SAMPLE RESEARCH PROPOSAL

SAMPLE RESEARCH PROPOSAL

CHAPTER ONE

1.1 Background

Internal auditing is now increasing in importance as multinational organizations are trying to reduce costs and maximize profitability in order to ensure that they are able to out compete (Almashhadani, 2021), however internal auditing has been in existence for generations, in some form and has roots in ancient civilizations. Historical records suggest that various early societies, such as the Mesopotamian, Egyptian, and Roman civilizations, used rudimentary internal control systems to manage resources, account for assets, and ensure compliance with rules and regulations. During the medieval period, the need for oversight and accountability in the rapidly growing trade and commerce sectors became apparent. Organizations like religious institutions and merchant guilds started using internal checks and balances, which laid the foundation for modern internal control practices (Alabdullah, & Maryanti, 2021).

Organizations are increasingly relying on critical services and internal auditing systems as it was during the Industrial Revolution brought, there were significant changes in business and industry. With the expansion of factories and the emergence of large corporations, the need for systematic internal controls became more critical. Businesses began appointing inspectors and auditors to examine financial records and operational processes (Escobar Zurita et al., 2023).

Institute of Internal Auditors (IIA), The IIA was founded in 1941 in the United States. It played a pivotal role in standardizing and professionalizing internal auditing practices. The IIA established ethical guidelines, certification programs (such as the Certified Internal Auditor or CIA designation), and best practices for internal auditors (Almashhadani, & Almashhadani, 2022). As corporations expanded, so did the need for internal audit departments. These departments were responsible for conducting systematic reviews of financial records, internal controls, and compliance with policies and regulations (Almashhadani, & Almashhadani,2022)

Sarbanes-Oxley Act (2002): Enacted in response to corporate accounting scandals (e.g., Enron and WorldCom), this U.S. legislation mandated stricter financial reporting, internal control requirements, and audit committee oversight. It significantly increased the prominence and importance of internal audit functions in publicly traded companies.

Internal audit has continued to evolve in response to changing business environments, globalization, and technological advancements. Today, internal audit functions play a broader role in risk management, governance, and providing strategic insights to organizations. The Committee of Sponsoring Organizations of the Treadway Commission (COSO) introduced the Internal Control-Integrated Framework in 1992 and updated it in 2013. It provides a widely accepted framework for internal control and risk management.

Multinational corporations and the globalization of markets have increased the complexity of internal auditing, requiring auditors to consider international regulations and standards and the advent of data analytics, artificial intelligence, and automation has transformed how internal audits are conducted, allowing auditors to analyze vast datasets more efficiently and provide deeper insights (Ofoeda et al., 2020).

The aim of every profit-making organization is to earn profit, stay in business for a long time, meet customers’ demand and expectations, pay their debts when they fall due and satisfy the aims of stakeholders (Lawrence et al., 2019), These objectives are easily achieved if the owner and manager of the company is the same person. However, as the business grows and expands, the need for additional employees arises and the owner employs more and more people to help manage the company. This gradually results in what is called in business terms “separation of ownership and control” (Smith, 1776). At this point, the owner realizes that precautions must be taken to protect the company as well as the interest of the owner. The issue of ownership and control becomes more complicated if a company is big and listed on a recognized stock exchange. That is, a company with much more capital investment both in cash, assets and personnel. Thus, the owners need an assurance that the intended objectives of the company would be achieved, assets of the company would be protected from theft and mismanagement, the accounting information would be received on time and that they would be accurate and reliable (Gaganis, Pasiouras, & Voulgari, 2019).

Internal auditing is fast becoming one of the main drivers of change, posing new strategic challenges (Somuyiwa, 2010). The business environment today has been undergoing unprecedented change and many companies are seeking new ways to stand out from the competition by sustaining their competitive advantage. In today’s highly competitive global marketplace, the pressure on organization’s to find new ways of creating customer satisfaction therefore computing in accounting is inevitable in organizations , according to Lysons, (2012) it is essential to for organizations to adopt the use of computers in accounting inorder to enhance organizational performance in the globalised world.

According to Elaiwi (2009) most organizations in East Africa have not fully developed internal auditing systems due to lack of quality Human resource and as such they have been left behind their global peers. In the light of technological progress witnessed by different countries in the world today for all scientific and practical fields for both industrial, commercial and services sectors, public institutions, most private organizations have embraced the use of computers in their accounting operations

According to the current trend of  adopting technology in internal auditing is an important tool to enhance efficiency and responsiveness in modern-day accounting practices. The introduction, implementation and usage of computer technology in companies are usually motivated by an attempt to reduce costs (Oyesiku, 2010).

Risk is inherent in every economic activity and every organization has to manage it according to its size and nature of operation because without risk management no organization can survive in the long run, this therefore requires an internal auditing system (Hubbard, 2020). This is because businesses today are faced with far greater challenges than before due to the fact that economical, technological and legal interdependence are becoming more prevalent and pronounced. It would be assumed that risk management and internal control systems will vary from organization to organization based on their size or industry sector. It is therefore logical to assume that every business organization has put in place a strong risk management structure and internal control systems to help achieve its goals. These are fundamental to the successful operation and day-to-day running of a business and assist a company in achieving its objectives (de Araújo Lima, Crema, & Verbano, 2020).

1.2 Statement of the problem

In recent financial periods, vision fund fund has experienced a concerning trend of declining profitability, which has raised significant concerns among stakeholders, including senior management, board members, and shareholders. This persistent decline in profitability threatens the organization’s financial sustainability and its ability to fulfill its strategic objectives. In response to these challenges, the internal audit department is conducting an in-depth audit to identify the root causes of the profitability decline and recommend actionable strategies to reverse this trend.

Over the past two years’ vision fund profit margins have shown a consistent downward trajectory. Despite our efforts to control costs and increase revenue, we have not been able to halt or reverse this decline effectively. There are indications that operational inefficiencies may be driving up costs. We need to evaluate our operational processes, including supply chain management, production, and distribution, to identify areas where cost reductions and process improvements can be achieved.

While we have implemented various sales and marketing strategies, there are concerns about the effectiveness of these initiatives. We need to assess whether our pricing strategies, sales channels, and product mix align with market conditions and customer preferences and External factors such as shifts in the market, increased competition, and evolving customer demands may be impacting our profitability. Understanding and adapting to these external dynamics is crucial for maintaining competitiveness. Vision fund requires risk management practices require assessment to ensure that potential risks, including market risks, operational risks, and regulatory risks, are effectively identified, assessed, and mitigated to protect profitability.

1.3 Objectives of the study

  • To investigate the influence of financial audit on business profitability
  • To assess the influence of operational audit on business profitability
  • To examine the influence of compliance audit on business profitability

1.4 Research Questions

  • What is the influence of financial audit on business profitability?
  • What is the influence of operational audit on business profitability?
  • What is the influence of compliance audit on business profitability?

 

Leave a Reply

Your email address will not be published. Required fields are marked *

sample research proposal

sample research proposal

SECTION THREE: METHODOLOGY

3.1 Introduction
This chapter outlines the methodology that will be employed in the study. It discusses the research design, sample size, sampling methods, data collection techniques, instruments used, and the procedures for data analysis. Additionally, it addresses the steps to ensure the validity and reliability of the study as well as the measurement of variables.

3.2 Research Design
The study will use a cross-sectional design. Explanatory research is ideal for analyzing patterns and forming hypotheses for future research. According to Amin (2005), explanatory research is useful for gaining a deeper understanding of relationships between variables. Since the study aims to explore these relationships, a bivariate correlation design will be applied to assess the correlation between variables. Both qualitative and quantitative approaches will be utilized. The quantitative approach is suitable for examining the supplier relationship and procurement performance, as it allows the collection of numerical data on individual behaviors, which can be subjected to statistical analysis (Amin, 2005). The qualitative approach will supplement this by capturing in-depth data that may be missed by the quantitative methods.

3.3 Study Population
Sekaran (2018) defines a population as the total group of individuals, events, or things that a researcher aims to investigate. The selected population for this study is based on their experience and knowledge concerning the topic of strengthening community-based approaches for conserving cultural sites.

3.4 Study Sample
Mugenda and Mugenda (2003) state that it is not feasible to study the entire population, hence the need for sampling. A sample is a subset of the population selected for analysis. Using Krejcie and Morgan’s (1970) sample size determination table, 40 respondents will be chosen from a total population of 45 employees, local leaders, and tourists. The sample will include 5 local leaders, 10 conservationists, 5 tourists, and 20 employees managing Sezibwa Falls.

3.5 Sampling Techniques and Procedure
The study will employ both simple random and purposive sampling techniques. Simple random sampling will be used to select lower-level staff, ensuring generalizability and minimizing bias (Sekaran, 2003). Purposive sampling will be used to select procurement and accounts officials, as they possess specialized knowledge relevant to the research topic.

3.6 Data Collection Methods
This section presents the data collection methods, including surveys, interviews, and document reviews, chosen for their numerous advantages.

3.6.1 Survey Method
Questionnaires will be used for data collection. As noted by Mugenda and Mugenda (1999), questionnaires enable the collection of data from a large group within a short period. They also allow respondents to complete them at their convenience and express their opinions freely (Oso & Onen, 2008).

3.6.2 Interview Method
Interviews will be conducted to gather additional insights into the research topic. This method allows the researcher to adapt questions, clarify doubts, and probe for more information (Sekaran, 2003). It is particularly useful for gathering diverse perspectives and obtaining a deeper understanding of the subject matter.

3.6.3 Document Review Method
Document reviews will be conducted to gather relevant recorded information. This method provides thoughtful, reliable data and allows the researcher to access information at convenient times (Oso & Onen, 2008).

3.7 Data Collection Instruments
The instruments used for this study will include questionnaires, interview guides, and a document review checklist.

3.7.1 Self-Administered Questionnaire
The questionnaire will be divided into several sections and will consist of closed-ended questions, allowing for easier data coding and analysis while reducing error margins (Sekaran, 2003).

3.7.2 Interview Guide
An unstructured interview guide will be used to collect in-depth information from key informants. This method enables the researcher to obtain more detailed data that may not be possible with questionnaires (Mugenda & Mugenda, 1999).

3.7.3 Documentary Review Checklist
A checklist will be used for reviewing documents to obtain more comprehensive data, supplementing information gathered through other methods.

3.8 Validity and Reliability of Research Instruments

3.8.1 Validity
Validity refers to how accurately the results represent the studied phenomenon (Oso & Onen, 2008). The content validity index (CVI) will be used to ensure the research instrument’s validity. Experts, including research supervisors and consultants from Makerere University, will assess the relevance of the questions. The CVI will be calculated by dividing the number of valid items by the total number of items in the instrument.

3.8.2 Reliability
Reliability measures the consistency of the research instruments (Mugenda & Mugenda, 2003). Cronbach’s coefficient alpha will be used to test reliability, with a threshold of 0.7 considered acceptable. The formula for reliability is:
∝ = K/(K-1) ((∑SD²I)/(SD²t)),
where K is the number of items, ∑SD²I is the sum of item variances, and SD²t is the total variance.

3.9 Data Collection Procedure
The researcher will obtain an introductory letter from Makerere University to facilitate the data collection process at Sezibwa Falls. Respondents will be randomly selected, while senior managers will be purposively chosen for interviews.

3.10 Data Analysis

3.10.1 Quantitative Data Analysis
Descriptive statistics such as frequencies and percentages will be used to analyze demographic data, while the mean and standard deviation will assess respondent opinions. Pearson’s correlation coefficient will establish relationships between variables. Regression analysis will determine the strength of these relationships, with SPSS version 16.0 used for data analysis. Statistical significance will be tested at a 5% level.

3.10.2 Qualitative Data Analysis
Content analysis will be used to analyze qualitative data, with recurrent themes and key informant quotations presented to illustrate the findings.

3.11 Measurement of Variables
A structured questionnaire using a five-point Likert scale (1 = Strongly Disagree, 5 = Strongly Agree) will be used to collect data on supplier relationships and procurement performance. This scale is commonly used in similar studies (Bowling, 1997).

3.12 Ethical Considerations
The study will prioritize respondent privacy and confidentiality. Participation will be voluntary, and respondents will not be forced to answer any question they are uncomfortable with. Additionally, the study will ensure proper citation to avoid plagiarism (Kothari, 2004).

RSS
Follow by Email
YouTube
Pinterest
LinkedIn
Share
Instagram
WhatsApp
FbMessenger
Tiktok