TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL
|
|
- Kelley Bryan
- 8 years ago
- Views:
Transcription
1 TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL With the large volumes of data handled by organizations today, the ability to analyze this data as part of fraud investigations has become essential. Gain better knowledge of the various analysis techniques that can be applied to these datasets and how to leverage the data available to you in conducting your investigation. JANET MCHARD, CFE, CPA, CFFA, CFF Founding Partner McHard Accounting Consulting, LLC Albuquerque, New Mexico Janet M. McHard is the Founding Partner of McHard Accounting Consulting, LLC, a firm specializing in forensic accounting, fraud prevention, and accounting reconstruction. Ms. McHard is a Certified Fraud Examiner (CFE), a certification bestowed upon examination by the Association of Certified Fraud Examiners (ACFE). She holds a CPA in the State of New Mexico. She is also certified by the National Association of Certified Valuation Analyst (NACVA) as a Certified Forensic Financial Analyst (CFFA). She is certified in Financial Forensics by the American Institute of Certified Public Accountants, a designation awarded based on education and experience. Ms. McHard has received special training in fraud prevention and investigation from the ACFE, the National Association of Certified Valuation Analysts, and through the University of New Mexico s Financial Investigators Certificate Program. Ms. McHard provides assistance, including expert testimony, in the areas of fraud and forensic accounting. She also has experience in database management and class action administration. Previously, she was a senior manager at the regional full-service accounting firm Meyners + Company, located in Albuquerque. She was also a staff accountant and litigation support specialist with an international accounting and consulting firm. Her background also includes work as a legal secretary and administrative assistant for a law firm and business manager for a medical office. Janet M. McHard holds a Bachelor of Arts from the University of New Mexico as well as an M.B.A. from the University of New Mexico s Robert O. Anderson Graduate School of Management. She is a member of the National Board of Advisors and past president of the Board of Directors of Keshet Dance Company. She was previously a board member of the Albuquerque Softball/Baseball Hall of Fame and has volunteered her time with the American Softball Association and the New Mexico United States Specialty Sports Association. She is a member of Women in Leadership of the United Way of Central New Mexico. Association of Certified Fraud Examiners, Certified Fraud Examiner, CFE, ACFE, and the ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without the prior consent of the author. 2012
2 The Need for a Formal Process Although the crux of data analysis involves running targeted tests on data to identify anomalies, the ability of such tests to help detect fraud depends greatly on what the examiner does before and after actually performing the data analysis techniques. Consequently, to ensure the most accurate and meaningful results, a formal data analysis process should be applied that begins several steps before the tests are run and concludes with active and ongoing review of the data. While the specific process will vary based on the realities and needs of the organization, the following approach contains steps that should be considered and implemented, to the appropriate extent, in each data analysis engagement: 1. Planning phase: a. Understand the data. b. Articulate examination objectives. c. Build a profile of potential frauds. 2. Preparation phase: a. Identify the relevant data. b. Obtain the data. c. Verify the data. d. Cleanse and transform the data. 3. Testing and interpretation phase: a. Analyze the data. 4. Post-analysis phase: a. Respond to the analysis findings. b. Monitor the data. Planning Phase As with most tasks, proper planning is essential in a data analysis engagement. Without sufficient time and attention devoted to planning early on, the examiner risks analyzing the data inefficiently, lacking focus or direction for the
3 engagement, running into avoidable technical difficulties, and possibly overlooking key areas for exploration. Understanding the Data As a first step long before determining which tests to run the examiner must know what data is available to be analyzed and how that data is structured. This might mean reviewing the database schema and technical documentation and consulting with the data administrator to learn what fields and records exist and in which tables the information is stored. The examiner will also need to know how the tables are linked together. Helpful tools in getting a full view of the organization s data include a data inventory and a data map. Such documents can be used to identify and record information about the data source, file formats, business process owners, and key systems used as they relate to specific projects. This documentation provides a good starting point for documenting the engagement history and for managing the data analytics process. Understanding the structure of the existing data will not only help ensure that the examiner builds workable tests to be run on the data, but might also help identify additional areas for exploration that might otherwise have been overlooked. Articulate Examination Objectives and Scope The amount of data housed by most organizations is extremely voluminous; many companies process millions of transactions every single day. Going through every piece of data would be impossible. And, although data analysis techniques can greatly increase investigative efficiency, performing every possible
4 analysis of the data would be prohibitively timeconsuming. Consequently, at the outset, the examiner must define and articulate the objectives and scope of the expected analysis. This includes considering: The impetus for the data analysis engagement The structure and size of the business The target area of examination, if restricted The resources (time, personnel, etc.) available for the engagement Whether any predication exists that a particular fraud is occurring Any existing thresholds or preferences for frauds to be considered material Build a Profile of Potential Frauds To maximize the potential success of detecting fraud through data analysis, the analyses performed should be based on an understanding of the entity s existing fraud risks. To do so, the examiner must first build a profile of potential frauds by identifying the organization s risk areas, the types of frauds possible in those risk areas, and the resulting exposure to those frauds. In organizations that have a formal fraud risk assessment process, this step should simply involve referring to the outcomes of that process and forming a fraud detection approach based on the risks identified. In organizations lacking such a process, however, this step can be quite time-consuming, as it involves gaining a sufficient understanding of organizational operations to identify the full spectrum of fraud scenarios possible within the company. Preparation Phase The results of a data analysis test will only be as good as the data used for the analysis. Thus, before running tests on
5 the data, the fraud examiner must make certain the data being analyzed are relevant and reliable for the objective of the engagement. Identify the Relevant Data Using the profile of potential frauds as a guide, the fraud examiner must identify the target data for analysis. Specifically, for each specific fraud scenario assessed to be a high risk to the organization, the examiner should determine which data fields and records would be affected by such a scheme. The examiner must then identify the logistics involved with obtaining this information, including: What specific data (i.e., fields, records) is available Who generates and maintains the data Where the data is stored Timing of the data extraction (e.g., date range, cutoff dates/times) How the examiner will receive and store the data Data format Storage/transfer mechanism Control totals needed for verification Potential corroborating sources of data Obtain the Data The examiner should prepare and submit a formal request for the desired data, outlining the specifics determined in the previous step. Depending on the objectives of the engagement and the operations of the organization, the examiner might be given a file containing the data to work with, or he might be provided read-only access to the data within the organization s information system
6 This step in the process can be particularly challenging. In some cases, obtaining the data involves working with overloaded or uncooperative data managers, IT departments, or other parties. Other potential obstacles at this stage include data that are housed in different systems or on different platforms and data that are maintained manually. Verify the Data Once the data have been received by the fraud examiner, it must be verified. The first step is simply to ensure that the data analysis software that will be used is able to open and read the data as provided. The examiner should then validate that the data received contains all requested fields and records. Once the success of the transfer process has been confirmed, the examiner should perform the following tests to verify the integrity of data: Confirm control totals. Confirm the time period covered by the data is appropriate and as requested. Sort the file in ascending or descending order to test for leading or lagging errors. Check for gaps in applicable fields, including system-assigned identifying record number, to identify missing records. Confirm the format of data in format-specific fields, such as date fields and numeric fields. Check for blank fields where information should be entered. Check for inappropriate duplicate fields or records. The examiner can also use tests for reasonableness or logical relationships to verify data integrity. Examples of such tests include:
7 If transactions average X per day, verify that a monthly file includes approximately X times the number of business days. Divide average transaction size by the number of transactions in the file. Compare fields such as items orders to items shipped to confirm that the amount shipped is equal to or less that the amount ordered. Cleanse and Normalize the Data Depending on how the data were collected and processed, as well as the results of the data verification process, the examiner might need to cleanse and convert the data to a format suitable for analysis before executing any data analysis tests. For example, certain field formats (e.g., date, time, currency, etc.) might need to be modified to make the information consistent and ready for testing. The data must also be normalized so that all data being imported for analysis can be analyzed consistently. Common data fields from multiple systems must be identified, and data must be standardized. In normalizing the data for analysis, table layout, fields/records, data length, data format, and table relationships are all important considerations. Additionally, the following inconsistencies in the data must be addressed: Known errors Blanks or missing data Duplicated data Special/unreadable characters in the data Other unusable entries
8 When possible, such situations should be addressed by fixing, isolating, or eliminating them. Any issues that cannot be cleaned up will require special consideration during the testing and interpretation phase. Testing and Interpretation Phase If the planning and preparation stages have been conducted effectively, the testing and interpretation phase should yield results that are helpful in uncovering red flags of fraud in the data. Analyze the Data When using data analysis to detect fraud, the examiner should organize and analyze the data in a way designed to uncover patterns that are consistent with the specific fraud scenarios identified during the planning stage. Grouping the data into homogenous groups can facilitate the examiner s ability to spot outliers. The specific groupings should be based on the target fraud scenario and data being analyzed, but such categorization might include grouping data by: Geographical location Business division or unit Time period Dollar value Sales person Another useful step involves running some high-level tests, such as summarization or statistical analysis, to get an overview of the data and provide some context for any outliers identified during later testing. From here, the examiner should run tests to uncover possible indicators of fraud including unusual trends, data anomalies, and control breakdowns. The data
9 analysis techniques used should be chosen based on the high-risk fraud scenarios being considered. Tests designed to detect specific fraud schemes will be covered throughout the later sections of this course. In analyzing the results of the tests run, the following issues merit special consideration. The Role of Concealment The fraud examiner must remember that the goal of the data analysis engagement is to identify fraudulent transactions transactions that, by their very nature, involve deception and attempted concealment. The examiner is looking for data that have been intentionally manipulated, rather than just erroneously recorded. Consequently, he should focus his analysis on data that are strategically missing or altered, such as lacking contact information, or transactions that narrowly circumvent organizational policies. Additionally, because fraudsters can be creative in concealing their schemes, fraud examiners must be creative in their searches, often combining several data analysis techniques and tests. Addressing False Positives A false positive is a transaction identified by a data analysis test as an anomaly within the data set even though it is not actually a fraudulent transaction. Such results can occur for a number of reasons, including: Data validity/integrity issues Data merging difficulties Legitimate data that falls outside the field norm (e.g., entries for non-u.s. addresses within a state field) The goal in running data analysis tests is to identify anomalies without generating too many false positive results. Sorting through and analyzing false positives takes time and resources that could be spent further
10 investigating other potentially fraudulent transactions. However, proper planning and preparation should help minimize the occurrence of false positives in the test results. Post-Analysis Phase The data analysis tests will likely reveal many potential areas of exploration. After executing the desired tests, the fraud examiner will need to determine how to respond to the findings and how to watch for future anomalies. Respond to the Analysis Findings The findings of the data analysis engagement will rarely be sufficient on their own to conclude that fraud is or is not occurring. Any anomalies identified will require follow-up and further examination to determine the reason for the discrepancy in the data. Often, this will include investigatory procedures such as document examination and interviews. The specific resultant actions should be based on the fraud scenarios in question and the particular red flags identified in the data. Additionally, the terms and objectives of the engagement will dictate whether a formal report should be issued and, if so, the form and audience of the resulting report. Such a report should typically by easy to understand, summarize the analysis findings, and provide insightful and applicable information for the relevant readers. Monitor the Data Based on the results of the analysis and the needs of the organization, the examiner should work with management to determine whether any of the tests performed should be repeated on a periodic or
11 continuous basis. In areas deemed to be at heightened risk for fraud, continuous monitoring can provide increased assurance of early detection of any fraud schemes and can even serve as a deterrent to misconduct
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,
More informationACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
More informationACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada
Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing
More informationInvestigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
More informationFighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud
More informationKroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations
Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14
More informationTHE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
More informationFraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
More informationCheckpoint Learning Forensic Accounting Certificate Program
Checkpoint Learning Forensic Accounting Certificate Program Powered by CPEasy, part of the Checkpoint Learning portfolio Firm Admin & User s Guide Develop Technical Forensic Accounting Knowledge Tax &
More informationThe Informatica Solution for Improper Payments
The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade
More informationUsing Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Gerard M. Zack, CFE, CPA, CIA, CCEP Introduction to Data Analytics CPE Instructions Course Objectives How data analytics can be used to detect fraud Different tools
More informationStrong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
More informationHealthcare Data Management
Healthcare Data Management Expanding Insight, Increasing Efficiency, Improving Care WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential Information
More informationRED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
More informationProcurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
More information716 West Ave Austin, TX 78701-2727 USA
How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement
More informationTable of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6
Table of Contents Data Analysis Then & Now 1 Changing of the Guard 2 New Generation 4 Core Data Analysis Tasks 6 Data Analysis Then & Now Spreadsheets remain one of the most popular applications for auditing
More informationHOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)
HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement
More informationUsing Data Mining to Detect Insurance Fraud
IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts
More informationThe Facets of Fraud. A layered approach to fraud prevention
The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate
More informationLEVERAGING OPEN SOURCE INTELLIGENCE (OSINT) TO COMBAT FRAUD
The illicit practices of diversion, theft of trade secrets, and counterfeiting pharmaceutical drugs have been estimated to be a $200 billion per year industry. Managing and identifying intellectual property
More informationData mining life cycle in fraud auditing
Data mining life cycle in fraud auditing ELENA MONICA SABĂU Faculty of Accounting and Management Information Systems Academy of Economic Studies 6, Romană Square, District 1, Bucharest emsabau@gmail.com
More informationAdvanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
More informationLinkedIn Summary Swipe File & Examples
www.punchmedia.ca www.facebook.com/punchmediadotca www.twitter.com/punchmediadotca http://linkedin.com/company/punchmedia MAIN GOALS: LinkedIn Summary Swipe File & Examples Create a strong branded presence
More informationComparison of Generalized Audit Software
Comparison of Generalized Audit Software In today s modern and computerized world even small companies have huge numbers of financial transactions going through the books. As an (external) auditor, it
More informationISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
More informationUsing Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
More informationSan Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young
Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various
More informationForensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
More informationWhite Paper - Travel & Entertainment Spend Analytics Best Practices
White Paper - Travel & Entertainment Spend Analytics Best Practices T&E is probably your company s second largest discretionary expense, representing on average as much as 6% of all corporate expenses.
More informationAUDIT PROCEDURES RECEIVABLE AND SALES
184 AUDIT PROCEDURES RECEIVABLE AND SALES Ștefan Zuca Abstract The overall objective of the audit of accounts receivable and sales is to determine if they are fairly presented in the context of the financial
More informationBECOMING AN EXPERT AS AN EXPERT WITNESS
Whether you are anticipating your first courtroom experience as an expert or are highly familiar with the rigors of the witness stand, being an effective and successful expert is a critical skill for anti-fraud
More informationProduct. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
More informationTop 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
More informationCompleting an Accounts Payable Audit With ACL (Aired on Feb 15)
AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired
More informationWHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules
WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative
More informationIncorporating Behavioral Analytics into Exception-Based Reporting O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4
Incorporating Behavioral Analytics into Exception-Based Reporting O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4 Table of Contents Introduction 3 What are Behavioral Exceptions? 3 How Do Behavioral
More informationAccounts Payable Fraud Services
Accounts Payable Fraud Services According to research conducted by the Association of Certified Fraud Examiners (ACFE), U.S. organizations lose an estimated 7 percent of annual revenues to fraud. 1 In
More informationAccounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
More informationPiec ing together financ ial puzzles
Piec ing together financ ial puzzles Stephen Pedneault, CPA/CFF, FCPA, CFE Stephen Pedneault is the Principal of Forensic Accounting Services, LLC, a Glastonbury, Connecticut CPA firm, focused exclusively
More informationACL EBOOK. Detecting and Preventing Fraud with Data Analytics
ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is
More informationTop Ten Red Flags: When it s Time to Engage a Forensic Accountant in Divorce Litigation
Top Ten Red Flags: When it s Time to Engage a Forensic Accountant in Divorce Litigation Selecting a forensic accountant in a family law case can be a difficult decision and their role will vary from case
More informationRecognize the many faces of fraud
Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and
More informationU S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
More informationAugust 29, 2007. Via Email to rule-comments@sec.gov
Barbara Z. Sweeney Phone: 202-728-8062 Senior Vice President and Corporate Secretary Via Email to rule-comments@sec.gov Nancy M. Morris Secretary Securities and Exchange Commission 100 F Street, NE Washington,
More informationAGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
More informationBuilding a Data Quality Scorecard for Operational Data Governance
Building a Data Quality Scorecard for Operational Data Governance A White Paper by David Loshin WHITE PAPER Table of Contents Introduction.... 1 Establishing Business Objectives.... 1 Business Drivers...
More informationThe Shift to Behavioral Monitoring: A New Paradigm for Exception-Based Reporting
The Shift to Behavioral Monitoring: A New Paradigm for Exception-Based Reporting Introduction In the past 10 years, exception-based reporting (EBR) has become a widespread tool for loss prevention in retail
More informationData Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
More informationSolution Brief Efficient ecommerce Fraud Management for Acquirers
Solution Brief Efficient ecommerce Fraud Management for Acquirers Table of Contents Introduction Sophisticated Fraud Detection and Chargeback Reduction Improved Compliance Posture Transparent User Experience
More informationThe Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements
ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities
More informationPREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
More informationFraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
More informationForensic Analytics and Employee Fraud. Presented by. Mark J. Nigrini Ph.D. Professor, West Virginia University
The Charleston Chapter of the ACFE 2015 Training Day Date: May 8, 2015 Time: 8:00 4:30 Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini Ph.D Professor, West Virginia University Location:
More informationProactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
More informationFighting Online Fraud
White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant
More informationHow To Understand And Understand Forensic Accounting
Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations
More informationby: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
More information{Governmental Client Training} June 20, 2016
{Governmental Client Training} June 20, 2016 2 Online Banking Controls & Fraud Considerations Dan Block, CPA Rumzei Abdallah, CPA Agenda 3 Online Banking Considerations What happened? 7 Controls Commonly
More informationBusiness Intelligence & Data Analytics - an introductory perspective
Business Intelligence & Data Analytics - an introductory perspective Presenter: Leigh Franklin, Partner KPMG Hobart TAO Client Information Session 8 May 2014 Agenda KPMG presenter s contact information:
More informationStrategically Detecting And Mitigating Employee Fraud
A Custom Technology Adoption Profile Commissioned By SAP and Deloitte March 2014 Strategically Detecting And Mitigating Employee Fraud Executive Summary Employee fraud is a universal concern, with detection
More informationConversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D.
Top Five Employee Fraud Schemes Forensic Solutions, LLC Forensic accounting and litigation support services Presented by: Thomas Buckhoff, Ph.D., CPA/CFF, CFE Fraudsters love cash! Cash is the asset most
More informationLeveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
More informationCREDIT CARD FRAUD PREVENTION IN NONPROFITS
CREDIT CARD FRAUD PREVENTION IN NONPROFITS TABLE OF CONTENTS 01 01 01 02 02 03 03 04 05 05 FRAUDULENT CREDIT CARD TRANSACTIONS AND IN WHAT WAYS CHARITIES ARE AT RISK CARD TUMBLING ONLINE AUCTION FRAUD
More informationInternal Audit Practice Guide
Internal Audit Practice Guide Continuous Auditing Office of the Comptroller General, Internal Audit Sector May 2010 Table of Contents Purpose...1 Background...1 Definitions...2 Continuous Auditing Professional
More informationUnderstanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner
Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and
More informationPresentation Presented By FORENSIC INVESTIGATIVE TEAM
Presentation Presented By FORENSIC INVESTIGATIVE TEAM Proud of our Past - Focused on your Future! Our investigative team has received extensive training by the American Institute of CPA's, Association
More informationEmpowering Brokers to Identify and Combat Mortgage Fraud
Empowering Brokers to Identify and Combat Mortgage Fraud An Equifax White Paper October 2007 Author: Paul Wills Equifax Global Product Management Introduction In today s lending environment, mortgage fraud
More informationStopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
More informationGuidelines for the Conduct of Ad Verification A Summary of the IAB US Document for the AU Market
2013 Guidelines for the Conduct of Ad Verification A Summary of the IAB US Document for the AU Market May 2013 2013 interactive advertising bureau australia www.iabaustralia.com.au Table of Contents Background
More informationHow To Create A Healthcare Data Management For Providers Solution From An Informatica Data Management Solution
White Paper Healthcare Data Management for Providers Expanding Insight, Increasing Efficiency, Improving Care This document contains Confidential, Proprietary and Trade Secret Information ( Confidential
More informationPreventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations
Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project
More informationDue Diligence Primer Registered Investment Advisers and Broker-Dealers
Due Diligence Primer Registered Investment Advisers and Broker-Dealers James T. Conversano, CFE, CFA 1 2 Disclaimer. The opinions expressed in this presentation are those of the individual author and do
More informationwww.pwc.com Being protected Using data analytics to detect fraud
www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,
More informationContinuous Auditing with Data Analytics
Continuous Auditing with Data Analytics Brooke Miller, CPA, CIA, CPCU brooke.miller@rlicorp.com Sean Scranton, CPCU, CISSP, CISM, CISA sean.scranton@rlicorp.com Overview Understand embedding data analytics
More informationEMDEON PAYMENT INTEGRITY SERVICES
EMDEON PAYMENT INTEGRITY SERVICES Emdeon Fraud Prevention Services Emdeon Fraud Investigative Services Emdeon Clinical Integrity for Claims Emdeon Third-Party Liability Analysis Simplifying the Business
More informationA Performance Audit of the State s Purchasing Card Program
REPORT TO THE UTAH LEGISLATURE Number 2006-09 A Performance Audit of the State s Purchasing Card Program September 2006 Audit Performed By: Audit Manager Audit Supervisor Audit Staff Rick Coleman Susan
More informationLocation Analytics for Financial Services. An Esri White Paper October 2013
Location Analytics for Financial Services An Esri White Paper October 2013 Copyright 2013 Esri All rights reserved. Printed in the United States of America. The information contained in this document is
More informationInnovative Techniques and Tools to Detect Data Quality Problems
Paper DM05 Innovative Techniques and Tools to Detect Data Quality Problems Hong Qi and Allan Glaser Merck & Co., Inc., Upper Gwynnedd, PA ABSTRACT High quality data are essential for accurate and meaningful
More informationTomorrow s investment uncertainty, discovered today.
Tomorrow s investment uncertainty, discovered today. Voyant Advisors combines expertise in forensic accounting and investigative analysis with extensive equity research experience to offer clients a unique
More informationGOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in
GOVERNANCE, RISK AND COMPLIANCE Internal Audit Assessing Fraud Vulnerabilities kpmg.com/in 1 Internal Audit Assessing Fraud Vulnerabilities Introduction Globalization has increased the scale and complexity
More informationFraud and internal controls, Part 3: Internal fraud schemes
Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.
More informationFocus on Forensics. Providing valuable insights to corporate decision-makers and their legal counsel May 2009
Focus on Forensics Providing valuable insights to corporate decision-makers and their legal counsel May 2009 Post-Acquisition Disputes and Net Working Capital By Bradley J. Preber CPA, CFF, CFE The sales
More informationForensic Accounting: An Introduction
Forensic Accounting: An Introduction Forensic Accounting Forensic Accountants are part investigator, part auditor, part solicitor and part accountant. Forensic Accountants utilise an understanding of business
More informationProving Damages Suffered in a Fraud Case. Ralph Q. Summerford, CPA, ABV, CFE, CFF, CIRA Forensic Strategic Solutions, PC
Proving Damages Suffered in a Fraud Case Ralph Q. Summerford, CPA, ABV, CFE, CFF, CIRA Forensic Strategic Solutions, PC 1 Legal Principles Proximate Cause Transaction and Loss Causation Foreseeability
More informationDetect, Prevent, and Deter Fraud in Big Data Environments
SAP Brief SAP s for Governance, Risk, and Compliance SAP Fraud Management Objectives Detect, Prevent, and Deter Fraud in Big Data Environments Detect and prevent fraud to reduce financial loss Detect and
More informationWhite Paper. Confirmation Fraud. How auditors can overcome confirmation fraud challenges
White Paper Confirmation Fraud How auditors can overcome confirmation fraud challenges 1 Table of Contents Introduction 2 An Auditor s Duties under SAS No. 99 3 Misappropriation of Assets 3 Fraudulent
More informationFive Fundamental Data Quality Practices
Five Fundamental Data Quality Practices W H I T E PA P E R : DATA QUALITY & DATA INTEGRATION David Loshin WHITE PAPER: DATA QUALITY & DATA INTEGRATION Five Fundamental Data Quality Practices 2 INTRODUCTION
More informationCollecting & Analyzing Interview Data
Collecting & Analyzing Interview Data A. Collecting Interview Data A. Tape Recordings and Note Taking How the interviewer is to document the contents of the interaction with the respondent is a critically
More informationCRISP-DM, which stands for Cross-Industry Standard Process for Data Mining, is an industry-proven way to guide your data mining efforts.
CRISP-DM, which stands for Cross-Industry Standard Process for Data Mining, is an industry-proven way to guide your data mining efforts. As a methodology, it includes descriptions of the typical phases
More informationForensic Analytics and Employee Fraud
Chapter Meeting Announcement Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini, Ph.D. DATE: Friday, April 24, 2015 PLACE: Education Service Center Region 19 6611 Boeing Drive El Paso,
More informationKEY FRAUD INDICATORS (KFI): A NEW APPROACH TO SET UP AND USE EFFECTIVE FRAUD INDICATORS
(KFI): A NEW APPROACH TO SET UP AND USE EFFECTIVE FRAUD INDICATORS Most companies set up key performance indicators (KPI), but when it comes to fraud, it is more difficult to find indicators that meet
More informationContinuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes
REMEDYNE Fraud Prevention Document Version: Rel. 1.4 2015-03-05 Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes TABLE OF CONTENTS 1. SOLUTION
More informationUNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION. SECURITIES EXCHANGE ACT OF 1934 Release No. 62372 / June 24, 2010
UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION SECURITIES EXCHANGE ACT OF 1934 Release No. 62372 / June 24, 2010 ACCOUNTING AND AUDITING ENFORCEMENT Release No. 3146 / June 24,
More informationYOUR ITAM PROGRAM: TO OUTSOURCE, OR NOT TO OUTSOURCE?
BEYOND TOOLS: BUSINESS INTELLIGENCE MEETS ANALYTICS YOUR ITAM PROGRAM: TO OUTSOURCE, OR NOT TO OUTSOURCE? Frank Venezia, Siwel Consulting, Inc. Steffani Lomax, Siwel Consulting, Inc. White Paper - September
More informationManaging the Risk of Fraud in Outsourcing. Fernando Cancino, CFE, CIA
Managing the Risk of Fraud in Outsourcing Fernando Cancino, CFE, CIA Topics Covered Outsourcing Overview Fraud & Outsourcing Outsourcing Risk Management Role of Internal Audit What Is Outsourcing? What
More informationSmall Business Fraud Awareness, Prevention and Detection Hands on Consultation with Tangible Results
Small Business Fraud Awareness, Prevention and Detection Hands on Consultation with Tangible Results 2012 Fraud & Forensic Accounting Conference Presented by: Robert J. Kollar and Valerie C. Williams Small
More informationPresented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
More information