Effective Internal Controls For Recognizing Contracting Revenues
Effective Internal Controls For Recognizing Contracting Revenues
Effective Internal Controls For Recognizing Contracting Revenues
ScholarWorks
Walden Dissertations and Doctoral Studies
Walden Dissertations and Doctoral Studies
Collection
2018
This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been
accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please
contact [email protected].
Walden University
Antonio Ghaleb
Review Committee
Dr. Roger Mayer, Committee Chairperson, Doctor of Business Administration Faculty
Walden University
2018
Abstract
by
Antonio Ghaleb
Walden University
April 2018
Abstract
internal controls over revenue estimates to mitigate the risk of financial statement
Sponsoring Organizations of the Treadway Commission, the purpose of this multiple case
study was to explore strategies that business leaders responsible for financial reporting
use to develop and implement effective internal controls for recognizing contracting
revenues. Nine participants from 3 private contracting companies in Qatar who had
Different themes emerged through the analysis of data that involved coding narrative
assessment and monitoring. Business leaders of contracting companies may benefit from
the findings of this study by gaining awareness of the need to develop and implement
effective internal controls for recognizing contracting revenues. Implications for positive
social change could come from identifying internal controls that increase financial
statement reliability, which could lead to increased access to capital and debt financing
by
Antonio Ghaleb
Walden University
April 2018
Dedication
I dedicate this study to my wife, Carla Tarraf Ghaleb, for the unwavering support
and sacrifice throughout the doctoral journey. I owe her a debt of gratitude for her
continuous support since the day we met. I also dedicate this study to my supportive and
loving parents, Fares Ghaleb and Yvonne El-Khawaja, who believed in me and supported
all of my life’s endeavors. To my amazing sisters, Darine Ghaleb and Nermine Ghaleb,
and to my lovely brother, Halim Ghaleb. To my extended relatives and friends for their
I would like to thank my chair, Dr. Roger Mayer, for his tremendous support,
for all the advice and recommendations he gave me, a sincere thank you from the heart.
Dr. Mayer, from day one you were assigned as my chair, you helped me move forward
with perseverance and determination. May God continue to strengthen you, keep you in
perfect health, you and your family, and bring you a successful life full of prosperity.
Thank you, Dr. Kevin Davies (second committee member), Dr. Richard Snyder (URR),
and Dr. Freda Turner (retired program director) for your motivation, support, and timely
feedback on my study. It was a blessing to have such a strong and inspiring committee. I
would like to thank all Walden University instructors, classmates, and staff who
contributed to the successful completion of this study. Thank you to all the business
leaders and managers (participants) who took time off their busy schedules to participate
Assumptions............................................................................................................ 9
Limitations .............................................................................................................. 9
Delimitations ......................................................................................................... 10
i
Internal Control ..................................................................................................... 46
Transition .....................................................................................................................70
Participants ...................................................................................................................76
Research Design.................................................................................................... 80
Ethical Research...........................................................................................................84
Reliability.............................................................................................................. 95
Validity ................................................................................................................. 96
ii
Overview of the Study .................................................................................................99
Reflections .................................................................................................................123
Conclusion .................................................................................................................125
References ........................................................................................................................127
iii
List of Tables
Manipulation ........................................................................................................110
iv
1
(COSO, 2013). Wang and Yu (2015) found that there was a significant relationship
between internal control quality of engineering projects and the sustainability and
corporate value. Managers understand that an ineffective internal control system can
reducing unexpected events (Hajiha & Bazaz, 2016). Martin, Sanders, and Scalan (2014)
Business leaders who deal with long-term contracting projects face unique
Financial Reporting Standards (IFRS) require reporting revenue based upon the
percentage of completion of a project as of the last day of the reporting year (IFRS,
2015a). When companies issue financial statements outside the United States, they must
follow IFRS general accounting principles (Kumar, 2015). The IFRS accounting
standards require management to assess project budget that is material to the financial
2
statement results. Without appropriate internal controls, these estimates are susceptible to
manipulation by management (Kapić & Bašić, 2013). Flood (2017) stated that if those in
management want to manipulate their revenues, they might use aggressive cost estimates
when accounting for contracts. Griffith, Hammersley, Kadous, and Young (2015) stated
that auditors consider the accounting estimate related to revenue recognition to be a high-
risk estimate.
project budget, developed by management, has a direct effect on the revenue recognition
revenue (IFRS, 2015a). The purpose of this qualitative multiple case study was to explore
strategies that business leaders responsible for financial reporting use to develop and
Problem Statement
internal controls over revenue estimates to mitigate the risk of financial statement
manipulation (Feng, McVay, & Skaife, 2014). Rahman, Sulaiman, Fadel, and Kazemian
(2016) conducted a survey study of 57 firms with financial statement fraud and
general business problem is that without appropriate accounting policies and procedures
profitability. The specific business problem is that some business leaders responsible for
3
financial reporting lack strategies to develop and implement effective internal controls for
Purpose Statement
The purpose of this qualitative multiple case study was to explore strategies that
business leaders responsible for financial reporting use to develop and implement
effective internal controls for recognizing contracting revenues. The population for this
finance controller, an estimation manager, and cost control managers from three private
contracting companies in Qatar who had developed and implemented appropriate internal
controls over revenue recognition. Implications for positive social change could come
from identifying internal controls that increase financial statement reliability, which
could lead to increased access to capital and debt financing and improved employment
opportunities in Qatar.
objective of the study, and current knowledge of the topic (Dasgupta, 2015). The goal of
provide them with meaning (Yin, 2014). Quantitative researchers analyze numerical data
relationships and differences among variables (Venkatesh, Brown, & Bala, 2013). The
goal of this study was to explore a phenomenon, not to test a hypothesis using numeric
data; thus, I rejected quantitative and mixed methods and adopted a qualitative method.
4
Onwuegbuzie and Byers (2014) identified numerous qualitative designs, of which
gain the meaning of the lived experiences of study participants about a concept or
when the objective of a study is to explore participants’ lived experiences. The purpose of
this study was not to explore the culture or lived experiences of participants. Thus, I
rejected both ethnography and phenomenology for the research design. A researcher
using a case study design explores what as well as how or why questions concerning a
process or phenomenon that works within a bounded system (Yin, 2014). The purpose of
the case study design was to explore a bounded system or a case over time through
bounded system involving a group of people (Dasgupta, 2015). My goal was to explore a
Research Question
business leaders responsible for financial reporting use to develop and implement
Question 1 is the initial problem question, Questions 2-7 represent concept questions, and
2. What strategies have you used to ensure that the internal controls are
3. What are the key strategies managers use to develop and implement
4. How do you assess the effectiveness of the strategies for using your budget as
5. How did you address the barriers to implementing the strategies for using
controls?
6. How does the accounting team validate the reliability and accuracy of revenue
7. How does management adapt the internal control system for recognizing
contracting revenues?
8. What else would you like to share about your experiences on the effectiveness
framework in 1992 outlining professional practices for the development of efficient and
effective internal controls (Moeller, 2014). Since 1992, using the COSO model has
helped companies design, operate, and evaluate the effectiveness of internal controls
(Rose, Sarjoo, & Bennett, 2015). Altheebeh and Sulaiman (2016) defined the five basic
competency.
the organization.
Internal control includes not only preventing accounting errors, but also
improving business processes (Lakis & Giriunas, 2012). The COSO framework applied
7
to my study because it provided means for exploring strategies and processes that
revenue recognition to ensure that internal accounting controls are operating effectively.
Operational Definitions
2015a).
financial position based upon a management estimate (Elshafie & Nyadroh, 2014).
operations, (b) reliability of financial reporting, and (c) compliance with applicable laws
(Kumar, 2015).
they could, individually or collectively, affect the economic decisions that users take by
Project budget: Project budget includes all costs that are associated and
that a company's financial statements are fairly stated and presented (Public Company
flaws. However, being able to identify such problems and describe them is significant to
any researcher because this process enables researchers to differentiate themselves from
Assumptions consist of information that a researcher considers accurate but that may be
unproven (Kirkwood & Price, 2013). A limitation is a threat to the validity and reliability
of a study that causes a researcher to provide findings that do not address the research
question or findings that are inconsistent with the objectives of the study (Connelly,
2013). Delimitations define the scope of a study, expressing what the researcher will not
Assumptions are research elements that are considered accurate and valid without
concrete proof (Denzin & Lincoln, 2011). Chief financial officers (CFOs) recognize
accounting estimates based upon assumptions of management (Kapić & Bašić, 2013).
Accounting estimates in project budgets expose most contracting companies to the risk of
uncertainty. Thus, there is uncertainty about the accuracy of the figures set in a project
budget, which management uses in making a decision to accept and reject the project.
Further assumptions in this study included the belief that the participants answered
truthfully and that a qualitative case study was an appropriate strategy to research this
for misestimation of project budgets is that development managers receive huge bonuses
for planning projects based on projected profits, whereas managers who must operate the
established techniques and procedures to collect the data to ascertain the validity and
absolute guarantee that the data collected from the participants would be free from any
Limitations
Limitations are likely weaknesses in a study that are mostly outside the
researcher's control, such as funding limitations, choice of research design, and other
10
factors (Marshall & Rossman, 2016). In this study, there were potential limitations that
IAS 11 starting in January 2018. Participants emphasized that the new IFRS
3. The results were based upon a specific time and therefore may not reflect
future activities.
Ellis and Levy (2009) pointed out that limitations usually flow from the research
method employed in a study. Factors outside the researcher's control may negatively
influence the results of a study. To confirm the results of my study, I recommend that
Delimitations
Delimitations are the definitions that a researcher sets as the boundaries of a study
(Marshall & Rossman, 2016). One delimitation of my study was the limited number of
companies, in that the study involved three private contracting companies in Qatar. The
target companies in this study were neither required to disclose detailed information
regarding internal control nor obliged by authorities to disclose such information. The
Business leaders could use the results of this study to identify and implement
appropriate internal controls over contracting revenue, thus increasing the reliability of
financial statements. Investors rely on financial statements when making debt and equity
investment decisions. Furthermore, society can benefit from this study’s findings because
opportunities.
Business leaders could benefit from the results of this study. The development
significant element of the income statement that measures the financial performance of
vulnerable to high levels of risk, which can lead to misstating the financial statement and
misleading both internal and external users. Therefore, exploring strategies for
revenues could increase the value of financial statements to accounting managers, CFOs,
Society could benefit from the results of this study because private contracting
Haupt, 2015). Kasztelnik (2015) noted that there is a significant increase in the value
12
relevance of revenue recognition after the adoption of IFRS along with an increase in the
value relevance of accruals. Thus, the results of this study can contribute positively to
can lead to increased access to capital and debt financing, which may increase business
The purpose of the literature review was to explore strategies that business leaders
responsible for financial reporting use to develop and implement effective internal
framework was the primary conceptual framework. I also considered the enterprise risk
I organized the literature review into several topic headings, including (a) the
COSO framework, (b) ERM, (c) project budget revenue recognition, (d) financial
statements material weaknesses, (e), internal control, (f) accounting information, (g)
IFRS, and (h) contracting field. The literature review included scholarly journal articles
and dissertations found in the Walden University library and Google. The search terms
13
included internal control, revenue recognition, corporate governance, COSO, ERM,
contracting and construction, and financial statements. The study included 209 sources,
and 94% were peer-reviewed journal articles published in 2013 or later. The literature
governance through an effective internal control system (Altheebeh & Sulaiman, 2016).
process effected by the company’s management and other employees that is designed to
the following categories: (a) effectiveness and efficiency of the company’s operations, (b)
reliability of financial statements and other financial reporting in the company, and (c)
compliance with applicable laws and regulations. The COSO framework represents the
efforts of five major professional associations in the accounting profession: (a) American
Institute of Internal Auditors, (d) American Accounting Association, and (e) Financial
Executives International (FEI; COSO, 2013). According to COSO (2013), the control
environment sets the tone for an organization because COSO covers integrity, ethical
environment. Altheebeh and Sulaiman (2016) pointed out the five basic COSO
components, which are the control environment, risk assessment, control activities,
information and communication, and monitoring. Shapiro (2014) outlined the main
risk analysis, and change management; (c) control activities, which include risk
mitigation; (d) information and communication, and (e) monitoring activities, which
The risk assessment component is the identification and analysis of risks in the
company to achieve the objective of having an effective internal control system (COSO,
2013). Rose et al. (2015) highlighted that companies that have an effective and mature
fraud risk assessment could implement it to strengthen their fraud prevention processes
and procedures. Further, Rose et al. indicated that Principle 8 of COSO 2013 addressed
the need to consider the impact of fraud when developing internal controls. Principle 8 of
the COSO framework is similar to the fraud risk requirements embedded in the U.S.
detect and prevent fraud at the transaction level (Rose et al., 2015).
The control activities are the policies and procedures that help to ensure that
management directives are operating effectively and that enable CFOs to ensure the
contracting companies (Lin, Wang, Chiou, & Huang, 2014). Lin et al. (2014) pointed out
15
that CFOs and CEOs have to state in their companies’ financial statements the
effectiveness of internal control for the purpose of enhancing the U.S. capital market, and
formal and informal communication that generates accurate information that flows
responsibilities in the company (COSO, 2013). Agyei-Mensah (2016) found that many
Ghanaian companies did not disclose sufficient internal control information in their
annual financial reports. Independent directors help to improve the quality of internal
revenue recognition.
ensure that the internal controls are operating effectively (Jackson, 2006). Control
monitoring are significant factors that enable business leaders to develop strategies to
ensure the effectiveness of internal control in contracting revenue recognition. For the
process and objective of internal control to be perceived as viable and effective, all of the
financial statements generated by management must be genuine, and accurate (Chung &
McCracken, 2014). McCarthy and McCarthy (2014) found that applying rules-based
16
accounting standards provides less accurate revenue decisions. Shifting from rules-based
judgment regarding the decisions of the financial statements’ preparers in the areas of the
McCarthy and McCarthy also found that the mean recommended revenue amounts were
External auditors play a significant role in developing audit programs that meet
the objective of the Sarbanes-Oxley (SOX) Act regarding the effectiveness of internal
control. Martin et al. (2014) conducted a survey of members of the Institute of the
Internal Auditors (IIA) to report the extent of internal auditors’ use of a structured audit
program in compliance with SOX, as well as the extent of external auditors’ involvement
in the development of audit programs. Martin et al. outlined the importance of the COSO
and financial reporting. Further, Martin et al. pointed out that the revised COSO
framework in 2013 brought fraud risk assessment explicitly to the 17 stated principles.
Martin et al. also described the link that unstructured and structured audit work programs
have with SOX compliance and the effectiveness of internal control. Martin et al. found
that internal audit departments apply for structured audit programs, and external auditors
are regularly involved in developing these programs. However, Martin et al. observed
that a structured audit program is inflexible and insufficient to detect fraud. Martin et al.
employed a quantitative survey to collect data from IIA members who worked in internal
17
audit departments. This survey study is relevant to internal and external auditors as they
evaluate the advantages and disadvantages of structured and unstructured audit programs.
Martin et al. (2014) determined that an audit requires structure and an overall
framework. Further, Martin et al. outlined the extent of reliance on internal auditors to
ensure the effectiveness of internal control over financial reporting when performing their
reporting. Martin et al. further explained the objective of external auditors’ involvement,
and to what extent they can rely on internal auditors. Rose et al. (2015) discussed how to
adopt the updated COSO 2013 internal control integrated framework to prevent or
mitigate the risk of fraud through a fraud risk assessment. Rose et al. highlighted that
companies that have an effective and mature fraud risk assessment can implement the
framework to strengthen their fraud prevention processes and procedures. Rose et al.
indicated that the discussion of fraud in COSO 2013 centers on Principle 8 in which
management must consider the potential for fraud in assessing risks for the purpose of
meeting their objectives. Rose et al. stated that COSO requires a strong and stringent
internal control foundation that addresses fraud broadly to encompass the firm’s
objectives as part of its strategy, operations, reporting, and compliance with applicable
financial reporting, (b) fraudulent nonfinancial reporting, (c) illegal acts, and (d)
misappropriation of assets. Rose et al. (2015) articulated that some companies have
written policies and procedures to manage individual fraud components, but many of
18
them do not concisely summarize these documents and activities to be able to
communicate and assess the completeness of their fraud management processes. Rose et
al. stated that the internal auditor could help management address the areas of fraud and
ensure that risk assessment is effective and adequate. Moreover, Rose et al. pointed out
that the risk assessment process starts with a brainstorming session with management and
employees to unveil potential fraud risks without consideration for mitigating controls.
Management should assess each risk area, including information technology risk, fraud
revenue, and opportunities for executives with override abilities to identify any inherent
risk. Rose et al. highlighted that segregation of duties in small companies is difficult for
analysis and regular investigation of unusual activity and identified risk areas. Companies
that have adopted COSO 2013 can continue with that foundation to prepare for fraud
challenges. Companies that have not adopted COSO 2013 should reconsider their
strategy and adopt it to improve the internal control system to identify, detect, and
The COSO integrated framework plays a major role in mitigating illegal financial
questionnaire data collected from 33 managers, Altheebeh and Sulaiman found a positive
variable (money laundering). Altheebeh and Sulaiman found that the most effective
improving the control environment component in the commercial bank because it creates
the mood that enables employees to assume their control responsibilities, including
Revision to the initial COSO integrated framework in 1992 was an effective move
control of companies. Rittenberg (2013) discussed the importance of the revised COSO
integrated framework for 2013 in guiding the implementation process, which helps
implemented adequately. Numerous major companies have failed during the last 20 years
because their risk management and internal control systems were ineffective.
Rittenberg (2013) discussed the factors that influenced the COSO board’s
decision to revise the integrated framework. To name a few, these factors included (a)
changes in technology and connected risks, (b) changes in corporate governance, (c)
increased demand for internal control information, (d) increased focus on risk
Further, Rittenberg highlighted the essential differences between the old and new
revisions. Rittenberg highlighted the revised points in the new version (COSO 2013) as
follows: (a) reporting objectives encompass both financial and nonfinancial reporting
20
according to the revised COSO 2013; (b) principles and points of focus assist
evaluating whether the relevant principles are in fact present and functioning effectively;
competence and hold them accountable for their role in accomplishing internal control
objectives. Fraud risk consideration is not limited to financial statements only; it includes
companies are relying on cloud computing. COSO 2013 places further emphasis on the
need for judgment in evaluating whether a company achieves an effective internal control
system. Further, COSO 2013 reasserts the importance of compliance and operational
objectives and presents opportunities for internal audit to broaden its value proposition.
relationships.
practitioners. Rittenberg stated that the illustrative tools are designed to stimulate thought
21
through different examples by enabling practitioners to think about what they can
accomplish and how they might design the internal control structure to meet the
objectives efficiently.
The internal audit department plays a significant role in a company’s fight against
fraud. Laxman, Randles, and Nair (2014) discussed the importance of having an internal
audit department. Laxman et al. (2014) outlined that companies lose around 5% of their
revenues due to annual fraud. Laxman et al. explored an internal audit project team in
Accordingly, Laxman et al. found that FMPs are an evolving topic that helps internal
audit project teams monitor the firm's risk mitigation environment. Laxman et al.
companies that are operating with multiple business units and globally. The internal audit
project team that conducted a case study in HP drove program development with
controller, chief audit executive, chief ethics officer, and compliance officer.
Accordingly, Laxman et al. outlined that based on the five components of the COSO
integrated framework, the internal audit project team developed the FMP. The internal
audit project team applied a pilot assessment, and according to its results, Laxman et al.
formed a methodology to efficiently address fraud risks by evaluating the functions that
supported high-risk processes across of the company’s businesses. The functions ranked
according to the level of risk and the project team considered factors of the risk
mitigation environment such as past fraud events, exposure to management override, past
22
audit issues, dollars spent, level of third-party interaction, and previous fraud risk and
control assessments.
the internal control system of the companies. Moeller (2014a) discussed the importance
of COSO internal control framework. In this executive summary, Moeller outlined that
internal controls are an integral part of a firm’s governance system. Further, Moeller
highlighted that an effective internal control system helps to create, enhances, and
protects shareholders’ value as well as to counter the threats to take on additional risks
and achieving the company’s objectives. An adequate internal control assists the
supporting Information technology systems are properly managed, and the information
recognized in the financial reports are reliable. Further, an effective internal control is a
process that helps the management and its related departments to mitigate any potential
accounting errors, illegal acts, and irregularities. Internal control systems cannot
eliminate all the accounting errors or irregularities in the company, but they can alert the
Moreover, internal control systems are not merely associated with functions
related to the accounting and finance departments. However, there are policies and
procedures set by the management within the company to increase the business value and
mitigate risk. Moeller (2014b) discussed in the relevant article the basic concepts of the
risk assessments component of the COSO internal control integrated framework. The
because risks affect the company's ability to succeed, compete within its industry, sustain
23
its financial strength and positive reputation, and sustain the overall quality of its
products, services, and people. Moeller (2014b) outlined that there is no practical way to
reduce risk to zero because all business activities involve some amount of risk. Chappell
(2014) explained that the goal of management is to manage risk, not to eliminate risk.
Moeller (2014b) stated that while the risk assessments component of COSO has not
changed significantly since the original framework, guidance on internal controls has
Moeller (2014b) pointed out that management should establish and tailor its risk
management processes following the four principles detailed as follows: (a) the firm
specifies objectives with enough clarity to enable the identification and assessment of
risks correlating to its objectives, (b) the firm identifies risks to the accomplishment of its
objectives across the company and analyzes those risks as a basis for ascertaining how
the risks should be managed and controlled, (c) the company considers the possibilities
for fraud in evaluating risks to the accomplishment of objectives, and (d) the entity
identifies and evaluates changes that could significantly affect the performance of its
internal controls. Further, Moeller (2014b) highlighted that company's risk assessments
should cover (a) operations, (b) compliance activities, and (c) reporting needs.
Concerning COSO risk assessment operations objectives, the main area of concern for
many companies is the need to consider tolerances for risk as discussed by Moeller.
Further, Moeller (2014b) outlined that another risk management term sounds important
but is often difficult to define, risk tolerance can be defined through two basic questions;
(a) how much can the enterprise afford to invest to accomplish its goals, and (b) how
much is the company prepared to lose. Nevertheless, the board of directors’ best
24
addresses those two significant questions, only after the top management has an
understanding and an agreement about the company's risk attitude or risk philosophy.
these operations objectives as a basis for allocating resources required to achieve desired
operational risks, management has to give similar levels of attention to compliance and a
When building an effective internal control processes, following the COSO framework, a
Financial risks are becoming more diverse because of the increased number of
international transactions. Fang (2016) pointed out that the financial risks are becoming
more diverse due to the increased number of global economic integrations between
international companies. The purpose of Fang’s paper was to understand the network
generalized mixed weighted aggregation operator to calculate the risk evaluation value of
various companies. Fang outlined that using interval-valued intuitionistic fuzzy sets can
describe some parameter values in greater detail than other index values. Fang found that
companies should establish an effective internal control system, strengthen the evaluation
and control of risk. Further, Fang highlighted that assessing the risk of the companies in
real time is necessary. To be able to evaluate the companies' risk, Fang built the
evaluation index system, which affects the impact of firms' risk assessment. Fang
25
evaluated the risk of four marketing companies of China. The index data are known and
arranged in the form of interval-valued intuitionistic fuzzy sets. Fang calculated the
weight by using subjective and objective comprehensive weighting method, and then
assessed the risk of each company by using interval-valued intuitionistic fuzzy sets
generalized mixed weighted aggregation operator, which make the companies understand
their and competitor’s risk situation, and make corresponding analysis, so that raise the
corresponding strategy. The results revealed by Fang made sufficient consideration of the
financial risk, credit risk, human resources risk, and market risk. Evaluation index system
is detailed as follows: (a) financial risk, which includes the critical income from
operation, degree of financial leverage, and interest bearing debt ratio; (b) human
resource risk, which comprises two aspects of employees' turnover rate and staff
compensation satisfaction; (c) market risk, which includes the market share, market
competition degree, and product life cycle; and (d) credit risk, which includes the service
enterprise overdue loan repayment rate, and complaint rate. This assessment includes
Rompho (2015) stated that BSC focuses on four perspectives: financial, customer,
internal business processes, and learning and growth. Therefore, Wisutteewong and
between successful BSC and an effective COSO, ERM framework in Thai listed
companies. Wisutteewong and Rompho posited that the objectives of this study were: (a)
of COSO ERM, which are internal environment, objective setting, event identification,
risk assessment, risk response, control activities, communication, and monitoring, and (c)
Wisutteewong and Rompho stated that management should take into consideration the
combined approach of these management tools, which are BSC and COSO ERM to be
able to realize full benefits. In addition, the results revealed that to protect the
shareholders' value, management should adopt a proper integration between BSC and
(COBIT) framework together with the COSO framework enables managers to implement
an effective internal control in IT and other categories of material weaknesses over the
financial reporting. Rubino and Vitolla (2014) in their conceptual paper highlighted the
relationship between COBIT and COSO framework, by illustrating how the COBIT
processes mitigate the material weaknesses in internal control system. The purpose of this
paper was to show the improvements of internal control over financial reporting to
mitigate the material weaknesses when COBIT framework is integrated with COSO
framework. Rubino and Vitolla found that these material weaknesses can be mitigated
and overcome by using the COBIT framework. Rubino and Vitolla found that the
analysis indicated that the implementation of the COBIT framework, or the adoption of
effective and adequate IT controls with COSO framework, provides significant benefits
27
to the entire company. Moreover, the application of COBIT provides further
Rubino and Vitolla addressed a significant subject, which is considerably helpful to both
practitioners and academics and also expands existing accounting literature. It shows how
the IT processes are significant in the company and how their integration with the internal
control of other categories reduce the material weakness and, therefore, affect the
increase the value of the company and enhance the shareholders/partners equity, hence
strengthen the internal control of the companies. Companies that insist on the highest
standards of governance mitigate many risks that arise from daily operations; then these
companies are able by better performance to attract further investors whose investments
in the company may help to further growth and development (Odorovic, 2013). Guo,
Huang, Zhang, and Zhou (2015) found that material weaknesses in internal control were
mitigated when the management establishes more employee-friendly policies than their
counterparts with fewer employee-friendly policies. Further, Guo et al. (2015) outlined
that the appropriate worker-friendly policies considerably mitigate the propensity for
financial restatements, especially for those driven by unintentional errors. This process
implies that treating the employees with good corporate governance, improving their
knowledge and experience through regular training and coaching, keeping their morale
up and motivated, will have a positive effect on the internal control processes, which in
accounting errors. Further, Odorovic (2013) found that the level of implementation of
28
corporate governance was positively correlated with the performance of companies.
Odorovic outlined that the companies should follow the best practice of corporate
governance to attract investors and raise finance at a lower price. Odorovic highlighted
that to determine the results of corporate governance, entities from the Republic of
Srpska use net profit margin and earnings per share to analyze and compare to findings
for entities from Austria. The results showed that entities with a higher implementation of
corporate governance principles have a higher net profit margin and earning per share.
net profit margin and earnings per share (Odorovic, 2013). These results indicate that
companies should adopt good corporate governance to be able to sustain the companies'
(Odorovic, 2013). Good corporate governance ensures the sustainability of the company
through continuous increasing of the profit, which affects the equity of the company and
increases its value to the stakeholders (Odorovic, 2013). The financial ratios enable the
employees, and accordingly monitor its objective and strategy regularly to be able to
sustain its business (Odorovic, 2013). A company sustains and increases profitability,
improves its credibility, reputation, and competitiveness and improves relations with key
addition, Odorovic (2013) highlighted that companies that insist on the highest standards
29
of governance mitigate many risks that arise from daily operations; then these companies
are able by better performance to attract further investors whose investments in the
company and enhance the shareholders/partners equity. Hence, to be able to meet this
objective, every company's management has to know how to implement good corporate
trait (Mandzila & Zeghal, 2016). Corporate governance is an essential element of the
control environment, which is one of the main components of COSO (Odorovic, 2013).
Moreover, good corporate governance can help the companies to prevent entities
scandals, and possible civil and criminal liability of companies, and fraud (Odorovic,
2013). Further, good application of corporate governance enhances the companies' image
and reputation in the market and then attracts further investors, suppliers, customers, and
other stakeholders. Accordingly, Odorovic (2013) stated that the most important aspects
for investors, when they decide to make an investment, is to check the level of
information, shareholders right and equal treatments along with profitability that ensures
Mandzila and Zeghal (2016) conducted an empirical study on 109 French public
companies to examine the level of compliance of the French Société des Bourses
internal control, and risk management. Mandzila and Zeghal revealed that managers use
the legislation did not transpose in extended disclosures regarding internal controls and
risk management practices, except banks because they are subject to a more stringent
regulatory standard.
handle effectively shareholders' issues, improve internal control, and maintain a balance
between the principals and agents in the companies. According to Hassan and Marimuthu
primary reasons why conflict arises is that work agreements between principal and agent
are imperfect because not every single contingency can be accounted for; monitoring is
difficult and costly, and then, the principal may have difficulty enforcing their property
rights (Hassan & Marimuthu, 2015). The topic of corporate governance, which is a
significant part of COSO framework embeds the substance of agency theory. Agency
theory plays a significant role in interpreting the relationship between the principal and
agent, who might not act in stakeholders’ best interests. My objective in the next
framework.
corporate governance. Mustapha (2014) related the monitoring component of the COSO
and Davis (2016) conducted an exploration study to explore how agency theory emerged
from some economic and social developments. According to the Bendickson et al. two
(Bendickson et al., 2016). For example, Hassan and Marimuthu (2015) pointed out that to
minimize agency costs, protect shareholders' interests, and ensure agent-principal interest
Marimuthu (2015) concluded that these mechanisms are usually focused on executive
determine the optimal agreement between principals and agents. Principals delegate work
to agents, expecting that agents will complete these demands in the principals’ best
interest (Hassan & Marimuthu, 2015). Bendickson et al. (2016) highlighted that agency
theory is based on the relationship between one party, the principal, who assigns certain
tasks, responsibilities, and decisions to another party, the agent. In addition, according to
Abdullah, Murad, and Hasan (2015), the focus of agency theory derives from
assumptions that the agent will behave opportunistically, especially if their interests
conflict with the principal and causing an agency problem. Hence, further attention and
monitoring must be directed to resolve this conflict when different interests arise.
However, these differences are difficult to measure and require governing mechanisms to
facilitate congruence and shared risk. One of the primary reasons why conflict arises is
that work agreements are imperfect because not every single contingency can be
accounted for; monitoring is difficult and costly, and then, the principal may have
difficulty enforcing their property rights according to the authors (Abdullah et al., 2015).
32
Enterprise Risk Management
system. Edmonds, Edmonds, Leece, and Vermeer (2015) posited that COSO 2004
develops an integrated framework for ERM, which is built on the board’s role in risk
oversight and provides guidance regarding the responsibilities of board’s risk oversight.
Brustbauer (2016) conducted an empirical study to analyze ERM in small and medium
enterprises (SME). Brustbauer revealed that larger companies are more likely to have a
more developed ERM and that family-owned company have fewer incentives to
implement ERM. Further, Brustbauer revealed that the applied ERM approach affects the
company's strategic orientation; while an active ERM approach results to lead to a more
offensive strategic orientation, a passive ERM approach may appear in a more defensive
strategic orientation. Thus, the analysis revealed that the success key for SMEs is an
awareness of company-related risks; being cognizant of risks is the prerequisite for ERM
activity. Though entrepreneurs are familiar with their businesses; however, they are
unlikely to be able to identify all related risks. Hence, a strong ERM approach may help
them identify, assess and monitor risks, raise their risk knowledge and facilitate them in
Brustbauer (2016) indicated that following an active ERM approach may support
activity in SMEs along three dimensions: risk identification, risk assessment, and risk
monitoring. Further, each of these dimensions included four items, termed ERM
classifying items. Edmonds et al. (2015) conducted an empirical analysis in their study to
33
examine whether changes in the quality of risk management are connected with changes
in earnings volatility. Edmonds et al. posited that corporate risk management attempts to
identify risk exposures and determine a response strategy to either bear or manage the
risk. Zhao, Hwang, and Low (2015) identified critical drivers and hindrances to ERM
firms (CCFs) in Singapore. Zhao et al. (2015) found a total of 13 drivers and 22
hindrances, which are critical to ERM implementation of the CCFs in Singapore. The top
influential driver was the improved decision making, whereas insufficient resources such
as time, money, and people were the most important hindrances (Zhao et al., 2015).
quality risk management systems, then they could achieve lower earnings volatility. In
addition, Edmonds et al. pointed out that findings provide evidence as to how companies
achieve market performance through a framework of quality risk management and offer a
reason why firms should allocate resources toward risk oversight. In addition, Edmonds
et al. outlined that their results suggest that recent public policy initiatives to enhance risk
stakeholders. Also, companies that incur losses might benefit more from improving risk
can lead to lower customer revenues together with tightening the suppliers' credit
requirements and employee turnover. Aziz, Manab, and Othman (2016) conducted a case
study, which aims to provide an insight of the Malaysian experience regarding risk
34
management practices in the companies along with the integration of the sustainability as
part of the ERM. Aziz et al. emphasized on the sustainability risk management (SRM) as
part of corporate strategy and found that SRM is not merely affecting the firm's financial
performance but also maintaining the longer term of survival in the industry. The
of SRM as for good business practices (Aziz et al., 2016). Moreover, large and small-
medium enterprises of the CCFs agreed on the rankings of drivers and hindrances, though
notable differences in the mean scores of seven drivers and four hindrances respectively
(Zhao et al., 2015). Lack of perceived value or benefits was the second most notable
hindrance, after the insufficient resources such as time, money, and people (Zhao et al.,
2015). The results revealed that CCFs, which are operating in Singapore, did not perceive
enough value or benefits of ERM that motivated them to implement ERM (Zhao et al.,
2015). Further, improved internal control of the company over its projects was ranked
fifth, indicating that CCFs based in Singapore executed ERM for better adequate control
of their construction projects (Zhao et al., 2015). Few studies have attempted to disclose
the factors driving and hindering ERM implementation in construction firms, although
the numerous studies prepared according to ERM in various sectors (Zhao et al., 2015).
Hence, this study filled a gap in the existing literature relating to ERM. Further, a
thorough understanding of the drivers for ERM implementation allows the management
to gain sufficient support for the ERM program as well as strengthening the positive
influence from the drivers (Zhao et al., 2015). The identification of the hindrances
enables the management to be definite about the challenges encountered by the ERM
program and take further measures to mitigate their negative influence and overcome
35
them (Zhao et al., 2015). In addition, Aziz et al. found that the adoption of SRM is not
practices, and improved decision making (Aziz et al., 2016). Thus, improving risk-based
decision making is the reason for construction’s companies to adopt SRM (Aziz et al.,
2016).
The integration of SRM into the business plan would help Malaysian companies
sustainability encourages the better lives for people, preserve the world’s environment as
well as ensure the longer term of company’s survival. Moreover, sustainability has been a
paradigm shift in the business operations because the environmental perils lead to the
results suggest that the awareness and understanding of the ERM concept by the
implementation because the employees will be the first people in the company to
experience such risks due to their day-to-day operations. Moreover, Mustapha and Adnan
found that participation from all level of employees together with the commitment from
the top management is critical to ensure its successful implementation. Also, Mustapha
and Adnan found that continuous monitoring and maintenance of a risk management
Contracting companies can use an ERM model to frame decisions regarding the
planning and construction of projects. Mafrolla, Matozza, and D'Amico (2016) examined
more dispersed, revealing that ERM plays a significant role in protecting minority
shareholders. Further, ERM is better developed in public-owned firms but is less well
developed in family-owned companies. Thus, Mafrolla et al. pointed out that the
ownership's type has a significant role in the development of ERM in private companies,
shareholder is a disincentive to the adoption of better ERM practices. Choi, Ye, Zhao,
and Luo (2016) conducted in their paper a literature review and critical analysis of the
work of Wu and Olson, from the viewpoint of the ERM, to gather implications and
suggestions for the customization and optimization of the ERM. Businesses exist to cope
with risk as companies are encountering a great deal of daily environmental changes.
Further, risk creates opportunities as well as threats. The results revealed that by
identifying and managing risks, then management can mitigate the risk impact on an
enterprise because the risk itself is an undesirable outcome and potential loss (Choi et al.,
2016). A risk is strongly related to uncertainty, and hence ERM can be defined as an
activity employed to identify, assess, and evaluate potential outcome, and as a result
suggest the optimal path for risk management (Choi et al., 2016).
Revenue is a significant element of the financial statement, which its users rely on
in order to make an economic decision. Kasztelnik (2015) highlighted that revenue is one
of the most commonly used as a benchmark for determining the performance of revenue
information about the financial position, statement of income and cash flows of an entity
37
that is useful to a wide range of users in making economic decisions (IFRSb, 2015). In
Qatar, the application of IFRS is mandatory according to the Qatari income tax law
(Ministry of Finance, 2015). Thus, the recognition of revenue in both the financial
statements and tax declaration should meet the requirements of the International
Accounting Standards (IAS) 11. Recognizing revenues according to IAS 11, implies the
transactions are subject to an estimation value calculated by the management and may
managers calculate the project budget on the basis of entire costs of this specific project
recognizing the revenue in the contracting sector, the risk of manipulating the accounting
considered high; thus, management must ensure proper internal control strategies over
financial reporting. Rose et al. (2015) pointed out that by using the percentage of
completion method, the result will be more accurate regarding the revenue recognition.
Using the percentage of completion method, financial statements will reflect the yearly
profitability or loss of the company (Tunçez, 2015). Kacmar and Tucker (2014) outlined
Further, the budget of the contracting projects has a direct effect on the revenue
recognition. Moreover, the substantial issue in the accounting practice of the contracting
38
and construction field is to know how to recognize the revenues and allocate expenses
within the scope of a contract (Tunçez, 2015). When the ends, and uncertainties are
solved, then management reviews estimated compared to actuals revenues and adjusted
the records accordingly (Tunçez, 2015). Thus, revenue recognition in the contracting
sector is vulnerable to an intentional and unintentional error at the highest level in the
financial statements since the finance department recognizes revenue according to IAS 11
(IFRSa, 2015).
significant to be able to detect any material weakness that might affect the financial
statements adversely. Kasztelnik (2015) pointed out that there is a significant increase in
the value relevance of revenue recognition after the adoption of IFRS along with an
increase in the value relevance of accounting accruals. Jarkas and Haupt (2015) outlined
that errors and omissions in design drawings might lead to further cost in the budget for
the project. Further, contractors underestimate of contracting cost, and poor performance
of subcontractors might cause considerable penalties, which affect the project budget
enhancing the internal control over financial reporting. Knott (2012) discussed in the
relevant paper the implementation of SOX regarding enhancing internal controls over the
financial reports. Further, Knott outlined the effect of revenue recognition on the
profitability of the public held companies. In his research design, Knott raised the issue of
the accuracy of financial statements before and after the implementation of the SOX Act
and the changes this act has made to the recognition of revenue and its effect on the
39
financial position and statement of income. In his quantitative experimental study, Knott
examined the financial ratios analysis and other cash-flow measures to determine the
reliability of revenue recognition and investment expectations before and after the
implementation of SOX Act. Results showed that cash/total assets and net credit
sales/average accounts receivable improved after the implementation of the SOX Act
(Knott, 2012). McCarthy and McCarthy (2014) conducted in their study an experiment
without a personal incentive to maximize revenue for each standard. McCarthy and
McCarthy found that applying rules-based accounting standard provides less accurate
accounting standards requires more professional judgment regarding the decision of the
financial statements’ preparers in the areas of the estimate, uncertainty, and inherent
subjectivity. Further, McCarthy and McCarthy found that where the personal incentive
was not present, the mean recommended revenue amounts were higher in both the rules-
The new IFRS 15, which replaces IAS 11 and IAS 18 simplifies the mechanism
accountants have to apply while preparing the financial statements. Berchowitz and
Whitehead (2014) discussed in their articles the implication of the introduction of IFRS
15, the new awaited global standard on the revenue recognition. Whitehead outlined that
the new IFRS will affect the majority of the companies that generate revenues and
are less affected by the new reporting revenue standard as compared to bundled goods
addition, businesses with long production cycle are most affected by the new standard
(Huefner, 2015).
IFRS 15 was scheduled to be effective by the 1st of January 2018 and it will
replace the following standards and interpretations; IAS 18 Revenue, IAS 11 Construction
adopting IFRS 15, for all contracts with clients, management should recognize revenue
when control of the promised goods or services is transferred to the contractor, not when
risks and rewards are transferred to the contractor. Berchowitz and Whitehead outlined
that upon adoption of IFRS 15 the measurement of the total contract consideration and
how it is broken into multiple elements deliverable under a single contract will also
change for many companies. Further, by adopting IFRS 15, management should increase
the volume of disclosure comparing with previous relevant standards. Also, the company
has to determine that a contract is within the scope of IFRS 15, and then the relevant
standard sets out five processes to be able to recognize the revenue: (a) identify the
contract with the client, (b) identify the performance obligations or deliverables promised
in the agreement, (c) determine the contract consideration or agreement’s value, (d)
allocate consideration to the performance obligations, and (e) recognize revenue when the
41
control occurs (Huefner, 2015). For services, control is transferred over time hence
revenue is recognized over time as well. Thus, companies have to implement the input
progress to recognize the revenue. Huefner (2015) pointed out that many of the fraud and
enforcement cases are associated with timing issue of revenue recognition typically
According to Mardini and Power (2015), IAS 18 is still existing and in their
recent study discussed the application of IAS 18 by the Jordanian industrial companies.
Mardini and Power posited that the objectives of their study are: (a) to examine the extent
of application of IAS 18, which is related to the revenue recognition in selected Jordanian
industrial firms listed on the Amman Stock Exchange (ASE), and (b) to examine the
profitability, leverage, liquidity, listed status and ownership of the application of IAS 18
among Jordanian industrial companies. Mardini and Power found that, on average, the
firms published information on almost 56% of the 15 items included in the index; only 13
firms achieved high disclosure scores. Mardini and Power stated that to be able to
achieve the objectives of this study an index comprising of 15 items were used to study
Mardini and Power, are detailed as follows: (a) sales of goods, which is defined here as
the amount of revenue can be measured reliably, (b) the cost of goods sold, (c) matching
revenues and expenses, (d) sales of goods, which is defined here as goods produced by
the company for the purpose of sale and goods purchased for resales, (e) sale of goods,
which is defined here as it is recognized only when it is probable that the economic
42
benefits connected with the transaction will flow to the company, (f) interests, (g)
dividends, (h) accounting policies, (i) disclosure of sales of goods, (j) Disclosure of
contingent assets and liabilities according to IAS 37, (n) disclosure of the amount of
category of revenue, and (o) measurement of revenues. The results revealed by Mardini
and Power indicated that there is significant scope for adding further disclosures under
IAS 18 by Jordanian industrial companies listed on the ASE. Further, the results also
suggest that firm size is significantly and positively associated with the application of
IAS 18. The analysis also substantiates that liquidity as well as leverage are significantly
and negatively connected with the application of IAS 18, whereas profitability is not
Financial statements are significant to any user who wants to make an economic
decision. Therefore, management should ensure that the presentation of the company’s
financial statements does not include any material weakness that misleads their internal
or external users and to avoid any financial statements’ restatement. Chung and
McCracken (2014) discussed in their paper the restatement process, its interaction among
the auditors, CFOs, CEOs, audit committee and regulators and its impact on the
accounting errors, and lack of management integrity as the primary reasons for the
(GAAP) to the International Financial Reporting Standards (IFRS) and vice versa and
integrity (Chung & McCracken, 2014). Moreover, Chung and McCracken found no
research conducted so far to describe the role of the various parties concerned in the
restatement process. Jahmani et al. found that a high percentage of companies that have
weakness in internal control have restated their financial statements. Chung and
McCracken (2014) found in their research that restatements indicate ineffective audit
effort or underestimated audit risk during the planning process in the years leading up to
the restatement. Materiality implies any misstatement that has an adverse effect on the
financial statements and its result may mislead the users of the financial statements to
Additionally, prior studies rely inevitably on the number of meetings and duration
of the audit committees and how active those committees were involved in the internal
control problems that lead to a restatement. Chung and McCracken (2014) suggested an
approach that strives to look further to the role of involvement of each party in the
restatement process, the effect of the restatement process on the final resolution along
with the future relationship between these parties. However, Chung and McCracken
developed their questions based on the findings of prior studies in the restatement; these
studies indicate the restatement outcome, but Chung and McCracken did not discuss the
weaknesses are detected by them and not rectified by the management. Brant, Steven, and
Christopher (2014) outlined that both US and international standards have proposed
changes to the auditors’ report and discussed the reports’ impact on any potential
investor. Brant et al. (2014) discussed in their paper the new adjustment proposed to the
standard audit report, which includes a requirement to insert a critical audit matter
(CAM) paragraph. Moreover, Brant et al. discussed the reaction of the users and
especially the non-professional investors when they read the auditor’s report with CAM
paragraph and its influence on the decision the investors will take to invest in the
intended investee. Brant et al. found that the investors are more sensitive to change their
decision when they receive a report that includes a critical audit matter other than the
investors who receive a standard audit report with no qualification. Donelson, Ege, and
McInnis (2015) found that the issuance of an adverse opinion by the auditor on the
internal control material weakness indicates a high possibility that managers are
committing unrevealed fraud. Hence, Donelson et al. revealed that the type of internal
control weakness is significant from prediction fraud standpoint. Brant et al. (2014) made
no mention of the positive issues in regards to the CAM and focused mainly on the
negative points of incorporating CAM in the audit report. Most of the investors are non-
professional; thus they may find difficulties to readily understand the auditor's opinion in
the audit report. Brant et al. should focus on the objective of the audit report, and
afterward, they could mitigate the subjectivity raised for integrating the CAM. The main
objective of the audit report is to provide an objective assessment of the fair presentation
of financial statements. Also, Hajiha and Bazaz (2016) used the external auditors’ reports
45
to extract the internal control material weaknesses and afterward categorized them into
Celenk (2013) conducted a survey study to evaluate the negative effect the
customers have on the members of auditors or professional while displaying their ethical
behaviors during the performance of the audit and preparing the tax return. Celenk
highlighted that recognizing the transactions in the books and issuing reliable and
accurate financial statements are significant not only to the taxpayers but also to other
users of the financial statements. This survey study is important since it reflects the
perspective of the professionals regarding ethical practices while they perform their audit
and preparing the tax return of the customers. Celenk found a contradiction in the
responses of the professionals between adhering to the code of ethics and objectivity
while performing their audit, and the wish of the customers to receive a financial
statement and tax return that meet their requirements. While Celenk pointed out the link
between the code of ethics and objectivity and work of the professionals, he did not
discuss the importance of the code of conduct and objectivity. While professionals may
encounter an ethical event with their customers, they should know how to overcome the
dilemma and perform their job ethically. Celenk outlined the importance of International
Reporting Standards (IFRS) or national standards and connect them to the practice of the
professionals.
Neghabi, and Abdi (2015) in their survey conducted an empirical investigation to study
46
the impact of accrual accounting in the municipality of Amol, Iran. Maghariee et al.
examined whether or not the financial reporting prepared based on accrual accounting
compared with the cash accounting provide a better accounting method of for promoting
performance of accrual accounting versus cash basis concept. Maghariee et al. found that
applying accrual accounting could improve the accounting system in the municipality.
Maghariee et al. did not mention the effectiveness of applying the accrual basis in the
municipality accounting. The accrual accounting reflects the real financial position of the
public entities, and for most countries, the cash basis concept is no longer an option.
Maghariee et al. could mention the agility of the accounting researchers to improve the
current accounting system and replace it by the accrual accounting because it will
positively impact the accounting treatment of the public entities and also increase the
Internal Control
Effective internal control systems enable companies to ensure that their operations
are operating effectively and be able to get accurate and reliable financial outputs. Li
(2015) conducted a research study to investigate the relationship between the managerial
ability and internal control quality. Disclosing the internal control in the listed companies
in the United States is mandatory after the year 2012 (Li, 2015). Further, Li (2015) found
that a significant relationship exists between the managerial ability and internal control
quality. Li found that the efficiency of top executives’ positively relates with the internal
control quality. In other samples of the regression analysis, Li found that a significant
relationship does not exist between a managerial ability and internal control quality.
47
Gooden-Sanderson (2014) found that managerial ability is positively associated with the
internal control quality, which confirms with Li findings. Gooden-Sanderson found that a
significant relationship does not exist between a managerial ability and internal control
The characteristics and behaviors of business leaders are a part of the control
environment. Lin et al. (2014) conducted an empirical study to investigate the influence
of CEOs characteristics on the internal control quality in the US. Lin et al. described the
characteristics of the CEOs regarding their age and tenure to be able to investigate their
effect on the disclosure of internal control’s material weakness. Lin et al. revealed that
the age and entrenchment of the CEOs are significantly associated with the disclosure of
internal control’s material weakness under Sarbanes-Oxley Section 404 (SOX 404). Lin
et al. also found that the younger the CEOs and the higher they own shares in the
power to design an ineffective internal control mechanism, selecting auditing firms that
are not from the big 4 companies, and then will affect the strength of internal control
mechanism and reduce the disclosure of internal control material weakness (Lin et al.,
2014). Kehinde (2015) stressed that management should ensure that code of ethic and
governance to mitigate the incidence of exogenous errors, fraud, and irregularities. Lin et
al. (2014) did not discuss the role of internal auditors in monitoring the effectiveness of
internal control and whether the entrenched managers or leaders in these companies had a
significant influence on the internal auditors' objectivity. While entrenchment and age
48
drive the CEOs' behavior regarding the quality of internal control, the internal auditors
play a significant role to fill this weakness in the internal control process.
An internal auditor plays a vital role in the companies to ensure that the internal
control system is effective and report weaknesses to the top management. Roussy (2013)
discussed in the relevant paper the governance roles of internal auditors and their roles in
protecting the management and the company. Internal auditing plays a significant role in
protecting the company, and the management helps and guides the employees to apply
the internal policies and procedures effectively. Roussy revealed that internal auditing is
not a governance watchdog as defined by the regulatory bodies because there are several
studies that prove the act of internal auditor. The internal auditors operate as a member of
the management team and not as a member of the oversight board to monitor and
oversight employees. Further, Jahmani, Ansari, and Dowling (2014) highlighted that an
reliable financial reports, promoting efficient operation that affects the revenue, and
complying with the rules and regulations. In addition, Jahmani et al. outlined that the
findings are significant to the financial statements’ users such as regulators, and auditors
because an effective internal control gives confidence to the financial statement’s users
and close any loophole that affects its reliability. Jahmani et al. found that when the
significant. Jahmani et al. found that debt to equity ratio and fast revenue growth are not
Kehinde (2015) revealed that the scope of work of the internal auditors includes the
49
detection and prevention of errors and irregularities, and report the same to the top
management. Further, Kehinde found that there is a positive relationship between the
daily job of the internal auditor and the effective working of the company.
control system in the company in which this set up will assist the internal auditor to
protect the company’s assets against any error or irregularities. Kehinde tested the
hypotheses with the 0.05% confidence, and accordingly Kehinde found that the entire
null hypotheses have been rejected, whereas the alternate hypotheses regarding: (a) the
responsibility of the internal auditor to detect and prevent error and irregularities, (b) the
effectiveness of internal control system in the company regarding the protection of assets
and management organization, (c) the relationship between the internal auditor functions
and the assets performance of the company, (d) and the establishment of effective and
adequate internal control system, which will assist the internal auditors to detect fraud
and irregularities were all accepted. The result obtained in this study revealed that there is
a strong linkage between the ineffective internal audit and financial statements fraud.
responsibility of the management helps to mitigate any conducive to fraud. Further, the
Jahmani et al. stressed that the management should ensure that code of ethic and
the positive impact adequate internal control over the companies’ operations. Jahmani
and Dowling (2013) employed ANOVA and logistic regression techniques in the study to
examine a sample of large accelerated filers with internal control weaknesses to identify
the characteristics of these companies. Jahmani and Dowling selected the control group
with an effective internal control to match the same sample number from each industry in
the experimental group. Jahmani and Dowling examined the large accelerated filers
merely because the other categories were exempted from reporting on the effectiveness of
their internal control in their annual financial statements. The other categories are small
filers are obliged to report on the effectiveness of their internal control in their financial
statements, however, the authors regarded non-accelerated filers have a few resources
than large accelerated filers, and there is doubt regarding if they will be able to maintain
an effective internal control (Jahmani & Dowling, 2013). Jahmani and Dowling found
that large accelerated filers had a well-developed and established internal control over the
small companies. Kehinde (2015) revealed that the scope of work of the internal auditors
includes the detection and prevention of errors and irregularities, and report the same to
the top management. Further, Kehinde found that there is a good relationship between the
daily job of the internal auditor and the effective working of the company. Hajiha and
Bazaz (2016) argued that association of not reporting internal control weaknesses in the
company is higher than reporting earnings and management compensation with internal
control material weaknesses for the following reason: (a) managers can apply their full
discretion to manipulate the result when the internal control is weak, and (b) in the
51
absence of ineffective internal control, the possibility of not detecting the occurrence of
internal control set by the management. Guo et al. (2015) conducted a quantitative study
to examine the effect of employee treatment policies on the accounting practices of the
companies along with the dimensions of the internal control processes and financial
statements activities. Further, the aim of Guo et al. study was to investigate the role of
employee treatment policies on the effectiveness of internal control about how to mitigate
it along with the financial statements restatements. Accordingly, Guo et al. found that
material weaknesses in internal control were mitigated when the management establish a
more employee-friendly policies vis a vis their counterparts with fewer employee-
friendly policies. Further, Guo et al. found that the appropriate worker-friendly policies
considerably mitigate the propensity for financial restatements, especially for those
driven by unintentional errors. Guo et al. results were consistent with the COSO internal
control integrated framework along with the human capital theory of corporate
governance. Guo et al. suggested that employee-friendly policies are capable of reducing
the failure of the employees in the internal control processes and crucial to the success of
the companies in the accounting practices. This implies that treating the employees with
good corporate governance, improving their knowledge and experience through regular
training and coaching, keep their moral up and motivated, will have a positive effect on
the internal control processes, which in turn mitigate the financial statements restatements
the influence of internal control’s quality change on the listed corporations of the
52
construction sector and its impact on the corporate value. Wang and Yu found that the
internal control of listed companies of the construction industry had been improved
control’s quality change have taken place after the year 2010. In addition, Wang and Yu
found that there was a significant correlation between internal control quality of
Relation of the internal control and five COSO components of internal control
Länsiluoto, Jokipii, and Eklund (2016) examined the effectiveness of the internal control
and its relation to the five COSO components of internal control integrated framework.
assessment and not to the internal control material weaknesses reports since not all the
companies apply the Sarbanes-Oxley Act, and then the study could be considered more
powerful for them (Länsiluoto et al., 2016). Länsiluoto et al. 2016 found that there are
which are the five COSO components and three-dimensional types of internal control
effectiveness. Also, Länsiluoto et al. 2016 found that there was a link between some of
them and higher internal control effectiveness in practice. These findings have significant
implications for those accountable for improving or assessing internal control, such as
management, personnel, and internal and external auditors. Further, Länsiluoto et al.
2016 found that one component of effectiveness might be at a high level of effectiveness
exhibit a low level of effectiveness such as reliability and financial reporting. These
53
results confirm previous studies done by other authors that internal control effectiveness
disclosures do not mislead the users of the financial statements. Wilford (2016) examined
reporting regarding the material weaknesses among foreign and U.S. companies. Both the
material weakness samples and control samples included the US and non-US companies.
Wilford defined the non-US companies as headquarters located outside the US.
Afterward, Wilford examined the relation between internal control reporting regarding
the material weaknesses and the accounting standards employed by companies in the US
and foreign firms in their submitted SEC financial statements. Overall, the results
indicated that foreign firms are more likely to report internal control material weaknesses
than U.S. companies. Further, Wilford found that foreign companies, which submit
and then reconciled to U.S. GAAP were more likely to report internal control material
weaknesses. Moreover, Wilford examined whether the rule of law affected the reporting
of internal control material weaknesses due to specific political factors that could
influence some country. Wilford revealed that foreign companies, which are classified as
the strong rule of law countries are less likely to report internal control material
weaknesses, and foreign companies that are classified as the weak rule of law countries
are more likely to report internal control material weaknesses. Additionally, foreign
enterprises that use IFRS to submit their SEC financial statements are less likely to report
internal control material weaknesses in a strong rule of law countries, and there is no
54
significant relation between IFRS companies and material weakness reporting in the
weak rule of law countries (Wilford, 2016). Lenard, Petruska, Alam, and Yu (2016)
conducted in their study empirical analyses techniques such as univariate and regression
analyses for the purpose of examining whether US companies that file internal control
weakness (ICW) disclosure together with their financial reports with the Securities and
Section 404 SOX, exhibit higher levels of real activities manipulation (RM). Lenard et al.
revealed according to the results of the study that companies with Internal Control
Further, Lenard et al. found that companies with ICWs have lower unusual cash flows
from operations, lower abnormal discretionary expenses, and higher abnormal production
costs, compared to firms that have not ICWs. Lenard et al. found that the level of
discretionary accruals for companies with ICWs is not significantly different from
companies with no-ICWs. As a result, these findings provide support for the controversy
that the reporting of ICWs does not prevent real earnings manipulation activities from
occurring.
Accounting Information
process, including contracting companies where costing departments have to collect and
budget. Silviu (2014) discussed the importance of accounting for the decisional process
in the company. Further, Silviu discussed the importance of accounting information with
regards to its reliability, relevance, comparability, and coherence regarding the financial
55
statements’ users and their investment decision. Silviu pointed out that according to the
performance. Accordingly, Silviu found that accounting represents the core of the
informational system, and the accountants play a significant role in providing information
that is considered the foundation for processing and analysis of information. Also, Silviu
a global level to reducing the differences between the accounting standards applied in
from different authors to collect data. However, Silviu had not approached participants,
other than perceiving the theoretical perspective to be able to confirm and support the
findings and conclusions of these authors. Having said that, the participants who have
accounting information and its role in the decision-making process. Further, the
participants other than the authors could provide information about the effectiveness and
processing, to an analysis of the output reports. Any company cannot run its operation
operational results, financial position, statement of income, detailed financial reports, and
the cash flow of the company. Therefore, interviewing participants who have experience
in the accounting field and handling managerial position would have provided effective
useful economic decision of micro and small-scale entrepreneurs (MSSEs). Yin (2014)
market centers of Navrongo and Bolgatanga and the surroundings by preparing some
questions and their administration. One hundred and eighty respondents are used for this
study. Yin collected qualitative and quantitative data, which cover: (a) profile of the
respondents, (b) the manner of recording the accounting transactions, (c) mechanism
applied in the inventory cycle, the MSSE’s basis of determining the bottom line of his or
her operations, and (d) information used in making economic decision. Yin outlined that
there is no study of this kind conducted in the usefulness of accounting field to MSSEs in
Ghana. Therefore, during the research study, Yin found that 95% of the 180 respondents
information regarding the double entry system, which means for every debit entry, there
should be an equivalent amount of credit and vice versa. Although Yin found that all the
180 participants used some written records or, in other words, single entry system,
however, out of the 28% of the total population that maintained a complete set of
recording accounting transactions. This process implies that although the interviewees
reliability of their financial reports. Further, 71% of the total population responded that
they relied on the management accounting report for the usefulness of accounting
information (Yin, 2014). Yin (2014) revealed that 29% prepared and generated a
57
complete set of financial statements to rely on the usefulness of accounting information.
Additionally, although the results revealed that the educational background and literacy
was necessary, however, it was not a sufficient factor for the use of accounting
information for the MSSEs (Yin, 2014). Yin outlined that there were evident in the
samples responded by the participants in which six of the 16 enterprises that represent 9%
of the total population and used the computer-based accounting systems are owned by
non-educated entrepreneurs.
investors, and to purportedly widespread earnings management. Ball outlined that the
financial statement might not provide a substantial amount of new information to the
equity investors due the time it takes to issue a financial statement. Further, Ball found
oblige the management to prepare the financial statements on the fair value basis, which
is adjusted annually according to the current market value. Nevertheless, Ball discussed
the discretionary and non-discretionary accruals, which play a significant role in the
financial statements. Also, Ball outlined how the managers can manipulate the results by
governance plays a vital role regarding the disclosure of internal control information.
Agyei-Mensah (2016) collected data from 110 companies in Ghana for the year ending
Therefore, Agyei-Mensah indicated that insufficient internal control information does not
help the stakeholders to assess the corporate governance. Further, the results revealed that
disclosure and increase the transparency of information. The findings of this study
confirmed with the World Bank’s study regarding the weakness of disclosure of internal
control information in the annual reports of Ghanaian companies. The primary objective
decision (Chung & McCracken, 2014). Therefore, good corporate governance ensures
that comprehensive risk management occurs as a normal course of events, and there
should be a transparent disclosure for the stakeholders of the company regarding nature,
extent, and management of these risks. Neogy and Kumar (2014) conducted a survey
study to evaluate the efficiency of Accounting Information System (AIS) on the mobile
telecommunication sector. The use of computerized AIS bears significant time and cost
saving. The AIS helps the management to record and process various accounting
transactions, and then get the financial reports, which will be useful for their users to
make an economic decision. Neogy and Kumar found that existing of an effective
internal control system increase the efficiency of AIS through ensuring the safeguarding
internal control system improved the efficiency of AIS through the prevention of fraud.
Neogy and Kumar highlighted that the separation of operation transactions from
accounting transactions reduces the risk of fraud. An effective internal control system
ensures the adherence to the policies and procedures set by the board of directors. In
addition, proper documentation increases the efficiency of AIS since it is essential for
providing reliable and relevant information, which helps the management to perform
business activities properly and make an appropriate economic decision according to the
financial statements. Elbardan, Ali, and Ghoneim (2015) proposed in their qualitative
method case study design a conceptual framework for analyzing the internal audit
function (IAF) adaptation for the introduction of enterprise resource planning (ERP)
systems in the corporate governance context. Elbardan et al. posited that the conceptual
framework is a tool to be used when exploring the changes in the IAF connected with
ERP systems implementation. Elbardan et al. highlighted that the purpose of this paper
was to provide a conceptual framework that helps to explore how the IAF responds to
both the introduction of the control logic of ERP systems, and corporate governance’s
institutional pressures. Moreover, the objective of the paper was to articulate the
concurrence between the external pressures of Corporate Governance and internal control
logic of ERP systems. Elbardan et al. articulated in their institutional study theory to form
a conceptual framework, which explains the mutual interplay between the macro external
corporate governance pressures, micro internal institutional logics inscribed in the ERP
systems and their impact on IAF practices and structure within companies. The authors
presented a review of the normative literature concerning the increase in the significance
60
of corporate governance in the light of the worldwide economic crisis. They highlighted a
research gap related to the lack of studies focusing on the effect of ERP systems
implementation on the IAF practices. The paper is conceptual in nature, and accordingly,
approach in future research. The conceptual framework proposed in this study would
offer the internal auditors some strategies for allowing adaptation to the various internal
and external pressures. Further, the paper provides a platform for the research community
IAF adaptation.
disclosure, earnings management, and agency costs in the Chinese companies. Earnings
controlling and amending the accounting information and is measured by the amended
Jones model (Ying, 2016). Further, Ying measured internal control information
disclosure based on internal control information disclosure index separated between first
class indicators; reliability, correlation, integrity, and understandability; and second class
indicators, which refer to the relevant first class but in further details depending on the
indicator. Further, the rate of overhead expenses measured the agency cost. Ying found
that internal control information disclosure can affect earnings management through
agency cost. Moreover, Ying found that the improvement of internal control information
disclosure will effectively reduce agency cost, thus reducing earnings management.
According to Ying, implementing the basic norms of internal control effectively has an
61
adequate impact in China. Hence, listed companies should improve internal control
controls where objectives and standards are set, inputs and outputs are compared with the
actual data and, as a consequence, the management takes appropriate corrective actions to
revise the set goals. Therefore, as the effect of the influence of environmental uncertainty
was recognized, companies were obliged to develop strategies that focused on product
and service innovations to provide a competitive advantage. Chenhall and Moers (2015)
aimed to show how the design of management control systems (MCS) has developed in
response to the demand for companies to address the challenges of operating in uncertain
settings by embracing innovation. Chenhall and Moers demonstrated how MCS have
financial-based logic. Chenhall and Moers outlined that this evolution has been a
restricted system with little attention to adaptive processes into MCS that embraces a
more complex, dynamic, open approach to management control system that has provided
designed and developed in a way to help achieve the requirements for innovations in
effective ways. Therefore, it is in this setting that MCS developed to address the need for
62
control systems that were sufficiently open to external factors to help identify possible
innovative products and services. Consequently, MCS could then evaluate the efficiency
and the effectiveness of which managerial processes and individual behavior could
while preparing their financial statements to increase efficiency and avoid restatement.
Cameran, Campa, and Pettinicchio (2014) conducted a quantitative study using the
propensity score matching approach to be able to match between a control sample of non-
IFRS adopters and IFRS adopters’ sample. The purpose of this study was to evaluate the
impact of adopting IFRS on the non-listed companies regarding the abnormal accruals
and timely loss recognition comparing with a sample of companies reporting under
Cameran et al. (2014) conducted their study in Italy since the national GAAP
applicable is not similar to IFRS other than the other Anglo-Saxon countries that have
fewer differences regarding the IFRS standards. Further, the Anglo-Saxon countries do
not give a choice to their non-listed companies to prepare their financial statements by
either IFRS or national GAAP, whereas, Italy gives this opportunity to its companies in
which the authors found in doing research in Italy gives more validity to the study.
Hence, Cameran et al. found in their empirical results that IFRS did not contribute to the
selected in Italy. The adoption of IFRS exhibited a higher level of abnormal accruals and
perceive the reason for switching to IFRS. Also, Cameran et al. found that these
financial reporting. Thus, both empirical results of the non-listed companies comparing
with the national GAAP, and the subsidiaries of listed companies indicated signs of
deteriorating earnings reporting quality. Cameran et al. did not identify the activities of
sampled companies.
Adopting IFRS implies the companies should comply with the standards
introduced by IFRS and the impact of these standards on the accounting treatments.
Streaser, Sun, Zaldivar, and Zhang (2014) discussed the implication of the introduction of
IFRS 15, the new awaited global standard on the revenue recognition. Streaser et al.
applied the provisions of the new revenue standard to a hypothetical contract between a
client and a telecommunications company. Streaser et al. found that the new standard
accelerates revenue recognition of the bundled contract comparing with the current
standard revenue guidance. Streaser et al. outlined that the majority of the companies that
generate revenues will be affected by the application of the new standard and especially,
the sectors such as construction, media, and telecommunications. By adopting IFRS 15,
for all contracts with clients, revenue will be recognized when control of the promised
goods or services is transferred to the contractor, not when risks and rewards are
transferred to the contractor. Streaser et al. outlined that in the new standard, recognition
of promised goods or services to the client. The standard applies to all companies and
replaces most current industry-specific guidance. Further, Streaser et al. articulated that
64
collection of necessary data to implement the new standard requires adequate internal
control systems.
Kumar (2015) conducted a case study analysis to explore the impact of voluntary
Wipro Ltd, which is one of the largest IT services companies in India. Kumar compared
the major financial parameters under IFRS and Indian General Accepted Accounting
Standards (GAAP) as reported by Wipro Ltd. The company reported its financial
statements under both IFRS and GAAP with a transition date of 01.04.2008. Kumar
compared the financial parameters, which are liquidity ratios, debt ratios, equity ratios,
and profitability ratios for four periods from 2010 to 2013 and found that a substantial
increase in liquidity ratios, equity ratios, and debt-equity ratios. The results identified no
significant increase in the profitability ratio except for the year 2013 due to the demerger
and discontinuation of operations accounting treatment between IFRS and GAAP for
some of the company’s subsidiaries (Kumar, 2015). However, Kumar cannot generalize
the findings of this case study to other companies because this case study covers one
company only. Therefore, the financial parameters of this company might generate
different results in other companies that work in the same industry but have different size,
and in companies that work in different industries. Further, the significant reasons that
caused the difference in the relevant ratios might be attributed to principle based IFRS
standard, which requires fair value accounting, the difference in accounting for leases,
financial position approach to deferred taxes, and timing of providing provision for the
proposed dividend.
65
Management in contracting companies uses estimation project budget and
uncertainty to recognize revenue. Kapić and Bašić (2013) illustrated in their study the
importance of accounting policies and estimates to adapt and adopt to the accounting
policies in a form that reflect the environment in which they operate and the risks that are
related to their activities, as part of the overall system of internal controls. Further, Kapić
and Bašić found that an establishment of an effective internal control system will provide
possible detection of risks, and according to these risks, the management can design
adequate accounting policies, which are the basis of making accounting estimates. In
addition, Kapić and Bašić found that the consistency of application of accounting
procedures would ensure the reliability of financial information. Moreover, Kapić and
Bašić found that the implementation of five components introduced by COSO integrated
framework are not sufficient to provide reasonable assurance about the achievements of
its objectives, which are the effectiveness and efficiency of operation, the reliability of
financial reporting, and the compliance with applicable laws and regulations. Kapić and
Bašić stated that the absence of adequate monitoring, which one of the five components
negatively affect the effectiveness of accounting policies and estimates. Kapić and Bašić
gave attention to the accounting estimates and the risk that might affect the reliability of
financial statements in case the accounting policies were not designed properly according
latest available, reliable information due to the uncertainties inherent in the business
world. Kapić and Bašić (2013) concluded the revenue recognition of the contracting
companies is based on accounting estimates along with any foreseeable losses, which
66
implies the use of judgment by the management in estimating the budget cost of the
project. Moreover, tests of critical accounting policies provide insight into the most
Maghariee, Neghabi, and Abdi (2015) studied the impact of accrual accounting in
the municipality of Amol, Iran. Maghariee et al. examined whether or not the financial
reporting prepared based on accrual accounting compared with the cash accounting
found that applying accrual accounting could improve the accounting system in the
municipality. Maghariee et al. did not mention the effectiveness of applying the accrual
basis in the municipality accounting. The accrual accounting reflects the real financial
position of the public entities, and for most countries, the cash basis concept is no longer
an option. Maghariee et al. should have mentioned the agility of the accounting
researchers to improve the current accounting system and replace it by the accrual
accounting since this will positively affect the accounting treatment of the public entities
and also increase the efficiency of work in the public entities’ accounting departments.
Tunçez (2015) discussed in the relevant article the difference between the completed
method and percentage and completion method to record the revenue regarding the
construction contracts. The purpose of this article was to examine the accounting practice
about the construction contracts within the frame of both methods along with the
difference between them. Tunçez found that using the percentage of completion method;
the result will be more accurate regarding the revenue recognition. Further, Tunçez found
that using the percentage of completion method; the financial statements will be more
67
reliable and reflect the yearly profitability or loss of the company. The significant issue in
the accounting practice of the contracting and construction field is to know how to
recognize the revenues and allocate the expenses within the scope of contract in which
events. Hence, when the event is completed, and uncertainties are solved, then the
completed to be able to recognize the relevant revenues and costs. Thus, this
measurement is not reliable to the financial statements’ users since they cannot control
the profitability of the company on a yearly basis and also the result does not reflect the
yearly profitability or loss accurately. The calculation used in the percent of completion
method is: divide the total cost incurred as of the end of each year by the relevant total
estimated budget (Tunçez, 2015). This percentage multiplied by the total contract value
along and total estimated cost is the yearly result. As indicated by Maghariee et al., this
method is reliable and applicable in the construction, contracting, and engineering work
because it is reliable and reflects the best way to get output and performance of the
project on a yearly basis instead of waiting until the end of completion of the project.
Contracting Field
significant because it reflects the accuracy of financial reports. Jarkas and Haupt (2015)
risk factors distributed to a representative number of contractors. Also, Jarkas and Haupt
68
highlighted the major contracting risk factors considered by general contractors running
their activities in Qatar through identifying, exploring, ranking the relative importance
factors and determining the prevalent allocation response trends. Further, Jarkas and
Haupt selected a total number of 126 contracting companies classified under the first,
second, and third categories were selected for the interviews. Jarkas and Haupt discussed
in details the risk factors caused by the clients, consultants, contractors, and exogenous
and affect the contracting revenue recognition. To name a few; errors and omissions in
design drawings, which might lead to further cost estimation managers did not consider
and poor performance of subcontractors that might cause considerable penalties, which
affect the project budget (Jarkas & Haupt, 2015). Malaj and Shuli (2015) found that the
regarding preparing the budget costs, planning, and designing of the projects because
those processes are fundamental and challenging activities in the management and
implementation of construction projects. Jarkas and Haupt discussed the risk factors
caused by the related group only, but they had not discussed their effect on the revenue
and the financial statements, which is a crucial part of the contracting project.
and Shuli (2015) outlined that an effective contracting plan is a basis for developing the
budget and work planning. Further, Malaj and Shuli (2015) pointed out that the use of
financial situation. The budget of the contracting project is very significant since the
managers should calculate the budget accurately to avoid any loss in the projects.
due to the accumulated and enforceable losses of the projects caused by inaccurate cost
estimation in the planning stage. Hence, the management should consider the costing
system of every project and consider the entire expenses the project might incur before
submitting tender or quotation to the customer. Sepasgozar, Razkenari, and Barati (2015)
conducted their study to investigate the essential causes of delay in the construction
causes that affect the project duration and time. Accordingly, Sepasgozar et al. identified
top nine factors out of seventy-three as main causes of delay: (a) external factors, (b)
contractor attributes, (c) owner attributes (d) labor shortness, (e) material deficiency, (f)
design issues, (g) consultant attributes, (h) technology restriction, and (i) project
attributes. Further, the results revealed that technology restriction is one of the top nine
(Sepasgozar et al., 2015). Most of the previous publications examined overall factors
affecting time, but a few publications concentrated on technology to measure the specific
effect of technology on a delay of the construction projects. Zhao et al. (2016) conducted
a survey study to develop a knowledge-based decision support system for enterprise risk
management (KBDSS-ERM) for Chinese construction firms (CCFs) for the purpose of
facilitating their ERM implementation. Zhao et al. outlined that the objectives of the
KBDSS-ERM are; to assess the ERM maturity in a CCF; to visualize the ERM maturity
assessment results; to provide action plans for improving the ERM implementation
70
together with the maturity continuum, and to generate a printable ERM maturity
assessment report. Accordingly, Zhao et al. revealed that the results of the KBDSS-ERM
were consistent with the expert judgments. Further, Zhao et al. found that the KBDSS-
ERM had the accuracy ranging from 83.7 to 92.9 percent in evaluating the maturity
criteria and the overall ERM maturity of CCFs. Also, Zhao et al. found that the experts
recognized the significance of KBDSS-ERM as being a robust, adaptable and useful tool
for ERM implementation in CCFs. Using the KBDSS-ERM, the management of the
construction forms can understand its ERM implementation along with the relevant
strengths and weaknesses, and get the action plans recommended by the KBDSS-ERM.
Thus, with the information that the management would obtain from the KBDSS-ERM, it
can make better decisions associating to ERM. Also, while using the KBDSS-ERM, the
employees need to read the ERM best practices, which enables them to learn the ERM
improve productivity (Sepasgozar et al., 2015). The priority of delay causes of the
delays can lead to substantial negative effects such as lawsuits between clients and
contractors, loss of productivity and revenue, and contract termination (Sepasgozar et al.,
2015).
Transition
companies over the contracting revenue recognition. The section also included the
foundation to the study, background of the problem, problem statement, and the purpose
71
statement. Also, another significant element in Section 1 was the nature of the study,
indicating my preference of the qualitative research method and the case study design for
the study. The research question element of the study was to enable the exploration of
what strategies do business leaders responsible for financial reporting use to develop and
conceptual framework was the conceptual framework for the study, and the lens to view
the study. Further, I explained the assumptions, limitations, and delimitations, which
were the facts I assumed accurate without concrete evidence, weaknesses, and the bounds
of the study respectively. Another element in Section 1 for overview was the significance
of the study, which helped to explain the value of study to business, contribution to
business practice, and implications for social change. The literature review elements
information, IFRS, and contracting field in which all will help the reader to understand
the subject and the importance of having these topics aligned together to be able to
was a restatement of the purpose statement, the role of the researcher, the participants,
research method, research design, population sampling, and ethical research. Also,
Section 2 had data collection instruments, data collection technique, data organization
techniques, data analysis, and their reliability and validity. Section 3 concluded with a
questions, to explore strategies that business leaders responsible for financial reporting
use to develop and implement effective internal controls for recognizing contracting
revenues. In this section, I articulate the structure of the study as well as how this
structure helped me achieve the goal of the study. This section includes (a) the purpose
statement; (b) role of the researcher; (c) participants; (d) research method; (e) research
design; (f) population and sampling; (g) ethical research; (h) data collection instruments,
counterpartsPurpose Statement
The purpose of this qualitative multiple case study was to explore strategies that
business leaders responsible for financial reporting use to develop and implement
effective internal controls for recognizing contracting revenues. The population for this
finance controller, an estimation manager, and cost control managers from three private
controls over revenue recognition. Implications for positive social change could come
from identifying internal controls that increase financial statement reliability, which
could lead to increased access to capital and debt financing and improved employment
opportunities in Qatar.
meaning of phenomena. Kornhaber, de Jong, and McLean (2015) stated that the role of a
73
qualitative researcher is to collect, analyze, organize, interpret, and understand data to be
able to determine the meaning of a phenomenon. Dasgupta (2015) described the use of a
company rather than theoretical business issues. Leedy and Ormrod (2013) pointed out
that a case study design involves the participation of the researcher as the data collection
through their personal lens by being the primary instruments for data collection. I studied
the phenomenon from the perspective of participants and not from the viewpoint of my
experience in the auditing and accounting field. As the primary researcher, I formulated
ideas proposed by the participants without prejudice. My role as the researcher was the
same as my role as a scholarly practitioner who collected, organized, and interpreted data
to be able to report on the results and come up with a conclusion. My role in the research
study included conducting semistructured interviews with open-ended questions for the
participants for the purpose of exploring strategies that business leaders responsible for
financial reporting use to develop and implement effective internal controls for
At the time of the study, I was a CFO for a large organization; a year before, I had
established my own audit firm. Since 2005, I had obtained experience as an external
auditor and tax consultant. My professional expertise and work related to the auditing and
accounting field as well as tax consulting in Lebanon and Qatar. The participants for the
study were business leaders responsible for financial reporting from three private
contracting companies in Qatar. I ensured that throughout the data collection process, my
professional ideas did not have any influence on the answers the participants provided.
74
White and Drew (2011) emphasized that research participants should have the freedom to
respond to questions without any restraint. I did not use any company associated with my
current or previous employment, and I carried out transcript review (i.e., enabled
gathered through the data collection process. Conducting interviews helps a researcher to
get the story behind participants’ experiences (Yin, 2014). Through interviews, a
researcher can gather in-depth information on an evolving topic (Yin, 2014). Interviews
are a useful data collection tool to gain in-depth understanding in relation to a research
I ensured that the participants understood the risks of participation, and I worked
to reduce those risks and increase the benefits of participation by following the guiding
principles of the Belmont report. The Belmont report frames an ethical protocol for
research studies involving human subjects (U.S. Department of Health and Human
Services, 1979). Ethical principles in the report include (a) respect to persons, (b)
beneficence, and (c) justice (Adams & Miles, 2013). Further, the Belmont report
identifies boundaries between behavioral research and routine practices for research. The
Belmont report also indicates the requirement for risk assessment of human research
the protections I built into the study, and the study’s voluntary nature. I maintained
identities, respecting all study participants, and enabling the participants' autonomy. I
interview. I ensured that no harm came to the participants and did not take advantage of
their positions. As a novice researcher, I could not ignore the fear of being biased while
participants, collecting and analyzing data, and finally, coming up with findings and
conclusions.
checking during the data collection process. I gave the participants opportunities to
participants were able to express their opinions throughout the interview process by not
Adedokun, Ogunsemi, Aje, Awodele, and Dairo (2013) pointed out that
for collecting information from participants (Andersen, Christensen, Kehlet, & Bidstup,
2015). The interview questions (see Appendix D) emerged from my research question
and the line of inquiry I established for the study. Frich, Røthing, and Berge (2014)
marked the significance of an interview protocol to ensure that researchers cover the
reduce deviation from the objectives of the study and maintain consistency from one
76
interview to another (Baskarada, 2014; Wang, Xiang, & Fesenmaier, 2014). Researchers
should also provide satisfactory time for participants to answer questions (Malone,
Nicholl, & Tracey, 2014; Yin, 2014). Hence, my objective was to follow an interview
Participants
The goal of qualitative researchers is to explore the depth and complexity inherent
participants’ life experiences and to provide them meaning (Yin, 2014). Using a case
a group of people who have experience in a field (Dasgupta, 2015). Yin (2014)
highlighted that a case study is limited in scope to a particular issue at a specific site.
Sowman, Sunde, Raemaekers, and Schultz (2014) stated that it is important that
collection to three private contracting companies in Qatar. The population for this study
manager, and cost control managers, who worked in private contracting companies in
direct involvement in financial statements, project budgets, and internal audit reports at
three private contracting companies in Qatar. Yin (2014) indicated that qualitative
researchers should establish participant eligibility for effective data collection. Using
77
eligibility criteria helps researchers to select participants who have experience in the
appropriate field and can provide useful and relevant data (Latiffi, Brahim, & Fathi,
2016). As identified by Sowman et al. (2014), researchers should ensure that potential
participants are knowledgeable and have experience relevant to the research topic. The
eligibility criteria for the selection of participants in this study included the following: (a)
managers, estimation managers, and cost control managers; (b) more than 5 years of
interview; and (d) experience with developing and implementeing internal control
with a company representative the purpose of the research study, criteria for participation,
participant confidentiality, and the informed consent process. Researchers can effectively
organizational data (Whicher, Miller, Dunham, & Joffe, 2015). Thus, prior to any data
participants meeting the criteria for participation. To ensure comfortable interaction with
participate (see Appendix C). The invitation provided a brief overview of the purpose of
my study and criteria for participation. Further, I met with all potential participants and
78
encouraged them to ask questions about the evolving topic and research study before
agreeing to participate.
Doody and Noonan (2013) claimed that establishing comfortable interaction and
a means of establishing trust. I requested that participants sign an informed consent form.
In the form, I explained the purpose and meaning of the study to the participants, along
with other details such as the protection of the participants’ information, ethical
considerations relevant to the study, risks associated with the research, and my contact
anonymity, and data storage. Furthermore, in the informed consent form, I reminded
participants of their right to discontinue their participation at any time during the
proceedings.
participants face to face, and with each participant’s consent, I recorded the interviews
for accuracy. This setup allowed me the flexibility of follow-up questions for further
exploration and helped to accommodate the interviewees. Mohsin and Alhabshi (2015)
outlined that meeting with participants face to face before interview processes occur
helps researchers and participants get to know each other and enables researchers to form
meaningful working relationships with participants. Furthermore, I took notes during the
interviews about any observations I identified during the interviews. O’Reilly and Parker
(2012) posited that saturation occurs when participants offer no new ideas or new
79
patterns. Interviews continued until I reached data saturation, interviewing all participants
cyclically.
Research Method
strategies that business leaders responsible for financial reporting use to develop and
implement effective internal controls for recognizing contracting revenues. Makrakis and
phenomenon, researchers have to choose from three different types of research methods:
(a) qualitative, (b) quantitative, and (c) mixed method. Nyaribo (2013) pointed out that
the qualitative research method is flexible because it gives the researcher an opportunity
to amend and improve an interview as it progresses. Likewise, Blum (2013) noted that
the qualitative method enables researchers to incorporate unexpected findings that assist
Goulding (2014), to understand a phenomenon: (a) interview, (b) data analysis, (c)
quality check analysis, and (d) synthesis of the literature. Venkatesh et al. (2013) outlined
The goal of qualitative researchers is to explore the depth and complexity inherent in
experiences and provide them meaning (Yin, 2014). Quantitative researchers analyze
80
numerical data by employing statistical procedures and make deductive conclusions
about the relationships and differences among variables (Venkatesh et al., 2013).
numbers. Petty, Thomson, and Stew (2012) posited that researchers employ numerical
data in quantitative methods to explain phenomena. Guta (2013) pointed out that a
quantitative research method is a deductive style of research with hypotheses for data
and qualitative methods (Bernard, 2013). Parker (2014) stated that combining
quantitative and qualitative methods in a single research study enhances and validates
research findings. The combination of quantitative and qualitative methods challenges the
underlying assumptions of the two paradigms. I did not choose a mixed method approach
due to the time constraints for my study. I did not plan to use quantitative data; thus, I
rejected both quantitative and mixed methods. My research objective was to understand
and not to measure a phenomenon; thus, I adopted the qualitative method. The qualitative
research method was suitable for my research to explore strategies that business leaders
responsible for financial reporting use to develop and implement effective internal
Research Design
phenomenological, and case study. Onwuegbuzie and Byers (2014) identified numerous
81
qualitative designs, of which I considered ethnography, phenomenology, and case study.
The purpose of this study was not to explore the lived experiences of participants. Thus, I
ethnographic researcher employs a population that may include an entire culture with a
shared reality (Campbell-Reed & Scharen, 2013). Ethnographic researchers are interested
in the culture and interact with the members of the cultural society during the research
project (Campbell-Reed & Scharen, 2013). Part of risk management relates to developing
a culture of ethics (Wójcik. 2013). Thus, an exploration of culture may create value when
exploring internal controls within an organization. The purpose of this study was to
explore a business problem from the perspective of a bounded system, not the culture of a
The purpose of a case study design is to explore a bounded system or a case over
information in rich context. Yin (2014) stated that researchers who use qualitative case
observations, and artifacts. Yin (2014) described the two designs that case study
researchers can conduct, single case study and multiple case study. The two case study
designs have holistic and embedded variants. According to Yin (2014), a researcher’s
choice between the case designs with their variants depends on the specific phenomenon
and the research question. Ketokivi and Choi (2014) noted that multiple case study allows
82
cross-case analysis through case comparisons for measurable characteristics. Although
multiple case studies are more expensive and time consuming than single case studies
(Yin, 2014), I selected this approach to add further value to the study. A researcher using
a case study design explores both what and how or why questions in relation to a process
or phenomenon working within a bounded system (Yin, 2014). Using a case study design
people (Dasgupta, 2015). Further, Tsang (2014) outlined that case study researchers
collect data from the natural set up of events. De Massis and Kotlar (2014) posited that
researchers employ case study design to achieve in-depth analyses of phenomena in real-
life context. My goal was to explore a business-related bounded system; thus, I employed
decision to end data collection processes. O’Reilly and Parker (2012) stated data
saturation occurs when the data are repetitive, no new information is obtainable through
data collection, and fresh data does not lead to additional findings. Hanson, Balmer, and
Giardino (2011) stated that making a decision is possible by the researchers until themes
until no new data or themes emerge, and I was confident that data saturation was reached.
information regarding the purpose of the study. The population for the study was from
three private contracting companies in Qatar. Ritchie, Lewis, Nicholls, and Ormsto
83
(2013) posited that a population is a group contributing valuable information to research
in which this information affects the population through a coordinated method. I selected
three participants from each company for this qualitative research case study design to
explore strategies business leaders responsible for financial reporting use to develop and
implement effective internal controls for recognizing contracting revenues. Yin (2013)
posited that researchers recommend various sample sizes for case studies, but there is no
set sample size for qualitative research; instead, the focus is on gathering sufficient data
Sampling allows for the selection of a small unit of experts to represent the
perspective of the total population on a specific subject. Strnad (2013) pointed out the use
of sampling is cost and time-consuming. The sampling technique for this study was
to ensure that the sample participants are qualified and have knowledge about the topic.
(2012) posited probabilistic samples require random selection. IFRS (2015a) identified
the project budget as a critical element in the project cost estimation, which affects the
company's profitability. The sample population for this study was three private
(2012) outlined that the purpose of selecting participants in qualitative studies does not
aim to collect a count of opinions or people or other quantifiable data. O’Reilly and
84
Parker (2012) stated qualitative researchers concentrate on the range of participants'
Interviews continued until the study reached saturation. O’Reilly and Parker
(2012) posited saturation occurs when the participants offer no new ideas or emergent
patterns. Also, O’Reilly and Parker (2012) stated data saturation occurs when the data are
repetitive, no new information is obtainable through data collection, and fresh data does
not lead to additional findings. Similar to Chung at al. (2014) I conducted in-depth
interviews and review additional data. In-depth interviews with the relevant business
leaders, who are responsible for financial reporting can provide rich data. The interviews
Doody and Noonan (2013) claimed that establishing a comfortable interaction and
communication with the participants will promote detailed and accurate responses to
knowledge about the relevant topic, will affect the quality of the information obtained
(Latiffi et al., 2016). Using a participant criterion helped me eliminate participants who
strategies.
Ethical Research
cooperation (see Appendix B), I discussed the informed consent process with each
potential participant along with the purpose of the research and criteria for participation.
Participants who agreed to take part in this research received and signed the informed
consent form. I asked participants how they preferred to receive the informed consent
85
form (i.e., postal delivery, e-mail, or hand delivery). Barazzetti, Hurst, and Mauron
(2016) outlined how the researcher shows respect, maintain commitment, and confirm
there was no stress or harm to participants. Researchers must abide by the rules of
research for human subjects presented by the Belmont Report (U.S. Department of Health
Informing the participants before and during the interview process of their
inherent rights to withdraw from the study gives further encouragement to the
participants to take part in the study. Cox and Mcdonald (2013) recommended that
participants sign the informed consent form before interviews. Yin (2014) stated
researchers have to obtain the informed consent form from each participant before setting
an interview. I encouraged potential participants to ask questions about the research study
and process before consenting to participate. Chung at al. (2014) outlined that researchers
participants to enhance interaction with the researcher and collect rich data. Once a
participant agreed to participate in the study, the individual signed the informed consent
form. Participants who wished to withdraw from the study after they signed the informed
invitation, and cash. Chen, Lei, Li, Huang, and Mu (2014) pointed out incentives play a
major role in the willingness of study participants because of the increasing demand of
research protocols. Chen et al. (2014) stated due to the financial constraints of the
researcher and ethical concerns do not offer any form of incentives. I did not provide an
the minds of the participants by respecting and protecting their rights and enjoying their
and saved on a flash drive and Dropbox. Before destructing the files, I securely stored the
data for a 5-year period. Storing data enables later access and usage to the information by
As a researcher, I was the primary instrument used in the data collection process.
Seidman (2013) identified the researcher as the primary data collection instrument. Using
data collection in qualitative research, a researcher can gather data through direct
& Murphy, 2013). As suggested by Cridland, Jones, Caputi, and Magee (2015),
(Onwuegbuizi & Hwang, 2014). Further, semistructured interviews enable the researcher
to use open-ended questions, with the benefit of asking follow-up questions to gather
further explanation and additional responses that add value to the research. I
My objective during data collection was to present reliable and accurate findings,
maintain the participants' confidentiality, and remain ethical and objective during the
interview process. Additionally, I practiced the desired skills of the researcher outlined by
Cronin (2014), which included: (a) a researcher should be able to ask good questions and
interpret the answers, (b) a researcher should be a good listener and not be trapped by his
or her own ideologies or preconceptions, (c) a researcher should be adaptive and flexible,
threat, and (d) a researcher should not be biased by preconceived perceptions, including
those derived from theory. Hence, a person should be sensitive and responsive to
contradictory evidence.
Researchers must take the necessary steps to mitigate research bias; hence, I
diminished my personal views and recognized the existence of bias. Similar to Yin
(2014), a role of the researcher is to plan to mitigate bias by maintaining a high ethical
standard through honesty, professional competence, reading articles related to the study,
and seeking peer review. Researchers also focus on self-understanding along with the
impact of their expectations and biases on their study (Berger, 2015). The goal was to
hear and interpret the experiences and reflections from the participants about the
reviewing the informed consent form with the participants, and following the interview
question guide.
88
Member checking is a technique used to assure research validity (Harper & Cole,
2012). To conduct member checking, I wrote my interpretation of the data and presented
my analysis to the interviewees to verify the accuracy of their meanings. The use of
member checking increased the accuracy of interview data. Member checking involves
potential misinterpretation (Harper & Cole, 2012). Similar to Marshall and Rossman
(2016), each participant had the opportunity to review my interpretation of the interview
data to ensure no data were taken out of context and all interpretations were accurate.
questions. I used the interview protocol (see Appendix A) and informed consent form as
deviation from the objectives of the study and maintain consistency from one interview to
another (Baskarada, 2014; Wang, Xiang, & Fesenmaier, 2014). Yin (2014) identified six
sources of data appropriate for case studies including documentation, archival records,
interviews, direct observations, participant observation, and physical artifacts. From the
perspective of Yin, any of the six sources of the data collection method is appropriate for
a case study design. Battistella (2014) pointed out using more than one source to collect
data lead to diversification of data, mitigating biases, and increased information basis. I
for financial reporting have solved the business problem identified in my study. Before
receiving IRB approval, I contacted a company representative from each company via
89
telephone or e-mail to introduce myself, review the background of my doctoral study,
address any questions, and request that each sign a letter of cooperation. Afterward, I
asked potential participants within these three private contracting companies if they
would like to participate in a study. If a business leader agreed to participate and signed
the informed consent form, I set up an interview in their office, or another comfortable
location. Scheibe, Reichelt, Ballman, and Kirch (2015) pointed out a location familiar to
the participant will promote a comfortable interviewing environment. After setting up the
interview, I raised the interview questions including follow-up probing questions to get
researcher and participant. Figgins, Smith, Sellars, Greenlees, and Knight (2016) stated
semistructured interviews are insightful and help establish confidentiality with the
participants during the interview process. The interviewers took advantage of the
Kotlar (2014) stated that interviews help to make a study insightful and meaningful to
collect efficient and rich data. Cardamone, Eboli, and Mazzulla (2014) highlighted that
expression between the researcher and participant. Face-to-face interviews are connected
with elaborating quality data (Cardamone et al., 2014). Another benefit of face-to-face
interviews according to Irvine, Drew, and Sainsbury (2013) is that the researcher can
observe behaviors and nonverbal signals. There are disadvantages with face-to-face
90
interviews. Potential disadvantages, as stated by Szolnoki and Hoffman (2013), include
interviewer bias, participant time constraints, and geographic limitations. Yin (2014) also
identified the potential lack of control over the interviews as a disadvantage to face-to-
face interviews. However, for the purpose of this case study, the advantages of face-to-
Participants benefit from member checking. Harper and Cole (2012) highlighted
that participants receive a therapeutic benefit through member checking because they are
corrections to perceived errors in the data collection process because through member
checking participants verify the interpretation of the interview data (Brandburg, Symes,
Mastel‐Smith, Hersch, & Walsh, 2015). The process for assessment of reliability and
substantial part of the research study because through proper data organization,
researchers can store, access, evaluate, and communicate research findings effectively
and efficiently (Korhonen, 2014). Research workers do suffer from disorganized data
especially in survey-based research studies (Karanja, Zaveri, & Ahmed, 2013). Hence, it
elements of the research studies and also to achieve effective data analysis (De Waal,
Goedegebuure, & Tan Akaraborworn, 2014). The process of data organization enables
researchers to identify emergent patterns from the data (Yin, 2014). Therefore, to be able
and data derived from the participants during the interview process. Further, to avoid
revealing the identity of the participants, I organized data by coding all participants’
information.
data and track information obtained from the participants. I created a system to file the
raw data using a password-protected USB device and Dropbox, which is cloud storage.
Researchers should use cloud applications to store data and be able to track participants
(Hashem et al., 2015). Also, Hashem et al. emphasized using cloud storage application
avoid unauthorized access. I will store hard copies of the documents in a fireproof safe in
my personal residence including the USB drive for at least 5 years and I will have sole
access to the stored data. Banks (2013) pointed out storing participants’ information for at
information after the stipulated period of storing the data, I will destroy both electronic
and hard copies after 5 years to avoid privacy violation and data leak.
Data Analysis
The purpose of qualitative data analysis was to explore the meaning of the
content. Meanings in qualitative research derive from words spoken and textual and
images, not numbers (Yin, 2014). Thus, this indicates that the quality of qualitative
research depends on the interaction between data gathering and data analysis to enable
exploration, clarification, and interpretation of meanings (Yin, 2014). Guo and Guo
92
(2016) stated qualitative data analysis involves studying the content of information to
identify, classify, and transforming data into theme process. Data analysis consists of
preparing, organizing, and reporting (Elo et al., 2014). To analyze data, I employed
credibility and accuracy of the interpretation (Van Dijk, Vervoort, Van Wijk, Kalkman,
& Schuurmans, 2015). Joslin and Müller (2016) described triangulation as identifying
et al. (2014) articulated employing triangulation as the use of the many sources that
enable the researchers to enhance their understanding of a study. Cronin (2014) pointed
out triangulation decreases and negates the deficiencies of a single data collection
strategy, thus increasing the scope for interpreting the findings. I employed multiple data
evidence included financial statements, project budgets, and internal audit reports.
data for the purpose of enhancing valid interpretation (Yin, 2014). I applied the three
phases of data analysis process identified by Elo et al. (2014). The phases included: (a)
preparation, which includes the collection of data, sampling strategy, and selecting the
unit of analysis (b) data organization, which includes categorization and abstraction,
ensure data are not lost. Researchers use multiple data sources to increase the confidence
and trustworthiness in the findings (Elo et al., 2014). In addition, Elo et al. (2014)
described trustworthiness for the main qualitative content analysis as phases from data
preparation to reporting of the results. To retrieve data from the companies’ documents, I
(a) narrowed my search to information related to strategies for preparing project budget
and relevant internal control, (b) pursued participants’ guidance on where to find the
information I needed, and (c) took notes and requested participants to make copies of
collected information along with the transcribed interview data. The trustworthiness of
data collection can be verified by providing accurate details of the sampling method in
which purposive sampling is convenient for qualitative studies where the researcher is
interested in informants who have the best knowledge concerning the research topic and
participants’ descriptions (Elo et al., 2014). Next, I classified narrative segments into
topical themes for effective data analysis, and concluded by interpreting the findings to
Computer-aided qualitative data analysis software along with the Microsoft Excel
play a significant role in helping researchers to analyze data. Sotiriadou, Brouwers, and
NVivo, which helps researchers to analyze data by identifying themes, gathering insights,
topics. Further, once information was coded, NVivo delivers a methodical process in
94
research to be able to assure validity and reliability (Zamawe, 2015). Derobertmasure and
Robertson (2014) and Sotiriadou et al. (2014) recommended the use of NVivo software,
which aids in data management, coding, sorting, and organizing the data in themes. Thus,
I applied NVivo Pro software, which assisted me in the data analysis process.
Researchers can use thematic analysis to be able to identify, examine, and record
Jaquero, & Montero, 2016). The thematic analysis offers a systematic and accessible
approach to analyzing qualitative data (Pascoal, Narciso, & Pereira, 2014). Systematic as
it provides an orderly and logical way to analyze qualitative data. Also, thematic analysis
can be used to analyze large and smaller qualitative data, leading to rich descriptions,
explanations, and theorizing (Elo et al., 2014). Researchers who use thematic analysis
code qualitative data to identify themes and patterns for further analysis related to the
research question (Pascoal et al., 2014). Thus, researchers must ensure identified themes
validity, when collecting and analyzing data to support the findings of the research study.
Gheondea-Eladi (2014) pointed out reliability and validity are relevant standards to
ensure the rigor and credibility of the research findings. There are four essential criteria
Researchers have to verify the reliability of the data and the ability to replicate
between internal and external reliability. Internal reliability refers to ensuring consistency
throughout a research project, whereas external reliability refers to whether your data
collection techniques and analysis would produce consistent findings if they were
repeated by other researchers (Elo et al., 2014). Also, Hess, McNab, and Basoglu (2014)
indicated dependability ensures future researchers repeating the same research procedure
will get similar results. Dependability, which is the parallel criterion to reliability, proves
the finding’s validity through triangulation, member validation, and replication (Funder et
al., 2013). Researchers should detail the procedure of the research starting from the
selection of participants, data collection to the data analysis and presentation of findings
(Elo et al., 2014). Researchers ensure dependability to mitigate errors in their study
(Polit, 2014).
Error or bias on the part of participant or researcher affects the results of the
research (Carter et al., 2014). Thus, threats imply that researchers require being
methodologically rigorous in the way they carry out the study to be able to avoid
threatening the reliability of the results (Carter et al., 2014). I employed member
checking ensures data validation, mitigates error and preconceptions in the research
findings (Yin 2014). Member checking is a method to assure reliability and validity
96
(Harvey, 2015). Reliability occurs when data collection and analysis is consistent and
Validity
Validity refers to the accuracy of the data analysis and generalizability of the
findings. Researchers ensure validity by making sure the research findings are consistent
and accurate (Yin, 2014). As suggested by Cronin (2014), researchers confirm study
Validation is the process of verifying research and data analysis, and interpretation to be
able to prove data validity, credibility, and authenticity (Noble & Smith, 2015).
Researchers establish validity by ensuring research findings are consistent and accurate
(Yin, 2014).
research findings. Credibility, which is the parallel criterion to internal validity, refers to
systematic, in-depth research that yields high-quality data (Elo et al., 2014). Also,
are two validation techniques, which may assist to establish a quality of the research:
triangulation involves using multiple sources of data and method of collections to be able
Member checking involves sending the researcher’s interpretation of the data back to the
participants to enable them to check the result validity (Burau & Andersen, 2014). Also,
97
allowing participants to note any observation that contradicts with what we have
collected; hence, this process enables them to validate the results (Allen, Schetzsle,
participants (Elo et al., 2014). Confirmability implies when a researcher does not
incorporate any of his/her perspectives, instead of direct confirmation from data collected
from participants (Yin, 2014). I employed the use of triangulation to be able to ensure the
confirmability of my doctoral study. The purpose of using multiple sources of data and
method of collections within one study was to ensure consistency in data interpretation.
The use of more than one data sources helps to ensure the validity of the findings
Transferability, which is the parallel criterion to external validity, refers to the ability of
other researchers to generalize a study’s results (Elo et al., 2014). Transferability refers to
the ability to apply the findings of a study to other studies given similar circumstances
sufficient context of the research and the assumptions central to the study. This will allow
emergent themes. Researchers should stop collecting any new information when they
identify that there are no emerging ideas (Cleary, Horsfall, & Hayter, 2014). Researchers
use data saturation to ensure the validity of the research study (Yin, 2014). The member
98
checking follow-up interview can help one reach data saturation and enhance the
academic rigor through obtaining in-depth information (Yin, 2014). Hence, data
Section 2 began with the purpose statement. Next, I explained my role as the
researcher and provided in-depth information about the selected participants of the study.
The section also included reasons for choosing a qualitative research method and a
multiple case study design to address the research question. Furthermore, the section also
contained information regarding the population and sampling, ethical research, data
collection instruments, as well as data organization and analysis. I concluded the section
Section 3 began with the introduction that includes the purpose statement and a
summary of the findings. Next, I provided the presentation of the findings, the
discussed recommendations for action and further research, and my reflections and
conclusions.
99
Section 3: Application to Professional Practice and Implications for Change
on strategies that business leaders responsible for financial reporting use to develop and
section, I present (a) an overview of the study, (b) the findings, (c) applications to
professional practice, (d) implications for social change, (e) recommendations for action,
(f) recommendations for further research, (g) reflections, and (h) a conclusion.
The purpose of this qualitative multiple case study was to explore strategies that
business leaders responsible for financial reporting use to develop and implement
semistructured interviews with open-ended questions. The data came from nine
participants, who had sufficient experience and technical knowledge in this field to be
able to answer the interview questions adequately. Of the nine participants, I purposively
selected three finance managers (PFM1, PFM2, PFM3), two cost control managers
(PCCM1, PCCM2), one chief internal controller (PCIC1), one estimation manager
(PEM1), one finance controller (PFC1), and one accounting manager (PAM1).
the study. I named participants as PFM1, PFM2, PFM3, PCIC1, PEM1, and so forth in
order to protect their names and keep participation confidential. Additionally, I used
lasted no more than 30 minutes. I audio recorded all interviews. After completing the
interviews, I converted the interview recordings to text and used NVivo Pro software to
analyze data, organize themes, and retrieve material easily and efficiently. I maintained a
high ethical standard during the interview process, demonstrating honesty and
primary objectives. As a CPA with international audit firm experience, I had acquired
presented the summary of findings to the participants for member checking, which
interviewees. I organized the data collected into thematic groups. I later coded narrative
based upon remarks from participants to ensure accuracy and preceded to a final write-up
of the findings of this study. The themes included (a) control environment, (b) control
activities, (c) systemized project budget, (d) accounting standards compliance, and (e)
The overarching research question that guided this study was the following: What
strategies do business leaders responsible for financial reporting use to develop and
Qatar. Participants had unique codes (PCIC1, PFM1, PFM2, etc.) to ensure
documents including financial statements, internal audit reports, project budgets, and
casual observations to ensure the credibility of the data collected through interviews. The
findings from this study extend the knowledge created by existing studies, as presented in
the literature review. The conceptual framework for this qualitative multiple case study
was the COSO internal control conceptual framework developed in 1992 by the
Treadway Commission for the purpose of developing efficient and effective internal
controls (Moeller, 2014). Since 1992, using the COSO model has helped managers
design, operate, and evaluate the effectiveness of internal controls (Rose, Sarjoo, &
Bennett, 2015).
The five main themes identified through data analysis were (a) control
environment (CE), (b) control activities (CA), (c) systemized project budget (SPB), (d)
accounting standards compliance (AS), and (e) risk assessment and monitoring (RA&M).
interviews and other data sources. These emergent themes seemed relevant in exploring
strategies that business leaders responsible for financial reporting use to develop and
2. What strategies have you used to ensure that the CE, CA, AS, SPB, 100%
internal controls are operating effectively
regarding contracting revenue recognition? RA&M
3. What are the key strategies managers use to CE, CA, AS, SPB, 100%
develop and implement appropriate internal
controls for recognizing contracting revenues to be RA&M
able to mitigate the risk of financial statement
manipulation?
4. How do you assess the effectiveness of the CA, SPB, RA&M 60%
strategies for using your budget as an internal
control mechanism to manage projects?
5. How did you address the barriers to CE, CA, SPB, 80%
implementing the strategies for using project
budget variances as a learning experience to RA&M
strengthen internal controls?
6. How does the accounting team validate the CA, AS, SPB, 80%
reliability and accuracy of revenue recognition in
the financial statements? RA&M
7. How does management adapt the internal CE, CA, SPB, 80%
control system for recognizing contracting
revenues? RA&M
8. What else would you like to share about your CE, CA, SPB, 80%
experiences on the effectiveness of the internal
control regarding the contracting revenue RA&M
recognition?
103
Theme 1: Control Environment
increase the value of the company and enhance the shareholders’/partners’ equity, hence
ensure the effectiveness of the companies’ internal control. COSO (2013) and Rubino,
Vitolla, and Garzoni (2017) stated that the control environment component consists of (a)
organizational structure, (b) integrity and ethical values, (c) financial reporting
competencies, (d) authority and responsibility assignment, (e) human resources policies
and procedures, (f) management’s philosophy and operating style, and (g) board of
mitigate many risks that arise from daily operations; these companies are then able to
attract further investors whose investments in the company may help to further growth
and development (Odorovic, 2013). Guo et al. (2015) found that material weaknesses in
policies.
environment, which enhances internal control in a company and ensures its effectiveness.
PAM1, PFM1, PFM2, PCIC1, PEM1, and PFC1 emphasized enhancing corporate
governance in the companies. Tak (2014) stressed that internal control is an important
part of an organization, and when it is ignored, the organization tends to lose power over
the governance of the entire company. Dimitrijevic (2015) emphasized that control
knowledge and experience through regular training and coaching, keep their
morale up and motivated, will have a positive impact on the internal control
business. PFC1 stated, “the top management is focusing on improving the corporate
governance in the company to be able to increase efficiency and keep the morale of the
employees and managers up.” PFC1 also emphasized that “sharing ideas between the
employees and managers, and enabl[ing] them to participate in an economic decision will
motivate and incentive them to observe the implementation of internal control in the
companies.” Participants focused on regular training on IFRS, the code of ethics and
objectivity, and the ERP system because training and development in these particular
acknowledged that “during the recruitment process, management gives more concern on
the candidates, who have sufficient experience in the contracting industry and knowledge
of the accounting standards related to revenue recognition.” Kehinde (2015) stressed that
management should ensure that the code of ethics and objectivity are well established in
incidence of exogenous errors, fraud, and irregularities. Soltani (2014) found that factors
105
that contribute to intentional errors include weak internal control, inefficient corporate
2016). The findings from the study indicate the importance of management’s
effectively and employees and managers are getting regular training in IFRS, ERP, and
the code of ethics to ensure effective internal control over contracting revenue
recognition.
To ensure data credibility and to validate the findings, I reviewed the internal
control reports generated by internal controllers from the years 2014 to 2016. The internal
controllers stressed in the observations part of the 2014 and 2015 reports the weakness of
internal control over project budget estimation and its effect on revenue recognition. In
the observation part, the internal controller highlighted that the project estimation had a
negative impact on the company’s profitability during the year 2014 because the
management did not calculate the completion date for the project accurately. Hence, this
inaccurate estimation caused the management to assume significant expenses that were
not included in the project budget calculation, such as expenses for labor or manpower. I
also noticed the problem of the accounting system the companies used in the previous
years. I noticed in the management response to the internal controller observation from a
2016 internal audit report that due to the error of estimation and weakness of internal
control over the project estimation, the management resolved to replace the old
accounting system with an advanced ERP system to tighten internal control and make it
106
more effective, as well as improve the internal control system and comply with the entire
All participants indicated that the management had set proper internal policies and
procedures used by management to implement adequate internal controls and ensure the
implementing the internal policies and procedures effectively ensured the accuracy of
recognizing contracting revenue. I reviewed the internal policies and procedures for day-
to-day operations. These policies ensure the following: (a) appropriate segregation of
duties, (b) maintenance of appropriate records and relevant supporting documents, and
(c) regular review of the effectiveness of internal controls by the internal audit team. As
stated by PAM1,
I reviewed the internal policies and procedures of the three contracting companies
along with other significant points regarding the process of the entire cycles such
noticed that all are well documented and circulated between the employees and
managers.
of an effective internal controls system. Frazer (2016) posited that inadequate segregation
of duties within small companies is one of the leading irregularities for employees.
Länsiluoto et al. (2016) confirmed that different individuals should handle the
107
responsibilities for enhancing internal controls in the entire cycle, including revenue
manipulation. PAM1, PEM1, PFM1, PFM2, PFM3, PCIC1, and PFC1 stated that
multiple authorizations are an effective control strategy to ensure that internal controls
are functioning effectively. All participants also stated that controls related to contract
costs were in place to ensure that the project budget included properly allocated costs.
Estimation managers calculate the project budget on the basis of the entire cost of the
2015).
PAM1, PEM1, PFM1, PFM2, PFM3, PCIC1, and PFC1 acknowledged that
management was using the following strategies to ensure that internal controls were
2. Ensuring that the project budget includes all project Project budget 5
costs, such as direct, indirect, and overhead, and is approved
by the respective managers of the company.
4. Ensuring that generated progress billing matches the Project budget and 5
percentage competed as per the progress financial reports
certificate/completion certificate.
8. Use in-house internal auditor’s report and external Internal audit reports 6
auditor’s management letter as a benchmark to improve any
weak point detected regarding the internal controls.
109
Furthermore, PAM1, PEM1, PFM1, PFM2, PFM3, PCIC1, and PFC1 emphasized
that the following internal controls be in place to mitigate the risk of financial statements
modify, and replace control activities at all stages of the organization to mitigate risk and
It is not only a matter of preparing a project budget, however; the most important
is to ensure that all relevant costs are included in the project budget along with a
proper allocation of profit margin, considering the risk of uncertainties the project
Table 3 shows the combined internal control strategies I identified throughout the
participants.
110
Table 3
4. Management estimate the entire project budget costs and Financial reports 6
profit margin at the inception of the contract.
accounting standards, accurately calculating the project budget, and strengthening the
internal controls to be able to validate all the accounting transactions related to the
particular project budget, and any transaction or job executed at the relevant project. The
findings from this study confirmed the conceptual framework and extended the
having strong internal controls, and applicable accounting standards to be able to ensure
that revenue recognized indeed reflect the real figures that appearing in the financial
statements. PFM1 stated, “that complying with IFRS is the milestone behind a successful
and profitable project, and so, ensuring the sustainability of the company.” In addition,
All deliveries to project site are supported by the relevant delivery notes along
with appropriate approvals, project progress report are approved by the respective
client on a regular basis (monthly), each progress report supports the evidence of
completion method. Any difference between the percentage of completion method and
approved progress billing is reversed in the financial statements to be able to meet the
objective of contracting revenue recognition as per the IAS 11. Using these findings
confirmed the previous and current literature review in both accounting standards IAS 11
which does not enable users to make any adjustment other than the authorizations
provided by the management to the respective managers. Also, participants indicated that
an advanced ERP system embeds a project budget module that enables the management
to follow up and monitor the budgeting process effectively and efficiently. Using an
advanced ERP system mitigates the risk of financial statement manipulation, enable
employees and managers to incorporate the project budget, and monitor it effectively and
efficiently from the commencement date of the project to the completion date as stated by
PFM2, “applying an ERP system enhances internal controls and decision taken by
management.”
ensure an effective internal control over the contracting revenue recognition as stated by
PFM1, PFM2, PCIC1, PAM1, PEM1, and PCCM2. Participants acknowledged that
systemized project budget is a primary tool that gives us the ability to control and
monitor the project's status during the project’s execution phase. PFM1 stated, “a
systemized project budget enables us to monitor any deviation from the project budget,
budgeted versus actual cost incurred.” PFM1 stated, “systemized budget is enabling us to
mitigate the risk of incurring foreseeable losses.” PEM1 also added, “any cost incurred
and exceeded the budget require from the project and estimation managers a proper
113
justification in which the management would decide to charge back the client to avoid
related to the budgeting process, such as Cost Variance and Return on Investment
(ROI) for the managers, and number of hours for the labors. This cost variance
and the projected ROI is used as an alarm on our ultimate profitability of the
effective internal control over the contracting revenue recognition. PCIC1 indicated,
We are using the following strategies to ensure that internal control is effectively
procurement process through the ERP system, (b) hourly labors properly allocated
and monitored through the ERP system, (c) incorporation of project budget in the
Using these findings revealed the importance of using an advanced ERP system in
the contracting companies to be able to incorporate and monitor the project budget
properly. Using these findings confirmed the literature review regarding the impact of
consequences of the future events (Tunçez, 2015). Further, the budget of the contracting
projects has a direct effect on the revenue recognition. Moreover, the substantial issue in
the accounting practice of the contracting and construction field is to know how to
recognize the revenues and allocate expenses within the scope of a contract (Tunçez,
114
2015). When the ends, and uncertainties resolve, management reviews estimated
compared to actuals revenues and adjusts the records accordingly (Tunçez, 2015). Thus,
unintentional error at the highest level in the financial statements since the finance
the contracting revenue recognition. Using the findings from this study revealed the
generating accurate financial reports. All participants indicated that they applied the
2018, management has to follow IFRS 15, which is a new accounting standard related to
contracting revenue recognition, this new accounting standard replaces the IAS 11
(IFRSc, 2015). Nevertheless, PFM1, PFM2, and PFM3 acknowledged that there is no
significant difference in the contracting revenue recognition calculation between the IAS
11 and IFRS 15. Both methods rely on the project budget and cost incurred to recognize
the revenue or cost-to-cost method. IFRS (2015c) indicated that input method applies to
measure the progress of the project work. Input method includes cost incurred, and total
The input method depends on the budget to recognize the revenue, and the
management assumption is the basis to measure the progress of the contracting project.
The project budget costs of both, the percentage of completion method, and input method
are the same costs and detailed as follows: (a) direct labor, (b) direct materials; (c)
115
subcontractor costs, (d) allocations of costs related directly to contract activities, if those
depict the transfer of control to the customer, (e) costs explicitly chargeable to the
customer under the contract, and (f) other costs incurred solely due to the contract.
PAM1, PFM2, and PFM1 stated that there is an immaterial difference between these two
accounting standards regarding the inclusive of wasted materials and abnormal amounts
of labor or other costs because these items represent inefficiencies in the entity’s
performance and should be excluded from the measure of progress unless included at the
contract negotiations.
project budget, and incurred cost as of the end of each accounting period. The findings
from this study confirmed the conceptual framework and extended the knowledge in the
literature review regarding IFRS 15. Also, Huefner (2015) stated that companies should
ensure that the following points are met to be able to recognize the revenue (a) identify
the contract with the client, (b) identify the performance obligations in the contract, (c)
determine the transaction price, (d) allocate the transaction price to the performance
obligation in the contract, (e) recognize revenue when (or as) an entity satisfies a
performance obligation. Hence as stated by PAM1, “the substance of the two accounting
standards is the same; however, there are new measurements regarding the form of the
contract that management should consider before signing the contract to be able to meet
To ensure data credibility and to validate the findings, I reviewed the financial
statements and project budget of the companies. I was able to check the notes, which are
an integral part of the financial statements, and validate the percentage of completion
116
calculation with the revenue recognition. I noticed that the management stated in the
notes to financial statements that revenue is recognized according to IAS 11, and I
noticed that in the notes, the management disclosed and met the classification and
disclosure of IFRS. I also reviewed the budgets of the projects, compared the figures of
the signed budgets with the figures appearing in the notes to the financial statements, and
documented improvements in the budget calculation the management exercised from the
year 2014 till the date of the last audited financial statements. I also compared the current
with previous projects budgets and noticed an immaterial difference between the amounts
The importance of assessing the risk of the contract and monitor the
implementation phase was prominent in interviews with all participants. Croitoru (2014)
stressed in assessing risk; management would have to evaluate the adequacy of internal
controls and ensure the proper use of business resources. PFM2 stated, “we focus, and we
regularly monitor the costing of the project with the actual figures the company incur
through the implementation process.” The project budget is the platform that enables us
to monitor and prevent any deficiency in the internal control or any financial statement
Continuous monitoring starts by the following stages: (a) client request and bill of
comparing the price list of the suppliers and sub-contractors, (e) approving the
final price of the suppliers and sub-contractors by the authorized managers, (f)
management should ensure that all the costs and expenses related directly or
117
indirectly to the projects are considered in the calculation of the project budget,
(g) putting a certain profit margin by the top management, and finally (e) signing
the agreement.
PCCM1 indicated, “we are monitoring the daily activities properly in the projects,
and the managers at sites schedule a weekly meeting to see the progress of the project.”
Managers regularly monitor the internal control process through a regular review to be
able to ensure its effectiveness. Also, the internal auditor department is regularly doing
spot checks to ensure that the processes are effective at the group level. Management
to ensure whether relevant authorized employees and managers adhere to the policies and
procedures.
PAM1 and PCCM1 emphasized the risk assessment process when initiating the
the contract based on the (a) relationship history with the client, (b) origin of the client
(local/ foreign), (c) financial stability of the client, or creditworthiness, and (e) nature of
the contract.” Using the findings from this study revealed the importance of selecting the
appropriate clients, doing a proper risk assessment before signing any contract to be able
The findings from this study are relevant to improved business practice in that the
controls for recognizing contracting revenues. Business leaders responsible for financial
reporting will benefit from this study as they develop and implement effective internal
controls for recognizing contracting revenues. The specific business problem is that some
business leaders responsible for financial reporting lack strategies to develop and
implement effective internal controls for recognizing contracting revenues. The results of
this study can provide business leaders of private contracting companies with information
business sustainability and prevent financial statements manipulation. Hari (2016) posited
that well designed internal controls provide reasonable assurance concerning the
ignore it, the organization tends to lose power over the corporate governance of the entire
entity (Tak, 2014). Mukhina (2015) acknowledged the importance of internal control to
the growth and success of businesses. Using the results of this study can provide business
leaders of contracting companies with information on (a) how to make internal control
more stringent, (b) improve the corporate governance, and (c) identify the importance of
using advanced ERP system, which enables them to incorporate project budget, monitor
it, ensure internal control effectiveness, and sustain profitability in the projects. Ensuring
manipulation. Business leaders of small businesses can adopt cultures that discourage
employees and managers irregularities, through the proper recruitment process, and the
119
implementation of strong internal controls (Frazer, 2016). The findings from this study
concurred the conceptual framework and literature review because business leaders in the
contracting companies can use the COSO framework to understand the components that
ensure internal control effectiveness over the entire organization. Business leaders can
use the conceptual framework to understand why the effectiveness of internal controls is
critical, the impact of good corporate governance over the stakeholders, effective
monitoring, and risk assessment over the project budget that lead to generate accurate
revenue recognition and mitigate the risk of financial statements manipulation. Using the
results from this study would provide professional practice of business, business leaders
Society could benefit from the results of this study because private contracting
Haupt, 2015). Kasztelnik (2015) noted that there is a significant increase in the value
Standards (IFRS) along with an increase in the value relevance of accruals. Thus, the
results of this study could contribute positively to social change by enhancing financial
statement reliability. Financial statement reliability can lead to increased access to capital
and debt financing, which may increase business opportunities and improve employment
Business leaders could benefit from the findings of this study and adopt good
corporate governance, which leads to treating the employees and other stakeholders
properly, improving their knowledge and experience through regular training and
coaching, and keep their morale up and motivated. This process will have a positive
impact on the internal control processes, which in turn mitigate the financial statements
spending.
The findings of this study led to some recommendations for action for business
leaders of contracting companies to develop and implement adequate internal controls for
recognizing contracting revenues. Other individuals who need to pay attention to the
results of this study include potential business leaders such as finance managers,
accounting managers, estimation managers, cost control managers, CEO, CFO, and
project managers, who all manage and run the operation of contracting companies and
interfere in the project budget calculation. Some of the recommendations derived from
companies.
121
2. Business leaders might gain knowledge on the importance of enforcing the
ensuring good corporate governance, and tone-at-the top (b) ensuring the
efficiency of monitoring.
3. Management has to develop a control framework and then educate and coach
4. Management should make sure that the employees and managers in the
financial statements.
15.
6. Hiring people who have experience and knowledge in the ERP system and
accounting standards will enforce the understanding of the entire cycles and
7. Management should also ensure that costing and estimating a new project
project budget all the costs, direct such as labor and materials, overhead
ensure that project will not incur losses but instead, will generate profit.
9. Although internal policies and procedures are effective, the policies may not
and monitor project budget, (c) gain knowledge of the new accounting
standards, (d) sustain the business of the companies, and (e) mitigate financial
statements manipulation.
Disseminating the findings from this study in conferences, such as the annual
spotlight the importance of internal control over the contracting revenue recognition.
training programs that cover what constitutes a weakness of internal control over the
contracting revenue recognition, its effect, the effect of the project budget on the revenue
recognition, and how to report unusual activities. Management should tailor COSO
The purpose of this qualitative multiple case study was to explore strategies
business leaders responsible for financial reporting use to develop and implement
effective internal controls for recognizing contracting revenues. Using the findings from
this study and as a foundation for future research, researchers could entail a deeper look
at best practice in exploring other strategies not covered in this study that managers could
use to ensure the effectiveness of internal control over contracting revenue recognition.
Business leaders of contracting companies can also benefit from a further study on how
to mitigate financial statements manipulation and apply an effective and efficient project
Qatar. Further research may expand the geographical location outside Qatar. It was
noticeable during the data collection process that participants underestimated the effect of
ineffective internal controls and advanced ERP system on the contracting revenue
Reflections
reporting use to develop and implement effective internal controls for recognizing
values, I refrained from personal bias by not offering any opinion or any information that
124
might influence the interview. Hence, I used an interview protocol to stay on track, and
avoid any possible bias and ensured that I treated each participant the same without any
preconceived ideas.
It was unusual to see how hard the participants work to ensure business
sustainability and maintain profitability in the companies. They acknowledged that the
their work in their organizations. The participants were passionate and thrilled about what
they do and willing to participate in the study and share their experiences on
contracting revenue recognition. After completing the study, I gained substantial insight
revenue recognition. The research experience has been invaluable. I discovered the value
of research and how to integrate processes in a research study. I have learned research
organization, data analysis, reliability, validity, and complying with ethical standards in
research. I also learned how to interview, transcribe, member-check, and code data. I
believe the experiences from this research study have better prepared me for future
research challenges. Using the findings from this study could provide business leaders of
contracting revenues.
125
Conclusion
develop and implement effective internal controls for recognizing contracting revenues.
The purpose of this qualitative multiple case study was to explore strategies business
leaders responsible for financial reporting use to develop and implement effective
internal controls for recognizing contracting revenues. The conceptual framework for this
study was the COSO framework. The data collection methods I used included supporting
The five main emerging themes from data collection included (a) control
environment, (b) control activities, (c) systemized project budget, (d) accounting
standards compliance, and (e) risk assessment and monitoring. The implications for
statement reliability can lead to increased access to capital and debt financing, which may
the financial statements and enable investors to make appropriate business decisions,
catalyzing economic growth through capital spending. Using the findings from this study
revealed (a) the need for business leaders of contracting companies to employ strategies
revenues, (b) help potential and existing business leaders of contracting companies
Abdullah, A. B. M., Murad, W., & Hasan, M. (2014). A decision dynamic model of cost
doi:10.1353/jda.2015.0023
Adams, D. P., & Miles, T. P. (2013). The application of Belmont Report principles to
doi:10.3928/00989134-20131028-07
Adedokun, O. A., Ogunsemi, D. R., Aje, I. O., Awodele O. A., & Dairo, D. O. (2013).
doi:10.1108/14725961311314615
0136
Allen, C., Schetzsle, S., Mallin, M. L., & Ellen, B. P. (2014). Intergenerational recruiting:
Altheebeh, Z. A., & Sulaiman, M. T. (2016). Impact on internal control system according
http://irmbrjournal.com/index.php
128
Andersen, K. G., Christensen, K. B., Kehlet, H., & Bidstup, P. E. (2015). The effect of
Aziz, N. A. A., Manab, N. A., & Othman, S. N. (2016). Sustainability Risk Management
doi:10.18488/journal.11/2016.5.1/11.1.1.10
Ball, R. (2013). Accounting informs investors and earnings management is rife: Two
doi:10.2139/ssrn.2211288
Barazzetti, G., Hurst, S. A., & Mauron, A. (2016). Adapting preclinical benchmarks for
60-79. doi:10.1016/j.techfore.2013.10.022
129
Bendickson, J., Muldoon, J., Liguori, E., & Davis, P. E. (2016). Agency theory: The
02-2015-0058
Berchowitz, G., & Whitehead, S. (2014, July 1). IFRS 15: Revenue recognition will
http://www.accountancysa.org.za/
Berger, R. (2015). Now I see it, now I don’t: Researcher’s position and reflexivity in
doi:10.1177/1468794112468475
Bowden, C., & Galindo-Gonzalez, S. (2015). Interviewing when you’re not face-to-face:
/Journals/IJDS/
Brandburg, G. L., Symes, L., Mastel‐Smith, B., Hersch, G., & Walsh, T. (2013). Resident
Brant, E. C., Steven, M. G., & Christopher, J. W. (2014). Do critical audit matter
Braun, V., Clarke, V., & Terry, G. (2014). Thematic analysis. Qualitative Research
130
Clinical Health Psychology, 2, 95-114. doi:10.1037/13620-004
doi:10.1177/0266242614542853
Burau, V., & Andersen, L. B. (2014). Professions and professionals: Capturing the
Cameran, M., Campa, D., & Pettinicchio, A. (2014). IFRS adoption among private
Cardamone, A. S., Eboli, L., & Mazzulla, G. (2014). Drivers’ road accident risk
Carter, N., Bryant-Lukosius, D., DiCenso, A., Blythe, J., & Neville, A. J. (2014). The use
doi:10.1188/14.ONF.545-547
131
Celenk, H. (2013). The view of the members of accountancy profession on ethical
behavior and the effect of tax payers on displaying ethical behavior: A qualitative
Chen, K., Lei, H., Li, G., Huang, W., & Mu, L. (2014). Cash incentives improve
Chen, T. (2016). Internal control, life cycle and earnings quality—An empirical analysis
doi:10.4236/ojbm.2016.42032
Chenhall, R. H., & Moers, F. (2015). The role of innovation in the evolution of
Choi, Y., Ye, X., Zhao, L., & Luo, A. C. (2016). Optimizing enterprise risk management:
A literature review and critical analysis of the work of Wu and Olson. Annals of
Chung, J., & McCracken, S. (2014). Understanding the restatement process. Accounting
Cleary, M., Horsfall, J., & Hayter, M. (2014). Data collection and sampling in qualitative
doi:10.1111/jan.12163
132
Committee of Sponsoring Organizations of the Treadway Commission. (1992). Internal
bin/WebObjects/MSNJournal.woa
Cox, S. M., & McDonald, M. (2013). Ethics is for human subjects too: Participant
224-231. doi:10.1016/j.socscimed.2013.09.015
Cridland, E. K., Jones, S. C., Caputi, P., & Magee, C. A. (2015). Qualitative research
Croitoru, I. (2014). Operational risk management and monitoring. Internal Auditing &
http://www.univath.ro/aimr/content/home
Cronin, C. (2014). Using case study research as a rigorous form of inquiry. Nurse
Daniel, J. (2012). Sampling essentials: Practical guidelines for making sampling choices.
De Massis, A., & Kotlar, J. (2014). The case study method in family business research:
29. doi:10.1016/j.jfbs.2014.01.007
De Waal, A. A., Goedegebuure, R., Tan Akaraborworn, C. (2014). Adapting the high
Denzin, N. K., & Lincoln, Y. S. (2011). The Sage handbook of qualitative research (4th
Derobertmasure, A., & Robertson, J. E. (2014). Data analysis in the context of teacher
training: Code sequence analysis using QDA miner (R). Quality and Quantity, 48,
2255-2276. doi:10.1007/s11135-013-9890-9
sheet and the cash flow statement. Ekonomski Horizonti, 17, 135-150.
doi:10.5937/ekonhor1502137d
Donelson, D. C., Ege, M., & McInnis, J. M. (2015). Internal control weaknesses and
doi:10.2139/ssrn.2449287
Doody, O., & Noonan, M. (2013). Preparing and conducting interviews to collect
Edmonds, C. T., Edmonds, J. E., Leece, R. D., & Vermeer, T. E. (2015). Do risk
Elbardan, H., Ali, M., & Ghoneim, A. (2015). The dilemma of internal audit function
Ellis, T. J., & Levy, Y. (2009). Towards a guide for novice researchers on research
http://www.informingscience.org/
Elo, S., Kääriäinen, M., Kanste, O., Pölkki, T., Utriainen, K., & Kyngäs, H. (2014).
doi:10.1177/2158244014522633
Elshafie, E., & Nyadroh, E. (2014). Are discretionary accruals a good measure of audit
quality? Journal of Management Policy & Practice, 15(2), 43-59. Retrieved from
http://jmppnet.com/
Fang, J. (2016). The risk assessment method based on multi-attribute fuzzy decision-
Feng, M., Li, C., McVay, S. E., & Skaife, H. (2014). Does ineffective internal control
over financial reporting affect a firm's operations? Evidence from firms' inventory
Figgins, S. G., Smith, M. J., Sellars, C. N., Greenlees, I. A., & Knight, C. J. (2016). You
experiences of being inspired in sport. Psychology of Sport and Exercise, 24, 82-
91. doi:10.1016/j.psychsport.2016.01.011
Flood (2017). ASC 606 revenue from contracts with customers. Wiley GAAP 2017‐
706. doi:10.1002/9781119357032.ch38
Frich, J. C., Røthing, M., & Berge, A. R. (2014). Participants’, caregivers’, and
8. doi:10.1186/1472-6963-14-395
Funder, D., Levine, J., Mackie, D., Morf, C., Sansone, C., Vazire, S., & West, S. (2013).
Griffith, E. E., Hammersley, J. S., Kadous, K., & Young, D. (2015). Auditor mindsets
doi:10.1111/1475-679x.12066
Gülmez, M., Sağtaş, S., & Kahyaoğlu, D. Y. (2016). The effects of technoparks on
absorptive capacity and the role of gatekeepers in this process. Cag University
http://www.cag.edu.tr/en/arama
Guo, X., & Guo, X. (2016). A panel data analysis of the relationship between air
Guo, J., Huang, P., Zhang, Y., & Zhou, N. (2015). The Effect of employee treatment
doi:10.1504/ijaape.2016.073891
Hanson, J., Balmer, D., & Giardino, A. (2011). Qualitative research methods for medical
Hari, S. (2016). Effect of weaknesses of the internal control systems and noncompliance
with statutory provisions on the audit opinion of the audit board of the republic of
Harper, M., & Cole, P. (2012). Member checking: Can benefits be gained similar to
http://tqr.nova.edu/
doi:10.1080/1743727X.2014.914487
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015).
The rise of “big data” on cloud computing: Review and open research issues.
Ho, Z. J.-Y. (2012). What makes hotel expatriates remain in their overseas assignments:
A grounded theory study. The Qualitative Report, 17, 1-22. Retrieved from
http://tqr.nova.edu/
Houghton, C., Casey, D., Shaw, D., & Murphy, K. (2013). Rigour in qualitative case-
doi:10.7748/nr2013.03.20.4.12.e326
doi:10.1057/rpm.2015.45
Hussein, A. (2015). The use of triangulation in social sciences research: Can qualitative
International Financial Reporting Standards. (2015c). IFRS 15: Revenue from contracts
http://www.ifrs.org/
Irvine, A., Drew, P., & Sainsbury, R. (2013). ‘Am I not answering your questions
doi:10.1177/1468794112439086
Jahmani, Y., Ansari, M. I., & Dowling, W. (2014). Testing for internal control
doi:10.5296/jmr.v7i5.8379
Jarkas, A. M., & Haupt, T. C. (2015). Major construction risk factors considered by
165-194. doi:10.1108/jedt-03-2014-0012
Joslin, R., & Müller, R. (2016). Identifying interesting project phenomena using
140
philosophical and methodological triangulation. International Journal of Project
Kacmar, K. M., & Tucker, R. (2014). The moderating effect of supervisor’s behavioral
Kapić, J., & Bašić, M. (2013). Accounting policies and accounting estimates for the
http://www.finconsult.ba/
Karanja, E., Zaveri, J., & Ahmed, A. (2013). How do MIS researchers handle missing
doi:10.5430/afr.v4n3p88
Kehinde, J. S. (2015). Asset protection and financial statement fraud: The audit and
Ketokivi, M., & Choi, T. (2014). Renaissance of case research as a scientific method.
Kirkwood, A., & Price, L. (2013). Examining some assumptions and limitations of
doi:10.1111/bjet.12049
Korhonen, J. J. (2014). Big data: Big deal for organization design? Journal of
Kornhaber, R. A., de Jong, A. E. E., &, McLean, L. (2015). Rigorous, robust and
doi:10.4172/2168-9601.1000141
Lail, B., MacGregor, J., Stuebs, M., & Thomasson, T. (2015). The influence of regulatory
doi:10.1007/s10551-013-1992-8
Lakis, V., & Giriunas, L. (2012). The concept of internal control system: Theoretical
Länsiluoto, A., Jokipii, A., & Eklund, T. (2016). Internal control effectiveness–a
2013-0910
Laxman, S., Randles, R., & Nair, A. (2014). The fight against fraud: internal auditors can
http://www.theiia.org/intauditor/
Leedy, P. D., & Ormrod, J. E. (2013). Practical research: Planning and design (10th
Leins, D. A., Fisher, R. P., Pludwinski, L., Rivard, J., & Robertson, B. (2014). Interview
http://onlinelibrary.wiley.com
Lenard, M. J., Petruska, K. A., Alam, P., & Yu, B. (2016). Internal control weaknesses
doi:10.1016/j.adiac.2016.04.008
Li, H. (2015). Managerial ability and internal control quality: Evidence from
doi:10.5430/ijfr.v6n2p54
Lin, S., Pizzini, M., Vargus, M., & Bardhan, I. R. (2011). The role of the internal audit
287-323. doi:10.2308/accr.00000016
Lin, Y. C., Wang, Y. C., Chiou, J. R., & Huang, H. W. (2014). CEO characteristics and
42. doi:10.1111/corg.12042
143
Lu, P., Guo, S., Qian, L., He, P., & Xu, X. (2015). The effectiveness of contractual and
Mafrolla, E., Matozza, F., & D'Amico, E. (2016). Enterprise risk management in private
Maghariee, A., Neghabi, Z., & Abdi, R. (2015). Application of accrual accounting in Iran
doi:10.5267/j.msl.2015.1.013
doi:10.1016/j.evalprogplan.2015.07.008
Malaj, A., & Shuli, I. (2015). Problems and challenges facing today's construction sector
doi:10.5901/ajis.2015.v4n3s1p572
Malone, H., Nicholl, H., & Tracey, C. (2014). Awareness and minimization of systematic
http://www.magonlinelibrary.com/
Mandzila, E. E. W., & Zeghal, D. (2016). Content analysis of board reports on corporate
doi:10.19030/jabr.v32i3.9668
144
Marchetti, M. A. (2005). Beyond Sarbanes-Oxley compliance effective enterprise risk
Marshall, C., & Rossman, G. B. (2016). Designing qualitative research (6th ed.).
Martin, K., Sanders, E., & Scalan, G. (2014). The potential impact of COSO internal
doi:10.1016/j.racreg.2014.02.012
McCarthy, M., & McCarthy, R. (2014). Financial statement preparers' revenue decisions:
recognition model. Journal of Accounting and Finance, 14, 21-43. Retrieved from
http://www.na-businesspress.com/jafopen.html
Ministry of Finance. (2015). Law no. 21 of the year 2009 issuing the income tax law.
Morse, J. M. (2015). “Data were saturated...” Qualitative Health Research, 25, 587-588.
doi:10.1177/1049732315576699
doi:10.5539/ass.v11n8p58
from https://ajba.um.edu.my/
Mustapha, M., & Adnan, A. (2015). A Case study of enterprise risk management
http://www.econjournals.com/
Mutchler, M. G., McKay, T., McDavitt, B., & Gordon, K. K. (2013). Using peer
ethnography to address health disparities among young urban. Black and Latino
men who have sex with men. American Journal of Public Health, 103, 849-852.
doi:10.2105/ajph.2012.300988
http://gdeb.weebly.com/
Noble, H., & Smith, J. (2015). Issues of validity and reliability in qualitative research.
(Doctoral dissertation). Available from Dissertations & Full Text database. (UMI
No. 3599993)
http://www.mnje.com/
Onwuegbuzie, A. J., & Byers, V. T. (2014). An exemplar for combining the collection,
doi:10.5296/ije.v6i1.4399
position: A framework for candidates for asking for asking question during the
doi:10.5296/ije.v6i2.4424
Palinkas, L. A., Horwitz, S. M., Green, C. A., Wisdom, J. P., Duan, N., & Hoagwood, K.
(2015). Purposeful sampling for qualitative data collection and analysis in mixed
147
method implementation research. Administration and Policy in Mental Health and
0013
Pascoal, P. M., Narciso, I. B., & Pereira, N. M. (2014). What is sexual satisfaction?
Thematic analysis of lay people's definitions. Journal of Sex Research, 51(1), 22-
30. doi:10.1080/00224499.2013.815149
Public Company Accounting Oversight Board. (2015, July). Concept release on audit
Petty, N. J., Thomson, O. P., & Stew, G. (2012). Ready for a paradigm shift? Part 1:
doi:10.1016/j.math.2012.03.006
doi:10.1007/s11136-014-0632-9
Prabowo, H., Jap, T., & Agoes, S. (2015). Is there a correlation between ERP
http://www.jatit.org/
Quadackers, L., Groot, T., & Wright, A. (2014). Auditors’ professional skepticism:
639-657. doi:10.1111/1911-3846.120
148
Rahman, R. A., Sulaiman, S., Fadel, E. S., & Kazemian, S. (2016). Earnings management
doi:10.2308/acch-50291
Ritchie, J., Lewis, J., Nicholls, C. M., & Ormston, R. (2013). Qualitative research
practice: A guide to social science students and researchers. Thousand Oaks, CA:
Sage.
Rittenberg, L. E. (2013). COSO 2013 a reflection of the times: The long-awaited Internal
and implement controls, with an eye toward today's business challenges. Internal
Rose, M., Sarjoo, P., & Bennett, K. (2015). A boost to fraud risk assessments: Reviews
http://www.theiia.org/intauditor/
Roussy, M. (2013). Internal auditors’ roles: From watchdogs to helpers and protectors of
doi:10.1016/j.cpa.2013.08.004
Rubino, M., & Vitolla, F. (2014). Internal control over financial reporting: Opportunities
doi:10.1108/maj-03-2014-1016
Rubino, M., Vitolla, F., & Garzoni, A. (2017). The impact of an IT governance
Scheibe, M., Reichelt, J., Bellmann, M., & Kirch, W. (2015). Acceptance factors of
Shao, B.-l., Bian, G.-q., & Zhang, W.-q. (2013). The method of distribute data storage
doi:10.1016/j.aasri.2013.10.067
education and the social sciences. New York, NY: Teachers College Press.
doi:10.7748/nr.22.1.20.e1277
150
Sepasgozar, S. M., Razkenari, M. A., & Barati, K. (2015). The importance of new
Silviu, C. (2014). The Importance of the accounting information for the decisional
http://anale.steconomiceuoradea.ro/en/
Sotiriadou, P., Brouwers, J., & Le, T. (2014). Choosing a qualitative data analysis tool: A
doi:10.1080/11745398.2014.902292
Sowman, M., Sunde, J., Raemaekers, S., & Schultz, O. (2014). Fishing for equality:
Policy for poverty alleviation for South Africa's small-scale fisheries. Marine
doi:10.1007/s11142-013-9263-6
Streaser, S., Sun, K. J., Zaldivar, I. P., & Zhang, R. (2014). Summary of the new FASB
and IASB revenue recognition standards. Review of Business, 35, 7-15. Retrieved
from http://www.stjohns.edu/academics/schools-and-colleges/peter-j-tobin-
college-business/about/review-business-journal
151
Strnad, M. A. (2013). Recommended skill requirement of recent management information
dissertation). Available from Dissertations & Full Text database. (UMI No.
3576351)
Szolnoki, G., & Hoffman, D. (2013). Online, face-to-face and telephone surveys:
Tak, I. (2014). The importance of the internal control in detecting errors and frauds on
Teruel, M. A., Navarro, E., González, P., López-Jaquero, V., & Montero, F. (2016).
doi:10.1016/j.infsof.2016.01.009
Trotter, R. T. (2012). Qualitative research sample design and sample size: Resolving and
unresolved issues and inferential imperatives. Preventive Medicine, 55, 398- 400.
doi:10.1016/j.ypmed.2012.07.003
186. doi:10.1016/j.jsis.2013.09.002
100. doi:10.17364/iib.20151912615
152
Urbanik, V. (2016). Making internal control a priority in local government. Journal of
https://www.agacgfm.org/Research-Publications/Journal.aspx
U.S. Department of Health and Human Services. (1979). The Belmont report: Ethical
Van Dijk, J., Vervoort, S., van Wijk, A., Kalkman, C., & Schuurmans, M. (2015).
Vandervelde, S., Brazel, J., Jones, K., & Walker, P. (2012). Comments by the auditing
doi:10.2308/ciia-50180
Venkatesh, V., Brown, S., & Bala, H. (2013). Bridging the qualitative-quantitative
doi:10.1080/00014788.2014.897867
Wang, D., Xiang, Z., & Fesenmaier, D. R. (2014). Adapting to the mobile world: A
doi:10.1016/j.annals.2014.04.008
153
Wang, Y., & Yu, X. (2015). The Impact of internal control quality in engineering projects
Westerman, D., Spence, P. R., & Van Der Heide, B. (2014). Social media as information
White, J., & Drew, S. (2011). Collecting data or creating meaning? Qualitative Research
doi:10.1016/j.jaccpubpol.2015.12.006
Wisutteewong, G., & Rompho, N. (2015). Linking balanced scorecard and COSO ERM
Whicher, D. M., Miller, J. E., Dunham, K. M., & Joffe, S. (2015). Gatekeepers for
doi:10.1177/1740774515597699
Wójcik, D. (2013). Where governance fails: Advanced business services and the offshore
doi:10.1177/0309132512460904
154
Yin, L. (2014). The relevance of accounting to micro and small scale
Yin, R. K. (2014). Case study research: Design and methods (5th ed.). Thousand Oaks,
CA: Sage.
Ying, Y. (2016). Internal control information disclosure quality, agency cost and earnings
64-70. doi:10.4236/me.2016.71007
Zalata, A., & Roberts, C. (2016). Internal corporate governance and classification shifting
doi:10.1177/0148558X15571736
doi:10.4314/mmj.v27il.4
Zhao, X., Hwang, B. G., & Low, S. P. (2015). Enterprise risk management in
2014-0117
155
Appendix A: Interview Protocol
Interview: Finding out about what strategies do business leaders use to develop and
1. I will contact the participants by telephone, e-mail, or meeting with them for
2. I will begin the interviews by thanking the participants for their approvals to
participate in the interview. Afterward, I will make sure I introduce myself and
3. I will explain the participants the voluntary nature to participate and the
4. I will obtain consent from the participants, and afterward, I will give a copy of the
5. I will inform participants of the interview procedures, which involves the use of
questions including any follow-up question, and I will mail a thank-you card to
7. I will inform participants that I will make the transcribed interviews available to
them via email to ensure member checking validation and accuracy of their
responses.
8. At the end of the interviews, I will thank the participants for agreeing to take part
Based on my review of your research proposal, I give permission for you to conduct the
study entitled Effective Internal Controls for Recognizing Contracting Revenues in Qatar.
As part of this study, I authorize you to select from a sample of business leaders within
our firm to conduct interviews for data collection. Once you have completed your
interviews, you may conduct member checking interviews allowing the participants to
review your interpretive report of each interview. You have permission to take notes and
audio record the interviews at your discretion. you are also permitted to use the results of
the interviews to complete your case study and to share the information with the
committee members at Walden University. Individuals’ participation will be voluntary
and at their own discretion.
I understand that the student will not be naming our organization in the doctoral project
report that is published in Proquest.
I confirm that I am authorized to approve research in this setting and that this plan
complies with the organization’s policies.
I understand that the data collected will remain entirely confidential and may not be
provided to anyone outside of the student’s supervising faculty/staff without permission
from the Walden University IRB.
Sincerely,
<Authorization Official>
<Contact Information>
157
Appendix C: Invitation to Participate
<Date>
<Address Block>
strategies business leaders responsible for financial reporting use to develop and
select you as potential participants to participate in my doctoral study because you have
sufficient experience and knowledge in the area of my research. I want you to make sure
that your participation in the study is voluntary and confidential and you can withdraw at
your discretion. Enclosed is an informed consent form. I request that you read the consent
form and ask any questions for further clarification before making any decision to accept
estimation managers, and cost control managers, (b) more than 5 years professional and
have developed and implemented internal control strategies over revenue recognition.
If you meet these criteria, kindly notify me via mobile +974 66443556 or e-mail
I will contact you again via phone call to schedule the interview. The interview,
158
which will last for about 30 minutes involves 8 open-ended questions and will be audio
recorded and transcribed. To ensure privacy, the location will be coordinated before the
interview at your convenience. I will provide you with the opportunity to conduct a
Sincerely,
Respectfully,
Antonio Ghaleb
Doctoral candidate
2. What strategies have you used to ensure that the internal controls are
3. What are the key strategies managers use to develop and implement
4. How do you assess the effectiveness of the strategies for using your budget as
5. How did you address the barriers to implementing the strategies for using
controls?
6. How does the accounting team validate the reliability and accuracy of revenue
7. How does management adapt the internal control system for recognizing
contracting revenues?
8. What else would you like to share about your experiences on the effectiveness
Certificate of Completion
The National Institutes of Health (NIH) Office of Extramural Research
certifies that Antonio Ghaleb successfully completed the NIH Web-based
training course “Protecting Human Research Participants”.