Using Data Mining to Detect Frauds of Internal Audits
|
|
|
- Raymond Fletcher
- 10 years ago
- Views:
Transcription
1 Using Data Mining to Detect Frauds of Internal Audits *Muhammad K. Ghanbari and **Mina Einakian I. Introduction Fraud detection has become a critical component of financial audits. Iran as a developing country usually faces too many frauds in financial reports. The researches on important factories such as Iran Docharkh, Mazda Yadak and Bahman Group indicate that the production systems in Iran usually face problems which have kept the production system away from the right management techniques, Just in Time production (J.I.T) and Lean production. As a result accounting system will be far away from Lean Accounting and also from using the standard costs. On the other hand the most effective factor of finished value is inventory. The inventory contains raw materials inventory, work in process inventory (W.I.P) and finished products (F.P) inventory. These factors are the reasons which will increase or decrease the company profit and are able to indicate frauds in financial reports. Showing extra profit causes some problems for shareholders and lack of profit causes taxes problems. This paper will present a new model (3TFP model) to help auditors for remote controlling of data and solve the problems mentioned. In this model first we will convert financial year to 12 months, after updating the bill of material we will physically count B.O.M, Work in Process and finished products in the end of each month and we will control them. Then the inventory of beginning and ending periods and consuming rate will be computed. After computing the factors mentioned, the cumulative consumption in each month for finished products, B.O.M and work in process products should be computed. Drawing diagrams for data gained and identifying critical regions are the next phases. Then we will use Fish-Bone method to analyze information. And finally we will use Pareto method to detect and clear the most suspicious factors causing frauds. It should be mentioned that implementing this model needs computer programming because of high volume of data. Fraud can be defined as a criminal activity, involving false representations to gain an unjust advantage [1]. Fraud is a million dollar business and it is increasing every year. 45% of companies worldwide have fallen victim to economic crime in 2004 and2005. The average damage to the companies from tangible frauds (i.e. asset misappropriation, false pretences, and counterfeiting) was US$ 1.7 million. According to the Global economic crime survey 2005 of Price Waterhouse Coopers. Journal headlines and news topics indicate the same trend of increasing fraudulent behavior [4]. For example, the Association of Certified Fraud Examiners [13] estimates that total annual fraud losses in the United States are now US $994 billion, up from its fraud annual cost estimate of US $660 billion in KPMG (2006) highlights that fraud continues to be a major problem for organizations in Australia and New Zealand, with approximately half the organizations surveyed experiencing fraud annually and an average detection time of approximately one year [2]. *Dr. Muhammad K. Ghanbari, Computer Science Department, Alabama A&M University, [email protected] *Mina Einakian, Computer Engineering Department, Urmia University, [email protected]
2 Fraud occurs in a wide variety of forms and is ever changing as new technologies and new economic and social systems provide new opportunities for fraudulent activity.it is remarkable that 34% of these frauds aredetected by chance. Fraud is detected in many ways, or at least one tries to detect it in many ways [4]. Traditionally, a company relies most on its internal control activities and the internal auditor to prevent and detect fraud. Data mining is different from the traditional data analysis techniques [4]. Internal fraud detection is concerned with determining fraudulent financial reporting by management: Hansen et al used a powerful generalized qualitative response model to predict management fraud based on a set of data developed by an international public accounting firm. Green and Choi presented a neural network fraud classification model employing endogenous financial data. A classification model created from the learned behavior pattern is then applied to a test sample. Fanning and Cogger also used an artificial neural network to predict management fraud. Beneish investigated the incentives and the penalties related to earnings overstatements primarily in firms that are subject to accounting enforcement actions by the Securities and Exchange Commission. Abbott etal.exa mined and measured the audit committee independence and activity in mitigating the likelihood of fraud [3]. If internal auditor isn t sufficient, external audit (as far as this isn t legally enforced yet), risk management systems, a whistle-blowing hotline, an investigations department, new technologies or other measures are installed, corresponding to the need the company experiences [4]. II. Concepts What is Data Mining? Data is a fundamental element in any organization's ability to manage its business; it is collected from a wide variety of sources, stored on many different systems, and is regularly used for marketing and sales activities. However, the use of this data in fraud detection is frequently overlooked. The likelihood of identifying potentially fraudulent activity can be significantly enhanced through the regular application of data mining tools and techniques, although these are not foolproof and must be run in conjunction with other activities designed to reduce the threat of fraud. Data mining is about finding insights which are statistically reliable, unknown previously, and actionable from data [10]. This data must be available, relevant, adequate, and clean. Also, the data mining problem must be well-defined, cannot be solved by query and reporting tools, and guided by a data mining process model [11] [5]. According to Witten and Frank (2000), data mining can be defined as: The process of discovering patterns in data. The process must be automatic or (more usually) semiautomatic. The patterns discovered must be meaningful in that
3 they lead to some advantage, usually an economic advantage. The data is invariably present in substantial quantities. [4] Statistics and data mining methods have been applied successfully to detect activities such as money laundering, e-commerce credit card fraud, telecommunications fraud, insurance fraud, and computer intrusion etc. What is Fraud? There are many definitions for fraud, depending on the point of view considering. According to The American Heritage Dictionary, Second College Edition, fraud is defined as a deception deliberately practiced in order to secure unfair of unlawful gain. Davia et al. [12] paraphrase this in a number of items that must be identified, when articulating a case of fraud: A victim Details of the deceptive act thought to be fraudulent The victim s loss A perpetrator (i.e., a suspect) Evidence that the perpetrator acted with intent Evidence that the perpetrator profited by the act(s) In a nutshell, fraud always involves one or more persons who, with intent, act secretly to deprive another of something of value, for their own enrichment [12].Wells (2005) stresses deception as the linchpin to fraud. To exclude kinds of fraud we don t wish to examine, the delineation of fraud to occupational fraud and abuse, as referred to by the Association of Certified Fraud Examiners, is of interest. Occupational fraud and abuse may be defined as: The use of one s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization s resources or assets. [13] This definition encompasses a wide variety of conduct by executives, employees, managers, and principals of organizations [4]. The term fraud here refers to the abuse of a profit organization s system without necessarily leading to direct legal consequences. In a competitive environment, fraud can become a business critical problem if it is very prevalent and if the prevention procedures are not fail-safe. Fraud detection, being part of the overall fraud control, automates and helps reduce the manual parts of a screening/checking process [5]. Fraud Detection Requires both Internal and External Business Data Most companies have some sort of internal data describing their business events (selling things or providing services). But the forms of data gathered for internal purposes most often are related to billing and account service purposes. Many potentially predictive variables are not gathered by internal systems (e.g., years in
4 business), but must be gathered from external sources. Information can be gathered from various data providers to enhance the corporate database, including Demographic data (available from Axciom, Experion, Equifax, Lexis-Nexis, etc.); Firmographic data (e.g., Dun & Bradstreet data and other business data sources); Psychographic data (inferences and classifications of people according to various measures of attitudinal and philosophical views) [1]. Internal control systems are not sufficient as a fraud detection mechanism. Since over one third of the fraud cases in the surveys are discovered by chance. Internal controls can be split into two groups: active and passive internal control systems. Active internal controls are signatures, passwords, segregation of duties etc. As Davia et al. (2000) put, these can be compared with fences. They may appear insurmountable at first sight, but like all fences, they have their weakness to be defeated by clever fraud perpetrators. And like a fence, once evaded, there is little or no continuing value in preventing or deterring fraud [12] Passive internal controls operate at a different level. Instead of preventing fraud, like active controls attempt to, the emphasis here is on deterring. Passive internal control systems induce a state of mind in the would-be perpetrator that strongly motivates him not to go there [4]. Some common types of fraud include creating fictitious creditors, ghosts on the payroll, falsifying cash sales, undeclared stock, making unauthorized write-offs, and claiming excessive or never incurred expenses. Internal Auditors For a long time, there has been controversy over the role of the auditor with respect to the detection of fraud. It has been argued that an audit should be done by a competent, independent, individual and involves the collection and assessment of evidence about information to decide and report on the degree of correspondence between the information and certain established criteria [18] [6]. The internal auditor s role in fraud risk management continues to gain prominence in contemporary governance frameworks. Deloitte (2005) emphasized this role in the Sarbanes-Oxley era, noting that O given its prominence and potential magnitude, fraud O needs to be on the radar screen of every internal audit function. Similarly, The IIA, the American Institute of Certified Accountants (AICPA), and the ACFE recently highlighted that internal auditors should exercise professional skepticism when reviewing activities and be on guard for the signs of fraud [16, 17].While internal audit standards prescribe professional responsibilities related to fraud, little is known about the extent that internal auditors perceive responsibility for fraud detection and the factors that affect their sense of responsibility [2]. The IIA s Frequently Asked Questions repository states that (internal audit) O plays
5 an important role in fraud detection [17]. More specifically, The IIA s International Standards for the Professional Practice of Internal Auditing (Standards) provides specific authoritative guidance for internal auditors in the area of fraud. For example, Proficiency Standard 1210.A2 states: Internal auditors must have sufficient knowledge to evaluate the risk of fraud and the manner in which it is managed by the organization, but are not expected to have the expertise of a person whose primary responsibility is detecting and investigating fraud. Proposed revisions to internal audit standards highlight a push to increase fraud standards for internal auditors. Furthermore, the new risk management standard (2120.A2) promotes that the internal audit activity must evaluate the potential for the occurrence of fraud and how the organization manages fraud risk. These standards clearly link the internal audit function to fraud risk management [2]. The triangle model of responsibility [19] provides an integrative framework for evaluating perceived responsibility and links among accountability, responsibility, and performance. In this context, perceived responsibility connects individuals to performance standards and to events covered by those standards. Schlenker (1997, 241) suggests that responsibility is the psychological glue that connects an individual to a set of prescriptions for conduct and to an event that is governed by those prescriptions. Schlenker s triangle model [15] identifies three excuses people use to avoid taking responsibility after failure: that one had no control in the situation, that the obligation was unclear, and that it was not really one s obligation. Three retrospective studies tested the presumed negative association between excuse making and responsibility taking. The studies also examined the effects of self-determination theory s concept of motivational internalization upon these variables. A complex but replicable pattern emerged, such that responsibility taking and motivational internalization correlated with adaptive outcomes such as future commitment and positive expectancy and excuse making did not. Of particular interest, perceiving that the person levying the obligation internalized motivation predicted responsibility taking, in all three studies [2], [7]. Schlenker and colleagues describe three common excuses that people use to pardon themselves when they have been associated with a failure of some kind. They define excuses as statements or attributions that allow one to minimize personal responsibility for events, both for oneself and with others. In this way, excuses both regulate emotions and serve as impression management. The model describes three aspects of responsibility, for which excuses are made (Figure 1): Prescription: What is supposed to be done Identity: The sense of self Situation/Event: relevant to the prescription
6 Figure1. Triangle Model of Responsibility [7] The prescription-event (task clarity) link is considered strong to the extent that the prescriptions are specified in advance, pertinent to the situation, not subject to alternative interpretations, and not in conflict with other prescrip tions that might be applied in the situation. Alternatively, this link is weaker when prescriptions are ambiguous, conflicting, difficult to prioritize, or questionable in terms of relevance to the event. The prescription-identity (professional obligation) link is strong to the extent that prescriptions apply unam biguously to the individual. This link is weaker when prescriptions are ambiguous, unclear, or conflicting. The iden tity-event (personal control) link is strong when an individual intends to produce specific consequences and had the ability and freedom to do so. The link is weaker when an individual s will to act is diminished because action consequences are unforeseeable, accidental, or influenced by uncontrollable factors. The triangle model of resp onsibility suggests that accountability and responsibility are related but distinct constructs. For example, Schlenker notes that responsibility is not identical to accountability, rather, responsibility flows from accountability. This suggests that accountability is a type of pressure put on internal auditors b y other parties (i.e., senior management, the audit committee, internal audit standards, etc.), and perceived responsibility is the internal response of the internal auditor to thes e external pressures. To the extent that these e xternal pressures highlight the importan ce of internal auditor responsibility for fraud de tection, we expected accountability pressure to increase internal auditors perceived responsibility for fraud detection. Internal audit standards do not prescribe different detection responsibilities for fraudulent financial reporting, misappropriation of assets, and corruption frauds that have a direct and material effect on the financial statements. However, the research literature provides evidence suggesting that professionals perceived responsibility for fraud detection differs across fraud type. DeZoort and Harrison (2008) found that external auditors perceive more responsibility for detecting fraudulent financial reporting than they do for misappropriation of assets and corruption. Furthermore, the ACFE [13] report highlights that fraudulent financial reporting schemes have a higher median per fraud cost (US $2 million) than misappropriation of assets (US $375k) and corruption (US $150k) schemes. However, this same report and others indicate that misappropriation of assets is much more prevalent and that internal auditors are much more likely to deal with this type of fraud in the workplace [13, 14] [2].
7 Appraising Internal Control An entity s internal control consists of five interrelated components: Control environment. Risk assessment. Control activities. Information and communication. Monitoring. Technology as a Tool People commit frauds, but as technology plays an increasingly important role in business life, the fraudster often leaves warning signals of his activity in an organization's systems. Each transaction will leave a trail. Increasingly, in order to enhance the way an organization does business, databases have been developed to store huge amounts of transactional and standing data from accounting, sales, purchasing, and payroll functions. This is used for marketing, forecasting, and reporting but rarely for detecting and predicting fraud. Also, this data can be a key factor in developing and implementing a fraud risk management strategy. Use of Databases The next stage in data mining is the use of databases to run complex queries. Microsoft Access is an extremely powerful tool which many fraud examiners will be able to use. More complex databases include ACL and WinIdea. These may require specialist knowledge. However, they can analyze large amounts of data and produce complex queries that can be automated. The following chart (Figure 2) illustrates that data mining has identified a series of transactions just above $50,000, which is the authorization limit for the company. Databases can also be used to identify suspicious transactions around points in time. [9] Figure 2: Series of Transaction Identified by Data Mining [9]
8 Tests of Controls SAS 55 defines tests of controls as tests directed toward the design or operation of an internal control to assess its effectiveness in preventing or detecting material misstatements in financial statement assertion. Inquiry of company personnel, inspection of client documents and records, observation of client activities, and reperformance of controls represent some of the procedures used in performing tests of controls. In performing tests of controls, the auditor seeks answers to the following questions: Statistical Sampling Who performed the control? When was the control performed? How was the control performed? Was the control consistently applied? Statistical sampling helps the auditor to design an efficient sample, to measure the sufficiency of the evidence obtained, and to evaluate the sample results. The standard of field work requires auditors to obtain sufficient competent evidence. Sufficiency relates to the design and size of the sample. Statistical sampling permits the auditors to measure sampling risk and therefore to design more efficient samples, that is, samples of a size necessary to provide sufficient evidence. The results of statistical (probability) sampling are objective and subject to the laws of probability. Hence, sampling risk can be quantified and controlled, and the degree of reliability desired (the confidence level) can be specified. Sampling risk is the risk that the sample selected does not represent the population. There are a number of statistical (probability or random) sampling methods that will aid auditors in performing tests of controls. They include attribute sampling, variables sampling, discovery sampling, multistage sampling, and stratified sampling [9]. Sampling Risk Sampling risk is the probability that a properly drawn sample may not be representative of the population; that is, the conclusions drawn from the sample may differ from those drawn if all the items in the population are examined. Sampling risk is to be measured and controlled. The auditor controls sampling risk by specifying the acceptable level when developing the sampling plan. Analytical Techniques for Fraud Detection Getting started requires an understanding of: The areas in which fraud can occur What fraudulent activity would look like in the data What data sources are required to test for indicators of fraud [8]
9 The following techniques are effective in detecting fraud. Auditors should ensure they use these, where appropriate. They include the following: Calculation of statistical parameters (e.g., averages, standard deviations, high/low values) to identify outliers that could indicate fraud. Classification to find patterns amongst data elements. Stratification of numbers to identify unusual (i.e., excessively high or low) entries. Digital analysis using Benford s Law to identify unexpected occurrences of digits in naturally occurring data sets Joining different diverse sources to identify matching values (such as names, addresses, and account numbers) where they shouldn t exist. Duplicate testing to identify duplicate transactions such as payments, claims, or expense report items. Gap testing to identify missing values in sequential data where there should be none. Summing of numeric values to identify control totals that may have been falsified. Validating entry dates to identify suspicious or inappropriate times for postings or data entry. [8] IT and Data Mining Used To Detect Corporate Fraud IT tools such as data mining can be effectively employed by fraud auditors. This involves the analysis of data stored in an information system (e.g., a database) to identify patterns that indicate unexplained or potentially questionable transactions. The advantage of such a computer analysis technique is that large numbers of transactions can be evaluated in a relatively short period of time. Further, multiple analyses of individual data elements can be performed to provide different evaluations of potential patterns or trends. Once a pattern is identified, the auditors must further investigate specific transactions to determine whether an improper transaction actually occurred. Data mining can also be very useful in other high-risk corporate processes. Two such areas include executive travel and contract and consulting services. III. Methodology Iran as a developing country usually faces too many frauds in financial reports. The producer systems in Iran usually face these problems: Lack of easy and inexpensive access to sources and raw materials. Economic boycotts. Exchange rate fluctuation. Purchasing high volume batches which aren t economical. Managers fear to indicate real profit and costs because of quick changes of managers due to the wrong policy of companies and lack of time to implementing their policies.
10 These problems mentioned a bow have kept away the production system from the right management techniques, Just in Time production (J.I.T) and lean production. As a result accounting system will be far away from lean accounting and follow using the standard costs. The most effective factor of finished value is inventory. This inventory contains raw materials inventory, work in process inventory (W.I.P) and finished products (F.P) inventory. These factors are the reasons which will increase or decrease the company profit and are able to indicate frauds in financial reports. Showing extra profit causes some problems for shareholders and lack of profit causes taxes problems. So we will present the 3TFP model in this paper to help auditors for remote controlling of data and solve the problems mentioned. It should be mentioned that implementing this method needs computer programming because of high volume of data. In industrial countries production system is based on high variety and low volume but in the opposite way, in Iran, because of lack of technology, this system is based on single products or low variety and high volume. Thus the companies have to have a safety stock even more than standard. Steps i. Converting financial year to 12 month sequential information months. ii. Updating Bill of Material (B.O.M). iii. B.O.M physically counting for each product and also working process products and finished products in the end of month and controlling them. iv. Computing the inventory of beginning period and ending period and also compute consuming rate and converting it to the local money (Dollars). v. Computing cumulative consumption in each month for F.P, B.O.M, and W.I.P for the product I. vi. Drawing diagrams for the trend of data gained from v (Figure 3). vii. Identifying critical regions. viii. Using fish bone chart to analyze data (Figure 4). ix. Using Parato method to detect and clear the most doubts which cause frauds.
11 Figure 3: Diagrams of Trend of Data s and Critical Regions 15
12 Figure 4: Fish Bone The internal auditor gains information and calculates the percentage of each probable factor based on Parato method (Figure 5). Definition The percentage of identification in critical region A %60 B %15 C %10 D %5 E %5 F %3 G %2 Total %100 Figure 5
13 Figure 6: Single Critical Region Analyze Chart by Internal Auditor The auditor will get the team focus on factor A with percentage of 60 of doubt. So that the team can detect the fraud if it is existed then he will move to the next factor and check them by hierarchy. If the critical regions were more than one, the auditor will compare all the critical regions by their mutual factor (Figure 7). Figure 7: Two or More Critical Region Analyze Chart by Internal Auditor
14 Deductive Fraud Detection In contrast, a deductive approach attempts to determine what kinds of frauds can occur in a particular situation and then uses data mining and other IT methods to determine if those frauds exist. It follow s a five-step process: IV. Conclusion 1. Understandin g the business or operations to be studi ed. 2. Understandin g what kinds of frauds could occur (fraud exposures) in theoperation. 3. Determining the symptoms that the most likely frauds would generate. 4. Using databa ses and information systems to search f or those symptoms. 5. Following up on symptoms to determine if actual frau d or other factors are causing them. Data analysis technology enables auditors and fraud examiners to analyze an organization s business data to gain insight into how well internal controls are operating and to identify transactions that indicate fraudulent activity or the heightened risk of fraud. Data analysis can be applied to just about anywhere in an organization where electronic transactions are recorded and stored. Data analysis also provides an effective way to be more proactive in the fight against fraud. V. References Handbook of Statistical Analysis and Data Mining Applications, Fraud Detection, (2009), Elsevier Inc. Todd DeZoort and Paul Harrison. (2008). An Evaluation of Internal Auditor Responsibility for Fraud Detection. The Institute of internal Auditors Research Foundation. G.Apparao, Dr.ProfArun Singh, G.S.Rao, B.LalithaBhavani, K.Eswar,D.Rajani. (2009). Financial Statement Fraud Detection by Data Mining. Int. J. of Advanced Networking and Applications. MiekeJans, Nadine Lybaert, KoenVanhoof. Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems? Clifton Phua, Vincentlee, Kate Smith & Ross Gayler, A Comprehensive Survey of Data Mining based Fraud Detection Research [6].PhilmoreAlleyne, Michael Howard. (2005). An exploratory study of auditors responsibility for fraud detection in Barbados, Managerial Auditing Journal, page 284. Todd DeZoort, Paul Harrison. (2008). The Effects of Fraud Type and Accountability Pressure on Auditor Fraud Detection Responsibility and Brainstorming Performance. Working Paper. Fraud Detection Using Data Analytics In the Banking Industry. ACL Transforming audit and risk. Internal Control And Fruad Detection, DELTA PUBLISHING COMPANY Elkan, C. (2001). Magical Thinking in Data Mining: Lessons from CoIL Challenge Proc. Of SIGKDD01,
15 Lavrac, N., Motoda, H., Fawcett, T., Holte, R., Langley, P. & Adriaans, P. (2004). Introduction: Lessons Learned from Data Mining Applications and Collaborative Problem Solving. Machine Learning 57(1-2): Davia, H. R., P. C. Coggins, J. C. Wideman, and J. T. Kastantin (2000). Accountant's Guide to Fraud Detection and Control (2 ed.). John Wiley & Sons. Association of Certified Fraud Examiners ACFE Report to the Nation on Occupational. Fraud & Abuse. Austin, TX: ACFE. KPMG. (2003). KPMG Fraud Survey Montvale, NJ: KPMG. Schlenker, B., Britt, T., Pennington, J., Murphy, R., and Doherty, K. (1994). The triangle model of responsibility. Psychological Review, 101(4): The Institute of Internal Auditors What is Internal Auditing s Role in Preventing, Detecting, and Investigating Fraud? The Institute of Internal Auditors, American Institute of Certified Public Accountants, and Association of Certified Fraud Examiners, Managing the Business Risk of Fraud: A Practical Guide. Arens, A., Elder, R. and Beasley, M. (2003), Auditing and Assurance Services: An Integrated Approach, 9th ed., Prentice-Hall, Englewood Cliffs, NJ. Schlenker, B Personal Responsibility: Applications of the Triangle Model. Research in Organizational Behavior 19:
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems?
Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems? Mieke Jans, Nadine Lybaert, Koen Vanhoof Abstract Fraud is a million dollar business and it s increasing every year.
Procurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
Fraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
Employee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
The auditors responsibility to consider fraud in an audit of financial statements
The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection
Deloitte Forensic Fraud Risk Management
Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility
716 West Ave Austin, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/
Consideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 1719 AU Section 316 Consideration of Fraud in a Financial Statement Audit (Supersedes SAS No. 82.) Source: SAS No. 99; SAS No. 113. Effective for audits
ACL EBOOK. Detecting and Preventing Fraud with Data Analytics
ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
Ethics, Fraud, and Internal Control
Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements
ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities
Steven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
LGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU)
FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU) CONTENTS 1. Introduction.. 3 2. Characteristics of Fraud.. 5 3. Fraud Strategy..... 6 4. Building the Fraud Prevention Plan........ 8 Fraud
Fraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
Leonard W. Vona, CPA, CFE
Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: [email protected] Part of an auditor s job is
Fraud and the Government Internal Auditor
Fraud and the Government Internal Auditor January 2012 Fraud and the Government Internal Auditor January 2012 Official versions of this document are printed on 100% recycled paper. When you have finished
Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner [email protected] 210.268.1932 AGENDA
INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON 240 THE AUDITOR S RESPONSIBILITIES RELATING TO (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
A Publication of the Center for Audit Quality
Practice Aid for Testing Journal Entries and Other Adjustments Pursuant to AU Section 316 A Publication of the Center for Audit Quality December 8, 2008 1 Practice Aid for Testing Journal Entries and Other
THE AUDITOR S RESPONSES TO ASSESSED RISKS
SINGAPORE STANDARD ON AUDITING SSA 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS This revised Singapore Standard on Auditing (SSA) 330 supersedes SSA 330 The Auditor s Procedures in Response to Assessed
Investigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
ACE elite fraudprotector
ACE elite fraudprotector Commercial Crime Insurance Policy ACE elite fraudprotector Insurance Policy (ed. AU 09/10) It wouldn t happen to us ACE elite fraudprotector Insurance Policy Fraud is a major threat
RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
Fraud Prevention Policy
FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies
4 Testing General and Automated Controls
4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn
GLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
Audit Evidence. AU Section 326. Introduction. Concept of Audit Evidence AU 326.03
Audit Evidence 1859 AU Section 326 Audit Evidence (Supersedes SAS No. 31.) Source: SAS No. 106. See section 9326 for interpretations of this section. Effective for audits of financial statements for periods
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
ETHICS, FRAUD, AND INTERNAL CONTROL
CHAPTER ETHICS, FRAUD, AND INTERNAL CONTROL The three topics of this chapter are closely related. Ethics is a hallmark of the accounting profession. The principles which guide a manager s decision making
Fraud Detection and Prevention: Transactional Analysis for Effective Fraud Detection W H I T E P A P E R
Fraud Detection and Prevention: Transactional Analysis for Effective Fraud Detection W H I T E P A P E R FR AUD MANAGEMEN T ISSUES Fraud is a dominant form of white collar crime that continues to extract
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls
Course Name: Internal Auditing & Controls Module: 5 Module Title: Examination phase of the internal audit Lecture and handouts prepared by Chuck Campbell Examination phase of the internal audit Module
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 540
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 540 AUDITING ACCOUNTING ESTIMATES, INCLUDING FAIR VALUE ACCOUNTING ESTIMATES, AND RELATED DISCLOSURES (Effective for audits of financial statements for
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
Assessment for Establishing a Whistleblower Hotline:
Report # 2012-01 Assessment for Establishing a Whistleblower Hotline: Establishing a whistleblower hotline could benefit the City by empowering employees to report fraud, waste and Establishing a whistleblower
Keith Barger MFS, MCSE, CCE
Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting
Data mining life cycle in fraud auditing
Data mining life cycle in fraud auditing ELENA MONICA SABĂU Faculty of Accounting and Management Information Systems Academy of Economic Studies 6, Romană Square, District 1, Bucharest [email protected]
TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)
PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care
September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control
September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value
Audit Risk and Materiality in Conducting an Audit
Audit Risk and Materiality in Conducting an Audit 1647 AU Section 312 Audit Risk and Materiality in Conducting an Audit (Supersedes SAS No. 47.) Source: SAS No. 107. See section 9312 for interpretations
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
Recognize the many faces of fraud
Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
Fraud Awareness and Prevention Program Report
Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central
ACFE FRAUD PREVENTION CHECK-UP
One of the ACFE s most valuable fraud prevention resources, the ACFE Fraud Prevention Check-Up is a simple yet powerful test of your company s fraud health. Test fraud prevention processes designed to
Fraud Risk Management Procedures
Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency
Consideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 151 AU-C Section 240 Consideration of Fraud in a Financial Statement Audit Source: SAS No. 122; SAS No. 128. Effective for audits of financial statements
Fraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
C) Primarily for the benefit of persons outside of the business organization.
1. Financial statements are prepared: A) Only for publicly owned business organizations. B) For corporations, but not for sole proprietorships or partnerships. C) Primarily for the benefit of persons outside
Stopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS
STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS (Issued January 1997; revised January 2004) SAS 300 (revised January 04) Contents Paragraphs Introduction
How To Audit A Company
1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202)862-8430 www.pcaobus.org STAFF AUDIT PRACTICE ALERT NO. 11 CONSIDERATIONS FOR AUDITS OF INTERNAL CONTROL OVER FINANCIAL
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC) 1 Introduction 1.1 Section 316 (4) of the International Business
Developing and Implementing a Fraud Risk Assessment. Josh Shilts CPA/CFF, CFE
Developing and Implementing a Fraud Risk Assessment Josh Shilts CPA/CFF, CFE MY GOAL HAVE YOU WALK AWAY WITH THE KNOWLEDGE AND TOOLS TO COMPLETE A FORMAL & USEFUL FRAUD RISK ASSESSMENT!!! Before We Begin,
How To Audit A Company
INTERNATIONAL STANDARD ON AUDITING 315 IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT (Effective for audits of financial statements for
Asset Misappropriation Research White Paper for the Institute for Fraud Prevention
Asset Misappropriation Research White Paper for the Institute for Fraud Prevention by Chad Albrecht, Mary-Jo Kranacher & Steve Albrecht Abstract In this paper we provide a general overview of asset misappropriation.
7/22/2014. From Treadway To the Cube (1987 2014) So, Who is COSO? What Does COSO Do?
From Treadway To the Cube (1987 2014) National Society of Accountants for Cooperatives (NSAC) CLAconnect.com Instructor: Ron Durkin, CPA/CFF, CFE, CIRA National Principal in Charge Fraud & Misconduct Investigations
How To Handle A Fraud At Psc
FRAUD POLICY Purpose and Background PSC is committed to the highest standards of moral and ethical behavior. The purpose of PSC s Fraud Policy is to foster an environment that promotes awareness to fraudulent
IPPF Practice Guide. Fraud Prevention and Detection in an Automated World
IPPF Practice Guide Fraud Prevention and Detection in an Automated World Global Technology Audit Guide (GTAG) Written in straightforward business language to address a timely issue related to IT management,
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2014 Global Fraud Study Letter from the President & CEO In 1988, Dr. Joseph T. Wells founded the ACFE with a stated mission to reduce the incidence
Using Forensic Accounting to Detect Fraud in Public Service Organizations. Kevin M. Bronner, Ph.D. 1
Using Forensic Accounting to Detect Fraud in Public Service Organizations By Kevin M. Bronner, Ph.D. 1 Forensic accounting is a useful technique to detect fraud in public service organizations. This paper
