<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-3108</journal-id>
<journal-title><![CDATA[Revista Criminalidad]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Crim.]]></abbrev-journal-title>
<issn>1794-3108</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-31082019000300279</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Investigación en auditoría forense: Revisión de publicaciones SCOPUS 1976-2018]]></article-title>
<article-title xml:lang="en"><![CDATA[Investigation in forensic audit: Review of SCOPUS publications 1976-2018]]></article-title>
<article-title xml:lang="pt"><![CDATA[Pesquisa em auditoria forense: revisão de publicações SCOPUS 1976-2018]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Velandia-Pacheco]]></surname>
<given-names><![CDATA[Gabriel Jacob]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Escobar-Castillo]]></surname>
<given-names><![CDATA[Adalberto Enrique]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de la Costa CUC  ]]></institution>
<addr-line><![CDATA[Barranquilla ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de la Costa CUC  ]]></institution>
<addr-line><![CDATA[Barranquilla ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<volume>61</volume>
<numero>3</numero>
<fpage>279</fpage>
<lpage>298</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-31082019000300279&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-31082019000300279&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-31082019000300279&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen A pesar del importante impacto del fraude, las investigaciones en auditoría forense se desarrollan de manera fragmentada y dispersa. Por la naturaleza del tema, resulta confuso su estudio. En este sentido, el objetivo es caracterizar el abordaje empírico en auditoría forense que los investigadores han utilizado para estudiar el fraude. La metodología fue la revisión bibliográfica de alcance descriptivo-exploratorio, utilizando la base de datos de SCOPUS. Se determinan los descriptores de búsqueda, organizan y analizan los resultados a la luz de sus características metodológicas; en un proceso de revisión descriptiva, el trabajo se apoya en la lectura crítica para la revisión, ordenación, rotulación, integración y priorización; utilizando perchas y tablas de análisis y síntesis. Los resultados muestran que el estudio del fraude se aborda desde los individuos, documentos, imperfecciones del informe, TIC, educación, innovación en procedimiento, experimentos y simulaciones, sesgos interpretativos del lenguaje y perjuicios del delito. Se concluye que, se adolece de investigaciones tendientes a identificar las razones por las cuales los sujetos deciden no cometer fraudes y se detectó el resarcimiento como un enfoque teórico alternativo.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Despite the significant impact of fraud, forensic audit investigations are conducted in a fragmented and disperse manner. Due to the nature of the subject, its study is confusing. In this sense, the objective is to characterize the empirical approach in forensic audit that investigators have used to study fraud. The methodology was the literatura review of descriptive-exploratory scope, using the SCOPUS database. Search descriptors are determined, organize and analyze the results in light of their methodological characteristics; In a descriptive review process, the work relies on critical reading for review, management, labeling, integration and prioritization; using perches and analysis and synthesis tables. The results show that the study of fraud is approached from individuals, documents, imperfections of the report, ICT, education, innovation in procedure, experiments and simulations, interpretative biases of language and crime detriment. It is concluded that, there is a lack of research aimed at identifying the reasons why the subjects decide not to commit fraud and indemnification was detected as an alternative theoretical approach.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Apesar do importante impacto da fraude, as investigações em auditoria forense são desenvolvidas de maneira fragmentada e dispersa. Pela natureza do tema, resulta confuso o seu estudo. Neste sentido, o objetivo é caracterizar a abordagem empírica em auditoria forense que os pesquisadores têm utilizado para estudar a fraude. A metodologia foi a revisão bibliográfica de alcance descritivo-exploratório, utilizando a base de dados de SCOPUS. Determinam-se os descritores de busca, organizam e anualizam os resultados à luz das suas características metodológicas; num processo de revisão descritiva, o trabalho se baseia na leitura crítica para a revisão, ordenação, rotulação, integração e priorização; utilizando tabelas de análises e sínteses. Os resultados mostram que o estudo da fraude é abordado desde os indivíduos, documentos, imperfeições do informe, TIC, educação, inovação em procedimento, experimentos e simulações, distorções interpretativas do linguaje e prejuízos do delito. Conclui-se que, se sofre de investigações tendentes a identificar as razões pelas quais os sujeitos decidem não cometer fraudes e foi detectado o ressarcimento como um enfoque teórico alternativo.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Fraudes comerciales e industriales]]></kwd>
<kwd lng="es"><![CDATA[forense]]></kwd>
<kwd lng="es"><![CDATA[delitos contra la economía nacional]]></kwd>
<kwd lng="es"><![CDATA[financiero]]></kwd>
<kwd lng="es"><![CDATA[agiotaje]]></kwd>
<kwd lng="en"><![CDATA[Commercial and industrial fraud, forensic]]></kwd>
<kwd lng="en"><![CDATA[crimes against the national economy]]></kwd>
<kwd lng="en"><![CDATA[financial]]></kwd>
<kwd lng="en"><![CDATA[agiotage]]></kwd>
<kwd lng="pt"><![CDATA[Fraudes comerciais e industriais]]></kwd>
<kwd lng="pt"><![CDATA[forense]]></kwd>
<kwd lng="pt"><![CDATA[delitos contra a economia nacional]]></kwd>
<kwd lng="pt"><![CDATA[financeiro]]></kwd>
<kwd lng="pt"><![CDATA[agiotagem]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abdullahi]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mansor]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud prevention initiatives in the Nigerian public sector: Understanding the relationship of fraud incidences and the elements of fraud triangle theory]]></article-title>
<source><![CDATA[Journal of Financial Crime]]></source>
<year>2018</year>
<volume>25</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>527-44</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albrecht]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Albrecht]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Albrecht]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud and corporate executives: Gency, stewardship &amp; broken trust]]></article-title>
<source><![CDATA[Journal of Forensic Accounting]]></source>
<year>2004</year>
<volume>5</volume>
<page-range>109-30</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Apostolou]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassell]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Webber]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forensic expert classification of management fraud risk factors]]></article-title>
<source><![CDATA[Journal of Forensic Accounting]]></source>
<year>2000</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>181-92</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Archibold]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Escobar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vásquez]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La auditoría forense como herramienta de detección de la evasión fiscal]]></article-title>
<source><![CDATA[Revista Visión Contable]]></source>
<year>2015</year>
<volume>13</volume>
<page-range>198-230</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<collab>Association of Certified Fraud Examiners (ACFE)</collab>
<source><![CDATA[Fraud Examiners Manual]]></source>
<year>2019</year>
<publisher-loc><![CDATA[ACFE ]]></publisher-loc>
<publisher-name><![CDATA[United States]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bierstaker]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Brody]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pacini]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Accountants' perceptions regarding fraud detection and prevention methods]]></article-title>
<source><![CDATA[Managerial Auditing Journal]]></source>
<year>2004</year>
<volume>5</volume>
<page-range>520-35</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Botes]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Saadeh]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring evidence to develop a nomenclature for forensic accounting]]></article-title>
<source><![CDATA[Pacific Accounting Review]]></source>
<year>2018</year>
<volume>30</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>135-54</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Calderón]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Auditoría forense. Posibles tendencias de las investigaciones]]></article-title>
<source><![CDATA[Revista Publicando]]></source>
<year>2017</year>
<volume>4</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>383-90</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Camacho]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gallego]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El matrimonio siniestro: Especulación financiera y lavado de dinero]]></article-title>
<source><![CDATA[Inciso]]></source>
<year>2012</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>36-50</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cano]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lugo]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría forense en la investigación criminal del lavado de dinero y activos]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Bogotá, Colombia ]]></publisher-loc>
<publisher-name><![CDATA[ECOE Ediciones]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cañedo]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Montejo]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Scopus: la mayor base de datos de literatura científica arbitrada al alcance de los países subdesarrollados]]></article-title>
<source><![CDATA[Revista Cubana de Información en Ciencias de la Salud]]></source>
<year>2010</year>
<volume>21</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carnes]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gierlasinski]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forensic accounting skills: Will supply finally catch up to demand?]]></article-title>
<source><![CDATA[Managerial Auditing Journal]]></source>
<year>2001</year>
<volume>16</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>378-82</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Tian]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cai]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Operational-Behavior Auditing in Cloud Storage. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering]]></article-title>
<source><![CDATA[LNICST]]></source>
<year>2018</year>
<volume>197</volume>
<page-range>162-72</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Colombo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Honisch]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Delitos en las contrataciones públicas]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Buenos Aires, Argentina ]]></publisher-loc>
<publisher-name><![CDATA[Ad Hoc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cressey]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Criminal Organizations: Its Elementary Forms]]></source>
<year>1972</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Harper &amp; Row publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Da Costa]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wood]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraudes corporativas]]></article-title>
<source><![CDATA[RAE - Revista de Administração de Empresas]]></source>
<year>2012</year>
<volume>52</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>464-72</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<collab>Deloitte Touche Tohmatsu Limited</collab>
<source><![CDATA[Gestionando el riesgo cibernético: Preguntas críticas para la junta directiva y la alta gerencia]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Reino Unido ]]></publisher-loc>
<publisher-name><![CDATA[Deloitte Touche Tohmatsu Limited]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dye]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Propietary and nonpropetary disclosures]]></article-title>
<source><![CDATA[Journal of Business]]></source>
<year>1986</year>
<volume>59</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>331-66</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Estupiñán]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Control interno y fraudes: análisis de informe COSO I, II y III con base en los ciclos transaccionales]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Bogotá, Colombia ]]></publisher-loc>
<publisher-name><![CDATA[Ecoe Ediciones]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Flórez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tableros de control como herramienta especializada: perspectiva desde la auditoría forense]]></article-title>
<source><![CDATA[Cuadernos de Contabilidad]]></source>
<year>2015</year>
<volume>16</volume>
<numero>42</numero>
<issue>42</issue>
<page-range>661-87</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fosenca]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría gubernamental moderna]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Lima, Perú ]]></publisher-loc>
<publisher-name><![CDATA[IICO]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Free]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Looking through the fraud triangle: a review and call for new directions]]></article-title>
<source><![CDATA[Meditari Accountancy Research]]></source>
<year>2015</year>
<volume>23</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>175-96</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gálvez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Revisión bibliográfica: usos y utilidades]]></article-title>
<source><![CDATA[Matronas Profesión]]></source>
<year>2002</year>
<volume>10</volume>
<page-range>25-31</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galvis]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis conductual forense en un caso de delito financiero]]></article-title>
<source><![CDATA[Cuadernos de Contabilidad]]></source>
<year>2008</year>
<volume>9</volume>
<numero>25</numero>
<issue>25</issue>
<page-range>465-86</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[La auditoría forense como producto de los estados financieros aparentes e incompletos]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Guayaquil, Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Estatal de Milagro]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gee]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Button]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[The Financial Cost of Fraud 2018: The latest data from around the world]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Londres, United Kingdom ]]></publisher-loc>
<publisher-name><![CDATA[Crowe Clark Whiteill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría forense: Caso filanbanco]]></source>
<year>2008</year>
<publisher-loc><![CDATA[Guayaquil, Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Politécnica Salesiana]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gorbaneff]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Teoría de la agencia y sus aplicaciones en el mercado]]></article-title>
<source><![CDATA[Revista Innovar]]></source>
<year>2001</year>
<volume>18</volume>
<page-range>37-46</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gottschalk]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluation of Fraud Examinations: The Case of Inappropriate Accounting Practices at Fuji Xerox]]></source>
<year>2019</year>
<edition>1-7</edition>
<publisher-loc><![CDATA[Deviant Behavior ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guirao-Goris]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Olmedo]]></surname>
<given-names><![CDATA[Á.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferrer]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[El artículo de revisión]]></source>
<year>2008</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gutiérrez]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Fraude informático y estafa]]></source>
<year>1991</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Ministerio de Justicia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Baptista]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Metodología de la investigación]]></source>
<year>2014</year>
<edition>Sexta</edition>
<publisher-loc><![CDATA[México DF ]]></publisher-loc>
<publisher-name><![CDATA[McGraw-Hill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hess]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Andiola]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fraud risk brainstorming at tesla motors]]></article-title>
<source><![CDATA[Issues in Accounting Education]]></source>
<year>2018</year>
<volume>33</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>19-34</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hopwood]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Forensic Accounting]]></source>
<year>2008</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[The McGraw-Hill Companies]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huggett]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bustin]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Standardisation and reporting for nucleic acid quantification]]></article-title>
<source><![CDATA[Accreditation and Quality Assurance]]></source>
<year>2011</year>
<volume>16</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>399-405</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ibáñez]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría forense: comprobación de fraudes contables y delitos de cuello blanco en litigios]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Mérida, Venezuela ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de los Andes]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Izquierdo]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La auditoría forense: origen y aproximación como ciencia]]></article-title>
<source><![CDATA[Apuntes Contables]]></source>
<year>2016</year>
<volume>18</volume>
<page-range>185-93</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jensen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Meckling]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Theory of the firm: Managerial behavior, agency costs and ownership structure]]></article-title>
<source><![CDATA[Journal of Financial Economics]]></source>
<year>1976</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>305-60</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jimmy]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gokul]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Jayashankar]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forensic accounting as a white-collar crime detection tool: A study]]></article-title>
<source><![CDATA[Indian Journal of Public Health Research and Development]]></source>
<year>2018</year>
<volume>9</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1978-84</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kemp]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Basic incident response for system administrators]]></article-title>
<source><![CDATA[Network Security]]></source>
<year>2004</year>
<page-range>16-8</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumari-Tiwari]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Debnath]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forensic accounting: a blend of knowledge]]></article-title>
<source><![CDATA[Journal of Financial Regulation and Compliance]]></source>
<year>2017</year>
<volume>25</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>73-85</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leal]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Auditoría forense: los procedimientos del Contador Público en la investigación del fraude corporativo]]></article-title>
<source><![CDATA[Gestión &amp; Sociedad]]></source>
<year>2010</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>141-60</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Procedimientos de una auditoría forense aplicados a la investigación de lavado de dinero u otros activos en el área de créditos de una institución bancaria]]></source>
<year>2008</year>
<publisher-loc><![CDATA[Ciudad de Guatemala, Guatemala ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de San Carlos de Guatemala]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lemieux]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[D-cinema content protection architecture: A primer. SMPTE]]></article-title>
<source><![CDATA[Motion Imaging Journal]]></source>
<year>2007</year>
<volume>116</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>74-9</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El triángulo del fraude]]></article-title>
<source><![CDATA[Forum Empresarial]]></source>
<year>2012</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>65-81</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maldonado]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría forense: prevención e investigación de la corrupción financiera]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Quito, Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Editora Luz de América]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mantilla]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría del control interno]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Bogotá ]]></publisher-loc>
<publisher-name><![CDATA[Ecoe Ediciones]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matheus]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[La auditoría forense como herramienta de control de la corrupción en entes gubernamentales]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Barquisimeto, Venezuela ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Centroccidental Lisandro Alvarado]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mendoza]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detección del fraude en una auditoría de estados financieros]]></article-title>
<source><![CDATA[Perspectivas]]></source>
<year>2009</year>
<volume>24</volume>
<page-range>227-42</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[García-López]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Neuropsicología forense, una aportación al sistema de justicia en México]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2017</year>
<volume>59</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>163-81</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moreno]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[El fraude en el pago de la contribución industrial y de comercio en España: el caso de los harineros, 1845-1907]]></source>
<year>2018</year>
<publisher-name><![CDATA[Investigaciones de Historia Económica, In Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ocampo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Trejellos]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Solarte]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las técnicas forenses y la auditoría]]></article-title>
<source><![CDATA[Scientia et Technica]]></source>
<year>2010</year>
<volume>16</volume>
<numero>45</numero>
<issue>45</issue>
<page-range>108-13</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Okoye]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gbegi]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forensic Accounting : A Tool for Fraud Detection and Prevention in the Public Sector. (A Study of Selected Ministries in Kogi State)]]></article-title>
<source><![CDATA[International Journal of Academic Research in Business and Social Science]]></source>
<year>2013</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peña]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Pirela]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[La complejidad del análisis documental. Información, Cultura y Sociedad]]></source>
<year>2007</year>
<edition>16</edition>
<page-range>55-81</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ranson]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ibrahim]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Geriatric forensic medicine - A specialty that can no longer wait to be realised]]></article-title>
<source><![CDATA[Journal of Law and Medicine]]></source>
<year>2018</year>
<volume>26</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>39-43</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rezaee]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
</person-group>
<source><![CDATA[Financial Statement Fraud-Prevention and Detection]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Hoboken ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Gil]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Metodología de la investigación cualitativa]]></source>
<year>1999</year>
<publisher-loc><![CDATA[Málaga ]]></publisher-loc>
<publisher-name><![CDATA[Ediciones Aljibe]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roldán]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Chavarría]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría forense]]></source>
<year>2005</year>
<publisher-loc><![CDATA[San José, Costa Rica ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Estatal a Distancia EUNED]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ross]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[The economic theory of agency: The principal´s problem]]></source>
<year>1973</year>
<volume>63</volume>
<page-range>134-9</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rozas]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Auditoría forense. Quipukamayoc]]></article-title>
<source><![CDATA[Revista de la Facultad de Ciencias Contables]]></source>
<year>2009</year>
<volume>16</volume>
<numero>32</numero>
<issue>32</issue>
<page-range>73-101</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Toro-Alava]]></surname>
<given-names><![CDATA[Wilson]]></given-names>
</name>
<name>
<surname><![CDATA[Reyes-Tomalá]]></surname>
<given-names><![CDATA[Mariela]]></given-names>
</name>
<name>
<surname><![CDATA[Arriaga-Baidal]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Espinoza-Mendoza]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La auditoría forense como herramienta en la detección de delitos de cuello blanco]]></article-title>
<source><![CDATA[Revista de Estrategias del Desarrollo Empresarial]]></source>
<year>2017</year>
<volume>3</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="">
<collab>Transparency International</collab>
<source><![CDATA[Corruption Perceptions INDEX 2017]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Urbina]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría de fraudes en el sector financiero privado periodo 2000-2003]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Guayaquil, Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Escuela Superior Politécnica del Litoral]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Uzcategui]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría forense: Práctica contable para detectar el fraude en la administración pública]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Trujillo, Perú ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de los Andes]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Velandia]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Anguila]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Archibold]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La contabilidad como tecnología blanda: una visión desde los imaginarios sociales]]></article-title>
<source><![CDATA[Cuadernos de contabilidad]]></source>
<year>2017</year>
<volume>17</volume>
<numero>45</numero>
<issue>45</issue>
<page-range>1-21</page-range></nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Verrecchia]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Discretionary disclosure]]></article-title>
<source><![CDATA[Journal of Accounting &amp; Economics]]></source>
<year>1983</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>179-94</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Villacís]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditoría Forense: Metodología, Herramientas y Técnicas Aplicadas en un siniestro informático de una empresa del sector comercial]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Guayaquil, Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Escuela Superior Politécnica del Litoral]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Webber]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Apostolou]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassell]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Management fraud risk factors: an examination of the self-insight of and consensus among forensic experts]]></article-title>
<source><![CDATA[Advances in Accounting Behavioral Research]]></source>
<year>2004</year>
<volume>7</volume>
<page-range>75-96</page-range></nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolfe]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Hermanson]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Fraud Diamond: Considering the Four Elements of Fraud]]></article-title>
<source><![CDATA[CPA Journal]]></source>
<year>2004</year>
<volume>74</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>38-42</page-range></nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ni]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Mu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Susilo]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comments on 'Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification']]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2016</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>658-9</page-range></nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zargari]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Policing as a Service in the Cloud]]></article-title>
<source><![CDATA[Information Security Journal]]></source>
<year>2014</year>
<volume>23</volume>
<page-range>148-58</page-range></nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Bartol]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Pfarrer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Khanin]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[CEOs on the Edge: Earnings Manipulation and Stock-Based Incentive Misalignment]]></article-title>
<source><![CDATA[Academy of Management Journal]]></source>
<year>2008</year>
<volume>51</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>241-58</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
