Neural networks (NNs) are becoming more commonplace
|
|
- Lorena Copeland
- 8 years ago
- Views:
Transcription
1 Copyright 2006 ISACA. All rights reserved. Using Neural Network Software as a Forensic Accounting Tool By Michael J. Cerullo, Ph.D., CPA, CITP, CFE, and M. Virginia Cerullo, Ph.D., CPA, CIA, CFE Neural networks (NNs) are becoming more commonplace in real-world business applications and in some cases, such as fraud detection, they have already become the method of choice. 1 NNs are also being employed in risk assessment and internal controls, as well as to visualize complex databases for marketing segmentation. The boom in applications covers a wide range of business interests from finance management, to forecasting, to production. The combination of statistical, neural and fuzzy methods now enables direct quantitative studies to be carried out without the need for rocket-science expertise. However, the tremendous potential of NNs in business and accounting has yet to be realized. 2 Neural networks are becoming increasingly adaptable; thus, their use is expected to become more common and widespread in time. This article illustrates how NN software packages can be utilized by firms to predict the occurrence of financial statement fraud. Specifically, the following topics will be examined: The nature of NNs Reasons to use NNs The structure of a neural network Detecting financial reporting fraud with an NN NN technology equips auditors with expertise that previously could only have been attained with years of training and experience. 3 Auditors often find that financial statement fraud is very difficult to detect because it is subject to concealment or falsification of accounting records and supporting documents. Thus, a possible strategy for auditors is to proactively assess the likelihood of such fraud. This ability to accurately assess the risk of fraud is critical to the initial assessment of risk of material misstatement during the initial planning phase of the audit. The risk assessment will affect the design of subsequent audit testing techniques. 4 The Nature of Neural Networks As has been mentioned numerous times in the periodic literature, an artificial NN processes data similarly to a human brain. Specifically, an NN is a type of nonlinear statistical analysis program that utilizes a learning process (trial and error) to repeatedly analyze a collection of historical data sets to recognize patterns in that data and to automatically produce a model for that data. It processes data the way the brain processes data in a multiple parallel processing mode. This multiple processing capability enables NNs to execute operations much faster than traditional methods, which process data serially, one operation at a time. NNs solve problems by recognizing patterns in data that may be too subtle or complex for humans or other types of computer methods to discern. Basically, an NN creates a mathematical model from a historical database of examples of input and output values. After learning the relationship between the variables, the network has been trained, and a mathematical model is constructed that recognizes patterns in the sample data, such as correlations between seemingly unrelated data. The resulting model, when used with new input data, provides projections of future outputs. For example, by collecting historical data of commercial loans made to organizations, a bank can determine which organizations have defaulted on repaying the loans. A model can be built that contains the relationship, if any, between a firm s selected financial ratios and the outcome of the loan. After the model is synthesized, it can be used to predict if a new commercial loan applicant is likely to default on repayment. Reasons to Use Neural Networks As indicated by figure 1, an NN is suited for simple to complex, and structured to unstructured, problems. Thus, an NN can solve a much broader range of problems than, for example, an expert system, including problems that are almost completely random in nature. Specific fraud applications suitable for development by using NNs can be categorized into prediction, classification and pattern recognition problems. In recent years, NN technology has been used in a few firms to develop models for various forms of fraud detection. A recent study provides confirmation that NN techniques are an effective method for developing a fraud classification model to assess the risk of errors and irregularities in financial statements. 5 The variables used in developing a particular fraud detection model may differ from one company/industry to another or according to the targeted type of fraud. NNs, with their remarkable ability to derive meaning from imprecise data, can be used to detect trends that are too complex to be noticed by humans or other computer programs, including those depicted in figure 1. A trained NN can be thought of as an expert in the category of information it has been given to analyze. This expert can then be used to provide projections given new situations of interest and answer what if questions. Other advantages include: 6 Adaptive learning An NN can learn how to do tasks based on the data given for training or initial experience. Self-organization An NN can create its own representation of the data set it receives during training time. Real-time operation An NN can rapidly go through millions or billions of simulations to train the data set in parallel. Fault tolerance via redundant information coding A partial destruction of a network leads to the corresponding degradation of performance. However, some network capabilities may be retained even with major network damage. Developing and implementing an NN application is often much easier and faster than developing an accounting expert system application since most commercially available NN software packages automatically select the network structure. 1
2 Figure 1 Practicality of Applying an NN to Solve a Large Class of Problems Figure 2 Schematic of a Simple Neural Network Structure Complex Problem Complexity Expert Systems Neural Networks Input 1 i W h Z O Output Simple Input 2 Conventional Software Certain Statistics Moderately Uncertain Very Uncertain Level of Uncertainty Completely Random Normally, the entire developmental process from start to implementation can be completed in a few weeks. Neural Network Structure Figure 2 presents a simple NN structure, which is comprised of multiple inputs and a single output. The basic building block in an NN is the neuron, depicted by the circles (also called nodes). As illustrated, every NN has an input layer (i), a hidden layer (h) and an output layer (o). Each artificial neuron in a layer receives its input from the output of the previous layer nodes or from the network inputs. The connections between nodes are associated to adjustable weights (W, Z) that are adjusted as the network is trained. Each neuron in the network processes the input data, with the resulting values steadily seeping through the network layer by layer, until a result is generated in the output layer. Using Neural Networks to Detect Financial Statement Fraud: A Case Study The stages to develop an NN to predict fraud (see figure 3) are: Formulate the problem. As shown in figure 3, the first step is to select a problem that is suitable for an artificial NN. As mentioned, suitable business applications fall into three categories: 1. Classification problems Fraud detection, loan approval, loan default and credit card applications fall into this category. 2. Time series applications Financial forecasting, stock market prediction, bankruptcy prediction, bad debts estimation, sales and expense forecasting are examples of business applications in this category. 3. Data mining applications Many marketing applications fall into this category, such as looking for patterns in customer databases, targeting customers, estimating responses and analyzing demographics. This article will provide a case study of using an NN for the classification category involving fraud committed by an organization s top management. Such frauds are more commonly called cooking the books or financial statement fraud. This type of fraud is commonly committed by overstating revenues and understating liabilities or expenses. According to the Association of Certified Fraud Input 3 Examiners (ACFE s) 2004 Report to the Nation on Occupational Fraud and Abuse, the average financial statement fraud reported by survey respondents is over US $1 million. Financial statement frauds, such as the WorldCom and Enron frauds, can overstate income by billions of US dollars. A variety of data analysis techniques can be employed to detect financial statement fraud, including Benford s law, horizontal and vertical analyses, ratio and trend analyses, and NN software. NN software is an often overlooked but very powerful and easy-to-use tool in detecting management fraud. Figure 3 Detecting Fraud With a Neural Network Formulate problem. Create database of examples. Construct model by training database. Evaluate model s performance. Implement model, if valid. 2
3 Assume that Dale Rogers, CPA, CFE, partner in a regional Denver, Colorado, USA, CPA financial services firm is using the ModelQuest TM Enterprise NN package (hereafter referred to as ModelQuest) to automatically create a financial statement fraud prediction model for clients. 7 Other NN packages include Brainmaker (from California Scientific Software) and NeuroSolutions (from Neuro Dimension Inc.). Assume that Rogers has acquired a good working knowledge of the package and plans to use it in her audit engagements. She plans to use the NN model during initial audit planning and the preliminary assessment/ analytical review phase to aid in predicting if financial reporting fraud has been perpetrated in client companies. Create the database. Now that the problem is defined, her next step is to create a database of historical numerical examples input into the NN software to generate a fraud prediction model. The database must contain independent input variables and corresponding dependent output variables. Creating the database is the most important step in the NN developmental process. Unrepresentative sample data or too few data observations will result in a model that poorly estimates or predicts future values. Assume Rogers next goes to the US Securities and Exchange Commission s (SEC s) web site to conduct an online search of potential financial ratios indicating financial reporting fraud. Based on her readings of several research studies on the usefulness of financial ratios to predict fraud, she selects 26 ratios (i.e., the independent variables, X) that have been employed by companies to predict possible fraudulent financial reporting (i.e., the dependent variable, Y). The ratios selected are given in figure 4. Based on discussions with expert auditors in her firm, Rogers selects the nine ratios (in bold letters in figure 4) to use in her fraud prediction model. Next, Rogers does an Internet search of national newspapers, ACFE, the American Institute of Certified Public Accountants (AICPA), the US Department of Justice and the Stanford Research Institute, and finds 15 firms that have reported financial reporting fraud and an additional 15 companies that have not reported such fraud. Her next step is to conduct an online search of the SEC s EDGAR database. From these data, she creates a database of the previously mentioned nine ratios for the 30 firms for the year before any of the frauds were reported. The database of financial ratios is presented in figure 5. The nine ratios are known as the X, or independent, variables, and the default is the Y, or dependent, variable. Since symbolic values cannot be processed by NN software, they are converted to the numerical values 0 or 1. To illustrate the concept, firm A shows a 1 for the default (dependent) variable. This means that financial statement fraud was uncovered at that firm; likewise, a value of 0 for firm B means that, as of the reporting date, no financial statement fraud was reported at that firm. Construct model. Next, the table of input and output values is keyed into the ModelQuest NN package to construct a network depicting the relationships of the inputs to the output. Rogers will have the software automatically split the table into a training subset of 22 observations and a test subset of eight observations. The NN software will use the training file to train the network into a mathematical model Figure 4 Potential Ratios Used to Predict Financial Statement Fraud Earnings/assets Equity/debt Current ratio...current assets/current liabilities Acld-test ratio...quick assets/current liabilities Receivables turnover...net sales on account/average receivables Number of day s sales in...receivables end of receivables year/average daily sales Inventory turnover...cost goods sold/average inventory Number of days sales in...inventory end of year/average inventory daily CGS Net fixed assets/long term liabilities Debt to equity...total debt/stockholders equity Net sales/average total assets Rate earned on total assets...income + interest expense/average total assets Rate earned on stockholders...income/total stockholders equity equity Cash flow/total debt Cash flow/long-term debt After-tax profit/total assets Total liabilities/total assets Net working capital/total assets Net working capital/sales revenue Return on assets...income/average total assets Credit rating...provided by a credit rating agency Bond rating...1 = low, 10 = high Sales ratio...sales/assets Earnings before interest and taxes (EBIT)/assets Profit margin or efficiency ratio Income/sales Equity/assets that recognizes patterns between the independent variables (inputs) and the dependent variable (i.e., fraud or no fraud). The test data determine how well the synthesized network model is able to generalize on new, unseen data. Evaluate performance. The next step is to evaluate the performance of the network. Rogers evaluates the model constructed by comparing the output summary statistics for the test data subset with the training data subset. Figure 6 shows hypothetical summary output statistics for the database given in figure 5. 8 Generally speaking, the average absolute error (AAE) and maximum absolute error (MAE) are two good indicators to evaluate when determining if the model constructed is acceptable. 9 The AAE is the sum of the errors, ignoring the plus or minus signs and averaging the result. The MAE is the maximum amount of error between the predicted and actual values. In this example, the AAE (.23) is low compared to the output maximum (1.0) and minimum (0.0), which indicates that, at first glance, the model appears to be acceptable. The MAE indicates the worst the model did on the subset of testing or evaluation data. In this illustration, sometimes the model will generate completely erroneous results. 3
4 Figure 5 Hypothetical Database Used to Predict the Presence or Absence of Financial Statement Fraud Name of Firm EquityAsset EarnAsset EquDebt CurrRat QuickRat BondRat ROA EBITAsset ARTurn Default A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C D It is important to also compare the output minimum, maximum, mean and standard deviation. If these numbers are close to one another between the testing and training data sets, the synthesized model is usually acceptable. On the other hand, if these values are quite different, the number of observations should be increased and a new model should be trained. Also, the predicted squared error (PSE) should be compared to the average squared error (ASE). 10 The two values should be relatively close to one another. In this case, the PSE is 0.10 and the ASE is Finally, training results were evaluated by computing the R 2 value, the coefficient of determination. An R 2 approaching 1 indicates a good model fit and an R 2 near 0 indicates a poor fit. Predicted output in the testing data set formulated by the NN matched the training output with a correlation of Figure 6 shows that if the evaluation of the output summary statistics indicates that an unacceptable model was developed, Rogers must try new variables, increase the sample size, retrain a new model and evaluate the output statistics. If the results still appear to be unacceptable, an NN probably cannot be constructed for this problem situation. Implement model. Assume that Rogers gets acceptable results and that all nine input values are significant. The model can now be implemented for its intended purpose of predicting fraudulent financial reporting. On an audit engagement, during the initial audit planning and preliminary assessment/analytical review phase, Rogers would compute the nine financial ratios for the previous year and input the nine values into ModelQuest using the package s query function. Assume that the model immediately computes a 1 output value from the inputs, which indicates that the firm Figure 6 Hypothetical Output Summary Statistics for the Fraud Prediction Model RESULTS TEST DATA TRAINING DATA Number of observations 8 22 Minimum 0 0 Maximum Output mean Output standard deviation.5.45 Maximum absolute error Average absolute error Predicted squared error -.10 Average squared error R has possibly engaged in fraudulent financial reporting and this potential red flag must be further investigated. Summary and Conclusions NNs are frequently ignored by internal and external auditors as a major data analysis tool that can be effectively employed to predict the occurrence of fraudulent financial reporting. This article presented a case study of how a hypothetical regional public accounting firm employed an NN software package in client engagements to aid in predicting if financial statement reporting fraud is likely occurring. NNs process large amounts of data to solve problems by recognizing patterns, trends and relationships that may be too subtle or complex for humans or other types of computer methods, such as statistical models, to discern. 4
5 Basically, an NN computer software model is constructed and trained from a database of historical examples of input and output variables. During model training, an NN learns the patterns and correlations from a sample of input and output data representing actual fraud occurrences and nonfraud occurrences, respectively. The creation of the database is the most important step in the NN developmental process. The input and output values are keyed into the NN package to construct a network that can then be used by an accountant to make a decision about the possible occurrence of fraud. The ModelQuest NN package was used to construct the mathematical model for the case study discussed because the package can be mastered in a few hours and requires only a rudimentary understanding of statistical concepts. Other NN packages are similar to ModelQuest. The model developed by the ModelQuest software can be used in future engagements to predict whether financial reporting fraud, the dependent variable, has been perpetrated in client companies. The key to managing this type of fraud and reducing its large potential losses is to employ the most effective tools available to fight it. Many firms are utilizing new information technologies to address old problems, such as fraud. Auditors have a tremendous opportunity to learn about and employ NNs to ensure that their firms or clients remain competitive. Endnotes In the authors experience, of all the data analysis methods used to predict or detect fraud, including general audit software, statistical software, ratio analysis, spreadsheets, relational database packages, financial statement analysis software and Benford s law, NN software is the method least often employed. For example, in a study by the authors, about 7 percent of internal auditors responding to a survey used NNs vs. more than 45 percent who used general audit software. (See Cerullo, Michael J.; M. Virginia Cerullo; Tracy Hardin, Computer Techniques Used to Audit the Purchasing Function, Internal Auditing, March/April 1999, p. 24.) Also, even more shocking, a recent article revealed that, of 400 auditors responding to the 10 th IIA annual software survey, none used NN software. (See Jackson, Russell A.; Get the Most Out of Software Tools, Internal Auditor, August 2004, p , 44 and 47.) Finally, a 2004 study of auditors use of technology published on the IIA web site ( revealed that, of 14 technologies surveyed, NNs ranked dead last. 3 One of the authors has successfully used an NN package for the past 12 years in a graduate IS auditing course. Most students learn how to physically utilize the software within a few hours; in about another two hours, they acquire a good working knowledge of the statistics employed to evaluate models. They then complete a case study on the likelihood that commercial loan applicants will default on their loans. 4 Lin, Jerry W.; Mark I. Hwang; Jack D. Becker; A Fuzzy Neural Network for Assessing the Risk of Fraudulent Financial Reporting, Managerial Auditing Journal, August 2003, p Green, Brian Patrick; Jae Hwa Choi; Assessing the Risk of Management Fraud Through Neural Network Technology, Auditing, Spring 1997, p Adapted from journal/vol1/cs11/article1.html 7 This package is available from AbTech Corporation, 1575 State Farm Blvd., Suites 1&2, Charlottesville, VA 22911, Basically, all NN software packages provide similar statistics. Most of the statistics concern evaluating various measures related to the errors or residuals. Errors or residuals are the difference between the actual output values and the predicted output values. Ideally, the closer that the sum of the errors is to 0, the better the model. 9 Adapted from ModelQuest Expert: User s Manual, Charlottesville, VA, Abtech Corporation, 1997, p. 8-2 and These individual differences are squared, summed and averaged. The result is the ASE. 11 The PSE is computed from the training data subset and is an approximation of the expected network squared error (ASE) for data not in the training subset. That is, the model predicted that the ASE on new data should be.10; in fact, the ASE on the test data (i.e., new data) was When training results do not indicate a high correlation, one option is to try other network architectures available with the ModelQuest software. Michael J. Cerullo, Ph.D., CPA, CITP, CFE is a professor of accounting at Southwest Missouri State University, Springfield, Missouri, USA. He specializes in accounting information systems, information systems auditing and fraud examination. He has published approximately 150 articles in professional and academic journals. He received his doctorate from Louisiana State University. M. Virginia Cerullo, Ph.D., CPA, CIA, CFE is a professor of accounting at Southwest Missouri State University, Springfield, Missouri, USA. She specializes in internal auditing and is the coordinator of the Institute of Internal Auditor s Endorsed Internal Audit Program at SMSU. She received her doctorate from Louisiana State University and has published numerous articles in professional and academic journals. Information Systems Control Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription to the Information Systems Control Journal. Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute and their committees, and from opinions endorsed by authors employers, or the editors of this Journal. Information Systems Control Journal does not attest to the originality of authors' content. Copyright 2006 by ISACA. All rights reserved. Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass , to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25 per page. Send payment to the CCC stating the ISSN ( ), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited. 5
In recent years, information technology (IT) used by firms,
Copyright 2003 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. Impact of SAS No. 94 on Computer Audit Techniques By M. Virginia Cerullo, CPA, CIA, CFE, and Michael
More informationDetection of Financial Statement Fraud using Data Mining Technique and Performance Analysis
ISSN (Online) 2278-121 ISSN (Print) 2319 59 Vol. 4, Issue 7, July 215 Detection of Financial Statement Fraud using Data Mining Technique and Performance Analysis KK Tangod 1, GH Kulkarni 2 Assistant Professor,
More informationWhile Microsoft Access database is not an enterprise
Copyright 2006 ISACA. All rights reserved. www.isaca.org. Important, But Often Dismissed: Internal Control in a Microsoft Access Database By John H. White, Ph.D., CISA, CPA While Microsoft Access database
More informationIT Governance and Outsourcing
Copyright 2004 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. IT Governance and Outsourcing By Hugh Parkes, CISA, FCA is a subset of corporate governance. It refers
More informationInformation security governance has become an essential
Copyright 2007 ISACA. All rights reserved. www.isaca.org. Developing for Effective John P. Pironti, CISA, CISM, CISSP, ISSAP, ISSMP Information security governance has become an essential element of overall
More informationJournal Online. Impact of Security Awareness Training Components on Perceived Security Effectiveness. Do you have something to say about this article?
Journal Online Impact of Security Awareness Training Components on Perceived Security Effectiveness Karen Quagliata, Ph.D., PMP, has worked in the IT field for more than 10 years in diverse capacities.
More informationReading Between the Bottom Lines
#1 F I N A N C I A L S T A T E M E N T A N A L Y S I S Reading Between the Bottom Lines CPA... Imagine the possibilities! Intro Learning Activity Learning Objectives 1. Obtain a working knowledge of financial
More informationFeature. Log Management: A Pragmatic Approach to PCI DSS
Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who
More information716 West Ave Austin, TX 78701-2727 USA
How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement
More informationBusiness Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
More informationHOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)
HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement
More informationNine Common Types of Data Mining Techniques Used in Predictive Analytics
1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better
More informationOutdoor Retailer Conference Financial Statement Fraud. August 2, 2010 Derk G. Rasmussen. www.sagefa.com
Outdoor Retailer Conference Financial Statement Fraud August 2, 2010 Derk G. Rasmussen www.sagefa.com About Sage Forensic Accounting Sage Forensic Accounting quantifies damage claims in litigation, determines
More informationFraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
More informationPersonal Financial Plan. John & Mary Sample
For Prepared by Donald F. Dempsey Jr. PO Box 1591 Williston, VT 05495 802-764-5815 This presentation provides a general overview of some aspects of your personal financial position. It is designed to provide
More informationComprehensive Business Budgeting
Management Accounting 137 Comprehensive Business Budgeting Goals and Objectives Profit planning, commonly called master budgeting or comprehensive business budgeting, is one of the more important techniques
More informationWith the dawn of the 21st century, a new era of
Copyright 2007 ISACA. All rights reserved. www.isaca.org. Auditing CMMI Maturity and Sarbanes-Oxley Compliance By Laurent Janssens, CISA, and Peter Leeson With the dawn of the 21st century, a new era of
More informationData quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
More informationData Mining mit der JMSL Numerical Library for Java Applications
Data Mining mit der JMSL Numerical Library for Java Applications Stefan Sineux 8. Java Forum Stuttgart 07.07.2005 Agenda Visual Numerics JMSL TM Numerical Library Neuronale Netze (Hintergrund) Demos Neuronale
More informationExam 1 chapters 1-4 Needles 10ed
Exam 1 chapters 1-4 Needles 10ed Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Which of the following is the most appropriate definition of accounting?
More informationSIX RED FLAG MODELS 1. Fraud Z-Score Model SGI Sales Growth Index x 0.892 GMI Gross Margin Index x 0.528 AQI Asset Quality Index x 0.
SIX RED FLAG MODELS Six different FFR detection models and ratios were used to develop a more comprehensive red flag approach in screening for and identifying financial reporting problems in publicly held
More informationAPPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.2 APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT Algirdas Noreika Department of Practical
More informationMAN 4720 STRATEGIC MANAGEMENT AND POLICY FORMULATION FINANCIAL ANALYSIS GUIDE
MAN 4720 STRATEGIC MANAGEMENT AND POLICY FORMULATION FINANCIAL ANALYSIS GUIDE Revised -December 13, 2011 1 FINANCIAL ANALYSIS USING STRATEGIC PROFIT MODEL RATIOS Introduction Your policy course integrates
More informationLina Warrad. Applied Science University, Amman, Jordan
Journal of Modern Accounting and Auditing, March 2015, Vol. 11, No. 3, 168-174 doi: 10.17265/1548-6583/2015.03.006 D DAVID PUBLISHING The Effect of Net Working Capital on Jordanian Industrial and Energy
More informationHow To Understand The Financial Philosophy Of A Firm
1. is concerned with the acquisition, financing, and management of assets with some overall goal in mind. A. Financial management B. Profit maximization C. Agency theory D. Social responsibility 2. Jensen
More informationRobert and Mary Sample
Comprehensive Financial Plan Sample Plan Robert and Mary Sample Prepared by : John Poels, ChFC, AAMS Senior Financial Advisor February 11, 2009 Table Of Contents IMPORTANT DISCLOSURE INFORMATION 1-7 Presentation
More informationhttp://www.bls.gov/oco/ocos001.htm Accountants and Auditors
http://www.bls.gov/oco/ocos001.htm Accountants and Auditors * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections Data * Earnings * OES Data *
More informationStrong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
More informationFair Value Accounting Fraud
Fair Value Accounting Fraud New Global Risks and Detection Techniques GERARD M. ZACK, CFE, CPA John Wiley & Sons, Inc. Preface Acknowledgments xvu xxi PARTI CHAPTER 1 INTRODUCTION TO FAIR VALUE ACCOUNTING
More informationWorking Paper No. 51/00 Current Materiality Guidance for Auditors. Thomas E. McKee. Aasmund Eilifsen
Working Paper No. 51/00 Current Materiality Guidance for Auditors By Thomas E. McKee Aasmund Eilifsen SNF-project No. 7844: «Finansregnskap, konkurs og revisjon The project is financed by the Norwegian
More informationPractical Business Application of Break Even Analysis in Graduate Construction Education
Journal of Construction Education Spring 1999, Vol. 4, No. 1, pp. 26-37 Copyright 1999 by the Associated Schools of Construction 1522-8150/99/$3.00/Educational Practice Manuscript Practical Business Application
More informationIntroduction. 15.511 Corporate Accounting Summer 2004. Professor SP Kothari Sloan School of Management Massachusetts Institute of Technology
Introduction 15.511 Corporate Accounting Summer 2004 Professor SP Kothari Sloan School of Management Massachusetts Institute of Technology June 7, 2004 1 Session 1: Agenda Administrative matters Discussion
More informationMeasuring Financial Performance: A Critical Key to Managing Risk
Measuring Financial Performance: A Critical Key to Managing Risk Dr. Laurence M. Crane Director of Education and Training National Crop Insurance Services, Inc. The essence of managing risk is making good
More informationConditional probability of actually detecting a financial fraud a neutrosophic extension to Benford s law
Conditional probability of actually detecting a financial fraud a neutrosophic extension to Benford s law Sukanto Bhattacharya Alaska Pacific University, USA Kuldeep Kumar Bond University, Australia Florentin
More informationStages of the Audit Process
Chapter 5 Stages of the Audit Process Learning Objectives Upon completion of this chapter you should be able to explain: LO 1 Explain the audit process. LO 2 Accept a new client or confirming the continuance
More informationReview on Financial Forecasting using Neural Network and Data Mining Technique
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationSimulation and Risk Analysis
Simulation and Risk Analysis Using Analytic Solver Platform REVIEW BASED ON MANAGEMENT SCIENCE What We ll Cover Today Introduction Frontline Systems Session Ι Beta Training Program Goals Overview of Analytic
More informationFeature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
More informationBenford s Law and Digital Frequency Analysis
Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners
More information2015 Workshops for Professors
SAS Education Grow with us Offered by the SAS Global Academic Program Supporting teaching, learning and research in higher education 2015 Workshops for Professors 1 Workshops for Professors As the market
More informationChapter 14. Web Extension: Financing Feedbacks and Alternative Forecasting Techniques
Chapter 14 Web Extension: Financing Feedbacks and Alternative Forecasting Techniques I n Chapter 14 we forecasted financial statements under the assumption that the firm s interest expense can be estimated
More informationFinancial Accounting by Michael P. Licata, Ph.D. Course Syllabus and Learning Objectives by Chapter
Financial Accounting by Michael P. Licata, Ph.D. Course Syllabus and Learning Objectives by Chapter Basic Course Description Financial Accounting by Michael P. Licata, Ph.D. is a first accounting course
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Accounting Concepts 2013 Association of Certified Fraud Examiners, Inc. Accounting Basics Assets = Liabilities + Owners Equity Accounting Basics By definition,
More informationComponents of a Business Model Core Strategy 1-5 Strategic 1-5 Partnership 1-5 Customer 1-5 Resources Network Interface
ENGI 8607: Business Planning and Strategy in an Entrepreneurial Environment ZipCar Dr. Amy Hsiao Lecture 5 Memorial University of Newfoundland ZipCar Components of a Business Model How It Works http://www.zipcar.com/cambridge/findcars?zipfleet_id=94396
More informationCHAPTER 1 INTRODUCTION TO ACCOUNTING AND BUSINESS
INTRODUCTION TO ACCOUNTING AND BUSINESS 1. Some users of accounting information include managers, employees, investors, creditors, customers, and the government. 2. The role of accounting is to provide
More informationFinancial Planning Services Financial Goal Analysis
Financial Planning Services Financial Goal Analysis Prepared for: Tom and Christina Sample November 18, 2010 Prepared by : Erik Holton Corporate Stock Benefit Consultant The Callanan Group UBS Financial
More informationGuide to Financial Statements Study Guide
Guide to Financial Statements Study Guide Overview (Topic 1) Three major financial statements: The Income Statement The Balance Sheet The Cash Flow Statement Objectives: Explain the underlying equation
More informationHow To Calculate Financial Leverage Ratio
What Do Short-Term Liquidity Ratios Measure? What Is Working Capital? HOCK international - 2004 1 HOCK international - 2004 2 How Is the Current Ratio Calculated? How Is the Quick Ratio Calculated? HOCK
More informationSolve Your Toughest Challenges with Data Mining
IBM Software Business Analytics IBM SPSS Modeler Solve Your Toughest Challenges with Data Mining Use predictive intelligence to make good decisions faster Solve Your Toughest Challenges with Data Mining
More informationSAMPLING FOR EFFECTIVE INTERNAL AUDITING. By Mwenya P. Chitalu CIA
SAMPLING FOR EFFECTIVE INTERNAL AUDITING By Mwenya P. Chitalu CIA EXPECTED PRESENTATION OUTCOMES Why Do Auditors Sample? Sampling Policy Statistical & Non-statistical Sampling Statistical Terminologies
More informationIntroduction. 15.501/516 Accounting Spring 2004. Professor Sugata Roychowdhury Sloan School of Management Massachusetts Institute of Technology
Introduction 15.501/516 Accounting Spring 2004 Professor Sugata Roychowdhury Sloan School of Management Massachusetts Institute of Technology Feb 4, 2004 1 Session 1: Agenda Administrative matters Discussion
More informationWeb Extension: Financing Feedbacks and Alternative Forecasting Techniques
19878_09W_p001-009.qxd 3/10/06 9:56 AM Page 1 C H A P T E R 9 Web Extension: Financing Feedbacks and Alternative Forecasting Techniques IMAGE: GETTY IMAGES, INC., PHOTODISC COLLECTION In Chapter 9 we forecasted
More informationThis article describes the history of the Payment Card
Copyright 2007 ISACA. All rights reserved. www.isaca.org. Achieving Compliance With the PCI Data Security Standard By Alex Woda, CISA, QDSP, QPASP This article describes the history of the Payment Card
More informationTHE POWER OF CASH FLOW RATIOS
THE POWER OF CASH FLOW RATIOS By Frank R, Urbancic, DBA, CPA Professor and Chair Department of Accounting Mitchell College of Business University of South Alabama Mobile, Alabama 36688 (251) 460-6733 FAX
More informationForensic & Valuation Services Practice Aid Discount Rates, Risk, and Uncertainty in Economic Damages Calculations
Forensic & Valuation Services Practice Aid Discount Rates, Risk, and Uncertainty in Economic Damages Calculations Page 1 Copyright 2013 by American Institute of Certified Public Accountants, Inc. New York,
More informationBank Customers (Credit) Rating System Based On Expert System and ANN
Bank Customers (Credit) Rating System Based On Expert System and ANN Project Review Yingzhen Li Abstract The precise rating of customers has a decisive impact on loan business. We constructed the BP network,
More informationFinancial Modeling & Forecasting. Jason MacMorran www.pncpa.com
Financial Modeling & Forecasting Jason MacMorran www.pncpa.com Presentation Outline I. Introduction and Learning Objectives II. Definitions and Standards Overview III. Uses for Financial Models IV. Basics
More informationCHAE Review. Capital Leases & Forms of Business
CHAE Review Financial Statements, Capital Leases & Forms of Business This is a complete review of the two volume text book, Certified Hospitality Accountant Executive Study Guide, as published by The Educational
More informationData Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
More informationKevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
More informationCoolaData Predictive Analytics
CoolaData Predictive Analytics 9 3 6 About CoolaData CoolaData empowers online companies to become proactive and predictive without having to develop, store, manage or monitor data themselves. It is an
More informationData-Driven Decisions: Role of Operations Research in Business Analytics
Data-Driven Decisions: Role of Operations Research in Business Analytics Dr. Radhika Kulkarni Vice President, Advanced Analytics R&D SAS Institute April 11, 2011 Welcome to the World of Analytics! Lessons
More informationFraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
More informationPersonal Financial Plan. John and Mary Sample
For January 1, 2014 Prepared by Allen Adviser 2430 NW Professional Dr. Corvallis, OR 97330 541.754.3701 Twelve lines of custom report cover text can be entered. This presentation provides a general overview
More informationImproving Decision Making and Managing Knowledge
Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,
More informationMaking critical connections: predictive analytics in government
Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse
More informationCHAPTER 18. Revenue Recognition ASSIGNMENT CLASSIFICATION TABLE. Brief Exercises Exercises Problems Cases
CHAPTER 18 Revenue Recognition ASSIGNMENT CLASSIFICATION TABLE Topics *1. Realization and recognition; sales transactions; high rates of return. Questions 1, 2, 3, 4, 5, 6, 22 Brief Exercises Exercises
More informationA Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants
Journal of Forensic & Investigative Accounting Vol. 2, Issue 2 A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants Dorothy A.
More informationNTC Project: S01-PH10 (formerly I01-P10) 1 Forecasting Women s Apparel Sales Using Mathematical Modeling
1 Forecasting Women s Apparel Sales Using Mathematical Modeling Celia Frank* 1, Balaji Vemulapalli 1, Les M. Sztandera 2, Amar Raheja 3 1 School of Textiles and Materials Technology 2 Computer Information
More informationPotential Value of Data Mining for Customer Relationship Marketing in the Banking Industry
Advances in Natural and Applied Sciences, 3(1): 73-78, 2009 ISSN 1995-0772 2009, American Eurasian Network for Scientific Information This is a refereed journal and all articles are professionally screened
More informationBusiness Process Mining for Internal Fraud Risk Reduction: Results of a Case Study
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/
More informationQi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
More informationHow To Become A Security Professional
Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided
More informationInternational Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013
A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:
More informationData Mining Techniques
15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses
More informationHow To Understand And Understand Risk Management
CYBERSECURITY RISK MANAGEMENT AND INSURANCE Paul J M Klumpes Professor of Sustainable Finance and Risk Accounting by GIRO Conference September 2014 2014 R&I Conference 1 Authors Brief Paul Klumpes Professor
More informationCHAPTER 2 ACCOUNTING FOR TRANSACTIONS
CHAPTER 2 ACCOUNTING FOR TRANSACTIONS Key Terms and Concepts to Know Double entry accounting: Debits and Credits Total debits must always equal total credits Accounting Books: Accounts General Journal
More informationCONTENTS: Introduction to Financial Accounting BAF3M
CONTENTS: Introduction to Financial Accounting BAF3M Page No. READING STRATEGIES Getting Ready to Read: Previewing a Text 2 Student Resource: Complete the Prompts for Your Accounting Text 4 WRITING STRATEGIES:
More informationNTC Project: S01-PH10 (formerly I01-P10) 1 Forecasting Women s Apparel Sales Using Mathematical Modeling
1 Forecasting Women s Apparel Sales Using Mathematical Modeling Celia Frank* 1, Balaji Vemulapalli 1, Les M. Sztandera 2, Amar Raheja 3 1 School of Textiles and Materials Technology 2 Computer Information
More informationSolve your toughest challenges with data mining
IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could
More informationSURVEY REPORT DATA SCIENCE SOCIETY 2014
SURVEY REPORT DATA SCIENCE SOCIETY 2014 TABLE OF CONTENTS Contents About the Initiative 1 Report Summary 2 Participants Info 3 Participants Expertise 6 Suggested Discussion Topics 7 Selected Responses
More informationForecasting Stock Prices using a Weightless Neural Network. Nontokozo Mpofu
Forecasting Stock Prices using a Weightless Neural Network Nontokozo Mpofu Abstract In this research work, we propose forecasting stock prices in the stock market industry in Zimbabwe using a Weightless
More informationKnowledge Based Descriptive Neural Networks
Knowledge Based Descriptive Neural Networks J. T. Yao Department of Computer Science, University or Regina Regina, Saskachewan, CANADA S4S 0A2 Email: jtyao@cs.uregina.ca Abstract This paper presents a
More informationInvestments 2: Creating a Personal Investment Plan. Assignments
Financial Plan Assignments Assignments Open your copy of Learning Tool 5A: Investment Plan Example. Make sure you understand the terminology related to investment plans. I will discuss many aspects of
More informationEthics, Fraud, and Internal Control
Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in
More informationTo improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud.
Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 46 Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized
More informationAudit Risk and Materiality in Conducting an Audit
Audit Risk and Materiality in Conducting an Audit 1647 AU Section 312 Audit Risk and Materiality in Conducting an Audit (Supersedes SAS No. 47.) Source: SAS No. 107. See section 9312 for interpretations
More informationTopic 4 Working Capital Management. 1. Concept of Working Capital 2. Measuring Working Capital and Net Working Capital. 4.
Topic 4 Working Capital Management 1. Concept of Working Capital 2. Measuring Working Capital and Net Working Capital 3. Optimization i i of Working Capital 4. Applications 80 Learning objectives This
More informationCOPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments
Contents List of Figures Foreword Preface xxv xxiii xv Acknowledgments xxix Chapter 1 Fraud: Detection, Prevention, and Analytics! 1 Introduction 2 Fraud! 2 Fraud Detection and Prevention 10 Big Data for
More informationPREDICTION FINANCIAL DISTRESS BY USE OF LOGISTIC IN FIRMS ACCEPTED IN TEHRAN STOCK EXCHANGE
PREDICTION FINANCIAL DISTRESS BY USE OF LOGISTIC IN FIRMS ACCEPTED IN TEHRAN STOCK EXCHANGE * Havva Baradaran Attar Moghadas 1 and Elham Salami 2 1 Lecture of Accounting Department of Mashad PNU University,
More informationMc Graw Hill Education
Principles of Auditing & Other Assurance Services Twentieth Edition 0. Ray Whittington CIA, CMA, CPA DePaul University Kurt Pany CFE, CPA Arizona State University Mc Graw Hill Education Contents Preface
More informationApplication Kit. A Guide to the AICPA Certified Information Technology Professional Credential
Application Kit A Guide to the AICPA Certified Information Technology Professional Credential Table of Contents What Is the CITP Credential?................................ 2 8 Great Reasons to Obtain
More informationMBA350 INTEGRATIVE CAPSTONE COURSE
MBA350 INTEGRATIVE CAPSTONE COURSE Individual Assignment Spring 2008 Raffaello Curtatone Team # 6 Index Introduction and general drivelines... 3 S&A Report... 4 Marketing Research... 4 Cost of Goods Sold...
More informationBusiness Management and Leadership (MS)
Business Management and Leadership (MS) ACADEMIC DIRECTOR: B. Loerinc Helft CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: B. Loerinc Helft, b.loerinc.helft@cuny.edu
More informationFinancial Statements for Manufacturing Businesses
Management Accounting 31 Financial Statements for Manufacturing Businesses Importance of Financial Statements Accounting plays a critical role in decision-making. Accounting provides the financial framework
More informationFINANCIAL MANAGEMENT
100 Arbor Drive, Suite 108 Christiansburg, VA 24073 Voice: 540-381-9333 FAX: 540-381-8319 www.becpas.com Providing Professional Business Advisory & Consulting Services Douglas L. Johnston, II djohnston@becpas.com
More informationFraud Prevention & Detection
Fraud Prevention & Detection Dave Tate, CPA, Esq. http://davidtate.us tateatty@yahoo.com This discussion primarily pertains to financial statement fraud--that is, financial statements that contain intentionally,
More information