TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL

Size: px
Start display at page:

Download "TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL"

Transcription

1 TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL With the large volumes of data handled by organizations today, the ability to analyze this data as part of fraud investigations has become essential. Gain better knowledge of the various analysis techniques that can be applied to these datasets and how to leverage the data available to you in conducting your investigation. JANET MCHARD, CFE, CPA, CFFA, CFF Founding Partner McHard Accounting Consulting, LLC Albuquerque, New Mexico Janet M. McHard is the Founding Partner of McHard Accounting Consulting, LLC, a firm specializing in forensic accounting, fraud prevention, and accounting reconstruction. Ms. McHard is a Certified Fraud Examiner (CFE), a certification bestowed upon examination by the Association of Certified Fraud Examiners (ACFE). She holds a CPA in the State of New Mexico. She is also certified by the National Association of Certified Valuation Analyst (NACVA) as a Certified Forensic Financial Analyst (CFFA). She is certified in Financial Forensics by the American Institute of Certified Public Accountants, a designation awarded based on education and experience. Ms. McHard has received special training in fraud prevention and investigation from the ACFE, the National Association of Certified Valuation Analysts, and through the University of New Mexico s Financial Investigators Certificate Program. Ms. McHard provides assistance, including expert testimony, in the areas of fraud and forensic accounting. She also has experience in database management and class action administration. Previously, she was a senior manager at the regional full-service accounting firm Meyners + Company, located in Albuquerque. She was also a staff accountant and litigation support specialist with an international accounting and consulting firm. Her background also includes work as a legal secretary and administrative assistant for a law firm and business manager for a medical office. Janet M. McHard holds a Bachelor of Arts from the University of New Mexico as well as an M.B.A. from the University of New Mexico s Robert O. Anderson Graduate School of Management. She is a member of the National Board of Advisors and past president of the Board of Directors of Keshet Dance Company. She was previously a board member of the Albuquerque Softball/Baseball Hall of Fame and has volunteered her time with the American Softball Association and the New Mexico United States Specialty Sports Association. She is a member of Women in Leadership of the United Way of Central New Mexico. Association of Certified Fraud Examiners, Certified Fraud Examiner, CFE, ACFE, and the ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without the prior consent of the author. 2012

2 The Need for a Formal Process Although the crux of data analysis involves running targeted tests on data to identify anomalies, the ability of such tests to help detect fraud depends greatly on what the examiner does before and after actually performing the data analysis techniques. Consequently, to ensure the most accurate and meaningful results, a formal data analysis process should be applied that begins several steps before the tests are run and concludes with active and ongoing review of the data. While the specific process will vary based on the realities and needs of the organization, the following approach contains steps that should be considered and implemented, to the appropriate extent, in each data analysis engagement: 1. Planning phase: a. Understand the data. b. Articulate examination objectives. c. Build a profile of potential frauds. 2. Preparation phase: a. Identify the relevant data. b. Obtain the data. c. Verify the data. d. Cleanse and transform the data. 3. Testing and interpretation phase: a. Analyze the data. 4. Post-analysis phase: a. Respond to the analysis findings. b. Monitor the data. Planning Phase As with most tasks, proper planning is essential in a data analysis engagement. Without sufficient time and attention devoted to planning early on, the examiner risks analyzing the data inefficiently, lacking focus or direction for the

3 engagement, running into avoidable technical difficulties, and possibly overlooking key areas for exploration. Understanding the Data As a first step long before determining which tests to run the examiner must know what data is available to be analyzed and how that data is structured. This might mean reviewing the database schema and technical documentation and consulting with the data administrator to learn what fields and records exist and in which tables the information is stored. The examiner will also need to know how the tables are linked together. Helpful tools in getting a full view of the organization s data include a data inventory and a data map. Such documents can be used to identify and record information about the data source, file formats, business process owners, and key systems used as they relate to specific projects. This documentation provides a good starting point for documenting the engagement history and for managing the data analytics process. Understanding the structure of the existing data will not only help ensure that the examiner builds workable tests to be run on the data, but might also help identify additional areas for exploration that might otherwise have been overlooked. Articulate Examination Objectives and Scope The amount of data housed by most organizations is extremely voluminous; many companies process millions of transactions every single day. Going through every piece of data would be impossible. And, although data analysis techniques can greatly increase investigative efficiency, performing every possible

4 analysis of the data would be prohibitively timeconsuming. Consequently, at the outset, the examiner must define and articulate the objectives and scope of the expected analysis. This includes considering: The impetus for the data analysis engagement The structure and size of the business The target area of examination, if restricted The resources (time, personnel, etc.) available for the engagement Whether any predication exists that a particular fraud is occurring Any existing thresholds or preferences for frauds to be considered material Build a Profile of Potential Frauds To maximize the potential success of detecting fraud through data analysis, the analyses performed should be based on an understanding of the entity s existing fraud risks. To do so, the examiner must first build a profile of potential frauds by identifying the organization s risk areas, the types of frauds possible in those risk areas, and the resulting exposure to those frauds. In organizations that have a formal fraud risk assessment process, this step should simply involve referring to the outcomes of that process and forming a fraud detection approach based on the risks identified. In organizations lacking such a process, however, this step can be quite time-consuming, as it involves gaining a sufficient understanding of organizational operations to identify the full spectrum of fraud scenarios possible within the company. Preparation Phase The results of a data analysis test will only be as good as the data used for the analysis. Thus, before running tests on

5 the data, the fraud examiner must make certain the data being analyzed are relevant and reliable for the objective of the engagement. Identify the Relevant Data Using the profile of potential frauds as a guide, the fraud examiner must identify the target data for analysis. Specifically, for each specific fraud scenario assessed to be a high risk to the organization, the examiner should determine which data fields and records would be affected by such a scheme. The examiner must then identify the logistics involved with obtaining this information, including: What specific data (i.e., fields, records) is available Who generates and maintains the data Where the data is stored Timing of the data extraction (e.g., date range, cutoff dates/times) How the examiner will receive and store the data Data format Storage/transfer mechanism Control totals needed for verification Potential corroborating sources of data Obtain the Data The examiner should prepare and submit a formal request for the desired data, outlining the specifics determined in the previous step. Depending on the objectives of the engagement and the operations of the organization, the examiner might be given a file containing the data to work with, or he might be provided read-only access to the data within the organization s information system

6 This step in the process can be particularly challenging. In some cases, obtaining the data involves working with overloaded or uncooperative data managers, IT departments, or other parties. Other potential obstacles at this stage include data that are housed in different systems or on different platforms and data that are maintained manually. Verify the Data Once the data have been received by the fraud examiner, it must be verified. The first step is simply to ensure that the data analysis software that will be used is able to open and read the data as provided. The examiner should then validate that the data received contains all requested fields and records. Once the success of the transfer process has been confirmed, the examiner should perform the following tests to verify the integrity of data: Confirm control totals. Confirm the time period covered by the data is appropriate and as requested. Sort the file in ascending or descending order to test for leading or lagging errors. Check for gaps in applicable fields, including system-assigned identifying record number, to identify missing records. Confirm the format of data in format-specific fields, such as date fields and numeric fields. Check for blank fields where information should be entered. Check for inappropriate duplicate fields or records. The examiner can also use tests for reasonableness or logical relationships to verify data integrity. Examples of such tests include:

7 If transactions average X per day, verify that a monthly file includes approximately X times the number of business days. Divide average transaction size by the number of transactions in the file. Compare fields such as items orders to items shipped to confirm that the amount shipped is equal to or less that the amount ordered. Cleanse and Normalize the Data Depending on how the data were collected and processed, as well as the results of the data verification process, the examiner might need to cleanse and convert the data to a format suitable for analysis before executing any data analysis tests. For example, certain field formats (e.g., date, time, currency, etc.) might need to be modified to make the information consistent and ready for testing. The data must also be normalized so that all data being imported for analysis can be analyzed consistently. Common data fields from multiple systems must be identified, and data must be standardized. In normalizing the data for analysis, table layout, fields/records, data length, data format, and table relationships are all important considerations. Additionally, the following inconsistencies in the data must be addressed: Known errors Blanks or missing data Duplicated data Special/unreadable characters in the data Other unusable entries

8 When possible, such situations should be addressed by fixing, isolating, or eliminating them. Any issues that cannot be cleaned up will require special consideration during the testing and interpretation phase. Testing and Interpretation Phase If the planning and preparation stages have been conducted effectively, the testing and interpretation phase should yield results that are helpful in uncovering red flags of fraud in the data. Analyze the Data When using data analysis to detect fraud, the examiner should organize and analyze the data in a way designed to uncover patterns that are consistent with the specific fraud scenarios identified during the planning stage. Grouping the data into homogenous groups can facilitate the examiner s ability to spot outliers. The specific groupings should be based on the target fraud scenario and data being analyzed, but such categorization might include grouping data by: Geographical location Business division or unit Time period Dollar value Sales person Another useful step involves running some high-level tests, such as summarization or statistical analysis, to get an overview of the data and provide some context for any outliers identified during later testing. From here, the examiner should run tests to uncover possible indicators of fraud including unusual trends, data anomalies, and control breakdowns. The data

9 analysis techniques used should be chosen based on the high-risk fraud scenarios being considered. Tests designed to detect specific fraud schemes will be covered throughout the later sections of this course. In analyzing the results of the tests run, the following issues merit special consideration. The Role of Concealment The fraud examiner must remember that the goal of the data analysis engagement is to identify fraudulent transactions transactions that, by their very nature, involve deception and attempted concealment. The examiner is looking for data that have been intentionally manipulated, rather than just erroneously recorded. Consequently, he should focus his analysis on data that are strategically missing or altered, such as lacking contact information, or transactions that narrowly circumvent organizational policies. Additionally, because fraudsters can be creative in concealing their schemes, fraud examiners must be creative in their searches, often combining several data analysis techniques and tests. Addressing False Positives A false positive is a transaction identified by a data analysis test as an anomaly within the data set even though it is not actually a fraudulent transaction. Such results can occur for a number of reasons, including: Data validity/integrity issues Data merging difficulties Legitimate data that falls outside the field norm (e.g., entries for non-u.s. addresses within a state field) The goal in running data analysis tests is to identify anomalies without generating too many false positive results. Sorting through and analyzing false positives takes time and resources that could be spent further

10 investigating other potentially fraudulent transactions. However, proper planning and preparation should help minimize the occurrence of false positives in the test results. Post-Analysis Phase The data analysis tests will likely reveal many potential areas of exploration. After executing the desired tests, the fraud examiner will need to determine how to respond to the findings and how to watch for future anomalies. Respond to the Analysis Findings The findings of the data analysis engagement will rarely be sufficient on their own to conclude that fraud is or is not occurring. Any anomalies identified will require follow-up and further examination to determine the reason for the discrepancy in the data. Often, this will include investigatory procedures such as document examination and interviews. The specific resultant actions should be based on the fraud scenarios in question and the particular red flags identified in the data. Additionally, the terms and objectives of the engagement will dictate whether a formal report should be issued and, if so, the form and audience of the resulting report. Such a report should typically by easy to understand, summarize the analysis findings, and provide insightful and applicable information for the relevant readers. Monitor the Data Based on the results of the analysis and the needs of the organization, the examiner should work with management to determine whether any of the tests performed should be repeated on a periodic or

11 continuous basis. In areas deemed to be at heightened risk for fraud, continuous monitoring can provide increased assurance of early detection of any fraud schemes and can even serve as a deterrent to misconduct

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,

More information

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3

More information

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing

More information

Investigative Techniques

Investigative Techniques Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data

More information

Fighting Fraud with Data Mining & Analysis

Fighting Fraud with Data Mining & Analysis Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud

More information

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14

More information

THE ABC S OF DATA ANALYTICS

THE ABC S OF DATA ANALYTICS THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable

More information

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Prevention and Detection in a Manufacturing Environment Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse

More information

Checkpoint Learning Forensic Accounting Certificate Program

Checkpoint Learning Forensic Accounting Certificate Program Checkpoint Learning Forensic Accounting Certificate Program Powered by CPEasy, part of the Checkpoint Learning portfolio Firm Admin & User s Guide Develop Technical Forensic Accounting Knowledge Tax &

More information

The Informatica Solution for Improper Payments

The Informatica Solution for Improper Payments The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Gerard M. Zack, CFE, CPA, CIA, CCEP Introduction to Data Analytics CPE Instructions Course Objectives How data analytics can be used to detect fraud Different tools

More information

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage

More information

Healthcare Data Management

Healthcare Data Management Healthcare Data Management Expanding Insight, Increasing Efficiency, Improving Care WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential Information

More information

RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER

RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic

More information

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

716 West Ave Austin, TX 78701-2727 USA

716 West Ave Austin, TX 78701-2727 USA How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement

More information

Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6

Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6 Table of Contents Data Analysis Then & Now 1 Changing of the Guard 2 New Generation 4 Core Data Analysis Tasks 6 Data Analysis Then & Now Spreadsheets remain one of the most popular applications for auditing

More information

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information

The Facets of Fraud. A layered approach to fraud prevention

The Facets of Fraud. A layered approach to fraud prevention The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate

More information

LEVERAGING OPEN SOURCE INTELLIGENCE (OSINT) TO COMBAT FRAUD

LEVERAGING OPEN SOURCE INTELLIGENCE (OSINT) TO COMBAT FRAUD The illicit practices of diversion, theft of trade secrets, and counterfeiting pharmaceutical drugs have been estimated to be a $200 billion per year industry. Managing and identifying intellectual property

More information

Data mining life cycle in fraud auditing

Data mining life cycle in fraud auditing Data mining life cycle in fraud auditing ELENA MONICA SABĂU Faculty of Accounting and Management Information Systems Academy of Economic Studies 6, Romană Square, District 1, Bucharest emsabau@gmail.com

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

LinkedIn Summary Swipe File & Examples

LinkedIn Summary Swipe File & Examples www.punchmedia.ca www.facebook.com/punchmediadotca www.twitter.com/punchmediadotca http://linkedin.com/company/punchmedia MAIN GOALS: LinkedIn Summary Swipe File & Examples Create a strong branded presence

More information

Comparison of Generalized Audit Software

Comparison of Generalized Audit Software Comparison of Generalized Audit Software In today s modern and computerized world even small companies have huge numbers of financial transactions going through the books. As an (external) auditor, it

More information

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics

More information

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Using Technology to Automate Fraud Detection Within Key Business Process Areas Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd

More information

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various

More information

Forensic Audit Building a World Class Program

Forensic Audit Building a World Class Program Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response

More information

White Paper - Travel & Entertainment Spend Analytics Best Practices

White Paper - Travel & Entertainment Spend Analytics Best Practices White Paper - Travel & Entertainment Spend Analytics Best Practices T&E is probably your company s second largest discretionary expense, representing on average as much as 6% of all corporate expenses.

More information

AUDIT PROCEDURES RECEIVABLE AND SALES

AUDIT PROCEDURES RECEIVABLE AND SALES 184 AUDIT PROCEDURES RECEIVABLE AND SALES Ștefan Zuca Abstract The overall objective of the audit of accounts receivable and sales is to determine if they are fairly presented in the context of the financial

More information

BECOMING AN EXPERT AS AN EXPERT WITNESS

BECOMING AN EXPERT AS AN EXPERT WITNESS Whether you are anticipating your first courtroom experience as an expert or are highly familiar with the rigors of the witness stand, being an effective and successful expert is a critical skill for anti-fraud

More information

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively

More information

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login

More information

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Completing an Accounts Payable Audit With ACL (Aired on Feb 15) AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired

More information

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative

More information

Incorporating Behavioral Analytics into Exception-Based Reporting O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4

Incorporating Behavioral Analytics into Exception-Based Reporting O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4 Incorporating Behavioral Analytics into Exception-Based Reporting O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4 Table of Contents Introduction 3 What are Behavioral Exceptions? 3 How Do Behavioral

More information

Accounts Payable Fraud Services

Accounts Payable Fraud Services Accounts Payable Fraud Services According to research conducted by the Association of Certified Fraud Examiners (ACFE), U.S. organizations lose an estimated 7 percent of annual revenues to fraud. 1 In

More information

Accounts Payable Best Practices

Accounts Payable Best Practices Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can

More information

Piec ing together financ ial puzzles

Piec ing together financ ial puzzles Piec ing together financ ial puzzles Stephen Pedneault, CPA/CFF, FCPA, CFE Stephen Pedneault is the Principal of Forensic Accounting Services, LLC, a Glastonbury, Connecticut CPA firm, focused exclusively

More information

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is

More information

Top Ten Red Flags: When it s Time to Engage a Forensic Accountant in Divorce Litigation

Top Ten Red Flags: When it s Time to Engage a Forensic Accountant in Divorce Litigation Top Ten Red Flags: When it s Time to Engage a Forensic Accountant in Divorce Litigation Selecting a forensic accountant in a family law case can be a difficult decision and their role will vary from case

More information

Recognize the many faces of fraud

Recognize the many faces of fraud Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and

More information

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.

More information

August 29, 2007. Via Email to rule-comments@sec.gov

August 29, 2007. Via Email to rule-comments@sec.gov Barbara Z. Sweeney Phone: 202-728-8062 Senior Vice President and Corporate Secretary Via Email to rule-comments@sec.gov Nancy M. Morris Secretary Securities and Exchange Commission 100 F Street, NE Washington,

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

Building a Data Quality Scorecard for Operational Data Governance

Building a Data Quality Scorecard for Operational Data Governance Building a Data Quality Scorecard for Operational Data Governance A White Paper by David Loshin WHITE PAPER Table of Contents Introduction.... 1 Establishing Business Objectives.... 1 Business Drivers...

More information

The Shift to Behavioral Monitoring: A New Paradigm for Exception-Based Reporting

The Shift to Behavioral Monitoring: A New Paradigm for Exception-Based Reporting The Shift to Behavioral Monitoring: A New Paradigm for Exception-Based Reporting Introduction In the past 10 years, exception-based reporting (EBR) has become a widespread tool for loss prevention in retail

More information

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business

More information

Solution Brief Efficient ecommerce Fraud Management for Acquirers

Solution Brief Efficient ecommerce Fraud Management for Acquirers Solution Brief Efficient ecommerce Fraud Management for Acquirers Table of Contents Introduction Sophisticated Fraud Detection and Chargeback Reduction Improved Compliance Posture Transparent User Experience

More information

The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements

The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities

More information

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.

More information

Fraud Control Theory

Fraud Control Theory 13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts

More information

Forensic Analytics and Employee Fraud. Presented by. Mark J. Nigrini Ph.D. Professor, West Virginia University

Forensic Analytics and Employee Fraud. Presented by. Mark J. Nigrini Ph.D. Professor, West Virginia University The Charleston Chapter of the ACFE 2015 Training Day Date: May 8, 2015 Time: 8:00 4:30 Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini Ph.D Professor, West Virginia University Location:

More information

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you 3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud

More information

Fighting Online Fraud

Fighting Online Fraud White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant

More information

How To Understand And Understand Forensic Accounting

How To Understand And Understand Forensic Accounting Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations

More information

by: Scott Baranowski, CIA

by: Scott Baranowski, CIA Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf

More information

{Governmental Client Training} June 20, 2016

{Governmental Client Training} June 20, 2016 {Governmental Client Training} June 20, 2016 2 Online Banking Controls & Fraud Considerations Dan Block, CPA Rumzei Abdallah, CPA Agenda 3 Online Banking Considerations What happened? 7 Controls Commonly

More information

Business Intelligence & Data Analytics - an introductory perspective

Business Intelligence & Data Analytics - an introductory perspective Business Intelligence & Data Analytics - an introductory perspective Presenter: Leigh Franklin, Partner KPMG Hobart TAO Client Information Session 8 May 2014 Agenda KPMG presenter s contact information:

More information

Strategically Detecting And Mitigating Employee Fraud

Strategically Detecting And Mitigating Employee Fraud A Custom Technology Adoption Profile Commissioned By SAP and Deloitte March 2014 Strategically Detecting And Mitigating Employee Fraud Executive Summary Employee fraud is a universal concern, with detection

More information

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D.

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D. Top Five Employee Fraud Schemes Forensic Solutions, LLC Forensic accounting and litigation support services Presented by: Thomas Buckhoff, Ph.D., CPA/CFF, CFE Fraudsters love cash! Cash is the asset most

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

CREDIT CARD FRAUD PREVENTION IN NONPROFITS

CREDIT CARD FRAUD PREVENTION IN NONPROFITS CREDIT CARD FRAUD PREVENTION IN NONPROFITS TABLE OF CONTENTS 01 01 01 02 02 03 03 04 05 05 FRAUDULENT CREDIT CARD TRANSACTIONS AND IN WHAT WAYS CHARITIES ARE AT RISK CARD TUMBLING ONLINE AUCTION FRAUD

More information

Internal Audit Practice Guide

Internal Audit Practice Guide Internal Audit Practice Guide Continuous Auditing Office of the Comptroller General, Internal Audit Sector May 2010 Table of Contents Purpose...1 Background...1 Definitions...2 Continuous Auditing Professional

More information

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and

More information

Presentation Presented By FORENSIC INVESTIGATIVE TEAM

Presentation Presented By FORENSIC INVESTIGATIVE TEAM Presentation Presented By FORENSIC INVESTIGATIVE TEAM Proud of our Past - Focused on your Future! Our investigative team has received extensive training by the American Institute of CPA's, Association

More information

Empowering Brokers to Identify and Combat Mortgage Fraud

Empowering Brokers to Identify and Combat Mortgage Fraud Empowering Brokers to Identify and Combat Mortgage Fraud An Equifax White Paper October 2007 Author: Paul Wills Equifax Global Product Management Introduction In today s lending environment, mortgage fraud

More information

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,

More information

Guidelines for the Conduct of Ad Verification A Summary of the IAB US Document for the AU Market

Guidelines for the Conduct of Ad Verification A Summary of the IAB US Document for the AU Market 2013 Guidelines for the Conduct of Ad Verification A Summary of the IAB US Document for the AU Market May 2013 2013 interactive advertising bureau australia www.iabaustralia.com.au Table of Contents Background

More information

How To Create A Healthcare Data Management For Providers Solution From An Informatica Data Management Solution

How To Create A Healthcare Data Management For Providers Solution From An Informatica Data Management Solution White Paper Healthcare Data Management for Providers Expanding Insight, Increasing Efficiency, Improving Care This document contains Confidential, Proprietary and Trade Secret Information ( Confidential

More information

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project

More information

Due Diligence Primer Registered Investment Advisers and Broker-Dealers

Due Diligence Primer Registered Investment Advisers and Broker-Dealers Due Diligence Primer Registered Investment Advisers and Broker-Dealers James T. Conversano, CFE, CFA 1 2 Disclaimer. The opinions expressed in this presentation are those of the individual author and do

More information

www.pwc.com Being protected Using data analytics to detect fraud

www.pwc.com Being protected Using data analytics to detect fraud www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,

More information

Continuous Auditing with Data Analytics

Continuous Auditing with Data Analytics Continuous Auditing with Data Analytics Brooke Miller, CPA, CIA, CPCU brooke.miller@rlicorp.com Sean Scranton, CPCU, CISSP, CISM, CISA sean.scranton@rlicorp.com Overview Understand embedding data analytics

More information

EMDEON PAYMENT INTEGRITY SERVICES

EMDEON PAYMENT INTEGRITY SERVICES EMDEON PAYMENT INTEGRITY SERVICES Emdeon Fraud Prevention Services Emdeon Fraud Investigative Services Emdeon Clinical Integrity for Claims Emdeon Third-Party Liability Analysis Simplifying the Business

More information

A Performance Audit of the State s Purchasing Card Program

A Performance Audit of the State s Purchasing Card Program REPORT TO THE UTAH LEGISLATURE Number 2006-09 A Performance Audit of the State s Purchasing Card Program September 2006 Audit Performed By: Audit Manager Audit Supervisor Audit Staff Rick Coleman Susan

More information

Location Analytics for Financial Services. An Esri White Paper October 2013

Location Analytics for Financial Services. An Esri White Paper October 2013 Location Analytics for Financial Services An Esri White Paper October 2013 Copyright 2013 Esri All rights reserved. Printed in the United States of America. The information contained in this document is

More information

Innovative Techniques and Tools to Detect Data Quality Problems

Innovative Techniques and Tools to Detect Data Quality Problems Paper DM05 Innovative Techniques and Tools to Detect Data Quality Problems Hong Qi and Allan Glaser Merck & Co., Inc., Upper Gwynnedd, PA ABSTRACT High quality data are essential for accurate and meaningful

More information

Tomorrow s investment uncertainty, discovered today.

Tomorrow s investment uncertainty, discovered today. Tomorrow s investment uncertainty, discovered today. Voyant Advisors combines expertise in forensic accounting and investigative analysis with extensive equity research experience to offer clients a unique

More information

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in

GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in GOVERNANCE, RISK AND COMPLIANCE Internal Audit Assessing Fraud Vulnerabilities kpmg.com/in 1 Internal Audit Assessing Fraud Vulnerabilities Introduction Globalization has increased the scale and complexity

More information

Fraud and internal controls, Part 3: Internal fraud schemes

Fraud and internal controls, Part 3: Internal fraud schemes Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.

More information

Focus on Forensics. Providing valuable insights to corporate decision-makers and their legal counsel May 2009

Focus on Forensics. Providing valuable insights to corporate decision-makers and their legal counsel May 2009 Focus on Forensics Providing valuable insights to corporate decision-makers and their legal counsel May 2009 Post-Acquisition Disputes and Net Working Capital By Bradley J. Preber CPA, CFF, CFE The sales

More information

Forensic Accounting: An Introduction

Forensic Accounting: An Introduction Forensic Accounting: An Introduction Forensic Accounting Forensic Accountants are part investigator, part auditor, part solicitor and part accountant. Forensic Accountants utilise an understanding of business

More information

Proving Damages Suffered in a Fraud Case. Ralph Q. Summerford, CPA, ABV, CFE, CFF, CIRA Forensic Strategic Solutions, PC

Proving Damages Suffered in a Fraud Case. Ralph Q. Summerford, CPA, ABV, CFE, CFF, CIRA Forensic Strategic Solutions, PC Proving Damages Suffered in a Fraud Case Ralph Q. Summerford, CPA, ABV, CFE, CFF, CIRA Forensic Strategic Solutions, PC 1 Legal Principles Proximate Cause Transaction and Loss Causation Foreseeability

More information

Detect, Prevent, and Deter Fraud in Big Data Environments

Detect, Prevent, and Deter Fraud in Big Data Environments SAP Brief SAP s for Governance, Risk, and Compliance SAP Fraud Management Objectives Detect, Prevent, and Deter Fraud in Big Data Environments Detect and prevent fraud to reduce financial loss Detect and

More information

White Paper. Confirmation Fraud. How auditors can overcome confirmation fraud challenges

White Paper. Confirmation Fraud. How auditors can overcome confirmation fraud challenges White Paper Confirmation Fraud How auditors can overcome confirmation fraud challenges 1 Table of Contents Introduction 2 An Auditor s Duties under SAS No. 99 3 Misappropriation of Assets 3 Fraudulent

More information

Five Fundamental Data Quality Practices

Five Fundamental Data Quality Practices Five Fundamental Data Quality Practices W H I T E PA P E R : DATA QUALITY & DATA INTEGRATION David Loshin WHITE PAPER: DATA QUALITY & DATA INTEGRATION Five Fundamental Data Quality Practices 2 INTRODUCTION

More information

Collecting & Analyzing Interview Data

Collecting & Analyzing Interview Data Collecting & Analyzing Interview Data A. Collecting Interview Data A. Tape Recordings and Note Taking How the interviewer is to document the contents of the interaction with the respondent is a critically

More information

CRISP-DM, which stands for Cross-Industry Standard Process for Data Mining, is an industry-proven way to guide your data mining efforts.

CRISP-DM, which stands for Cross-Industry Standard Process for Data Mining, is an industry-proven way to guide your data mining efforts. CRISP-DM, which stands for Cross-Industry Standard Process for Data Mining, is an industry-proven way to guide your data mining efforts. As a methodology, it includes descriptions of the typical phases

More information

Forensic Analytics and Employee Fraud

Forensic Analytics and Employee Fraud Chapter Meeting Announcement Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini, Ph.D. DATE: Friday, April 24, 2015 PLACE: Education Service Center Region 19 6611 Boeing Drive El Paso,

More information

KEY FRAUD INDICATORS (KFI): A NEW APPROACH TO SET UP AND USE EFFECTIVE FRAUD INDICATORS

KEY FRAUD INDICATORS (KFI): A NEW APPROACH TO SET UP AND USE EFFECTIVE FRAUD INDICATORS (KFI): A NEW APPROACH TO SET UP AND USE EFFECTIVE FRAUD INDICATORS Most companies set up key performance indicators (KPI), but when it comes to fraud, it is more difficult to find indicators that meet

More information

Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes

Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes REMEDYNE Fraud Prevention Document Version: Rel. 1.4 2015-03-05 Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes TABLE OF CONTENTS 1. SOLUTION

More information

UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION. SECURITIES EXCHANGE ACT OF 1934 Release No. 62372 / June 24, 2010

UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION. SECURITIES EXCHANGE ACT OF 1934 Release No. 62372 / June 24, 2010 UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION SECURITIES EXCHANGE ACT OF 1934 Release No. 62372 / June 24, 2010 ACCOUNTING AND AUDITING ENFORCEMENT Release No. 3146 / June 24,

More information

YOUR ITAM PROGRAM: TO OUTSOURCE, OR NOT TO OUTSOURCE?

YOUR ITAM PROGRAM: TO OUTSOURCE, OR NOT TO OUTSOURCE? BEYOND TOOLS: BUSINESS INTELLIGENCE MEETS ANALYTICS YOUR ITAM PROGRAM: TO OUTSOURCE, OR NOT TO OUTSOURCE? Frank Venezia, Siwel Consulting, Inc. Steffani Lomax, Siwel Consulting, Inc. White Paper - September

More information

Managing the Risk of Fraud in Outsourcing. Fernando Cancino, CFE, CIA

Managing the Risk of Fraud in Outsourcing. Fernando Cancino, CFE, CIA Managing the Risk of Fraud in Outsourcing Fernando Cancino, CFE, CIA Topics Covered Outsourcing Overview Fraud & Outsourcing Outsourcing Risk Management Role of Internal Audit What Is Outsourcing? What

More information

Small Business Fraud Awareness, Prevention and Detection Hands on Consultation with Tangible Results

Small Business Fraud Awareness, Prevention and Detection Hands on Consultation with Tangible Results Small Business Fraud Awareness, Prevention and Detection Hands on Consultation with Tangible Results 2012 Fraud & Forensic Accounting Conference Presented by: Robert J. Kollar and Valerie C. Williams Small

More information

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception

More information