{"id":14270,"date":"2023-03-07T14:13:41","date_gmt":"2023-03-07T19:13:41","guid":{"rendered":"https:\/\/jasonapollovoss.com\/web\/?p=14270"},"modified":"2025-09-05T15:08:08","modified_gmt":"2025-09-05T21:08:08","slug":"key-scientific-paper-redux-how-pervasive-is-corporate-fraud","status":"publish","type":"post","link":"https:\/\/jasonapollovoss.com\/web\/2023\/03\/07\/key-scientific-paper-redux-how-pervasive-is-corporate-fraud\/","title":{"rendered":"Key Scientific Paper Redux: How pervasive is corporate fraud?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<figure class=\"x-el x-el-figure c2-1 c2-2 c2-3x c2-i c2-h c2-21 c2-2c c2-29 c2-2a c2-43 c2-51 c2-3 c2-4 c2-5 c2-6 c2-7 c2-8\">\n<div><\/div>\n<\/figure>\n<p><span style=\"font-family: futural;\">At Deception And Truth Analysis we developed our algorithm based on deception science. That is, for many decades, deception scientists have researched, identified, and replicated their studies about the behavioral differences between deceivers and truth-tellers. We then use Natural Language Processing to look for those behaviors that lend themselves well to a NLP approach. Our method has resulted in, what we believe is, a general deception and truth algorithm that works well in many different domains.<\/span><\/p>\n<p><span style=\"font-family: futural;\">That said, we have been curious about the success of our algorithm because we do not have, nor does anyone have, the resources to fact check every statement of a document to establish ground truth. Instead, we have to rely on ground truth datasets or established norms as an indirect test of the success of our algorithm. Enter the scientific research entitled, \u201cHow pervasive is corporate fraud?\u201d<a class=\"x-el x-el-a c2-2w c2-2x c2-69 c2-v c2-w c2-x c2-j c2-6a c2-3 c2-30 c2-31 c2-11 c2-32\" href=\"https:\/\/blogging.godaddy.com\/blog\/a6d795a4-a672-4120-a6ba-07384a52a2d8\/posts\/2e9f8312-d4c6-4d2f-9757-d62c28192a21#_edn1\" rel=\"\">[i]<\/a>This meta-analysis not only sought to establish what level of fraud is caught by companies, their auditors, and regulators, but also the amount of fraud that remains un-caught. In other words, it sought to quantify both the tip of the fraud iceberg, as well as the entirety of the fraud iceberg.<\/span><\/p>\n<div>\n<h4 class=\"x-el x-el-h4 c2-6h c2-6i c2-v c2-w c2-42 c2-2c c2-2a c2-29 c2-2b c2-3 c2-z c2-44 c2-10 c2-45 c2-46 c2-47 c2-48\"><span style=\"font-family: futural;\"><em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\"><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\"><\/strong><\/em><\/span><\/h4>\n<h3 class=\"x-el x-el-h4 c2-6h c2-6i c2-v c2-w c2-42 c2-2c c2-2a c2-29 c2-2b c2-3 c2-z c2-44 c2-10 c2-45 c2-46 c2-47 c2-48\"><span style=\"font-family: futural;\"><em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\"><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">How pervasive is corporate fraud?<\/strong><\/em><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">: Study Details<\/strong><\/span><\/h3>\n<\/div>\n<p><span style=\"font-family: futural;\">Researchers in \u201cHow pervasive is corporate fraud?\u201d sought to estimate the amount of undetected fraud. As a part of this analysis, they relied upon the amount of suspected malfeasance and fraud by four methods:<\/span><\/p>\n<ol>\n<li><span style=\"font-family: futural;\">Auditor-detected<\/span><\/li>\n<li><span style=\"font-family: futural;\">Accounting restatements<\/span><\/li>\n<li><span style=\"font-family: futural;\">All securities fraud falling under SEC Rule 10b-5 [Note: this category are actual lawsuits brought by the Securities and Exchange Commission. Given that agency&#8217;s limited resources they are likely to only bring these cases where fraud is most easily proven. Therefore, the authors of the paper consider this category to be fraud, rather than just corporate malfeasance.<\/span><\/li>\n<li><span style=\"font-family: futural;\">SEC Accounting and Auditing Enforcement Releases<\/span><\/li>\n<\/ol>\n<p><span style=\"font-family: futural;\">Additionally, by using the techniques of meta-analysis, the researchers were able to develop a pooled measure of how much suspected fraud is discovered in the United States; that is, the \u201ctip of the [suspected fraud] iceberg.\u201d<\/span><\/p>\n<p><span style=\"font-family: futural;\">Next, the researchers also relied on previous researchers\u2019 work in estimating the fraud detection likelihood by using the above four methods. From these estimates, the authors of \u201cHow pervasive is corporate fraud?\u201d were then able to estimate how much fraud goes undetected; that is, the rest of the [suspected fraud] iceberg. Last, using statistical methods a 95% confidence interval was placed around their estimates.<\/span><\/p>\n<p><span style=\"font-family: futural;\"><\/span><\/p>\n<div>\n<h3 class=\"x-el x-el-h4 c2-6h c2-6i c2-v c2-w c2-42 c2-2c c2-2a c2-29 c2-2b c2-3 c2-z c2-44 c2-10 c2-45 c2-46 c2-47 c2-48\"><span style=\"font-family: futural;\"><em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\"><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">How pervasive is corporate fraud?<\/strong><\/em><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">: Major Findings<\/strong><\/span><\/h3>\n<\/div>\n<p><span style=\"font-family: futural;\">1. The sampling period for detecting malfeasance was during 30 November 2001 (i.e. Enron) through 2003. Covered is the period just after the fall of Enron when scrutiny around reporting malfeasance and fraud in the corporate sector of any kind was at a generational high. This presumably leads to a conservative estimate of the amount of total malfeasance and fraud, seen and unseen, given that the number of seen malfeasance and frauds was likely highest during this era.<\/span><\/p>\n<p><span style=\"font-family: futural;\">2. For the four methods described earlier, the following are the estimates for the percentage of suspected malfeasance and frauds detected. Based on other researchers\u2019 work about the likelihood of detecting malfeasance and fraud the researchers assumed that malfeasance and fraud pervasiveness follows a Poisson Distribution. Below then are the &#8220;tip of the iceberg&#8221; estimates for malfeasance and fraud pervasiveness:<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. 29.4% = Auditor detected<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. 33.7% = Accounting restatements<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0c. 47.0% = All securities fraud, SEC 10b-5<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0d. 52.0% = SEC Accounting &amp; Auditing Enforcement Releases<\/span><\/p>\n<p><span style=\"font-family: futural;\">3. For #2, above, the pooled estimate for the percentage of suspected frauds detected = 38.4%<\/span><\/p>\n<p><span style=\"font-family: futural;\">4. The figures in #2, above, also imply an estimate for the % of undetected malfeasance, or &#8220;the hidden icebergs,&#8221; by simply subtracting the figures above from 100%, or:<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. 70.6% = Auditor detected<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. 66.3% = Accounting restatements<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0c. 53.0% = All securities fraud as represented by SEC 10b-5 complaints<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0d. 48.0% = SEC Accounting &amp; Auditing Enforcement Releases<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0e. 61.6% = pooled estimate for the number of suspected frauds undetected<\/span><\/p>\n<p><span style=\"font-family: futural;\">5. For the four methods of fraud detection, here is the breakdown of suspected frauds detected during the sampling period:<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. 21 = Auditor detected, or 0.81% of malfeasance detected in this way<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. 168 = Accounting restatements, or 13.46% of malfeasance detected in this way<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0c. 63 = All securities fraud, SEC 10b-5, or 3.39% of malfeasance detected in this way<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0d. 59 = SEC Accounting &amp; Auditing Enforcement Releases, or 2.64% of malfeasance caught in this way<\/span><\/p>\n<p><span style=\"font-family: futural;\">6. \u00a0The above figures in #s 2 and 5, above, allow us to calculate the pervasiveness of malfeasance, as follows:<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. Auditor detected = 0.81% \/ 29.5% = 2.76%<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. Accounting restatements = 13.46% \/ 33.7% = 39.95%<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0c. All securities fraud, SEC 10b-5 = 3.39% \/ 47.0% = 7.21%<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0d. SEC Accounting &amp; Auditing Enforcement Releases = 2.64% \/ 51.9% = 5.08%<\/span><\/p>\n<p><span style=\"font-family: futural;\">7. The above figures in #s 5 and 6, above, allow us to calculate a weighted average &#8220;tip of the iceberg&#8221; estimate for all types of fraud of 5.68%<\/span><\/p>\n<p><span style=\"font-family: futural;\">8. With all of this data we can derive a best estimate of how pervasive fraud is, how much is caught and uncaught. Specifically:<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. Frauds caught by all methods = 5.68%<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. Frauds uncaught = 18.51%<\/span><\/p>\n<p><span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. Estimated total frauds, caught and uncaught = 24.19%<\/span><\/p>\n<p><span style=\"font-family: futural;\">The authors utilize their numbers in other insightful ways, too as a check on their work. For example:<\/span><\/p>\n<p><span style=\"font-family: futural;\">9. The authors conclude that the best estimate of detection likelihood is their pooled measure that includes both the \u201cauditor detected\u201d category of 29.4%, and \u201crestatement measures\u201d category of 33.7%. Their choice of these two methods is based on the idea that either the auditors or companies themselves are catching the potential frauds and announcing them and so likely there was some form of malfeasance present.<\/span><\/p>\n<p><span style=\"font-family: futural;\">When a weighted average is taken of these two fraud detection methods then roughly 33% is their best estimate of the &#8220;tip of the iceberg&#8221; frauds.\u00a0<em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\">In other words, and crucially, 67% of frauds are never detected!<\/em>\u00a0<\/span><\/p>\n<p><span style=\"font-family: futural;\">10. Last among the insights contained in this paper, using insights of the estimates of the cost of corporate malfeasance and fraud from other researchers. Namely, that detected fraud (33% of cases as estimated in this paper) costs malfeasant and fraudulent firms 25% of their market cap, while undetected malfeasance and fraud (67% of cases) costs 10.9% of market cap, for a blended cost of 15.6% of market cap. In dollar terms this figure in 2021 was $830 billion.<\/span><\/p>\n<div>\n<h4 class=\"x-el x-el-h4 c2-6h c2-6i c2-v c2-w c2-42 c2-2c c2-2a c2-29 c2-2b c2-3 c2-z c2-44 c2-10 c2-45 c2-46 c2-47 c2-48\"><span style=\"font-family: futural;\"><em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\"><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\"><\/strong><\/em><\/span><\/h4>\n<h3 class=\"x-el x-el-h4 c2-6h c2-6i c2-v c2-w c2-42 c2-2c c2-2a c2-29 c2-2b c2-3 c2-z c2-44 c2-10 c2-45 c2-46 c2-47 c2-48\"><span style=\"font-family: futural;\"><em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\"><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">Validation of the D.A.T.A. Algorithm<\/strong><\/em><\/span><\/h3>\n<\/div>\n<p><span style=\"font-family: futural;\">The above figures derived by the authors of\u00a0<em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\">How Pervasive is Corporate Fraud?<\/em>\u00a0for the number of companies engaged is some form of misconduct is 24.19%, from 8.b, above. This figure comports very well with D.A.T.A.\u2019s own figures of the percentage of companies that score as high risk or likely engaged in deceptive behavior (i.e. those that have negative DATA Scores) of 27.18%.\u00a0<\/span><\/p>\n<p><span style=\"font-family: futural;\">Additionally, the authors&#8217; figure of 5.68% of companies actually caught conducting fraud matches well the number of companies in D.A.T.A.\u2019s DATAbase product whose D.A.T.A. Scores are two standard deviations below the average DATA Score, or 3.60%.<\/span><\/p>\n<p><span style=\"font-family: futural;\">At D.A.T.A. we consider the work of the authors of \u201cHow pervasive is corporate fraud?\u201d as a form of independent validation that our method of evaluating deception works accurately. This is because the researchers measured actual frauds and used statistical techniques to estimate how much fraud is undetected. Whereas, at D.A.T.A. we measure the amount of deceptive and truthful behaviors present in documents and transcripts based on a deep understanding of deception science. These two methods for estimated fraud pervasiveness are completely independent of one another. Yet, the figures roughly agree with one another.<\/span><\/p>\n<hr class=\"x-el x-el-hr c2-1 c2-2 c2-6j c2-6k c2-4q c2-29 c2-2b c2-k c2-3 c2-4 c2-5 c2-6 c2-7 c2-8\" \/>\n<p><span style=\"font-family: futural;\"><a class=\"x-el x-el-a c2-2w c2-2x c2-69 c2-v c2-w c2-x c2-j c2-6a c2-3 c2-30 c2-31 c2-11 c2-32\" href=\"https:\/\/blogging.godaddy.com\/blog\/a6d795a4-a672-4120-a6ba-07384a52a2d8\/posts\/2e9f8312-d4c6-4d2f-9757-d62c28192a21#_ednref1\" rel=\"\">[i]<\/a>Dyck, Alexander, Adair Morse, and Luigi Zingales. \u201cHow pervasive is corporate fraud?\u201d\u00a0<em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\">Review of Accounting Studies<\/em>. 5 January 2023<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Deception And Truth Analysis we developed our algorithm based on deception science. That is, for many decades, deception scientists have researched, identified, and replicated their studies about the behavioral differences between deceivers and truth-tellers. We then use Natural Language Processing to look for those behaviors that lend themselves well to a NLP approach. Our [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14271,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<figure class=\"x-el x-el-figure c2-1 c2-2 c2-3x c2-i c2-h c2-21 c2-2c c2-29 c2-2a c2-43 c2-51 c2-3 c2-4 c2-5 c2-6 c2-7 c2-8\">\r\n<div>\r\n<div><span style=\"font-family: futural;\"><img class=\"x-el x-el-img c2-1 c2-2 c2-k c2-21 c2-1x c2-1y c2-29 c2-2b c2-s c2-6b c2-4l c2-3 c2-4 c2-5 c2-6 c2-7 c2-8\" title=\"Redux: How pervasive is corporate fraud?\" src=\"https:\/\/img1.wsimg.com\/isteam\/ip\/b4167b12-c211-4a45-9c4b-489be14138f8\/Fraud%20Alert.jpg\/:\/cr=t:0%25,l:0%25,w:100%25,h:100%25\/rs=w:1280\" alt=\"Redux: How pervasive is corporate fraud?\" \/><\/span><\/div>\r\n<\/div>\r\n<figcaption class=\"x-el x-el-figcaption c2-1 c2-2 c2-v c2-w c2-3d c2-29 c2-2b c2-4f c2-6c c2-6d c2-6e c2-6f c2-3 c2-6g c2-3e c2-10 c2-3f c2-3g c2-3h c2-3i\"><span style=\"font-family: futural;\">Redux: How pervasive is corporate fraud?<\/span><\/figcaption><\/figure>\r\n<em><span style=\"font-family: futural;\">By Jason A. Voss, CFA<\/span><\/em>\r\n\r\n<span style=\"font-family: futural;\">At Deception And Truth Analysis we developed our algorithm based on deception science. That is, for many decades, deception scientists have researched, identified, and replicated their studies about the behavioral differences between deceivers and truth-tellers. We then use Natural Language Processing to look for those behaviors that lend themselves well to a NLP approach. Our method has resulted in, what we believe is, a general deception and truth algorithm that works well in many different domains.<\/span>\r\n\r\n<span style=\"font-family: futural;\">That said, we have been curious about the success of our algorithm because we do not have, nor does anyone have, the resources to fact check every statement of a document to establish ground truth. Instead, we have to rely on ground truth datasets or established norms as an indirect test of the success of our algorithm. Enter the scientific research entitled, \u201cHow pervasive is corporate fraud?\u201d<a class=\"x-el x-el-a c2-2w c2-2x c2-69 c2-v c2-w c2-x c2-j c2-6a c2-3 c2-30 c2-31 c2-11 c2-32\" href=\"https:\/\/blogging.godaddy.com\/blog\/a6d795a4-a672-4120-a6ba-07384a52a2d8\/posts\/2e9f8312-d4c6-4d2f-9757-d62c28192a21#_edn1\" rel=\"\">[i]<\/a>This meta-analysis not only sought to establish what level of fraud is caught by companies, their auditors, and regulators, but also the amount of fraud that remains un-caught. In other words, it sought to quantify both the tip of the fraud iceberg, as well as the entirety of the fraud iceberg.<\/span>\r\n<div>\r\n<h4 class=\"x-el x-el-h4 c2-6h c2-6i c2-v c2-w c2-42 c2-2c c2-2a c2-29 c2-2b c2-3 c2-z c2-44 c2-10 c2-45 c2-46 c2-47 c2-48\"><span style=\"font-family: futural;\"><em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\"><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">How pervasive is corporate fraud?<\/strong><\/em><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">: Study Details<\/strong><\/span><\/h4>\r\n<\/div>\r\n<span style=\"font-family: futural;\">Researchers in \u201cHow pervasive is corporate fraud?\u201d sought to estimate the amount of undetected fraud. As a part of this analysis, they relied upon the amount of suspected malfeasance and fraud by four methods:<\/span>\r\n<ol>\r\n \t<li><span style=\"font-family: futural;\">Auditor-detected<\/span><\/li>\r\n \t<li><span style=\"font-family: futural;\">Accounting restatements<\/span><\/li>\r\n \t<li><span style=\"font-family: futural;\">All securities fraud falling under SEC Rule 10b-5 [Note: this category are actual lawsuits brought by the Securities and Exchange Commission. Given that agency's limited resources they are likely to only bring these cases where fraud is most easily proven. Therefore, the authors of the paper consider this category to be fraud, rather than just corporate malfeasance.<\/span><\/li>\r\n \t<li><span style=\"font-family: futural;\">SEC Accounting and Auditing Enforcement Releases<\/span><\/li>\r\n<\/ol>\r\n<span style=\"font-family: futural;\">Additionally, by using the techniques of meta-analysis, the researchers were able to develop a pooled measure of how much suspected fraud is discovered in the United States; that is, the \u201ctip of the [suspected fraud] iceberg.\u201d<\/span>\r\n\r\n<span style=\"font-family: futural;\">Next, the researchers also relied on previous researchers\u2019 work in estimating the fraud detection likelihood by using the above four methods. From these estimates, the authors of \u201cHow pervasive is corporate fraud?\u201d were then able to estimate how much fraud goes undetected; that is, the rest of the [suspected fraud] iceberg. Last, using statistical methods a 95% confidence interval was placed around their estimates.<\/span>\r\n<div>\r\n<h4 class=\"x-el x-el-h4 c2-6h c2-6i c2-v c2-w c2-42 c2-2c c2-2a c2-29 c2-2b c2-3 c2-z c2-44 c2-10 c2-45 c2-46 c2-47 c2-48\"><span style=\"font-family: futural;\"><em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\"><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">How pervasive is corporate fraud?<\/strong><\/em><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">: Major Findings<\/strong><\/span><\/h4>\r\n<\/div>\r\n<span style=\"font-family: futural;\">1. The sampling period for detecting malfeasance was during 30 November 2001 (i.e. Enron) through 2003. Covered is the period just after the fall of Enron when scrutiny around reporting malfeasance and fraud in the corporate sector of any kind was at a generational high. This presumably leads to a conservative estimate of the amount of total malfeasance and fraud, seen and unseen, given that the number of seen malfeasance and frauds was likely highest during this era.<\/span>\r\n\r\n<span style=\"font-family: futural;\">2. For the four methods described earlier, the following are the estimates for the percentage of suspected malfeasance and frauds detected. Based on other researchers\u2019 work about the likelihood of detecting malfeasance and fraud the researchers assumed that malfeasance and fraud pervasiveness follows a Poisson Distribution. Below then are the \"tip of the iceberg\" estimates for malfeasance and fraud pervasiveness:<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. 29.4% = Auditor detected<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. 33.7% = Accounting restatements<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0c. 47.0% = All securities fraud, SEC 10b-5<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0d. 52.0% = SEC Accounting &amp; Auditing Enforcement Releases<\/span>\r\n\r\n<span style=\"font-family: futural;\">3. For #2, above, the pooled estimate for the percentage of suspected frauds detected = 38.4%<\/span>\r\n\r\n<span style=\"font-family: futural;\">4. The figures in #2, above, also imply an estimate for the % of undetected malfeasance, or \"the hidden icebergs,\" by simply subtracting the figures above from 100%, or:<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. 70.6% = Auditor detected<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. 66.3% = Accounting restatements<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0c. 53.0% = All securities fraud as represented by SEC 10b-5 complaints<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0d. 48.0% = SEC Accounting &amp; Auditing Enforcement Releases<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0e. 61.6% = pooled estimate for the number of suspected frauds undetected<\/span>\r\n\r\n<span style=\"font-family: futural;\">5. For the four methods of fraud detection, here is the breakdown of suspected frauds detected during the sampling period:<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. 21 = Auditor detected, or 0.81% of malfeasance detected in this way<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. 168 = Accounting restatements, or 13.46% of malfeasance detected in this way<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0c. 63 = All securities fraud, SEC 10b-5, or 3.39% of malfeasance detected in this way<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0d. 59 = SEC Accounting &amp; Auditing Enforcement Releases, or 2.64% of malfeasance caught in this way<\/span>\r\n\r\n<span style=\"font-family: futural;\">6. \u00a0The above figures in #s 2 and 5, above, allow us to calculate the pervasiveness of malfeasance, as follows:<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. Auditor detected = 0.81% \/ 29.5% = 2.76%<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. Accounting restatements = 13.46% \/ 33.7% = 39.95%<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0c. All securities fraud, SEC 10b-5 = 3.39% \/ 47.0% = 7.21%<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0d. SEC Accounting &amp; Auditing Enforcement Releases = 2.64% \/ 51.9% = 5.08%<\/span>\r\n\r\n<span style=\"font-family: futural;\">7. The above figures in #s 5 and 6, above, allow us to calculate a weighted average \"tip of the iceberg\" estimate for all types of fraud of 5.68%<\/span>\r\n\r\n<span style=\"font-family: futural;\">8. With all of this data we can derive a best estimate of how pervasive fraud is, how much is caught and uncaught. Specifically:<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0a. Frauds caught by all methods = 5.68%<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. Frauds uncaught = 18.51%<\/span>\r\n\r\n<span style=\"font-family: futural;\">\u00a0\u00a0\u00a0b. Estimated total frauds, caught and uncaught = 24.19%<\/span>\r\n\r\n<span style=\"font-family: futural;\">The authors utilize their numbers in other insightful ways, too as a check on their work. For example:<\/span>\r\n\r\n<span style=\"font-family: futural;\">9. The authors conclude that the best estimate of detection likelihood is their pooled measure that includes both the \u201cauditor detected\u201d category of 29.4%, and \u201crestatement measures\u201d category of 33.7%. Their choice of these two methods is based on the idea that either the auditors or companies themselves are catching the potential frauds and announcing them and so likely there was some form of malfeasance present.<\/span>\r\n\r\n<span style=\"font-family: futural;\">When a weighted average is taken of these two fraud detection methods then roughly 33% is their best estimate of the \"tip of the iceberg\" frauds.\u00a0<em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\">In other words, and crucially, 67% of frauds are never detected!<\/em>\u00a0<\/span>\r\n\r\n<span style=\"font-family: futural;\">10. Last among the insights contained in this paper, using insights of the estimates of the cost of corporate malfeasance and fraud from other researchers. Namely, that detected fraud (33% of cases as estimated in this paper) costs malfeasant and fraudulent firms 25% of their market cap, while undetected malfeasance and fraud (67% of cases) costs 10.9% of market cap, for a blended cost of 15.6% of market cap. In dollar terms this figure in 2021 was $830 billion.<\/span>\r\n<div>\r\n<h4 class=\"x-el x-el-h4 c2-6h c2-6i c2-v c2-w c2-42 c2-2c c2-2a c2-29 c2-2b c2-3 c2-z c2-44 c2-10 c2-45 c2-46 c2-47 c2-48\"><span style=\"font-family: futural;\"><em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\"><strong class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-3v c2-66\">Validation of the D.A.T.A. Algorithm<\/strong><\/em><\/span><\/h4>\r\n<\/div>\r\n<span style=\"font-family: futural;\">The above figures derived by the authors of\u00a0<em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\">How Pervasive is Corporate Fraud?<\/em>\u00a0for the number of companies engaged is some form of misconduct is 24.19%, from 8.b, above. This figure comports very well with D.A.T.A.\u2019s own figures of the percentage of companies that score as high risk or likely engaged in deceptive behavior (i.e. those that have negative DATA Scores) of 27.18%.\u00a0<\/span>\r\n\r\n<span style=\"font-family: futural;\">Additionally, the authors' figure of 5.68% of companies actually caught conducting fraud matches well the number of companies in D.A.T.A.\u2019s DATAbase product whose D.A.T.A. Scores are two standard deviations below the average DATA Score, or 3.60%.<\/span>\r\n\r\n<span style=\"font-family: futural;\">At D.A.T.A. we consider the work of the authors of \u201cHow pervasive is corporate fraud?\u201d as a form of independent validation that our method of evaluating deception works accurately. This is because the researchers measured actual frauds and used statistical techniques to estimate how much fraud is undetected. Whereas, at D.A.T.A. we measure the amount of deceptive and truthful behaviors present in documents and transcripts based on a deep understanding of deception science. These two methods for estimated fraud pervasiveness are completely independent of one another. Yet, the figures roughly agree with one another.<\/span>\r\n\r\n<hr class=\"x-el x-el-hr c2-1 c2-2 c2-6j c2-6k c2-4q c2-29 c2-2b c2-k c2-3 c2-4 c2-5 c2-6 c2-7 c2-8\" \/>\r\n\r\n<span style=\"font-family: futural;\"><a class=\"x-el x-el-a c2-2w c2-2x c2-69 c2-v c2-w c2-x c2-j c2-6a c2-3 c2-30 c2-31 c2-11 c2-32\" href=\"https:\/\/blogging.godaddy.com\/blog\/a6d795a4-a672-4120-a6ba-07384a52a2d8\/posts\/2e9f8312-d4c6-4d2f-9757-d62c28192a21#_ednref1\" rel=\"\">[i]<\/a>Dyck, Alexander, Adair Morse, and Luigi Zingales. \u201cHow pervasive is corporate fraud?\u201d\u00a0<em class=\"x-el x-el-span c2-2w c2-2x c2-3 c2-65 c2-13 c2-31 c2-66 c2-67\">Review of Accounting Studies<\/em>. 5 January 2023<\/span>","_et_gb_content_width":"","footnotes":""},"categories":[3,465],"tags":[424,445,441],"class_list":["post-14270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-blog","category-d-a-t-a","tag-fraud-detection","tag-key-scientific-paper-redux","tag-validation"],"_links":{"self":[{"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/posts\/14270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/comments?post=14270"}],"version-history":[{"count":0,"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/posts\/14270\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/media\/14271"}],"wp:attachment":[{"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/media?parent=14270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/categories?post=14270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonapollovoss.com\/web\/wp-json\/wp\/v2\/tags?post=14270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}