Browse Econ Literature

  • Working papers
  • Software components
  • Book chapters
  • JEL classification

More features

  • Subscribe to new research

RePEc Biblio

Author registration.

  • Economics Virtual Seminar Calendar NEW!

IDEAS home

Financial statement analysis: a review and current issues

  • Author & abstract
  • 2 Citations
  • Related works & more

Corrections

  • Andrew B. Jackson

Suggested Citation

Download full text from publisher.

Follow serials, authors, keywords & more

Public profiles for Economics researchers

Various research rankings in Economics

RePEc Genealogy

Who was a student of whom, using RePEc

Curated articles & papers on economics topics

Upload your paper to be listed on RePEc and IDEAS

New papers by email

Subscribe to new additions to RePEc

EconAcademics

Blog aggregator for economics research

Cases of plagiarism in Economics

About RePEc

Initiative for open bibliographies in Economics

News about RePEc

Questions about IDEAS and RePEc

RePEc volunteers

Participating archives

Publishers indexing in RePEc

Privacy statement

Found an error or omission?

Opportunities to help RePEc

Get papers listed

Have your research listed on RePEc

Open a RePEc archive

Have your institution's/publisher's output listed on RePEc

Get RePEc data

Use data assembled by RePEc

  • Library Hours
  • Strategic Plan
  • Giving to the Libraries
  • Jobs at the Libraries
  • Find Your Librarian
  • View All →
  • Google Scholar
  • Research Guides
  • Textbook/Reserves
  • Government Documents
  • Get It For Me
  • Print/Copy/Scan
  • Renew Materials
  • Study Rooms
  • Use a Computer
  • Borrow Tech Gear
  • Student Services
  • Faculty Services
  • Users with Disabilities
  • Visitors & Alumni
  • Special Collections
  • Find Information

Literature Review for Accounting/Auditing

Main Objectives, Procedures & Resources

What is a literature review and what is the purpose?

A literature review consists of simply a summary of key sources, and it usually combines both summary and synthesis, often within specific conceptual categories. A summary is a recap of the important information of the source, but a synthesis is a re-organization, or a reshuffling, of that information in a way that tells how you are planning to investigate a research problem.

A literature review is conducted during the first phase of the research process (in the exploration stage). The purpose of a literature review is to:

  • To survey the current state of knowledge in the area of inquiry (concerning the research questions and/or related topics)
  • To identify key authors, articles, theories, and findings in that area
  • To identify gaps in knowledge in the research area

In this document, we will focus on the steps to follow in doing a literature search on a topic or author. While the steps below are listed in numerical order, some steps may need to be repeated, revisited, and/or skipped as you go through the process.

  • Consider a topic for the research question and determine the breadth and depth of your topic that is manageable in scope - hence preferably, not too wide nor too narrow.  For instance, the topic - Audits and IPOs – could be a good one in this regard.  
  • Audits > Auditor, auditors, auditing …
  • IPOs  >  IPOs, Initial Public Offerings …

     Thus, we can change our original topic - Audits AND IPOs – into a new search statement as below:

  • (Audit * ) AND (IPOs OR Initial Public Offerings)
  • AND -- this narrows a search by telling the database that ALL keywords used must appear in the same records/results.
  • OR -- this broadens a search by telling the database that ANY of the words it connects are acceptable in the search results.
  • * -- this asterisk is a wildcard character , so using: Audit * = the search results may contain Audit, Audit s, Audit or, Audit ing
  • Link 1 - Results   - Getting Search Results:  182 (as of 10/16/23)
  • Link 2 Results   - Getting Search Results:  498 (as of 10/16/23)
  • Audit risk issues
  • Financial statements  
  • Management structure or corporate governance
  • Compliance  
  • Mergers or Acquisitions
  • Now, with the help of Boolean operator “ AND ” we can easily combine theses three concepts/keywords, thus forming some seemingly intricate, yet more promising search statements as below.  That way, we could be able to pull out more meaningful, focused, and relevant results from a huge databases:
  • (Audit * ) AND (IPO * OR Initial Public Offerings) AND ( Risk * ) > Results from EBSCO
  • (Audit * ) AND (IPO * OR Initial Public Offerings) AND ( Financial statements ) > Results from EBSCO
  • (Audit * ) AND (IPO * OR Initial Public Offerings) AND ( management structure or corporate governance ) > Results from EBSCO
  • (Audit * ) AND (IPO * OR Initial Public Offerings) AND ( compliance ) > Results from EBSCO
  • Su (Audit * ) AND Ti (IPO * OR Initial Public Offerings) AND Su (merger * OR acquisition * OR m&a * ) > Results from EBSCO

Please note: (1) Following each of the search statements above, there is a link to results from our library subscription databases - EBSCOhost .    EBSCOhost is one of our recommendation databases for any literature review as it is the largest databases for journals/articles coverage we subscribe to so far, and Business Source Complete ls just one of them. (2) #5 above is different from other in that the Fields - Su and Ti Fields - have been added and used in the search statement.  Why Fields search will be discussed in the next Step (Step 5).     

  • With the power of computing and databases, more often than not, users would get  overwhelming results from whatever keywords used.  How to overcome that? You can reduce the overwhelming number of results, and in the meantime not sacrifice any relevant and high-quality results by taking advantage of the content-related fields in structured databases – the fields that is already build-in with almost all databases, such as EBSCOhost .  We are particularly interested in the following content-related fields:
  • Title  - TI field
  • Subject - SU field
  • Abstract  - AB field 

As a result of using fields, you are actually limiting (forcing) the keywords of selection only appear in certain fields you’ve specified.  Think about this: if in a title of an article, there is a word XYZ, the chances are content of the article is pretty much about XYZ.  The same applies to the fields of subject and abstract.

  • au (Raman, K) AND ab (audit*) =  60 results > Results from ProQuest
  • au (Raman, K) AND su (audit*)   = 42 results > Results from ProQuest
  • au (Raman, k) AND litigation = 18 results > Results from ProQuest
  • As the search results are returned, it is best to preview the results by looking for articles that are relevant to your specific research questions. Try to pay attention to words around the highlighted keywords (it may reveal why a particular article has been pulled out), skim the abstract and the introduction section, even try to read the literature review sections of these articles. This will help to determine the suitability of that article for a further review.
  • Overall, a well conducted literature review should indicate whether the initial research question or topics have already been addressed in the literature, whether there are newer or more interest research questions available, and whether the original research question should be modified or changed in light of findings of the literature review.  
  • Last but not least, it is highly recommended to search the following UTSA subscription databases considering these databases’ coverage and relevancy to your academic discipline.  Certainly, you can use the techniques and procedure we’ve discussed above within all of the databases below. 
  • Academic Search Complete  is a flagship of EBSCOhost
  • Business Source Complete – another sub-database of EBSCOhost —that also c overs Working Papers
  • including ABI/INFORM Collection and 
  • Accounting, Tax & Banking Collection  
  • NBER Working Papers
  • Provides access to books and journals in accounting and finance, economics, and more
  • Last Updated: Oct 16, 2023 9:40 AM
  • URL: https://libguides.utsa.edu/auditing
  • Library Locations
  • Staff Directory
  • 508 Compliance
  • Site Search
  • © The University of Texas at San Antonio
  • Information: 210-458-4011
  • Campus Alerts
  • Required Links
  • UTSA Policies
  • Report Fraud

Financial statement analysis: a review and current issues

PurposeThe literature on financial statement analysis attempts to improve fundamental analysis and to identify market inefficiencies with respect to financial statement information.Design/methodology/approachIn this paper, the author reviews the extant research on financial statement analysis.FindingsThe author then provides some preliminary evidence using Chinese data and offer suggestions for future research, with a focus on utilising unique features of the Chinese business environment as motivation.Originality/valueThe author notes that there has been no work that the author could locate specifically on Chinese FSA research. The unique business environment in China, relative to the US where the vast majority of this work has been conducted, should motivate any studies, especially given the author documents the robust finding in terms of the mean reversion in profitability.

  • Related Documents

Professional trilemma of students with family business experience

Purpose – Family businesses represent the largest share of small-sized firms in majority of economies around the world. Having in mind the global economic situation this trend is expected to be continued. With the goal of better understanding of the process of transferring the business to the next generation, which ensures a long-term success, the purpose of this paper is to investigate expectations of student’s with family business background. Design/methodology/approach – The research addresses the issue of an individual’s perception of entrepreneurship and the related factors that influence individual’s decision on whether to build a career as an employee, become a successor of family business or start own business as an independent entrepreneur. The authors separately analyzed West European (data from another study), East European and Slovenian senior student population for the purpose of comparative study. Students were surveyed and binominal regression was used for statistics. Findings – The results show differences between investigated populations and positions Slovenian students in the mean. The authors anticipate that differences are caused by historical, cultural and educational backgrounds. This challenging area is raising a lot of sub-questions for possible future research. Originality/value – The value of the study is in the replication of the existing methodology from the benchmarking study and result comparison.

Off-price versus price-off

Purpose – The purpose of this paper is to better understand the unique competitive positioning characteristics of off-price retailers and how they compare to other types of retailers. The authors compare off-price and upscale off-price retailers with four major formats of retailers: first, discount department store/warehouse club retailers; second, moderate department store retailers; third, department store retailers; and finally, specialty department store retailers. Design/methodology/approach – The paper employs a representative sample that was randomly drawn from four primary metropolitan cities in the USA. The data were collected using telephone interviews by a prominent, marketing research firm. A series of discriminant analyses were conducted to examine the data. Findings – The findings of the paper indicate that the off-price formats were consistently positioned at extreme points along the price/value continuum, signifying the strongest value-orientation among the other retail formats. The authors also found that while the upscale off-price format followed the specialty department stores in terms of fashion. The results point to an important disadvantage of the off-price format – although strong on price/value, they often fall short on fashion and many other store attributes that may be important to luxury-oriented customers. Research limitations/implications – The paper employed a sample from several cities collected using a telephone interview methodology within the US. Due to these limitations, the findings of this paper may be hampered by this methodology and not generalize to regions outside of the US. Future research should examine how the demise of most of the upscale off-price retailers and growth of flash web sites have changed the competitive structure of retailing. Practical implications – The results demonstrate that the positioning of the off-price retail format is unique from other formats. The retail formats occupy distinct positions. The off-price retail format is strongly associated with the price/value position but only moderately fashionable to customers, especially when compared with the department and specialty department store formats. In contrast, the upscale off-price format, while also strongly positioned along the price/value continuum, is considered much more fashionable than the off-price retail format. In fact, the upscale off-price retail format only trails the specialty department store format in terms of fashion. Originality/value – The unique characteristics of the off-price retail format and growing interest from upscale department stores underscores the need for a comprehensive understanding of the motives of the off-price shopper. This paper provides retailers with a more complete understanding of the store attributes that differentiate the off-price retail format from other major retail store formats. The overall objective of this study is to offer a comprehensive view of the positioning of off-price retailers compared with many alternative retail formats.

The transformation of Chinese business ethics in line with its emergence as a global economic leader

Purpose – This paper aims to present the evolution of Chinese business ethics and CSR policy. China currently has business ethics and corporate social responsibility (CSR) concerns primarily because its economy is in evolution. As the Chinese economy is in transition from the late 1970s from a command–Communist economy to a more hybrid system Beijing model (a system based on a capitalist market controlled through bureaucracy), much has to be understood if one wants to participate in its vast economic potential. Design/methodology/approach – The study is based on the building of a model that depicts the evolution of business ethics in China as a base for further research. Findings – With the rapid development of the Chinese economy, opportunities are opening up to Chinese entrepreneurs and connected officials. This has led to money worship and, in some cases, thorough unethical behavior. The uncertain and ever-changing rules of the game generate opportunity for business ethics and CSR problems. This wealth creates temptation and incentives to cut corners to get rich fast. Much research has tried to explain business ethics in China through the understanding of Guanxi (Chinese social network of reciprocal business relations common in Confucian cultures), but in my view, the evolutionary aspect of it is missing to explain the present and future situation. Whereas considerable research has dealt with the growth of Chinese industries in recent years, the key relationship between changes in its economy and shifts in Chinese business ethics has been neglected. This paper presents the evolution of Chinese business ethics and CSR policy. Originality/value – The paper illustrates the evolution of Chinese business ethics and how one has to adapt if one wants to succeed in its ever evolving and maturing market. A model is presented that can assist in future research in the area.

Interagency collaboration for graduate employment opportunities in Uganda

PurposeThe purpose of this paper is to identify gaps in the structure of organizations that hinder collaboration of organizations involved in the creation of graduate employment opportunities in Uganda.Design/methodology/approachData was collected from staff and leaders of 14 organizations that were purposely selected to represent government, private, and civil society organizations. These organizations were selected based on their mandates, which touch on the employability of university graduates in the country in very direct ways. This was a cross-sectional survey design—based on a self-administered questionnaire, key informant interviews, and documentary analysis.FindingsOrganizations were found to have “Tell”/directive decision-making, high power distance between employees, and jobs were not coded in a way that gives employees freedoms to interact and build collaborative relationships. Finally, rules and regulations were very restrictive, disorienting employee's abilities to collaborate.Research limitations/implicationThis research concentrated on the gaps that exist in the structure of organizations from which the results point to inadequate relational, interactional, inclusive, and democratic space among different stakeholders. It would be useful for future research to examine the extent to which the structure of organizations not only impacts collaboration but also measures the level to which it affects organizational performance.Practical implicationsThe knowledge economy of the twenty-first century demands for collaborative engagements with different stakeholders if they are to survive the competitive business environment. Collaborative engagement helps in the sharing of knowledge, expertise, and resources, development of more coherent services, facilitation of innovation and evaluation, avoiding duplication of work, and minimizing conflicts and competition while creating synergy among partners.Originality/valueUnlike previous studies, which have examined employability of graduates from a supply side perspective, this study investigates organizations from both the supply and demand perspectives and identifies synergy that is as a result of bringing organizations to work together.

Why do some people search for their files much more than others? A preliminary study

PurposePrevious research has repeatedly shown that people only search for files in a small minority of cases when they do not remember the file's location. The current study aimed to examine whether there is a group of hyper-searchers who search significantly more than others. Based on previous neurocognitive studies, this study aims to hypothesize that if such a group exists, they will have superior verbal memory and reduced visuospatial memory.Design/methodology/approachIn total, 65 participants completed a questionnaire estimating their search percentages, as well as reporting demographic data. Verbal memory was measured using the Wechsler logical memory test, and visuospatial memory was assessed using an online card memory game.FindingsHyper-searchers were defined as participants with search percentage of over one standard deviation (SD) above the mean. The average search percentage of the seven participants who met this criterion was 51% (SD = 14%), over five times more than the other participants (M = 10%, SD = 9%). Similar results were obtained by re-analyzing data from four previous papers (N = 1,252). The results further confirmed the hypothesis that hyper-searchers have significantly better verbal memory than other participants, possibly making searching easier and more successful for them. Lastly, the search percentage was positively predicted by verbal memory scores and negatively predicted by visuospatial memory scores. Explanations and future research are discussed.Originality/valueThis preliminary study is the first to introduce the concept of hyper-searchers, demonstrate its existence and study its causes.

A systematic review of the literature on supply chain agility

Purpose The purpose of this study is to critically examine the scholarly articles associated Murali Sambasivan with the diverse aspects of supply chain agility (SCA). The review highlights research insights, existing gaps and future research directions that can help academicians and practitioners gain a comprehensive understanding of SCA. Design/methodology/approach The present study has adopted author co-citation analysis as the research methodology, with a view to thoroughly investigating the good-quality articles related to SCA that have been published over a period of 22 years (1999-2020). In this study, 126 research papers on SCA – featuring diverse aspects of agility – from various reputed journals have been examined, analysed and assimilated. Findings The salient findings of this research are, namely, agility is different from other similar concepts, such as flexibility, leanness, adaptability and resilience; of the 13 dimensions of agility discussed in the literature, the prominent ones are quickness, responsiveness, competency and flexibility; literature related to SCA can be categorised as related to modelling the enablers, agility assessment, agility implementation, leagility and agility maximisation. This research proposes a more practical definition and framework for SCA. The probable areas for future research are, namely, impediments to agility, effective approaches to agility assessment, cost-benefit trade-offs to be considered whilst implementing agility, empirical research to validate the framework and SCA in the domain of healthcare and disaster relief supply chains. Practical implications This paper provides substantial insights to practitioners who primarily focus on measuring and implementing agility in the supply chain. The findings of this study will help the supply chain manager gain a better idea about how to become competitive in today’s dynamic and turbulent business environment. Originality/value The originality of this study is in: comprehensively identifying the various issues related to SCA, such as related concepts, definitions, dimensions and different categories of studies covered in literature, proposing a new definition and framework for SCA and identifying potential areas for future research, to provide deeper insights into the subject and highlight areas for future research.

A conceptual framework for managing post-disaster reconstruction projects in emerging economies: the case of Angola

PurposeThis study develops a conceptual framework appropriate for managing Post-Disaster Reconstruction Projects (PDRPs) so as to avoid cost and time overruns in Angola.Design/methodology/approachAn explanatory sequential mixed research approach was used. Data was collected from project participants within the ministry of planning, the provincial government office of planning and the local government in Angola. A questionnaire with closed questions was completed by 130 survey respondents. Semi-structured focus group interviews were conducted with seven participants selected through purposive sampling. Descriptive statistics, t-test and content analysis were used to analyse quantitative and qualitative data, respectively.FindingsThe study indicates that there is presently no formal project management process. Neither have government project management standards been developed and broadcast. This results in ad hoc processes being mostly used for managing PDRPs. The study further presents disaster preparation programme, community engagement, resources and stakeholder's engagement, post-disaster procurement policies, financial guides, post-disaster recovery legislation, context-specific (social economic, demographic, political and cultural variables), programme preparation as essential components to be considered for developing an appropriate framework for managing PDRPs.Research limitations/implicationsThe study is limited by its geographical settings which focussed the results on one province in Angola. However, the findings can be useful for other countries wishing to gain insights on the framework with “overlooked components” for managing DPRPs in emerging countries with similar disaster environment, government policies and same business environment.Practical implicationsThe framework for managing PDRPs may positively impact project realization, hence minimization of time and cost overruns. The findings are vital for managers, local practitioners and policy/decision-makers in emerging countries of essential components and lessons useful for managing PDRPs and making decisions when they intend to participate in such projects. An understanding of which approaches are critical and essential components of the framework serves as a basis for improving project delivery. Future research studies should describe its practical application.Originality/valueThe study provides insights by identifying an ordered grouped set of project management models/approaches mostly applicable for managing PDRPs in Angola, better understanding of appropriate components/variables to be considered and develops a conceptual framework for managing PDRPs in emerging countries, post-war context.

Litigation against clients and audit report lag: an examination of the role of state ownership and regional legal development in China

Purpose Companies may be defendants in lawsuits that are unresolved at year-end. This paper aims to consider whether the financial statements of companies facing litigation claims (pending litigation) are more time-consuming to audit due to the complexity and subjectivity of contingent liabilities associated with pending litigation. The authors consider whether auditors tailor their approach to pending litigation based on two distinct factors in the Chinese business environment: the client’s government ownership status and the legal development of the region in which the company is based. Design/methodology/approach Data on litigation against companies and their audit report lags were obtained for 18,029 firm-year observations of Chinese companies from 2008 to 2017. The sample was subsequently divided based on whether the company was a state-owned enterprise (SOE) and based on whether the company was based in a region of China with a more-developed and more market-oriented legal system. Findings The overall results indicate that audits of companies with pending litigation take 2.9 days longer than those of companies without pending litigation. For companies with multiple pending claims, each additional claim is associated with 1.9 more days of audit report lag. These effects are weaker for SOEs and for companies in regions of China with less developed legal systems. The results are consistent with the idea that auditors tailor their response to pending litigation based on the risk profile of the client, including consideration of SOE status and regional legal development. Originality/value This paper is the first to consider the potential effect of pending litigation (including claims not disclosed or recognized in financial statements) on audit report lags and how environmental business factors can influence this relationship.

Understanding the internal audit function in a digitalised business environment

Purpose This paper aims to gain an in-depth understanding of how the internal audit function evolves in an increasingly digitalised business environment. Design/methodology/approach This paper is based on 29 semi-structured interviews with members of management committees and internal auditors based in Belgium. Findings The analysis reveals that a digitalised business environment affects the internal audit function in three respects. First, it impacts its scope. The agility of the internal audit planning and the required digital knowledge are expected to increase and information technology (IT) risks gain importance, especially cybersecurity threats. Second, the demand for consulting activities performed by internal auditors is higher and third, digitalisation modifies the working practices of internal auditors in their day-to-day tasks. New technologies such as data analytics tools are being implemented progressively in internal audit departments and digital skills are considered a critical asset. Research limitations/implications This research was conducted in the European Union and gathers opinions of members of management committees and internal auditors. Future research could focus on other internal auditing stakeholders in other legal contexts. Practical implications The internal audit function needs to integrate IT and data analytics skills. In addition, the internal audit function should develop consulting activities to help organisations deal with the digitalisation of the business environment. Originality/value The impact of digitalisation on the internal audit function and its effect on internal audit practices is an underexplored area.

The patterns of the numbers used in occupational fraud schemes

Purpose This study aims to classify the numbers used in recent financial statement, corruption and asset misappropriation fraud schemes in such a way that these classes can be used to design effective proactive analytics-based fraud detection tests. Design/methodology/approach The data sources for the classification scheme include the court records of fraud prosecutions, investigative reports and research papers related to fraud cases. Findings Fraudulent numbers are most often amounts that are round, have a strong period-over-period growth, are just above or below internal control thresholds or other targets, are deviations from Benford’s Law, are purposeful duplicates of authentic transactions, are outliers due to being excessively large and are excessively rounded up or down. The study includes several examples of fraudulent numbers. Research limitations/implications The fraudulent number types are based on a sample of fraud-related court documents, and the sample might not be representative of the population of detected and undetected frauds. Further research is needed into the detection of corruption/bribery schemes. Practical implications The results are important for auditors and forensic accountants running proactive fraud detection tests. The discussions emphasize that the analysis should include refining and rerunning the tests, and then using groupings and filtering to deal with false positives. The importance of an effective audit of the notable transactions is stressed in the concluding section. Originality/value The study is an original in-depth coverage of the patterns found in fraudulent numbers. The discussion sections review implementation issues and considerations for future research.

Export Citation Format

Share document.

Two decades of financial statement fraud detection literature review; combination of bibliometric analysis and topic modeling approach

Journal of Financial Crime

ISSN : 1359-0790

Article publication date: 19 April 2023

Issue publication date: 30 November 2023

The emergence of machine learning has opened a new way for researchers. It allows them to supplement the traditional manual methods for conducting a literature review and turning it into smart literature. This study aims to present a framework for incorporating machine learning into financial statement fraud (FSF) literature analysis. This framework facilitates the analysis of a large amount of literature to show the trend of the field and identify the most productive authors, journals and potential areas for future research.

Design/methodology/approach

In this study, a framework was introduced that merges bibliometric analysis techniques such as word frequency, co-word analysis and coauthorship analysis with the Latent Dirichlet Allocation topic modeling approach. This framework was used to uncover subtopics from 20 years of financial fraud research articles. Furthermore, the hierarchical clustering method was used on selected subtopics to demonstrate the primary contexts in the literature on FSF.

This study has contributed to the literature in two ways. First, this study has determined the top journals, articles, countries and keywords based on various bibliometric metrics. Second, using topic modeling and then hierarchy clustering, this study demonstrates the four primary contexts in FSF detection.

Research limitations/implications

In this study, the authors tried to comprehensively view the studies related to financial fraud conducted over two decades. However, this research has limitations that can be an opportunity for future researchers. The first limitation is due to language bias. This study has focused on English language articles, so it is suggested that other researchers consider other languages as well. The second limitation is caused by citation bias. In this study, the authors tried to show the top articles based on the citation criteria. However, judging based on citation alone can be misleading. Therefore, this study suggests that the researchers consider other measures to check the citation quality and assess the studies’ precision by applying meta-analysis.

Originality/value

Despite the popularity of bibliometric analysis and topic modeling, there have been limited efforts to use machine learning for literature review. This novel approach of using hierarchical clustering on topic modeling results enable us to uncover four primary contexts. Furthermore, this method allowed us to show the keywords of each context and highlight significant articles within each context.

  • Detection of financial fraud
  • Latent Dirichlet allocation
  • Topic modeling
  • Smart literature review
  • Bibliometric analysis

Soltani, M. , Kythreotis, A. and Roshanpoor, A. (2023), "Two decades of financial statement fraud detection literature review; combination of bibliometric analysis and topic modeling approach", Journal of Financial Crime , Vol. 30 No. 5, pp. 1367-1388. https://doi.org/10.1108/JFC-09-2022-0227

Emerald Publishing Limited

Copyright © 2023, Milad Soltani, Alexios Kythreotis and Arash Roshanpoor.

Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial & non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode

1. Introduction

1.1 description of the research topic.

Almost 20 years have passed since the financial crisis caused by Enron’s financial fraud. Despite significant reforms such as the Sarbanes Oxley Act and the creation of the Public Company Accounting Oversight Board, which oversees auditors’ quality, the news of managers cooking the books continues. Even the legendary investor, the Oracle of Omaha, has fallen victim to financial fraud ( Kollewe, 2014 ). To combat this issue, experts suggest financial insurance ( Economist, 2014 ) and the use of blockchain technology to revolutionize financial transactions ( Aicpa.org, 2020 ). Providing these examples, one may ask, what are the causes of the financial fraud cycle? How can investors protect their capital by examining the quality of their financial statements? Committing financial statement fraud (FSF) is an unethical decision-making process, and detecting fraud is challenging because of its multifaceted nature. For example, 50% of fraud seen by SEC enforcement has been due to revenue recognition (e.g. cookie jar), and 35% is because of concealed liabilities and expenses. The rest is caused by inadequate disclosure in footnotes ( Association of Certified Fraud Examiners, 2017 ).

Uncovering the new trend of articles by analyzing the keywords over two decades;

Grouping of the authors based upon the similarity of the content of articles;

Providing the top countries' and journals' collaboration in FSF detection literature; and

Explaining the primary contexts of FSF literature and providing the high-impact articles in each content based on citation rate.

Therefore, the results of this study will appeal to those interested in comprehensively exploring the FSF detection literature, such as auditors, investors, financial managers and researchers.

2. Literature review

2.1. a review of previous research.

In this article, we use a combination of two approaches, bibliometric analysis and topic modeling, to review the research literature on detecting financial fraud. Bibliometric analysis is a quantitative method that we use to analyze a large number of financial fraud studies and uncover emerging trends in FSF detection. This approach is in line with the guideline presented in the article by Donthu et al. in 2021, and the software we use is VOSviewer. Table 1 shows the conditions required to use bibliometric analysis.

In the second approach, we will use topic modeling, which aligns with the guideline presented in Asmussen and Møller’s article in 2019. Topic modeling is a natural language processing technique of the unsupervised method that extracts topics from a collection of papers. For topic modeling, we use Python, and the essential Python libraries used in the topic modeling approach include Pemdas, Gensim and pyLDAvis. Table 2 summarizes the features of the topic modeling approach.

Table 3 shows five studies using bibliometric analysis and topic modeling formatted based on the research field, methodology, required data and data size.

2.2 Research innovation

Figure 1 shows interest over time based on Google Trends data [ 1 ] for the two approaches of bibliometric analysis and topic modeling over the past five years. As is shown, despite the increasing trend for bibliometric analysis, interest in topic modeling has been more significant.

What has been the trend in FSF detection article publishing from 2001 to 2021?

Which countries have the highest number of published articles in the field of FSF detection?

How do the leading nations collaborate in publishing articles related to FSF detection?

Which journals have the highest publication rates for articles on FSF detection?

What has been the trend of the top journals in the FSF detection field from 2001 to 2021?

Which are the most frequently used keywords in FSF detection articles based on co-occurrence measurement?

What has been the trend of the top keywords in the field of FSF detection from 2001 to 2021?

What are the main contexts in FSF detection and which keywords have a higher frequency within these contexts?

Which articles have the highest citation rate in each context related to FSF detection?

3. Methodology

The methodology of this study is illustrated in Figure 2 . Essentially, the research process encompasses three phases. The initial phase, referred to as pre-processing, entails the provision of the relevant data from articles in an Excel format, followed by data cleansing. The next stage is topic modeling, where the LDA method is applied. The clustering method is then used to identify contexts associated with financial fraud detection. Finally, the post-processing stage highlights the most relevant articles for the selected contexts:

Loading papers: Generally, two primary databases for collecting scholarly publications include Web of Science (WoS) and Scopus. While WoS is one of the largest and most reliable databases for reviewing research literature, the journals in Scopus are more comprehensive ( Agarwal, 2016 ; Saba et al. , 2020 ). Therefore, we have used the Scopus database to find relevant articles.

Selecting papers: Distinguishing between fraud detection and FSF detection is necessary to collect the relevant articles. To investigate FSF detection, we use the keywords: “anomaly detection financial*” OR “detect fraudulent financial reporting*” OR “detect accounting fraud*” OR “detect misstatements*” OR “financial ratio risk detection*” OR “detect earning manipulation*” for the years 2001 to 2021. The total number of articles is 1,496 articles. Then, 124 articles that are not related to detecting financial fraud are removed. Also, considering that one of the goals of this study is to categorize research based on author keywords into corresponding contexts, we excluded articles that did not have author keywords. As a result, by removing 296 articles, we selected 1,076 articles suitable for analysis.

Descriptive analysis: In this study, we have used VOSviewer and Phyton software to implement three methods of bibliometric analysis, including co-word analysis, co-bibliometric analysis and co-authorship analysis. Co-word analysis shows that keywords related to each other have the same thematic map. Co-authorship analysis shows the interaction between scholars in detecting financial fraud, such as affiliated institutions and countries. Bibliographic coupling assumes that two publications sharing common references are likely to have a higher similarity.

Cleaning documents: In this step, we break down the keywords into individual units and convert them to lowercase. Additionally, we eliminate any non-alphabetic symbols (such as punctuation marks) and words with less than three characters, as they have minimal impact on the topics being analyzed. Subsequently, we select keywords that do not contain stop words such as “use.” Then, using a process called lemmatization, we identify the root words of the keywords. Finally, we eliminate author keywords that only occur once, as they offer limited value in performing topic modeling.

Vectorization: Following the document cleaning process, we compile a list of keywords indicating the frequency at which each keyword appears in the training set. Subsequently, with the use of the count vectorizer, we convert each keyword into a vector representation.

Setting parameters for LDA: The LDA method has a default value set. In this study, we have changed the parameters of burn-in time, the number of iterations and seed values to achieve better results. In addition, the number of fold parameters has been removed since all the papers are used to run the model.

Topic Modeling: In this study, we used the LDA method, a probabilistic and unsupervised modeling approach. This method allows us to categorize texts within a corpus into specific topics. It is vital at this stage to determine the optimal number of topics through the use of the topic coherence metric. The coherence metric demonstrates how well a topic is supported by the reference corpus (Joao Pedro, 2022 ). The optimal number of topics for the model can be chosen by visualizing the coherence score, which ranges from 0 to 1 on the vertical axis, with the horizontal axis representing the number of topics. The highest point on the graph indicates the ideal number of topics ( Yadav, 2022 ).

LDA model outputs: The result produced by LDA are the LDA components that demonstrate the significance of each keyword in relation to various topics. The LDA-matrix shows the significance of articles to each topic based on the keyword list used in the research papers. To clarify the outcome, an inter topic distance map has been used which visualizes the value of keywords in different topics based on their frequency of occurrence ( Yadav, 2022 ).

Hierarchical clustering: We use hierarchical clustering to categorize such as topics into a single cluster. Clusters featuring similar topics create a context that is linked to articles. Afterwards, by introducing a new column, we demonstrate the affiliation of each article to its corresponding cluster.

Selecting the relevant topics: Once the membership of articles within each cluster is established, it becomes imperative to assign labels to each cluster. These labels signify the context of articles that share similar themes. The determination of the labels is based on the occurrence and recognition of significant keywords. Hence, we use the word cloud visualization approach which displays the frequency of keywords in each context.

Validating the results: The exploratory search ends with labeling the contexts, and it is necessary to check the validity of the results. Validity shows the extent to which the contexts’ labeling reflects the collection of keywords in each context. The validity of the results in this study is investigated through semantic validation, in which experts review the keywords in the word cloud to see if the naming of the contexts based on the observed keywords is justified ( Asmussen and Møller, 2019 ). For this purpose, we will ask three finance and financial fraud experts to express their agreement with our labeling. We will also use the following formula to check the overall level of agreement or disagreement ( Neuman, 2013 ): (Eqn.1) V a l i d i t y   P e r c e n t a g e = 2 × n u m b e r   o f   a g r e e m e n t s T o t a l   n u m b e r   o f   c o d e s × 100

Introducing articles with the highest citation rate: In the last step, the top articles in each context are shown based on their citation rates. The citation rate of each article is calculated by dividing the total citations by the number of years that have passed since its publication. This analysis helps us to introduce the most important research topics within the field of study.

4. Analysis of publications

4.1 descriptive details of extant publications, 4.1.1 articles published each year (rq1)..

Figure 3 shows the frequency of the articles published from 2001 to 2021. The publication trend shows that researchers’ interest in issues related to financial fraud detection has been increasing. We have demonstrated this trend with important events related to financial fraud and global markets. For instance, in 2002, Enron and WorldCom went bankrupt due to FSF. One of the consequences of this bankruptcy was the publication of Statement of Auditing Standards No. 99 (SAS No. 99) by the American Institute of Certified Public Accountants. Also, in 2008 the world faced the most significant financial crisis, which put considerable pressure on companies for financing.

4.1.2 Density visualization of top 20 countries collaborating in the detection of financial fraud (RQ2).

Figure 4 illustrates the top 20 countries that have published articles on FSF. The countries included in the data have published at least 14 articles on the topic. The United States of America and China are the leading countries in terms of publishing articles on FSF, with 248 and 134 articles respectively. This suggests that financial fraud is a prevalent issue worldwide and that various countries have contributed to the research in this field.

4.1.3 Network structure of the top 20 countries (RQ3).

Figure 5 shows the collaboration between top 20 countries in publishing scholarly papers on FSF detection based on authors' affiliation information. The size of the nodes represents the number of published articles and the width of the edges represents the cooperation between countries. The USA, the UK and China have the largest co-authorships while countries with limited cooperation rely on local or individual authors.

4.1.4 Total number of published articles in each journal (RQ4).

Figure 6 shows journals that have published more than 10 articles on FSF detection.

As demonstrated, Lecture Notes in Computer Science with 35 articles, ACM International Conference Proceeding Series with 26 articles and Journal of Financial Crime with 15 articles are among the top journals in FSF detection.

4.1.5 Trend of journals in publishing articles (RQ5).

Figure 7 shows the trend of top journals publishing the highest number of articles annually.

As demonstrated, the journals Lecture Notes in Computer Science , ACM International Conference Proceeding Series , IEEE Access and Journal of Financial Crime have an increasing trend from 2001 to 2021.

4.1.6 Network structure of the top 50 keywords (RQ6).

Figure 8 demonstrates the network structure of the keywords based on the co-occurrence and shows how often each keyword is associated with other keywords. For this purpose, we set the minimum number of co-occurrence to 28, based on which 50 keywords with the highest co-occurrence are shown in Figure 8 . Different colors of the nodes represent the initial date of their publication.

The results in Figure 8 show that keywords such as big data, machine learning and decision tree are among the keywords that have recently attracted the attention of researchers. In contrast, keywords such as computer crime, administrative data processing and financial data processing have been used since 2012.

4.1.7 Keyword trend (RQ7).

Table 4 shows the top 20 keywords in FSF detection. It shows that keywords such as anomaly detection, fraud detection, machine learning and data mining have the highest frequency in FSF detection.

In the same line, Figure 9 shows the trend of six keywords based on the frequency of usage from 2001 to 2021. As it can be seen, the keywords of anomaly detection, machine learning and fraud detection have an upward trend, indicating the increasing attention they have received from researchers over the years.

4.2 Topic modeling using Latent Dirichlet Allocation

4.2.1 coherence scores..

The coherence score is used to determine the optimal number of topics in a reference corpus and was calculated for 100 possible topics. The score reached its maximum at 0.65, indicating that 42 topics are optimal. Figure 10 represents these 42 topics in a two-dimensional graph, with the intertopic distance map used to evaluate the content of each topic based on its keyword values.

4.2.2 Hierarchical clustering.

At this stage, hierarchical clustering is used to reveal the primary contexts related to identifying financial fraud by grouping similar topics. In this method, each article is initially considered a cluster, and at each stage, articles closer to each other form a larger cluster. To find the optimal number of clusters, we have used Dendrogram analysis, a prevalent hierarchical clustering method. The optimal number of clusters is identified in the largest vertical difference between nodes by crossing the horizontal line. Accordingly, the optimal number of clusters is four, and each article belongs to a specific cluster from one to four. Also, four clusters have been formed due to merging similar topics, so it can be concluded that the articles in each of the four clusters refer to different contexts of FSF detection.

Four contexts covering 10%, 80%, 6% and 4.6% of all published articles, respectively. Therefore, contexts two and four have the highest and the lowest number of articles, respectively. In context one, the journals Lecture Notes in Computer Science , Procedia Computer Science and ACM International Conference Proceeding Series have the highest published articles. Moreover, in context two, the journals Lecture Notes in Computer Science , ACM International Conference Proceeding Series , Audit and Journal of Financial Crime have the highest number of published articles. In context three, IEEE Access , Lecture Notes in Computer Science , Journal of Critical Reviews and Studies in Computational Intelligence have the highest published articles. Finally, in context four, the Managerial Auditing Journal , Issues in Accounting Education and the Journal of Financial Crime have the highest number of published articles. Therefore, Lecture Notes in Computer Science and the Journal of Financial Crime have covered various contexts of FSF detection.

4.3 Select relevant topics (RQ8)

The article analyzes the content of various topics based on the frequency of keywords. Out of 3,406 unique keywords, the most repeated keywords in the field of FSF detection from 2001 to 2021 include anomaly detection, fraud, data mining, deep learning audit, clustering audit, Benford law, outlier detection and machine learning. These keywords are shown in the word cloud graph in Figure 11 .

4.3.1 Selected relevant labels for context one.

In this part, we aim to select relevant labels based on the frequency of keywords in each context. Figure 12 shows the keywords leading to the creation of context one.

Two FSF detection methods are human detection and machine detection. The results in Figure 13 show that by applying topic modeling, the keywords related to machine detection are more similar and, therefore, are in context one. In other words, human detection, such as the Whistleblowing system, can be a useful tool in detecting FSF, as it can help to bring attention to fraudulent activity that might otherwise go undetected. However, human detection is not the only method of financial fraud detection, and it is not always a reliable or effective method on its own. Financial fraud detection often involves combining different techniques, such as data analysis and machine learning algorithms.

The first group of keywords consists of feature selection, principal component analysis, feature extraction and dimensionality reduction. Generally, the issues related to FSF detection include the study of extensive financial data where the identification of financial variables and financial ratios is necessary. Then, by applying data mining techniques, organizations are classified into two categories fraudulent and non-fraudulent. However, if the data set includes many irrelevant and correlated features, a curse of dimensionality will appear, reducing the classification’s performance. Therefore, removing the number of irrelevant features from the data set is necessary by using dimensionality reduction techniques such as feature selection and principal component analysis (see, for example, Gupta and Mehta, 2020 ).

The second group of keywords consists of text mining, neural network, classification, one class classification, artificial intelligence, time series analysis, graph mining, visual analytics, random forest, regression, unsupervised learning, decision tree, k -means, fuzzy logic, supervised learning, time series prediction and correlation. Generally, there are two supervised and unsupervised learning approaches for artificial intelligence and machine learning. In supervised learning, data sets have labels and include classification algorithms (e.g. support vector machine, decision tree and random forest) and regression algorithms (e.g. linear regression and logistic regression). The unsupervised learning approach analyzes unlabeled data sets and includes methods such as clustering and association (see, for example, Ashtiani and Raahemi, 2021 ). According to these explanations, it can be argued that the keywords of the first context are related to the title of “fraud detection techniques” for cluster one.

4.3.2 Selected relevant label for context two.

Figure 13 shows the frequency of keywords leading to the creation of context two.

Cluster two includes keywords such as fraudulent financial reporting, FSF, earning management, corporate governance, cooking the books, fraud prevention, fraud triangle, fraud diamond, the pentagon model. The bankruptcy of companies such as Enron and WorldCom increased attention to the quality of financial reports, and researchers began to investigate the causal factors associated with the increased probability of fraud and the consequences of financial fraud (see, for example, Rezaee, Z., 2005 ). Other studies have tried to investigate different proxies to measure fraud factors in the fraud triangle, diamond and pentagon model (see, for example, Skousen et al. , 2009 ). Based on the provided explanations, we select the title “Causes and deterrence of FSF” for Cluster 2.

4.3.3 Selected relevant label for context three.

Figure 14 shows the keywords leading to the creation of context three based on the frequency of keywords.

Cluster three includes the keywords of digital forensics, network security, wireless sensor network, cloud computing, data privacy, malware, DDoS, information security, cyber security, online transaction, website defacement attack. These keywords are related to transactions and frauds caused by computers and the internet, the disclosure of which leads to the loss of the intellectual property of the company secrets and major financial damage. Articles in this area can include a variety of topics related to digital forensics. Cyber security measures can be an important tool in preventing and detecting fraud in financial statements. For example, implementing strong access controls, monitoring financial transactions and maintaining accurate audit logs can help identify manipulation of financial data. Also, digital forensics can be used to analyze the digital evidence that has been collected, to find and recover hidden information. For example, studies focuses on data manipulation detection methods, which means the unauthorized modification of the system (e.g. data leakage malware, salami technique) to disrupt the normal function of the targeted system (see, for example, Nicholls et al. , 2021 ). Other study objectives can be identifying factors related to preventing online fraud and data security, such as security auditing and data classification (see, for example, Soomro et al. , 2021 ). Based on the provided explanations, we select the title “computer and online transaction fraud” for cluster three.

4.3.4 Selected relevant label for context four.

Figure 15 shows the keywords leading to the formation of context four based on the frequency criteria.

Context four includes the keywords of audit risk plan, audit difference, audit analytics, audit procedures, audit software, audit planning, audit risk, audit standards, auditor experience, auditor liability, audit adjustments, audit effort, external audit, auditor independence, audit sampling, audit evidence and audit committee effectiveness. In general, studies associated with auditors’ fraud-related responsibilities can be divided into two groups: internal audits and external audits. Internal auditors are better positioned to detect financial fraud due to their proximity and understanding ( Association of Certified Fraud Examiners, 2017 ). Therefore, the first group of studies has addressed the role of internal auditors in risk management (see, for example, Tamimi, 2021 ). In this regard, another group of studies has examined the function of internal auditors under the influence of mediating factors such as corporate governance and gender diversity (see, for example, Pazarskis et al. , 2021 ). The second group of studies is related to external auditors. For instance, some studies have investigated the effect of external auditor quality (e.g. the auditor's quality) on the possibility of identifying financial fraud (see, for example, Qawqzeh et al. , 2021 ). Other studies have investigated new trends in auditing financial statements (see, for example, Lim, 2021 ).

4.4 Validity test of the labeling for the contexts

At this stage, it is necessary to examine the validity of labeling for the four mentioned contexts. To this end, we provided the keywords of each topic to the financial experts and asked them to express their agreement with the keywords related to each context. If the calculated value of validating percentage is more than 60%, the created context will have sufficient validity ( Neuman, 2013 ). Table 5 shows the level of agreement of labeling based on the keywords of each context by three financial and financial fraud experts.

4.5 Introducing top articles for main contexts in financial statement fraud detection (RQ9)

In this section, the top articles of each context are introduced in Table 6 . For this purpose, the citation rate index is used, and the articles are sorted based on this index. Articles with context number one are related to fraud detection techniques. Articles with context number two are related to the causes and deterrence of FSF. Articles with context number three are related to computer and online transaction fraud. Articles with context number four are related to auditors’ fraud-related responsibilities.

5. Conclusion

This study aims to review the research literature concerning FSF detection from 2001 to 2021. Accordingly, 1,496 articles were extracted from the Scopus database. After screening the articles, we selected 1,076 papers for analysis. To analyze the literature on FSF detection, we first used the bibliometric approach and revealed that the articles published during the past two decades have an upward trend. We also indicated the top 20 countries with the highest number of articles published. The results showed that the USA and China are the leading countries in content production in FSF detection. Also, the USA and China coauthors cooperate more with other countries. Then, we reviewed the journals and identified the top journals with more than 10 articles during the past two decades. Our results also revealed that the journals of Lecture Notes in Computer Science , ACM International Conference Proceeding Series , IEEE Access and Journal of Financial Crime have an increasing trend in publishing content FSF detection. Then, we analyzed the keywords and showed that keywords such as decision trees, machine learning and big data have recently attracted researchers’ attention. Then, we introduced the 20 most frequent keywords in the literature on FSF detection. The analysis of the trends of the keywords such as anomaly detection, machine learning and fraud detection showed a growing trend in using these keywords in recent years.

Finally, using the LDA modeling method, 42 related topics were identified. Finally, we identified the contexts by applying hierarchical clustering. The examination of four clusters revealed that the Journal of Financial Crime and Lecture Notes in Computer Science include more diverse topics because of their presence in most contexts. Then, using word cloud, we displayed the keywords of each context and identified the four labels of fraud detection techniques, fraud prevention and deterrence, computer and online transaction fraud and auditors’ fraud-related responsibilities based on the analysis. Finally, we have introduced the top articles in each context label based on citation rate.

6. Limitation of the study

In this study, we tried to comprehensively view the studies related to financial fraud conducted over two decades. However, this research has limitations that can be an opportunity for future researchers. The first limitation is due to language bias. We have focused on English language articles, so it is suggested that other researchers consider other languages as well. The second limitation is caused by citation bias. In this study, we tried to show the top articles based on the citation criteria. However, judging based on citation alone can be misleading. Therefore, we suggest that the researchers consider other measures to check the citation quality and assess the studies’ precision by applying meta-analysis.

financial statement analysis literature review

Trend of interest in bibliometric analysis and topic modelling based on Google Trends

financial statement analysis literature review

Research methodology to analyze articles in financial statement fraud detection

financial statement analysis literature review

Year-wise publication of detection financial fraud between 2001 and 2021

financial statement analysis literature review

Top countries contributing to publishing financial statement fraud detection articles

financial statement analysis literature review

Collaboration map of the top 20 countries in financial statement fraud detection

financial statement analysis literature review

Top journals with the highest number of published articles

financial statement analysis literature review

The trend of the top journals in the field of financial fraud detection annually

financial statement analysis literature review

Network structure for the top 50 keywords concerning financial statement fraud detection

financial statement analysis literature review

The trend of the number of keywords used over the years 2001–2021

financial statement analysis literature review

Intertopic distance map for the 42 financial statement fraud detection topics

financial statement analysis literature review

Visualization of 3,406 unique keywords in the field of financial statement fraud

financial statement analysis literature review

Selecting the title of “fraud detection techniques” for context one

financial statement analysis literature review

Selecting the title of “causes and deterrence of financial statement fraud” for context two

financial statement analysis literature review

Selecting the title of “computer and online transaction fraud” for context three

financial statement analysis literature review

Selecting the title of “auditors' fraud-related responsibilities” for context four

Requirements for using bibliometric analysis

Source: Author contribution

https://trends.google.com/trends/

Agarwal , A. , Durairajanayagam , D. , Tatagari , S. , Esteves , S. , Harlev , A. , Henkel , R. , Roychoudhury , S. , Homa , S. , Puchalt , N. , Ramasamy , R. , Majzoub , A. , Ly , K. , Tvrda , E. , Assidi , M. , Kesari , K. , Sharma , R. , Banihani , S. , Ko , E. , Abu-Elmagd , M. and Gosalvez , J. ( 2016 ), “ Bibliometrics: tracking research impact by selecting the appropriate metrics ”, Asian Journal of Andrology , Vol. 18 No. 2 , p. 296 , ( online ), doi: 10.4103/1008-682x.171582 .

Aicpa.org ( 2020 ), “ Blockchain versus financial statement fraud ”, ( online ), available at: www.aicpa.org/professional-insights/download/blockchain-versus-financial-statement-fraud ( accessed 17 August 2022 ).

Ampese , L.C. , Sganzerla , W.G. , Di Domenico Ziero , H. , Mudhoo , A. , Martins , G. and Forster-Carneiro , T. ( 2022 ), “ Research progress, trends, and updates on anaerobic digestion technology: a bibliometric analysis ”, Journal of Cleaner Production , Vol. 331 , p. 130004 , ( online ), doi: 10.1016/j.jclepro.2021.130004 .

Ashtiani , M.N. and Raahemi , B. ( 2021 ), “ Intelligent fraud detection in financial statements using machine learning and data mining: a systematic literature review ”, IEEE Access , Vol. 10 , p. 1 , ( online ), doi: 10.1109/access.2021.3096799 .

Asmussen , C.B. and Møller , C. ( 2019 ), “ Smart literature review: a practical topic modeling approach to exploratory literature review ”, Journal of Big Data , Vol. 6 No. 1 , pp. 1 - 18 , ( online ), doi: 10.1186/s40537-019-0255-7 .

Association of Certified Fraud Examiners ( 2017 ), Fraud Examiner's Manual , Association of Certified Fraud Examiners , Austin, TX .

Chen , X. , Xie , H. , Cheng , G. and Li , Z. ( 2021 ), “ A decade of sentic computing: topic modeling and bibliometric analysis ”, Cognitive Computation , Vol. 14 No. 1 , pp. 24 - 47 , ( online ), doi: 10.1007/s12559-021-09861-6 .

Donthu , N. , Kumar , S. , Mukherjee , D. , Pandey , N. and Lim , W.M. ( 2021 ), “ How to conduct a bibliometric analysis: an overview and guidelines ”, Journal of Business Research , Vol. 133 , pp. 285 - 296 , ( online ), doi: 10.1016/j.jbusres.2021.04.070 .

Gupta , S. and Mehta , S.K. ( 2020 ), “ Feature selection for dimension reduction of financial data for detection of financial statement frauds context to Indian companies ”, Global Business Review , ( online ), doi: 10.1177/0972150920928663 .

Kollewe , J. ( 2014 ), “ Warren buffett: ‘tesco was a huge mistake’ ”, The Guardian , Retrieved from www.theguardian.com/business/2014/oct/02/warren-buffet-tesco-huge-mistake

Lim , F.X. ( 2021 ), “ Emerging technologies to detect fraud in audit testing: a perception of Malaysian big four auditors ”, SSRN Electronic Journal , ( online ), doi: 10.2139/ssrn.3877347 .

Mustak , M. , Salminen , J. , Plé , L. and Wirtz , J. ( 2020 ), “ Artificial intelligence in marketing: topic modeling, scientometric analysis, and research agenda ”, Journal of Business Research , Vol. 124 , pp. 389 - 404 , ( online ), doi: 10.1016/j.jbusres.2020.10.044 .

Neuman , W.L. ( 2013 ), Workbook for Social Research Methods: qualitative and Quantitative Approaches , 7th ed. , Allyn And Bacon, Pearson Higher Education , Boston .

Nicholls , J. , Kuppa , A. and Le-Khac , N.A. ( 2021 ), “ Financial cybercrime: a comprehensive survey of deep learning approaches to tackle the evolving financial crime landscape ”, IEEE Access , Vol. 9 , pp. 163965 - 163986 , ( online ), doi: 10.1109/access.2021.3134076 .

Pazarskis , M. , Koutoupis , A.G. , Kyriakou , M.I. and Galanis , S. ( 2021 ), “ Corporate governance and internal audit at Greek municipal enterprises in the COVID-19 era ”, in Proceedings of the Corporate Governance: An Interdisciplinary Outlook in the Wake of Pandemic Conference, 19-20 November 2020 , Virtus interpress,Sumy , Ukraine , ( online ), pp. 142 - 146 , doi: 10.22495/cgsetpt21 .

Pedro , J. ( 2022 ), “ [review of understanding topic coherence measures] from towards data science ”, ( online ), available at: https://towardsdatascience.com/understanding-topic-coherence-measures-4aa41339634c ( accessed 19 August 2022 ).

Qawqzeh , H.K. , Endut , W.A. and Rashid , N. ( 2021 ), “ Board components and quality of financial reporting: mediating effect of audit quality ”, Journal of Contemporary Issues in Business and Government , Vol. 27 No. 2 , p. 179 , ( online ), doi: 10.47750/cibg.2021.27.02.023 .

Rezaee , Z. ( 2005 ), “ Causes, consequences, and deterence of financial statement fraud ”, Critical Perspectives on Accounting , Vol. 16 No. 3 , pp. 277 - 298 , doi: 10.1016/s1045-2354(03)00072-8 .

Saba Ebrahim, Poshtan , J. , Jamali , S.M. and Ebrahim , N.A. ( 2020 ), “ Quantitative and qualitative analysis of time-series classification using deep learning ”, IEEE Access , Vol. 8 , pp. 90202 - 90215 .

Sharma , A. , Rana , N.P. and Nunkoo , R. ( 2021 ), “ Fifty years of information management research: a conceptual structure analysis using structural topic modeling ”, International Journal of Information Management , Vol. 58 , p. 102316 , ( online ), doi: 10.1016/j.ijinfomgt.2021.102316 .

Skousen , C.J. , Smith , K.R. and Wright , C.J. ( 2009 ), “ Detecting and predicting financial statement fraud: the effectiveness of the fraud triangle and SAS no. 99 ”, in Corporate Governance and Firm Performance , Emerald Group Publishing Limited , Bingley, USA , Vol. 13 , pp. 53 - 81 .

Soomro , Z.A. , Shah , M.H. and Thatcher , J. ( 2021 ), “ A framework for ID fraud prevention policies in the E-tailing sector ”, Computers and Security , Vol. 109 , p. 102403 , ( online ), doi: 10.1016/j.cose.2021.102403 .

Tamimi , O. ( 2021 ), “ The role of internal audit in risk management from the perspective of risk managers in the banking sector ”, Australasian Business, Accounting and Finance Journal , Vol. 15 No. 2 , pp. 114 - 129 , ( online ), doi: 10.14453/aabfj.v15i2.8 .

The Economist ( 2014 ), “ The dozy watchdogs ”, Retrieved from www.economist.com/briefing/2014/12/11/the-dozy-watchdogs

Xu , Z. , Wang , X. , Wang , X. and Skare , M. ( 2021 ), “ A comprehensive bibliometric analysis of entrepreneurship and crisis literature published from 1984 to 2020 ”, Journal of Business Research , Vol. 135 , pp. 304 - 318 , ( online ), doi: 10.1016/j.jbusres.2021.06.051 .

Yadav , K. ( 2022 ), “ The complete practical guide to topic modelling ”, (online) Medium. (online) , available at: https://towardsdatascience.com/topic-modelling-f51e5ebfb40a

Further reading

Akoglu , L. , Tong , H. and Koutra , D. ( 2015 ), “ Graph-based anomaly detection and description: a survey ”, Data Mining and Knowledge Discovery , Vol. 29 No. 3 , pp. 626 - 688 , ( online ), doi: 10.1007/s10618-014-0365-y .

Bao , Y. , Ke , B. , Li , B. , Yu , Y.J. and Zhang , J. ( 2020 ), “ Detecting accounting fraud in publicly traded US firms using a machine learning approach ”, Journal of Accounting Research , Vol. 58 No. 1 , pp. 199 - 235 , ( online ), doi: 10.1111/1475-679X.12292 .

Chowdhury , M. , Rahman , A. and Islam , R. ( 2017 ), “ Malware analysis and detection using data mining and machine learning classification ”, International conference on applications and techniques in cyber security and intelligence , ( online ), pp. 266 - 274 doi: 10.1007/978-3-319-67071-3_33 .

Dorminey , J. , Fleming , A.S. , Kranacher , M.J. and Riley , R.A. Jr. ( 2012 ), “ The evolution of fraud theory ”, Issues in Accounting Education , Vol. 27 No. 2 , pp. 555 - 579 , ( online ), doi: 10.2308/iace-50131 .

Ebrahim , S.A. , Poshtan , J. , Jamali , S.M. and Ebrahim , N.A. ( 2020 ), “ Quantitative and qualitative analysis of time-series classification using deep learning ”, IEEE Access , Vol. 8 , pp. 90202 - 90215 , ( online ), doi: 10.1109/access.2020.2993538 .

Eilifsen , A. and Messier , W.F. Jr ( 2015 ), “ Materiality guidance of the major public accounting firms ”, Auditing: A Journal of Practice and Theory , Vol. 34 No. 2 , pp. 3 - 26 , ( online ), doi: 10.2308/ajpt-50882 .

Gezer , A. , Warner , G. , Wilson , C. and Shrestha , P. ( 2019 ), “ A flow-based approach for Trickbot banking Trojan detection ”, Computers and Security , Vol. 84 , pp. 179 - 192 , ( online ), doi: 10.1016/j.cose.2019.03.013 .

Goodall , J.R. , Ragan , E.D. , Steed , C.A. , Reed , J.W. , Richardson , G.D. , Huffer , K.M. , Bridges , R.A. and Laska , J.A. ( 2018 ), “ Situ: identifying and explaining suspicious behavior in networks ”, IEEE Transactions on Visualization and Computer Graphics , Vol. 25 No. 1 , pp. 204 - 214 , ( online ), doi: 10.1109/TVCG.2018.2865029 .

Habeeb , R.A.A. , Nasaruddin , F. , Gani , A. , Hashem , I.A.T. , Ahmed , E. and Imran , M. ( 2019 ), “ Real-time big data processing for anomaly detection: a survey ”, International Journal of Information Management , Vol. 45 , pp. 289 - 307 .

Jeppesen , K.K. ( 2019 ), “ The role of auditing in the fight against corruption ”, The British Accounting Review , Vol. 51 No. 5 , p. 100798 , ( online ), doi: 10.1016/j.bar.2018.06.001 .

Leangarun , T. , Tangamchit , P. and Thajchayapong , S. ( 2018 ), “ Stock price manipulation detection using generative adversarial networks ”, 2018 IEEE Symposium Series on Computational Intelligence (SSCI) , IEEE , ( online ), pp. 2104 - 2111 , doi: 10.1109/SSCI.2018.8628777 .

Li , T. , Kou , G. , Peng , Y. and Philip , S.Y. ( 2021 ), “ An integrated cluster detection, optimization, and interpretation approach for financial data ”, IEEE Transactions on Cybernetics , Vol. 52 No. 12 , pp. 13848 - 13861 , ( online ), doi: 10.1109/TCYB.2021.3109066 .

Madahali , L. and Hall , M. ( 2020 ), “ Application of the Benford’s law to social bots and information operations activities ”, 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) , IEEE , ( online ), pp. 1 - 8 , doi: 10.1109/CyberSA49311.2020.9139709 .

Monamo , P. , Marivate , V. and Twala , B. ( 2016 ), “ Unsupervised learning for robust bitcoin fraud detection ”, 2016 Information Security for South Africa (ISSA) , IEEE , ( online ), pp. 129 - 134 , doi: 10.1109/ISSA.2016.7802939 .

Perols , J. ( 2011 ), “ Financial statement fraud detection: an analysis of statistical and machine learning algorithms ”, AUDITING: A Journal of Practice and Theory , Vol. 30 No. 2 , pp. 19 - 50 , ( online ), doi: 10.2308/ajpt-50009 .

Rosner , R.L. ( 2003 ), “ Earnings manipulation in failing firms ”, Contemporary Accounting Research , Vol. 20 No. 2 , pp. 361 - 408 .

The dozy ( 2014 ), “ Watchdogs ”, The Economist, (online) , available at: www.economist.com/briefing/2014/12/11/the-dozy-watchdogs

Trompeter , G. and Wright , A. ( 2010 ), “ The world has changed—have analytical procedure practices? ”, Contemporary Accounting Research , Vol. 27 No. 2 , pp. 669 - 700 , ( online ), doi: 10.1111/j.1911-3846.2010.01023_8.x .

Uuganbayar , G. , Yautsiukhin , A. , Martinelli , F. and Massacci , F. ( 2021 ), “ Optimization of cyber insurance coverage with the selection of cost-effective security controls ”, Computers and Security , Vol. 101 , p. 102121 , ( online ), doi: 10.1016/j.cose.2020.102121 .

West , J. and Bhattacharya , M. ( 2016 ), “ Intelligent financial fraud detection: a comprehensive review ”, Computers and Security , Vol. 57 , pp. 47 - 66 , ( online ), doi: 10.1016/j.cose.2015.09.005 .

Zhou , C. and Paffenroth , R.C. ( 2017 ), “ Anomaly detection with robust deep autoencoders ”, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , ( online ), doi: 10.1145/3097983.3098052 .

Corresponding author

Related articles, we’re listening — tell us what you think, something didn’t work….

Report bugs here

All feedback is valuable

Please share your general feedback

Join us on our journey

Platform update page.

Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

Questions & More Information

Answers to the most commonly asked questions here

IMAGES

  1. Literature review on financial statements analysis

    financial statement analysis literature review

  2. Financial Statement Analysis

    financial statement analysis literature review

  3. Literature Review Of Financial Analysis Of Hdfc Bank

    financial statement analysis literature review

  4. Effective Financial Statement Analysis in 3 Steps

    financial statement analysis literature review

  5. Literature review on financial statements analysis

    financial statement analysis literature review

  6. Financial Statement Analysis

    financial statement analysis literature review

VIDEO

  1. Financial Statement Analysis and Equity Valuation

  2. Financial Statement Analysis Class 4

  3. Financial Statement Analysis Project Group A

  4. Part 6: Financial Statements Analysis (Financial Ratios or Ratio Analysis)

  5. Financial Statement Analysis

  6. Financial Statement Analysis

COMMENTS

  1. Financial Statement Analysis: A Review and Current Issues

    The literature on financial statement analysis attempts to improve fundamental analysis and to identify market inefficiencies with respect to financial statement information. In this paper, I review the extant research on financial statement analysis. ... Jackson, Andrew B., Financial Statement Analysis: A Review and Current Issues (October 28 ...

  2. CHAPTER#2 Literature review comparing and analyzing financial

    The Literature review of this study will emphasis on the related studies on comparing and analyzing ... (2003), the purpose of financial statement analysis is to provide information

  3. 50589 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on FINANCIAL STATEMENT ANALYSIS. Find methods information, sources, references or conduct a literature ...

  4. Financial statement analysis: a review and current issues

    UNSW Sydney. October 28, 2021. China Finance R eview International, forthcoming. Abstract. The literature on financial statement analysis attempts to improv e fundamental analysis. and to ...

  5. Financial Statement Analysis

    Abstract. This chapter provides fundamental financial analysis based on ratio analysis, a powerful tool to assess the performance of a firm over a period, or to compare risk and return of firms of different sizes. The discussion centres on the income statement, the balance sheet, the statement of shareholders' equity, and the cash flow ...

  6. PDF Financial Statement Analysis: A Review and Current Issues

    The literature on financial statement analysis attempts to improve fundamental analysis and to identify market inefficiencies with respect to financial statement information. In this paper, I review the extant research on financial statement analysis. I then provide some

  7. A Literature Review of Financial Performance Measures and Value

    The study is based on the theory background and relevant researches in the areas of performance measures disclosed in financial statements. The sample of the case studies and sorts of literature are specifically collected from the well-known and respected accounting journals investigating in performance measures areas from 2010 to 2016, which are available on open access.

  8. Financial statement analysis: a review and current issues

    The literature on financial statement analysis attempts to improve fundamental analysis and to identify market inefficiencies with respect to financial statement information.,In this paper, the author reviews the extant research on financial statement analysis.,The author then provides some preliminary evidence using Chinese data and offer ...

  9. Financial Statement Analysis

    3.1 Accounting Ratios as a Primary Tool of a Financial Statement Analysis. A primary approach to evaluating and comparing financial performance of enterprises is a ratio analysis, which deals with a set of metrics that are typically computed on the basis of inputs extracted from primary financial statements (discussed in Chapter 1) and notes to ...

  10. Financial statement analysis: a review and current issues

    Andrew B. Jackson, 2021. " Financial statement analysis: a review and current issues ," China Finance Review International, Emerald Group Publishing Limited, vol. 12 (1), pages 1-19, December. Downloadable (with restrictions)! Purpose - The literature on financial statement analysis attempts to improve fundamental analysis and to identify ...

  11. Financial reporting quality of financial institutions: Literature review

    It is also unknown how such a shift would affect the study of financial statements and how it would alter investors' views of the condition and performance of firms (Rodríguez-Pérez et al., Citation 2011). Literature on financial reporting is complex and diverse, and its quality is heavily impacted by businesses' monitoring techniques.

  12. PDF AP21C: Literature review

    Separating operating from financing activities is value relevant. Research. Findings. Libby et al (2013) Reviews literature and provides a framework for understanding academic research on earnings presentation: users rely on disaggregation, but it is most useful if provided cohesively across all PFS.

  13. Financial statement analysis: a review and

    Introduction. In this paper I review the trends in the literature on financial statement analysis (FSA), and provide insights into the relevance of FSA research in emerging trends. FSA research is generally concerned with two key issues - improving fundamental analysis and identifying market inefficiencies with respect to financial statement ...

  14. Fundamental Analysis Models in Financial Markets

    As pointed out by Penman (1992) the importance of research done by Bauman (1996) is to discover what they offer of information from future earnings from the viewpoint of financial statement analysis. 3. Literature Review Bauman (1996) believes that the real start of the research studies in the stock valuation using the fundamental analysis ...

  15. Literature Review for Accounting/Auditing

    A literature review consists of simply a summary of key sources, and it usually combines both summary and synthesis, often within specific conceptual categories. A summary is a recap of the important information of the source, but a synthesis is a re-organization, or a reshuffling, of that information in a way that tells how you are planning to ...

  16. Book Review: Financial Statement Analysis: A Practitioner's Guide

    Financial Statement Analysis: A Practitioner's Guide is a well-organized, thorough exploration of the challenges facing practitioners who rely on financial statements to make investment and lending decisions. In the preface, Martin Fridson and Fernando Alvarez state that their "intention is to acquaint readers who have already acquired basic accounting skills with the complications that ...

  17. Literature Review Of Financial Statement

    Literature Review Of Financial Statement. Decent Essays. 998 Words. 4 Pages. Open Document. 15. 3 LITERATURE REVIEW3.1 REVIEW OF LITERATURE. Literature Review was done by referring previous studies, articles and books to knowthe areas of study and analyze the gap or study not done so far. There are various studies wereconducted relating to ...

  18. Financial statement analysis: a review and current issues

    This paper aims to consider whether the financial statements of companies facing litigation claims (pending litigation) are more time-consuming to audit due to the complexity and subjectivity of contingent liabilities associated with pending litigation.

  19. Financial statement analysis: a review and current issues

    Financial statement analysis: a review and current issues Buy Article: $50.01 + tax (Refund Policy) ... The literature on financial statement analysis attempts to improve fundamental analysis and to identify market inefficiencies with respect to financial statement information.

  20. Financial statement analysis: Principal component analysis (PCA

    Methodology. In previous studies on relationship analysis for financial statements and financial ratios, two models have mainly been used. The first one is the panel OLS regression model which has been applied by a number of accounting articles on financial performance and in most literature less than ten variables are used (Al-Jafari and Al Samman, 2015; Jakob, 2017; Burja, 2011).

  21. State of the art in financial statement fraud detection: A systematic

    We performed a systematic literature review and bibliometric analysis of automated financial statement fraud detection since its inception. ... Research into financial statement fraud detection is distinct in several ways: (1) the ratio of fraud to non-fraud firms is small, creating a high-class imbalance; (2) there is a high-cost imbalance ...

  22. A systematic literature review of Auditing Practices research landscape

    Author contributions. Amar Johri: Conceptualization and designing, Methodology, Formal analysis and interpretation of data, Writing - original draft, Writing - review & editing. Raj Kumar Singh: Conceptualization and designing, Methodology, Formal analysis and interpretation of data, Writing - original draft, Writing - review & editing. All authors agree to be accountable for all ...

  23. (PDF) Analysis of Financial Statements

    Financial analysis is a study of the company's finan cial statements by analyzing the reports. Report. analysis is a tool that easily calculates and interprets reports that are used by investors ...

  24. Two decades of financial statement fraud detection literature review

    The emergence of machine learning has opened a new way for researchers. It allows them to supplement the traditional manual methods for conducting a literature review and turning it into smart literature. This study aims to present a framework for incorporating machine learning into financial statement fraud (FSF) literature analysis.

  25. Managing Undernutrition in Pediatric Oncology: A Consensus Statement

    "Managing Undernutrition in Pediatric Oncology" is a collaborative consensus statement of the Polish Society for Clinical Nutrition of Children and the Polish Society of Pediatric Oncology and Hematology. The early identification and accurate management of malnutrition in children receiving anticancer treatment are crucial components to integrate into comprehensive medical care. Given the ...