Financial scams in India: A case study on Satyam computer scandal 2006-2009
Varsha Dev D, S Harikaran and Jayashankar J
The deliberate fabrication of identity or information to deceive others, the unauthorised use of a credit card, debit card, or ATM, or the use of technology to transmit fraudulent information in an attempt to obtain money or valuables are all considered financial scams. There are many financial scams has been happening across the world, some of the example’s scams which happened in indie among that The Satyam Computers organizations shame was India's greatest corporate scam until 2010. The trailblazer and the heads of non mainstream based reexamining association Satyam PC organization, debased the records, expanded the proposition cost, and took enormous sums from the association a considerable amount of this was placed assets into property. This research paper covers Importance of the study, Objectives of the study, Why people should have an in depth study about Satyam computer and its various legal implication, Why people give valuable opinion and suggestion and also to create an awareness about financial scams and the stake holders, Legal compliance with fraud offense in India, Functions Of forensic accounting and it also explains about Examining financial information, bank statements, invoices, and other accounting records were all part of the forensic audit. and ends with how to prevent financial scams in India. Apparently corporate bookkeeping misrepresentation is a critical issue that is filling in both recurrence and seriousness, as confirmed by the instances of Enron, WorldCom, and Satyam. Research proof has exhibited that a rising number of false exercises have debilitated the respectability of financial reports, added to huge monetary misfortunes, and corrupted financial backers' certainty about the utility and unwavering quality of financial explanations.
Varsha Dev D, S Harikaran, Jayashankar J. Financial scams in India: A case study on Satyam computer scandal 2006-2009. Int J Res Finance Manage 2024;7(2):220-228. DOI: 10.33545/26175754.2024.v7.i2c.366