Fighting Fraud with Data Mining & Analysis

Size: px
Start display at page:

Download "Fighting Fraud with Data Mining & Analysis"

Transcription

1 Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: Copyright 2008 Leonard Vona and Fraud Auditing, Inc. All Rights Reserved

2 Finding Fraud with Data Mining & Analysis Throughout our lives, we search for things. As children, games such as hide and seek or Where s Waldo? taught us search-and-find skills that we now use to strategically find our reading glasses or car keys. Those of us who do need reading glasses might also remember looking for the hidden pictures in Highlights magazine, by scanning the pictures back and forth, or in a haphazard way. As auditors searching for fraud in today s sophisticated business systems, we must take those search-and-find skills to the next level. Fraud auditing is a proactive approach to detecting fraud. There are two key components to fraud auditing: 1.) using a fraud data mining plan, 2.) using fraud audit procedures. Both work closely together in that if the sample does not include a fraudulent transaction, the audit procedure cannot reveal the fraudulent transaction. While there are a few individuals in the history of auditing that possessed the unique ability to detect fraud, often referred to as fraud hound dogs, the rest of us need a step-by-step methodology to build a fraud data mining plan. The key to fraud detection is to look where the fraud occurs. Sounds simple, but a properly designed fraud data mining plan begins with simply looking for instances where a fraud scenario is most likely to occur, much like a search-and-find game. Effective fraud data mining also requires awareness, or the ability to interpret the data for the indicators, of the fraud scenario. While the simple fraud scenarios can be detected via a properly designed fraud data procedure, a fraud scenario with a sophisticated concealment strategy requires the ability to see through the concealment strategy. To illustrate this concept, consider the following scenario: When a perpetrator sets up a false vendor and uses their home address, this can be detected with a simple matching routine. The data mining plan would match vendor address to an employee s address. When a perpetrator uses a PO Box in an out-of-state city, using a mail forward technique, the matching routine would not detect the scheme. The data mining plan would be required to interpret the vendor database on the frequency and pattern of vendor invoice numbers, dates, and amounts. The routine would search for a sequential pattern of vendor invoice numbers or identify a range of vendor invoice numbers that is illogical based on 2

3 the total dollars or the nature, type or perceived size of the vendor. The routine would correlate the pattern and frequency to a manager or a cost center. The concept of fraud auditing, or responding to the risk of fraud, is a relatively new concept for auditors. In reviewing the professional literature and audit standards, authors are using words interchangeably to define the same concept. For example, what is the difference between an identified fraud risk, a fraud scheme or a fraud scenario? This article helps define some of these terms and concepts. What is fraud audit? Fraud audit is the application of audit procedures to a population of business transactions in a manner to increase the propensity of identifying fraud. The first step in a fraud audit is to identify fraud scenarios within the audit scope. By analyzing the likelihood and significant factors linked to a fraud scenario, the auditor then decides which fraud scenarios require an audit response. At this time, the auditor should start developing a fraud data analysis to interrogate the database for transaction, which is consistent with the data profile of the fraud scenario. This is an important point. Too many auditors are trying to perform fraud data mining routines without truly understanding what exactly the routine is intended to search and find. More importantly, what variation of the fraud scenario of the data mining routine is missing? What is fraud data analysis? Fraud data analysis is the process of extracting and interpreting information to identify transactions that are consistent with a fraud data profile that links to an identified fraud scenario. The goal of the analysis is to identify a discreet number of transactions that can be examined using fraud audit procedures. In essence, the sampling approach is a focused bias sampling approach designed to identify a specific fraud scenario. It s also referred to as a form of discovery sampling. To illustrate the concept, the auditor starts with a million transactions in the population. Through data mining, we filter the population through a funnel and identify the 100 transactions that are consistent with our fraud theory. Then, through fraud audit procedures, we identify the fraudulent vendor. The analysis requires both a methodology and data interpretation skills. The first step is to create the data mining report, and the second step is visually to review the report for the red flags of your fraud theory. 3

4 What is a fraud data profile? Developing a fraud data profile is the process of drawing a picture of a fraud scenario with data. The clarity of the picture will depend on the availability and integrity of the information in the database. The fraud data profile will focus on the master file description, the transaction, or both master file and the transaction. What is a fraud scenario? The fraud scenario starts with the inherent scheme. The fraud scenario is how the inherent scheme would occur in the company s business system. The key considerations are to understand the variations of the scenario that are caused by the fraud opportunity, entity variation, transaction variation and scheme variation. For example, one variation of a false billing scheme through a false company is when the accounts payable takes over the identity of a dormant vendor on the database and charges invoices to a large cost center. A second variation is when a manager creates a front company using their authority to trigger accounts payable to process a false invoice and charge the invoice to their cost center. Good data mining develops a specific plan for each scenario. In developing the plan, there will be logical overlap between the scenarios and the various plans. Fraud Data Mining Methodology Our fraud data mining methodology is a structured step-by-step approach to identifying transactions consistent with a fraud scenario, as described through the fraud data profile. Identify the inherent fraud scheme. The first step is to establish the scope of the fraud audit. Each business system has five to seven inherent fraud schemes. The audit plan should identify which inherent fraud schemes are within the fraud audit scope. This article focuses on the fictitious vendor and the false billing scheme to illustrate the methodology. A false billing is paying for goods or services not provided; and the vendor is serving as a front company. Build the fraud scenario. The fraud scenarios are how an inherent fraud scheme would occur in a specific company. The auditor must consider the variations of the fraud scheme based on the variations of the entity, opportunity and the transactional consideration. Data mining must be driven by the fraud scenario versus the data mining routine. A good example is when the auditor matches the vendor master file to the employee master file. The purpose of the match was to identify fictitious vendors. However the only fictitious vendors identified are those vendors where the perpetrator was obtuse enough to use their home 4

5 address. The design of the routine excludes all fictitious vendors with a concealed address. Obtain the data. In a sense, the concept sounds easy. However, one of the greatest impediments to fraud data mining is the identification and extraction of the data from the IT environment. While IDEA Data Analysis Software may be used to convert the data format, you must also consider storage capacity, table identification, data location and IT cooperation to build an effective data mining environment. Identify and link the data to the fraud scenario. One of the most critical stages of the data mining plan is to understand the available data and how to use the data to identify fraud scenarios, often referred to as the data mapping phase of the plan. Data mapping is the process of starting with each field in the database, understanding how the data correlates to the fraud scenario and how to search the data for indicators that link to the scheme. In essence, data mapping is the process of drawing a picture of a fraud scenario with data. Auditors should focus on both master file data and the transactional data associated with the business system. To illustrate this concept, consider the following scenario where front companies and false billing are used to commit fraud. The vendor master file, vendor name, address, telephone number, government identification number and bank account number, are useful to identify false vendors. The auditor would search for vendors missing key information, illogical information, and information that matches to other key databases. An inherent assumption is that the accounting department populates the database and the information has integrity. Using the vendor telephone number illustrates the concept of data mapping to identify fraud: Missing telephone number is an indicator of a false vendor Matching telephone number to an employee is an indicator of a false vendor Area codes that are not consistent with the vendor address is an indicator the mail forward technique of a false vendor The first three numbers of a telephone number can be correlated to cell phone number exchanges 5

6 The transactional data or the vendor invoice file would be searched for frequency and pattern of vendor invoices. The key fields are the vendor invoice number, invoice date, and invoice amount. The corresponding purchase order information can provide information regarding vendor invoices that are circumventing the procurement process. Correlating the vendor invoice pattern to the circumvention theory would be an effective data mining routine. Developing the data interrogation procedures. The data interrogation plan starts with a fraud scenario. The second step is to determine the extent of data interpretation within the audit process to search for fraudulent transactions. In other words, will the data interrogation look for a fraud scenario with a low sophistication concealment strategy or high level of sophistication? Our plan focuses on developing data interrogation based on the following concepts: 1. Pattern and frequency. The analysis creates statistical reports by vendor, customer, employee, and transaction type in an attempt to identify an anomaly within the data. You can create these reports using IDEA by utilizing the Summarize, Sort and Data Extraction features. 2. Circumvention strategies. The analysis searches for transactions that exhibit a pattern or frequency which suggests someone was processing transactions below the control threshold. Creating averages, maximum and minimums, and then drilling down on the particular line will highlight these situations. 3. Duplicate analysis. The search routine searches for duplicate information within the data file, or external to the data file, that should not exist. Proceed with caution as this analysis often produces false positives. The duplicate search routines within a file or comparing two files will identify these transactions. 4. Changes. The analysis searches for changes in data that would be consistent with a fraud scenario. Changes such as new, delete, update, and void may all be signs of changes. These transactions maybe located via transaction codes or comparisons to files and two points in time. 5. Illogical. The analysis searches for transactions that do not fit the normal frequency or pattern that would be expected in the data file. 6

7 6. Trends. The increasing or decreasing nature of the activity is not consistent with the established norm. 7. Mistakes or an unsophisticated perpetrator. In this phase the data interrogation is simply looking for errors which would be indicative of a fraud scenario. 8. Data interpretation challenge or the sophisticated perpetrator. In this phase, the auditor will need to create several reports and study the reports for small signs of a fraudulent transaction. An analogy would be trying to see someone in the distance on a foggy day. 9. Master file. The analysis searches for duplications, changes, missing or illogical data patterns. 10. Transactional history. The analysis searches for patterns which are illogical, changes or trends consistent with the fraud scenario. 11. Overt versus covert. Data can be concealed by the way the information is recorded in a data file. (i.e., Postal Box 934, PO Box 934, P.O. Box 934 or Box 934) Using the features of IDEA, the auditor can focus on the number, 934, to provide a match. The end result of the data mining plan is to identify a fictitious vendor, in which invoices were submitted by an operations manager for services not performed. Creating reports around the proceeding theory will make this process simple. Normalize the data. The intent of this step is to shrink the population through use of the exclusion and inclusion theory. The exclusion theory is intended to create data files that have a high degree of commonality. In this way, an anomaly becomes more obvious. In the inclusion theory, the search routines are designed to search for data characteristics or red flags consistent with the fraud scenario. Interpret the data. Data mining does not have the mathematical precession of an algebraic formula. The intent is to shrink the population and create a report, which the auditor can review. The key is the auditor s ability to interpret the data for signs of frequency and patterns consistent with the identified fraud scenario. 7

8 Respond to the indicators. The auditor will need to develop an audit response to a specific fraud scenario. In the case of a fictitious vendor the auditor may start with covert audit procedures, such as telephone pretext calls or Web searches. The overt procedure would be a site visit to verify the existence of the vendor. Illustration of a fraud data mining plan. Our fraud scenario is false vendors invoicing for services not performed and our inclusion theory will focus on four different considerations. Our fraud theory is to focus on vendors created by managers within the last four years. The second analysis will focus on vendors missing vendor master file data. The third analysis will focus on matching vendor master file data to our employee master file. The fourth analysis will focus on duplicate vendor master file data. The purpose of the four-part data analysis plan is to create a list of vendors that appear suspicious based on the master file data. By the nature of the inclusion theory, our analysis will not focus on vendors more than four years old, vendors with changes to key fields, temporary vendors, or vendors established through identify theft schemes. The intent of the exclusion theory is not to exclude the vendor from the audit, but rather exclude the vendor from this specific data analysis. Remember, once one fraudulent vendor is located, the audit will expand to look for other fraudulent vendors. The second tier of data mining is based on the vendor transactional data. For the selected vendors, the data analysis would focus on a pattern and frequency of vendor invoices that are sequential or illogical. The sequential pattern is easy with IDEA, whereas, the illogical pattern will require a significant amount of auditing work. The next section illustrates this process. Illustration using the vendor invoice number. The vendor invoice number is created by the perpetrator of the scheme. Experience shows the invoice number will have a pattern and frequency when the number is created by an individual. Patterns. The vendor invoice numbers will follow a pattern ranging from sequential, interval, special symbol or letter and random. Sequentially issued invoices are a red flag of a created vendor. The interval approach is based on incrementing the next invoice number by a set number. The special symbol or letter maybe used by a perpetrator to distinguish false invoices from real invoices. The random approach is used by a more sophisticated individual that understands that auditors search for patterns. 8

9 Frequency of vendor invoices. The number of instances is typically a byproduct of what financial pressures are impacting the individual, the individual s dollar approval level, the individual s ability to record the disbursement in multiple accounts and duration that the scheme has occurred. In most cases, the number of invoices will be less than 52 invoices a year. Remember, there are no absolutes regarding the frequency. Variables such as the duration of the scheme, pressures facing the perpetrator, and the perpetrator s management autonomy will impact the frequency the individual commits the scheme in one year. Range of the invoice numbers. Within a fiscal year, a company would expect to issue x number of invoices. The nature of the industry, size of the company, and the company s billing practices would all impact the number of invoices issued by the company. In this phase, the beginning invoice number, the ending invoice number, the number of invoices and the dollar amount of the invoices is identified. In conclusion, effective data mining begins with a properly defined fraud scenario. Search routines help focus on concealment strategies and the resulting red flags of the fraud scenario. Data mining can help narrow the population to a manageable size, enabling the application of fraud audit procedures. By using data interpretation, you can develop reports or documentation and interpret the data. More importantly, fraud can be detected using sophisticated search and find techniques and effective data analysis software, such as IDEA. Leonard W. Vona is a financial investigator with more than 30 years of diversified auditing and forensic accounting experience, including a distinguished 18-year private industry career. His firm, Fraud Auditing, Inc., advises clients in areas of litigation support, financial investigations, and fraud prevention. He may be reached at leonard@leonardvona.com or IDEA is a registered trademark of CaseWare International Inc. 9

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

Fraud Control Theory

Fraud Control Theory 13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts

More information

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no

More information

{Governmental Client Training} June 20, 2016

{Governmental Client Training} June 20, 2016 {Governmental Client Training} June 20, 2016 2 Online Banking Controls & Fraud Considerations Dan Block, CPA Rumzei Abdallah, CPA Agenda 3 Online Banking Considerations What happened? 7 Controls Commonly

More information

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,

More information

Best Practices for Managing Bank Transaction Risk Using a Continuous Data Analytics Approach

Best Practices for Managing Bank Transaction Risk Using a Continuous Data Analytics Approach Best Practices for Managing Bank Transaction Risk Using a Continuous Data Analytics Approach Co-authored by: Focus Technology Group Contents Introduction The Approach Risk Assessment Risk Data Analytics

More information

by: Scott Baranowski, CIA

by: Scott Baranowski, CIA Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf

More information

THE ABC S OF DATA ANALYTICS

THE ABC S OF DATA ANALYTICS THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable

More information

Contract and Procurement Fraud. Vendor Management

Contract and Procurement Fraud. Vendor Management Contract and Procurement Fraud Vendor Management Introduction Organizations must take steps to reduce vendor fraud, including: Conducting vendor due diligence Managing vendor risks via contracts Ensuring

More information

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.

More information

Data mining life cycle in fraud auditing

Data mining life cycle in fraud auditing Data mining life cycle in fraud auditing ELENA MONICA SABĂU Faculty of Accounting and Management Information Systems Academy of Economic Studies 6, Romană Square, District 1, Bucharest emsabau@gmail.com

More information

Neil Meikle, Associate Director, Forensic Technology, PwC

Neil Meikle, Associate Director, Forensic Technology, PwC Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

Preventing Duplicate Payments for Lawson Customers

Preventing Duplicate Payments for Lawson Customers White Paper Preventing Duplicate Payments for Lawson Customers By Brian Rosenberg, Senior Partner, RPI Consultants Duplicate Payments are far more common than most companies realize or are prepared to

More information

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Using Technology to Automate Fraud Detection Within Key Business Process Areas Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd

More information

FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01

FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01 FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01 Table of Contents Fundamentals of Forensic Accounting... 1 Public Records and Other Information Sources...

More information

Use of Data Extraction & Analysis Software In a Financial Statement Audit

Use of Data Extraction & Analysis Software In a Financial Statement Audit Use of Data Extraction & Analysis Software In a Financial Statement Audit A Message from The Audit Wizard April 2008 Making Auditors Proficient, Inc. Phone: 352-750-9636 www.billallen.com E-mail: ballen@billallen.com

More information

Accounts Payable Best Practices

Accounts Payable Best Practices Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can

More information

Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009

Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009 Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009 Dr. Brett Baker, CPA, CISA Assistant Inspector General for Audit U.S. Department of Commerce OIG Overview Forensic

More information

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement

More information

Continuous Monitoring: Match Your Business Needs with the Right Technique

Continuous Monitoring: Match Your Business Needs with the Right Technique Continuous Monitoring: Match Your Business Needs with the Right Technique Jamie Levitt, Ron Risinger, September 11, 2012 Agenda 1. Introduction 2. Challenge 3. Continuous Monitoring 4. SAP s Continuous

More information

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage

More information

TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL

TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL With the large volumes of data handled by organizations today, the ability to analyze this

More information

Final Report: Strategic Plan for Fraud Prevention, Fraud Detection, and Fraud Deterrence

Final Report: Strategic Plan for Fraud Prevention, Fraud Detection, and Fraud Deterrence Final Report: Strategic Plan for Fraud Prevention, Fraud Detection, and Fraud Deterrence Vonya Global: Executive Survey - Strategic Plan for the Prevention and Detection of Fraud Final Report September

More information

Forensic Analytics and Employee Fraud

Forensic Analytics and Employee Fraud Chapter Meeting Announcement Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini, Ph.D. DATE: Friday, April 24, 2015 PLACE: Education Service Center Region 19 6611 Boeing Drive El Paso,

More information

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception

More information

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business

More information

How To Prevent Fraud On A Credit Card

How To Prevent Fraud On A Credit Card Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies

More information

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business

More information

Internal Controls, Fraud Detection and ERP

Internal Controls, Fraud Detection and ERP Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility

More information

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments Audit Report OIG-A-2013-018 September 20, 2013 NATIONAL RAILROAD PASSENGER CORPORATION Office of Inspector General REPORT HIGHLIGHTS Why

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information

Numerous missing invoices, receipts, and purchase justifications.

Numerous missing invoices, receipts, and purchase justifications. Purchase Cards 1 Shell Company A Department of Defense agency requested an audit of its purchase card program when a quarterly review of cardholder transactions showed an increase of one hundred transactions,

More information

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S. MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal

More information

The Informatica Solution for Improper Payments

The Informatica Solution for Improper Payments The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade

More information

Forensic Analytics and Employee Fraud. Presented by. Mark J. Nigrini Ph.D. Professor, West Virginia University

Forensic Analytics and Employee Fraud. Presented by. Mark J. Nigrini Ph.D. Professor, West Virginia University The Charleston Chapter of the ACFE 2015 Training Day Date: May 8, 2015 Time: 8:00 4:30 Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini Ph.D Professor, West Virginia University Location:

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

Performance Audit City s Payment Process

Performance Audit City s Payment Process Performance Audit City s Payment Process January 2013 City Auditor s Office City of Kansas City, Missouri 18-2011 Office of the City Auditor 21 st Floor, City Hall 414 East 12 th Street (816) 513-3300

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

Dan French Founder & CEO, Consider Solutions

Dan French Founder & CEO, Consider Solutions Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The

More information

Practical Implementation of Data Analysis. IIA OC Chapter Meeting February 18, 2014 Edwards Lifesciences Global Internal Audit

Practical Implementation of Data Analysis. IIA OC Chapter Meeting February 18, 2014 Edwards Lifesciences Global Internal Audit Practical Implementation of Data Analysis IIA OC Chapter Meeting February 18, 2014 Edwards Lifesciences Global Internal Audit Agenda Introduction Data Mining Travel and Expense Audit Special Words Stratification

More information

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/

More information

A DOZEN IDEAS FOR SMALL BUSINESS FRAUD PREVENTION

A DOZEN IDEAS FOR SMALL BUSINESS FRAUD PREVENTION A DOZEN IDEAS FOR SMALL BUSINESS FRAUD PREVENTION Any discussion of fraud can be a difficult one because most individuals value being a trusted member of any organization and, in most cases, key employees

More information

INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS

INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING (Effective for audits of financial statements for periods beginning on or after December 15, 2004) CONTENTS Paragraph Introduction...

More information

SAS Fraud Framework for Health Care Evolution and Learnings

SAS Fraud Framework for Health Care Evolution and Learnings SAS Fraud Framework for Health Care Evolution and Learnings Julie Malida, Principal for Health Care Fraud, SAS Jay King, Manager, Advanced Analytics Lab, SAS Copyright 2009, SAS Institute Inc. All rights

More information

Table of Contents. Transmittal Letter... 1. Executive Summary... 2-3. Background... 4-5. Objectives and Approach... 6. Issues Matrix...

Table of Contents. Transmittal Letter... 1. Executive Summary... 2-3. Background... 4-5. Objectives and Approach... 6. Issues Matrix... Internal Audit Committee of Brevard County, Florida Internal Audit Review of Accounts Payable Prepared By: Internal Auditors of Brevard County September 22, 2010 Table of Contents Transmittal Letter...

More information

Steven Boyer Vice-President, Gallagher Bassett Services Inc.

Steven Boyer Vice-President, Gallagher Bassett Services Inc. Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud

More information

Chapter 6: Developing a Proper Audit Trail for your EBS Environment

Chapter 6: Developing a Proper Audit Trail for your EBS Environment Chapter 6: Developing a Proper Audit Trail for your EBS Environment In Chapter 2, we looked at the inherent architecture of EBS and some implications regarding the lack of a detailed audit trail. Three

More information

Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71

Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71 Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns

More information

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office:

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office: 2009 1 City of Geneva Policy Number: Effective Date: Last Revised Date: Responsible Office: 1.0 April 28, 2009 April 27, 2009 Tammy Shuttleworth Status: Draft Under Review Approved Obsolete IDENTITY THEFT

More information

Benford s Law and Digital Frequency Analysis

Benford s Law and Digital Frequency Analysis Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners

More information

Technical Professionals

Technical Professionals THE ARC TRAINING GROUP A Division of The ARC Consulting Group, Inc. A Profit Enhancement Firm Providing Educational and Consultative Services to the International Business Community SEMINAR FACT SHEET

More information

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is

More information

Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context

Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context 12 th Fraud Seminar December 1, 2015 Presented by: Deniz Appelbaum Abdullah Al-Awadhi Knowledge Based Expert

More information

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Prevention and Detection in a Manufacturing Environment Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse

More information

Accounts Payable Outsourcing Audit April 2014

Accounts Payable Outsourcing Audit April 2014 Accounts Payable Outsourcing Audit April 2014 Craig Terrell, Interim City Auditor Lee Hagelstein, Internal Auditor Accounts Payable Outsourcing Audit Table of Contents Page Executive Summary...1 Audit

More information

Accounts Payable Fraud Services

Accounts Payable Fraud Services Accounts Payable Fraud Services According to research conducted by the Association of Certified Fraud Examiners (ACFE), U.S. organizations lose an estimated 7 percent of annual revenues to fraud. 1 In

More information

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D.

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D. Top Five Employee Fraud Schemes Forensic Solutions, LLC Forensic accounting and litigation support services Presented by: Thomas Buckhoff, Ph.D., CPA/CFF, CFE Fraudsters love cash! Cash is the asset most

More information

LGMA Qld Governance and Corporate Planning Village Forum

LGMA Qld Governance and Corporate Planning Village Forum www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes

More information

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection October 2012 Whitepaper Series Issue No. 7 Copyright 2012 Jvion LLC All Rights Reserved 1 that are

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

Medical Fraud Detection Through Data Mining Megaputer Case Study www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Medical Fraud

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS Paragraph Introduction... 1-2 Definitions... 3-12 Audit Evidence... 13-17 Risk Considerations

More information

www.pwc.com Being protected Using data analytics to detect fraud

www.pwc.com Being protected Using data analytics to detect fraud www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Gerard M. Zack, CFE, CPA, CIA, CCEP Introduction to Data Analytics CPE Instructions Course Objectives How data analytics can be used to detect fraud Different tools

More information

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System CASE STUDIES Examples of analytical experiences detecting fraud and abuse with RiskTracker Account Activity Analysis System The following are descriptions of actual situations encountered by BANKDetect

More information

Investigative Techniques

Investigative Techniques Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data

More information

Advanced Analytics for Audit Case Selection

Advanced Analytics for Audit Case Selection Advanced Analytics for Audit Case Selection New York State Capitol Building Albany, New York Presented by: Tim Gardinier, Manager, Data Processing Services Audit Case Selection Putting a scientific approach

More information

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14

More information

IBM SPSS Direct Marketing 23

IBM SPSS Direct Marketing 23 IBM SPSS Direct Marketing 23 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 23, release

More information

OFFICE OF INSPECTOR GENERAL. Audit Report

OFFICE OF INSPECTOR GENERAL. Audit Report OFFICE OF INSPECTOR GENERAL Audit Report Select Financial Management Integrated System Business Process Controls Need Improvement Report No. 16-02 November 30, 2015 RAILROAD RETIREMENT BOARD EXECUTIVE

More information

IBM SPSS Direct Marketing 22

IBM SPSS Direct Marketing 22 IBM SPSS Direct Marketing 22 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 22, release

More information

FRAUD RISK ASSESSMENT

FRAUD RISK ASSESSMENT FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by

More information

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 rich@richlanza.com

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

Solving Online Credit Fraud Using Device Identification and Reputation

Solving Online Credit Fraud Using Device Identification and Reputation Solving Online Credit Fraud Using Device Identification and Reputation White Paper July 2007 Solving Online Credit Fraud Using Device Identification and Reputation About this White Paper iovation has pioneered

More information

716 West Ave Austin, TX 78701-2727 USA

716 West Ave Austin, TX 78701-2727 USA How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement

More information

A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala

A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala Abstract: Forensic accounting is not a new field, but in recent years, banks, insurance companies and even police agencies have

More information

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques

More information

DETECTING COLLUSIVE FRAUD IN ENTERPRISE RESOURCE PLANNING SYSTEMS

DETECTING COLLUSIVE FRAUD IN ENTERPRISE RESOURCE PLANNING SYSTEMS Chapter 11 DETECTING COLLUSIVE FRAUD IN ENTERPRISE RESOURCE PLANNING SYSTEMS Asadul Islam, Malcolm Corney, George Mohay, Andrew Clark, Shane Bracher, Tobias Raub and Ulrich Flegel Abstract As technology

More information

Key Factors for Payers in Fraud and Abuse Prevention. Protect against fraud and abuse with a multi-layered approach to claims management.

Key Factors for Payers in Fraud and Abuse Prevention. Protect against fraud and abuse with a multi-layered approach to claims management. White Paper Protect against fraud and abuse with a multi-layered approach to claims management. October 2012 Whether an act is technically labeled health insurance fraud or health insurance abuse, the

More information

Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements

Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements Economic Crime and the Online World 22 nd Annual ECI Conference November 2, 2011 Moderator: Bernard Hyman Jr., Esq. (315)

More information

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative

More information

Fraud Awareness Training

Fraud Awareness Training UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: Combine powerful analytical techniques with existing fraud detection and prevention efforts Build

More information

Discovering the Secrets of Detecting Fraud in Accounts Receivable

Discovering the Secrets of Detecting Fraud in Accounts Receivable Discovering the Secrets of Detecting Fraud in Accounts Receivable Speaker Joseph R. Dervaes, CFE, CIA 1995 ACFE Distinguished Achievement Award 2003 ACFE Donald R. Cressey Award 2007 ACFE Outstanding Achievement

More information

Media AP Approval and Reconciliation Users Guide

Media AP Approval and Reconciliation Users Guide Media AP Approval and Reconciliation Users Guide Page 1 of 11 Media AP Approval & Media Reconciliation Media AP Approval and Reconciliation are two independent programs designed to automate these key processes.

More information

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,

More information

Converting commercial payment data into critical, cost-saving intelligence.

Converting commercial payment data into critical, cost-saving intelligence. V I S A C O M M E R C I A L S O L U T I O N S V I S A I N T E L L I L I N K C O M P L I A N C E M A N A G E M E N T W H I T E P A P E R Converting commercial payment data into critical, cost-saving intelligence.

More information

Framework for Audit Oversight INTERNATIONAL WORKSHOP ON ACCOUNTABILITY IN SCIENCE AND RESEARCH FUNDING JUNE 2 4, 2011

Framework for Audit Oversight INTERNATIONAL WORKSHOP ON ACCOUNTABILITY IN SCIENCE AND RESEARCH FUNDING JUNE 2 4, 2011 Framework for Audit Oversight 1 INTERNATIONAL WORKSHOP ON ACCOUNTABILITY IN SCIENCE AND RESEARCH FUNDING JUNE 2 4, 2011 Overview 2 Forensic Audit and Oversight Forensic Techniques Identify Anomalies Framework

More information

Big Data s Big Impact In Financial Investigations

Big Data s Big Impact In Financial Investigations Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Big Data s Big Impact In Financial Investigations

More information

Real vs. Synthetic Web Performance Measurements, a Comparative Study

Real vs. Synthetic Web Performance Measurements, a Comparative Study Real vs. Synthetic Web Performance Measurements, a Comparative Study By John Bartlett and Peter Sevcik December 2004 Enterprises use today s Internet to find customers, provide them information, engage

More information

Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls

Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls Course Name: Internal Auditing & Controls Module: 5 Module Title: Examination phase of the internal audit Lecture and handouts prepared by Chuck Campbell Examination phase of the internal audit Module

More information

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and

More information

Data Warehousing and Data Mining in Business Applications

Data Warehousing and Data Mining in Business Applications 133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...

More information

Chapter 4 Getting Started with Business Intelligence

Chapter 4 Getting Started with Business Intelligence Chapter 4 Getting Started with Business Intelligence Learning Objectives and Learning Outcomes Learning Objectives Getting started on Business Intelligence 1. Understanding Business Intelligence 2. The

More information