría y Administración]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0186-10422022000300008</article-id>
<article-id pub-id-type="doi">10.22201/fca.24488410e.2022.2987</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A model to detect financial statement fraud in portuguese companies by the auditor]]></article-title>
<article-title xml:lang="es"><![CDATA[Un modelo para que el auditor detecte el fraude de estados contables en empresas portuguesas]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Macedo]]></surname>
<given-names><![CDATA[Paulo Sérgio Gomes]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Inácio]]></surname>
<given-names><![CDATA[Helena Coelho]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Vieira]]></surname>
<given-names><![CDATA[Elisabete S.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Polytechnic Institute of Cávado and Ave  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Portugal</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,University of Aveiro  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Portugal</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2022</year>
</pub-date>
<volume>67</volume>
<numero>3</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S0186-10422022000300008&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S0186-10422022000300008&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S0186-10422022000300008&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This study developed a model that can be used to differentiate between fraudulent and non-fraudulent reports and helps the auditor to identify and assess material misstatement risk due to fraud. This model was based on the three stages of the fraud triangle, as well as on the agency theory and stakeholder theory. To develop the model, we used a sample that consists on a group of Portuguese companies that show evidence of fraud and another group of companies without evidence of fraud. Logistic regression results showed a positive relation between fraudulent financial statements and: companies need of higher financing, that represented the pressure to commit fraud; operations ineffectiveness, when the relative weight of accounts receivable is greater when compared to assets, which constituted the opportunity to commit fraud; and higher management turnover, which was characterised by managers who showed predisposition to commit fraud (rationalisation).]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este estudio establece un modelo para determinar qué distingue a los informes fraudulentos de los no fraudulentos y ayuda al auditor a identificar y evaluar el riesgo de falseamiento material, basándose en los tres componentes del triángulo del fraude, las teorías de la agencia y de las partes interesadas. Para este fin, se construyó una muestra de empresas portuguesas cuyos estados contables muestran indicios de fraude. A partir de los resultados, de las regresiones logísticas obtenidas, se destaca la existencia de una relación positiva entre estados contables fraudulentos con mayores necesidades de financiamiento de las empresas, las cuales representan un incentivo al fraude, como también con ineficiencia de operaciones representada en las cuentas por cobrar más elevadas respecto a los activos, que posibilitan una circunstancia de fraude, y por último, con una mayor rotación de gestión que caracterizan el comportamiento del gestor con predisposición a cometer fraude (racionalización)]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[financial statements]]></kwd>
<kwd lng="en"><![CDATA[fraud]]></kwd>
<kwd lng="en"><![CDATA[auditor]]></kwd>
<kwd lng="en"><![CDATA[Portugal]]></kwd>
<kwd lng="es"><![CDATA[estados contables]]></kwd>
<kwd lng="es"><![CDATA[fraude]]></kwd>
<kwd lng="es"><![CDATA[auditor]]></kwd>
<kwd lng="es"><![CDATA[Portugal]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albrecht]]></surname>
<given-names><![CDATA[W. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Albrecht]]></surname>
<given-names><![CDATA[C. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Albrecht]]></surname>
<given-names><![CDATA[C. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud and corporate executives: Agency, stewardship and broken trust]]></article-title>
<source><![CDATA[Journal of Forensic Accounting]]></source>
<year>2004</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>109-30</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[B. J. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The agency theory: the main foundational base to explain the auditing in Portuguese investor-oriented firms]]></article-title>
<source><![CDATA[British Journal of Management &amp; Economics]]></source>
<year>2014</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>275-304</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Altman]]></surname>
<given-names><![CDATA[E. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Financial Ratios, Discriminant analysis and the prediction of corporate bankruptcy]]></article-title>
<source><![CDATA[The Journal of Finance]]></source>
<year>1968</year>
<volume>23</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>589-609</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Awang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ismail]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahman]]></surname>
<given-names><![CDATA[A. R. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Measuring the potential for financial reporting fraud in a highly regulated industry]]></article-title>
<source><![CDATA[The International Journal of Accounting and Business Society]]></source>
<year>2017</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>81-98</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Azmi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Yusoff]]></surname>
<given-names><![CDATA[N. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ismail]]></surname>
<given-names><![CDATA[R. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Behavioral Intention towards Financial Statement Fraud: Application of Theory Planned Behavior]]></article-title>
<source><![CDATA[Journal of Critical Reviews]]></source>
<year>2020</year>
<volume>7</volume>
<numero>18</numero>
<issue>18</issue>
<page-range>924-34</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baird]]></surname>
<given-names><![CDATA[J. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Zelin II]]></surname>
<given-names><![CDATA[R. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Olson]]></surname>
<given-names><![CDATA[K. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Occupational Fraud: A Comparison of Perceptions of Law Enforcement Majors, Accounting Majors, and Other Business Majors]]></article-title>
<source><![CDATA[Journal of Forensic e Investigative Accounting]]></source>
<year>2016</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>275-87</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bell]]></surname>
<given-names><![CDATA[T. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Carcello]]></surname>
<given-names><![CDATA[J. V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A decision aid for assessing the likelihood of fraudulent financial reporting]]></article-title>
<source><![CDATA[Auditing: A Journal of Practice e Theory]]></source>
<year>2000</year>
<volume>19</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>169-84</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bernardino]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pedrosa]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Laureano]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analytical methods for auditing and anomaly/fraud detection]]></source>
<year>2018</year>
<conf-name><![CDATA[ 13Iberian Conference on Information Systems and Technologies]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brazel]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[K. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zimbelman]]></surname>
<given-names><![CDATA[M. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using nonfinancial measures to assess fraud risk]]></article-title>
<source><![CDATA[Journal of Accounting Research]]></source>
<year>2009</year>
<volume>47</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1135-66</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cumming]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Hou]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Executive integrity, audit opinion, and fraud in Chinese listed firms]]></article-title>
<source><![CDATA[Emerging Markets Review]]></source>
<year>2013</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>72-91</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Liou]]></surname>
<given-names><![CDATA[W. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud detection for financial statements of business groups]]></article-title>
<source><![CDATA[International Journal of Accounting Information Systems]]></source>
<year>2019</year>
<volume>32</volume>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dechow]]></surname>
<given-names><![CDATA[P. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ge]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Schrand]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding earnings quality: A review of the proxies, their determinants and their consequences]]></article-title>
<source><![CDATA[Journal of Accounting and Economics]]></source>
<year>2010</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>344-401</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dechow]]></surname>
<given-names><![CDATA[P. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ge]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Larson]]></surname>
<given-names><![CDATA[C. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sloan]]></surname>
<given-names><![CDATA[R. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predicting Material Accounting Misstatements]]></article-title>
<source><![CDATA[Contemporary Accounting Research]]></source>
<year>2011</year>
<volume>28</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>17-82</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dorminey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Fleming]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kranacher]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Riley]]></surname>
<given-names><![CDATA[J. R. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Evolution of Fraud Theory]]></article-title>
<source><![CDATA[Issues in Accounting Education]]></source>
<year>2012</year>
<volume>27</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>555-79</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durtschi]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hillison]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Pacini]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The effective use of Benford&#8217;s law to assist in detecting fraud in accounting data]]></article-title>
<source><![CDATA[Journal of forensic accounting]]></source>
<year>2004</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>17-34</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eisenhardt]]></surname>
<given-names><![CDATA[K. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Agency theory: An assessment and review]]></article-title>
<source><![CDATA[Academy of management review]]></source>
<year>1989</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>57-74</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Engels]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Philip]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Financial literacy and fraud detection]]></article-title>
<source><![CDATA[The European Journal of Finance]]></source>
<year>2020</year>
<volume>26</volume>
<numero>4-5</numero>
<issue>4-5</issue>
<page-range>420-42</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fathi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Determinants of the Quality of Financial Information Disclosed by French Listed Companies]]></article-title>
<source><![CDATA[Mediterranean Journal of Social Sciences]]></source>
<year>2013</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>319-36</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Favere-Marchesi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effects of Decomposition and Categorization on Fraud-Risk Assessments]]></article-title>
<source><![CDATA[Auditing: A Journal of Practice e Theory]]></source>
<year>2013</year>
<volume>32</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>201-19</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fernandes]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Peguinho]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Vieira]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Neiva]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Análise Financeira: Teoria e Prática]]></source>
<year>2016</year>
<edition>4</edition>
<publisher-name><![CDATA[Edições Sílabo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Freeman]]></surname>
<given-names><![CDATA[R. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The politics of stakeholder theory: Some future directions]]></article-title>
<source><![CDATA[Business ethics quarterly]]></source>
<year>1994</year>
<volume>4</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>409-21</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fitri]]></surname>
<given-names><![CDATA[F. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Syukur]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Justisa]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Do The Fraud Triangle Components Motivate Fraud In Indonesia?]]></article-title>
<source><![CDATA[Australasian Accounting, Business and Finance Journal]]></source>
<year>2019</year>
<volume>13</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>63-72</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gerard]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Weber]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How Agency Theory Informs a $30 Million Fraud]]></article-title>
<source><![CDATA[Journal of Finance, Accounting e Management]]></source>
<year>2014</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>16-47</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gullkvist]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Jokipii]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perceived importance of red flags across fraud types]]></article-title>
<source><![CDATA[Critical Perspectives on Accounting]]></source>
<year>2013</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>44-61</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hammersley]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Johnstone]]></surname>
<given-names><![CDATA[K. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kadous]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How do audit seniors respond to heightened fraud risk?]]></article-title>
<source><![CDATA[Auditing: A Journal of Practice e Theory]]></source>
<year>2011</year>
<volume>30</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>81-101</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hogan]]></surname>
<given-names><![CDATA[C. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rezaee]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Riley]]></surname>
<given-names><![CDATA[J. R. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Velury]]></surname>
<given-names><![CDATA[U. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Financial statement fraud: Insights from the academic literature]]></article-title>
<source><![CDATA[Auditing: A Journal of Practice e Theory]]></source>
<year>2008</year>
<volume>27</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>231-52</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[S. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiu]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yen]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud detection using fraud triangle risk factors]]></article-title>
<source><![CDATA[Information Systems Frontiers]]></source>
<year>2017</year>
<volume>19</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1343-56</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huber]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forensic accounting, fraud theory, and the end of the fraud triangle]]></article-title>
<source><![CDATA[Journal of Theoretical Accounting Research]]></source>
<year>2017</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>28-48</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<collab>ISA 240</collab>
<source><![CDATA[International Auditing and Assurance Standards Board. As responsabilidades do Auditor Relativas a Fraude numa Auditoria de DF]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<collab>ISA 570</collab>
<source><![CDATA[International Auditing and Assurance Standards Board]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jensen]]></surname>
<given-names><![CDATA[M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Meckling]]></surname>
<given-names><![CDATA[W. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Theory of the firm: Managerial behavior, agency costs and ownership structure]]></article-title>
<source><![CDATA[Journal of financial economics]]></source>
<year>1976</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>305-60</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kirkos]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Spathis]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Manolopoulos]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data mining techniques for the detection of fraudulent financial statements]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2007</year>
<volume>32</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>995-1003</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kopun]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Review of the Research on Data Mining Techniques in the Detection of Fraud in Financial Statements]]></article-title>
<source><![CDATA[Journal of Accounting and Management]]></source>
<year>2018</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<collab>LGT</collab>
<source><![CDATA[Lei Geral Tributária]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[T. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ingram R. W.]]></surname>
<given-names><![CDATA[Howard T. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Difference between Earnings and Operating Cash Flow as an Indicator of Financial Reporting Fraud*]]></article-title>
<source><![CDATA[Contemporary Accounting Research]]></source>
<year>1999</year>
<volume>16</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>749-86</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lennox]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lisowsky]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Pittman]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tax aggressiveness and accounting fraud]]></article-title>
<source><![CDATA[Journal of Accounting Research]]></source>
<year>2013</year>
<volume>51</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>739-78</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Kazmi]]></surname>
<given-names><![CDATA[S. H. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Financial Fraud Detection Model: Based on Random Forest]]></article-title>
<source><![CDATA[International Journal of Economics and Finance]]></source>
<year>2015</year>
<volume>7</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>178-88</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lopes]]></surname>
<given-names><![CDATA[P. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodrigues]]></surname>
<given-names><![CDATA[L. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Accounting for financial instruments: An analysis of the determinants of disclosure in the Portuguese stock exchange]]></article-title>
<source><![CDATA[The International Journal of Accounting]]></source>
<year>2007</year>
<volume>42</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>25-56</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lou]]></surname>
<given-names><![CDATA[Y. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud risk factor of the fraud triangle assessing the likelihood of fraudulent financial reporting]]></article-title>
<source><![CDATA[Journal of Business e Economics Research]]></source>
<year>2009</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>61-78</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maka]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Pazhanirajan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mallapur]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Academic Review of data mining techniques in fraud detection]]></article-title>
<source><![CDATA[Journal of Critical Reviews]]></source>
<year>2020</year>
<volume>7</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>3675-704</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mansor]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud Triangle Theory and Fraud Diamond Theory. Understanding the Convergent and Divergent For Future Research]]></article-title>
<source><![CDATA[International Journal of Academic Research in Accounting, Finance and Management Sciences]]></source>
<year>2015</year>
<volume>1</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>38-45</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marques]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodrigues]]></surname>
<given-names><![CDATA[L. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Craig]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Earnings management induced by tax planning: The case of Portuguese private firms]]></article-title>
<source><![CDATA[Journal of International Accounting, Auditing and Taxation]]></source>
<year>2011</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>83-96</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohamed]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Handley]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Financial statement fraud risk mechanisms and strategies: the case studies of Malaysian commercial companies]]></article-title>
<source><![CDATA[Procedia-Social and Behavioral Sciences]]></source>
<year>2014</year>
<volume>145</volume>
<page-range>321-9</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohammadi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yazdani]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Khanmohammadi]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Maham]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Financial reporting fraud detection: An analysis of data mining algorithms]]></article-title>
<source><![CDATA[International Journal of Finance &amp; Managerial Accounting]]></source>
<year>2020</year>
<volume>4</volume>
<numero>16</numero>
<issue>16</issue>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nunes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Inácio]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Marques]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Benford's Law and fraud detection in Portuguese enterprises]]></source>
<year>2019</year>
<conf-name><![CDATA[ 14Iberian Conference on Information Systems and Technologies]]></conf-name>
<conf-loc>Coimbra </conf-loc>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Persons]]></surname>
<given-names><![CDATA[O. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using financial statement data to identify factors associated with fraudulent financial reporting]]></article-title>
<source><![CDATA[Journal of Applied Business Research]]></source>
<year>2011</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>38-46</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rahmawati]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Kassim]]></surname>
<given-names><![CDATA[A. A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud Triangle Theory and Accounting Irregularities]]></article-title>
<source><![CDATA[Selangor Business Review]]></source>
<year>2020</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>55-64</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="">
<collab>RGIT</collab>
<source><![CDATA[Regime Geral das Infrações Tributárias]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Skousen]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[K. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting and predicting financial statement fraud: The effectiveness of the fraud triangle and SAS No. 99]]></article-title>
<source><![CDATA[Corporate Governance and Firm Performance]]></source>
<year>2009</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>53-81</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Soltani]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Anatomy of Corporate Fraud: A Comparative Analysis of High Profile American and European Corporate Scandals]]></article-title>
<source><![CDATA[Journal of Business Ethics]]></source>
<year>2014</year>
<volume>120</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>251-74</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spathis]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Doumpos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zopounidis]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting falsified financial statements: a comparative study using multicriteria analysis and multivariate statistical techniques]]></article-title>
<source><![CDATA[European Accounting Review]]></source>
<year>2002</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>509-35</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Steffensmeier]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Allan]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gender and crime: Toward a gendered theory of female offending]]></article-title>
<source><![CDATA[Annual review of sociology]]></source>
<year>1996</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>459-87</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Summers]]></surname>
<given-names><![CDATA[S. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sweeney]]></surname>
<given-names><![CDATA[J. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraudulently misstated financial statements and insider trading: An empirical analysis]]></article-title>
<source><![CDATA[Accounting Review]]></source>
<year>1998</year>
<volume>73</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>131-46</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[T. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Corporate securities fraud: Insights from a new empirical framework]]></article-title>
<source><![CDATA[Journal of Law, Economics, and Organization]]></source>
<year>2013</year>
<volume>29</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>535-68</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wyrobek]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Application of machine learning models and artificial intelligence to analyze annual financial statements to identify companies with unfair corporate culture]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2020</year>
<volume>176</volume>
<page-range>3037-46</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wells]]></surname>
<given-names><![CDATA[J. T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Principles of Fraud Examination]]></source>
<year>2013</year>
<edition>4</edition>
<publisher-name><![CDATA[Wiley]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
