Neural networks (NNs) are becoming more commonplace

Size: px
Start display at page:

Download "Neural networks (NNs) are becoming more commonplace"

Transcription

1 Copyright 2006 ISACA. All rights reserved. Using Neural Network Software as a Forensic Accounting Tool By Michael J. Cerullo, Ph.D., CPA, CITP, CFE, and M. Virginia Cerullo, Ph.D., CPA, CIA, CFE Neural networks (NNs) are becoming more commonplace in real-world business applications and in some cases, such as fraud detection, they have already become the method of choice. 1 NNs are also being employed in risk assessment and internal controls, as well as to visualize complex databases for marketing segmentation. The boom in applications covers a wide range of business interests from finance management, to forecasting, to production. The combination of statistical, neural and fuzzy methods now enables direct quantitative studies to be carried out without the need for rocket-science expertise. However, the tremendous potential of NNs in business and accounting has yet to be realized. 2 Neural networks are becoming increasingly adaptable; thus, their use is expected to become more common and widespread in time. This article illustrates how NN software packages can be utilized by firms to predict the occurrence of financial statement fraud. Specifically, the following topics will be examined: The nature of NNs Reasons to use NNs The structure of a neural network Detecting financial reporting fraud with an NN NN technology equips auditors with expertise that previously could only have been attained with years of training and experience. 3 Auditors often find that financial statement fraud is very difficult to detect because it is subject to concealment or falsification of accounting records and supporting documents. Thus, a possible strategy for auditors is to proactively assess the likelihood of such fraud. This ability to accurately assess the risk of fraud is critical to the initial assessment of risk of material misstatement during the initial planning phase of the audit. The risk assessment will affect the design of subsequent audit testing techniques. 4 The Nature of Neural Networks As has been mentioned numerous times in the periodic literature, an artificial NN processes data similarly to a human brain. Specifically, an NN is a type of nonlinear statistical analysis program that utilizes a learning process (trial and error) to repeatedly analyze a collection of historical data sets to recognize patterns in that data and to automatically produce a model for that data. It processes data the way the brain processes data in a multiple parallel processing mode. This multiple processing capability enables NNs to execute operations much faster than traditional methods, which process data serially, one operation at a time. NNs solve problems by recognizing patterns in data that may be too subtle or complex for humans or other types of computer methods to discern. Basically, an NN creates a mathematical model from a historical database of examples of input and output values. After learning the relationship between the variables, the network has been trained, and a mathematical model is constructed that recognizes patterns in the sample data, such as correlations between seemingly unrelated data. The resulting model, when used with new input data, provides projections of future outputs. For example, by collecting historical data of commercial loans made to organizations, a bank can determine which organizations have defaulted on repaying the loans. A model can be built that contains the relationship, if any, between a firm s selected financial ratios and the outcome of the loan. After the model is synthesized, it can be used to predict if a new commercial loan applicant is likely to default on repayment. Reasons to Use Neural Networks As indicated by figure 1, an NN is suited for simple to complex, and structured to unstructured, problems. Thus, an NN can solve a much broader range of problems than, for example, an expert system, including problems that are almost completely random in nature. Specific fraud applications suitable for development by using NNs can be categorized into prediction, classification and pattern recognition problems. In recent years, NN technology has been used in a few firms to develop models for various forms of fraud detection. A recent study provides confirmation that NN techniques are an effective method for developing a fraud classification model to assess the risk of errors and irregularities in financial statements. 5 The variables used in developing a particular fraud detection model may differ from one company/industry to another or according to the targeted type of fraud. NNs, with their remarkable ability to derive meaning from imprecise data, can be used to detect trends that are too complex to be noticed by humans or other computer programs, including those depicted in figure 1. A trained NN can be thought of as an expert in the category of information it has been given to analyze. This expert can then be used to provide projections given new situations of interest and answer what if questions. Other advantages include: 6 Adaptive learning An NN can learn how to do tasks based on the data given for training or initial experience. Self-organization An NN can create its own representation of the data set it receives during training time. Real-time operation An NN can rapidly go through millions or billions of simulations to train the data set in parallel. Fault tolerance via redundant information coding A partial destruction of a network leads to the corresponding degradation of performance. However, some network capabilities may be retained even with major network damage. Developing and implementing an NN application is often much easier and faster than developing an accounting expert system application since most commercially available NN software packages automatically select the network structure. 1

2 Figure 1 Practicality of Applying an NN to Solve a Large Class of Problems Figure 2 Schematic of a Simple Neural Network Structure Complex Problem Complexity Expert Systems Neural Networks Input 1 i W h Z O Output Simple Input 2 Conventional Software Certain Statistics Moderately Uncertain Very Uncertain Level of Uncertainty Completely Random Normally, the entire developmental process from start to implementation can be completed in a few weeks. Neural Network Structure Figure 2 presents a simple NN structure, which is comprised of multiple inputs and a single output. The basic building block in an NN is the neuron, depicted by the circles (also called nodes). As illustrated, every NN has an input layer (i), a hidden layer (h) and an output layer (o). Each artificial neuron in a layer receives its input from the output of the previous layer nodes or from the network inputs. The connections between nodes are associated to adjustable weights (W, Z) that are adjusted as the network is trained. Each neuron in the network processes the input data, with the resulting values steadily seeping through the network layer by layer, until a result is generated in the output layer. Using Neural Networks to Detect Financial Statement Fraud: A Case Study The stages to develop an NN to predict fraud (see figure 3) are: Formulate the problem. As shown in figure 3, the first step is to select a problem that is suitable for an artificial NN. As mentioned, suitable business applications fall into three categories: 1. Classification problems Fraud detection, loan approval, loan default and credit card applications fall into this category. 2. Time series applications Financial forecasting, stock market prediction, bankruptcy prediction, bad debts estimation, sales and expense forecasting are examples of business applications in this category. 3. Data mining applications Many marketing applications fall into this category, such as looking for patterns in customer databases, targeting customers, estimating responses and analyzing demographics. This article will provide a case study of using an NN for the classification category involving fraud committed by an organization s top management. Such frauds are more commonly called cooking the books or financial statement fraud. This type of fraud is commonly committed by overstating revenues and understating liabilities or expenses. According to the Association of Certified Fraud Input 3 Examiners (ACFE s) 2004 Report to the Nation on Occupational Fraud and Abuse, the average financial statement fraud reported by survey respondents is over US $1 million. Financial statement frauds, such as the WorldCom and Enron frauds, can overstate income by billions of US dollars. A variety of data analysis techniques can be employed to detect financial statement fraud, including Benford s law, horizontal and vertical analyses, ratio and trend analyses, and NN software. NN software is an often overlooked but very powerful and easy-to-use tool in detecting management fraud. Figure 3 Detecting Fraud With a Neural Network Formulate problem. Create database of examples. Construct model by training database. Evaluate model s performance. Implement model, if valid. 2

3 Assume that Dale Rogers, CPA, CFE, partner in a regional Denver, Colorado, USA, CPA financial services firm is using the ModelQuest TM Enterprise NN package (hereafter referred to as ModelQuest) to automatically create a financial statement fraud prediction model for clients. 7 Other NN packages include Brainmaker (from California Scientific Software) and NeuroSolutions (from Neuro Dimension Inc.). Assume that Rogers has acquired a good working knowledge of the package and plans to use it in her audit engagements. She plans to use the NN model during initial audit planning and the preliminary assessment/ analytical review phase to aid in predicting if financial reporting fraud has been perpetrated in client companies. Create the database. Now that the problem is defined, her next step is to create a database of historical numerical examples input into the NN software to generate a fraud prediction model. The database must contain independent input variables and corresponding dependent output variables. Creating the database is the most important step in the NN developmental process. Unrepresentative sample data or too few data observations will result in a model that poorly estimates or predicts future values. Assume Rogers next goes to the US Securities and Exchange Commission s (SEC s) web site to conduct an online search of potential financial ratios indicating financial reporting fraud. Based on her readings of several research studies on the usefulness of financial ratios to predict fraud, she selects 26 ratios (i.e., the independent variables, X) that have been employed by companies to predict possible fraudulent financial reporting (i.e., the dependent variable, Y). The ratios selected are given in figure 4. Based on discussions with expert auditors in her firm, Rogers selects the nine ratios (in bold letters in figure 4) to use in her fraud prediction model. Next, Rogers does an Internet search of national newspapers, ACFE, the American Institute of Certified Public Accountants (AICPA), the US Department of Justice and the Stanford Research Institute, and finds 15 firms that have reported financial reporting fraud and an additional 15 companies that have not reported such fraud. Her next step is to conduct an online search of the SEC s EDGAR database. From these data, she creates a database of the previously mentioned nine ratios for the 30 firms for the year before any of the frauds were reported. The database of financial ratios is presented in figure 5. The nine ratios are known as the X, or independent, variables, and the default is the Y, or dependent, variable. Since symbolic values cannot be processed by NN software, they are converted to the numerical values 0 or 1. To illustrate the concept, firm A shows a 1 for the default (dependent) variable. This means that financial statement fraud was uncovered at that firm; likewise, a value of 0 for firm B means that, as of the reporting date, no financial statement fraud was reported at that firm. Construct model. Next, the table of input and output values is keyed into the ModelQuest NN package to construct a network depicting the relationships of the inputs to the output. Rogers will have the software automatically split the table into a training subset of 22 observations and a test subset of eight observations. The NN software will use the training file to train the network into a mathematical model Figure 4 Potential Ratios Used to Predict Financial Statement Fraud Earnings/assets Equity/debt Current ratio...current assets/current liabilities Acld-test ratio...quick assets/current liabilities Receivables turnover...net sales on account/average receivables Number of day s sales in...receivables end of receivables year/average daily sales Inventory turnover...cost goods sold/average inventory Number of days sales in...inventory end of year/average inventory daily CGS Net fixed assets/long term liabilities Debt to equity...total debt/stockholders equity Net sales/average total assets Rate earned on total assets...income + interest expense/average total assets Rate earned on stockholders...income/total stockholders equity equity Cash flow/total debt Cash flow/long-term debt After-tax profit/total assets Total liabilities/total assets Net working capital/total assets Net working capital/sales revenue Return on assets...income/average total assets Credit rating...provided by a credit rating agency Bond rating...1 = low, 10 = high Sales ratio...sales/assets Earnings before interest and taxes (EBIT)/assets Profit margin or efficiency ratio Income/sales Equity/assets that recognizes patterns between the independent variables (inputs) and the dependent variable (i.e., fraud or no fraud). The test data determine how well the synthesized network model is able to generalize on new, unseen data. Evaluate performance. The next step is to evaluate the performance of the network. Rogers evaluates the model constructed by comparing the output summary statistics for the test data subset with the training data subset. Figure 6 shows hypothetical summary output statistics for the database given in figure 5. 8 Generally speaking, the average absolute error (AAE) and maximum absolute error (MAE) are two good indicators to evaluate when determining if the model constructed is acceptable. 9 The AAE is the sum of the errors, ignoring the plus or minus signs and averaging the result. The MAE is the maximum amount of error between the predicted and actual values. In this example, the AAE (.23) is low compared to the output maximum (1.0) and minimum (0.0), which indicates that, at first glance, the model appears to be acceptable. The MAE indicates the worst the model did on the subset of testing or evaluation data. In this illustration, sometimes the model will generate completely erroneous results. 3

4 Figure 5 Hypothetical Database Used to Predict the Presence or Absence of Financial Statement Fraud Name of Firm EquityAsset EarnAsset EquDebt CurrRat QuickRat BondRat ROA EBITAsset ARTurn Default A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C D It is important to also compare the output minimum, maximum, mean and standard deviation. If these numbers are close to one another between the testing and training data sets, the synthesized model is usually acceptable. On the other hand, if these values are quite different, the number of observations should be increased and a new model should be trained. Also, the predicted squared error (PSE) should be compared to the average squared error (ASE). 10 The two values should be relatively close to one another. In this case, the PSE is 0.10 and the ASE is Finally, training results were evaluated by computing the R 2 value, the coefficient of determination. An R 2 approaching 1 indicates a good model fit and an R 2 near 0 indicates a poor fit. Predicted output in the testing data set formulated by the NN matched the training output with a correlation of Figure 6 shows that if the evaluation of the output summary statistics indicates that an unacceptable model was developed, Rogers must try new variables, increase the sample size, retrain a new model and evaluate the output statistics. If the results still appear to be unacceptable, an NN probably cannot be constructed for this problem situation. Implement model. Assume that Rogers gets acceptable results and that all nine input values are significant. The model can now be implemented for its intended purpose of predicting fraudulent financial reporting. On an audit engagement, during the initial audit planning and preliminary assessment/analytical review phase, Rogers would compute the nine financial ratios for the previous year and input the nine values into ModelQuest using the package s query function. Assume that the model immediately computes a 1 output value from the inputs, which indicates that the firm Figure 6 Hypothetical Output Summary Statistics for the Fraud Prediction Model RESULTS TEST DATA TRAINING DATA Number of observations 8 22 Minimum 0 0 Maximum Output mean Output standard deviation.5.45 Maximum absolute error Average absolute error Predicted squared error -.10 Average squared error R has possibly engaged in fraudulent financial reporting and this potential red flag must be further investigated. Summary and Conclusions NNs are frequently ignored by internal and external auditors as a major data analysis tool that can be effectively employed to predict the occurrence of fraudulent financial reporting. This article presented a case study of how a hypothetical regional public accounting firm employed an NN software package in client engagements to aid in predicting if financial statement reporting fraud is likely occurring. NNs process large amounts of data to solve problems by recognizing patterns, trends and relationships that may be too subtle or complex for humans or other types of computer methods, such as statistical models, to discern. 4

5 Basically, an NN computer software model is constructed and trained from a database of historical examples of input and output variables. During model training, an NN learns the patterns and correlations from a sample of input and output data representing actual fraud occurrences and nonfraud occurrences, respectively. The creation of the database is the most important step in the NN developmental process. The input and output values are keyed into the NN package to construct a network that can then be used by an accountant to make a decision about the possible occurrence of fraud. The ModelQuest NN package was used to construct the mathematical model for the case study discussed because the package can be mastered in a few hours and requires only a rudimentary understanding of statistical concepts. Other NN packages are similar to ModelQuest. The model developed by the ModelQuest software can be used in future engagements to predict whether financial reporting fraud, the dependent variable, has been perpetrated in client companies. The key to managing this type of fraud and reducing its large potential losses is to employ the most effective tools available to fight it. Many firms are utilizing new information technologies to address old problems, such as fraud. Auditors have a tremendous opportunity to learn about and employ NNs to ensure that their firms or clients remain competitive. Endnotes In the authors experience, of all the data analysis methods used to predict or detect fraud, including general audit software, statistical software, ratio analysis, spreadsheets, relational database packages, financial statement analysis software and Benford s law, NN software is the method least often employed. For example, in a study by the authors, about 7 percent of internal auditors responding to a survey used NNs vs. more than 45 percent who used general audit software. (See Cerullo, Michael J.; M. Virginia Cerullo; Tracy Hardin, Computer Techniques Used to Audit the Purchasing Function, Internal Auditing, March/April 1999, p. 24.) Also, even more shocking, a recent article revealed that, of 400 auditors responding to the 10 th IIA annual software survey, none used NN software. (See Jackson, Russell A.; Get the Most Out of Software Tools, Internal Auditor, August 2004, p , 44 and 47.) Finally, a 2004 study of auditors use of technology published on the IIA web site ( revealed that, of 14 technologies surveyed, NNs ranked dead last. 3 One of the authors has successfully used an NN package for the past 12 years in a graduate IS auditing course. Most students learn how to physically utilize the software within a few hours; in about another two hours, they acquire a good working knowledge of the statistics employed to evaluate models. They then complete a case study on the likelihood that commercial loan applicants will default on their loans. 4 Lin, Jerry W.; Mark I. Hwang; Jack D. Becker; A Fuzzy Neural Network for Assessing the Risk of Fraudulent Financial Reporting, Managerial Auditing Journal, August 2003, p Green, Brian Patrick; Jae Hwa Choi; Assessing the Risk of Management Fraud Through Neural Network Technology, Auditing, Spring 1997, p Adapted from journal/vol1/cs11/article1.html 7 This package is available from AbTech Corporation, 1575 State Farm Blvd., Suites 1&2, Charlottesville, VA 22911, Basically, all NN software packages provide similar statistics. Most of the statistics concern evaluating various measures related to the errors or residuals. Errors or residuals are the difference between the actual output values and the predicted output values. Ideally, the closer that the sum of the errors is to 0, the better the model. 9 Adapted from ModelQuest Expert: User s Manual, Charlottesville, VA, Abtech Corporation, 1997, p. 8-2 and These individual differences are squared, summed and averaged. The result is the ASE. 11 The PSE is computed from the training data subset and is an approximation of the expected network squared error (ASE) for data not in the training subset. That is, the model predicted that the ASE on new data should be.10; in fact, the ASE on the test data (i.e., new data) was When training results do not indicate a high correlation, one option is to try other network architectures available with the ModelQuest software. Michael J. Cerullo, Ph.D., CPA, CITP, CFE is a professor of accounting at Southwest Missouri State University, Springfield, Missouri, USA. He specializes in accounting information systems, information systems auditing and fraud examination. He has published approximately 150 articles in professional and academic journals. He received his doctorate from Louisiana State University. M. Virginia Cerullo, Ph.D., CPA, CIA, CFE is a professor of accounting at Southwest Missouri State University, Springfield, Missouri, USA. She specializes in internal auditing and is the coordinator of the Institute of Internal Auditor s Endorsed Internal Audit Program at SMSU. She received her doctorate from Louisiana State University and has published numerous articles in professional and academic journals. Information Systems Control Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription to the Information Systems Control Journal. Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute and their committees, and from opinions endorsed by authors employers, or the editors of this Journal. Information Systems Control Journal does not attest to the originality of authors' content. Copyright 2006 by ISACA. All rights reserved. Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass , to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25 per page. Send payment to the CCC stating the ISSN ( ), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited. 5

In recent years, information technology (IT) used by firms,

In recent years, information technology (IT) used by firms, Copyright 2003 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. Impact of SAS No. 94 on Computer Audit Techniques By M. Virginia Cerullo, CPA, CIA, CFE, and Michael

More information

Detection of Financial Statement Fraud using Data Mining Technique and Performance Analysis

Detection of Financial Statement Fraud using Data Mining Technique and Performance Analysis ISSN (Online) 2278-121 ISSN (Print) 2319 59 Vol. 4, Issue 7, July 215 Detection of Financial Statement Fraud using Data Mining Technique and Performance Analysis KK Tangod 1, GH Kulkarni 2 Assistant Professor,

More information

While Microsoft Access database is not an enterprise

While Microsoft Access database is not an enterprise Copyright 2006 ISACA. All rights reserved. www.isaca.org. Important, But Often Dismissed: Internal Control in a Microsoft Access Database By John H. White, Ph.D., CISA, CPA While Microsoft Access database

More information

IT Governance and Outsourcing

IT Governance and Outsourcing Copyright 2004 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. IT Governance and Outsourcing By Hugh Parkes, CISA, FCA is a subset of corporate governance. It refers

More information

Information security governance has become an essential

Information security governance has become an essential Copyright 2007 ISACA. All rights reserved. www.isaca.org. Developing for Effective John P. Pironti, CISA, CISM, CISSP, ISSAP, ISSMP Information security governance has become an essential element of overall

More information

Journal Online. Impact of Security Awareness Training Components on Perceived Security Effectiveness. Do you have something to say about this article?

Journal Online. Impact of Security Awareness Training Components on Perceived Security Effectiveness. Do you have something to say about this article? Journal Online Impact of Security Awareness Training Components on Perceived Security Effectiveness Karen Quagliata, Ph.D., PMP, has worked in the IT field for more than 10 years in diverse capacities.

More information

Reading Between the Bottom Lines

Reading Between the Bottom Lines #1 F I N A N C I A L S T A T E M E N T A N A L Y S I S Reading Between the Bottom Lines CPA... Imagine the possibilities! Intro Learning Activity Learning Objectives 1. Obtain a working knowledge of financial

More information

Feature. Log Management: A Pragmatic Approach to PCI DSS

Feature. Log Management: A Pragmatic Approach to PCI DSS Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who

More information

716 West Ave Austin, TX 78701-2727 USA

716 West Ave Austin, TX 78701-2727 USA How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement

More information

Nine Common Types of Data Mining Techniques Used in Predictive Analytics

Nine Common Types of Data Mining Techniques Used in Predictive Analytics 1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better

More information

Outdoor Retailer Conference Financial Statement Fraud. August 2, 2010 Derk G. Rasmussen. www.sagefa.com

Outdoor Retailer Conference Financial Statement Fraud. August 2, 2010 Derk G. Rasmussen. www.sagefa.com Outdoor Retailer Conference Financial Statement Fraud August 2, 2010 Derk G. Rasmussen www.sagefa.com About Sage Forensic Accounting Sage Forensic Accounting quantifies damage claims in litigation, determines

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

Personal Financial Plan. John & Mary Sample

Personal Financial Plan. John & Mary Sample For Prepared by Donald F. Dempsey Jr. PO Box 1591 Williston, VT 05495 802-764-5815 This presentation provides a general overview of some aspects of your personal financial position. It is designed to provide

More information

Comprehensive Business Budgeting

Comprehensive Business Budgeting Management Accounting 137 Comprehensive Business Budgeting Goals and Objectives Profit planning, commonly called master budgeting or comprehensive business budgeting, is one of the more important techniques

More information

With the dawn of the 21st century, a new era of

With the dawn of the 21st century, a new era of Copyright 2007 ISACA. All rights reserved. www.isaca.org. Auditing CMMI Maturity and Sarbanes-Oxley Compliance By Laurent Janssens, CISA, and Peter Leeson With the dawn of the 21st century, a new era of

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

Data Mining mit der JMSL Numerical Library for Java Applications

Data Mining mit der JMSL Numerical Library for Java Applications Data Mining mit der JMSL Numerical Library for Java Applications Stefan Sineux 8. Java Forum Stuttgart 07.07.2005 Agenda Visual Numerics JMSL TM Numerical Library Neuronale Netze (Hintergrund) Demos Neuronale

More information

Exam 1 chapters 1-4 Needles 10ed

Exam 1 chapters 1-4 Needles 10ed Exam 1 chapters 1-4 Needles 10ed Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Which of the following is the most appropriate definition of accounting?

More information

SIX RED FLAG MODELS 1. Fraud Z-Score Model SGI Sales Growth Index x 0.892 GMI Gross Margin Index x 0.528 AQI Asset Quality Index x 0.

SIX RED FLAG MODELS 1. Fraud Z-Score Model SGI Sales Growth Index x 0.892 GMI Gross Margin Index x 0.528 AQI Asset Quality Index x 0. SIX RED FLAG MODELS Six different FFR detection models and ratios were used to develop a more comprehensive red flag approach in screening for and identifying financial reporting problems in publicly held

More information

APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT

APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.2 APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT Algirdas Noreika Department of Practical

More information

MAN 4720 STRATEGIC MANAGEMENT AND POLICY FORMULATION FINANCIAL ANALYSIS GUIDE

MAN 4720 STRATEGIC MANAGEMENT AND POLICY FORMULATION FINANCIAL ANALYSIS GUIDE MAN 4720 STRATEGIC MANAGEMENT AND POLICY FORMULATION FINANCIAL ANALYSIS GUIDE Revised -December 13, 2011 1 FINANCIAL ANALYSIS USING STRATEGIC PROFIT MODEL RATIOS Introduction Your policy course integrates

More information

Lina Warrad. Applied Science University, Amman, Jordan

Lina Warrad. Applied Science University, Amman, Jordan Journal of Modern Accounting and Auditing, March 2015, Vol. 11, No. 3, 168-174 doi: 10.17265/1548-6583/2015.03.006 D DAVID PUBLISHING The Effect of Net Working Capital on Jordanian Industrial and Energy

More information

How To Understand The Financial Philosophy Of A Firm

How To Understand The Financial Philosophy Of A Firm 1. is concerned with the acquisition, financing, and management of assets with some overall goal in mind. A. Financial management B. Profit maximization C. Agency theory D. Social responsibility 2. Jensen

More information

Robert and Mary Sample

Robert and Mary Sample Comprehensive Financial Plan Sample Plan Robert and Mary Sample Prepared by : John Poels, ChFC, AAMS Senior Financial Advisor February 11, 2009 Table Of Contents IMPORTANT DISCLOSURE INFORMATION 1-7 Presentation

More information

http://www.bls.gov/oco/ocos001.htm Accountants and Auditors

http://www.bls.gov/oco/ocos001.htm Accountants and Auditors http://www.bls.gov/oco/ocos001.htm Accountants and Auditors * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections Data * Earnings * OES Data *

More information

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage

More information

Fair Value Accounting Fraud

Fair Value Accounting Fraud Fair Value Accounting Fraud New Global Risks and Detection Techniques GERARD M. ZACK, CFE, CPA John Wiley & Sons, Inc. Preface Acknowledgments xvu xxi PARTI CHAPTER 1 INTRODUCTION TO FAIR VALUE ACCOUNTING

More information

Working Paper No. 51/00 Current Materiality Guidance for Auditors. Thomas E. McKee. Aasmund Eilifsen

Working Paper No. 51/00 Current Materiality Guidance for Auditors. Thomas E. McKee. Aasmund Eilifsen Working Paper No. 51/00 Current Materiality Guidance for Auditors By Thomas E. McKee Aasmund Eilifsen SNF-project No. 7844: «Finansregnskap, konkurs og revisjon The project is financed by the Norwegian

More information

Practical Business Application of Break Even Analysis in Graduate Construction Education

Practical Business Application of Break Even Analysis in Graduate Construction Education Journal of Construction Education Spring 1999, Vol. 4, No. 1, pp. 26-37 Copyright 1999 by the Associated Schools of Construction 1522-8150/99/$3.00/Educational Practice Manuscript Practical Business Application

More information

Introduction. 15.511 Corporate Accounting Summer 2004. Professor SP Kothari Sloan School of Management Massachusetts Institute of Technology

Introduction. 15.511 Corporate Accounting Summer 2004. Professor SP Kothari Sloan School of Management Massachusetts Institute of Technology Introduction 15.511 Corporate Accounting Summer 2004 Professor SP Kothari Sloan School of Management Massachusetts Institute of Technology June 7, 2004 1 Session 1: Agenda Administrative matters Discussion

More information

Measuring Financial Performance: A Critical Key to Managing Risk

Measuring Financial Performance: A Critical Key to Managing Risk Measuring Financial Performance: A Critical Key to Managing Risk Dr. Laurence M. Crane Director of Education and Training National Crop Insurance Services, Inc. The essence of managing risk is making good

More information

Conditional probability of actually detecting a financial fraud a neutrosophic extension to Benford s law

Conditional probability of actually detecting a financial fraud a neutrosophic extension to Benford s law Conditional probability of actually detecting a financial fraud a neutrosophic extension to Benford s law Sukanto Bhattacharya Alaska Pacific University, USA Kuldeep Kumar Bond University, Australia Florentin

More information

Stages of the Audit Process

Stages of the Audit Process Chapter 5 Stages of the Audit Process Learning Objectives Upon completion of this chapter you should be able to explain: LO 1 Explain the audit process. LO 2 Accept a new client or confirming the continuance

More information

Review on Financial Forecasting using Neural Network and Data Mining Technique

Review on Financial Forecasting using Neural Network and Data Mining Technique ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Simulation and Risk Analysis

Simulation and Risk Analysis Simulation and Risk Analysis Using Analytic Solver Platform REVIEW BASED ON MANAGEMENT SCIENCE What We ll Cover Today Introduction Frontline Systems Session Ι Beta Training Program Goals Overview of Analytic

More information

Feature. Applications of Business Process Analytics and Mining for Internal Control. World

Feature. Applications of Business Process Analytics and Mining for Internal Control. World Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan

More information

Benford s Law and Digital Frequency Analysis

Benford s Law and Digital Frequency Analysis Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners

More information

2015 Workshops for Professors

2015 Workshops for Professors SAS Education Grow with us Offered by the SAS Global Academic Program Supporting teaching, learning and research in higher education 2015 Workshops for Professors 1 Workshops for Professors As the market

More information

Chapter 14. Web Extension: Financing Feedbacks and Alternative Forecasting Techniques

Chapter 14. Web Extension: Financing Feedbacks and Alternative Forecasting Techniques Chapter 14 Web Extension: Financing Feedbacks and Alternative Forecasting Techniques I n Chapter 14 we forecasted financial statements under the assumption that the firm s interest expense can be estimated

More information

Financial Accounting by Michael P. Licata, Ph.D. Course Syllabus and Learning Objectives by Chapter

Financial Accounting by Michael P. Licata, Ph.D. Course Syllabus and Learning Objectives by Chapter Financial Accounting by Michael P. Licata, Ph.D. Course Syllabus and Learning Objectives by Chapter Basic Course Description Financial Accounting by Michael P. Licata, Ph.D. is a first accounting course

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Accounting Concepts 2013 Association of Certified Fraud Examiners, Inc. Accounting Basics Assets = Liabilities + Owners Equity Accounting Basics By definition,

More information

Components of a Business Model Core Strategy 1-5 Strategic 1-5 Partnership 1-5 Customer 1-5 Resources Network Interface

Components of a Business Model Core Strategy 1-5 Strategic 1-5 Partnership 1-5 Customer 1-5 Resources Network Interface ENGI 8607: Business Planning and Strategy in an Entrepreneurial Environment ZipCar Dr. Amy Hsiao Lecture 5 Memorial University of Newfoundland ZipCar Components of a Business Model How It Works http://www.zipcar.com/cambridge/findcars?zipfleet_id=94396

More information

CHAPTER 1 INTRODUCTION TO ACCOUNTING AND BUSINESS

CHAPTER 1 INTRODUCTION TO ACCOUNTING AND BUSINESS INTRODUCTION TO ACCOUNTING AND BUSINESS 1. Some users of accounting information include managers, employees, investors, creditors, customers, and the government. 2. The role of accounting is to provide

More information

Financial Planning Services Financial Goal Analysis

Financial Planning Services Financial Goal Analysis Financial Planning Services Financial Goal Analysis Prepared for: Tom and Christina Sample November 18, 2010 Prepared by : Erik Holton Corporate Stock Benefit Consultant The Callanan Group UBS Financial

More information

Guide to Financial Statements Study Guide

Guide to Financial Statements Study Guide Guide to Financial Statements Study Guide Overview (Topic 1) Three major financial statements: The Income Statement The Balance Sheet The Cash Flow Statement Objectives: Explain the underlying equation

More information

How To Calculate Financial Leverage Ratio

How To Calculate Financial Leverage Ratio What Do Short-Term Liquidity Ratios Measure? What Is Working Capital? HOCK international - 2004 1 HOCK international - 2004 2 How Is the Current Ratio Calculated? How Is the Quick Ratio Calculated? HOCK

More information

Solve Your Toughest Challenges with Data Mining

Solve Your Toughest Challenges with Data Mining IBM Software Business Analytics IBM SPSS Modeler Solve Your Toughest Challenges with Data Mining Use predictive intelligence to make good decisions faster Solve Your Toughest Challenges with Data Mining

More information

SAMPLING FOR EFFECTIVE INTERNAL AUDITING. By Mwenya P. Chitalu CIA

SAMPLING FOR EFFECTIVE INTERNAL AUDITING. By Mwenya P. Chitalu CIA SAMPLING FOR EFFECTIVE INTERNAL AUDITING By Mwenya P. Chitalu CIA EXPECTED PRESENTATION OUTCOMES Why Do Auditors Sample? Sampling Policy Statistical & Non-statistical Sampling Statistical Terminologies

More information

Introduction. 15.501/516 Accounting Spring 2004. Professor Sugata Roychowdhury Sloan School of Management Massachusetts Institute of Technology

Introduction. 15.501/516 Accounting Spring 2004. Professor Sugata Roychowdhury Sloan School of Management Massachusetts Institute of Technology Introduction 15.501/516 Accounting Spring 2004 Professor Sugata Roychowdhury Sloan School of Management Massachusetts Institute of Technology Feb 4, 2004 1 Session 1: Agenda Administrative matters Discussion

More information

Web Extension: Financing Feedbacks and Alternative Forecasting Techniques

Web Extension: Financing Feedbacks and Alternative Forecasting Techniques 19878_09W_p001-009.qxd 3/10/06 9:56 AM Page 1 C H A P T E R 9 Web Extension: Financing Feedbacks and Alternative Forecasting Techniques IMAGE: GETTY IMAGES, INC., PHOTODISC COLLECTION In Chapter 9 we forecasted

More information

This article describes the history of the Payment Card

This article describes the history of the Payment Card Copyright 2007 ISACA. All rights reserved. www.isaca.org. Achieving Compliance With the PCI Data Security Standard By Alex Woda, CISA, QDSP, QPASP This article describes the history of the Payment Card

More information

THE POWER OF CASH FLOW RATIOS

THE POWER OF CASH FLOW RATIOS THE POWER OF CASH FLOW RATIOS By Frank R, Urbancic, DBA, CPA Professor and Chair Department of Accounting Mitchell College of Business University of South Alabama Mobile, Alabama 36688 (251) 460-6733 FAX

More information

Forensic & Valuation Services Practice Aid Discount Rates, Risk, and Uncertainty in Economic Damages Calculations

Forensic & Valuation Services Practice Aid Discount Rates, Risk, and Uncertainty in Economic Damages Calculations Forensic & Valuation Services Practice Aid Discount Rates, Risk, and Uncertainty in Economic Damages Calculations Page 1 Copyright 2013 by American Institute of Certified Public Accountants, Inc. New York,

More information

Bank Customers (Credit) Rating System Based On Expert System and ANN

Bank Customers (Credit) Rating System Based On Expert System and ANN Bank Customers (Credit) Rating System Based On Expert System and ANN Project Review Yingzhen Li Abstract The precise rating of customers has a decisive impact on loan business. We constructed the BP network,

More information

Financial Modeling & Forecasting. Jason MacMorran www.pncpa.com

Financial Modeling & Forecasting. Jason MacMorran www.pncpa.com Financial Modeling & Forecasting Jason MacMorran www.pncpa.com Presentation Outline I. Introduction and Learning Objectives II. Definitions and Standards Overview III. Uses for Financial Models IV. Basics

More information

CHAE Review. Capital Leases & Forms of Business

CHAE Review. Capital Leases & Forms of Business CHAE Review Financial Statements, Capital Leases & Forms of Business This is a complete review of the two volume text book, Certified Hospitality Accountant Executive Study Guide, as published by The Educational

More information

Data Mining Applications in Higher Education

Data Mining Applications in Higher Education Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

CoolaData Predictive Analytics

CoolaData Predictive Analytics CoolaData Predictive Analytics 9 3 6 About CoolaData CoolaData empowers online companies to become proactive and predictive without having to develop, store, manage or monitor data themselves. It is an

More information

Data-Driven Decisions: Role of Operations Research in Business Analytics

Data-Driven Decisions: Role of Operations Research in Business Analytics Data-Driven Decisions: Role of Operations Research in Business Analytics Dr. Radhika Kulkarni Vice President, Advanced Analytics R&D SAS Institute April 11, 2011 Welcome to the World of Analytics! Lessons

More information

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Prevention and Detection in a Manufacturing Environment Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse

More information

Personal Financial Plan. John and Mary Sample

Personal Financial Plan. John and Mary Sample For January 1, 2014 Prepared by Allen Adviser 2430 NW Professional Dr. Corvallis, OR 97330 541.754.3701 Twelve lines of custom report cover text can be entered. This presentation provides a general overview

More information

Improving Decision Making and Managing Knowledge

Improving Decision Making and Managing Knowledge Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

CHAPTER 18. Revenue Recognition ASSIGNMENT CLASSIFICATION TABLE. Brief Exercises Exercises Problems Cases

CHAPTER 18. Revenue Recognition ASSIGNMENT CLASSIFICATION TABLE. Brief Exercises Exercises Problems Cases CHAPTER 18 Revenue Recognition ASSIGNMENT CLASSIFICATION TABLE Topics *1. Realization and recognition; sales transactions; high rates of return. Questions 1, 2, 3, 4, 5, 6, 22 Brief Exercises Exercises

More information

A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants

A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants Journal of Forensic & Investigative Accounting Vol. 2, Issue 2 A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants Dorothy A.

More information

NTC Project: S01-PH10 (formerly I01-P10) 1 Forecasting Women s Apparel Sales Using Mathematical Modeling

NTC Project: S01-PH10 (formerly I01-P10) 1 Forecasting Women s Apparel Sales Using Mathematical Modeling 1 Forecasting Women s Apparel Sales Using Mathematical Modeling Celia Frank* 1, Balaji Vemulapalli 1, Les M. Sztandera 2, Amar Raheja 3 1 School of Textiles and Materials Technology 2 Computer Information

More information

Potential Value of Data Mining for Customer Relationship Marketing in the Banking Industry

Potential Value of Data Mining for Customer Relationship Marketing in the Banking Industry Advances in Natural and Applied Sciences, 3(1): 73-78, 2009 ISSN 1995-0772 2009, American Eurasian Network for Scientific Information This is a refereed journal and all articles are professionally screened

More information

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/

More information

Qi Liu Rutgers Business School ISACA New York 2013

Qi Liu Rutgers Business School ISACA New York 2013 Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,

More information

How To Become A Security Professional

How To Become A Security Professional Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided

More information

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013 A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:

More information

Data Mining Techniques

Data Mining Techniques 15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses

More information

How To Understand And Understand Risk Management

How To Understand And Understand Risk Management CYBERSECURITY RISK MANAGEMENT AND INSURANCE Paul J M Klumpes Professor of Sustainable Finance and Risk Accounting by GIRO Conference September 2014 2014 R&I Conference 1 Authors Brief Paul Klumpes Professor

More information

CHAPTER 2 ACCOUNTING FOR TRANSACTIONS

CHAPTER 2 ACCOUNTING FOR TRANSACTIONS CHAPTER 2 ACCOUNTING FOR TRANSACTIONS Key Terms and Concepts to Know Double entry accounting: Debits and Credits Total debits must always equal total credits Accounting Books: Accounts General Journal

More information

CONTENTS: Introduction to Financial Accounting BAF3M

CONTENTS: Introduction to Financial Accounting BAF3M CONTENTS: Introduction to Financial Accounting BAF3M Page No. READING STRATEGIES Getting Ready to Read: Previewing a Text 2 Student Resource: Complete the Prompts for Your Accounting Text 4 WRITING STRATEGIES:

More information

NTC Project: S01-PH10 (formerly I01-P10) 1 Forecasting Women s Apparel Sales Using Mathematical Modeling

NTC Project: S01-PH10 (formerly I01-P10) 1 Forecasting Women s Apparel Sales Using Mathematical Modeling 1 Forecasting Women s Apparel Sales Using Mathematical Modeling Celia Frank* 1, Balaji Vemulapalli 1, Les M. Sztandera 2, Amar Raheja 3 1 School of Textiles and Materials Technology 2 Computer Information

More information

Solve your toughest challenges with data mining

Solve your toughest challenges with data mining IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could

More information

SURVEY REPORT DATA SCIENCE SOCIETY 2014

SURVEY REPORT DATA SCIENCE SOCIETY 2014 SURVEY REPORT DATA SCIENCE SOCIETY 2014 TABLE OF CONTENTS Contents About the Initiative 1 Report Summary 2 Participants Info 3 Participants Expertise 6 Suggested Discussion Topics 7 Selected Responses

More information

Forecasting Stock Prices using a Weightless Neural Network. Nontokozo Mpofu

Forecasting Stock Prices using a Weightless Neural Network. Nontokozo Mpofu Forecasting Stock Prices using a Weightless Neural Network Nontokozo Mpofu Abstract In this research work, we propose forecasting stock prices in the stock market industry in Zimbabwe using a Weightless

More information

Knowledge Based Descriptive Neural Networks

Knowledge Based Descriptive Neural Networks Knowledge Based Descriptive Neural Networks J. T. Yao Department of Computer Science, University or Regina Regina, Saskachewan, CANADA S4S 0A2 Email: jtyao@cs.uregina.ca Abstract This paper presents a

More information

Investments 2: Creating a Personal Investment Plan. Assignments

Investments 2: Creating a Personal Investment Plan. Assignments Financial Plan Assignments Assignments Open your copy of Learning Tool 5A: Investment Plan Example. Make sure you understand the terminology related to investment plans. I will discuss many aspects of

More information

Ethics, Fraud, and Internal Control

Ethics, Fraud, and Internal Control Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in

More information

To improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud.

To improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud. Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 46 Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized

More information

Audit Risk and Materiality in Conducting an Audit

Audit Risk and Materiality in Conducting an Audit Audit Risk and Materiality in Conducting an Audit 1647 AU Section 312 Audit Risk and Materiality in Conducting an Audit (Supersedes SAS No. 47.) Source: SAS No. 107. See section 9312 for interpretations

More information

Topic 4 Working Capital Management. 1. Concept of Working Capital 2. Measuring Working Capital and Net Working Capital. 4.

Topic 4 Working Capital Management. 1. Concept of Working Capital 2. Measuring Working Capital and Net Working Capital. 4. Topic 4 Working Capital Management 1. Concept of Working Capital 2. Measuring Working Capital and Net Working Capital 3. Optimization i i of Working Capital 4. Applications 80 Learning objectives This

More information

COPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments

COPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments Contents List of Figures Foreword Preface xxv xxiii xv Acknowledgments xxix Chapter 1 Fraud: Detection, Prevention, and Analytics! 1 Introduction 2 Fraud! 2 Fraud Detection and Prevention 10 Big Data for

More information

PREDICTION FINANCIAL DISTRESS BY USE OF LOGISTIC IN FIRMS ACCEPTED IN TEHRAN STOCK EXCHANGE

PREDICTION FINANCIAL DISTRESS BY USE OF LOGISTIC IN FIRMS ACCEPTED IN TEHRAN STOCK EXCHANGE PREDICTION FINANCIAL DISTRESS BY USE OF LOGISTIC IN FIRMS ACCEPTED IN TEHRAN STOCK EXCHANGE * Havva Baradaran Attar Moghadas 1 and Elham Salami 2 1 Lecture of Accounting Department of Mashad PNU University,

More information

Mc Graw Hill Education

Mc Graw Hill Education Principles of Auditing & Other Assurance Services Twentieth Edition 0. Ray Whittington CIA, CMA, CPA DePaul University Kurt Pany CFE, CPA Arizona State University Mc Graw Hill Education Contents Preface

More information

Application Kit. A Guide to the AICPA Certified Information Technology Professional Credential

Application Kit. A Guide to the AICPA Certified Information Technology Professional Credential Application Kit A Guide to the AICPA Certified Information Technology Professional Credential Table of Contents What Is the CITP Credential?................................ 2 8 Great Reasons to Obtain

More information

MBA350 INTEGRATIVE CAPSTONE COURSE

MBA350 INTEGRATIVE CAPSTONE COURSE MBA350 INTEGRATIVE CAPSTONE COURSE Individual Assignment Spring 2008 Raffaello Curtatone Team # 6 Index Introduction and general drivelines... 3 S&A Report... 4 Marketing Research... 4 Cost of Goods Sold...

More information

Business Management and Leadership (MS)

Business Management and Leadership (MS) Business Management and Leadership (MS) ACADEMIC DIRECTOR: B. Loerinc Helft CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: B. Loerinc Helft, b.loerinc.helft@cuny.edu

More information

Financial Statements for Manufacturing Businesses

Financial Statements for Manufacturing Businesses Management Accounting 31 Financial Statements for Manufacturing Businesses Importance of Financial Statements Accounting plays a critical role in decision-making. Accounting provides the financial framework

More information

FINANCIAL MANAGEMENT

FINANCIAL MANAGEMENT 100 Arbor Drive, Suite 108 Christiansburg, VA 24073 Voice: 540-381-9333 FAX: 540-381-8319 www.becpas.com Providing Professional Business Advisory & Consulting Services Douglas L. Johnston, II djohnston@becpas.com

More information

Fraud Prevention & Detection

Fraud Prevention & Detection Fraud Prevention & Detection Dave Tate, CPA, Esq. http://davidtate.us tateatty@yahoo.com This discussion primarily pertains to financial statement fraud--that is, financial statements that contain intentionally,

More information