Fraud Triangle Analytics Anti-Fraud Research and Methodologies
|
|
|
- Rosamond Hardy
- 9 years ago
- Views:
Transcription
1 Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009
2 Topics for discussion Why incorporate fraud detection analytics The Fraud Triangle in the current business environment Forensic analytics maturity model Our research: forensic data analytics from a Fraud Triangle perspective Forensic analytics to find hidden money (combining structured and unstructured data) Page 2
3 Why incorporate fraud detection analytics? 7% of company revenues are lost due to fraud per ACFE* Obtain better understanding of company s risks & controls Sets a proper tone at the top Integrates well with internal audit functions and goes beyond controls testing Potential lower D&O premiums *2008 ACFE Report to the Nation on Occupational Fraud Page 3
4 Current environment The perfect storm for fraud Companies and organizations are downsizing which has an immediate effect on internal controls Opportunity Budgets are decreasing. Companies and organizations are doing more with less. Increase use of government funds Layoffs unemployment and unease continue Stock prices levels remain low Credit crisis and other external factors limit liquidity Pressure Internal and External Pressure Opportunity to Commit Fraud Internal Controls Rationalization Stressed and disaffected employees may have greater ability to rationalize improper actions Page 4
5 Where is fraud occurring? Source: ACFE 2008 Report to the Nation On Occupational Fraud Page 5
6 2008 Corruption Perceptions Index X Low High Page 6
7 How is it detected? 66% by tip or accident Source: ACFE 2008 Report to the Nation On Occupational Fraud Page 7
8 Forensic Analytics Maturity Model Become more proactive in detecting fraud Low Detection Rate High Structured Data Traditional Rules-Based Queries & Analytics Model-Based Analysis Visual Analytics Unstructured Data Traditional Keyword Searching Latent Semantic Analysis Natural Language Processing High False Positive Rate Low Page 8
9 Data Sources in Today s Organization Focus of most audits Text OPPORTUNITY for audit Graphics Unstructured Data Structured Data CRM Databases Accounting Systems Presentations & Spreadsheets Page 9 20% 80%
10 Summary of Our Research Incorporated lessons learned from past Change the way we view data 80% of data is unstructured Innovative and aggressive methods to uncover: Fraud Error Misuse Waste Need for a targeted, risk-based approach May/June and July/August issues of FRAUD Magazine Page 10
11 Risk-Based Approach Workflow 1. Perform risk assessment 2. Link risk to business process 3. Link business process to departments 4. Link departments to people 5. Collect data (in or transactional data) 6. Perform analysis Risks Processes Departments People Data Analysis Page 11
12 The Fraud Triangle¹ Applying theory to electronic communications 1. Donald R. Cressey's Fraud Triangle ; Incentive/Pressure, Opportunity and Rationalization are present when fraud exists. Page 12
13 EY / ACFE Library of Keywords (Over 3,000 terms in a half dozen languages so far ) Rationalization Incentive/ Pressure Opportunity I deserve it nobody will find out gray area they owe it to me everybody does it fix it later the company can afford it not hurting anyone won t miss it don t get paid enough make the number don t let the auditor find out don t leave a trail not comfortable why are we doing this pull out all the stops do not volunteer information want no part of this only a timing difference not ethical special fees client side storage off the books cash advance side commission backdate no inspection no receipt smooth earnings pull earnings forward Page 13
14 Predictive Fraud Analysis - output Joint EY and ACFE Research Project Page 14
15 Proactive Fraud Analysis Research Revenue Recognition Fraud Keyword hits as a percentage of total s Incentive/Pressure Terms Opportunity Terms Rationalization Terms Page 15
16 Proactive Fraud Analysis Research Revenue Recognition Fraud Selected Top Keyword Hits During Peak Period Incentive/Pressure Terms problem commit create concern not sure short clarify split spread revise sorry Opportunity Terms correct appropriate reserve miss condition depart discount difficult fail critical Rationalization Terms therefore find out it s OK get w/1 back challenge find it figure out catch complex does not w/1 make sense doesn t w/1 make sense Page 16
17 Proactive Fraud Analysis Research Bribery Case Keyword hits as a percentage of total s Incentive/Pressure Terms Opportunity Terms Rationalization Terms Investigation timeframe, September 2006 to March 2007 Page 17
18 Proactive Fraud Analysis Research Bribery Case Selected Top Keyword Hits During Peak Period Incentive/Pressure Terms Opportunity Terms manage risk short problem commit concern clear fake cover policy fund complain investigate process w/5 fee consult audit offshore renewal Rationalization Terms error therefore challenge complex entitled get w/1 back catch mistake justified find out Page 18
19 Visualizing the Fraud Triangle: Via Online Dashboard Page 19
20 Drill down by custodian, focus on key years Page 20
21 Drill down further into months Terms counts update for the custodian and specified months Page 21
22 If required, drill down to the source or instant message communication Page 22
23 Case Example: Global Consumer Products Company received more than 40 whistleblower hotline complaints from one of the regions in Mexico over a three month period In response, the company s internal audit team performed an investigation on the complaints Company wanted to review s for 28 custodians, in search of evidence that would further bolster the results of the investigations; however, time and budget was limited When EY became involved, we were provided little information pertaining to the various allegations EY processed the PST s using Fraud Triangle Analytics yielding 200,964 s. and attachments were searched using a combination of ACFE-EY Fraud Terms as well as terms provided by the Client ( Client Terms ) related to their various internal investigations. Page 23
24 Analysis of Client Terms Fraud Indicators for the top five custodians for high-risk terms Diesel vs Fraud Score 50 Results from the investigation line key words hits Trend Avg. Diesel_Per Trend Pressure key words hits Trend Avg. IP_Per Trend Avg. OP_Per 40 Opportunity key words hits Trend Trend Avg. RAT_Per Rationalization key words hits Trend Trend Jul 1 07 Sep 1 07 No v 1 07 Jan 1 08 Mar 1 08 May 1 08 Jul 1 08 Sep 1 08 Nov 1 08 Jan 1 09 Mar 1 09 May 1 09 Date Th e tren d of averag e o f Diesel_Per, averag e o f IP_Per, average of O P_Per an d averag e of RAT_Per with Date. Th e data is filtered on Date Year an d name. The Date Year filter has multip le members selected. Th e name filter keeps G ABRIEL ROSAS MORENO, JAVIER QUIROZ CHIAPA, JOSE LUIS HERNNDEZ GARCA (SALVATIERRA), RAFAEL ARREDONDO CARCIA (VALLE DE SANTIAGO) and VICTO R HUG O LO PEZ VALLADARES. Page 24
25 Advanced Analytics WHO WHAT WHEN WHY Social Networking Concept Clustering Communication Over Time Sentiment Analysis Who is talking to whom? about what? over which time period? how do they feel? People-to-people analysis Top words mentioned When communications occur Positive vs. Negative Sentiment Entity-to-entity analysis Map communication lines to organization chart Key concepts / topics Top or unusual dollar amounts Sensitive words / phrases Communication spikes around key business events Top 10 negative journal entries Top 10 angry s Top 10 most concerned s SSN Customer survey analysis CCN Employee survey analysis Page 25
26 Visual Analytics Entity Extraction Geographic view Why so many mentions of Colombia? We don t do business in Colombia! Page 26
27 Considering Structured Data Low Detection Rate High Structured Data Traditional Rules-Based Queries & Analytics Model-Based Analysis Visual Analytics Unstructured Data Traditional Keyword Searching Latent Semantic Analysis Natural Language Processing High False Positive Rate Low Page 27
28 Fraud Risk Areas to Consider Asset Misappropriation Corruption / FCPA Financial Statement Cash Disbursements Bid Rigging Accounts Payable General Ledger Conflicts of Interest Account Receivable Materials Management & Inventory Control Purchase Order Management Salaries & Payroll Travel & Expenses Contract Compliance Kickbacks Materials Management & Inventory Control Purchase Order Management Deposits General Ledger Materials Management & Inventory Control Purchase Order Management Vendor Management Payment Cards Sales Analysis Travel & Expenses Revenue Recognition / Procure to Pay Sales Analysis Note: Some categories may overlap depending on the objectives of the investigation. Page 28
29 Data Analytics Common Areas of Interest 1. Payment stream analysis Altered invoices, goods not received, duplicate invoices, inflated prices, excess quantities purchased 2. Vendor master/employee master comparisons Fictitious vendors, vendor risk ranking, conflicts of interest 3. Employee expenses Over limits, unusual expenses, miscellaneous/sundry expenses, consultant payments 4. P-card expenditures 5. Payroll Over limits, unusual expenses, miscellaneous/sundry expenses Ghost employees, unusual payments, no deductions/evaluations, direct deposit account analysis 6. Bribery & Corruption / FCPA Bid rigging, conflicts of interest, contract compliance, kickbacks, payments to outside consultants Page 29
30 Find Hidden Money Recover Erroneous, Negligent or Fraudulent Payments Different Vendor ID Same Date Exact Same Amount Different Invoice # Same Reference / Job Code Similar names Some with same address Page 30
31 Predictive Modeling Analyze 400,000 transactions for suspected bribery payments (400 man-days) 1. Ernst & Young team reviewed 2,000 transactions from ledger data (text comments, amounts, dates, etc.) Identified 400 suspicious and 1,600 non-suspicious entries 2. Created statistical model: Is Suspicious / Is Not Suspicious Incorporated both structured and unstructured data into the model 3. Applied model to remaining 398,000 additional transactions 4. Identified 14,000 new suspicious transactions With confidence over 95% similar to Is Suspicious Identified over $8 million of highly suspicious payments Page 31
32 Predictive Modeling (Step 2) Perform text analytics Volume contract facilitation Perform Text Analytics on free text fields Conduct term frequency analysis for most occurring or unusual transaction descriptions Capture concepts release expense Page 32
33 Predictive Modeling (Step 3) Prepare the model Perform Variable Analysis These variables were less important when predicting suspicious transactions. Client should focus resources on monitoring efforts for the three leading drivers which accounts for 80% of the predictive value. These three variables were this highest drivers of suspicious transactions Page 33
34 Customized on-line compliance monitoring tools Uploads / integrates with transactional data sources Drill down capabilities by subsidiary or region Dynamic reporting Web-based Rules-based and model based analytics Page 34
35 Monitoring online reports Anomaly Detection Names have been partially redacted Page 35
36 Benford s Law (In naturally occurring numbers) Where d is the leading digit and p is the probability. Source: Wikipedia Page 36
37 Benford s Law Practical Examples Applications: Expense costs, Vendor invoices, Sales Figures, and Insurance Claims should follow Benford s Law 1 Spot dummy vendors in data manipulation schemes Majority of improper purchases begin with 7, 8, or 9 which is just the opposite of Benford s predicted patterns Consequently, fraudulent invoices are easier to detect using Benford s Law than by random sampling. Also identify amounts just below pre-defined cut-offs As shown, the threshold for second approval was $4,000 so invoices often began with 3 (as in $3,999) Analysis of 10,000 vendor invoices 1. Per Mark Nigrini, a Ph.D., and a chartered accountant: After several years of studying Benford s Law, he published his thesis in 1992 demonstrating that Benford s Law could be used to detect fraud and to detect rounded numbers. His studies revealed that sales figures, insurance claim costs, and expense claims should follow Benford s Law. Page 37
38 Final considerations for our clients Assess risk Part of planning, or just a repeat of last year Measure risk Is it just rules based? Consider unstructured (text-based) data Consider incorporating the fraud triangle concept Improve business performance Not just risk mitigation FCPA awareness Find hidden money Reduce costs Page 38
39 Thank you Daniel Torpey, CPA, CITP Partner, Assurance Services Fraud Investigation & Dispute Services Dallas, Texas (214) Vincent Walden, CFE, CPA, CITP Senior Manager, Assurance Services Fraud Investigation & Dispute Services Dallas, Texas (214) Page 39
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Demystifying Big Data Analytics
Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components
Emerging Trends in Fraud Analytics:
Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
Taking Data Analytics to the Next Level
Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Using Data Analytics to Detect Fraud. Other Data Analysis Techniques
Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is
Procurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
Integrating Data Analytics into Internal Audit
Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The
Fraud Prevention Training
Fraud Prevention Training Kim Turner, Chief Audit Executive Emily Knopp, Audit Director Fraud Prevention: WHAT YOU WILL LEARN & FRAUD FACTS What you will take away with you: Glossary of Fraud Terms Details
Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
The auditors responsibility to consider fraud in an audit of financial statements
The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
Fraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
Financial Services Group
Fraud Detection and Prevention Presented by: Carrie Kennedy, CPA, Partner Anthony Porter, CPA, Manager 1 The material appearing in this presentation is for informational purposes only and should not be
Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
Investigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner [email protected] 210.268.1932 AGENDA
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud
Fraud: Real Stories, Real People, Real Impact
Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle
Centre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
GLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 [email protected]
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71
Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns
Diploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
Accounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
Fraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
Use of Data Extraction & Analysis Software In a Financial Statement Audit
Use of Data Extraction & Analysis Software In a Financial Statement Audit A Message from The Audit Wizard April 2008 Making Auditors Proficient, Inc. Phone: 352-750-9636 www.billallen.com E-mail: [email protected]
An Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
Microsoft Confidential
Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft
PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
LGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
Fraud Awareness and Prevention Program Report
Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central
Internal Control Risks Associated with Information Technology. Kevin M. Bronner, Ph.D.
Internal Control Risks Associated with Information Technology By Kevin M. Bronner, Ph.D. Introduction: The Risk of Information Technology Fraud The information technology (IT) function is important to
RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
Managing FCPA (Foreign Corrupt Practices Act) Risks
Managing FCPA (Foreign Corrupt Practices Act) Risks Diana Shin - Partner Jacqueline Fan Associate Director Fraud Investigation and Dispute Services July 2010 Agenda 1. Compliance pressure points 2. Putting
Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context
Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context 12 th Fraud Seminar December 1, 2015 Presented by: Deniz Appelbaum Abdullah Al-Awadhi Knowledge Based Expert
Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA
Forensic Auditing: The Audit of the Future, Today Instructor: Ron Durkin, CFE, CPA/CFF, CIRA 1 1 Agenda Current events and developments in forensic accounting Define the term forensic auditing What is
Internal Controls Best Practices
Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most
Fighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: [email protected] Copyright 2008 Leonard Vona and Fraud
How To Understand And Understand Forensic Accounting
Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations
ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada
Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing
How To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
Neil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control
September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value
Contents. xiii xv. Case Studies Preface
Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants
Steven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
Fraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
Benford s Law and Digital Frequency Analysis
Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the
Developing and Implementing a Fraud Risk Assessment. Josh Shilts CPA/CFF, CFE
Developing and Implementing a Fraud Risk Assessment Josh Shilts CPA/CFF, CFE MY GOAL HAVE YOU WALK AWAY WITH THE KNOWLEDGE AND TOOLS TO COMPLETE A FORMAL & USEFUL FRAUD RISK ASSESSMENT!!! Before We Begin,
5 Important Controls to Mitigate Employee Fraud
5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials
A Guide to Forensic Accounting Investigation. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused
Chapter 15: Accounts Payable and Purchases
Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:
Expenditures Internal Audit Report
Expenditures Internal Audit Report Report #2014-1 June 9, 2014 Table of Contents Table of Contents... 2 Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope...
Fraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
Chapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009
Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter October 1, 2009 Supply Chain Risk Overview * Today s Focus * Includes Working Capital benefits 1 2009 Protiviti Inc. An Equal Opportunity
COMPLIANCE POLICY MANUAL
COMPLIANCE POLICY MANUAL FOREIGN CORRUPT PRACTICES ACT 07/24/2012 Policy Number 16-100 SUBJECT: FOREIGN CORRUPT PRACTICES ACT Application: Worldwide Strategic Business Units and Subsidiaries. It is the
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala
A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala Abstract: Forensic accounting is not a new field, but in recent years, banks, insurance companies and even police agencies have
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,
Purchasing Card Program
Purchasing Card Program User Guidelines University of North Alabama Procurement Department Created: March 2008 / Updated 7/16/2015 University of North Alabama Purchasing Card Program 1 Table of Contents
Investigation. Investigations
Investigation The Forensic Services team of PricewaterhouseCoopers has the knowledge and experience necessary to conduct comprehensive fraud investigations. Our team in Poland has jointly performed in
Why is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
Abila. MIP Fund Accounting. Solutions overview. Accounts payable. Accounts receivable reporting, billing, and sales order entry
Abila MIP Fund Accounting To help you deliver on your mission, MIP Fund Accounting is a configurable fund accounting solution that allows you to report and track information most important to you, your
Employee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments
GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments Audit Report OIG-A-2013-018 September 20, 2013 NATIONAL RAILROAD PASSENGER CORPORATION Office of Inspector General REPORT HIGHLIGHTS Why
Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/
Audit Guide for Audit Committees of Small Nonprofit Organizations
Audit Guide for Audit Committees of Small Nonprofit Organizations A free resource provided by the Virginia Society of Certified Public Accountants Audit Guide for Small Nonprofit Organizations A free resource
