CHORASA NHAMO R105938P

135
AN EVALUATION OF THE INTERNAL CONTROL SYSTEMS AT ZIMBABWE ELECTRICITY TRANSMISSION AND DISTRIBUTION COMPANY (ZETDC) ON SERVICE DELIVERY (2009 – 2012) By Nhamo Chorasa Registration Number R105938P Dissertation submitted in partial fulfilment for the degree of Master of Administration Graduate School of Management University of Zimbabwe Supervisor : Dr N. KASEKE July 2012

Transcript of CHORASA NHAMO R105938P

AN EVALUATION OF THE INTERNAL CONTROL SYSTEMS AT ZI MBABWE

ELECTRICITY TRANSMISSION AND DISTRIBUTION COMPANY ( ZETDC) ON

SERVICE DELIVERY (2009 – 2012)

By Nhamo Chorasa

Registration Number R105938P

Dissertation submitted in partial fulfilment for t he degree of

Master of Administration

Graduate School of Management

University of Zimbabwe

Supervisor : Dr N. KASEKE

July 2012

i

DECLARATION

I Nhamo Chorasa, do hereby declare that this dissertation is the result of my own

investigation and research, except to the extent indicated in the

acknowledgements, references and by comments included in the body of the

report, and that it has not been submitted in part or in full for any other degree to

any other University.

……………………………………………… ……………………………

SIGNATURE DATE

SUPERVISOR

SIGNATURE………………………………… DATE………………………..

i

DEDICATION

To my wife Chipo, and our children, Joshua, Junior and Jonathan, you were a pillar

of support and a beacon of love and may the love of God always be with you Amen.

ii

ACKNOWLEDGEMENTS

The researcher extends gratitude to the following people for making this study

possible:

Dr N. Kaseke my supervisor, for providing the guidance, wisdom and

encouragement.

Mr O. Dondo and Mr T. Mushangwe, my workmates at ZESA Holdings for the

support, understanding, and for the fruitful discussions and idea sharing.

Mrs F Musimbo for editing and other support service.

Members of Hope Community Church, for the spiritual and moral support including

prayer and supplications.

iii

ABSTRACT

The aim of this study is to evaluate the internal control system in ZETDC (Zimbabwe

Electricity Transmission and Distribution Company) on service delivery with regards

to the period 2009 to 2012. This is the period when Zimbabwe, as a country

commenced using the US dollar and other foreign currencies after experiencing

several years of devastation by a record inflation, on the local Zimbabwean currency.

Most services were expected to improve with the stability in the economy. ZETDC is

a subsidiary of ZESA Holdings (Zimbabwe Electricity Supply Authority), the electricity

utility service provider in Zimbabwe.

The COSO framework on internal controls as noted by Chambers and Rand (2011)

articulates that internal controls should provide reasonable assurance regarding the

achievements of objectives on the effectiveness and efficiency of operations, the

reliability of financial reporting and compliance with applicable laws and regulations.

Authors such as Hopkin (2012), Warren (2012) and Graham (2010) in supporting

the COSO framework, notes that there are five elements of internal controls that

form an umbrella over the business to protect it from control threats and these

include, the control environment, risk assessment , control procedures, monitoring

and information communication. A good internal control system should have three

forms of controls as noted by Hall (2010), which include preventative, detective and

corrective controls. As noted by Harrer (2010), strong controls put up roadblocks for

fraud, bad decisions, human error and help to minimise pitfalls and surprises. On the

other hand, poor internal controls were noted to negatively affect service delivery

and Braiota, Gazzaway, Colson, Colson and Ramamoorti (2010) believe that an

organisation cannot produce reliable services or products without good internal

controls. Obtaining sufficient resources, recruiting and retaining the right expertise

and maintaining good communications and relations are some of the challenges in

implementing effective internal controls highlighted by Hightower (2008).

The target population for the study consist of ZETDC staff members estimated at

5,000 inclusive of board members.

A sample of 100 staff members was selected using multistage random sampling to

ensure a fair representation of all hierarchical levels of staff in ZETDC on the

iv

sample. Data was collected through a survey questionnaire which was distributed to

staff members in ZETDC including board members. A 55% response rate was

obtained from the distributed questionnaires.

The major findings were that ZETDC has an internal control system that is company

devised with some elements of a good internal control system, which however are

not modelled along any known frameworks. The internal control system was found to

be regularly breached as evidenced by common activities such as assets abuse,

electricity bill adjustments and illegal power connections. These internal control

breaches negatively affected service delivery in that service provision in many

instances was sub standard, was not done, was delayed and cost more. ZETDC

faced staff resistance as a major challenge in implementing internal control systems,

furthermore, it lacked the strategy to implement internal control systems.

The research concluded that ZETDC had an ineffective internal control system that

resulted in poor service delivery.

It is recommended that ZETDC should adopt the COSO framework on internal

controls to enhance its internal control system.

v

Table of Contents

DECLARATION ..................................................................................................................................... i

DEDICATION ......................................................................................................................................... i

ACKNOWLEDGEMENTS ................................................................................................................... ii

ABSTRACT .......................................................................................................................................... iii

LIST OF TABLES .............................................................................................................................. viii

LIST OF FIGURES .............................................................................................................................. ix

ABBREVIATIONS ................................................................................................................................ x

CHAPTER 1 .......................................................................................................................................... 1

INTRODUCTION AND BACKGROUND TO THE STUDY ............................................................ 1

1.INTRODUCTION ............................................................................................................................... 1

1.1 BACKGROUND OF THE STUDY ............................................................................. 2

1.1.1 OVERVIEW ......................................................................................................................... 2

1.1.2 BACKGROUND TO THE COMPANY - ZETDC ...................................................... 5

1.1.3 STRATEGIC PLANNING .......................................................................................... 11

1.1.4 THE CONTROL ENVIRONMENT ........................................................................... 13

1.1.5 FINANCIAL PERFOMANCE .................................................................................... 15

1.1.6 SWOT ANALYSIS ...................................................................................................... 16

1.1.7 PEST ANALYSIS........................................................................................................ 18

1.1.8 ZETDC’S INTERNAL CONTROL DEFICIENCIES ............................................... 20

1.2 PROBLEM STATEMENT .............................................................................................. 22

1.3 RESEARCH OBJECTIVES .......................................................................................... 22

1.4. RESEARCH QUESTIONS ............................................................................................ 23

1.5 RESEARCH PROPOSITION ........................................................................................ 23

1.6 SIGNIFICANCE OF THE STUDY ................................................................................ 23

1.7 SCOPE OF RESEARCH AREA ................................................................................... 24

1.8 DISSERTATION OUTLINE ........................................................................................... 24

1.9 CHAPTER SUMMARY .................................................................................................. 25

CHAPTER 2 ........................................................................................................................................ 26

LITERATURE REVIEW ..................................................................................................................... 26

2.1 INTRODUCTION ............................................................................................................ 26

2.2 INTERNAL CONTROL SYSTEM ................................................................................. 26

2.3 FORMS OF INTERNAL CONTROL SYSTEMS ........................................................ 31

vi

2.4 FRAMEWORK FOR EVALUATING INTERNAL CONTROLS ................................ 35

2.5 THE IMPORTANCE OF INTERNAL CONTROL SYSTEMS ................................... 38

2.6 FACTORS INFLUENCING INTERNAL CONTROL SYSTEMS .............................. 40

2.7 SERVICE DELIVERY .................................................................................................... 42

2.8 EFFECTIVE INTERNAL COTROL SYSTEMS AND SERVICE DELIVERY ......... 46

2.9 CHALLENGES IN IMPLEMENTING INTERNAL CONTROL SYSTEMS .............. 47

2.11 CONCEPTUAL FRAMEWORK .................................................................................... 50

2.10 CHAPTER SUMMARY .................................................................................................. 50

CHAPTER 3 ........................................................................................................................................ 51

RESEARCH METHODOLOGY ........................................................................................................ 51

3.1 INTRODUCTION ............................................................................................................ 51

3.2 RESEARCH DESIGN .................................................................................................... 51

3.3 RESEARCH PHILOSOPHY ......................................................................................... 52

3.4 POPULATION AND SAMPLING TECHNIQUES ...................................................... 53

3.5 RESEARCH APPROACH ............................................................................................. 60

3.6 RESEARCH METHODS ............................................................................................... 60

3.7 DATA COLLECTION METHODS .............................................................................. 61

3.8 DATA ANALYSIS AND PRESENTATION .................................................................. 66

3.9 ETHICAL CONSIDERATIONS ..................................................................................... 66

3.10 RESEARCH LIMITATIONS .......................................................................................... 66

3.11 CHAPTER SUMMARY .................................................................................................. 67

CHAPTER 4 ........................................................................................................................................ 68

FINDINGS AND DISCUSSION ........................................................................................................ 68

4.0 INTRODUCTION ............................................................................................................ 68

4.1 RESPONSE RATE ......................................................................................................... 68

4.2 DEMOGRAPHIC RESPONSE ..................................................................................... 69

4.3 ELEMENTS OF THE INTERNAL CONTROL SYSTEM .......................................... 71

4.4 STATE OF THE INTERNAL CONTROL SYSTEM ................................................... 75

4.5 IMPACT ON SERVICE DELIVERY ............................................................................. 84

4.6 INTERNAL CONTROL IMPLEMENTATION CHALLENGES .................................. 87

CHAPTER SUMMARY .............................................................................................................. 90

CHAPTER 5 ........................................................................................................................................ 91

CONLUSION AND RECOMMENDATIONS ................................................................................... 91

5.0 INTRODUCTION ............................................................................................................ 91

vii

5.1 CONCLUSION ................................................................................................................ 91

5.1.1 STATE OF INTERNAL CONTROL SYSTEM IN ZETDC ..................................... 91

5.1.2 INTERNAL CONTROL BREACHES ....................................................................... 92

5.1.2 IMPACT ON SERVICE DELIVERY ......................................................................... 92

5.1.3 INTERNAL CONTROL IMPLEMENTATION CHALLENGES .............................. 92

5.2 TEST OF THE STUDY PROPOSITION ................................................................. 92

5.3 RECOMMENDATIONS ............................................................................................. 93

5.3.1 INTERNAL CONTROL FRAMEWORK .................................................................. 93

5.3.2 ORGANISATIONAL STRUCTURE ......................................................................... 93

5.3.3 INTERNAL CONTROL CHALLENGES .................................................................. 93

5.4 AREA OF FURTHER STUDY .................................................................................. 93

REFERENCES ........................................................................................................................... 94

APPENDIX 1.1.1A HARARE SUMMER LOAD SHEDDING TIME TABLE .................. 106

APPENDIX 1.1.1B HARARE WINTER LOAD SHEDDING TIME TABLE .................... 107

APPENDIX 1.1.1C SCHEDULE OF SURBURB CODES IN HARARE REGION........ 108

APPENDIX 1.1.2A ELECTRICITY TARIFFS EFFECTIVE FEBRUARY 2009 ............ 109

APPENDIX 1.1.2B ELECTRICITY TARIFFS EFFECTIVE JUNE 2010 ........................ 110

APPENDIX 1.1.2C ELECTRICITY TARIFFS EFFECTIVE SEPTEMBER 2011 ......... 111

APPENDIX 1.1.4A ZETDC STATEMENT OF FINANCIAL POSITION 2011 .............. 112

APPENDIX 1.1.4B ZETDC COMPREHENSIVE INCOME STATEMENT 2011 .......... 113

APPENDIX 1.1.4C ZETDC STATEMENT OF CASH FLOWS 2011 ............................ 114

APPENDIX 1.1.4D ZETDC RATIO ANALYSIS 2011 ...................................................... 115

APPENDIX 4.1 RESEARCH QUESTIONAIRE ................................................................ 116

viii

LIST OF TABLES

Table 1.1 Tipp Off reports for ZETDC

Table 1.2 Power Generation Statistics

Table 1.3 Power Imports Statistics

Table 1.4 ZETDC Application Systems

Table 2.1 Definitions of Internal Control

Table 2.2 Preventative and Detective Procedures

Table 3.1 Sample Size of the Study

Table 4.1 Response Summary

Table 4.3 Response on Integrity and Ethical values

ix

LIST OF FIGURES

Figure 1.1.1 Harare Region Service Evaluation

Figure 1.1.2 Tip-off Reports for ZETDC

Figure 2.3.1 Preventative, Detective and Corrective Controls

Figure 2.4.1 The COSO Internal Control Cube

Figure 4.2.1 Response by years of experience

Figure 4.2.2 Response by level of education

Figure 4.2.3 Response by department

Figure 4.3.2 Management philosophy

Figure 4.3.3 Response on organisational structure

Figure 4.4.1 Percentage response on type of controls

Figure 4.4.2 Response on internal control frameworks

Figure 4.4.3 Yes responses to internal control reviews

Figure 4.4.4 Percentage response on internal control breaches

Figure 4.4.6 Action taken on internal control breaches

Figure 4.4.7 Occurrence of internal control breaches

Figure 4.5.1 Response on internal control and service delivery

Figure 4.5.2 Services affected by internal control breaches

Figure 4.5.3 Impact on service delivery

Figure 4.6.1

Challenges faced in implementing internal control

systems

Figure 4.6.2 Responses to ZETDC technology adoption

x

ABBREVIATIONS

4G Fourth Generation

CCZ Consumer Council of Zimbabwe

CFL Compact Fluorescent Lamps

CoCo Criteria of Control

COSO Committee of Sponsoring Organizations of the Treadway

Commission

CPA Certified Public Auditor

ERP Enterprise Resource Planning

GNU Government of National Unity

GWh Gigawatt hour

ICS Integrated Customer Service

IIA Institute of Internal Auditors

ITC Incomes and Tariff Commission

KWh Kilowatt hour

KV Kilovolts

MD and A Management Discussion and Analysis

POTRAZ Postal and Telecommunications Regulatory Authority of

Zimbabwe

SADC Southern African Development Community

SAP Systems Application and Products

SAPP Southern Africa Power Pool

SPSS Statistical Package for the Social Sciences

STEM Short Term Energy Market

xi

USD United States Dollar

ZEDC Zimbabwe Electricity Distribution Company

ZEDC Zimbabwe Electricity Distribution Company

ZENT ZESA Enterprises

ZERA Zimbabwe Energy Regulation Authority

ZESA Zimbabwe Electricity Supply Authority

ZETC Zimbabwe Electricity Transmission Company

ZETDC Zimbabwe Electricity Transmission and Distribution Company

ZIMSTATS Zimbabwe Statistical Agency

ZPC Zimbabwe Power Company

1

CHAPTER 1

INTRODUCTION AND BACKGROUND TO THE STUDY

1. INTRODUCTION

The world economy has experienced various business scandals and corporate

failures such as the Enron accounting fraud, the Deutsche Bank spying scandal, the

Royal Dutch Shell overstatement of oil reserves, the WorldCom overstatement of

cash flows, the Olympus Corporation accounting scandal. Zimbabwe has also

experienced the Renaissance Merchant Bank (RMB) and Genesis Investment Bank

insolvency, the collapse of Ziscosteel and Air Zimbabwe among several other

corporate crisis. In view of this, focus has now shifted to the individual company’s

internal control system. A company’s internal control system has become

fundamental in various ways. Proponents of corporate governance have exerted

pressure to ensure that an effective internal control system forms part of the

corporate governance initiatives. There is growing perception that effective internal

controls help prevent and detect fraud, that reliable financial reporting is underpinned

by effective internal control system and that good internal controls will ultimately

deliver a quality product or service.

It is with this in mind that this research endeavours to evaluate one of the most vital

utility companies in Zimbabwe, the Zimbabwe Electricity Supply Authority (ZESA)

through its subsidiary company, the Zimbabwe Electricity Transmission and

Distribution Company (ZETDC) which is the sole supplier of electricity services in

the country. The study seeks to evaluate the internal control system, explore internal

control breaches, identify implementation challenges and find best practises that can

assist ZETDC in its mandate to deliver a quality service. This chapter provides the

background of the study, introduces the company under study - ZETDC, states the

problem statement, the research objectives and questions, the research proposition

and provides the significance, scope and the outline of the research.

2

1.1 BACKGROUND OF THE STUDY

1.1.1 OVERVIEW

There has been an unprecedented public outrage on the shoddy services obtaining

from Zimbabwe Electricity Supply Authority (ZESA) through its subsidiary company,

Zimbabwe Electricity and Distribution Company (ZETDC). Recently, Zimbabwean

readers have woken up to screaming front page newspaper headlines on ZESA such

as ‘ZESA billing woes to stay’ (Gumbo, 2012), ‘ZESA: A Thorn in flesh’ (Bwititi,

2011), ‘ZESA fails to import power’ (Nkala, 2011), ‘ZESA billing system chaotic’

(Harare Residents Trust, 2012), “Consumers Slam ZESA tariff hike”, (2011), ‘ZESA

attacked for load shedding’ (Ndlovu, 2010), ‘ZESA fears collapse’ (Mushava, 2011),

‘Hundreds march through Bulawayo to protest ZESA failures’ (Sibanda, 2011),

‘Disband ZESA’ (Zvauya and Kadirire, 2011), ‘Nerve racking power bills from ZESA’

(Mapimhidze, 2012) and many more such headlines. ZESA has fought hard to

manage a lot of public outrage. According to these newspaper reports, consumers

have bitterly and emotionally complained about the poor service quality offered by

ZETDC. The Consumer Council of Zimbabwe (CCZ) executive director Ms

Rosemary Siyachitema believes ‘ZESA has tossed electricity users from the frying

pan straight into the fire’ (Bwititi, 2011). Such is the frustration by electricity

consumers on power availability that they have even gone to the extent of changing

the acronym of ZESA from Zimbabwe Electricity Supply Authority to Zimbabwe

Electricity Sometimes Available (SW Radio Africa, 2011).

Most of the reported complaints from electricity consumers include unreasonable

bills sent to customers. Some bills as high as US $2 million were at one time

received by some domestic consumers and could possibly have arisen mainly from

continuous meter estimations that seem to go on forever as noted by the consumers.

Others have cited the non delivery of the bills with most consumers going for long

periods without being advised of their electricity dues which is not expected from any

reasonable supplier. Complaints have also been made on unfair load shedding.

Whilst the shortage of power has been widely publicised as a regional challenge and

many have had to accept the challenge, it is the manner of power allocation of the

available power which has irked many consumers.

3

Most complaints have cited long periods of load shedding going for as much as 8

hours to three days in some areas and these areas have been observed to be in the

high density suburbs. Consumers have also cried foul on power fault attendances by

ZESA staff as taking far too long with one cited area going with a fault for three

months unattended. On the other hand, the business community also complained of

unsustainable electricity tariffs.

It was on the basis of some of these consumer concerns that ZESA Holdings was

investigated by the Competition Tariff Commission (CTC) in 2011 which found ZESA

Holdings guilty of abusing its monopoly power particularly on services rendered

through ZETDC.

Research carried out by ZETDC titled “Customer Survey Monitor” in 2011, on

customer’s perception on some services offered by ZETDC in Harare region also

revealed increasing negative dispositions by customers on service delivery. The

details are illustrated in Figure 1.1.1

Figure 1.1.1 Harare Region Service Evaluation .Adapted from

ZETDC.”CUSTOMER SERVICE MONITOR HARARE REGION”. (2011)

a) Negative Opinions on Ratings b) Mean Opinion Ratings

0 %

20 %

40 %

60 %

80 %

100 %

B\Hall Rating

Timeliness

Service vs Charge

ChargePublic OpinionStaff

Upper Negative

Limit

30

40

50

60

70

80

90

M e a n P e r c en t

Banking Hall

Service Charge

Timeliness

4

Figure 1.1.1 shows that the latest survey findings (2011) show a heavy peaking of a

negative disposition on both “service vs. charges” and “public opinion” of ZETDC. In

other words, ZETDC public opinion in Harare Region in 2011 is disproportionately

influenced, in a negative manner, by perceptions of service charges – with a previously

isolated worst position of 36% in 2001. According to the survey, perceived inaccuracy

of meter readings, unpredictable timeliness of meter reading, negative perception of

staff courtesy all accounts for the greatest part of the negative outcome and, hence

partly, for the poor public opinion.

The survey, however acknowledged that excluded from considerations were other

significant factors contributing to customer service evaluation on ZETDC such as

power cuts and bill estimates. However the survey did take into account some positive

factors that were considered by customers and these included computerisation and

general customer care.

Deloitte Tip-offs Anonymous commenced in 2000 in Zimbabwe as a safe and

convenient channel for reporting unethical business practices. ZETDC joined in the

services of the organisation in 2010. An analysis of the recent feedback reports in the

first issue for 2012 from Deloitte Tip – offs Anonymous reveal that most concerns

raised by members of public on ZETDC are on poor service delivery as illustrated in

Table 1.1 below.

Table 1.1 Tip- Off reports for ZETDC.

DETAILS OF REPORT Number of reports

Fraud 4

Theft 8

Corruption 5

Unethical behaviour 2

Poor service delivery 12

Nepotism 4

Note. Adapted from Deloitte Tip – Offs Anonymous Employee Feedback. (2012).

1(2012)

5

Table 1.1 indicates that out of the 35 reports on ZETDC received in the first quarter in

2012, the majority of them,12 (34%) were on poor service delivery.

Furthermore, ZETDC the power distributer has had to ration the available inadequate

power through load shedding since 2007. However, in recent times (since 2009), it

has had to increase its load shedding frequency since power supply failed to meet

the increasing demand as highlighted in its load shedding programme. The load

shedding programme indicates that mostly residential areas will be without power

during the morning and evening peak periods. However, ZETDC has failed to

implement the load shedding as per schedule, a concern that has also irked

electricity consumers.

It is mostly when a company has collapsed or is in dire operational challenges that

questions begin to be asked as to what could have possibly gone wrong. Most

pointers will be in the direction of a breakdown in the system of internal controls and

this may not be far-fetched. In recent years, the relevance and objectives of Internal

Controls, have expanded far beyond the traditional ambit of protection against theft

and fraud, well into the areas of effectiveness, accountability and operational

efficiency of the organisation, hence the need for an evaluation of the system of

internal controls at ZETDC.

1.1.2 BACKGROUND TO THE COMPANY - ZETDC

Zimbabwe Electricity Transmission and Distribution Company (ZETDC), belongs to a

diversified group of companies whose core business is electricity generation,

transmission and distribution in Zimbabwe.

The Electricity Amendment Act Number 3 of 2003 provided for the setting up of a

company to hold shares of the state in the successor companies of the Zimbabwe

Electricity Supply Authority which company was registered under the Companies Act

[ Chapter 24;03] as ZESA Holdings (Private) Limited. The successor companies that

comprise the ZESA Holdings Group of companies are Zimbabwe Power Company

(ZPC), Zimbabwe Electricity Transmission and Distribution Company (ZETDC),

6

ZESA Enterprises and Powertel Communications. Each of the successor companies

is incorporated under the Companies Act (Chapter 24:03) and has its own board of

directors appointed by ZESA Holdings (Private) Limited as the shareholder. ZESA

Holdings (Private) Limited is the Holding company and is also run by a Board of

Directors. The company is wholly owned by the Government of Zimbabwe.

The Zimbabwe Electricity Transmission and Distribution Company (ZETDC) is a

subsidiary of ZESA Holding (Pvt) Ltd that is involved in the business of bulk

purchasing of electricity from power producers locally and regionally, transporting it

to load centres across the country for distribution and retail to end user customers.

Its major functions as highlighted on the ZESA website (2012) include : Electricity

retailing - Network planning, development, operation and maintenance -

Development, Operation and Maintenance of the transmission infrastructure within

Zimbabwe - Power System Operations - Bulk Power Purchases and System

Planning for Long Term Capacity.

ZETDC has its Head Office in Harare and Five regional offices in Harare (Harare

Region), Bulawayo (Western Region), Mutare (Eastern Region), Gweru (Southern

Region) and Chinhoyi (Northern Region). Each Regional office has several district

offices spread throughout the region stationed in city centres

CORE BUSINESS

Zimbabwe Electricity Transmission and Distribution Company (ZETDC) is mandated

in terms of the Electricity Act (Cap 13:09), to carry out the following activities which

are also outlined in its 2010 Annual report.

i) Transmission and Distribution Infrastructure Mai ntenance and

Development

The company develops, operates and maintains transmission and distribution

facilities within Zimbabwe. It receives power at 330 kilovolts (kv) from ZPC

(Zimbabwe Power Company)’ s Hwange, Bulawayo , Munyati and Harare Thermal

Power stations and Kariba Hydro-electrical Power station. It also gets import power

7

from Mozambique’s Carbora Bassa at 400 kv through the Bindura 330kv/132kv/33kv

substation.

Other regional power imports from South Africa’s Eskom and Democratic Republic of

Congo’s SNEL supplied at 420kv come through Insukamini Interconnector

Substation in Bulawayo.

It is this power which is then transmitted at high voltages of 330kv, 132kv, 88kv and

66kv to power users called load centres. Transmission lines span long distances with

the Kariba substation to Alaska substation (Chinhoyi) running more than 200

kilometres and Hwange substation to Marvel substation (Bulawayo) spanning 300

kilometres.

Before power is received by a consumer it has to be transformed to a lower voltage.

Voltage transformation is done at a substation using transformers. Power is

transformed from 330kv to 132kv and further down to 88kv and 33kv for distribution

to users.

Maintenance work involves the fixing, repairing and overhauling or servicing of the

physical assets which are the transformers, circuit breakers and the isolators. When

power supplies are lost due to a line that has fallen to the ground as a result of a

pylon which has collapsed, maintenance staff restores power by erecting a new

pylon or reconstructing the collapsed one.

ii) Electrical power system operations.

The company ensures that supply and demand match on a minute-by-minute basis.

ZETDC also monitors the power system and ensures safety of personnel and

equipment during switching operations of any equipment connected to the grid. This

may also be necessary to allow for maintenance of certain sections or for load

shedding purposes.

8

Due to the constrained power supply availability in Zimbabwe, ZETDC has had to

manage the demand side through load shedding and has continuously drawn a load

shedding programme for the various centres across Zimbabwe.

There are different load shedding programmes for the two distinct seasons in

Zimbabwe one for summer where power demand is comparatively low and one for

winter where power demand is high. According to a notice by ZETDC for 2010 Load

Shedding in the press (The Herald, 2010) essential services loads are exempted

from load shedding and these were classified as follows;

• Major Referral Hospitals

• Major Water and Sewer installations

• National security establishments

• Major airports

• Major Central business districts with high rise buildings

• Winter wheat farming belts to receive priority supplies.

Appendix 1.1.1A, Appendix 1.1.1B and Appendix 1.1.1 C shows the load shedding

programme during summer for 2010 and winter for 2012 for Harare region. On a

normal operations assumption taking the summer 2010 load shedding schedule,

each point on the schedule is shed during the morning peak period (between

0600hrs and 0800hrs) and during the evening peak period (between 1800hrs and

2200hrs). Consequently, each area should be shed a total of 22 hours weekly.

iii) Electricity Trading

The company purchases bulk electrical power from internal sources (Hwange, Kariba,

Harare, Munyati and Bulawayo Power Stations and Independent Power Producers) as

well as from neighbouring countries (Mozambique, Democratic Republic of Congo,

South Africa and Zambia) for sale to local consumers and also trading on the Southern

African Power Pool (SAPP).

However, ZETDC’s sources of power supply have remained depressed over the last

few years as a result of ZPC’s operational challenges coupled with regional supply

shortfalls. As at 11 May 2012, generation statistics showed that electricity production

9

was indeed very low and below the production capacity of ZESA. Table 1.2 shows the

generation statistics.

Table 1.2 Power Generation Statistics

Generation Station

(May 11, 2012)

Generated Energy

(Megawatts)

Plant Capacity

(Megawatts)

Hwange 429 920

Kariba 615 750

Harare 0 100

Munyati 30 100

Bulawayo 30 90

Total 1,104 1,960

Note (Adapted from “ZESA Holdings Website”. (2012, May 11).

ZETDC was thus only getting less than 56% of the potential power production from

ZPC’s generating capacity.

Local consumers are defined through various categories for the sale of electricity by

ZETDC. The categories are (ZETDC, 2012)

1. Domestic

2. Public lighting

3. Mining and Industrial Customers

4. Commercial customers

5. Agricultural customers

6. Large Customers

Different tariffs are applied in each of the categories to determine the revenue sold

on the power consumed. ZETDC through the approval of the Zimbabwe Energy

Regulation Authority (ZERA) formerly ZERC (Zimbabwe Electricity Regulatory

Commission) reviews the electricity tariffs on a regular basis to ensure the provision

of electricity remains economic. ZETDC has reviewed the electricity tariff three times

since dollarization in 2009. The reviews were on February 2009, June 2010 and

September 2011. These reviews affect the customer categories in different ways

with the least affected being the Domestic customers. A comparison of the February

10

2009 tariff review with the September 2011 indicate that on overage the price for the

domestic customer increased from US 7 cents to US 10 cents, a 43% increase.

The February 2009, June 2010 and September 2011 tariff reviews are indicated on

Appendix 1.1.2A, Appendix 1.1.2B and Appendix 1.1.2C respectively.

iv) Power System Planning

The company undertakes long-term supply and demand studies in order to develop a

national least cost System Development Plan that also takes cognisance of regional

developments. This involves identifying the need for new generating plants and

expansion of the grid to meet load growth and transfer power from new generation

plants to load centres.

v) Regional Cooperation

The company’s Transmission Division, as the Zimbabwe representative in SAPP, plays

a key role I n regional integration through its strategically positioned power grin that

provides critical links between Southern and Northern parts of the SAPP

interconnected power system. This makes the company the hub of transactions

between DRC, Zambia and Mozambique on one end and Botswana, South Africa,

Swaziland, Namibia and Lesotho on the other end. The wheeling services provided to

SAPP by the company facilitate electricity trading in the region.

The supply of power imports from SAPP has however remained restricted as the

SADCC region (Southern African Development Community) grapples with power

shortages. This, coupled with cash flow challenges, has seen ZETDC failing to obtain

extra power from its neighbouring power utilities. The table 1.3 indicates the sources of

imports for ZETDC as at 31 March 2012.

11

Table 1.3 Power Imports Statistics Source Megawatts Cost - US$

HCB 42 1,683,988

ESKOM 5 107,305

ZESCO 5 188,504

SNEL 0 0

EDM 0 0

NAMPOWER 0 0

TOTAL 52 2,376,575

Note: Adapted from ZETDC. (2012, March 31).Management Accounts for

March 2012.

1.1.3 STRATEGIC PLANNING

ZETDC adopted strategic planning as a tool for directing and controlling its business

operations. Consequently, the company produced a 5 year Corporate Business Plan

(2008 – 2012) that spells out the organisation’s vision and mission statements, the

organisation’s strategic goals as well as the accompanying action plans to meet the

stated goals. Below is a summary of the strategic plan.

ZETDC’s Corporate Vision

To be the preferred provider of electricity regionally and related services globally.

ZETDC’s Corporate Mission

To bring convenience to our valued customers through the provision of adequate,

safe, reliable electricity and related services at competitive prices.

ZETDC’s Values

Teamwork, integrity, social responsibility, customer focus and innovation.

Critical Success factors.

Sound financial base, customer service quality, plant availability and staff

competence.

12

Core Competencies

The core competencies required in order to achieve the vision are strong technical

skills, sound financial management skills; professionalism, strong management

skills, and entrepreneurial skills.

ZETDC’s STRATEGIC BUSINESS OBJECTIVES

As outlined in its 2008 to 2012 business strategy, ZETDC has defined a set of

strategic objectives for its main functional business areas which are Transmission,

Distribution, Finance and Human resources. These are then translated into business

action strategies for Transmission, Distribution and Head Office. The strategic

objectives are listed as:-

• Financial Goals:

o Ensuring cost effective tariffs;

o Improving working capital;

o Improving financial management;

o Ensuring attainment of break-even point;

o Increasing revenue base and

o Ensuring revenue collection maximization.

• Customer Goals:

o Ensuring safe use of electricity;

o Improving Corporate Image;

o Improving customer communication;

o Improving availability of electricity to customers;

o Improving service delivery and customer satisfaction and

o Improving environmental management.

• Operational Goals:

o Improving system reliability;

o Improving productivity;

o Reducing accidents;

o Improving communication;

13

o Improving quality of supply and

o Improving operational efficiency.

• Human Capital Goals:

o Ensuring high employee productivity;

o Improving staff health and safety;

o Ensuring staff motivation and retention;

o Ensuring adequate and competent staff;

o Ensuring a good business culture and

o Ensuring a good industrial relations climate.

1.1.4 THE CONTROL ENVIRONMENT

1.1.4.1 ORGANIZATIONAL STRUCTURE

The organisational structure is made up of elements of the control systems logical

structure. The elements are the organisational units used to structure business

functions for reporting.

ZETDC is headed by a Managing Director who reports to the Group chief executive

officer at ZESA Holdings. There is also a board of directors at ZETDC the majority of

whom are non executive independent directors. The ZETDC Managing Director

heads an executive committee comprising the finance director, the commercial

director, the transmission services director, all at head office, and five regional

general managers for Harare, Western, Southern, Eastern and Northern Regions.

The regional managers overseer power distribution and revenue collection in each of

the regional centres in Zimbabwe through various district offices in their regions. An

internal audit unit at ZESA Holdings monitors the activities at ZETDC through regular

internal audits of all ZETDC centres and reports directly to the board audit

committee.

Each district is headed by a network manager responsible for the supply of power

and maintenance of the distribution networks and a sales manager responsible for

power sales and revenue collections.

14

1.1.4.2 APPLICATION SYSTEMS

The current internal control systems in ZETDC is characterised by fragmented

systems with varying degrees of business coverage and utilisation. (ZETDC I.T

Business Plan, 2009). This state of affairs is a result of limitations in data

communications facilities, partial implementation of some systems, high staff

turnover in user and IT departments as well as the amalgamation of ZETCO

(Zimbabwe Electricity Transmission Company) and ZEDC (Zimbabwe Electricity

Distribution Company).

An overview of the current IT application systems currently in place at ZETDC head

office and Harare region is highlighted in table 1.4.

Table 1.4 ZETDC Application Systems

LOCATION APPLICATION PLATFORM COVERAGE ZETDC Head Office

SAP Financials Sun Solaris Both Distribution and Transmission at Head Office.

Finance Oracle database Control Sales and

Dist. * Server rented from Dexel and shared with Powertel.

Materials Management.

Harare Region

JBA Business/400

IBM OS/400 Entire Region where comms facilities are available.

General Ledger

DB2/400 database

Cash Book Purchase

Ledger * Dedicated AS/400 server.

Vision 2000 – Soluziona

Sun Solaris Entire Region where comms facilities are available.

IPMS Oracle database DCS Utilisation for MMS and IMS

almost at nil. MMS * Server shared

with Western and Southern as well as ZPC entities.

IMS

ICS - Soluziona Sun Solaris Entire Region where comms facilities are available.

Oracle database All Banking Halls except

15

Electricity Centre, Wynne Street, High Glen and Westgate are offline

* Server shared with Western Region.

Note: Adapted from ZETDC Information Technology Strategic Plan (2008-2012, p11).

In addressing the system fragmentation challenges, ZETDC embarked on the

implementation of an ERP (enterprise resource planning) system through the use of

SAP (Systems Application and Products) modules the implementation of which

commenced in 2011.

1.1.5 FINANCIAL PERFOMANCE

1.1.5.1 GENERAL OVERVIEW

A review of the unaudited December 2011 management accounts for ZETDC

containing the annual financial performance for the period January 2011 to

December 2011 – Appendix 1.1.4A, Appendix 1.1.4B and Appendix 1.1.4 C

revealed the following highlights;

• The company recorded a net deficit of US $13.9 million in 2011.

• Total electricity revenue recorded was US$634 million for 8,107 GWh

(gigawatt hour) sold.

• Power imports totalled US$63.9 million for 1.5 GWh of imported power at an

average cost of US C 3.68 per KWh (Kilowatt hour)

• The total electricity debtors were at US$286.3 million increasing by 37% from

the 2010 figure of US$207.9 million

• Total loans amounted to US $236.5 million up by 8 % from US$218.7 million

in 2010.

RATIO ANALYSIS

An examination of the financial statements using ratio analysis as financial

performance indicators illustrated on Appendix 1.1.4D revealed the following

position;

16

PROFITABILITY RATIOS

• Return on sales recorded a negative 2%. This means that sales are

generating a negative return in that from every dollar of sales 2 cents is lost.

• Return on total assets was at -0.013%. The assets are not getting a return for

their use. The company is losing 1 cent on every dollar of the assets.

• Return on capital employed was a negative .05%. An indication that 5 cents is

lost from every $1 invested into the company.

LIQUIDITY RATIOS

• The current ratio was 0.4. The company can only meet 40 cents from every

$1 on its current obligations. This is a far outcry from the standard

recommended ratio of 2 :1

• The quick ratio recorded 0.3. The liquid resources available to settle

immediate obligations are only 30 cents for every dollar owing. The standard

recommended ratio is 1:1

• Debtors collection period showed 278 days. The company is taking over a

year to collect money from its revenue. It is effectively funding other entities at

the expense of its own cash flows.

DEBT MANAGEMENT RATIO

• Debt to equity ratio was at 1.6. The company is heavily funded by outsiders in

that for every $1 that the shareholders own in ZETDC, $1.60 is owed to

creditors.

These highlights reveal that ZETDC made a huge loss from its operations and is

increasingly funding its debtors whilst borrowing heavily to keep operating. It is also

apparent that it cannot meet its current obligation. Its assets are under-utelised. This

scenario puts the company’s going concern perspective into questions.

1.1.6 SWOT ANALYSIS

A SWOT analysis (Strength, Weaknesses, Opportunities and Threats) is a valuable

tool to quickly analyse various aspects of the current state of the business process

17

undergoing change. It is a framework for strategic planning, opportunity analysis,

competitive analysis, business and product development (Brennan, 2009).

STRENGTHS

i. State owned – ZETDC is a government wholly owned state enterprise giving

it a distinct advantage in the influence of policies that can safeguard its

interest.

Furthermore, it is able to utilise government guarantees to access offshore

funding and also government is able to guarantee its going concern basis.

ii. Huge capital base – The asset base of ZETDC covers the geographical

spread of the entire country of Zimbabwe and even interlocks with

neighbouring power utilities. This enables ZETDC to reach as many

customers as possible with its national distribution grid. The nature and cost

of the asset base are a barrier of entry to possible competitors.

iii. Sole supplier – ZETDC currently enjoys a monopoly over the supply of

power emanating from the historical legal set up. This therefore means that it

currently has no competition except from fuel powered generators which

serve as a substitute in the event of ZETDC failing to supply.

WEAKNESSES

i. Aged infrastructure – The transmission and distribution assets were

installed in the 1960’s and are thus over 50 years old. This has consequently

resulted in frequent breakdown leading to a high number of faults in power

supply.

ii. Poor Image – As a result of the frequent power outages due to asset

breakdown and load shedding due to constrained supply, customers do not

have confidence in ZETDC. This has also been compounded by the

haphazard billing system, high power tariffs, poor workmanship on faults and

selective credit control policies on ‘political heavyweights’ leaving the

reputation of ZETDC in a battered state.

iii. High Cost structure – The aged asset infrastructure which is also very huge,

results in very high maintenance costs forcing ZETDC to operate at very high

levels of costs thus eroding profit margins.

18

OPPORTUNITIES

i. Unfulfilled customer needs – Many customers remain without power due to

ZETDC’s inability to connect all potential customers leading to some

customers illegally connecting themselves and thus existing outside of

ZETDC’s billing system.

ii. New Technologies – Prepaid meters are being installed in place of the

conventional meters . This will do away with estimated meter reading at the

same time providing advance cashflows eliminating electricity debtors.

iii. Privatisation – The possibility of ZETDC being privatised will give it the

impetus to operate on a more sound commercial basis drawing upon

investors to expand and maximise on revenue.

THREATS

i. Controlled tariff – The power tariff is regulated through control by ZERA

(Zimbabwe Energy Regulation Authority) . This means that ZETDC has no

total control over what it charges to the customer as this has to be determined

through ZERA. It cannot literally share most of its cost with the customer.

ii. Substitutes – The possibilities of gas found in Lupane being fully exploited

can result in many customers substituting electricity for gas for a competitive

price. Furthermore, subject to fuel prices declining, consumers can easily turn

to generators in the event that electricity tariffs become uncompetitive.

iii. Deregulation - The electricity industry is undergoing deregulation to allow

other private players to enter the industry. This may bring in competition which

ZETDC may be ill prepared to deal with.

1.1.7 PEST ANALYSIS

(i) POLITICAL AND LEGAL ENVIRONMENT

A government of national unity (GNU) was formed by the three popular political

formations in Zimbabwe in February 2009 following a condemned electoral process

in 2008. This is pending elections which are anticipated after the completion of a new

constitution which is under consideration. Ministerial positions are shared between

the political formations. A recently enacted indigenisation and empowerment act

19

which seeks to economically empower previously disadvantaged locals is under

implementation. The energy sector is partially liberalised and is regulated by a

statutory body the Zimbabwe Energy Regulation Authority (ZERA) which was set up

in October 2011.

These developments are likely to impact directly on the leadership and direction of

ZETDC itself being a state enterprise. Government policies have a direct bearing on

ZETDC being an essential utility service provider in terms of both tariff charges and

the electricity supply environment.

(ii) SOCIO –ECONOMIC ENVIRONMENT

There is a prevailing stable economic environment in Zimbabwe buttressed by a

steady economic growth which, according to the minister of finance, is focused to

grow by 9.4% in 2012 as outlined in the 2012 National Budget Statement (Ministry of

Finance Zimbabwe, 2012). Inflation was reported by Zimbabwe Statistical Agency

(ZIMSTAT) at 4% on year on year whilst the monthly inflation was at 0.2% during the

month of April 2012 (Zimstat, 2012). However, the country is experiencing a liquidity

crunch with most banks struggling to get any cash let alone issue loans and

government through the Reserve Bank of Zimbabwe adopted measures to improve

the situation in February 2012 (Reserve Bank of Zimbabwe, 2012). There are

currently no official statistics for the unemployment rate but experts have estimated it

to be at 95% per 2009 estimates (index mundi, 2012). Energy production is currently

depressed with only 1,200 megawatts available against a demand of 2,200

megawatt. (ZESA Megawatt bulletin, 2012). This has resulted in load shedding

across the country.

ZETDC as a utility service provider will need to balance expectations from the public

who largely depend on the services of the utility company for all their energy needs.

(iii) TECHNOLOGICAL ENVIRONMENT

Zimbabwe has moved with the rest of the world in adopting recent technological

advancements and ZETDC is no exception. Such technological advances have

demanded a lot of integration between technologies and between organisations. Bill

payment systems between banks and other organisations are now in high demand

using 4G (fourth generation) cell phone technologies. Technological integration

20

between systems technologies in various organisations is now vital and the

challenge faced by ZETDC towards this is great.

1.1.8 ZETDC’S INTERNAL CONTROL DEFICIENCIES

They are some recorded publicised cases at ZETDC where there have been

incidences of internal control deficiencies. The following cases highlight some of the

recorded publicised deficiencies.

Case 1 - US $3 million fraud

In September 2010 ZETDC lost over US $3 million to two workers of a Spanish

computer firm which it had contracted to develop new computer systems and render

technical assistance in its billing (Farawo, 2010). The two would enter false amounts

into the system on the pretext that a customer has paid up when in actual fact they

would have intercepted through collusion with some ZETDC staff the payment by the

customers and converted it to their own use. The money was supposed to be paid

to the company but the two allegedly concealed the offence by reducing amounts of

the bills in the system to zero using an unauthorised Harare BATCH, as a financial

programme in the national server. ZETDC suffered an actual prejudice in the sum of

US$3,635,927.59 and nothing was recovered.

Case 2 - Reconnection scam

The Chronicle on 17 February 2012 reported that ZETDC could be losing thousands

of dollars in electricity bills by consumers who were either deleted from the billing

system or had their power fraudulently reconnected. ((ZESA unearths reconnection

scam, 2012)). The power utility had unearthed a scam in which some of its

employees were prejudicing the company by either deleting some consumers from

the system or were reconnecting defaulters and getting paid kickbacks.

Case 3 - Ministers’ ZESA scandal

ZETDC was reportedly failing to collect money from high ranking government

officials for electricity bills owing and was also not disconnecting them. According to

Newsday of 14 February 2012, (Langa, 2012 ), cabinet ministers, senior civil

servants and MPs were bleeding the Zimbabwe Electricity Supply Authority (ZESA)

dry by refusing to pay electricity bills at their private properties and using political

21

muscle to avoid being switched off. Some of the officials named who were owing

very huge amounts included the Manicaland governor, whose outstanding bill was

US $145 000, and Secretary for Energy and Power Development who owed

US$20 000 among several high ranking government officials also named in the

report. At the time the power utility was owed US$537 million by both its industrial

and domestic customers highlighting ZETDC’s poor debt management.

Case 4 - Inaccurate electricity bills sent to custo mers

Incidence of suspiciously erroneous electricity bills that were received by some

customers was noted by the Newsday (Mapimhidze, 2012). The report highlighted

incidences of inaccurate bills sent to customers by the power utility. In July 2011, a

tenant in Harare’s Avenues area received a US$5 bill for a month’s uninterrupted

supply of electricity whilst a tenant in the adjacent flat even rejoiced more for not

paying for the power he used because his apartment number did not appear in

ZESA’s database at all! In another case, a company executive received a US$5,000

bill and ZESA employees threatened to discontinue supplies if he failed to pay. It

was reported that the man had to pay an officer at the power utility US$100 to “sort

out the mess”.

Case 5 – ZESA Boss Fired

In September 2010, ZETDC fired its then managing director Mr Ernest Muchayi for

helping himself to a US $25,000.00 loan and paying out unsanctioned allowances to

top managers (Zesa Boss fired, 2010).

Case 6 – ZETDC accounts qualified

The external auditors who conducted an audit of ZETDC’s accounts for the financial

period 2010 did not agree with ZETDC’s valuation of its revenue. The auditors

therefore qualified the accounts on the basis that part of ZETDC’s revenue (US $3

million) was based on estimates which could not be conclusively verified (ZETDC

Annual Statements 2010)

The above cases serve to highlight the magnitude of the loopholes that exist at

ZETDC that put the company into perspective on its ability to self regulate and

safeguard its service delivery without compromising on quality.

22

1.2 PROBLEM STATEMENT

The introduction of the multicurrency system in 2009 which curbed the spiralling

inflation was a relief to the Zimbabwean economy which had been battered and

bruised by the record galloping inflation over the last three years. After so many

excuses for poor performance premised on the lack of foreign currency, ZETDC was

expected to show signs of service improvement with the improving economy as was

the case with most Zimbabwean companies, commencing 2009. However,

electricity customers remain sceptical on the services obtaining from ZETDC.

Electricity Bills are fraught with many errors, bill estimations continue unhindered,

load shedding continues outside the advertised schedules, power tariff are increased

on a regular interval, many customers remain outside of the billing system and

continue to enjoy free electricity. Reports of the company’s staff involvement in

abuse and prejudice of company resources continue to surface, and the company

continues to record losses in its annual accounts. All these issues point to a

systems failure within the organisation. ZETDC is the sole essential power utility

service provider in Zimbabwe and any failures on its part has a consequence on the

entire economy of the country. Whilst the final service delivery is evident, as in

services obtaining, it became apparent that the internal processes that give rise to

these unpalatable services needed some interrogation in order to fully comprehend

ZETDC’s commitment to service delivery. Why is ZETDC continuing in failing its

customers? Does ZETDC have a control mechanism of ensuring good quality

service? What needs to be answered is an assurance on whether the public can

place reliance on ZETDC and its ability to self correct the apparent deficiencies that

continue to clog it. Furthermore, management need to be assisted in identifying

areas of concern within their processes in order for the company to obtain the best

value and plug off the unpalatable services reaching the customers.

The research therefore seeks to evaluate the control systems in ZETDC and their

influences on the services obtaining from the utility company to the public customer.

1.3 RESEARCH OBJECTIVES

In pursuance of the above problem, the research therefore attempts to pursue the

following objectives;

23

PRIMARY OBJECTIVE

1.3.1 The primary objective of this research is to evaluate the internal control

systems in ZETDC

SECONDARY OBJECTIVES

1.3.1 To explore the effects of internal control breaches in ZETDC on

service delivery

1.3.2 To assess the influence of the internal control system on service

delivery

1.3.3 To identify challenges in implementing the internal control systems

1.3.4 To recommend ideal internal control practises

1.4. RESEARCH QUESTIONS

The research will seek to answer the following vital questions;

1.4.1 What are the internal control systems in ZETDC?

1.4.2 What are the effects of internal control breaches in ZETDC?

1.4.3 How is service delivery affected by the internal control systems?

1.4.4 What problems are faced in implementing internal control systems?

1.4.5 What can be done to improve the internal control systems?

1.5 RESEARCH PROPOSITION

The study maintains that ZETDC has an ineffective internal control system that has

resulted in poor service delivery.

1.6 SIGNIFICANCE OF THE STUDY

There is significantly little research that exists evaluating the internal controls that

ultimately give rise to the final products of companies more so at ZETDC, a vital

utility service provider in Zimbabwe. Management are increasingly facing

responsibilities through corporate governance pressure, to evaluate internal controls

and assess the potential risks.

24

The study intends to extend the knowledge of internal control systems, which is

established as an effective management tool through which an organisation

enhances its performance. The research will explore the essential elements of a

sound internal control system, drawing upon experience in established situations.

The significance of the research is to outline a number of principles for use by

supervisory authorities when implementing internal control systems. The study will

also assist in obtaining the internal control environment existing in ZETDC for the

sake of all stake holders, chief among them electricity customers. Furthermore,

researchers will benefit on possible further areas of study that may need more

probing.

1.7 SCOPE OF RESEARCH AREA

The Sampling Frame for the study will be ZETDC and the focus will be the period

existing from January 2009 and thereafter to 2012. This study will only address the

function of an internal control system in relation to commercial activities. Although

engineers also need to evaluate an internal control system in terms of its

effectiveness in assuring reliable operations, this is not the concern of this study.

1.8 DISSERTATION OUTLINE

There are five chapters in this study

Chapter 1

Gives the introduction and background to the study as well as outlining the area of

study. Also in this chapter is the problem statement, research objectives, questions,

scope and justifications of the study.

Chapter 2

Outlines the literature review on internal control systems defining and giving

concepts and basis on internal controls as well as challenges. It is the theoretical

framework of the study that draws conclusions from authoritative sources on internal

control systems.

Chapter 3

25

States the methodology for the research including the research design, sample

frame and the research instruments for the study as well as justification for the

research design.

Chapter 4

Presents and analyses results of the study as well as interpreting the findings there

of in relation to the underlying basis. Gives answers to the research questions.

Chapter 5

Concludes on the findings giving practical recommendations and areas needing

further studies

1.9 CHAPTER SUMMARY

In this chapter the events leading to the study were introduced. The overall subject of

study was also introduced and details outlined culminating in the problem statement

which was stated. Five objectives where identified and matched to the requisite

research questions. Also clearly stated was the research hypothesis and the

significance and justification of the study. The underlying scope was defined and the

overall research structure was outlined.

26

CHAPTER 2

LITERATURE REVIEW

2.1 INTRODUCTION

This chapter will demonstrate the theoretical framework of the study as highlighted

by various authors. The importance of literature review as explained by Dawidowicz

(2010) is to examine scholarly information and research based information to acquire

understanding of the topic under study of what has already been done, how it was

researched, and the key issues involved. The chapter seeks therefore to lay the

theoretical foundation of the study. The literature review will attempt to expose the

related areas that have not been explored significantly enough to draw conclusions.

2.2 INTERNAL CONTROL SYSTEM

2.2.1 WHAT IS AN INTERNAL CONTROL SYSTEM?

The current issue of the CPA (Certified Public Auditor) Exam review by Delaney and

Whittington (2012) define internal controls using the widely accepted American

Committee of Sponsoring Organizations of the Treadway Commission (COSO)

framework. This framework defines internal control system as noted by Chambers

and Rand (2011), as a process effected by the entity’s body of directors,

managements, and other personnel designed to provide reasonable assurance

regarding the achievement of objectives in the category of reliability of financial

reporting, effectiveness and efficiency of operations and compliance with applicable

laws and regulations.

A similar approach is followed by Collier and Agyei- Ampomah (2009) who define

internal control system as including all policies and procedures adopted by the

directors and management of an entity to assist in achieving their objectives of

ensuring , as far as practicable, the orderly and efficient conduct of a business

including adherence to internal policies, the safeguarding of assets, the prevention

and detection of fraud and error, the accuracy and completeness of the amounting

records and the timely preparation of reliable financial information.

27

A more comprehensive definition of internal control systems is the one by Menzies

(as cited in Mooler, 2008), who defines internal control systems as consisting of

regulations for the guidance of company activities (internal guidance systems) and

regulations for the supervision of these regulations (internal supervision system). He

however notes further that the internal supervision system consist of process-

integrated and not process oriented supervision activities.

Hopkin (2012) summarises definition from some of the major accounting bodies as

depicted in the table 2.1.

Table 2.1 - Definitions of Internal Control

ORGANISATION DEFINITION OF INTERNAL CONTROL SYSTEM

COCO (Criteria of

Control)

All the elements of an organisation that, taken together,

support people in the achievement of the organisation’s

objectives. The elements include resources, systems,

processes, culture, structure and tasks.

COSO A process, effected by an entity’s board of directors,

management and other personnel, designed to provide

reasonable assurance regarding the achievements of

objectives in the following categories;

• Effectiveness and efficient of operations

• Reliability of financial reporting

• Compliance with applicable laws and regulations

IIIA (Institute of

Internal Auditors)

A set of processes ,functions, activities sub systems ,and

people who are grouped together or consciously segregate to

ensure the effective achievement of objective and goals

Note; Adapted from Fundamentals of risk management: Understanding evaluating,

and implementing effective risk management (2nd Edition). (p.334). Hopkin. (2012).

Great Britain. Kogan Page Publishers.

It can be summed up that from the definitions in table 2.1 by Hopkin (2012) that

internal control system includes internal control activities and the structure and

responsibilities that relate to them.

28

The purpose of which is to enable directors to drive the organisation with confidence

in both good and bad times, safeguarding the organisation’s resources and ensuring

adequacy of records and systems accountability.

2.2.2 ELEMENTS OF INTERNAL CONTROL

Graham (2010) notes that the COSO internal control framework identifies five

components of internal control:

i. Control environment

ii. Risk assessment

iii. Control procedures

iv. Information and communication

v. Monitoring

This view is also supported by Delaney and Whittington (2012) who contend that

internal controls can be viewed as including five components mentioning those

alluded to in the COSO framework. Warren (2012) notes that elements of internal

control form an umbrella over the business to protect it from control threats. He

identifies five internal control elements that aim at achieving the internal control

objectives which tallies with those of Delaney and Whittington (2012) and the COSO

framework as noted by Graham (2010), as the control environment, risk assessment,

control procedures, monitoring, and information communication.

i) THE INTERNAL CONTROL ENVIRONMENT

The purpose of the internal control environment is to ensure consistence responses

to risks that materialises (Hopkin, 2012). Warren (2012) adds that the internal control

environment is the overall attitude of management and employees about the

importance of internal controls. On the other hand Hopkin (2012) describes it taking

from the COSO framework viewpoint as a measure of the risk culture within the

organisation whereas Rittenberg, Johnstone and Gramling (2011) sees it as referring

to the overall governance of the organisation starting by the tone developed at the

top level of the organisation.

29

However, Hightower (2008) views the internal control environment as including

statements that define and/or reinforce the tone from the top expressing value to the

company and authority to act. She emphasises that senior leadership within the

company must ensure there are suitable and consistent activities to support the

control environment such as communication, providing adequate resources and

time to implement, and holding process owners accountable and responsible for

process outcomes.

II) RISK ASSESSMENT

Understanding and management of the risk environment is a basic element of the

internal control foundation, and an enterprise should have a process in place to

evaluate the potential risk that may impact attainment of its objectives (Moeller,

2009). In making reference to the COSO framework Moeller (2009) describes risk

assessment as a three step process beginning with 1. Estimation of the significance

of the risk. 2. Assessing the likelihood or frequency of the risk occurring and 3.

Considering how the risk should be managed and assessing what actions must be

taken. (p. 39). Put differently Leitch (2008) notes that the objectives of risk control

are simply two fold. 1 to help people take off their mental blinkers and see the true

range of possibilities they face and 2, to help people behave competently in a way

that is consistent with that wider view.

III) CONTROL ACTIVITIES

Control activities are indicated as the policies and procedures that help ensure that

management directives are carried out (Dauber, 2009). They help ensure that the

necessary actions are taken to address risks to the achievement of the entity’s

objectives. However Hightower (2008) views control activities as specific actions

designed to produce evidence in support of the control objectives indicating that this

may include some or all of the following techniques:

• Self assessments performed by process owners using predefined self

assessment or audit readiness checklist

• Walk-through and observations performed by peer groups and/or internal

control representatives.

30

• Monitoring preformed by management and/or submitted to internal control for

review

• Reconciliation between source data and reporting records including period to

period roll forward and period over period analysis.

• Testing performed by management and internal control representatives using

statistical or random sampling techniques.

• Quarterly sub certification submitted by executive leadership, process owners

and selected business area executives attesting to compliance with company

policies, procedures, and internal control requirements.

• Remediation of action items resulting from internal control and internal audit

reviews.

(p. 45)

IV) INFORMATION COMMUNICATION

Needles, Powers, and Crosson (2010) view information communication as pertaining

to the accounting system established by management, to the way the system

gathers and treats information about the company’s transaction and how it

communicates individual responsibilities within the system. They argue that

employees must understand exactly what their functions are. This is aptly summed

up by Vilsanoiu and Serban (2010) whose view is that information and

communication requires that financial reporting information should have reliability

and should be communicated in a timely and accurate manner to managers and

decision makers. A more comprehensive view is proffered by Heintz and Parry

(2010) who contend that Information and communication system is the set of

procedures, processes and records used to initiate, process, record and report the

business transactions.

V) MONITORING

As internal control process is implemented, management should monitor the

operation of controls to provide assurance that all five components continue to

operate effectively (Rittenberg, Johnstone and Gramling, 2011). Ramos (2008)

emphasises that ongoing and separate evaluations enable management to

determine whether internal control over financial reporting is present.

31

He argues that internal control deficiencies are identified and communicated in a

timely manner to those partied responsible for taking corrective action, and to

management and the board as appropriate.

2.3 FORMS OF INTERNAL CONTROL SYSTEMS

Hightower (2008) noted two types of internal controls, detective and preventative

whilst Furlong (2011) adds a third as corrective internal controls. Gelinas, Dull and

Wheeler (2011) call this classification as based on timing of occurrence. This is ably

supported by Hall (2012) who describes internal controls as a shield composed of

three levels of controls, preventative, detective and corrective controls. This can best

be illustrated in the diagram on figure 2.3.1

Figure 2.3.1 Preventative, Detective and Corrective Controls. Adapted from

Accounting Information Systems (p.111), by Hall. (2012), Cengage Learning

The diagram above depicts the relationships of internal controls as shields in a

logical sequence as illustrated by Hall (2012) that prevent, detect and correct

problems within a system.

PREVENTANTIVE PREVENTANTIVE

PREVENTANTIVE

PREVENTANTIVE

DETECTIVE DETECTIVE DETECTIVE

CORRECTIVE CORRECTIVE

CORRECTIVE

UN

DE

SIR

AB

LE E

VE

NT

S

UN

DE

SIR

AB

LE E

VE

NT

S

UN

DE

SIR

AB

LE E

VE

NT

S

32

2.3.1 PREVENTANTIVE CONTROLS

According to Hall (2012), preventative controls force compliance with prescribed or

desired actions and thus screen out aberrant events. He notes that when designing

internal control systems an ounce of prevention is most certainly worth a pound of

cure. Both Hightower (2008) and Furlong (2011) agree that these are controls that

are put into place to keep errors and irregularities from happening as simply stated

by Gelinas Jr, Dull and Wheeler (2011), that they stop problems from occurring.

Furlong (2011) further alludes to the fact that while detective controls usually occur

irregularly, preventative controls occur on a regular basis. He gives examples that

range from locking the building before leaving to entering a password before

completing a transaction. Other preventative controls noted by Furlong (2011)

include testing for clerical accuracy, backing up computer data, drug testing of

employees, employee screening and training programs, segregation of duties,

enforced vacations, obtaining approval before processing a transaction and having

physical control over assets (locking money in a safe, for example).

Hopkin (2012) emphasises separation of duties as a preventative control where no

one person is not permitted to act without the consent of another when paying an

invoice. He notes that expenditure systems should prevent the same person from

ordering goods and then authorising the payment for them.

On the other hand Cannon (2011) adds that preventative controls would also include

administrative policy with technical protection and physical signs or barriers.

One main advantage of preventative controls as noted by Hopkin (2012) is that they

eliminate the hazard so that no further consideration of it is required.

2.3.2 DETECTIVE CONTROLS

Most authors agree that detective controls are designed to find errors after they have

occurred. Hightower (2008) and Furlong (2011) further allude to the fact that such

controls serve as part of a checks-and-balances system and also determine how

efficient policies are. Stewart, Tittel and Chapple (2011) describe detective controls

as a security mechanism used to verify the success of directives and preventative

controls. They describe them as actively searching for both violations of the security

policy and actual crimes, identifying attacks and errors so that appropriate action can

33

be taken citing audit trails, logs ,closed circuit television (CCTV), intrusion detection

systems and password crackers as examples., Furlong (2011) cites examples such

as surprise cash counts, taking inventory, review and approval of accounting work,

internal audits, peer reviews, and enforcement of job descriptions and expectations.

Coderre (2011) adds that the main feature of a detective control is the comparison of

what happened with what was supposed to happen. A vital point to note is that

detective controls do not prevent a problem from happening but instead, triggers an

alarm after the problem has happened Cendrowski and Mair (2009).

A sample of examples of procedures that can be classified into preventative, and

detective controls is highlighted by Hightower (2008) as depicted in the table 2.3.

Table 2.3.– Preventative and Detective Procedures

Type of Control Preventive

/Detective

Compliance with laws, GAAP, and company policies and

procedures

Detective

Compliance with company policies and procedures Detective

Compliance with contract terms and conditions Detective

Authorised and approved transactions Preventative

Payments paid and recorded Preventative

Payments received , deposited and recorded Preventative

Transactions recorded Preventative

Disclosed Detective

Reviewed Preventative

Reconciliation Detective

Integrity Preventative

Accuracy Preventative

Completeness Preventative

Timeliness Preventative

Segregation of duties Preventative

Safeguarding assets Preventative

Note. Adapted from Internal Controls, Policies and Procedures (p.44), by Hightower.

(2008). John Wiley and Sons.

34

2.3.3 CORRECTIVE CONTROLS

Corrective controls are actions taken to reverse the effects of detective errors Hall

(2012). On the other hand, Stewart, Tittel and Chapple (2011) identifies them as

instructions, procedures or guidelines used to mitigate the effects of an unwanted

activity such as attacks and errors. Simply stated by Gelinas Jr, Dull and Wheeler

(2011), they rectify problems that have occurred. Examples include manuals,

procedures, malware clean up and incident handling.

Hopkin (2011) articulates that corrective controls are the next options after it has

been decided that preventative controls are not technically feasible, operationally

desirable or cost effective.

The advantages of many corrective controls as noted by Hopkin (2011), is that they

can be simple and cost effective. They also do not require that existing practises are

eliminated or replaced with alternative methods of work. However, the major

disadvantage is that the marginal benefit that are achieved may be difficult to

quantify or conform as cost effective Hopkin (2011).

2.3.4 OTHER FORMS OF INTERNAL CONTROLS

Chambers and Rand (2011) are of the view that internal control can be classified by

control by division with supervision. They argue that this view of internal control

counsels that we should endeavour to achieve effective control by means of

judicious divisions of various sorts insisting that where adequate controls have been

achieved by divisions then we should rely to a greater extent on supervision

(Chambers and Rand, 2011).

However, Waymire (2008) classifies internal controls through internal and external

mechanism that may be employed to align the conflicting interest of managers,

shareholders and other stakeholders. He describes internal control mechanisms as

those that organisationally based and external control mechanism as those that are

market based or regulatory in nature.

He however notes that he does not understand the relationship among the various

forms of internal and external control mechanisms.

35

2.4 FRAMEWORK FOR EVALUATING INTERNAL CONTROLS

2.4.1 THE COSO FRAMEWORK

The Committee of Sponsoring Organisation of the Treadway Commission (COSO) is

a joint initiative of five private sector organisations in America which include

American Accounting Association, American Institute of CPAs’, Financial Executive

International, The Association of Accountants and Financial Professionals in

Business and The Institute of Internal Auditors (COSO, 2012) The Framework of the

Sponsoring Organisation of the Treadway Commission (COSO) introduced the

framework “Internal Control – Integrated Framework” in 1992 to support companies

and other organisations to assess and improve their internal control systems

(German Institute for Administrative Audit and Gallegos et al as cited by Moller

(2008)). Moeller (2011) observes that over the years the COSO internal controls

framework has become the worldwide guidance standard for defining, describing,

and assessing internal controls.

Bizmanualz (2008) observes that the COSO framework describes the internal control

as a process that provides reasonable assurance of organisational achievements in

processes. Amudo and Inanga (2008) identifies these processes more as primary

objectives of COSO and list them as;

• Effectiveness and efficiency of operations

• Reliability of financial reporting

• Compliance with applicable laws and regulations

In support of these processes, Rittenberg, Johnstone, and Gramling (2011) argue

that these processes are designed to assist the organisation in achieving one of its

most important objective, which is successfully implementing corporate strategies to

achieve returns for shareholders.

Burke, Guy, andTatum (2008) also observe that the COSO framework articulates

key points in the internal control definition which are;

• Internal control is a process. It is a means to an end, not an end in itself.

36

• Internal control is effected by people. It is not merely policy manuals and

forms but people at every level of the company.

• Internal control can be expected to provide only reasonable assurance, not

absolute assurance, to a company and its board of directors.

• Internal control is geared to the achievements of objectives in one or more of

the three separate but overlapping categories – financial reporting,

compliance and operations.

• Adaptable to the entity structure

(p.11.03)

The COSO frameworks notes that supporting the organisation in its efforts to

achieve its objectives are five components of internal control (COSO Internal Control

Integrated Framework, 2011) .The five dimension were depicted in the COSO

internal control cube as noted by Vilsannoiu and Serban (2010) illustrated in Figure

2.4.1

Figure 2.4.1 The COSO Internal Control Cube. Adapted from “Changing

Methodologies in Financial Audit and Their Impact on Information Systems

Audit, by Vilsanoiu and Serban, (2010). Information Economica, 14, p. 61

According to the COSO framework, a direct relationship exists between objectives

which are what an entity strives to achieve, the components, which represents what

37

is needed to achieve the objectives and the operating units, legal entities, and other

structures within the entity (COSO Internal Control Integrated framework, 2011).

Bizmualz (2008) also concurs that the COSO five components that create a

framework for internal control must all be in place to some degree for an internal

control system to be effective. The components include the control environment, risk

assessment, control activities, communication and information and finally monitoring.

COSO’s five internal control components have also been adopted over time by

various frameworks which includes Rutteman, Turnbull, the SEC (Security

Exchange Commission), PCAOB and many more others (Chambers and Rand,

2010) as the criteria to be used to assess internal control effectiveness.

The COSO framework describes the control environment as the foundation for all

other components of internal control, noting that it is the board and senior

management who establish the tone from the top regarding the importance of

internal control and expected standards of conduct. Risk assessment is

acknowledged as a dynamic and interactive process for identifying and analysing

risks to achieve the entity’s objectives, forming a basis for determining how risks

should be managed. On control activities the COSO framework depicts them as

actions established by policies and procedures to help ensure that management

directives to mitigate risks are carried out. Information and communication is

portrayed in the COSO framework as occurring both internally and externally and

enables all personnel to understand internal control responsibilities and their

importance to the achievements of objectives. On the other hand monitoring

activities are considered ongoing, separate evaluations or some combination of the

two used to ascertain whether each of the five components of internal control are

present and functioning (COSO Internal Control Integrated Framework, 2011).

The COSO framework also acknowledges the limitations of internal controls which

result from the quality and suitability of objectives, human judgement frailties in

decision making, cost versus benefit decisions, human failures, collusions between

people and management overrides.

The COSO framework thus concludes that these limitations preclude the board and

management from having absolute assurance of the achievements of the entities

38

objectives that is, controls provide reasonable but not absolute assurance. (COSO

Internal Control Integrated Framework, 2011).

COSO has decided to review its internal control framework as noted by Tysiac

(2012), who reports that COSO recently postponed release of its updated internal

control framework until the first quarter of 2013. The reasons according to the COSO

chairman, was to allow time to consider issues that were raised and the substance of

the comment letters raised by contributors to the exposure draft.

2.4.2 CRITICISM OF THE COSO FRAMEWORK

The COSO model has been criticized for failing to prevent the frauds and

restatements seen over the last decade (Lindorff, 2012). Tim Leech the managing

director of Canadian Consultancy Risk Oversight was quoted by Lindorff (2012) as

being sceptical and viewed the framework as too limited in scope and failing to deal

with forward risk. Lindorff (2012) also quotes Carol Fox the director of strategic and

enterprise risk practise at the Risk and Insurance Management Society as saying

that the framework does not look at past things that have an auditable line and also

does not look at the links that could lead to risks.

In their COSO survey report Beasley, Branson and Hancock (2010) found out that

most respondents believed that the COSO framework was overly theoretical. About

a quarter (26.5%) responded significantly to the perception that the COSO

framework contains overly vague guidance. 26.4 % believe that the depicted cube is

unnecessarily complicated and causes negative reaction to the COSO framework.

2.5 THE IMPORTANCE OF INTERNAL CONTROL SYSTEMS

If organisations are to be successful, as observed by Heitz and Parry (2010),

management must have adequate control of the operations of the business such that

records of business activities are reliable and timely, as a source of information for

decision making.

In United States of America Huang (2009) notes that firms are mandated to comply

with the Sarbanese- Oxley Act.

The law stipulates that management of an organisation is required to produce an

internal control report that affirms the responsibility of management for establishing

39

and maintaining an adequate internal control structure and procedures for financial

reporting.

On the other hand, Mulli and Ali (2011) notes that internal control systems have

continued to be a major concern in governance and this importance has been

magnified in the recent years due to global increase in financial scandals and

malpractices. Reports by various watchdog organisations have continued to serialize

massive financial frauds and malpractices in organisations despite having internal

controls in place. Leitch (2008), contends that internal controls is a process designed

to provide reasonable assurance as to achievement of controls in three areas of

effectiveness and efficiency of operations, reliability of financial reporting and

compliance with applicable laws and regulations. This is supported by Trenerry

(2009) who believes that a study of internal controls requires a study of the total

business environment. He contends that an organised and correctly constructed

system will have internal controls that check and confirm the operations of other

internal controls. Rittenberg, Johnston, Gramling and Schwieger (2009) add that the

quality of internal controls over financial reporting is an important part of an

organisation’s commitment to good governance.

The importance of internal controls in America has been highlighted by the

development of a broad integrated framework of internal control by the Committee of

Sponsoring Organizations of the Treadway Commission (COSO), which sought to

provide guidelines for creating, adapting and monitoring systems of control (Agbejule

and Jokipii, 2008). As recent as January 2012 COSO had issued an exposure draft

seeking comments on an updated internal control framework designed to help

organizations perform with efficiency and confidence (Tysiac, 2012). Mooler (2010)

believes that COSO can be considered the Master Framework of Internal Control

Systems because of its all encompassing of internal control issues. Internal control

frameworks are chosen to explain internal control: through them, important elements

of control and its relationships can be understood.

On the contrary, in other countries such as Canada, Hai, Gordon and Steven (2011)

notes that public disclosure about effectiveness of internal control systems is subject

to much controversy, resulting in Canadian disclosures being made in Management

40

Discussion and Analysis (MDandA). These disclosures are provided to investors

without a definition of the weaknesses to be reported, without implementation

effectiveness testing, with no direct management certification, and with no external

audit of such disclosures.

However, Hopkin (2012) concludes that the primary purpose of internal control

activities is to help the organisation achieve its objectives. He argues that the

purpose of internal controls are as follows:

• Safeguard and protect the assets of the organisation;

• Ensure the keeping of accurate records;

• Promote operational effectiveness and efficiency;

• Adhere to policies and procedures, including control procedures;

• Enhance reliability internal and external reporting;

• Ensure compliance with laws and regulations;

• Safeguard the interest of shareholders /stakeholders

(p.335)

The above purposes were summed up as threefold objectives by Warren, Reeve and

Duchac (2011), who contended that the objectives of internal control are to provide

assurance that:

i. Assets are safeguarded and used for business purposes.

ii. Business information is accurate

iii. Employees and managers comply with laws and regulations

That assurance according to Pfister (2009) is given when internal control is without

any material weakness.

2.6 FACTORS INFLUENCING INTERNAL CONTROL SYSTEMS

The Institute of Chartered Accountants in England and Wales (2009) issued a

guideline on internal control which contends that a sound system of internal control

depends on a thorough and regular evaluation of the nature and extent of the risks to

which the company is exposed. It further states that since profits are, in part, the

reward for successful risk taking in business, the purpose of internal control is to help

manage and control risk appropriately rather than to eliminate it. This approach is

41

further buttressed by the University of California guide on Understanding Internal

Controls (2009) which notes that risk is the probability that an event or action will

adversely affect the organization. The guide further attests that in order to achieve

goals and objectives, management needs to effectively balance risks and controls.

The guide concludes that control procedures need to be developed so that they

decrease risk to a level where management can accept the exposure to that risk.

Warren, Reeve and Duchac (2011) contend that the control environment is the

overall attitude of management and employees about the importance of controls.

They identified three factors which influence a company’s control environment as

follows:

i. Management ‘S philosophy and operating style

ii. The company’s organisational structure

iii. The company’s personnel policies

They state that management philosophy and operating style relates to whether

management emphasise the importance of internal controls. They further argue that

an effective control environment is created when management emphasis is on

controls and adherence to control policies whereas overemphasis on operating goals

and tolerating deviations from control policies creates an ineffective control

environment. The business’s organisational structure is viewed as the framework for

planning and controlling operations clearly delineating roles and responsibilities.

Furthermore, they state that company’s personnel policies involve the hiring,

training, evaluation, compensation and promotion of employees coupled with job

description, employee codes of ethics and conflict of interest policies, all being part

of the personnel policies, can enhance the internal control environment. However,

Rich, Jones, Mowen and Hansen (2011) whilst agreeing on the two elements of

management style and personnel policies contend that the third element is the

overall integrity, attitude, awareness and actions of everyone in the business

concerning the importance of controls.

A study on internal audit roles by Soh and Sussan (2007) suggested significant

expansion and refocus of the role of internal auditor and perceptions of its

effectiveness. However, the findings also suggest that performance evaluation

42

mechanisms of internal audit have not evolved contemporaneously. The

misalignment between the role and evaluation gives rise to difficulty in assessing the

extent to which internal audit functions are meeting stakeholders' expectations.

However, in Italy, Minelli, Rebora and Turri (2008) after an analysis of over a 15

years period, concluded that acceptance or otherwise of control, professional ability

and competence, coherence between methods and the object of control and

transparency, all appear as discriminating factors in the failure or success of control

systems.

The Scottish government issued a statement on internal controls outlining judgement

as a significant internal control issue (Statement on internal control, 2008). Several

factors are outlined which help in making judgement on internal controls and these

are:

• The issue seriously prejudiced or prevented achievement of a key target

• The issue has resulted in a need to seek additional funding to allow it to be

resolved, or has resulted in significant diversion of resources from another

aspect of the business

• The external auditor regards it as having a material impact on the accounts

• The audit committee advises it should be considered significant for this

purposes

• The head of internal audit reports on it as significant for this purpose in their

annual opinion on the whole of risk, control and governance.

• The issue or its impact has attracted significant public interest or has seriously

damaged the reputation of the body.

(para. 9)

2.7 SERVICE DELIVERY

2.7.1 DEFINING SERVICE DELIVERY

In the most simplest form, the online Cambridge business dictionary defines service

delivery as the act of providing a service to a customer (Cambridge Dictionaries

Online, 2011). Gibson (2011) acknowledges that though there have been changes in

the customer service industry the definition of customer service has not changed.

He defines customer service delivery as the process of satisfying the customer,

43

relative to a product or service, in whatever way the customer defines his or her

need and having that service delivered with efficiency , compassion and sensitivity.

On the other hand Snow and Yanovitch (2009) identifies service delivery as

encompassing the people element of the organisation noting that successful service

delivery is driven by employees performing in such a way that your customers not

only want to come back but they automatically come back.

However Rushton, Croucher and Baker (2010) perceive that one way of considering

customer service is to differentiate between the core product itself and the service

elements related to the product. They argue that the core product concerns the item

itself in terms of the technical content, product features, and the ease of use, the

style and the quality. They further argue that the service elements, represent the

availability of the product, the ease of ordering, the speed of delivery, after sales

support.

2.7.2 ELEMENTS OF CUSTOMER SERVICE DELIVERY

Firms must consider the cost of providing good customer service such as faster

transport, greater safety stock levels, service provider training and better

communication systems as well as the benefits of keeping customer’s future profit

streams (Wisner, Tan and Leong, 2011). Ballou as cited by Mendes (2011)

presents the elements of customer service according to when the transaction

between the supplier and the customer take place. He identifies three categories

which are also supported by Wisner, Tan and Leong (2011) as follows:

• Pre-transaction elements.

• Transaction elements

• Post transaction

Mendes (2011) argues that pre-transaction elements establish a climate for good

customer service providing a written statement of customer service policy

encompassing delivery times, handling returns and back orders procedures,

shipment methods and prioritisation procedures during shortages.

They also include contingency plans for labour and work stoppages. Furthermore

they incorporate organisational structures that implement customer service policy

44

including customer training. Transaction elements on the other hand are observed to

be those that directly result in the delivery of the product to the customer. They

include setting stock levels, delivery modes, order processing procedures which

affect delivery times, accuracy of order, condition on delivery and stock availability.

On Post transaction elements, Mendes (2011) notes that these represent the array

of services needed to support the product in the field, to protect consumers from

defective products, to provide for the return of packages and to handle claims,

complaints and returns.

A different view is proffered by Wellington (2010) who identifies six elements which

he believes directly influence customer service and these he lists as:

• The product or service

• Sales

• After sales

• Location

• Time

• Culture

However, a more pragmatic view is the one by McConnell (2010), who articulates

that the essentials of customer services in any activity in which employees deal

directly with customers are systems, strategies and employees. He describes

systems as policies, protocols, procedures, arrangement and accessibility of the

physical facilities, staffing, operations, workflow, and performance monitoring, which

must provide an effective and customer friendly environment. On strategies

McConnell (2010) sees them as consisting of developing a customer oriented culture

which is achieved when every employee understands that a good service is

expected, that exceptional service is rewarded , and that unsatisfactory service is not

tolerated. He further argues that employees are our best customers and must be

satisfied first before other customers, noting that a well satisfied employee is one

who is capable of extending the best in customer service to others.

45

2.7.3 CHALLENGES IN SERVICE DELIVERY

Butcher, Wanna and Freyens (2009), admit that service delivery is an inherently

complex enterprise, requiring managing across a huge number of fronts, often

simultaneously. They note that managers are accountable for the use of resources

associated with the delivery of services, maintaining constructive relationships with a

variety of stakeholders and for results. They indicate that failure on one of these

fronts can have cascading effects across others.

Policy failures during implementation is one major challenge noted by Butcher,

Wanna and Freyens (2009) as affecting service delivery. They explain that policy

models assume that policy implementation proceeds by approved processes that

need to be managed and controlled which however is disturbed by the political world

and policy environment. This results in policy being ad hoc, procedures being

inverted or discarded and sequence being staccato, broken and disjointed.

Information communication and Technology (ICT) is another aspect that places

challenges in service delivery as noted by Butcher, Wanna and Freyens (2009).

They argue that they are only a small sample of existing and potential applications of

ICT available to governments to support the delivery of services. Technological

change has often led to larger minimum efficiencies of scale in service delivery which

conflicts with shrinking rural demand as noted by the Organisation for Economic Co-

operation and Development (OECD, 2011).

Picazo and Zhao(2009) point to the issue of appropriate human resources as

affecting service delivery. Citing the Zambia health system, they noted that the

human resource situation in Zambia was at the state of a crisis. They observed that

the lack of appropriate human resources, which was worsened by the high attrition

rate has severely undermined the system’s capacity to deliver health services. In

concluding on poor service delivery in municipalities and citing governance as a

challenge, Idasa (2010) point out a number of issues that include the degree of

corruption, institutionalised capacity constraints relating to appropriate skills and

staff, and lack of transparency among major issues impacting on service delivery.

46

2.8 EFFECTIVE INTERNAL COTROL SYSTEMS AND SERVICE D ELIVERY

Hightower (2008) notes that companies with effective controls experience

improvements in operational effectiveness, efficiency, communication, reliability,

flexibility and resilience. She further articulates that companies with effective controls

have an ability to execute as planned, allocate resources predictably, and provide

consistent and reliable data and information available for decision making and

reporting. Leitch (2008) also believes that controls designed as an integral system

rather than a piecemeal can be more efficient and effective. He alludes to the fact

that this is so if special skill is applied and the focus is on value rather than just risk

coverage.

Harrer (2008) articulates that management and the board of directors can conclude

that internal controls are effective if there is reasonable assurance that:

• Operational objectives are achieved

• Published financial statements are reliable

• The company is complying with applicable laws and regulations

A wholesome dimension to effective internal controls is articulated by Pickett and

Pickett (2010) who observe that internal control is most effective when controls are

built into the entity’s infrastructure and are part of the essence of the enterprise.

They argue that built in controls support quality and empowerment initiatives at the

same time avoiding unnecessary costs thus enabling quick response to changing

conditions.

Braiotta, Gazzaway, Colson, Colson and Ramamoorti (2010) sum up by arguing

that just as an organisation cannot produce reliable services or products without

good controls over service delivery or manufacturing processes, it cannot produce

consistently reliable financial statements without good internal controls over financial

reporting.

47

Harrer (2008) notes that internal controls do not ensure success, however bad

decisions, poor managers, competition, collusion and override of controls can still

cause unreliable financial reports. He however argues that strong controls put up

roadblocks for fraud, bad decisions and human error and help to minimise pitfalls

and surprises. He concludes that an effective control system enables management

to discover and manage significant risks and monitor the integrity of financial and

operating information

On the other hand, Johnstone, Gramling, and Rittenberg (2011), advice that

management develop good internal controls for one fundamental reason, that is,

better internal controls lead to better data for decisions and increase the likelihood of

organisational success and sustainability. They argue that the assessment of internal

control should be a by product of good internal control process.

Goh and Li (2010) observe that weak internal controls can cause unintentional errors

in accrual estimations to occur and impact on the reported book value or earnings of

a company. They further allude to the fact that weak internal controls could also

impede the timely recognition of losses. As an example they cite lack of proper

policies and procedures to regularly value a firms’ inventory of fixed assets as

preventing asset impairment from being discovered early and hence delays the

recognition of losses.

Weaknesses in internal control systems has also been blamed for longer external

audit delays (Ika and Ghazali, 2012). Some companies could not meet the regulatory

deadline of filling because of weak internal controls. On the other hand Schneider (

2009), argues that regulators contend that increased scrutiny of control systems is

necessary because control weaknesses are at the heart of large-scale fraudulent

financial reporting, e.g. Enron, WorldCom, Lucent, and HealthSouth, to name a few.

He observed that the KPMG (2003) fraud surveys also consistently identified

inadequate internal controls as a factor that contributes to the occurrence of fraud.

2.9 CHALLENGES IN IMPLEMENTING INTERNAL CONTROL SYS TEMS

Hightower (2008) identifies some major challenges in attaining cost –effective

internal controls which he listed as follows;

48

• Obtaining sufficient resources to achieve adequate segregation of duties

• Management’s ability to dominate activities with significant opportunity for

management override control

• Recruiting individuals with requisite financial reporting and other expertise to

serve effectively on the board of directors and audit committees

• Recruiting and retaining personnel with sufficient experiences and skill in

accounting and financial reporting

• Taking management attention from running the business in order to provide

sufficient focus on accounting and financial reporting.

• Maintaining appropriate control over computer information systems with

limited technical resources.

(p.8)

On the other hand, Moeller (2009) specifies communication and relations as a major

obstacle that involves a target for internal audit that is always moving forward. He

further alludes to the fact that internal audit’s success in meeting that challenge

provides one of the greatest available opportunities to serve the organisation and to

achieve its maximum welfare. One of the moving challenges is also outlined by

Deluccia, IV (2008) who notes that the political stances of countries change with

each new election or lack thereof and directly impact company’s ability to sustain

operations in different political environments. He recommends that companies

should establish operational plans to respond when political and public opinion make

it difficult to conduct business. In buttressing this point Tarantino (2010) combines

cultural and politics noting that Japanese people’s belief that human beings are

inherently good and management trusts in the loyalty of its employees and sees it as

a negative thing to effectively spy on them by implementing internal controls.

Brown and Nasuti (as cited by Kumar, Pollanen and Maheshwari, 2008) identified

several technical problems that related to designing, implementing and managing

enterprise architecture. Among the identified problems were data structures,

inadequate security and differences in infrastructure as major challenges for

companies that want to implement SOX (Sarbanes – Oxley Act) hence impacting on

their internal control designs.

49

Runatsa (2011) after studying the control environment at the University of Zimbabwe

concluded that the institution of higher learning had adequate internal controls

buttressed by active roles of top management. He however noted that the system of

internal controls needed regular review to keep pace with recent developments.

De Kocker ( 2011) in a study on anti money laundering observed that the quality of

the identification and verification measures that an institution can implement is

restricted by a number of factors which were listed as cost, client resistance, laws,

Internationalisation, consistency and reliability. He argues that whilst it may be

effective to research a client’s background for a small transaction this may not be

commercially justifiable. Furthermore, he notes that they may be client resistance

where potential clients will move to other institutions that are less intrusive or less

bureaucratic in their account opening procedures. He also notes that privacy laws

may restrict access to relevant information at the same time identification of

foreigners may also present a challenge as there is no internationalised documents

for verification, which documents may also not be reliable. Moreover, he further

argues that client details may be subject to frequent changes which may not be

sufficiently consistent or reliable to support structured information management

systems.

A more different perspective is that proffered by Roach (2010) who identified four

major challenges which have to be managed;

• Underestimating the potential for wrongdoing

• Increasing pressure

• Compliance/Internal controls are often overlooked priorities

• Law/rules are not always logical/intuitively

He argues that they are some human behaviour basics underlined by ethics which

encompass perception and reality buttressed by cheating, stealing, and resumes and

reporting. They are also internal control basics such as appropriate procedures,

training, thoughtful metrics, management commitment, audits and reviews and

discipline for non-compliance. These issues underline the internal control challenges

that have to be managed.

50

Mills et al (as cited by Kumar, Pollanen and Maheshwari, 2008) noted that

organisational culture can be a key organisational constraint in implementing new

systems and processes. They observed that as beliefs, values and norms evolve

slowly; employees can resist change particularly, if it is implemented quickly. Kumar,

Pollanen and Maheshwari (2008) then concluded that challenges can come in the

form of resistance which could be due to lack of proper guidelines.

2.11 CONCEPTUAL FRAMEWORK

The research will thus be based on a conceptual framework that identifies the

internal control system as the one outlined in the COSO framework of internal

control. This means noting processes that provide assurance in the achievement of

objectives in the following categories:

• Effectiveness and efficiency of operations.

• Reliability of financial reporting.

• Compliance with applicable laws and regulations.

The internal control system is anticipated to take the form of preventative,

detective and corrective controls and effective internal controls will be measured

against service delivery.

2.10 CHAPTER SUMMARY

In this chapter the meaning and the importance for internal control systems was

defined and argued respectively and illustrated through various authors. The forms

of internal controls articulated by some authors were also explored. Several factors

influencing internal control systems were identified and justification was also outlined

for effective internal control systems on service delivery. Finally, challenges that

impact on effective internal control systems were also assessed including literature

weaknesses. This chapter outlined the theoretical frameworks of internal control

systems.

51

CHAPTER 3

RESEARCH METHODOLOGY

3.1 INTRODUCTION

This chapter sets out the research methodology for the study. This is the system of

data collection for the research. The methodology set out herein was carefully

selected to ensure data validity, ethical considerations and reliability of measures to

ensure completion within the time frame. The chapter states the research paradigm

followed as well as outlining the research design. Also outlined is the population,

sample and the research instruments for the study.

3.2 RESEARCH DESIGN

Kothari (2008) describes research design as the arrangement for conditions for

collection and analysis of data in a manner that aims to combine relevance to the

research process with economy in procedure. He articulates that research design is

the conceptual structure within which the research is conducted constituting the blue

print for the collection, measurement and analysis of data. On the other hand Salkind

(2010) articulates that designs often rest on inductive approaches to knowledge

development. He argues that research designs may be value-driven, acknowledge

the politics of the research endeavour, be attentive to power differentials in the

community, and promote social justice or social change. Designing a research

project must include serious consideration of the ethical dimension of social science

research (Babbie, 2010).

The approach to this study will be the descriptive-normative-survey approach. This

approach involves the description, recording, analysis and interpretation of the

prevailing conditions (Marczk, DeMatteo and Festinger, 2010). Berger (2011)

articulates that surveys seek to obtain information about demographic factors such

as age, gender, marital status, occupation, race, or ethnicity, income, and religion

and to relate this information to opinions values and behaviour of some group of

people.

52

Mitchell and Jolly (2009), notes that when you use the descriptive methods, you gain

the ability to test the hypothesis about virtually any variable in virtually every

situation. On the other hand, Elmes, Kantowitz and Roediger (2011) point out four

other advantages with the descriptive observation that include being an important

source of basic knowledge, flexibility, ethological approach and ecological validity.

They however also note the weakness of lack of reproducibility which leaves a lot of

questions on other researchers.

Wood and Ross-Kerr (2011) admit that although absolute proof of causality cannot

be established in a descriptive survey, it is possible to accumulate extensive

evidence to support causality. They further noted that much of the research on

cigarette smoking and lung cancer was done using descriptive surveys. Connaway

and Powell (2010) add that while descriptive surveys are usually less rigorous than

experimental research, they are however stronger than exploratory research for

testing relationships between variables.

3.3 RESEARCH PHILOSOPHY

Collins (2010), mentions that research philosophies are the development of

knowledge and the nature of that knowledge. He argues that the research

philosophy you decide, means that you accept certain assumptions about the way

you view the world. He notes that they are three core approaches to reflecting on

research philosophy namely epistemology, the study of the theory of knowledge,

Ontology, the philosophical study of the nature of being or existence and axiology,

the study of quality or value and is often concerned with ethics and values. Research

philosophy can be approached through paradigms and Collins (2010) admits that the

list of recognised paradigms includes positivism, realism, interpretism, objectivism,

subjectivism, pragmatism, functionalism, radical humanist and radical structuralism.

Mennen (2010) acknowledges three views concerning research philosophy,

positivism, interpretivism and realism. She argues that positivist approach does not

emphasise human interest and aims to analyse quantitative data in a statistical

analysis. Armstrong (2010) agrees that positivism is the belief that researchers

should focus on facts, look for causality and fundamental laws, reduce phenomena

to their simplest elements, formulate hypothesis and then test them.

53

Bachman and Schutt (2010) on the other hand believe that qualitative research is

often guided by a different , interpretivist philosophy. They note that interpretive

social scientist believe that social reality is socially constructed and that the goal of

social scientist is to understand what meanings people give to reality, not to

determine how reality works apart from these interpretations. On realism Lessem

and Schieffer (2010) notes that the key tenets are its combined objective and

subjective nature, its interpretive as well as explanatory orientation, its stratified

nature , its recognition of human fallibility and its critical as well as emancipator

orientation.

The study on ZETDC will be a constructivist paradigm. Constructivists claim that

truth is relative and that it is dependent on one’s perspective (Baxter and Jack,

2008). This paradigm recognizes the importance of the subjective human creation of

meaning, but does not out rightly reject some notion of objectivity. Emphasis will be

on pluralism, not relativism, with focus on the circular dynamic tension of subject and

object (Yin, 2009). Constructivism is built upon the premise of a social construction

of reality (Gerring, 2007).

One of the advantages of this approach is the close collaboration between the

researcher and the participant, while enabling participants to tell their stories

(Crabtree and Miller as cited by Scot 2011). Through these stories the participants

are able to describe their views of reality and this enables the researcher to better

understand the participants’ actions (Woodside, 2010).

3.4 POPULATION AND SAMPLING TECHNIQUES

3.4.1 THE RESEARCH POPULATION

According to Lohr (2009), the target population is the complete collection of

observations we want to study. The population frame as noted by Groves, Fowler Jr,

Couper, Lepkowski, Singer, and Tourangeau. (2011) is the set of target population

members that has a chance to be selected into the survey sample.

According to Connaway and Powell (2010) the actual list of units from which the

sample or some part of the sample is selected is the Sampling frame which is often

used interchangeably with population list. Abramson and Abramson (2011) agrees

54

that the study population is the group that is studied either in toto or by selecting a

sample of its members. They further allude to the fact that the appropriateness of the

study population refers mainly to its suitability for the attainment of the objectives of

the study and that the choice of a suitable study population is one of the factors

making for originality in research. The study population should be clearly and

explicitly defined in terms of place, time and other relevant criteria (Abramson and

Abramson, 2011)

The research target population for this study is all ZETDC staff members including

board members. The company has a board of directors that has five non executive

independent members and four executive members while the company’s staff

strength is almost five thousand employees in work places across Zimbabwe.

Employee staff levels include executive management, senior management , middle

management, supervisory, and junior workers. ZETDC’s staff are in several

divisions in accordance with operational activities which include finance, human

resources, information technology (I.T), security, planning, operations and

commercial. The divisions also have numerous sections below them. The

commercial division for example, has sections such as billing, revenue, costing,

customer services and marketing.

These ZETDC employee levels and corporate divisions and sections were

considered because of their daily involvement with commercial activities that are

guided mostly by internal control systems which have a direct impact on service

delivery to customers.

3.4.2 SAMPLING

Sampling consists of selecting some part of a population to observe so that one may

estimate something about the whole population (Thompson, 2012). Babbie (2010)

articulates that the list or quasi list of elements from which a probability sample is

selected is the sampling frame. He further stipulates that for a sample to be

representative of the population it is essential that the sampling frame include all (or

nearly all) members of the population Sampling of the population and the needed

sample size depends on the resources available, ensuring that it is representative of

the whole population (Athanasiou and Darzi, 2020).

55

The procedure by which the sample of units is selected from the population is called

the sampling design (Thompson, 2012). In a sample survey, the major statistical

components are referred to as the sample design and include both the sampling plan

and the estimation procedures (Levy and Lemeshow, 2011). Marlow (2010) argues

that a key aspect of sampling is the extent to which the sample is representative of

the population. She notes that a representative sample means that the sample has

the same distribution characteristics as the population from which it is selected.

3.4.2 SAMPLING METHODS

There are two major ways in which a sample can be selected: probability and non

probability sampling. Marlow (2010) observes that probability sampling allows you to

select a sample where each element in the population has a known chance of being

selected for the sample while non probability sampling allows the researcher to

handpick the sample according to the nature of the research problem and the

phenomenon under study. She however acknowledges that non probability sampling

is limited in terms of representativeness in that the probability of each element of the

population being included in the sample is unknown. However, non probability

sampling is often the method of choice in qualitative studies where generalisation of

results is less important (Marlow, 2010). Furthermore, non probability samples are

usually easier and cheaper to obtain than are probability samples (Connaway and

Powell, 2010).

3.4.3 NON PROBABILITY SAMPLING TECHNIQUES

Accidental Sampling is a non probability sampling technique in which the

researcher simply selects the cases that are at hand until the sample reaches the

desired designated size (Connaway and Powell, 2010). This method is also known

as convenient sampling or haphazard sampling and you simply sample people who

are easy to survey but may not be representative of the population (Mitchell and

Jolley, 2012). They are also referred to as purposive or judgemental samples

because the researcher presumes that they are typical of the study population

(Abramson and Abramson (2011)

Quota Sampling is designed to make your convenience sample more

representative of the population by reserving a part for some elements of the

56

population ( Mitchell and Jolley, 2012). The quota sample method also attempts to

ensure that the different elements are included in the sample in the proportions in

which they occur in the population (Connaway and Powell, 2010)

Snowball Sampling as described by Babbie (2010) is a technique which is used

when members of a special population are difficult to locate such as homeless

individuals , migrant workers or undocumented immigrants and is often employed in

field research for exploratory purposes. Each person interviewed may be asked to

suggest additional people for interviewing and this may however result in samples

with questionable representativeness.

3.4.4 PROBABILITY SAMPLING TECHNIQUES

Random Sampling is used in a large group of population rather than small size, the

method is characterised by selecting the unit to be observed randomly from the

population like drawing a name out of a hat (Changing Minds Org as cited by Oulte,

2011). Marlow (2010) agrees that simple random is the easiest of sampling methods

where the population is treated as a whole unit and each element has an equal

probability of being selected in the sample. In order for the probabilities of including

each element and each combination of elements to be equal, it is necessary that

there be independency from one draw to the next (Connaway and Powell, 2010).

Traditional methods used in selecting simple random samples include the roulette

wheel or lottery type approach, the use of a table of random numbers or using

calculators or computer drawn numbers as noted by Connaway and Powell (2010).

Systematic Random Sampling is considered the most reliable and accurate and

simple way of selecting a sample which involves taking every nth element from a list

until the total list has been sampled (Connawa and Powell, 2010). According to

Marlow (2010), the size of n depends on the size of the sampling frame and the

intended size of the sample. She however notes that problems may arise where the

ordering of elements follow a particular pattern which could result in a distortion of

the sample.

Cluster sampling is a form of sampling used when it is not convenient to pull one or

two people out of their environment for the research or when other methods of

sampling are impractical (Weathington, Cunningham and Pittenger, 2010). The

57

sampling units are clustered and the sampling frame is a list of these clusters which

may include villages , apartments, classes of schools, households and housing units

among several such classifications (Abramson and Abramson, 2011)

Stratified Random Sampling is another variation on simple random sampling useful

especially in situations where the population contains different subgroups that the

sample must include (Weathington, Cunningham and Pittenger, 2010). This is also

supported by Abramson and Abramson (2011) who suggests that to use this method

the population is first divided into the subgroups or strata according to one or more

characteristics such as sex and age.

The advantage of this method is that it eliminates sampling variations with respect to

the properties used in stratifying and also reduces sampling error if the strata are

more uniform than the total population with respect to other properties(Abramson

and Abramson, 2011).When using proportionate stratified random sampling you do

not leave the representativeness of your sample entirely to chance (Mitchell and

Jolley, 2012).

MULTISTAGE SAMPLING

It is for the above reasons of eliminating sampling variations and reducing sampling

errors that the study on ZETDC will adopt a mixture of the Stratified and clustered

random sampling technique termed multistage sampling. Judgemental sampling will

also be utelised bearing in mind the likely response rate as it may be difficult for

some higher management levels to find time to respond off their busy schedule.

ZETDC is clustered into its head office and the five regional offices of Harare

Region, Mutare Region, Southern Region, Western Region and Northern Region.

The set up and functions in all the regional offices are basically the same hence the

suitability of the cluster approach. Thus head office and Harare regional offices were

selected as the clusters for the study for their proximity and ease of access to the

researcher.

In order to eliminate sampling variations, the selected clusters (Head Office and

Harare Region were then stratified into the various level of management that

included the board members, executive management, senior management, middle

management, supervisory and junior staff thus cutting across all levels of staff.

58

3.4.5 SAMPLE SIZE

Providing a sample size for a study is not a simply a matter of giving a single number

from a set of tables. It is and should be a multi stage process (Machin, Campbell,

Tan and Tan, 2011). The size of the sample in part depends on its homogeneity or

the similarity among different elements. If you can be assured that the characteristics

of the sample are similar on the dimensions you are interested in studying, then the

sample can be smaller (Marlow, 2010). This is accented to by Churchil and

lacobucci (2009) who observe that the question of sample size is complex because it

depends on the type of sample, the statistic in question, the homogeneity of the

population, and the time , money and personnel available for the study. They further

allude to the fact that what affects the size of the sample is the variability in the

population: the more variable the characteristic, the larger the sample needed to

estimate it with some specified level of precision.

As noted by Connawa and Powell (2010), statistical formulas have been developed

for calculating appropriate sample sizes. These take into account the confidence

level which relates to the probability of the findings, or differences between samples,

being due to chance rather than representing a real difference. However, Roscoe as

cited by Sekaran and Bougie (2010) proposed the following rules of thumb for

determining sample size :

1. Sample sizes larger than 30 and less than 500 are appropriate for most

research

2. Where samples are to be broken into subsamples :(males/female,

junior/senior, etc) a minimum sample size of 30 for each category is

necessary.

(p.296)

Using the multistage sampling technique, a sample size of 100 respondents was

preferred on the basis that this would be within the cost and time budget of the

research for administration purposes. According to Marsden and Wright (2010), in a

multistage area probability design, sample size determination is complicated by the

need to allocate the given sample size among the stages of selection and such

sample allocation decisions are based cost and variance trade- offs. In this study,

59

the clustering and stratification of the population would be done to assist greatly in

the reduction of the sample variability. The research also took into account the fact

that staff figures decrease as the management levels increase hence the need for a

representative figure at each level of management thus bringing an element of

judgemental as well.

The sample was thus drawn as follows:

Table 3.4 Sample size of the study

LEVEL OF MANAGEMENT TARGET SAMPLE

JUNIOR STAFF 60

SUPERVISORY 20

MIDDLE MANAGEMENT 10

SENIOR MANAGEMENT 5

EXECUTIVE MANAGEMENT 3

BOARD MEMBERS 2

TOTAL 100

60

3.5 RESEARCH APPROACH

Research approaches are best illustrated in the table 3.4

Table 3.4 Inductive and Deductive Strategies

Research Strategy

Nature of theory Use of Models

Inductive Form

Process

Generalisations

Networks of propositions

Generated by induction from data

Abstract description

Mathematical representations

Conceptual frameworks

Deductive Form

Process

Deductive argument produces hypothesis

Hypothesis tested by matching against data

Theoretical models

Diagrammatic representation

Mathematical represantation

Retroductive Form

Process

Generative structures and mechanisms

Modelling of hypothetical mechanisms

Abstract descriptions

May involve analogies

Abductive Form

Process

Social scientific accounts

Generated from everyday accounts

Abstract descriptions

(ideal types)

Adapted from Blaikie.(2009). Designing Social research. Polity

3.6 RESEARCH METHODS

Cross sectional

As noted by Mitchell and Jolley (2012), this is a method designed in such a way as

to obtain data on variables in different context simultaneously. Babbie (2010)

observed that they are an inexpensive research which is usually conducted when

they are constraints of time.

61

Experiments

Marlow (2010) describes experiments as research conducted in a laboratory or

natural setting which permits casual relationships to be identified with the aim of

manipulating the independent variable. He argues that they are conducted in a real

situation and Mitchell and Jolley (2012) observed that they are in the form of

repeated measure design, independent sample design ,matched pairs design or

single subject

Longitudinal

Abramson and Abramson, (2011) argues that this is a study done over time of a

variable group of subjects with the aim of researching the dynamics of a problem

through several and continuous investigations over the period of the problem.

Connawa and Powell,(2010) adds that this may involve a chain of studies.

Surveys

As described by (Marczk, DeMatteo and Festinger, 2010), in a survey a sample is

drawn from a population and studied to make inferences about the population.

Wood and Ross-Kerr (2011) notes that surveys may either be descriptive or

analytical. Descriptive is concerned with identifying and counting the frequency of a

specific population, either at one point in time or at various times for comparison

whereas Analytical survey- is where the intention is to determine whether there is

any relationship between different variables (Weathington, Cunningham and

Pittenger, 2010)

3.7 DATA COLLECTION METHODS

No matter how good its sample design, a survey will yield biased results if the rest of

the survey design is not appropriate to its purpose (Groves, Fowler, Couper,

Lepkowski, Singer and Tourangeau, 2011). According to Grinnell and Unrau (2010)

the research question directs what data are to be collected and who data could be

collected from.

They further allude to the fact that the research design refines the what question by

operationalising variables and the who question be developing a sampling strategy.

62

This is supported by Cottrell and McKenzie (2010) who suggests that if the

researcher is asking why and has comparison groups , then qualitative research

methods may not be appropriate.

They further state that If theories or variables have not been identified to explain or

understand the phenomena under study, then qualitative research methods may be

valuable.

Grinnell and Unrau (2010) point out that we must always consider which method of

data collection will lead to the most valid and reliable data to answer a specific

research question or to test a specific hypothesis. As noted by Grinnell and Unrau

(2010), data analysis should always be considered when choosing data collection

methods and data source because the analysis phase must summarise , synthesise,

and ultimately organise the data in an effort to have as clear cut an answer as

possible to our research question. Common data collection methods include in-

depth one on one interviews, focus group interviews, and direct observations

(Cottrell and McKenzie, 2010).

3.7.1 CRITERIA FOR SELECTING A DATA COLLECTION METH OD

As observed by Grinnell and Unrau (2010) there are many practical criteria that

ultimately refine the final data collection method to fit the conditions of any given

research study and these include size, scope, program participation, worker co-

operation, intrusion into the lives of research participants, resources, time and

previous research findings. However, Werner and DeSimone (2011), articulate that

there are three vital issues to consider when deciding which data collection method

to use and these are reliability, validity and practicality. They argue that reliability has

to do with the consistency of results and the freedom from error and bias, while

validity is concerned with whether the data collection method actually measures what

we want to measure and practicality concerns how much time, money, and

resources are available for an evaluation method.

63

3.7.2 INTERVIEWS

The interview method enables analysts to gather information directly from people in

the work place or people connected in various ways to the organisation and its

processes in person, groups and by telephone (Swanson, 2009).

In this process as noted by Piskurich (2010) you talk to your experts individually,

asking a series of questions or allow the interview to free form, listening to whatever

the experts have to say while questioning issues as they arise.

As noted by Marsden and Wright (2010), when interviewers administer surveys, their

utterances and behaviour are influenced by the complex interplay among their

personal characteristics and attributes, the role of interviewer, and their interaction

with sample members and respondents.

Piskurich (2010) also articulates the advantages of using interviews as a data

collection technique and notes that they can be used for almost any type of analysis,

they build supporters for training, they can easily be done at various organisational

levels, they are good for eliciting feelings and opinions and that they can be made

more efficient through technology such as the telephone.

However, Piskurichi (2010) notes that one of the problems with individual interviews

is that the individual bring their own bias into the situation and because you cannot

expect a person to be objective, you have to interview several experts from the

target population.

3.7.3 FOCUS GROUPS

When using a focus group you invite individuals who are experts on the information

you want to gather to meet and discuss what they know (Piskurich, 2010). As noted

by Liamputtong (2011), the focus group methodology is perceived as a methodology

which can generate complex information at low cost and with the minimum amount

of time while being useful in a wide range of people and groups in different settings.

They are called focus groups because the discussions start out broadly and

gradually narrow down to the focus of the research and focus groups typically

consist of 5 to 12 people (Connaway and Powell, 2010).

64

3.7.4 OBSERVATION

Observing a setting, person or group requires research skills to ensure observer

validity and reliability, to facilitate meaning and understanding across culture and

language , and to avoid drawing culturally bound interpretations (Pasick, D’Onofrio

and Otero- Sabogal as cited by Cottrell and McKenzie, 2010).

However, Gravetter and Forzano (2011) argues that there are three basic types of

observations: naturalistic, participative and contrived observation. They contend that

in naturalistic observation the researcher observes without being involved and

without altering the natural setting of the respondents whereas in participative

observation the researcher interacts with the participants and becomes one of them

to observe and record behaviour while in contrived observation the observer sets up

a situation that is likely to produce the behaviour to be observed.

3.7.5 QUESTIONNAIRES

The most common data collection method is the survey which uses a questionnaire.

Lavrakas as cited by Houser (2011) describes the survey method as an approach in

which a systematic tool is used to gather information directly from respondents about

their experience, behaviour, attitudes or perceptions. Piskurich (2010) simply

describes a survey questionnaire as a list of questions concerning the topic you are

analysing and suggests that they should be used when one wants a lot of responses

and for a widely dispensed audience.

Gravetter and Forzano (2011) observed that by presenting people with a few

carefully constructed questions, it is possible to obtain self reported answers about

attitudes, opinions, personal characteristics and behaviours. They noted that with a

survey questionnaire, a researcher does not have to wait until a behaviour or

response occurs.

The study on ZETDC adopted the common self administered survey structured

questionnaire wherein the researcher carefully crafted 20 questions to obtain an

accurate picture of events at ZETDC in respect of the internal control systems. The

questions were crafted based on the intended objectives as per the research

questions and available literature and recorded historical experiences of ZETDC.

65

Different types of questions were used to obtain responses that included the simple

yes and no answers, quantitative rating (Likert Scale), restricted response and open

ended questions. Gravetter and Forzano (2011) argues that different type of

questions encourage different types of response.

The questionnaire was divided into five different sections that were as follows:

Section A : Demographic Information – 4 Questions

Section B : Elements of the internal control environment – 3 Questions

Section C : State of the internal control system - 7 Questions

Section D : Impact on service delivery - 3 Questions

Section E : Implementation Challenges and Recommendations – 3 Questions

The questionnaire for ZETDC was physically dispatched to the workplaces of the

sampled staff by the researcher and respondents were given 1-3 days to give their

responses after which the questionnaires were recollected for analysis.

3.7.6 ALTERNATIVE METHODS OF DATA COLLECTION

As noted by Groves, Fowler, Couper, Lepkowski, Singer and Tourangeau (2011),

surveys have traditionally relied on the three basic data collection methods : mailing

paper questionnaires to respondents, having telephone interviews and sending

interviewers to correspondents ’s homes. They however argue that, the survey

modes now encompass a much wider variety of methods and approaches due to the

proliferation of computers and these include computer assisted personal

interviewing, audio computer assisted self interviewing, computer assisted telephone

interviews, interactive voice response and web surveys in which the computer

administers the question on line.

The researcher was unable to make maximum use of this technology as most of the

respondents though aware of this type of technology were not fully familiar with its

use. On this basis the researcher preferred using the traditional methods.

66

3.8 DATA ANALYSIS AND PRESENTATION

Alexander (2011), defines analysis as the investigation of the component parts of

your data and their relationship to the data source as a whole. He also adds that in

the context of data analysis, presentation deals with how you make the content of

your analysis available to a certain audience.

The data collected from the research questionnaires was edited to identify and

minimise as far as possible errors and gaps in the information obtained from

respondents. Coding was also applied depending on the measurement scale on the

questionnaires.

Using the Microsoft excel spreadsheets as a frame of analysis, frequency distribution

groups and cross tabulation will be done and the data presented using the Microsoft

charts that included tables, graphs and pie charts.

3.9 ETHICAL CONSIDERATIONS

All the data collected will be treated with strict confidence and the identity of the

respondents shall remain anonymous. Consent will be obtained first before soliciting

for participation from the respondents. The findings shall be solely for academic

purposes and shall in no way be used for any other purposes that may bring harm to

the researcher, ZETDC or the participants.

3.10 RESEARCH LIMITATIONS

The most notable problems encountered during the research include the

unwillingness to participate by targeted staff members in fear of perceived

victimisation. The researcher had to take time to persuade some of the respondents.

The possibility of bias was also another limitation particularly by management who

may intend to portray a favourable position so as to be seen to be “doing their work

properly”. Their input needed corroboration from their juniors. On the other hand

bias from juniors can also not be ruled out as they were most willing to participate.

Another limitation was the unwillingness by most respondents to answer to open

ended question on the survey questionnaire. This could have been as a result of

strict company regulations that control release of company information despite the

researcher giving assurance that the information would be treated in strict

confidence and was for academic purposes only.

67

The research sample was confined to ZETDC Head Office and Harare regional office

all geographically located in Harare due to proximity and easy access by the

researcher. ZETDC is geographically spread across the whole country of Zimbabwe

thus the research did not take into account issues such as distance, culture,

traditions, language, economic activity and weather patens which vary

geographically and which could have an impact on the research findings.

3.11 CHAPTER SUMMARY

This chapter has indicated the manner in which the research will be carried out. The

descriptive – normative survey approach was selected and the advantages were

also noted. A constructivist paradigm is to be followed on the research and the

selected data collection methods and instruments were also highlighted including

how the data will be analysed.

68

CHAPTER 4

FINDINGS AND DISCUSSION

4.0 INTRODUCTION

The aim of this study was to evaluate the internal control system at ZETDC on

service delivery. This chapter presents and analyse the research findings on the data

collected from ZETDC staff using a structured questionnaire. The study focused of

the internal control status of ZETDC and its impact on service delivery as evaluated

by the system users at ZETDC.

4.1 RESPONSE RATE

Table 4.1 Response Summary

LEVEL OF MANAGEMENT

TARGET SAMPLE

ACTUAL RESPONSE

RESPONSE RATE %

JUNIOR STAFF 60 35 58 %

SUPERVISORY 20 8 40%

MIDDLE MANAGEMENT 10 6 60%

SENIOR MANAGEMENT 5 3 60%

EXECUTIVE MANAGEMENT 3 2 67% BOARD MEMBERS 2 1 50%

TOTAL 100 55 55%

Out of the 100 questionnaires dispatched to ZETDC staff, the overall response rate

was 55%. The highest response was obtained from executive management who

registered a 66.7% return rate mainly due to the small number of 3 that was

considered and 2 responded. Except for junior staff which recorded a 40 % response

rate, all the other management levels of staff recorded an above 50% response rate

an above average representation giving a fairly reasonable figure across all staff

levels to validate the findings of the study.

4.2 DEMOGRAPHIC RESPONSE

4.2.1 LEVEL OF EXPERIENCE

Figure 4.2.1 Response by years of experience

The study shows that about 40%

between 5 and 10 years in ZETDC, followed by those above 10 years who

36% of the respondents and those between 2 and 5 years recorded

responses whilst the least number of

years in ZETDC. This again validates the study in that the majority of the

respondents were conversant with the operations at ZETDC.

4.2.2 LEVEL OF EDUCATION

Figure 4.2.2 level of education

LESS THAN 2 YEARS

2-5 YEARS

5-10 YEARS

ABOVE 10 YEARS

LEV

EL

OF

EX

PE

RIE

NC

E

LEVEL OF EXPERIENCE IN ZETDC

DIPLOMA

36%

CERTIFICATE

9%

RESPONSE BY LEVEL OF EDUCATION

DEMOGRAPHIC RESPONSE

IENCE IN ZETDC

Figure 4.2.1 Response by years of experience

about 40% of the respondents were those who had stayed

between 5 and 10 years in ZETDC, followed by those above 10 years who

and those between 2 and 5 years recorded

responses whilst the least number of 9% of respondents was from those be

years in ZETDC. This again validates the study in that the majority of the

respondents were conversant with the operations at ZETDC.

LEVEL OF EDUCATION

Figure 4.2.2 level of education

9%

15%

40%

36%

LEVEL OF EXPERIENCE IN ZETDC

Number of respondents

MASTER

DEGREE

22%

UNDERGRADUATE

DEGREE

33%

CERTIFICATE

9%

RESPONSE BY LEVEL OF EDUCATION

69

those who had stayed

between 5 and 10 years in ZETDC, followed by those above 10 years who made up

and those between 2 and 5 years recorded 15% of the total

respondents was from those below 2

years in ZETDC. This again validates the study in that the majority of the

40%

The level of education by all the respondents was quite high.

respondents had diploma qualifications followed by undergraduates (33%), then

master degree (22%) and certificate level (9%). The understanding of the concepts

of the study was therefore assumed to be very high among the respondents ensuring

that the responses given were appropriately articulated with the subject under

discussion. It follows that all the respondents understood the questions to respond

objectively. The high educa

no spoilt papers.

4.2.3 DEPARTMENTS IN ZETDC

Figure 4.2.3 Response by Department

Almost 30% of all respondents

24% whilst operations had 18%. The other sections that responded were human

resources which contributed 9% of the respondents while audit, information

technology, marketing, planning all contributed 16 % of respondents. This is

significant in that whilst internal controls are expected across all sections of ZETDC,

there are sections where controls are significantly evident and interact with the

customer directly and these are the sections that had a good response such as

finance, commercial and operations.

0.0

FINANCE

HUMAN RESOURCES

OPERATIONS

COMMERCIAL

MARKETING

PLANNING

AUDIT

I.T

SECURITY

OTHER

% RESPONSE BY DEPARTMENT

The level of education by all the respondents was quite high. About

had diploma qualifications followed by undergraduates (33%), then

master degree (22%) and certificate level (9%). The understanding of the concepts

therefore assumed to be very high among the respondents ensuring

that the responses given were appropriately articulated with the subject under

discussion. It follows that all the respondents understood the questions to respond

objectively. The high education level of the respondents also explains why they were

IN ZETDC

Figure 4.2.3 Response by Department

30% of all respondents were from finance section, commercial section had

24% whilst operations had 18%. The other sections that responded were human

resources which contributed 9% of the respondents while audit, information

technology, marketing, planning all contributed 16 % of respondents. This is

nificant in that whilst internal controls are expected across all sections of ZETDC,

there are sections where controls are significantly evident and interact with the

customer directly and these are the sections that had a good response such as

mmercial and operations.

10.0 20.0 30.0 40.0

% RESPONSE BY DEPARTMENT

% RESPONSE

70

About 36% of the

had diploma qualifications followed by undergraduates (33%), then

master degree (22%) and certificate level (9%). The understanding of the concepts

therefore assumed to be very high among the respondents ensuring

that the responses given were appropriately articulated with the subject under

discussion. It follows that all the respondents understood the questions to respond

tion level of the respondents also explains why they were

commercial section had

24% whilst operations had 18%. The other sections that responded were human

resources which contributed 9% of the respondents while audit, information

technology, marketing, planning all contributed 16 % of respondents. This is

nificant in that whilst internal controls are expected across all sections of ZETDC,

there are sections where controls are significantly evident and interact with the

customer directly and these are the sections that had a good response such as

71

The results of the study can thus be assumed to reflect the majority views from

sections that direct interact with the customer on service delivery and are best

placed to make an informed judgement.

4.3 ELEMENTS OF THE INTERNAL CONTROL SYSTEM

4.3.1 INTEGRITY AND ETHICAL VALUES

Table 4.3 Response on integrity and ethical value

The majority of respondents (83%) concurred that ZETDC has a code of conduct, 11

% were not sure and only 6% disagreed and these were all junior staff members.

69% of the respondents agreed that ZETDC deals with violations of the code of

conduct while only 7% opposed this. The opposition came from 3 junior staff

respondents and 1 board member respondent. A significant number, 24% were not

sure whether violations of the code of conduct are identified and dealt with in a

manner that reinforces the company’s integrity.

A greater part of the respondents, 61 % opposed the view that the company was

viewed as one with ethical standards, the finance division and commercial division

had 10% respondents each, followed by the operations divisions which had 7% of

respondents and 4% of respondents were from Human Resources section. A total of

11 % of respondents were junior staff who perceived that employees and stake

holders view the company as one with high ethical standards.

These results imply that employees of ZETDC perceive that their company does not

have high ethical standards. It is however ironic that despite the majority of the

correspondents acknowledging the existence and execution of a code of conduct,

STRONGLY

AGREE AGREE NOT SURE DISAGREE

STRONGLY

DISAGREE TOTAL %

The company has a code of conduct 27% 56% 11% 6% 0% 100%

Violations of the code of conduct are delt with 11% 58% 24% 5% 2% 100%

Employees and stakeholders view the company

as one with high ethical standards 0% 24% 15% 56% 5% 100%

many among them still felt the company lacked integrity and ethics. Perhaps a better

response could have been obtained if respondents had been asked to explain t

responses. A high response rate on correspondents

the answers on the company’s ethics and integrity could also indicate that a high

number of staff take no interest in the administrative issues of the company

they are not well informed of these events in the organisation

sentiments on ZETDC’s integrity and ethics revealed by the staff members cascades

even across the customer base as

about ZETDC.

Warren, Reeve and Duchac (2011)

overall attitude of management and employees about the importance of controls.

These results show that the

in the COSO internal control framework is missing in ZETDC thus weakening the

internal control system. This

contend that internal controls can be viewed as including five components

mentioning which include

procedures, monitoring, and information communication.

4.3.2 REVIEW OF MANAGEMENT OPERATING

Figure 4.3.2 Review of Management

Management emphasis integrity

Management reviews information

Management values feedback

Management regulary review

procedures to meet new demands

Management

emphasis integrity

MANAGEMENT PHYLOSOPHY

many among them still felt the company lacked integrity and ethics. Perhaps a better

response could have been obtained if respondents had been asked to explain t

responses. A high response rate on correspondents selecting the

the company’s ethics and integrity could also indicate that a high

number of staff take no interest in the administrative issues of the company

y are not well informed of these events in the organisation

sentiments on ZETDC’s integrity and ethics revealed by the staff members cascades

across the customer base as evidenced by negative stories

Duchac (2011) contend that the control environment is the

overall attitude of management and employees about the importance of controls.

the element of integrity of the control environment

ternal control framework is missing in ZETDC thus weakening the

This is also contrary to what Delaney and Whittington (2012)

contend that internal controls can be viewed as including five components

mentioning which include the control environment, risk assessment, control

procedures, monitoring, and information communication.

MANAGEMENT OPERATING STYLE

Management Style of Operating System

0% 20% 40% 60%

Management emphasis integrity

Management reviews information

Management values feedback

Management regulary review

procedures to meet new demands

55% YES

63% YES

72% YES

8% YES

35% NO

32% NO

20% NO

76% NO

10% NOT SURE

5 % NOT SURE

8% NOT SURE

16% NOT SURE

Management

emphasis integrity

Management

reviews information

Management

values feedback

Management

regulary review

procedures to meet

new demands

MANAGEMENT PHYLOSOPHY

72

many among them still felt the company lacked integrity and ethics. Perhaps a better

response could have been obtained if respondents had been asked to explain their

selecting the unsure option to

the company’s ethics and integrity could also indicate that a high

number of staff take no interest in the administrative issues of the company or that

y are not well informed of these events in the organisation. The negative

sentiments on ZETDC’s integrity and ethics revealed by the staff members cascades

evidenced by negative stories in press reports

contend that the control environment is the

overall attitude of management and employees about the importance of controls.

the control environment as set out

ternal control framework is missing in ZETDC thus weakening the

Delaney and Whittington (2012)

contend that internal controls can be viewed as including five components

ontrol environment, risk assessment, control

80%

Management

regulary review

procedures to meet

new demands

73

Figure 4.3.4 shows that slightly above half of the respondents, agreed that

management emphasises the importance of integrity in financial reporting with

disproval emanating from 45% of junior staff and 37% supervisory staff who made up

the 35% no response. This could largely be due to too many reporting layers within

the organisation effectively creating a top down communication gap. Almost three

quarters (72%) of all correspondents agreed that management values customer

feedback whereas 24% of junior staff and 25% of supervisory staff did not agree,

constituting 20% of the total no answers by respondents. Management was found

wanting in the review of procedures to meet new customer demands as 76 % of

respondents did not agree and twice as much as those who agreed were not sure

that management were reviewing control procedures. However, respondents were

overwhelmingly in support that management values customer feedback as 72% of

respondents agreed while 63% of respondents also agreed that management had

processes in place to review information before it goes public.

The COSO framework describes the control environment as the foundation for all

other components of internal control, noting that it is the board and senior

management who establish the tone from the top regarding the importance of

internal control and expected standards of conduct and thus ZETDC partially fulfils

this aspects.

4.3.3 THE ORGANISATIONAL STRUCTURE AND INTERNAL CON TROL

Respondents were asked four questions on the internal control systems of the

organisational structure and the responses are highlighted as follows;

Figure 4.3.3 Responses on Organisational Structure

Responses to the four questions on ZETDC’s structure on internal control

majority of affirmative answers except on the qu

82% of the respondents agreed that there are human resources policies that are

designed to promote internal controls and 13% did not agree, while 5% were not

sure. On the other hand, 65% of respondents also agreed that ther

of authority and responsibilities for all individuals whereas 27% did not agree while

8% were unsure.

Furthermore, a total of 78% of the respondents confirmed the commitment of ZETDC

to hiring competent individuals, 16% did not concur w

Despite the majority 61% respondents affirming that performance evaluations were

consistent with promoting internal controls, a significant 25% of respondents did not

agree, as well as 14% respondents who were not sure whether this

position. There were more respondents (45%) who did not agree that the

organisational structure facilitates communication than those who agreed (35%)

while 25% of the respondents were not sure.

In all the four questions on ZETDC’s structur

management all had ‘Yes’ answers to their responses whilst the majority in the junior

staff members preferred a ‘not sure’ answer hence a high rate of ‘not sure’

responses to all the four questions.

Org structure facilitates communication

Perf evaluations promote internal controls

Org committed to hire competent indiv

Clear lines of authority and responsibility

established

HR policies designed to promote internal

controls

Figure 4.3.3 Responses on Organisational Structure

Responses to the four questions on ZETDC’s structure on internal control

majority of affirmative answers except on the question for communication.

82% of the respondents agreed that there are human resources policies that are

designed to promote internal controls and 13% did not agree, while 5% were not

sure. On the other hand, 65% of respondents also agreed that ther

of authority and responsibilities for all individuals whereas 27% did not agree while

Furthermore, a total of 78% of the respondents confirmed the commitment of ZETDC

to hiring competent individuals, 16% did not concur while 6% remained unsure.

Despite the majority 61% respondents affirming that performance evaluations were

consistent with promoting internal controls, a significant 25% of respondents did not

agree, as well as 14% respondents who were not sure whether this

position. There were more respondents (45%) who did not agree that the

organisational structure facilitates communication than those who agreed (35%)

while 25% of the respondents were not sure.

In all the four questions on ZETDC’s structure, board member, executive and senior

management all had ‘Yes’ answers to their responses whilst the majority in the junior

staff members preferred a ‘not sure’ answer hence a high rate of ‘not sure’

responses to all the four questions.

0 10 20 30 40 50 60 70

Org structure facilitates communication

Perf evaluations promote internal controls

Org committed to hire competent indiv

Clear lines of authority and responsibility

established

HR policies designed to promote internal

controls

35% Y

61% Y

78% Y

65% Y

82% Y

45% N

25% N

16% N

27% N

13% N

20% NS

14% NS

6% NS

8% NS

5% NSNOT SURE NO YES

74

Responses to the four questions on ZETDC’s structure on internal controls had the

estion for communication. About

82% of the respondents agreed that there are human resources policies that are

designed to promote internal controls and 13% did not agree, while 5% were not

sure. On the other hand, 65% of respondents also agreed that there are clear lines

of authority and responsibilities for all individuals whereas 27% did not agree while

Furthermore, a total of 78% of the respondents confirmed the commitment of ZETDC

hile 6% remained unsure.

Despite the majority 61% respondents affirming that performance evaluations were

consistent with promoting internal controls, a significant 25% of respondents did not

agree, as well as 14% respondents who were not sure whether this was indeed the

position. There were more respondents (45%) who did not agree that the

organisational structure facilitates communication than those who agreed (35%)

e, board member, executive and senior

management all had ‘Yes’ answers to their responses whilst the majority in the junior

staff members preferred a ‘not sure’ answer hence a high rate of ‘not sure’

70 80 90

78% Y

82% Y

75

It can be assumed that the senior executive of ZETDC are protective of the

organisational structure as they are highly involved in its creation whereas junior staff

members are unwilling to comment on the structure as they are not privy to its

production. However, there were a substantial number of junior staff respondents

that selected either a ‘Yes’ or ‘No’ answer than those with a ‘Not Sure’ responses to

validate the responses on the organisational structure of ZETDC.

The results support the views noted by Needles, Powers, and Crosson (2010) who

argue that employees must understand exactly what their functions are if they are to

effectively communicate within the organisation. The business’s organisational

structure is viewed as the framework for planning and controlling operations clearly

delineating roles and responsibilities.

4.4 STATE OF THE INTERNAL CONTROL SYSTEM

A total of seven questions were put across to respondents to ascertain the current

state of the internal control system in ZETDC. The questions covered issues on type

of controls, internal control frameworks, internal control reviews and internal control

breaches.

4.4.1 FORMS OF INTERNAL CONTROLS

Respondents were asked whether in their sections they were preventative, detective,

corrective or other controls or to respond if there were no controls at all. Results

reveal that most respondents either did not understand the listed type of controls or

did not have confidence that the type of controls were operational.

Table 4.4.1 Forms of Internal Controls at ZETDC

76

Results from the finance sections indicated that 47% of respondents believe that

there are preventative controls, 82 % believe there are detective controls and 47%

believe that there are corrective controls. However, all respondents in the human

resources and planning departments believe they have preventative controls while

all respondents in Audit and Information technology believe they have detective

controls. There is a significantly high number of respondents who are not sure of the

type of controls in their departments. There were 50% respondents from the

operations department who were not sure whether they have preventative controls

and 30% were not sure whether they have detective controls, on the other hand, in

finance 35% of respondents were not sure whether they had preventative controls

while 24% were also not sure whether they had corrective controls.

However results for departments such as audit, information technology, marketing

and planning need to be viewed with caution as there were very few respondents

numbering 4, 3 and 1 each respectively. It follows that a number of ZETDC staff are

unaware of the forms of controls governing the very operations they perform.

These results do not fully support the idea by Hall (2012) who describes internal

controls as a shield composed of three levels of controls, preventative, detective and

corrective controls. According to Hall (2012), preventative controls force compliance

with prescribed or desired actions and thus screen out aberrant events.

TYPE OF CONTROLS BY DEPARTMENTS

YES FINANCE HUMAN

RESOURCES

OPERATIONS COMMERCIAL MARKETING PLANNING AUDIT I.T OTHER

Preventative 47 100 20 54 0 100 50 67 100

Detective 82 60 50 38 0 0 100 100 0

Corrective 47 60 80 85 0 100 25 0 0

NO

Preventative 18 0 30 15 100 0 50 33 0

Detective 12 33 20 46 0 0 0 0 0

Corrective 29 20 20 0 0 0 75 0 100

NOT SURE

Preventative 35 0 50 31 0 0 0 0 0

Detective 6 7 30 15 100 100 0 0 100

Corrective 24 20 0 15 100 0 0 100 0

On the other hand Furlong (2011) allude

of a checks-and-balances system and also determine how efficient policies are.

4.4.2 INTERNAL CONTROL FRA

Respondents were asked to identify the internal control framework among the

common standard frameworks that were listed which they were using in their

sections or departments.

Figure 4.4.2 Internal Control Frameworks

Responses in figure 4.4.2 show that frameworks such as COSO, COCO, Cadbury

Report and Sarbanes Oxley act are relatively unknown in

100% no response. On the other hand, few respondents identified ISO 9000, King 3

report and TQM (Total Quality Management) as frameworks having some use in

ZETDC. This response is however inconsequential as such frameworks cannot be

implemented piecemeal in

respondents identified department/ section devised frameworks , 77% respondents

said they were on company devised frameworks while a majority, 95% said they

were on a mixture of elements of various frameworks.

0102030405060708090

100

30

100 100

70

INTERNAL CONTROL FRAMEWORKS

urlong (2011) alludes to the fact that such controls serve as part

balances system and also determine how efficient policies are.

INTERNAL CONTROL FRA MEWORKS

Respondents were asked to identify the internal control framework among the

meworks that were listed which they were using in their

Figure 4.4.2 Internal Control Frameworks

Responses in figure 4.4.2 show that frameworks such as COSO, COCO, Cadbury

Report and Sarbanes Oxley act are relatively unknown in ZETDC as shown by the

100% no response. On the other hand, few respondents identified ISO 9000, King 3

report and TQM (Total Quality Management) as frameworks having some use in

ZETDC. This response is however inconsequential as such frameworks cannot be

mplemented piecemeal in departments of one organisation. In fact, 90% of the

respondents identified department/ section devised frameworks , 77% respondents

said they were on company devised frameworks while a majority, 95% said they

elements of various frameworks.

9077

95

5

25

3

88100 95 100

65

723

5 12

INTERNAL CONTROL FRAMEWORKS

77

to the fact that such controls serve as part

balances system and also determine how efficient policies are.

Respondents were asked to identify the internal control framework among the

meworks that were listed which they were using in their

Responses in figure 4.4.2 show that frameworks such as COSO, COCO, Cadbury

ZETDC as shown by the

100% no response. On the other hand, few respondents identified ISO 9000, King 3

report and TQM (Total Quality Management) as frameworks having some use in

ZETDC. This response is however inconsequential as such frameworks cannot be

one organisation. In fact, 90% of the

respondents identified department/ section devised frameworks , 77% respondents

said they were on company devised frameworks while a majority, 95% said they

88

12

INTERNAL CONTROL FRAMEWORKS

NOT SURE

NO

YES

78

Some of the respondents’ answers indicate that they were showing that they knew

some of the frameworks rather than using them. This is particularly evident by the

responses on TQM (Total Quality Management) which attracted different

responses.TQM is a familiar topic for many workshops and it can be assumed that

many of the respondents had attended one such workshop.

The results show that ZETDC does not follow any known specific framework in its

design of its control system but largely relies on its own company devised and

department devised internal control design.

These results are in contradiction to what Moeller (2011) observed, that over the

years the COSO internal controls framework has become the worldwide guidance

standard for defining, describing, and assessing internal controls.

4.4.3 REVIEW OF THE INTERNAL CONTROL SYSTEM

Table 4.4 Responses to Internal Control Reviews

In Table 4.4 all the respondents agreed that some form of internal control reviews

are done with many respondents, that is 92%, indicating that reconciliations are done

as a review of internal controls. Audit checks were confirmed by 89% of the

respondents while 78% also indicated that they had some form of structured reports

as a control review measure.

YES NO NOT SURE TOTAL

Spot checks 66 12 22 100

Regular reports 78 12 10 100

Audit checks 89 6 5 100

Statutory checks 8 36 56 100

Peer reviews 3 66 31 100

Reconci l iations 92 3 5 100

No reviews are done 0 100 0 100

The results indicate that internal control systems at ZETDC are subject to

company’s own internal checks. This is

element within ZETDC as proposed by the COSO framework on internal controls.

The results also agree with the views of

specific actions this may include some or all of the following techniques

assessments, walk-through and observations

and/or submitted to internal control for review

and reporting records and t

4.4.4 INTERNAL CONTROL

Figure 4.4.4 Percentage response on Internal Contro l Breaches

About 45% of respondents

controls in ZETDC. A further 20% of all respondents admitted to internal control

breaches being infrequent .while only 11% said there are no breaches at all in

ZETDC.

The above figures were confirmed

of supervisory staff who confirmed the regular occurrence of internal control

breaches as indicated in table 4.4.

Regular, 45%

Not Sure, 15%

Frequence of internal control

The results indicate that internal control systems at ZETDC are subject to

own internal checks. This is an indication of a good internal control

element within ZETDC as proposed by the COSO framework on internal controls.

The results also agree with the views of Hightower (2008) that control activities

specific actions this may include some or all of the following techniques

through and observations, monitoring preformed by management

and/or submitted to internal control for review, reconciliation between source data

testing performed by management and internal control.

INTERNAL CONTROL BREACHES

Figure 4.4.4 Percentage response on Internal Contro l Breaches

of respondents indicated that there are regular breaches to internal

A further 20% of all respondents admitted to internal control

infrequent .while only 11% said there are no breaches at all in

confirmed by slightly above 54% of all junior sta

of supervisory staff who confirmed the regular occurrence of internal control

n table 4.4.

No breaches at

all, 11%Infrequent, 20%

Frequent, 9%

Frequence of internal control

breaches

79

The results indicate that internal control systems at ZETDC are subject to the

an indication of a good internal control

element within ZETDC as proposed by the COSO framework on internal controls.

control activities are

specific actions this may include some or all of the following techniques, self

onitoring preformed by management

econciliation between source data

esting performed by management and internal control.

Figure 4.4.4 Percentage response on Internal Contro l Breaches

breaches to internal

A further 20% of all respondents admitted to internal control

infrequent .while only 11% said there are no breaches at all in

54% of all junior staff and 50%

of supervisory staff who confirmed the regular occurrence of internal control

Table 4.4.4 Level of Staff Responses to Internal Control Breaches

This high response of admissions of internal control breaches is an indication of the

ineffectiveness of the control systems in ZETDC

The COSO framework also acknowledges the limitations of internal controls which

result from the quality and suitability of objectives, human judgement frailties in

decision making, cost versus benefit decisions, human failures, collusions between

people and management overrides.

4.4.5 CAUSES OF INTERNAL C

Figure 4.4.4 Causes of Internal Control Breaches

A bout 17% of respondents

of internal control breaches. Other causes identified by respondents include self

enrichments and systems shortcomings which were both identified by 16% of the

respondents. Management override wa

none of which were either board, executive or senior management members.

of the respondents indicated that fatigue was a cause of internal control breaches.

LEVEL OF STAFFJUNIOR STAFFSUPERVISORYMIDDLE MANAGEMENTSENIOR MANAGEMENTEXECUTIVE MANAGEMENTBOARD MEMBERS

Staff fatigue

Staff rewards

17%

Disgruntlements

14%

Self enrichment

16%

Table 4.4.4 Level of Staff Responses to Internal Control Breaches

of admissions of internal control breaches is an indication of the

ineffectiveness of the control systems in ZETDC that are subject to regular breaches.

The COSO framework also acknowledges the limitations of internal controls which

result from the quality and suitability of objectives, human judgement frailties in

decision making, cost versus benefit decisions, human failures, collusions between

d management overrides.

CAUSES OF INTERNAL C ONTROL BREACHES

Figure 4.4.4 Causes of Internal Control Breaches

bout 17% of respondents identified low staff rewards as one of the major causes

of internal control breaches. Other causes identified by respondents include self

enrichments and systems shortcomings which were both identified by 16% of the

respondents. Management override was also identified by 15% of the respondents,

none of which were either board, executive or senior management members.

of the respondents indicated that fatigue was a cause of internal control breaches.

No breach Infrequent Frequent Regular

3% 12% 11% 54%

50% 0 0 50%

17% 50% 0 17%

0 67% 0 33%

0 100% 0 0

0 0 100% 0

Staff

Incompetence

11%Management

override

Systems

shortcomings

Staff collusion

11%

Staff fatigue

0%

Self enrichment

16%

80

of admissions of internal control breaches is an indication of the

that are subject to regular breaches.

The COSO framework also acknowledges the limitations of internal controls which

result from the quality and suitability of objectives, human judgement frailties in

decision making, cost versus benefit decisions, human failures, collusions between

identified low staff rewards as one of the major causes

of internal control breaches. Other causes identified by respondents include self

enrichments and systems shortcomings which were both identified by 16% of the

s also identified by 15% of the respondents,

none of which were either board, executive or senior management members. None

of the respondents indicated that fatigue was a cause of internal control breaches.

Not Sure TOTAL

54% 20% 100%

50% 0 100%

17% 16% 100%

33% 0 100%

0 0 100%

0 0 100%

Management

override

15%

Systems

shortcomings

16%

The fact that most of the listed causes of

almost all the correspondents means that internal control breaches are a result of so

many factors some of which could be a combination

enrichment and systems weaknesses.

In acknowledging such weaknesses, t

limitations preclude the board and management from having absolute assurance of

the achievements of the entities objectives

consistently identified inadequate i

occurrence of fraud.

4.4.6 MEASURES TAKEN ON IN

Following on the causes of internal control breaches, respondents were further

requested to identify among the listed measures, the

experiencing an internal control breach. The listed measures included staff being

reprimanded, redressing the anomaly, addressing the loophole or taking no action at

all.

Figure 4.4.6 Action Taken on Internal Control

0.010.020.030.040.050.060.070.080.090.0

Concerned

staff was

reprimanded

Corrective

action was

redress the

70.9 %

41.8%

20.0 %

9.1 %

Action on Internal Control Breaches

The fact that most of the listed causes of internal control breaches were identified by

almost all the correspondents means that internal control breaches are a result of so

many factors some of which could be a combination of these causes

enrichment and systems weaknesses.

edging such weaknesses, the COSO framework concludes that these

limitations preclude the board and management from having absolute assurance of

the achievements of the entities objectives. KPMG (2003) fraud surveys also

consistently identified inadequate internal controls as a factor that contributes to the

MEASURES TAKEN ON IN TERNAL CONTROL BREAC HES

Following on the causes of internal control breaches, respondents were further

requested to identify among the listed measures, the action that was taken after

experiencing an internal control breach. The listed measures included staff being

reprimanded, redressing the anomaly, addressing the loophole or taking no action at

Figure 4.4.6 Action Taken on Internal Control Breaches

Corrective

action was

taken to

redress the

anomaly

Corrective

action was

taken to

address the

loophole

No action was

taken

41.8%

61.8 %

5.5 %

40.0 %

16.4%

81.8 %

18.2 %

12 %12.7%

Action on Internal Control Breaches

81

internal control breaches were identified by

almost all the correspondents means that internal control breaches are a result of so

of these causes such as self

concludes that these

limitations preclude the board and management from having absolute assurance of

(2003) fraud surveys also

that contributes to the

HES

Following on the causes of internal control breaches, respondents were further

action that was taken after

experiencing an internal control breach. The listed measures included staff being

reprimanded, redressing the anomaly, addressing the loophole or taking no action at

Action on Internal Control Breaches

YES

NO

NOT SURE

82

Figure 4.4.6 indicates that almost 80% of respondents agreed that staff who

breached internal controls were reprimanded, that is provided they were discovered,

while 20% believe that staff were not reprimanded and 10% were not sure. ZETDC

staff were inconclusive on whether action was taken to redress the anomaly with

42% agreeing that action was taken whilst 40% did not agree and 18% were not

sure. There were however conclusive responses on addressing internal control

loopholes with 62% of the respondents agreeing that action was taken to address

the loophole .Above 80% of the respondents disagreed that no action was taken on

internal control breaches.

The above results indicate that ZETDC is strong in dealing with culprits who breach

internal controls and also strong in addressing the identified loopholes while not

making similar efforts in redressing the anomaly. This could mean that many

customers are left to face their dilemma alone without any compensation where loss

is involved with ZETDC.

The results go against the elements of risk assessment as advised in the COSO

framework on internal controls. In making reference to the COSO framework Moeller

(2009) describes risk assessment as a three step process beginning with 1.

Estimation of the significance of the risk. 2. Assessing the likelihood or frequency of

the risk occurring and 3. Considering how the risk should be managed and

assessing what actions must be taken. (p. 39).

4.4.7 FORMS OF INTERNAL CONTROL BRE

Respondents were requested to list some of the internal control breaches that have

occurred in ZETDC and these were noted in Figure 4.4.7

Figure 4.4.7 Forms of Internal Control breaches in ZETDC

Figure 4.4.7 indicates that the majority of respondents totalling

indicated that asset abuse was a common internal control breach in ZETDC.

Similarly, 76% of the respondents also listed

breach on internal controls in ZETDC. Other common breaches listed include illega

connection with 47% responses, corruption with 21 responses, pilferage with 18

responses, fraud with 15 responses, favouritism with

flouting and mis-posting of transaction each had

cited breaches all had less than

15% responses, underbaking had

responses.

The fact that most respondents listed asset abuse as one of the common breaches

of internal controls means that this is where there is laxity in controls,

ineffective controls, or it could imply that the punishment on the internal control

breach is minimum and hence staff take the risk or that breaches in this a

0%

50%

100%87% 76%

47%

Forms of Control Breaches

Response …

INTERNAL CONTROL BRE ACHES IN ZETDC

were requested to list some of the internal control breaches that have

occurred in ZETDC and these were noted in Figure 4.4.7

of Internal Control breaches in ZETDC

Figure 4.4.7 indicates that the majority of respondents totalling 87%

indicated that asset abuse was a common internal control breach in ZETDC.

respondents also listed electricity bill adjustments as a common

breach on internal controls in ZETDC. Other common breaches listed include illega

responses, corruption with 21 responses, pilferage with 18

responses, fraud with 15 responses, favouritism with 38% responses. Tender

posting of transaction each had 22% responses while the rest of the

all had less than 20% responses and these include nepotism with

responses, underbaking had 9% responses and excessive leave taking had

The fact that most respondents listed asset abuse as one of the common breaches

eans that this is where there is laxity in controls,

or it could imply that the punishment on the internal control

breach is minimum and hence staff take the risk or that breaches in this a

38% 33% 27% 25% 22% 22% 15%

Forms of Control Breaches

83

were requested to list some of the internal control breaches that have

87% respondents

indicated that asset abuse was a common internal control breach in ZETDC.

ill adjustments as a common

breach on internal controls in ZETDC. Other common breaches listed include illegal

responses, corruption with 21 responses, pilferage with 18

responses. Tender

responses while the rest of the

responses and these include nepotism with

responses and excessive leave taking had 7%

The fact that most respondents listed asset abuse as one of the common breaches

eans that this is where there is laxity in controls, that is

or it could imply that the punishment on the internal control

breach is minimum and hence staff take the risk or that breaches in this area are

15% 9% 7%

difficult to detect. This cou

internal control breaches in figure 4.4

The results support Roach (2010) who identified four major challenges which have to

be managed;

• Underestimating the potential for wrongdoing

• Increasing pressure

• Compliance/Internal controls are often overlooked priorities

• Law/rules are not always logical/intuitively

He argues that they are some human behaviour basics underlined by ethics which

encompass perception and reality buttressed by cheating, stea

reporting.

4.5 IMPACT ON SERVICE DELIVERY

Respondents were asked to answer five questions relating to service delivery with

regards to the internal control system. The intentions were to relate internal controls

to service delivery, to identify drivers of internal control breaches and to recognise

effects of internal control breaches on service delivery.

4.5.1 RELATING INTERNAL CO

Figure 4.5.1 I nternal Controls

Slightly related

5%

Not related

How do you realte internal control to

service delivery ?

difficult to detect. This could also explain the order of frequencies of the listed

in figure 4.4.7.

Roach (2010) who identified four major challenges which have to

Underestimating the potential for wrongdoing

Compliance/Internal controls are often overlooked priorities

Law/rules are not always logical/intuitively

He argues that they are some human behaviour basics underlined by ethics which

encompass perception and reality buttressed by cheating, stealing, and resumes and

IMPACT ON SERVICE DELIVERY

Respondents were asked to answer five questions relating to service delivery with

regards to the internal control system. The intentions were to relate internal controls

to identify drivers of internal control breaches and to recognise

effects of internal control breaches on service delivery.

RELATING INTERNAL CO NTROLS TO SERVICE DELIVERY.

nternal Controls and Service Delivery Relationship

Directly related

91%

Not related

0%

Not Sure

4%

How do you realte internal control to

service delivery ?

84

the order of frequencies of the listed

Roach (2010) who identified four major challenges which have to

He argues that they are some human behaviour basics underlined by ethics which

ling, and resumes and

Respondents were asked to answer five questions relating to service delivery with

regards to the internal control system. The intentions were to relate internal controls

to identify drivers of internal control breaches and to recognise

LIVERY.

Relationship

Figure 4.5.1 indicates that almost all respondents (91%) indicated that internal

controls are directly related to service delivery while 5% thought that there are

slightly related and 4% were not sure while none said they were not related.

This shows that ZETDC staf

also affects service delivery directly and that the importance one places on internal

controls is a reflection of the type of service one is likely to offer.

The results support the view by

Ramamoorti (2010) who argu

services or products without good controls over service delivery or manufacturing

processes, it cannot produce consistently reliable financial statements without good

internal controls over financial reporting.

4.5.2 SERVICES AFFECTED BY

Respondents were requested to indicate from a provided list those services that they

think were most likely affected by internal control breaches

rated to be mostly affected by internal control breaches

0%

Financial reports production

Electricity bill production

New connections

Electricity Fault repairs

Connection quotations

Load shedding

Customer Enquiries

Disconnections

Meter reading

Supplier selection

Staff recruitment

Cash receipting

SERVICES WITH MOST INTERNAL CONTROL BREACHES

.1 indicates that almost all respondents (91%) indicated that internal

controls are directly related to service delivery while 5% thought that there are

slightly related and 4% were not sure while none said they were not related.

This shows that ZETDC staff is aware that any issues that affect internal controls

also affects service delivery directly and that the importance one places on internal

controls is a reflection of the type of service one is likely to offer.

The results support the view by Braiotta, Gazzaway, Colson

argues that just as an organisation cannot produce reliable

services or products without good controls over service delivery or manufacturing

processes, it cannot produce consistently reliable financial statements without good

trols over financial reporting.

SERVICES AFFECTED BY INTERNAL CONTROL BRE ACHES

Respondents were requested to indicate from a provided list those services that they

think were most likely affected by internal control breaches. The results for services

to be mostly affected by internal control breaches are depicted in Figure 4.5.2.

0% 10% 20% 30% 40% 50% 60% 70% 80%

18%

65%

38%

40%

18%

55%

20%

80%

27%

44%

78%

53%

SERVICES WITH MOST INTERNAL CONTROL BREACHES

85

.1 indicates that almost all respondents (91%) indicated that internal

controls are directly related to service delivery while 5% thought that there are

slightly related and 4% were not sure while none said they were not related.

f is aware that any issues that affect internal controls

also affects service delivery directly and that the importance one places on internal

Colson, Colson and

that just as an organisation cannot produce reliable

services or products without good controls over service delivery or manufacturing

processes, it cannot produce consistently reliable financial statements without good

ACHES

Respondents were requested to indicate from a provided list those services that they

The results for services

are depicted in Figure 4.5.2.

SERVICES WITH MOST INTERNAL CONTROL BREACHES

Material Breaches

Figure 4.5.2 Services most affected by Internal Con trol Breaches

The results in Figure 4.5.2 show that the majority of respondents (80%) ind

that disconnection of customers for non payment was the most service affected by

internal control breaches with almost a similar number of respondents (78%) also

citing Staff recruitment as another common service affected by internal control

breaches.

Other services noted by most respondents include electricity bill production (65.5%),

load shedding (55%) and cash receipting (53%) which were cited by over 50% of the

respondents.

These results are an indication that internal control breaches affect a

number of services in ZETDC and are not limited to activities that involve customers

but internal activities as well such as staff recruitment and financial reports.

The results also indicate what

controls can cause unintentional errors in accrual estimations to occur and impact on

the reported book value or earnings of a company. They further allude to the fact that

weak internal controls could also impede the timely recognition of losses.

4.5.3 IMPACT OF INTERNAL C

Respondents were asked to identify the impact that could have resulted on services

due to internal control breaches.

Figure 4.5.3 Impact on service delivery

0.0

50.0

100.0

Services

were not

done

Services were

delayed

100 % 100%

IMPACT ON SERVICE DELIVERY

Figure 4.5.2 Services most affected by Internal Con trol Breaches

The results in Figure 4.5.2 show that the majority of respondents (80%) ind

that disconnection of customers for non payment was the most service affected by

internal control breaches with almost a similar number of respondents (78%) also

citing Staff recruitment as another common service affected by internal control

Other services noted by most respondents include electricity bill production (65.5%),

load shedding (55%) and cash receipting (53%) which were cited by over 50% of the

These results are an indication that internal control breaches affect a

number of services in ZETDC and are not limited to activities that involve customers

but internal activities as well such as staff recruitment and financial reports.

The results also indicate what Goh and Li (2010) observed, that weak interna

controls can cause unintentional errors in accrual estimations to occur and impact on

the reported book value or earnings of a company. They further allude to the fact that

weak internal controls could also impede the timely recognition of losses.

IMPACT OF INTERNAL C ONTROL BREACHES ON S ERVICE DELIVERY.

Respondents were asked to identify the impact that could have resulted on services

due to internal control breaches.

Figure 4.5.3 Impact on service delivery

Services were

delayed Services were

substandardServices cost

moreNo Impact on

service

100% 100% 100%

0.0

IMPACT ON SERVICE DELIVERY

86

Figure 4.5.2 Services most affected by Internal Con trol Breaches

The results in Figure 4.5.2 show that the majority of respondents (80%) indicated

that disconnection of customers for non payment was the most service affected by

internal control breaches with almost a similar number of respondents (78%) also

citing Staff recruitment as another common service affected by internal control

Other services noted by most respondents include electricity bill production (65.5%),

load shedding (55%) and cash receipting (53%) which were cited by over 50% of the

These results are an indication that internal control breaches affect a significant

number of services in ZETDC and are not limited to activities that involve customers

but internal activities as well such as staff recruitment and financial reports.

Goh and Li (2010) observed, that weak internal

controls can cause unintentional errors in accrual estimations to occur and impact on

the reported book value or earnings of a company. They further allude to the fact that

weak internal controls could also impede the timely recognition of losses.

ERVICE DELIVERY.

Respondents were asked to identify the impact that could have resulted on services

In all cases of the listed effec

responses were recorded on affirming that required services were not done, services

were delayed , services were sub standard and that services cost more when

affected by internal control breaches. Further

that there was no impact on services when internal controls were breached.

Interestingly, no respondent

It is thus evidently clear that breaches in internal controls have associate

service delivery that are all negative.

include the degree of corruption, institutionalised capacity constraints relating to

appropriate skills and staff, and lack of transparency among major is

negatively on service delivery.

4.6 INTERNAL CONTROL IMPLEMENTATION CHALLENGES

4.6.1 CHALLENGES IN IMPROV

Respondents were asked to identify challenges that they think ZETDC faced in trying to improve its internal control system. Challenges that were confirmed are illustrated in Figure 4.6.1.

Figure 4.6.1 Challenges faced in implementing inter nal control systems

0.0

10.0

20.0

30.0

40.0

50.0

60.0

70.0

80.0

IMPLEMENTATION CHALLENGES

In all cases of the listed effects, respondents were unanimous in agreeing as 100%

responses were recorded on affirming that required services were not done, services

were delayed , services were sub standard and that services cost more when

affected by internal control breaches. Furthermore, all the respondents disagreed

no impact on services when internal controls were breached.

Interestingly, no respondent selected the unsure option on this one.

It is thus evidently clear that breaches in internal controls have associate

service delivery that are all negative. Idasa (2010) point out a number of issues that

include the degree of corruption, institutionalised capacity constraints relating to

appropriate skills and staff, and lack of transparency among major is

negatively on service delivery.

INTERNAL CONTROL IMPLEMENTATION CHALLENGES

CHALLENGES IN IMPROV ING THE INTERNAL CONTROL SYSTEM

Respondents were asked to identify challenges that they think ZETDC faced in trying ernal control system. Challenges that were confirmed are illustrated

Figure 4.6.1 Challenges faced in implementing inter nal control systems

IMPLEMENTATION CHALLENGES

87

ts, respondents were unanimous in agreeing as 100%

responses were recorded on affirming that required services were not done, services

were delayed , services were sub standard and that services cost more when

more, all the respondents disagreed

no impact on services when internal controls were breached.

It is thus evidently clear that breaches in internal controls have associated effects on

Idasa (2010) point out a number of issues that

include the degree of corruption, institutionalised capacity constraints relating to

appropriate skills and staff, and lack of transparency among major issues impacting

TROL SYSTEM

Respondents were asked to identify challenges that they think ZETDC faced in trying ernal control system. Challenges that were confirmed are illustrated

Figure 4.6.1 Challenges faced in implementing inter nal control systems

88

Staff resistance was identified by 75% of the respondents as the major obstacle in

implementing internal control improvements. Another major challenge was lack of

company strategy where 60% of respondents agreed that it is a hindrance in

improving internal controls. Slightly above half of all the respondents (55%) identified

systems integration, lack of expertise, lack of management interest and high cost as

further obstacles that hinder internal control improvements.

While some the identified challenges may appear to be beyond the influence of

ZETDC, such as high costs, the majority if not all of the challenges can all be tackled

by ZETDC.

These challenges support Roach (2010), who identified that internal control basics

such as appropriate procedures, training, thoughtful metrics, management

commitment, audits and reviews and discipline for non-compliance underline the

internal control challenges that have to be managed.

4.6.2 TECHNOLOGICAL INNOVATION IN INTERNAL CONTROLS

The proliferation of technology in recent years has put pressure upon organisation to

keep pace or face extinction. In light of technological advancements, respondents

were asked to confirm or deny whether ZETDC was responding to the technological

environment with particular reference to internal controls.

Figure 4.6.2 Responses to ZETDC’s technological ado ption

The results as illustrated by figure 4.6.2 show that all respondents disagreed that

ZETDC has not moved to new technologies while all agreeing that it is in the

processing of implementing new technologies. Furthermore, 78% of the respondents

noted that ZETDC was assessin

company had up to date technologies in the management of its internal control

system.

These results indicate that ZETDC is making some attempts to move in line with

technological demands that are now the

internal control system.

Brown and Nasuti (as cited by Kumar, Pollanen and Maheshwari, 2008) identified

several technical problems that related to designing, implementing and managing

enterprise architecture. Am

inadequate security and differences in infrastructure as major challenges for

companies that want to implement SOX (Sarbanes

their internal control designs.

The company has up to date technology

The company is implementing new technology

The company is assessing technology options

The company has not changed to new

technologies

Has company adopted new technologies ?

Figure 4.6.2 Responses to ZETDC’s technological ado ption

illustrated by figure 4.6.2 show that all respondents disagreed that

ZETDC has not moved to new technologies while all agreeing that it is in the

processing of implementing new technologies. Furthermore, 78% of the respondents

noted that ZETDC was assessing technological options while 60% disagreed that the

company had up to date technologies in the management of its internal control

These results indicate that ZETDC is making some attempts to move in line with

technological demands that are now the world trend in its endeavour to manage its

Brown and Nasuti (as cited by Kumar, Pollanen and Maheshwari, 2008) identified

several technical problems that related to designing, implementing and managing

enterprise architecture. Among the identified problems were data structures,

inadequate security and differences in infrastructure as major challenges for

companies that want to implement SOX (Sarbanes – Oxley Act) hence impacting on

their internal control designs.

0.0 20.0 40.0 60.0 80.0

The company has up to date technology

The company is implementing new technology

The company is assessing technology options

The company has not changed to new

technologies

YES, 30.9 %

YES, 0.0

NO, 60.0 %

NO, 0.0

NO, 16.4 %

NOT SURE, 9.1 %

NOT SURE, 0.0

NOT SURE, 5.5 %

NOT SURE, 0.0

Has company adopted new technologies ?

89

illustrated by figure 4.6.2 show that all respondents disagreed that

ZETDC has not moved to new technologies while all agreeing that it is in the

processing of implementing new technologies. Furthermore, 78% of the respondents

g technological options while 60% disagreed that the

company had up to date technologies in the management of its internal control

These results indicate that ZETDC is making some attempts to move in line with

world trend in its endeavour to manage its

Brown and Nasuti (as cited by Kumar, Pollanen and Maheshwari, 2008) identified

several technical problems that related to designing, implementing and managing

ong the identified problems were data structures,

inadequate security and differences in infrastructure as major challenges for

Oxley Act) hence impacting on

80.0 100.0

YES, 100%

YES, 78.2 %

NO, 60.0 %

NO, 100%

Has company adopted new technologies ?

90

CHAPTER SUMMARY

In this chapter the findings based on a sample from ZETDC’s staff, management and

board’s perception of the company’s internal control system was presented,

analysed and discussed. The conclusion and recommendations now follow in the

next chapter.

91

CHAPTER 5

CONLUSION AND RECOMMENDATIONS

5.0 INTRODUCTION

The chapter presents the study conclusion and recommendations. The study

conclusion will put to test the research proposition to either accept or refute it.

5.1 CONCLUSION

5.1.1 STATE OF INTERNAL CONTROL SYSTEM IN ZETDC

In conclusion, ZETDC has an internal control system that is company devised which

is also buttressed by departments and section devised internal control systems. The

internal control system in ZETDC has elements of a good internal control system

similar to those found in the widely used COSO framework which however is not

used and is not known by ZETDC. Some of the internal control elements found in

ZETDC include a control environment as revealed by the availability of a code of

conduct and management’s operational philosophy which emphasises on integrity in

reporting and the reviewing of all information before it goes to the public. Also

evident in ZETDC’s internal control system is the strong organisational structure

which has human resources policies that promote internal controls, clear lines of

authority and the hiring of competent staff. Elements of preventative, detective and

corrective controls were also found to be present in ZETDC as was the review of

controls through reports, spot checks, reconciliations and audits.

However, they were areas that were noted that had weaknesses and these include

the company’s poor image perception by both employees and stakeholders, poor

communication in the organisation buttressed by the high number of staff who were

not sure of the administrative activities in the organisation, such as dealing with

violations of the code of conduct.

It was also noted that the company while implementing new technologies had not yet

adopted up to date technologies in internal control systems management.

92

5.1.2 INTERNAL CONTROL BREACHES

In conclusion, the study also noted that the breaching of internal controls was regular

thus making the internal controls ineffective. Internal control breaches were driven by

low staff rewards, self enrichments and internal control systems deficiencies.

Activities that manifest in internal control breaches at ZETDC include assets abuse,

electricity bill adjustments and illegal power connections.

5.1.2 IMPACT ON SERVICE DELIVERY

In conclusion, internal controls are directly related to service delivery and any

breaches on internal controls directly affect services. The most common services

affected by internal control breaches in ZETDC include customer disconnections for

non payment, staff recruitment, electricity bill production and load shedding. The

impact on service delivery is that the service is not done, the service is delayed, the

service is substandard and/or the service may cost more.

5.1.3 INTERNAL CONTROL IMPLEMENTATION CHALLENGES

In conclusion, the most common challenges faced by ZETDC in implementing

internal control systems include staff resistance, lack of a company strategy,

integration of complex systems, lack of management interest and the associated

high costs of implementation.

5.2 TEST OF THE STUDY PROPOSITION

The research proposition maintains that ZETDC has an ineffective internal control

system that has resulted in poor service delivery. Results of the study indicate that

ZETDC has a self devised internal control system not based on any known

framework which is regularly breached resulting in services not done, being delayed,

substandard and costing more.

It is therefore clearly apparent that the internal control system in ZETDC is ineffective

and result in poor service delivery thus the research proposition is accepted.

93

5.3 RECOMMENDATIONS

5.3.1 INTERNAL CONTROL FRAMEWORK

ZETDC is highly recommended to adopt an internationally recognised internal

control framework such as COSO. This will enable the company to model its internal

controls along international standards that are widely accepted and capable of

standard regular reviews. This will also enable ZETDC to benchmark its performance

against similar organisations that use such international frameworks.

5.3.2 ORGANISATIONAL STRUCTURE

There are too many hierarchical levels of staff in ZETDC resulting in a long

hierarchical structure that negatively affects information communication in both top -

down and bottom- up approaches. It is therefore recommended that ZETDC should

adopt a flat structure that facilitates communication with not more than three levels of

hierarchical staff.

5.3.3 INTERNAL CONTROL CHALLENGES

ZETDC should focus on multi-skilling its staff to be able to rotate staff regulary and

avoid familiarity as repetitive tasks have enabled staff to breach systems regularly.

The company should deal and be seen to be dealing decisively with any control

breaches to bring confidence in both staff and stakeholders. ZETDC should also

implement change management to prepare staff for any systems changes within the

company to manage staff resistance to internal control systems implementation.

5.4 AREA OF FURTHER STUDY The research recommends further study in the area of adoption of the COSO internal

control framework by local Zimbabwean organisations.

94

REFERENCES

Abramson, J., and Abramson, Z. H . (2011). Research Methods in Community

Medicine: Surveys, Epidemiological Research, Programme Evaluation,

Clinical Trials (6th Edition). John Wiley and Sons.

Adebayo, A., and Annukka, J. (2009). Strategy, Control Activities, Monitoring and

Effectiveness. Managerial Auditing Journal, 24(6), 500 - 522.

Alexander, M. (2011). Microsoft Access 2007 Data Analysis . John Wiley and Sons.

Amudo, A., and Inanga, E. L. (2009). Evaluation of Internal Control Systems: A

case study from Uganda. International Research Journal of Finance and

Economics, Euro Journals Publishing, 27. Retrieved from

http://eurojournals.com

Armstrong, M. (2010). Armstrong’s Essential Human Resource Management

Practice: A Guide to People Management (11th Edition). Kogan Page

Publishers.

Athanasiou, T., and Darzi, A . (2010). Key Topics in Surgical Research and

Methodology. Springer

Babbie, E.R. (2010). The Practise of Social Research (12th Edition). Wadsworth

Cengage Learning.

Bachman, R., and Schutt, R. K . (2010). The practise of Research in Criminology

and Criminal Justice (4th Edition). SAGE.

Baxter, P. and Jack, S. (2008). Qualitative Case Study Methodology: Study Design

and Implementation for Novice Researchers. The Qualitative Report. 13(4),

544-559.

Beasley. M. S., Branson, B. C., and Hancock, B. V. (2010). COSO’s 2010 report

on ERM. Current State of Enterprise Risk Oversight and Market Perception of

COSO’s ERM Framework. Committee of Sponsoring Organisation of the

Treadway Commission. [Document]. Retrieved from http://www.coso.org

95

Berger, A. A. (2010). Media and Communication Research Methods. An

Introduction to Qualitative and Quantitative Approaches (2nd Edition). Sage

Publication Inc.

Bizmanualz. (2008) . Finance and Treasury Procedures for Compliance and

Performance. A Guide to Meeting Compliance Requirements and Improving

Financial Planning. Author.

Blaikie, N .(2009). Designing Social research. Polity

Braiotta, L. Jr., Gazzaway, T., Colson, R., Colson, R. H., and Ramamoorti, S.

(2010). The Audit Committee Handbook. John Wiley and Sons.

Brennan, K. (2009). A guide to the Business Analysis Body of Knowledge (Babok

Guide). IIBA.

Burke, F.M., Guy, D. M., and Tatum, K. W. (2008), Audit Committees: A Guide for

Directors, management and Consultants (5th Edition). CCH.

Butcher, J., Wanna, J., and Freyens, B. (2009). Policy in Action: The challenge of

Service Delivery. UNSW Press.

Bwititi, K. (2011, September 17). ZESA: A thorn in flesh. Zimpapers. Retrieved from

http://www.zimpapers.co.zw.

Cambridge Business Dictionary online . (2012). Definition of service delivery.

Retrieved from http://www.dictionary.cambridge.org

Cannon, D. L. (2011). Cisa Certified Information Systems Auditor Study Guide (3rd

Edition). West Sussex, United Kingdom. John Wiley and Sons.

Cendrowski, H., and Mair, W. C. (2009). Enterprise Risk Management and COSO:

A Guide for Directors, Executives and Practitioners. John Wiley and Sons.

Chambers, A. and Rand, G . (2011). The Operational Auditing Handbook: Auditing

Business and IT Processes (2nd Edition). John Wiley and Sons.

Chen, K.-T., and Lee, R. M. (2008). Schematic Evaluation of Internal Accounting

Control Systems, Euridis Research Monograph. Erasmus University.

96

Churchill, G. A., and lacobucci, D. (2009). Marketing Research: Methodological

Foundations (10th Edition). Cengage Learning.

Coderre, D. (2009). Computer Aided Fraud Prevention and Detection. A Step by

Step Guide. John Wiley and Sons

Collier, P. M., and Agyei-Ampomah, S. (2008). CIMA Official learning. Systems

Management Accounting and Control Strategy (2009 edition), Butterworth-

Heinemann.

Collins, H . (2010). Creative Research: The theory and Practise of Research for the

Creative Industries. AVA Publishing.

Committee of Sponsoring Organisation of the Treadwa y Commission . (2012).

Welcome to COSO. Retrieved from http://www.coso.org

Connaway, L. S., and Powell, R . (2010). Basic Research Methods for Librarians

(5th Edition). ABC-CLIO.

Consumers slam ZESA tariff hike . (2011, February 21). The Herald Online.

Retrieved from http://www.herald.co.zw.

Dawidowicz, P. (2010). Literature reviews made easy; A quick guide to success.

Charlotte NC Information Age Publishers.

de Koker, L . (2011). Aligning anti-money laundering, combating of financing of terror

and financial inclusion: Questions to consider when FATF standards are

clarified. Journal of Financial Crime, 18 (4), 361 – 386.

Delaney, P. R., Whittington, R. O., and Delaney, P. R. (2011). Wiley CPA Exam

Review 2012. Business Environment and Concepts.

Deloitte . Zimbabwe Tip – offs Anonymous. (2012). Employee Feedback Bulletin.

1(2012).

DeLuccia, IV J. J. (2008). I T Compliance and Controls. Best practises for

Implementation. John Wiley and Sons

Electricity Act [Chapter 13:09] . (2002). Government Printers

97

Elmes, D. G., Kantowitz, B. H., and Roediger, III H . L. (2011). Research Methods

in Psychology (9th Edition). Cengage Learning

Farawo, T. (2010, September 28). Fraud Costs ZESA US $3m. The Herald Online.

Retrieved from http://www.herald.co.zw

Fleak, S. K., Harrison, K. E., andTurner, L. A. (2010). Issues in Accounting

Education. Nov2010. 25(4), 709-720.

Furlong, M. (2011). What Are the Types of Internal Controls? Retrieved from

www.ehow.com (2012, May 2)

Gelinas, Jr. U. J., Dull, R. B., and Wheeler, P. R. , (2011). Accounting Information

Systems ( 9th Edition). Cengage Learning.

Gerring, J. (2007). Case Study research: principles and practises. Cambridge

University Press.

Gibson, P. (2011). The world of customer service (3rd Edition). Cengage Learning.

Goh, B. W., and Li, D. (2010). Internal Control and Conditional Conservatism.

Accounting Review. 86 (3,2011) Retrieved from http//

ssrn.com/abstract=1340286

Graham, L. (2010). Complying with Sarbanes-Oxley Section 404: A guide for Small

Publicly Held Companies. John Wiley and Sons.

Gravetter, F. J., and Forzano, L-A. (2011). Research Methods for the Behavioural

Sciences (4th Edition). Cengage Learning.

Grinnell, Jr, R. M., and Unrau, Y. A. (2010). Social Work Research and Evaluation :

Foundations of Evidence Based Practise (9th Edition). Oxford University

Press.

Groves, R. M., Fowler, F. J. Jr., Couper, M.P., Lep kowski, J. M., Singer, E., and

Tourangeau, R. (2011). Survey Methodology (2nd Edition). John Wiley and

Sons.

Gumbo, L. (2012, March 23). ZESA billing woes to stay. The Herald Online.

Retrieved from http://www.herald.co.zw

98

Hall, J. A. (2012). Accounting Information Systems (8th Edition). Cengage Learning.

Harare Residents Trust. (2012, March 9). ZESA Billing system chaotic. The

Financial Gazette. Retrieved from http://www.fingaz.co.zw.

Harrer, J. (2008). Internal Control Strategies, A Mid to Small Business Guide. John

Wiley and Sons.

Heintz, J. A., and Parry, R. W. (2010). College Accounting, Instructor’s 20th Edition.

South Western. Cengage learning.

Hightower, R. (2008). Internal Controls Policies and Procedures. Hoboken, New

Jersey. John Wiley and Sons.

Hopkin, P. (2012). Fundamentals of risk management: Understanding evaluating,

and implementing effective risk management (2nd Edition). Great Britain.

Kogan Page Publishers.

Houser, J. (2011). Nursing Research : Reading, Using, and Creating Evidence (2nd

Edition). Jones and Bartlett Publishers.

Hua-Wei, H. (2009). Sarbanes-Oxley section 404 compliance: Recent changes in

US-traded foreign firm’s internal control reporting. Managerial Auditing

Journal . 24( 6), 584 – 598.

IDASA (2010). An African Democracy Institute. The State of Local Government and

Service Delivery In Southern Africa: Challenges and Solutions. IDASA Local

Governance Unit. Retrieved from http://www.idasa.org

Ika, S. R., and GHazali, M. N. A. (2012). Audit committee effectiveness and

timeliness of reporting : Indonesia evidence. Managerial Auditing Journal. 27

(4). 403-424.

Index Mundi . (2012). Zimbabwe Economy profile 2012. Retrieved from

http://www.indexmundi.com

Internal Control Guidance for Directors on Combined Code. (2009). The Institute

of Chartered Accountants in England and Wales.

99

Johnstone, K., Gramling, G., and Rittenberg, L. E. (2011). Auditing A Business

Risk Approach, International Edition (8th Edition). South-Western Cengage

Learning.

Khothari, C.R. (2008). Research Methodology, Methods and Techniques (2nd

Edition). New Age International.

Kumar, V., Pollanen, R., and Maheshwari, B. (2008). Challenges In Enhancing

Enterprise Resource Planning Systems for Compliance With Sarbanes-Oxley

Act and Analogous Canadian Legislation. Management Research News.

31(10) 758 – 773.

Langa, V. (2012, February 14). Ministers’ ZESA scandal exposed. Newsday.

Retrieved from http://www.newsday.co.zw

Leitch, M. (2008). Intelligent Internal Control and Risk Management: Designing High

Performance Risk Systems. Gower Publishing, Ltd.

Lessem, R., and Schieffer, A. (2010). Integral Research and Innovation :

Transforming Enterprise and Society. Gower Publishing.

Levy, P. S., and Lemeshow, S. (2011). Sampling and Populations : Methods and

Applications (4th Edition). John Wiley and Sons

Liamputtong, P. (2011). Focus Group Methodology :Principles and Practise . SAGE

Publications

Lindorff, D. (2012). Building a Better ERM. Treasury and Risk Magazine. (2012

February). Retrieved from http://www.treasuryandrisk.com

Lohr, S. L . (2009). Sampling :Design and analysis (2nd Edition). Cengange Learning.

Lu, H., Richardson, G.D., and Salterio, S. (2011). Direct and Indirect Effects of

Internal Control Weaknesses on Accrual Quality : Evidence from a Unique

Canadian Regulatory Setting. Contemporary Accounting Research.

Summer2011. 28 ( 2), 675-707.

Machin, D. , Campbell, M. J., Tan , S. B., and Tan, S. H. (2011). Sample Size Tables

for Clinical Studies( 3rd Edition). John Wiley and Sons.

100

Mapimhidze, R. (2012, April 14). Nerve- racking power bills from ZESA. Newsday.

Retrieved from http://www.newsday.co.zw.

Marczyk, G. K., DeMatteo, D., and Festinger, D. (2010). Essential of Research

Design and Methodology. Hoboken, NJ. John Wiley and Sons.

Marlow, C. R. (2010). Research Methods for Generalist Social Work. Cengage

Learning.

Marsden, P. V., and Wright, J. D. (2010). Handbook of Survey Research (2nd

Edition). Emerald Group Publishing.

McConnell, C.R. (2010). Umiker’s Management Skills for the New Health Care

Supervisor (5th Edition). Sudburry. Johns and Bartlett Learning.

Mendes, P. (2011). Demand Driven Supply Chain: A Structure and Practical

Roadmap to Increase profitability. London NY. Springer

Mennen, M. (2010). Applied Research Methods for Business and Management –

Job Satisfaction. GRIN Verlag.

Minelli, E., Rebora, G, and Turri, M. (2008). The risk of failure of controls and

levers of change: an examination of two Italian public sectors. Journal of

Accounting and Organizational Change. 4 (1), 5 – 26

Mitchell, M. L., and Jolley, J. M. (2009). Research Design Explained (7th Edition).

Cengage Learning Inc.

Mitchell, M. L., and Jolley, J. M. (2012). Research Design Explained (8th Edition).

Cengage Learning Inc.

Moeller, R. R. (2009). Brinks Modern Internal Auditing – A Common Body of

Knowledge (7th Edition). John Wiley and Sons.

Moller, B. (2010). Internal Control Systems Within the Framework of the 8th EU

Directive: Significance and Implementation in Companies-Master Thesis.

GRIN Verlag.

Mugowo, M. (2011, April 21). ZESA presses on with tariff hike. The Financial

Gazette. Retrieved from http://www.financialgazette.co.zw.

101

Mulli, B. K., and Ali, H. F. Professor. (2011). Review of Internal Control Systems.

Lambert Academic Publishing.

Mushava, E. (2011, October 24). ZESA fears collapse. The Daily News. Retrieved

from http://www.dailynews.co.zw

Ndlovu, P. (2010, August 23). ZESA attacked for load shedding. The Zimbabwean.

Retrieved from http://www.thezimbabwean.co.uk

Needles, B. E., Powers, M., and Crosson, S. V. (2010). Financial and Management

Accounting (9th Edition). Cengage Learning.

Nkala, O .(2011, May 6). ZESA fails to import power. The Daily News. Retrieved from

http://www.zimbabwesituation.com

OECD Rural Policy Reviews (2011): England, United Kingdom 2011. OECD

Publishing.

Oulte, D. (2011). Sampling Method: Scholarly Essay. GRIN Verlag

Pfister, J.A. (2009). Managing Organizational Culture for Effective Internal Control.

From Practise to Theory. Springer.

Picazo, O. F. and Zhao, F. (2009), Zambia Health Sector Public Expenditure

Review: Accounting for Resources to Improve Effective Service Coverage.

World Bank Publication.

Pickett, K. H. S., and Pickett, J. M. (CON). (2010). The Internal Auditing Handbook

(3rd Edition). John Wiley and Sons.

Piskurich, G. M. (2010). Rapid Instruction Design : Learning ID Fast and Right (2nd

Edition). John Wiley and Sons.

Ramos, M. J. (2008). How to Comply with Sarbanese-Oxley Section 404: Assessing

the Effectiveness of Internal Control (3rd Edition). Hoboken, NJ. John Wiley

and Sons.

Reserve Bank of Zimbabwe . (2012, February 16). Press Statement by the

Governor on Measures to Improve Liquidity. Retrieved from http://

http://www.rbz.co.zw

102

Rich, J., Jones, J., Mowen, M., and Hansen, D. (2011). Cornerstones of Financial

accounting (2nd Edition). South- Western, Cengage Learning.

Rittenberg, L. E., Johnston, K., Gramling, A. A., a nd Schwieger, B. (2009).

Auditing: A Business Risk Approach (7th Edition). South Western Cengage

Learning.

Rittenberg, L. E., Johnstone, K., and Gramling, A. (2011). Auditing: A Business

Risk Approach (8Th Edition). South- Western, Cengage Learning.

Roach JD, D.R. (2010). Internal Control Challenges in a Down Economy. [HFMA

Northern California Meeting March 25 and26, 2010 Sacramento, California].

Catholic Healthcare West. Retrieved from http://www.ussc.gov/orguide.htm

Runatsa, E. (2011) An Evaluation of the Effectiveness of Internal Control Systems

as a Corporate Governance Instrument in State Institutions, The Case of the

University of Zimbabwe (2007-2010). Graduate School of Management.

University of Zimbabwe Dissertation.

Rushton, A., Croucher, P., and Baker, P. (2010). The Handbook of Logistics and

Distribution Management ( 4th Edition). London UK. Kogan Page Publishers.

Salkind, N. J. ( 2010). Encyclopaedia of Research Design (Volume 3). Sage

Publication.

Schneider, A. (2009). Auditors internal control opinions: do they influence

judgements about investments?. Managerial Auditing Journal. 24(8). 709-723.

Scott, L. (2011). African American Male Academic Success ,Universal Publishers.

Sekaran, U., and Bougie, R. (2010). Research Methods for Business : A Skill

Building Approach (5th Edition). John Wiley and Sons.

Sibanda, T. (2011, October 27). Hundreds march through Bulawayo to protest

ZESA failures. SW Radio Africa. Retrieved from

http://www.swradioafrica.com

Simmons, H. (2009). Case Study Research in Practice. Sage Publication Ltd.

103

Snow, D. and Yanovitch, T. (2009), Unleashing Excellence: The complete guide to

Ultimate Customer Service ( 2nd Edition). Hoboken, NJ. John Wiley and Sons

Soh, D. B., and Martinov-Bennie, N. (2011). The Internal Audit Function:

Perceptions of Internal Audit Roles, Effectiveness and Evaluation. Managerial

Auditing Journal. 26( 7), 605 – 622.

Soy, Susan K, (2007). The case study as a research method. Unpublished paper,

University of Texas at Austin.

Statement on Internal Controls. (2008). The Scottish Government. Retrieved from

http://www.scotland.gov.uk.

Stewart, J. M., Tittel, E., and Chapple, M. (2011). CISSP: Certified Information

Systems Security Professional Study Guide (5th Edition). John Wiley and

Sons.

SW Radio Africa . (2011, August 27). ZESA orders radical tariff increase. The

Zimbabwean. Retrieved from http://www.thezimbabwean.co.uk.

Swanson, R . A. (2009). Analysis for Improving performance : Tools for Diagnosing

Organisations and Documenting Workplace Expertise : Easyread Large

Edition (2nd Edition). Berrett- Koehler Publishers.

Tarantino, A. (2010). Operational Risk management in Financial Services. John

Wiley and Sons.

The Ministry of Finance Zimbabwe . (2012). The 2012 National Budget. Retrieved

from http://zimtreasury.gov.zw

Thompson, T. (2012). Sampling (3rd Edition). John Wiley and Sons.

Tshuma, S. (2009, December 4). ZESA continues bleeding. Zimbabwe Metro.

Retrieved from http:// www.zimbabwemetro.com

Tysiac, K. (2012). COSO postpones release of internal control framework until 1Q

3013. Journal of Accountancy. Retrieved from http://

www.journalofaccountancy.com

104

Ulf, N. (2009). Measuring and Regulating Extreme Risk. Journal of Financial

Regulation and Compliance. 17(2) , 156 – 171.

Understanding Internal controls. (2009). A Reference Guide for Managing

University Business Practises. University of California.

Vilsanoiu. D. and Serban, M. (2010). Changing Methodologies in Financial Audit

and Their Impact on Information Systems Audit. Informatica Economic. 14

(1/2010), 57-65.

Warren, C. S. (2012). Survey of Accounting (6th Edition). Cengange Learning.

Warren, C. S., Reeve, J. M., and Duchac, J. (2011). Financial and Managerial

Accounting (11th Edition). Cengage Learning.

Waymire, T. R. S. (2008). Internal and External Control Mechanism : The Impact of

Alignment on Market and Operating Performance. University of Arkansas,

ProQuest.

Weathington, B. L., Cunningham, C. J. L., and Pitte nger, D. J. (2010). Research

Methods for the Behavioural and Social Sciences. John Wiley and Sons.

Wellington, P. (2010). Effective customer care . London. Kogan Page Publishers.

Werner, J. M., and DeSimone, R. L. (2011). Human Resource Development (6th

Edition). South – Western Cengage Learning.

Wisner, D. J., Tan, K-C., and Leong, G. K. (2011), Principles of Supply Chain

Management : A Balanced Approach (3rd Edition).South Western Cengage

Learning.

Wood, M.J., and Ross-Kerr, J. C . (2011). Basic Steps in Planning Nursing

Research: From Questions to Proposal (7th Edition). Jones and Bartlett

Publishers.

Woodside, A. G. (2010). Case Study Research : Theory, Methods and Practise.

Emerald Group Publishing.

Yin, K. R. (2009). Case study research: Design and methods (4th Edition), Sage

Publications.

105

ZESA Boss fired. (2010, September 15). Zimbabwe Situation. Retrieved from

http://www.zimbabwesituation.org

ZESA unearths reconnection scum. (2012, February 17). The Chronicle. Retrieved

from http://www.chronicle.co.zw.

ZESA Generation Statistics (2012, March 13) Retrieved from http:// www.zesa.co.zw

ZETDC. (2009). Financial Blue Print

ZETDC. (2009). IT Business Plan

ZETDC. (2010). Annual Report

ZETDC. (2011). Customer Service Monitor Report

ZIMSTAT. (2012). Price Statistics. Latest Inflation Figures.(2012, April). Retrieved

from http:// www.zimstat.co.zw

Zvauya, C. and Kadirire, H. (2011, July 9). Disband ZESA. Daily News. Retrieved

from http://www.dailynews.co.zw.

106

APPENDIX 1.1.1A HARARE SUMMER LOAD SHEDDING TIME TA BLE

TABLE 1: AREA LOAD SHEDDING PERIODS DAY MORNING PEAK 5am-8am EVENING PEAK 5pm – 8pm

MONDAY

First areas to be affected

H1, H2, H3, H6, H7, H10, H11, H14, H15, H18, H19, H26, H27, H28, C1, C2

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

Additional areas that could be affected

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

H1, H2, H3, H6, H7, H10, H11, H14,

H15, H18, H19, H26, H27, H28, C1, C2

TUESDAY

First areas to be affected

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

H1, H2, H3, H6, H7, H10, H11, H14, H15, H18, H19, H26, H27, H28, C1, C2

Additional areas that could be affected

H1, H2, H3, H6, H7, H10, H11, H14,

H15, H18, H19, H26, H27, H28, C1, C2

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

WEDNESDAY

First areas to be affected

H1, H2, H3, H6, H7, H10, H11, H14, H15, H18, H19, H26, H27, H28, C1, C2

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

Additional areas that could be affected

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

H1, H2, H3, H6, H7, H10, H11, H14,

H15, H18, H19, H26, H27, H28, C1, C2

THURSDAY

First areas to be affected

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

H1, H2, H3, H6, H7, H10, H11, H14, H15, H18, H19, H26, H27, H28, C1, C2

Additional areas that could be affected

H1, H2, H3, H6, H7, H10, H11, H14,

H15, H18, H19, H26, H27, H28, C1, C2

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

FRIDAY

First areas to be affected

H1, H2, H3, H6, H7, H10, H11, H14, H15, H18, H19, H26, H27, H28, C1, C2

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

Additional areas that could be affected

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

H1, H2, H3, H6, H7, H10, H11, H14,

H15, H18, H19, H26, H27, H28, C1, C2

SATURDAY

First areas to be affected

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

H1, H2, H3, H6, H7, H10, H11, H14, H15, H18, H19, H26, H27, H28, C1, C2

Additional areas that could be affected

H1, H2, H3, H6, H7, H10, H11, H14,

H4, H5, H8, H9, H12, H13, H16, H17, H22, H23, H25, H29, C3, C4, C5

107

APPENDIX 1.1.1B HARARE WINTER LOAD SHEDDING TIME TA BLE

HARARE METROPOLITAN PROVINCE

How to use the tables:

Look up your suburb code in Table 2 , then find this code in Table 1

TABLE 1: AREA LOAD SHEDDING PERIODS

DAY

DAY (0400 -

1300 Hours)

EVENING

(1300 -

2200 Hours)

MONDAY

Domestic areas

to be affected

H2, H4, H5, H6, H7, H8, H10, H14, H15, H16, H18,

H21, H23, H24, H27, H28, C1, C4, C5

H1, H3, H11, H12, H13, H14, H17, H18,

H19, H20, H22, H29, C2, C3

Industrial areas to

be affected

H30, H31, H32

H33, H34, H35

TUESDAY

Domestic areas

to be affected

H1, H3, H11, H12, H13, H14, H17, H18, H19, H20,

H22, H29, C2, C3

H2, H4, H5, H6, H7, H8, H10, H14, H15,

H16, H18, H21, H23, H24, H27, H28, C1,

C4, C5

Industrial areas to

be affected

H33, H34, H35

H30, H31, H32

WEDNESDAY

Domestic areas

to be affected

H2, H4, H5, H6, H7, H8, H10, H14, H15, H16, H18,

H21, H23, H24, H27, H28, C1, C4, C5

H1, H3, H11, H12, H13, H14, H17, H18,

H19, H20, H22, H29, C2, C3

Industrial areas to

be affected

H30, H31, H32

H33, H34, H35

THURSDAY

Domestic areas

to be affected

H1, H3, H11, H12, H13, H14, H17, H18, H19, H20,

H22, H29, C2, C3

H2, H4, H5, H6, H7, H8, H10, H14, H15,

H16, H18, H21, H23, H24, H27, H28, C1,

C4, C5

Industrial areas to

be affected

H33, H34, H35

H30, H31, H32

FRIDAY

Domestic areas

to be affected

H2, H4, H5, H6, H7, H8, H10, H14, H15, H16, H18,

H21, H23, H24, H27, H28, C1, C4, C5

H1, H3, H11, H12, H13, H14, H17, H18,

H19, H20, H22, H29, C2, C3

Industrial areas to

be affected

H30, H31, H32

H33, H34, H35

SATURDAY

Domestic areas

to be affected

H1, H3, H11, H12, H13, H14, H17, H18, H19, H20,

H22, H29, C2, C3

H2, H4, H5, H6, H7, H8, H10, H14, H15,

H16, H18, H21, H23, H24, H27, H28, C1,

C4, C5

Industrial areas to

be affected

H33, H34, H35

H30, H31, H32

SUNDAY

Domestic areas

to be affected

H2, H4, H5, H6, H7, H8, H10, H14, H15, H16, H18,

H21, H23, H24, H27, H28, C1, C4,C5

H1, H3, H11, H12, H13, H14, H17, H18,

H19, H20, H22, H29, C2, C3

Industrial areas to

be affected

H30, H31, H32

H33, H34, H35

Key:

H –

Harare

C – Chitungwiza

108

APPENDIX 1.1.1C SCHEDULE OF SURBURB CODES IN HARARE REGION.

ZETDC HARARE REGION LOAD SHEDDING 2012 HARARE METROPOLITAN PROVINCE

How to use the tables: Look up your suburb code in Table 2, then find this code in Table 1

TABLE 2 : SCHEDULE OF SUBURB CODES IN HARARE REGION SUBURB CODE SUBURB CODE SUBURB CODE SUBURB CODE

Alex Park – Part H1 Glen Norah H16 Mabvuku H15 Sherwood Park - Part H12

Alex Park – Part H7 Glen Norah A - Part H19 Machipisa H29 Somerby Area H21

Amalinda H16 Glen Wood H28 Malvern H17 Spring Heights H28

Amalinda Farm H16 Glenview H16 Mandalay Park H14 Stanbury Park H12

Ambleside H4 Glenview - Part H23 Mandara H6 Startmore Farm H16

Amby H5 Greendale - Part H5 Marimba Park H4 Stoneridge Rd H17

Arbour Cres H16 Greendale - Part H6 Marlborough H12 Strathaven H1

Art Farm H2 Greendale - Part H8 Mayfield Park H1 Sunridge H12

Ashbrittle H2 Greendcroft H12 Mbare H9 Tafara H15

Ashdown Park H13 Greengrove H6 Merwede H11 The Grange H8

Athlone H5 Greystone Park H7 Meyrick Park H13 Thornpark H2

Athlone – Part H6 Grobbie Park H17 Midlands H17 Twentydales Ext. H17

Avenues H22 Groombridge H2 Milton Park H13 Tynwald North H13

Avondale H1 Guildform Estate H7 Monavale H1 Tynwald South H4

Avondale West H1 Gunhill H7 Msasa Park H14 Umwinsidale H28

Avonlea – Part H1 Haig Park H13 Mt Pleasant H2 Uplands H17

Avonlea West H12 Harare Rd W H16 Mt Hampden H3 Upper Mt Hampden H12

Ballantyne Park H7 Harava Dam H17 Mufakose H4 Upper Reaches Rd H11

Bannockburn H2 Hatcliffe H7 Mufakose West H24 Vainona H7

Barrington Rd Area H16 Hatfield West H10 Mutare Rd H15 Valencedene H1

Belgravia H1 Hat-Twentydales -Part H14 Newlands H5 Waldon Area H21

Belvedere H13 Hatlands Farm H16 Newlands East H25 Warren Park H4

Borrowdale H7 Helensvale H7 Northwood H2 Warren Park - Part H18

Borrowdale Brook H7 Helensvale S H27 Old Highfields H29 Warren Park - Part H18

Borrowdale N H27 Highfields H19 Pangula H28 Warren Park E H13

Bothashof H7 Highlands - Part H5 Paradise Park H29 Waterfalls H17

Budiriro H23 Highlands - Part H7 Park Meadowlands H14 Westwood H18

Carrick H7 Highlands - Part H8 Parkridge H24 Westwood H18

Chadcombe H14 Hillside H5 Parkridge Estate H11 Widdecombe H14

Chedgelow H17 Hopley H17 Parktown H17 Wilmington Park H14

Chikurubi H6 Hunyani Poort H21 Pension Farm H23 Winchdon H7

Chiltern Hill H28 Induna H17 Pension Farm H16

Chishawasha H28 Ingwe Farm H16 Pomona H7

Chishawasha H28 Jerusalem H29 Prospect East H10

Chisipite H8 Kambuzuma H18 Prospect West H17

Colne Valley H7 Kambuzuma H18 Queensdale H14

Colne Valley H8 Kambuzuma South H4 Quinnington H7

Colray H7 Kensington H1 Quinnington S H27

Colray H27 Kensington D26 Rambabvu H28

Coronation Park H5 Kingsmead H7 Reitforntein H8

Cotswold Hills H12 Kintyre H21 Reitforntein - Part H7

Cranborne Park H14 Komani H12 Rhodesville H5

Creagh H7 Kutsaga H14 Ridgeview H13

Crowborough H11 Kuwadzana H11 Rolf Valley South H28

Crowborough Estate H24 Lake Chivero H21 Rolf Valley N H8

Crowhill H7 Langford Farm H16 Ruwa H14

Draycott H17 Lewisam H8 Ruwa H15

Dzivaresekwa H11 Lincoln Green H13 S Mazorodze Areas H17

Eastlea H5 Little Norfolk H2 Safron Area H21

Eastlea H25 Logan Park H10 San Souci Rd Area H14

Emerald Hill H2 Lonchinvar H4 San Souci Rd Area H15

Epworth H14 Luna H7 Seki Rd Area H17

Getwyn H28 Lusaka H29 Seki Rd N H10

109

APPENDIX 1.1.2A ELECTRICITY TARIFFS EFFECTIVE FEBRU ARY 2009

STANDARD PRICES FOR THE SUPPLY OF ELECTRICITY : FEB RUARY 2009It is hereby notified that the Zimbabwe Electricity Regulatory Commission has, in terms of section 53 of of the Electricity Act [Chapter 13:19], approved the following prices for the supply of electricity to customers with effect from 1 February, 2009.

Basic +Levies & Charges RE levies VAT

(US$) (US$) (US$)E 1 DOMESTIC CUSTOMERSE 1.1 Conventional meter

a) Fixed Monthly Charge 7.94 8.81 8.81b) Energy consumption per kWh (i) 1 st 50 kWh 0.005 0.006 0.006 (ii) 51 to 300 kWh 0.078 0.086 0.086 (iii) Balance 0.125 0.138 0.138

E 1.2.1 Prepayment meter : Standard 0.124 0.137 0.137

E 1.2.2 Prepayment meter : SteppedEnergy consumption per kWh (i) 1 st 50 kWh 0.005 0.006 0.006 (ii) 51 to 300 kWh 0.077 0.086 0.086 (iii) Balance 0.124 0.137 0.137

E 1.3 Load Limited : FMC 6.62 7.34 7.341.0 amp 3.578 3.970 3.972.5 amp 8.944 9.930 9.935.0 amp 17.888 19.860 19.867.5 amp 26.831 29.780 29.7810.0 amp 35.775 39.710 39.7115.0 amp 53.663 59.570 59.5722.5 amp 96.593 107.220 107.2230.0 amp 128.790 142.960 142.96

E 2 PUBLIC LIGHTINGE 2.1 Metered Circuits

a) Fixed Monthly Charge 68.81 76.38 76.38b) Energy consumption per kWh 0.070 0.078 0.089

E 2.2 Unmetered circuitsA fixed monthly charge per watt of installed luminaire capacity 0.031 0.035 0.039

E 3 MINING AND INDUSTRIAL CUSTOMERSE 3.1 Low Voltage Supply (capacity up to 300 kVA)

a) Fixed Monthly Charge 83.52 92.70 92.70b) Energy charge per kWh 0.086 0.096 0.109

E 3.2.11 Distribution Supply (capacity exceeding 300 kVA) ToUa) Fixed Monthly Charge 230.11 255.43 255.43b) Up to 11 kV supply: A monthly capacity charge per unit of demand 9.104 10.11 11.47 c) Energy charge per kWh during Peak periods 0.099 0.110 0.125 d) Energy charge per kWh during Standard periods 0.041 0.046 0.052 e) Energy charge per kWh during Off-Peak periods 0.028 0.031 0.035

E 3.2.33 Distribution Supply (capacity exceeding 300 kVA) ToUa) Fixed Monthly Charge 230.11 255.43 255.43b) 33 kV supply: A monthly capacity charge per unit of demand 6.678 7.41 8.41 c) Energy charge per kWh during Peak periods 0.099 0.110 0.125 d) Energy charge per kWh during Standard periods 0.041 0.046 0.125 e) Energy charge per kWh during Off-Peak periods 0.028 0.031 0.052

E 4 COMMERCIAL CUSTOMERSE 4.1 Low Voltage Supply (capacity up to 300 kVA)

a) Fixed Monthly Charge 83.52 92.70 92.70b) Energy charge per kWh 0.086 0.096 0.109

E 4.2.11 Distribution Supply (capacity exceeding 300 kVA) ToUa) Fixed Monthly Charge 230.11 255.43 255.43b) Up to 11 kV supply: A monthly capacity charge per unit of demand 9.104 10.11 11.47 c) Energy charge per kWh during Peak periods 0.099 0.110 0.125 d) Energy charge per kWh during Standard periods 0.033 0.074 0.085 e) Energy charge per kWh during Off-Peak periods 0.022 0.055 0.062

E 4.2.33 Distribution Supply (capacity exceeding 300 kVA) ToUa) Fixed Monthly Charge 184.09 0.00 0.00b) 33 kV supply: A monthly capacity charge per unit of demand 5.342 5.39 6.15 c) Energy charge per kWh during Peak periods 0.079 0.128 0.146 d) Energy charge per kWh during Standard periods 0.033 0.074 0.085 e) Energy charge per kWh during Off-Peak periods 0.022 0.055 0.062

110

APPENDIX 1.1.2B ELECTRICITY TARIFFS EFFECTIVE JUNE 2010

111

APPENDIX 1.1.2C ELECTRICITY TARIFFS EFFECTIVE SEPTE MBER 2011

It is hereby notified that the Zimbabwe Electricity Regulatory Commission has, in terms of section 53 of of the Electricity Act [Chapter 13:19], approved the following prices for the supply of electricity to customers with effect from 1 September, 2011 .

E1.1 Standard Stepped a) Fixed Monthly Charge $0.00 E1.2.1 E1.2.2b) Energy charge per kWh(i)1st 50 kWh $0.02 (I) 1st 50kWh $0.09 $0.01

(ii) 51 to 300 kWh $0.11 (ii) 51 to 300kWh $0.09 $0.06(iii) Balance $0.15 (iii) Balance $0.09 $0.15

Amperage 1.0 Amp 2.5 Amp 5.0 Amp 7.5 Amp 10.0 Amp 15.0 Amp 22.5 Am p 30.0 Ampa) Fixed Monthly Chargea) Fixed Amperage Charge $4.64 $7.08 $11.14 $15.21 $19.28 $27.41 $37.01 $43.39

Metered E2.1 Unmetered E2.2a) Fixed Monthly Charge $0.00 n/ab) Energy charge per kWh $0.11 n/a a) Fixed Monthly Charge $0.00c) Monthly charge per watt of installed capacity of luminaire n/a $0.03 b) Energy charge per kWh $0.12

Mining, Industrial, Commercial & Pumping Works Cust omers - Maximum Demand11kV Supply 33kV Supply Secondary 11kV Supply 33kV Supply

E3.2.11, E4.2.11 E3.2.33, E4.2.33 Distribution E6.1 E5.2.11 E5.2.33a) Fixed Monthly Charge $0.00 $0.00 $0.00 $0.00 $0.00b) A monthly capacity charge per unit of demand $6.93 $5.08 $3.25 $6.93 $5.08c) An interruptable demand charge n/a n/a $2.44 n/a n/ad) On-Peak Energy charge per kWh $0.12 $0.12 $0.12 $0.12 $0.12e) Standard Energy charge per kWh $0.07 $0.07 $0.07 $0.07 $0.07f ) Off-Peak Energy charge per kWh $0.05 $0.05 $0.05 $0.05 $0.05

Institutions: (Government, Municipal, Mission Schoo ls, Hospitals and Clinics )Low Voltage 11kV Supply 33kV Supply

E4.3 E4.3.11 E4.3.33a) Fixed Monthly Charge $0.00 $0.00 $0.00b) A monthly capacity charge per unit of demand n/a $6.93 $5.08c) An interruptable demand charge n/a n/a n/ad) On-Peak Energy charge per kWh $0.12 $0.12 $0.12e) Standard Energy charge per kWh $0.12 $0.07 $0.07f ) Off-Peak Energy charge per kWh $0.12 $0.05 $0.05

Notesi) The rates are exclusive of the 6 % Rural Electrification Levy and 15% VAT. In terms of Statutory Instrument 273 of 2003, electricity charges forDomestic customers are zero rated for VAT and in terms of Statutory Instrument 215 of 2005, fixed charges on Commercial and Domestic electricity are zero rated for VAT.

ii) Time of Use periods:Time of Use

PeakStandardOff-Peak

iii) All customers are encouraged to use power efficiently.

iv) These prices will be reviewed quarterly and, if necessary, adjusted using the Tariff Indexation Formula..

J.M. ChinembiriManaging Director

Electricity Tariffs - Effective SEPTEMBER-DECEMBER 2011

Domestic Load Li mited E1.3

Public Lighting Mining, Industrial, Commercial & Pumpi ng Works

Domestic Met ered CustomersConventional Meter

$0.12$0.12

n/a$0.12

n/a

E5.1

Prepayment Meter

Low Voltage Supply E3.1, E4.1

Agricultural CustomersLow Voltage

$0.00

Hour Day of Week 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Sunday / Holiday O O O O O O O S S S S S S S S S S P P P S S O O Week-day O O O O O O O P P P P P S S S S S P P P P S O O

Saturday O O O O O O O P P P P S S S S S S P P P S S O O

112

APPENDIX 1.1.4A ZETDC STATEMENT OF FINANCIAL POSITI ON 2011

STATEMENT OF FINANCIAL POSITION AS AT 31 DECEMBER 2011

113

APPENDIX 1.1.4B ZETDC COMPREHENSIVE INCOME STATEMEN T 2011

STATEMENT OF COMPREHENSIVE INCOME FOR THE MONTH ENDING 31 DECEMBER 2011

114

APPENDIX 1.1.4C ZETDC STATEMENT OF CASH FLOWS 2011

STATEMENT OF CASH FLOWS

115

APPENDIX 1.1.4D ZETDC RATIO ANALYSIS 2011

ZETDC FINANCIAL ANALYSIS

2011

INDICATOR FORMULA CALCULATIONS RATIO

Return on Sales (Operating Surplus/ Sales) *100 -13.9 634.1 -2.19

Return on Total Assets (Operating Surplus/ Average Total Assets) -13.9 1059.1 -0.01

Return on Capital Employed (Operating Surplus/ Capital Employed) -13.9 259.6 -0.05

Current Ratio (Current Assets/ Current Liabilities) 374.2 799.5 0.47

Quick Ratio (Current Assets- Stock)/ Current Liabilities 300 799.5 0.38

Average Collection Period (days)

Accounts Receivable /(Credit Sales/365)

286.2 1.74 164.74

Debt Ratio Debt /Equity 799.5 482.6 1.66

116

APPENDIX 4.1 RESEARCH QUESTIONAIRE

2 July 2012

25 Samora Machel Avenue

Electricity Center

Harare

Phone + 263-4-78682526 Cell +263-773 357 647

email [email protected] : [email protected]

Dear Sir / Madam

RE: QUESTIONNAIRE FOR ZETDC INTERNAL CONTROLS AND S ERVICE DELIVERY

I would like to know your experiences in ZETDC with regard to the internal control system and its likely impact on service delivery. This is specifically in partial fulfilment of the requirement for the Masters Degree in Business Administration (MBA) at the University of Zimbabwe (UZ).

Kindly ensure you complete all questions to enable me to gather as much detail on this important subject. This is strictly for academic purposes .Your input will be treated in strict confidence.

Your co-operation is greatly appreciated

Nhamo Chorasa

117

QUESTIONNAIRE

AN EVALUATION OF THE INTERNAL CONTROL SYSTEM IN ZET DC ON SERVICE DELIVERY (2009 – 2012)

INSTRUCTIONS

• Mark with a tick or X on all of your appropriat e responses • There are 20 questions. • Ensure your tick fits neatly in the correct place • Write clearly in the spaces provided where appropri ate • You can add relevant information where applicable

SECTION A: DEMOGRAPHIC INFORMATION

1. DEPARTMENT/SECTION FINANCE ........ ........ HUMAN RESOURCES OPERATIONS COMMERCIAL MARKETING PLANNING AUDIT I.T SECURITY OTHER

2. MANAGEMENT LEVEL BOARD .................. EXECUTIVE MANAGEMENT SENIOR MANAGEMENT MIDLE MANAGEMENT SUPERVISORY JUNIOR OTHER

3. EXPERIENCE IN ZETDC – (YEARS) LESS THAN 2

2-5 5-10 ABOVE10 .......

118

4. LEVEL OF HIGHEST QUALIFICATION

PROFESSOR ................ DOCTORATE MASTER DEGREE UNDERGRADUATE DEGREE DIPLOMA CERTIFICATE A LEVEL O LEVEL OTHER

SECTION B: ELEMENTS OF THE CONTROL ENVIRONMENT

5. Integrity and Ethical Values

Strongly Agree

Agree NOT SURE

Disagree Strongly Disagree

The company has a code of conduct

Violations of the code of conduct are delt with

Employees and stakeholders view the company as one with high ethical standards

6. Management philosophy and operating style

YES NO NOT SURE

Management emphasises importance of integrity in financial reporting

Management has processes in place to review information before it goes public.

Management values customer feedback Management regularly review procedures to meet new demands

119

7. The Organisational Structure

YES NO NOT SURE

The organisation structure facilitates communication Performance evaluations are consistent with promoting internal controls

The organisation has a commitment to hire individuals with requisite competence

Clear lines of authority and responsibility are established for all individuals

HR policies are designed to promote effective internal controls

SECTION C: STATE OF INTERNAL CONTROL SYSTEM

8. Which type of controls do you think are in your section? YES NO NOT SURE Preventative Detective Corrective Other There are no controls

9. Which Internal control frameworks do think your section is using? YES NO NOT SURE COSO COCO ISO 9000 CADBURY REPORT KING 3 REPORT SERBANESE OXLEY ACT TQM DEPARTMENT/SECTION DEVISED COMPANY DEVISED MIXTURE OF SOME ELEMENTS OTHER NO PARTICULAR FRAMEWORK

120

10. How are internal control systems reviewed in your section?

YES NO NOT SURE Spot checks Regular reports Audit checks Statutory checks Peer reviews Reconciliations No reviews are done Other

11. How do you rate the occurrence of internal control breaches in the company? No breaches at all Infrequent Frequent Regular Not Sure .............

12. In your opinion what may have caused the internal control breaches? YES NO NOT SURE Staff Incompetence Management override Systems shortcomings Staff collusion Staff fatigue Staff rewards Disgruntlements Self enrichment Other

13. State measures taken on internal control breaches. YES NO NOT SURE Concerned staff was reprimanded Corrective action was taken to redress the anomaly Corrective action was taken to address the loophole No action was taken

14. Kindly list some of the internal control breaches that have occurred. ..................................................................................................................... 1 2 3

121

SECTION D: IMPACT ON SERVICE DELIVERY

15. How do you relate your internal control system to service delivery?

Directly related Slightly related Not related Not Sure ........................

16. Which services are regularly affected by internal control breaches? Rate on a scale of 1-4

1. Not Sure 2. No breaches 3. Immaterial reaches 4. Material Breaches 1..... 2..... 3..... 4...... INDICATE

HOW................. Financial reports production

Electricity bill production New connections Electricity Fault repairs Quotations for new connection

Load shedding Customer Enquiries Disconnections for non payment

Meter reading Supplier selection /Ordering

Staff recruitment Cash receipting Other

17. What has been the major impact of internal control breaches on service delivery? YES NO NOT SURE Services were not done Services were delayed Services were substandard Services cost more No Impact on service

SECTION E: INTERNAL CONTROL IMPLEMENTATION CHALLENG ES AND RECOMMENDATIONS 18. What challenges might the company face in improving its internal control

systems?

122

YES NO NOT SURE High Cost Lack of Management Interest Lack of expertise Staff resistance Regulatory Stakeholder dis-interest Industry practises Fear of the unknown Systems integration Lack of company strategy

19. Has the company responded to technological advancement in internal controls? YES NO NOT SURE The company has up to date technology The company is implementing new technology The company is assessing technology options The company has not changed to new technologies

20. In your own opinion how can the company improve its internal control system? END OF QUESTIONAIRE THANK YOU FOR YOUR TIME