Fraud Detection with ActiveData for Excel ebook
|
|
|
- Elijah Joseph
- 10 years ago
- Views:
Transcription
1 Fraud Detection with ActiveData for Excel ebook By: Michelle Shein and Richard Lanza 2009 InformationActive Inc., Michelle Shein and Richard Lanza
2 ActiveData for Excel Fraud Detection ebook Copyright 3 What You Receive with this ebook 4 Purpose of the Publication / Learning Objectives 4 About The Authors 5 Excel - Pros and Cons 7 Power of Excel as an Fraud Detection Software 7 Limitations of Microsoft Excel as an Fraud Detection Software 7 How ActiveData for Excel Compensates for Excel s Limitations 8 How Key Data Analysis Tasks Are Met With Active Data for Excel 9 How To Get Started Running The Fraud Detection Tests 11 The Morning Of Reality 11 The Steps To Developing An ActiveData for Excel Fraud Detection Test 11 Step 1 Set Your Sights 12 Step 2 Ready Yourself 12 Step 3 Get Data 13 Step 4 Run It For Real 16 Data Files Included With This Publication 17 Why Look for Fraud in Accounts Payable? Above Average Payments To A Vendor Employee to Vendor Address Match 22 Why Look for Fraud in Revenue? Missing / Unusual Customer Information 27 Why Look for Fraud in General Ledger? Stratify General Ledger Detail Information Identify Nonstandard Journal Entries Made After Year End InformationActive Inc., Michelle Shein and Richard Lanza 2
3 Copyright InformationActive Inc., Michelle Shein and Richard B. Lanza No part of this publication may be reproduced in any form without permission in writing from Michelle Shein and Richard B. Lanza. Limitation of Liability / Disclaimer of Warranty The authors have used his best efforts in preparing this publication and is not responsible for any errors or omissions. They make no representations or warranties with respect to the accuracy or completeness of the contents of this document and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose, and shall in no event be liable for any loss of profit or any other financial or commercial damage, including, but not limited to, special, incidental, consequential, or other damages. ActiveData for Excel is the trademark of InformationActive, Inc.; ACL, Audit Command Language, and Access Command Language are trademarks of ACL Services Ltd.; IDEA is the trademark of Caseware IDEA Ltd.; Excel and Access are the trademarks of Microsoft. All other trademarks are the property of their respective owners InformationActive Inc., Michelle Shein and Richard Lanza 3
4 What You NEED with this ebook The following test data files are included with this ebook and can be found as SampleFraudData.zip file on the web page for this ebook. The.zip file contains the following files that are the ones that are referenced in the test descriptions that follow in this book. General Ledger Data.xls Listing of detailed journal entries posted to a general ledger system. PayablesData.xls Listing of invoice-level detail of paid invoices, as well as, a list of purchase orders, a vendor masterfile, and an employee masterfile. RevenueData.xls Listing of sales invoices, listing of payments associated to the invoices, as well as, an old and new customer masterfile. As well you will need a copy of ActiveData for Excel to do the exercises in this book. If you don t have a copy you can download one by selecting the Download button on the web page for this ebook. For any other information please contact InformationActive Inc. [email protected] x184 Purpose of the Publication / Learning Objectives The purpose of this course is fraud examiners in implementing data analysis routines using ActiveData for Microsoft Excel. This course is not expected to explain ActiveData or Microsoft Excel concepts at length but rather to provide guidance as to which of the product s features can be used in fraud examination setting. It walks through 5 common fraud detection tests between the accounts payable, accounts receivable, and general ledger fraud detection areas. This book provides a small subset of tests that Fraud Examiners can use to implement proactive fraud detection techniques in their organizations. InformationActive has other more in-depth resources that are available for sale via their website ( specifically: Top Audit Tests Using ActiveData for Excel is an ebook that integrates directly into the ActiveData for Excel help menu. It is a manual is to assist auditors, fraud examiners, and management in implementing data analysis routines using ActiveData for Excel. Use these techniques to proactively detect organizational inefficiency, ineffectiveness, fraud and provide measurable cash recoveries. It walks you through 16 common audit tests within the accounts payable, accounts receivable and general ledger audit areas InformationActive Inc., Michelle Shein and Richard Lanza 4
5 Armed with this document, users can no longer say that audit software is difficult to use. For now, even a tool as simple as a spreadsheet can and should be used as an audit software. With the curtain exposed users can now focus their time on the more critical activities of creatively dreaming up new tests and improving their business intelligence. Fraud Detection and Cash Recovery Using ActiveData for Excel is a CPE accredited (8 Hours of NASBA approved CPE) self paced, self study course that walks you through how to use ActiveData for Excel as a fraud detection and cash recovery tool. The course also provides sample data to test your skills prior to using "live" company data. This course will: Introduce you to the powerful combination of ActiveData and Excel Walk you through basic fraud detection and cash recovery reporting concepts Map out each step for the most common of fraud detection, cash recovery and audit tests Suggest fraud detection and audit procedures to perform on the resulting reports Note: This course is also available for sale via the ACFE bookstore. If you would like to provide feedback on the document, we welcome and encourage it as we plan to complete later versions. Please provide your feedback via at [email protected] or [email protected] or [email protected]. About The Authors Michelle Shein is a highly-skilled instructor with over twenty years of technical training experience. With her proficiency in both teaching and the use of desktop PC products she has taught Fraud detection experts discovery skills to uncover fraud using the technology of Microsoft Access and Excel. Ms. Shein is the President of PR1OR1TY Computer Training & Services, Inc. Since 1990 the training corporation has been providing training services and PC consulting to corporate clients helping to build the PC skills of many corporate teams. With over twenty years of professional training experience Ms. Shein has taught for numerous clients including: Morgan Stanley, Merrill Lynch, AICPA, Chubb, Kraft, Nabisco, Comcast, Toys R Us, AIG, AT&T, Bank of New York, Johnson & Johnson, Ciba Gigy, Sandoz, Barr Labs, Dress Barn, Bell Core, Telcordia and Avon. As a professional PC trainer for numerous years, Ms. Shein has taught classes in many of the popular PC desktop products. Ms. Shein has specialized in teaching Microsoft Project, Microsoft Excel and Microsoft Access users as well as specializing in developing Access applications for her client s data storage and analysis needs. Ms. Shein earned a Bachelor and Master s degree in education from the State University of New York in Fredonia, New York. She has used her educational and psychology background in developing rewarding training sessions for both the advanced learner and PC user as well as for the reluctant learner and novice PC user InformationActive Inc., Michelle Shein and Richard Lanza 5
6 Another product Ms. Shein and Mr. Lanza have co-authored is the ACFE Access Training Auditing Payables for Fraud CD series. Michelle Shein can be reached through the following means: Phone: Website: Rich Lanza (CPA, CFE, PMP) enables organizations in the use of technology to (1) generate cash recoveries, (2) stop profit leaks, (3) move away from control issues, and (4) work towards process improvements. With automated report systems and personalized coaching, Rich helps companies get quality results in minutes. This is done by maximizing the technology companies already have and showing professionals how to become info magicians. He is the author of numerous publications and training courses in ACL, IDEA, Access, ActiveData, and Excel. While he has over 15 years of experience and is a recognized leader in the use of technology, Rich also founded of AuditSoftware.Net, a free website devoted to using technology for generating bottom line results. This website recently started providing a free diagnostic service to help companies better implement their fraud detection software technology. To contact Rich, receive his free e-newsletter, get a free diagnostic, or to order his products, him at [email protected] InformationActive Inc., Michelle Shein and Richard Lanza 6
7 Excel - Pros and Cons Power of Excel as an Fraud Detection Software Microsoft Excel is a ubiquitous tool and it has achieved this status by allowing a user to ease into data analysis. Rather than require database training or other certifications, Microsoft Excel allows a user with any Windows experience to pick up and get started. Once started, users find spreadsheets easy to navigate and flexible enough to meet their particular needs. For example, a user may have a five-line spreadsheet to total some numbers or they may maintain their sales invoices. Either way, Excel can normally contract or expand to the job. For accountants and Dors, Excel has provided them a comfortable environment to work within. And for many data analysis tasks, Excel can easily do the job. Excel allows users to Sort, Subtotal, Filter, and Merge data. They can create calculated fields, as well as, perform statistical analysis such as regression. For all of the above reasons and more, Microsoft Excel has become an industry standard in managing and analyzing organizational data. Limitations of Microsoft Excel as an Fraud Detection Software Although Microsoft Excel has many powerful features and can take on many of the features of an fraud detection software, it has its own set of limitations that are presented below: Can only process 1 Million records (Excel 2007) or 65,536 records (Excel 2003 and below) of data which may be too small for some organizational databases. Does not document the fraud specialist s work in easy to access logs for later reference and storage (ActiveData for Excel helps with this) Allows data to be changed in the spreadsheet. Can only read a small subset of the complete types of data files available in digital format. For example, EBCIDIC files stored in IBM mainframes would need to be converted for use in Excel. Has difficulty in performing some data management and analysis tests such as relating tables. Although it can be accomplished, it is an onerous task. Does not have functionality specifically tailored to the auditor. For example, a sample can be calculated in just a couple of clicks with minimal training in specifically designed fraud detection software. In Excel, it can be done, but it does take some effort and guidance InformationActive Inc., Michelle Shein and Richard Lanza 7
8 How ActiveData for Excel Compensates for Excel s Limitations While ActiveData for Excel does not compensate for all limitations, the below table outlines where it does compensate, as well as, supporting explanations for when it does not: Excel Limitation Can only process 1Million or 65,536 records of data which may be too small for some organizational databases. Does not document the auditor s work in easy to access logs for later reference and work paper storage. Manually Compensated? N Y How Does ActiveData for Excel Compensate For The Limitation? / What Other Considerations Should Be Noted For Uncompensated Limitations? ActiveData for Excel does not allow for more than the Excel limitation of rows in a spreadsheet but this may be a large data file for most organizations. Further, other data analysis tools (i.e., Microsoft Access) can be used to pare down files for easier data analysis in Excel. ActiveData for Excel provides a log of each processed step (as a comment in cell A1 of the worksheet created via ActiveData for Excel processing). Then, using the Index Sheets function, a summary page of all comment fields can easily be created for review; in essence creating an audit log of all work performed with the spreadsheet data. Allows data to be changed in the spreadsheet. N Any text file can be opened and changed. For example, a comma separated text file can be opened in Word, changed, and then passed on to the fraud detection specialist. Further, analysis programs that are read only do allow calculated fields which could be used to create a new invoice amount field (for example). Can only read a small subset of the complete types of data files available in digital format. For example, EBCIDIC files stored in IBM mainframes would need to be converted for use in Excel. Has difficulty in performing data analysis and management tests such as relating tables. Although it can be accomplished, it is an onerous task. Does not have functionality specifically tailored to the fraud detection specialist. For example, a sample can be calculated in just a couple of clicks with minimal training in a specifically designed fraud detection software. In Excel, it can be done, but it does take some effort and guidance. N Y Y While not compensating for this limitation, this has become less of an issue as most middleware working with IBM mainframes (or other older computing platforms), allow data files to be converted to a text format. Most database software provides the option of exporting data into a Microsoft Excel format. ActiveData for Excel provides over 100 data analysis and management features that automate functions that may be possible in Excel, albeit extremely difficult from a technical perspective. The over 100 ActiveData for Excel features are mostly tailored to the fraud detection specialist and accountant but there are many additional features that just make Excel plain old easy to use. For example, you can use ActiveData for Excel to reorganize columns in an Excel spreadsheet with just a few clicks (rather than inserting and cutting/pasting column data one at a time InformationActive Inc., Michelle Shein and Richard Lanza 8
9 How Key Data Analysis Tasks Are Met With Active Data for Excel The table below compares two popular fraud detection-focused data analysis products for their out of the box functionality of with ActiveData for Excel. These features will be practically applied to a host of fraud detection settings later in this publication. Data Analysis Features Append / Merge Audit Log Calculated Field/ Functions Cross Tabulate Digital Analysis Duplicates Export Extract/Filter Description Combines two files with identical fields into a single file. An example would be to merge two years worth of accounts payable history into one file. Maintains a documentation log of all procedures performed on a data file. Created a calculated field (which can use a function such as ABS for the absolute value of the field) using data within the file. For example, the net payroll pay to an employee could be recalculated using the gross pay field and deducting any withholding/taxes. Cross Tabulate lets you analyze character fields by setting them in rows and columns. By crosstabulating character fields, you can produce various summaries, explore areas of interest, and accumulate numeric fields. Completes digital analysis tests (i.e., Benford s Law). Identifies duplicate items within a specified field in a file. For example, this report could be used to identify duplicate billings of invoices within the sales file. Creates a file in another software format (e.g., Excel, Word) for testing. An example would be to export customer address information to Word for Mail Merge ing to customer confirmation letters. Extracts specified items from one file and copies them to another file, normally using an if or where statement. Examples include extracting all balances over a predefined limit. Active Data for Excel * Gaps Identifies gaps within a specified field in a file InformationActive Inc., Michelle Shein and Richard Lanza 9
10 Data Analysis Features Index / Sort Join / Relate Sample Statistics Summarize Description For example, identify any gaps in check sequence. Sorts a file in ascending or descending order. An example would be sorting a file on social security number to see if any blank or numbers exist. Combines specified fields from two different files into a single file using key fields. This function is used to create relational databases on key fields. It can also be done in an unmatched fashion to identify differences between data files. Creates random or monetary unit samples from a specified population. Calculates various statistics on a selected numeric field. Accumulates numerical values based on a specified key field. An example would be summarizing travel and entertainment expense amounts by employee to identify unusually high payment amounts. Active Data for Excel * * - Please note that this is standard functionality within Excel 2009 InformationActive Inc., Michelle Shein and Richard Lanza 10
11 How To Get Started Running The Fraud Detection Tests The Morning Of Reality It s 9:00 a.m. and you awaken in a room filled with a PC, a data file and Microsoft Excel. But wait, just when you thought everyone has forgotten your existence, you come across a note left by your supervisor that reads Test It!. This may be taking things a little too far but haven t we all, at some time in our data reporting careers, been faced with a similar situation? Wouldn't it have been helpful from a productivity and self-confidence standpoint to own a book that would: walk you through basic reporting concepts map out each step for the most common of fraud detection tests equip you with sample data, providing a glimpse of the resulting report prior to the (crunch time) situation suggest fraud detection procedures to perform on the resulting report Therefore, this publication gives you all the information you need to produce fraud detection reports immediately for the most common accounting areas: accounts payable, accounts receivable, and the general ledger. Report objectives, fraud detection steps, and the functional instructions are included for each application. To help practice the concepts, sample data is also provided, giving you an immediate "hands on" experience. The Steps To Developing An ActiveData for Excel Fraud Detection Test To get you started, you need to put your first foot forward if you ever expect to run fraud detection tests. This section explains the four step process, summarized below: Step 1 Set Your Sights As in any fraud detection, risk must be assessed with tests selected to mitigate that risk. Step 2 Ready Yourself By running the ActiveData for Excel test with the sample data provided, you can get comfortable for the real thing, once you get the client s data. Step 3 Get Data The process does not have to be difficult and is a necessity if you ever expect to run the fraud detection test. Step 4 Run It For Real / Consider Other Tests Now that you know how to run the test (based on playing with the sample data), all that is left is to run the test on the client s data. As you run the reports, other report ideas are bound to come to mind (that may not be explained in this book). With the data analysis procedures learned from this publication, you should be able to mold different permutations to create the newly desired report InformationActive Inc., Michelle Shein and Richard Lanza 11
12 Step 1 Set Your Sights To know where to perform fraud detection, you need to assess the risk of certain events occurring. Since risk can be an amorphous concept, it is generally helpful to quantify the risk. The below formula does just that: Likelihood * Impact = Risk Score So, in order to determine where first to perform fraud detection, it is best to lay out all of the potential areas (i.e., accounts payable duplicate payments, fraudulent payment, inflated sales, etc.) and assign a likelihood percentage (between 0% and 100%) and the potential impact, which should be stated as a dollar amount whenever possible. To ease this process, and avoid minutia, it may be useful to set general parameters for impact (i.e., up to $500,000, $500,001 to $1,000,000, and over $1,000,000) and likelihood (10%, 50%, 75%, and 90%). After each fraud detection type is scored, they can be prioritized from highest to lowest fraud risk score. Once the top risk areas are identified, the following responses can be applied: Prevent/Avoid Using Fraud Detection Software Reports Develop responses before ever letting the threat occur thus improving on any company vulnerabilities. As it relates to using this document, certain reports may be run and reviewed prior to certain transaction types ever occurring. Mitigate Using Detection Software Reports Develop responses that reduce the risk to a more manageable level. As it relates to using this document, certain reports may be run and reviewed on a periodic basis. Transfer the risk could be transferred to a third party such as an insurance carrier Therefore, the goal of this step is to determine the precise tests to run, which will aid you in the next step. Step 2 Ready Yourself In this publication, we have provided 5 reports across three major fraud detection areas. Hopefully, we have identified the precise test you hope to run. If not, the explained tests should get you close and teach you the needed data analysis concepts. Please note that these concepts have been reduced to ActiveData for Excel features in the section The Tests and Their Relation To ActiveData for Excel s Features to help you make this comparison. With the test selected, go to the appropriate page in this publication and: 1. Read the section Why Are We Running This Test and What To Do With The Results which provides the alpha and the omega of the test to be performed. 2. Read the What Data Is Needed? section of the test to understand the data file and fields (columns) needed in order to run the test. 3. Open the sample spreadsheet provided with this publication and walk through the steps explained in the test in order to get the final results. 4. For any concepts that you are having trouble understanding, review the Getting Help With ActiveData for Excel document that is under the Help menu in ActiveData for Excel InformationActive Inc., Michelle Shein and Richard Lanza 12
13 5. Allow yourself time to understand the results of each test. Begin to imagine how your data will be represented in the reports. Ask yourself: Is the test providing me with enough information to prevent or mitigate the risk? Do I need to add more tests? Does the presentation of the report convey its message effectively? Step 3 Get Data With an understanding of the risk to be mitigated, the test to be performed, and the data required (as stipulated in the What Data Is Needed? section of each fraud detection test) all that is needed is to obtain client data and walk through the same test steps. It is suggested that prior to requesting data that all expected reports be identified so that one request is made of the client. Getting data can be broken into the following logical process steps: Step 3aMaking Arrangements with the Client to Obtain Data Step 3bTransferring the Client s Data Step 3cVerifying the Data Received from the Client Step 3aMaking Arrangements with the Client to Obtain Data You should meet with the appropriate client personnel (generally the primary contact for the fraud detection activity and a key contact in information systems) to make arrangements to obtain the data. Matters to be discussed include: Specific data needed Types of files needed. Common file types include: Comma delimited format, Tab delimited format, Microsoft Access format, and of course, the Microsoft Excel format. Record layout of the file (The fraud detection specialist should arrange to get copies of the record layout which is a simple definition of each data field and where the fields are positioned in the data file). Timing of the transfer. Method of transfer (See Step 3b below). Arrangements for verification information (see Step 3c below). Step 3b - Transferring the Client s Data There are many ways to transfer data to your computer for analysis, depending on the client s system architecture. Examples of possible data transfer methods include: DVD or CD file attachements USB Memory Stick Data Tape FTP or network transfers Web storage (i.e., InformationActive Inc., Michelle Shein and Richard Lanza 13
14 The first three methods are more likely to be used for small PC systems. The last four methods are more likely to be used on larger systems (LANs, minicomputers, or mainframes). However, since we will be using Microsoft Excel in our processing will likely be more moderately sized (up to 1 million rows for Excel 2007) and therefore one of the first three methods will likely suffice. The first two methods are more likely to be used for small PC systems. The last five methods are more likely to be used on larger systems (LANs, minicomputers, or mainframes). However, since we will be using Microsoft Excel in our processing, the files should stay relatively small making a preferable option for sending data. The results of this discussion should be formalized into a request letter as shown below: 2009 InformationActive Inc., Michelle Shein and Richard Lanza 14
15 Mr. X IS Manager ABC Company Dear Mr. X: As part of our investigation, we will be performing certain tests in the X fraud detection area using data extraction software. As we discussed today, we require the X file be available for us on X/X/XXXX. We believe the following fields are required from the file for the period X/X/XXXX to XX/XX/XXXX: List Fields Here If you believe, after looking at the reports we expect to process (Appendix A), that we will need more data fields besides those listed above, please provide these fields in the file extraction. Also, if it would be easier, we can receive the entire files from which we can extract and define our desired fields. We will need this file in an ASCII file format for importing into Microsoft Excel. Therefore, any text file format will be acceptable (tab delimited, comma delimited, fixed-length, and Microsoft Excel). To assist in downloading the file to our PC, we prefer that the file be provided on a CD-ROM or ed to us. We would like to receive the first 100 records of the data file printed out, as well as, a record count for the file. We will be using this information to confirm the proper transfer of the data to our system. Please contact us if you are unclear as to the source or significance of any of the items requested. Thank you for your assistance. Sincerely, Mr. Y Page 2 of Request Letter Appendix A - Expected Reports To Produce Report Name List reports here Expected Completion Date List desired report completion date 2009 InformationActive Inc., Michelle Shein and Richard Lanza 15
16 Step 3cVerifying the Data Received from the Client It is generally good practice to verify client data before processing it. There are two reasons for this. First, the fraud detection specialist can confirm that the data file received from the client is complete and accurate. Second, the fraud detection specialist can ensure that the data has been read correctly by Microsoft Excel. Verification of client data is generally accomplished through one or more of the following procedures: Obtain a printout of the first 100 rows and match on screen to the data file. Compute totals for key data fields (i.e., invoice amount) and agree them to control totals supplied by the client s IS personnel. Agree account totals to general ledger balances. Calculate totals or statistics of the file to determine if the relative size of the activity appears reasonable. Check the sequence (such as, check numbers, inventory part numbers, or invoice numbers) for gaps and/or duplicates. Select a sample of data items and trace the information to client records. Any exceptions, unreconciled amounts, or other indications of problems should be resolved before applying the automated procedures. Step 4 Run It For Real Now that you: Have the data loaded in Excel, Know the data has been verified, Understand the ActiveData for Excel steps to perform based on this publication, all that is needed is to run the procedures on the real data by following the test steps explained in this book. Also, if you want to modify the report slightly or run a new report (based on a new direction that is identified with the data analysis), the concepts learned in this book should allow you to run these new procedures. It is like learning to hammer a nail. Once you can nail into one wooden board, that function can be applied to all types of wooden boards. Let s take a couple of examples: 1) Query Sheet Once you learn how to filter out unwanted records from a paid invoice history file, the same function could be applied to filtering out unwanted customers from a customer table or inventory costs that are too high. 2) Compare Sheets After learning to relate a paid invoice file to a vendor file, you could just as easily relate a customer file to a invoice sales file or customer sale files for two separate years. If you are in need of new areas to apply data analysis in a fraud detection environment, there are many tools available on the Internet such as: 2009 InformationActive Inc., Michelle Shein and Richard Lanza 16
17 AuditSoftware.Net ( - website devoted to the use of all audit software, primarily data analysis. Check out the How To Use Audit Software section for a listing of areas and associated tools to jump start a data analysis program. Proactively Detecting Occupational Fraud Using Computer Audit Reports ( - a free online document designed to assist internal auditors, fraud examiners, and management in implementing computer data analysis routines to improve occupational fraud prevention and detection. The full report provides: A step-by-step process for implementing audit software from the assessment of risk to the ultimate application of software routines. A comprehensive checklist of data analysis reports (over 300) that are associated with each occupational fraud category based on the ACFE's uniform occupational fraud classification system. A report description and data file(s) needed to effectuate each identified report. AuditNet ( - AuditNet is a great source of audit information and probably their strongest relevant toolset is their Auditors Sharing Audit Programs section which is a library of various audit programs. These documents can be reviewed for relevant audit steps that could be automated using data analysis reports. Data Files Included With This Publication The following data files are included with this course and are used by the test descriptions for the respective fraud detection area: General Ledger Data.xls Listing of detailed journal entries posted to a general ledger system. Payables Data.xls Listing of invoice-level detail of paid invoices, as well as, a list of purchase orders, a vendor masterfile, and an employee masterfile. Revenue Data.xls Listing of sales invoices, listing of payments associated to the invoices, as well as, an old and new customer masterfile InformationActive Inc., Michelle Shein and Richard Lanza 17
18 Why Look for Fraud in Accounts Payable? Fraud detection specialists cannot help but be aware how widespread fraud is. Surveys have established that the majority of companies experience a significant fraud every year. But it still may surprise you to hear that, per the 2002 Report to the Nation on Occupational Fraud and Abuse by the Association of Certified Fraud Examiners, losses to fraud in the average company amount to a staggering 6 percent of gross sales. Roughly 45 percent of all fraud involves asset misappropriations of cash in an accounts payable related transaction with an additional 13 percent related to bribery or corruption. This means that 58 percent of 6 percent, or as much as 3.5 percent of gross sales, are lost in this one functional area. Many companies struggle along with profit rates much lower than 3.5 percent! Furthermore, a majority of these misappropriations represent fraudulent vendors, check tampering, and fraudulent expense reimbursements items that proper controls ought to deal with. It has also been found that companies completing internal or external fraud examinations can reduce their median losses from $153,000 to $87,000 or over 40 percent. Based on these statistics, if a company earns $250 million in sales, they lose an average of 6 percent to fraud from all causes ($15 million) of which roughly 45 percent involves misappropriation of accounts payable ($6.8 million). Of this sum, 40 percent might be saved through internal auditing ($2.7 million). Bottom line, if you can clean up fraud within your accounts payable area, you can make an enormous difference. 18
19 1. Above Average Payments To A Vendor Why Are We Running This Test and What To Do With The Results? Unusually large payments to a vendor in relation to the average is a sign of error (i.e., key punch error) or fraud (i.e., kickback scheme where vendor is paid additional amounts that are kicked-back to the employee entering the payment into the system). For vendors with unusual payments above the average, a sample of the average payment invoices, as well as, the unusual payment invoice should be reviewed. The reasonableness of the purchase should be assessed based on the documentation reviewed. The fraud examiner should be keenly aware of the potential for a key punch error regarding the unusual payment and/or the possibility of the vendor purposely overcharging the organization. Calculate vendor invoice averages, to locate all invoice amounts exceeding more than twice the vendor s average. How To Run The Report Step One: Open the worksheet Invoices Paid and select from the ActiveData menu: Analysis-Group Summary Payable Data Fields The following fields are needed from the Invoices Paid sheet for this test: Vendor Number Invoice Amount To make your audit complete you will want to fields in a detail record for further analysis such as the invoice date, purchase order number, check number, and check date. Key Note: The Group Summary dialog box allows up to three fields to sort by. ActiveData for Excel can also include totals for all numeric columns as well when Include Grand Totals Row is selected. Step Two: In the Group Summary dialog box select Vendor Number as the Column to Group by and Invoice Amount as the Column to Total. Complete this step by clicking Finished. The Append Output To Existing Worksheet option which is found in most of the ActiveData for Excel functions dialog boxes, allows the user to choose an existing sheet to add the new records to. If this option isn t selected ActiveData for Excel will build a new worksheet with the output. 19
20 Step Three: In the new Summary of Invoices Paid worksheet add an additional calculated column next to the Count column. This fourth column will calculate the average invoice amount for each vendor record. Use the following equation to calculate the average for the first vendor record. Key Note: Anyone of Excel s copy and paste functions can be used in this exercise when a formula needs to be copied. Copy this expression to the remaining vendor records by double clicking on Excel s auto-fill handle in the calculated cell or by performing copy and paste functions. Step Four: (This step could be combined with step three.) We need to have a column display twice this average amount. In either this forth column or in an additional column have Excel calculate two times the average. e.g. =2* (B2/C2) Copy the expression to all records. Name this column Twice Average. Step Five: We will merge these vendor figures with the Invoices Paid fields to compare these new figures to the individual Invoice Amounts. Return to the Invoices Paid sheet. Select from the ActiveData menu: Sheets-Merge Sheets Step Six: In the Select a Sheet to Merge dialog box select the Summary of Invoices Paid as the sheet to merge with. In the Merge Sheets dialog box (see next page) select the Vendor Number field to identify the field to group by, keep all fields in sheet 1 selected and select the Twice Average field in sheet 2. Click Finished completing the merge. 20
21 Key Note In order to Merge Sheets, the field that is being used (Vendor Number in the example at right) needs to be the same name in both sheets. So, for example, you cannot have Vendor as a column title in one sheet and Vendor Number in the other as they both need to be Vendor Number. ActiveData for Excel has created an additional worksheet that has all the field information from the Invoices Paid sheet and an added column at the right with the amount that is twice the invoice average for each individual vendor. Step Seven: We will now perform the final step to query for records where the Invoice Paid amount exceeds twice the average. From the ActiveData menu select: Sheets-Query Sheet-Query By Formula Step Eight: In the first dialog box click Formula and then in the Query By Formula dialog box build the formula expression: INVOICE_AMOUNT > SummaryOfinvoicespaidTwiceAverage by clicking on the Invoice Amount field followed by the > button and then clicking the field that represents twice the average invoice amount. When you click Finished ActiveData for Excel builds an additional worksheet that contains only those invoice records that have exceeded twice their average invoice amount. 21
22 2. Employee to Vendor Address Match Why Are We Running This Test and What To Do With The Results? This test identifies same/similar fields between the vendor and employee master table in an attempt to identify fraudulent payments to employees. While this test explains how to complete this task for addresses, the same could be done for phone numbers, tax identification numbers, and other personal information. Once the results are produced, the auditor should scan them to determine if there are any valid address matches between the employee and vendor tables. As a next step, a Query Sheet could be performed in ActiveData for Excel of the actual invoices posted to that vendor to determine whether they are fraudulent. Two notes when completing this review are as follows: Since this exercise may detect fraud, it may be beneficial to locate the invoices or vendor information independent of the accounts payable department (who may be culpable for creating the false vendor account) Since it is common to pay employee travel and entertainment expenses or employee advances this should be the key reason to not consider the payments fraudulent. If possible, the vendor file should be filtered for all employee travel and entertainment vendor accounts prior to running this test. Compare the street address for vendors and employees to see if there are any matches. We will first look for an exact match and then we will look for a partial match. How To Run The Report Step One: Open the worksheet Vendor and select from the ActiveData Menu: Sheets-Match Sheets. Step Two: In the Match Sheet dialog box select the Vendor Address field to match against the Employee Address column in the Employee sheet. By using the Range button for Range 1 find the Employee sheet and click on the A column. ActiveData for Excel is prepared to compare and match the address data of the Vendor sheet to the address data of the Employee sheet when you click Finished. Payable Data Fields The following fields are needed from the Vendor sheet for this test: Vendor Number Address The following field is needed from the Employee sheet: Address To follow up with your investigation you will want to look further at other employee and vendor fields to evaluate the matches found. 22
23 Your Notes: Displayed in a new worksheet will be the records from the Vendor sheet where the address data exactly matches the address data from the Employee sheet. There is a good chance that an address in one sheet might be entered slightly differently than an address in a second sheet. Abbreviations are often times used in addresses. We ll continue this test by looking for matches where the left eight characters of both fields match. Step Three: We will merge into one sheet the address data from the Employee sheet with the address data from the Vendor sheet. Note that for this example we are only comparing street information since it is the only detail we have for address data. We have named the column heading in both tables Address. Open the Employee worksheet. From the ActiveData menu select: Sheets-Merge Sheets Step Four: Select the Vendor sheet in the Select a Sheet to Merge dialog box. In the Merge Sheets dialog box Group by the Address field and select all fields in both sheets to merge into one sheet. For this example we are not going to include exact address matches. Check the two Merge Options that look for examples that don t match Sheet1 to Sheet2 and Sheet2 to Sheet1. When you click Finished ActiveData for Excel builds a new worksheet with the Address information and Vendor Numbers. Note: If you didn t perform the exact address match test first, you might want to include all Merge Options in the Merge Sheets dialog box. 23
24 Key Note: Eight characters has been selected for this exercise. By reviewing your address field you might determine that a lower number should be selected. The choice of eight wouldn t find the match of: 45 N. Main Street and 45 North Main Street. In this example four or fewer characters would have to be selected to catch this match. The Address column has both Employee and Vendor addresses. The Vendor Number column identifies the records that belong to a vendor. Step Five: The next step is to see if there is a partial match of the address data. We will add an additional column in this sheet that displays the left eight characters of the Address field. From the ActiveData menu select: Columns-Add Calculated Columns Step Six : In the Add Calculated Column dialog box type in Left Characters as a new column name before clicking the Formula button. Select the Text Function LEFT and then select the Address field for text and 8 for num_chars. LEFT(ADDRESS,8) 24
25 Your Notes: Step Seven: By clicking Finished and then the Add button followed by Finished, ActiveData for Excel adds a column to the open worksheet that contains the first eight characters of the Address field. Step Eight: The last step is to have ActiveData for Excel find duplicate data in this new column. The duplicates found will be of Vendor and or Employee addresses where there is a partial match. From the ActiveData menu select: Analysis-Duplicates. Step Nine: In the Duplicate Item Analysis dialog box select the LeftCharacters Column To Analyze and ask for Extract Duplicates before clicking Finished. ActiveData for Excel builds a new worksheet that has copied records where there were duplicates of the first eight characters of the Address field. Review these records to see if in fact these are the same addresses. With the results of this test we might find two or more employees with similar addresses, two or more vendors with similar addresses or employee addresses that match similar vendor addresses. 25
26 Why Look for Fraud in Revenue? Revenue recognition poses significant risk to fraud examiners, and has contributed to an erosion in the integrity of financial reporting. In recent years, several high-profile incidents of improper revenue recognition attracted the attention of the business media and led to unflattering coverage. Therefore, accounts receivable, and the revenue streams that drive it, is arguably the most risky part of a financial statement audit. Any restatement, due to error or fraud, has the potential to bankrupt an organization. Cash misappropriation fraud, which based on a recent study, accounts for 30% of all fraud. Management is under pressure every day to meet sales and associated income targets. Stock price, management compensation, and analyst/media commitments exacerbate this pressure, so much so that it can persuade management to misstate earnings. Although such misstatements may start as a laissez-faire reading of Generally Accepted Accounting Principles, they tend to snowball into larger and larger entries until they become outright fraud. Therefore, it is no surprise that a 10-year study commissioned by the Committee of Sponsoring Organizations of the Treadway Commission concluded that more than half of frauds involved overstating revenue. This is corroborated by the Association of Certified Fraud Examiner s 2002 Report to the Nation on Occupational Fraud and Abuse. If the business model is sound and industry conditions do not pose a threat, there is nothing for management to feel pressured about. Unfortunately, business models are not realized as they are envisioned and the industry may be highly impacted due to change and competition. Management will be the primary identifiers of these trends but may not be compelled to explain such vulnerabilities with investors or creditors. Thus, it is an imperative for the fraud examiner to not only understand the business and industry conditions, but also to utilize computer assisted tools to identify trends underlying the financial reports. Aside from financial statement fraud explained above, there are three major types of fraud in the accounts receivable/revenue area: Skimming, in which cash is stolen from an organization before it is recorded on the organization s books and records. Cash larceny, in which cash is stolen from an organization after it has been recorded on the organization s books and records. Fraudulent shipments made to employee locations. Using the statistics in the 2002 Report to the Nation on Occupational Fraud and Abuse, a company loses 6% to fraud of which roughly 30% involves misappropriation of accounts receivable/revenue and 40% can be saved through internal auditing. This means that a company with $250 million in sales loses $15 million to fraud, of which $4.5 million involves the misappropriation of accounts receivable/revenue and $1.8 million can be saved through internal auditing. This is a sizable savings which goes straight to the bottom line. This savings excludes the immeasurable benefits of preventing a financial misstatement. 26
27 3. Missing / Unusual Customer Information Why Are We Running This Test and What To Do With The Results? This report will identify changes in the customer masterfile (additions and deletions). Given that most systems do not track the changes in the customer masterfile (there is no "Last Maintained on Date" field), this report sometimes is the only means of determining changes in the customer master. The auditor should review major additions and/or deletions to the customer masterfile. Given that there is a high potential for fraud on newly added customers (i.e., posting false sales invoices to phony customer accounts to inflate period end sales balances), the names and addresses for such customers should be reviewed to those employees having access to enter invoices into the system. This can be done using the accounts payable test also described in this book that matched vendor address to employee address files. Since this exercise may detect fraud, it may be beneficial to locate the invoices or customer files independent of the accounts receivable department (who may be culpable for creating the false customer accounts). Analyze the Customer masterfile to see if there is missing information. This test will also compare information that we have from an old customer file to the new customer file. How To Run The Report Step One: We will first look to see if there is missing data in any of the Customer records. Open the worksheet Customer and select from the ActiveData menu: Rows- Tag Rows-Tag Rows with Blank Cells ActiveData for Excel highlights records in the Customer sheet that have missing data. In our example almost all records have at least one blank data field. To clear the tagged records select from the ActiveData menu: Rows-Clear Tags Revenue Data Fields The following fields are needed from the Customer worksheet for this test: Customer Number TIN T The following additional fields are needed from the Customer-old worksheet for this test: Customer Number Additional fields to facilitate research in either of the two above files include Customer Name and customer Address. 27
28 Step Two: To find records where there is just one missing piece of information we will have ActiveData for Excel tag records with missing TIN data. From the ActiveData menu select: Rows-Tag Rows-Tag Rows By Column Value Key Note: In this exercise we choose to use a Tag Rows function. ActiveData for Excel s query function could have been used as well to isolate the found records. Key Note: ActiveData for Excel s tagging functions can highlight selected records, highlight unselected records and or extract them to a separate sheet. Step Three: In the Tag Rows Where dialog box select the TIN field and leave the value box blank. Click the Finished button to have ActiveData for Excel find records with blank TIN data. In the Customer sheet all records with missing TIN information is highlighted. After viewing this information you may want to Clear Tags. Step Four: With this exercise we will look for Customer Numbers from the Customer sheet unmatched to the Customer-old sheet. From the ActiveData menu select: Sheets-Match Sheets 28
29 Your Notes: Step Five: In the Match Sheet dialog box select the Customer Number field as the field to match between the two sheets. Step Six: Click on the Range button and highlight the Customer Number column in the Customer-old sheet. Step Seven: Click OK in the Select Column dialog box. Change the option button to Extract rows where the selected column doesn t match followed by Finished in the Match Sheet dialog box. ActiveData for Excel builds a new worksheet that contains records from the Customer sheet that doesn t have a matched Customer Number in the Customer-old sheet. You may also want to run the test looking for Customer Numbers in the Customer-old sheet that doesn t match a Customer Number in the Customer sheet. Other tests that you might perform: compare TIN data from one sheet to the other to see if the Tax ID Number was changed or if the TIN was the same from one sheet to another for different Customer Names. 29
30 Why Look for Fraud in General Ledger? The general ledger is the backbone of the financial records, holding every business transaction. Please note that sub-ledgers (i.e., accounts payable, fixed assets, inventory) may post in full detail (i.e., every accounts payable invoice broken out to the actual detail) but normally this sub-ledger activity is summarized on a periodic basis by account and posted. Regardless, the general ledger is a treasure-trove for fraud reduction. The easiest way to commit financial statement fraud is for a high-ranking officer to post a nonstandard journal entry, falsifying the records. That way, the sub-ledger could show the proper balance but such balance could be adjusted at the general ledger level, with the nonstandard entry. Given this fact, a recent audit standard on fraud (SAS 99 Consideration of Fraud in a Financial Statement Audit) and later audit risk alerts point to the specific need to review journal entries in the general ledger. 30
31 4. Stratify General Ledger Detail Information Why Are We Running This Test and What To Do With The Results? Look at the multitude of activities in a general ledger and ask yourself, How can I survey this data in an extremely quick manner while efficiently planning my audit? This test should provide the answer by helping the auditor focus on large dollar postings, while helping to assess the administrative burden from maintaining low dollar activity. The stratification report should be reviewed for: unreasonably large balances where activity could be queried (see Query Sheet feature) for recalculation and proper classification high number of transactions with low accumulated activity for possible consolidation planning detailed testing of the journal entry approval process Run a stratification report on debit records and then on credit records. Query to find the largest debit records. How To Run The Report Step One: To run a stratification report on either debit records only or only credit records query for these records. To find debit records, open the General Ledger sheet and from the ActiveData menu select: Sheets-Query Sheet- Query By Formula Step Two: Click Formula in the first Query By Formula dialog box. In the second Query By Formula dialog box build the following formula: Debits > 0 before clicking Finished twice. General Ledger Fields The following fields are needed from the General Ledger worksheet for this test: Credits Debits To follow up with your audit you will want to look further at other fields to analyze the account and user/preparer involved with this record. 31
32 Your Notes: Step Three: ActiveData for Excel builds a new sheet with records that have debit amounts. Rename this sheet Debits by double clicking on the sheet name and typing in the new name. Step Four: Create another sheet naming it Credits that contains records that have credit amounts. Follow the first three steps of this test using the formula Credits > 0. Step Five: To create the stratification report on debits, open the Debits sheet and from the ActiveData menu select: Analysis- Strata Step Six: In the Stratified Analysis dialog box select the Debits field as the Column To Stratify. Create Bands by entering the following ranges in the >= column and the < column: 0-250, , , , Key Note: Stratification bands may be modified until the desired Count and/or % of Total is achieved. Step Seven: Click the Stratify button to produce the stratification table. 32
33 Your Notes: Step Eight: Click the Finished button to create the Stratified Debits sheet. Step Nine: To create the Stratified Credits sheet, open the Credits sheet repeat steps five through eight this time using the Credits field as the Column To Stratify. Step Ten: Reviewing the Stratified Debits sheet you can see that over 96% of the debit total comes from debits over $1,000,000. Create a sheet that contains these records to further analyze the largest debit records. Open the Debits sheet and from the ActiveData menu select: Sheets-Query Sheet-Query By Formula Step Eleven: Click Formula in the first Query By Formula dialog box. In the second Query By Formula dialog box build the following formula: Debits > before clicking Finished twice. ActiveData for Excel creates a new worksheet that contains the largest debit records. Renaming this sheet and sorting it in descending debit order may be helpful when you refer to this sheet in your research of general ledger records. 33
34 5. Identify Nonstandard Journal Entries Made After Year End Why Are We Running This Test and What To Do With The Results? Nonstandard journal entries generally are those that are posted manually (rather than through an automated feed from a fixed asset or accounts receivable subledger). Such entries are more prone to error and fraud due mainly to the human error, judgment normally being applied in the support for the entry, and the possibility for management override in authorizing the entry. This is especially true for entries made just after year end (related to the prior year) as these entries are more prone to be adjustments for the fiscal year s annual reporting. Given the above, the test of these entries should include: Reviewing the journal entry and associated supporting documentation Ensuring the approvals are appropriate for the size and nature of the journal entry Assessing whether Generally Accepted Accounting Principles ( GAAP ) are being applied Locate all manual entry records entered after year end and then summarize debits and credits by account. How To Run The Report Step One: To locate and analyze account records after 12/31/03 open the General Ledger sheet and from the ActiveData menu select: Sheets-Query Sheet-Query By Formula Step Two: Click Formula in the first Query By Formula dialog box. In the second Query By Formula dialog box build the following formula: UserPreparer ="Manual Entry" AND PostDate > DATE(2003,12,31). before clicking Finished twice. General Ledger Fields The following fields are needed from the Invoices worksheet for this test: User/Preparer Post Date Journal Entry Credits Debits Account Number ActiveData for Excel builds a new sheet named Query From General Ledger. 34
35 Your Notes: Step Three: To review account information, open the Query From General Ledger sheet and from the ActiveData menu select: Analysis-Group Summary Step Four: In the Group Summary dialog box select the AccountNumber field as the Column To Analyze and select both the Debits and Credits fields before clicking Finished. ActiveData for Excel creates a Summary Of Query From General Ledger sheet. The new sheet contains account records with summed debit and credit amounts. To make it easier to analyze this information you may wish to sort the records. 35
Comparison of Generalized Audit Software
Comparison of Generalized Audit Software In today s modern and computerized world even small companies have huge numbers of financial transactions going through the books. As an (external) auditor, it
Fraud data interrogation tools: COMPARING BEST SOFTWARE FOR FRAUD EXAMINATIONS
Fraud data interrogation tools: COMPARING BEST SOFTWARE FOR FRAUD EXAMINATIONS By Rich Lanza, CFE, CPA, PMP Fraud examiners now have a wide choice of data interrogation tools they can use themselves without
Using Excel as an Audit Software
This content was specifically designed for use and free distribution on A community of professionals helping you to maximize the benefits of audit software By Richard B. Lanza, CPA, PMP TABLE OF CONTENTS
In search of Excellence Series Research - Study Material No. 18
ACHIEVING EXCELLENCE IN AUDIT AND ACCOUNTS THROUGH DEVELOPING, IMPARTING, PRACTICING AND UPGRADING SKILLS AND COMPETENCES In search of Excellence Series Research - Study Material No. 18 Preface In Search
Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6
Table of Contents Data Analysis Then & Now 1 Changing of the Guard 2 New Generation 4 Core Data Analysis Tasks 6 Data Analysis Then & Now Spreadsheets remain one of the most popular applications for auditing
Use of Data Extraction & Analysis Software In a Financial Statement Audit
Use of Data Extraction & Analysis Software In a Financial Statement Audit A Message from The Audit Wizard April 2008 Making Auditors Proficient, Inc. Phone: 352-750-9636 www.billallen.com E-mail: [email protected]
In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
Completing an Accounts Payable Audit With ACL (Aired on Feb 15)
AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired
Tommy B. Harrington 104 Azalea Drive Greenville, NC 27858 Email: [email protected]
M o s t U s e f u l E x c e l C o m m a n d s Tommy B. Harrington 104 Azalea Drive Greenville, NC 27858 Email: [email protected] Computer Training YOU Can Understand! Most Useful Excel Commands
Excel Database Management Microsoft Excel 2003
Excel Database Management Microsoft Reference Guide University Technology Services Computer Training Copyright Notice Copyright 2003 EBook Publishing. All rights reserved. No part of this publication may
TheFinancialEdge. Reports Guide for General Ledger
TheFinancialEdge Reports Guide for General Ledger 101514 2014 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,
Data analysis for Internal Audit
Data analysis for Internal Audit What is Data Analytics Analytics is the process of obtaining an optimal or realistic decision based on existing data. Wikipedia Data analytics is the science of examining
EXCEL PIVOT TABLE David Geffen School of Medicine, UCLA Dean s Office Oct 2002
EXCEL PIVOT TABLE David Geffen School of Medicine, UCLA Dean s Office Oct 2002 Table of Contents Part I Creating a Pivot Table Excel Database......3 What is a Pivot Table...... 3 Creating Pivot Tables
Polar Help Desk 4.1. User s Guide
Polar Help Desk 4.1 User s Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or
Internal Audit Tools. Selected Add-ins and Utility Programs for Increasing Audit Effectiveness and Efficiency
Internal Audit Tools Selected Add-ins and Utility Programs for Increasing Audit Effectiveness and Efficiency Agenda Excel Add-ins Spreadsheet IQ Active Data Spreadsheet Professional XL Audit Commander
ACCESS 2007. Importing and Exporting Data Files. Information Technology. MS Access 2007 Users Guide. IT Training & Development (818) 677-1700
Information Technology MS Access 2007 Users Guide ACCESS 2007 Importing and Exporting Data Files IT Training & Development (818) 677-1700 [email protected] TABLE OF CONTENTS Introduction... 1 Import Excel
EXCEL 2007. Using Excel for Data Query & Management. Information Technology. MS Office Excel 2007 Users Guide. IT Training & Development
Information Technology MS Office Excel 2007 Users Guide EXCEL 2007 Using Excel for Data Query & Management IT Training & Development (818) 677-1700 [email protected] http://www.csun.edu/training TABLE
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Sample- for evaluation purposes only! Advanced Excel. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2012 Advanced Excel TeachUcomp, Inc. it s all about you Copyright: Copyright 2012 by TeachUcomp, Inc. All rights reserved. This publication,
Excel Working with Data Lists
Excel Working with Data Lists Excel Working with Data Lists Princeton University COPYRIGHT Copyright 2001 by EZ-REF Courseware, Laguna Beach, CA http://www.ezref.com/ All rights reserved. This publication,
Copyright 2006 ACL Services Ltd. All rights reserved.
getting started getting started Copyright 2006 ACL Services Ltd. All rights reserved. No part of these materials may be reproduced, stored in a retrieval system, or transmitted, in any form or by any
Creating Basic Reports with the SAP Query Tool
CHAPTER Creating Basic Reports with the SAP Query Tool In this chapter The SAP Query Tool 24 Creating a Basic List Query by Using the SAP Query Tool 24 Reviewing the Options on Each of the Five Basic Screens
STUDENT MANUAL. Word 2013: Mail Merge and Macros. Towson University. Office of Technology Services. OTS Training
STUDENT MANUAL Word 2013: Mail Merge and Macros Towson University Office of Technology Services OTS Training Word 2013: Mail Merge and Macros Word 2013: Mail Merge and Macros Part Number: 222777 Course
How To Create A Report On A Pc Or Macbook
TheFinancialEdge Reports Guide for Accounts Payable 041813 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,
Sample- for evaluation purposes only. Advanced Crystal Reports. TeachUcomp, Inc.
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2011 Advanced Crystal Reports TeachUcomp, Inc. it s all about you Copyright: Copyright 2011 by TeachUcomp, Inc. All rights reserved.
Chapter 7: Solutions. Multiple Choice Questions From CPA Examinations. 7-27 a. (2) b. (1) c. (4) d. (4) 7-28 a. (3) b. (3) c. (4) d.
Chapter 7: Solutions Multiple Choice Questions From CPA Examinations 7-27 a. (2) b. (1) c. (4) d. (4) 7-28 a. (3) b. (3) c. (4) d. (4) Discussion Questions And Problems 7-29 a. 1. External 7. Internal
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
Auditing E-Business: Challenges and Opportunities
E-Commerce White Paper Auditing E-Business: Challenges and Opportunities ACL Services Ltd. 1550 Alberni St. Vancouver, BC, Canada V6G 1A5 Tel: +1-604-669-4225 Fax: +1-604-669-3557 E-mail: [email protected]
ACL Command Reference
ACL Command Reference Test or Operation Explanation Command(s) Key fields*/records Output Basic Completeness Uniqueness Frequency & Materiality Distribution Multi-File Combinations, Comparisons, and Associations
warpct.com Working with MS Excel 2003 Workbook courseware by WARP! Computer Training
warpct.com courseware by WARP! Computer Training Working with MS Excel 2003 Workbook Welcome! Thank you for evaluating a portion of this workbook. If you have any questions or comments regarding our training
TheFinancialEdge. Reports Guide for Accounts Receivable
TheFinancialEdge Reports Guide for Accounts Receivable 041813 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or
Creating Tables ACCESS. Normalisation Techniques
Creating Tables ACCESS Normalisation Techniques Microsoft ACCESS Creating a Table INTRODUCTION A database is a collection of data or information. Access for Windows allow files to be created, each file
Calc Guide Chapter 9 Data Analysis
Calc Guide Chapter 9 Data Analysis Using Scenarios, Goal Seek, Solver, others Copyright This document is Copyright 2007 2011 by its contributors as listed below. You may distribute it and/or modify it
Excel Companion. (Profit Embedded PHD) User's Guide
Excel Companion (Profit Embedded PHD) User's Guide Excel Companion (Profit Embedded PHD) User's Guide Copyright, Notices, and Trademarks Copyright, Notices, and Trademarks Honeywell Inc. 1998 2001. All
Check out our website!
Check out our website! www.nvcc.edu/woodbr idge/computer-lab Contact Us Location: Open Computer Lab Seefeldt Building #336 NOVA Woodbridge Campus Hussna Azamy (OCL Supervisor) Phone: 703-878-5714 E-mail:
Unicenter Patch Management
Unicenter Patch Management Best Practices for Managing Security Updates R11 This documentation (the Documentation ) and related computer software program (the Software ) (hereinafter collectively referred
EMC Smarts Network Configuration Manager
EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015
Table of Contents. Search Results.21. Equipment Change Request...10 Equipment Removal Request...11 Disposed..12 Not found 12
Table of Contents Logging in.. 3 DIIT Online Service Desk Website...3 Asset Inventory Menu for Site.....4 Assets Summary Listing (HTML/Excel)... 4 Assets Summary by Room..6 Search / Edit / Remove Assets...7
Microsoft Access Rollup Procedure for Microsoft Office 2007. 2. Click on Blank Database and name it something appropriate.
Microsoft Access Rollup Procedure for Microsoft Office 2007 Note: You will need tax form information in an existing Excel spreadsheet prior to beginning this tutorial. 1. Start Microsoft access 2007. 2.
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 [email protected]
Introduction to ProSMART: Proforma s Sales Marketing and Relationship Tool How to Log On and Get Started
Introduction to ProSMART: Proforma s Sales Marketing and Relationship Tool How to Log On and Get Started ProSMART - 2/20/2002 1 Table of Contents INTRODUCING PROSMART: PROFORMA S SALES MARKETING AND RELATIONSHIP
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Horizon Debt Collect. User s and Administrator s Guide
Horizon Debt Collect User s and Administrator s Guide Microsoft, Windows, Windows NT, Windows 2000, Windows XP, and SQL Server are registered trademarks of Microsoft Corporation. Sybase is a registered
Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1
Business Portal for Microsoft Dynamics GP 2010 User s Guide Release 5.1 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and
Intro to Mail Merge. Contents: David Diskin for the University of the Pacific Center for Professional and Continuing Education. Word Mail Merge Wizard
Intro to Mail Merge David Diskin for the University of the Pacific Center for Professional and Continuing Education Contents: Word Mail Merge Wizard Mail Merge Possibilities Labels Form Letters Directory
Tabs3, PracticeMaster, and the pinwheel symbol ( trademarks of Software Technology, Inc. Portions copyright Microsoft Corporation
Tabs3 Trust Accounting Software Reseller/User Tutorial Version 16 for November 2011 Sample Data Copyright 1983-2013 Software Technology, Inc. 1621 Cushman Drive Lincoln, NE 68512 (402) 423-1440 http://www.tabs3.com
Microsoft Access Basics
Microsoft Access Basics 2006 ipic Development Group, LLC Authored by James D Ballotti Microsoft, Access, Excel, Word, and Office are registered trademarks of the Microsoft Corporation Version 1 - Revision
APPLYING BENFORD'S LAW This PDF contains step-by-step instructions on how to apply Benford's law using Microsoft Excel, which is commonly used by
APPLYING BENFORD'S LAW This PDF contains step-by-step instructions on how to apply Benford's law using Microsoft Excel, which is commonly used by internal auditors around the world in their day-to-day
How To Create A Powerpoint Intelligence Report In A Pivot Table In A Powerpoints.Com
Sage 500 ERP Intelligence Reporting Getting Started Guide 27.11.2012 Table of Contents 1.0 Getting started 3 2.0 Managing your reports 10 3.0 Defining report properties 18 4.0 Creating a simple PivotTable
HorseTrak Accounting System
HorseTrak Accounting System For Users of HT Gold and HT Deluxe General In this manual we explain the operation of the accounting features of HorseTrak Software. While teaching the principles of accounting
Sample- for evaluation only. Advanced Excel. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2010 Advanced Excel TeachUcomp, Inc. it s all about you Copyright: Copyright 2010 by TeachUcomp, Inc. All rights reserved. This publication,
APPENDIX B: FEMA 452: Risk Assessment Database V5.0. User Guide
APPENDIX B: FEMA 452: Risk Assessment Database V5.0 User Guide INTRODUCTION... 5 DATABASE ADMINISTRATOR INFORMATION... 6 INSTALLATION PROCESS... 8 USE OF THE DATABASE... 10 OPENING THE DATABASE... 12 FACILITY
Microsoft Dynamics GP. Bank Reconciliation
Microsoft Dynamics GP Bank Reconciliation Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
How to Create a Spreadsheet With Updating Stock Prices Version 3, February 2015
How to Create a Spreadsheet With Updating Stock Prices Version 3, February 2015 by Fred Brack In December 2014, Microsoft made changes to their online portfolio management services, changes widely derided
Access 2003 Introduction to Queries
Access 2003 Introduction to Queries COPYRIGHT Copyright 1999 by EZ-REF Courseware, Laguna Beach, CA http://www.ezref.com/ All rights reserved. This publication, including the student manual, instructor's
Indiana County Assessor Association Excel Excellence
Indiana County Assessor Association Excel Excellence Basic Excel Data Analysis Division August 2012 1 Agenda Lesson 1: The Benefits of Excel Lesson 2: The Basics of Excel Lesson 3: Hands On Exercises Lesson
Converting an Excel Spreadsheet Into an Access Database
Converting an Excel Spreadsheet Into an Access Database Tracey L. Fisher Personal Computer and Software Instructor Butler County Community College - Adult and Community Education Exceeding Your Expectations..
Use Find & Replace Commands under Home tab to search and replace data.
Microsoft Access 2: Managing Data in Tables and Creating Relationships You have created tables in an Access database. Data in Access tables can be added, deleted, and updated to be current (practiced in
Sample- for evaluation only. Introductory Access. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2010 Introductory Access TeachUcomp, Inc. it s all about you Copyright: Copyright 2010 by TeachUcomp, Inc. All rights reserved. This
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
TheFinancialEdge. Administration Guide
TheFinancialEdge Administration Guide 102011 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including
Better Business Through Data Analysis & Monitoring
CaseWare Analytics is an industry leader in providing technology solutions for audit and finance professionals, with over 400,000 users worldwide. Better Business Through Data Analysis & Monitoring 469
Introduction to Client Online. Factoring Guide
Introduction to Client Online Factoring Guide Contents Introduction 3 Preparing for Go live 3 If you have any questions 4 Logging In 5 Welcome Screen 6 Navigation 7 Navigation continued 8 Viewing Your
VERSION NINE. Be A Better Auditor. You Have The Knowledge. We Have The Tools. NEW FEATURES AND ENHANCEMENTS
VERSION NINE Be A Better Auditor. You Have The Knowledge. We Have The Tools. NEW FEATURES AND ENHANCEMENTS IDEA VERSION NINE NEW FEATURES ENHANCEMENTS CaseWare, the global leader in audit analytics software,
Building a Human Resources Portal using Microsoft Business Portal
Building a Human Resources Portal using Microsoft Business Portal Published: March 2005 Table of contents Introduction...1 What is an HR Portal?...1 Why create an HR Portal?...3 Reduce administrative costs...3
Unemployment Insurance Data Validation Operations Guide
Unemployment Insurance Data Validation Operations Guide ETA Operations Guide 411 U.S. Department of Labor Employment and Training Administration Office of Unemployment Insurance TABLE OF CONTENTS Chapter
CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud
CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,
2002 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or
041902 2002 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying, recording, storage
Creating A Grade Sheet With Microsoft Excel
Creating A Grade Sheet With Microsoft Excel Microsoft Excel serves as an excellent tool for tracking grades in your course. But its power is not limited to its ability to organize information in rows and
TheFinancialEdge. Administration Guide
TheFinancialEdge Administration Guide 110309 2009 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including
Introduction to Microsoft Access 2003
Introduction to Microsoft Access 2003 Zhi Liu School of Information Fall/2006 Introduction and Objectives Microsoft Access 2003 is a powerful, yet easy to learn, relational database application for Microsoft
TheFinancialEdge. Records Guide for General Ledger
TheFinancialEdge Records Guide for General Ledger 061015 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,
Getting Started Guide SAGE ACCPAC INTELLIGENCE
Getting Started Guide SAGE ACCPAC INTELLIGENCE Table of Contents Introduction... 1 What is Sage Accpac Intelligence?... 1 What are the benefits of using Sage Accpac Intelligence?... 1 System Requirements...
CORE Oklahoma. State of Oklahoma COR118 Accounts Payable Inquiry and Reporting Manual. Revised: October 1, 2007
State of Oklahoma COR118 Accounts Payable Inquiry and Reporting Manual COR118 Accounts Payable Inquiry and Reporting Page 1 of 48 Authorized by: [_CORE_] Original Issue: [11/17/2003] Maintained by: [ Accounts
Excel 2010: Create your first spreadsheet
Excel 2010: Create your first spreadsheet Goals: After completing this course you will be able to: Create a new spreadsheet. Add, subtract, multiply, and divide in a spreadsheet. Enter and format column
Web Intelligence User Guide
Web Intelligence User Guide Office of Financial Management - Enterprise Reporting Services 4/11/2011 Table of Contents Chapter 1 - Overview... 1 Purpose... 1 Chapter 2 Logon Procedure... 3 Web Intelligence
SKYLINE FACILITIES MAINTENANCE. Quick Start Training
SKYLINE FACILITIES MAINTENANCE Quick Start Training Copyright 2008 SS&C Technologies, Inc. All Rights Reserved. SKYLINE Facilities Maintenance Quick Start Training This document contains confidential and
Inventory Control System Administration Manual
Inventory Control System Administration Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia
BreezingForms Guide. 18 Forms: BreezingForms
BreezingForms 8/3/2009 1 BreezingForms Guide GOOGLE TRANSLATE FROM: http://openbook.galileocomputing.de/joomla15/jooml a_18_formulare_neu_001.htm#t2t32 18.1 BreezingForms 18.1.1 Installation and configuration
Microsoft Excel 2007 Consolidate Data & Analyze with Pivot Table Windows XP
Microsoft Excel 2007 Consolidate Data & Analyze with Pivot Table Windows XP Consolidate Data in Multiple Worksheets Example data is saved under Consolidation.xlsx workbook under ProductA through ProductD
Creating and Using Databases with Microsoft Access
CHAPTER A Creating and Using Databases with Microsoft Access In this chapter, you will Use Access to explore a simple database Design and create a new database Create and use forms Create and use queries
Using Oracle Time Management. Release 11.i A77086-01
Using Oracle Time Management Release 11.i A77086-01 Using Oracle Time Management, Release 11.i (A77086-01) Copyright Oracle Corporation 1999 Primary Author: Joycelyn Smith. Contributing Authors: Linda
User Manual - Sales Lead Tracking Software
User Manual - Overview The Leads module of MVI SLM allows you to import, create, assign and manage their leads. Leads are early contacts in the sales process. Once they have been evaluated and assessed,
Time & Attendance for ADP Workforce Now. Automatic Data Processing, LLC. ES Canada
Time & Attendance for ADP Workforce Now Automatic Data Processing, LLC. ES Canada ADP s Trademarks The ADP Logo, ADP, ADP Workforce Now and IN THE BUSINESS OF YOUR SUCCESS are registered trademarks of
SPSS: Getting Started. For Windows
For Windows Updated: August 2012 Table of Contents Section 1: Overview... 3 1.1 Introduction to SPSS Tutorials... 3 1.2 Introduction to SPSS... 3 1.3 Overview of SPSS for Windows... 3 Section 2: Entering
View Payments. User Guide. Online Merchant Services
View Payments User Guide Online Merchant Services Copyright Statement Copyright 2010 by American Express Company. All rights reserved. No part of this document may be reproduced in any form or by any electronic
Fighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: [email protected] Copyright 2008 Leonard Vona and Fraud
How To Use Cleanersmate Software On A Pc Or Mac Or Macbook Or Macintosh (For Pc Or Pc) With A Computer Or Mac (For Mac) With An Ipa Or Mac Xp (For A Mac) On A Computer With
User Guide Installation... 2 Using CleanersMate... 3 Initial Settings... 3 Clients... 3 Clients Summary Screen... 4 Adding a New Client... 4 Deleting an Existing Client... 4 Editing an Existing Client...
Word 2010: Mail Merge to Email with Attachments
Word 2010: Mail Merge to Email with Attachments Table of Contents TO SEE THE SECTION FOR MACROS, YOU MUST TURN ON THE DEVELOPER TAB:... 2 SET REFERENCE IN VISUAL BASIC:... 2 CREATE THE MACRO TO USE WITHIN
ACADEMIC TECHNOLOGY SUPPORT
ACADEMIC TECHNOLOGY SUPPORT Microsoft Excel: Tables & Pivot Tables [email protected] 439-8611 www.etsu.edu/ats Table of Contents: Overview... 1 Objectives... 1 1. What is an Excel Table?... 2 2. Creating Pivot
TheFinancialEdge. Configuration Guide for Accounts Payable
TheFinancialEdge Configuration Guide for Accounts Payable 102312 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic,
CHAPTER 6: ANALYZE MICROSOFT DYNAMICS NAV 5.0 DATA IN MICROSOFT EXCEL
Chapter 6: Analyze Microsoft Dynamics NAV 5.0 Data in Microsoft Excel CHAPTER 6: ANALYZE MICROSOFT DYNAMICS NAV 5.0 DATA IN MICROSOFT EXCEL Objectives The objectives are: Explain the process of exporting
Chapter 2 The Data Table. Chapter Table of Contents
Chapter 2 The Data Table Chapter Table of Contents Introduction... 21 Bringing in Data... 22 OpeningLocalFiles... 22 OpeningSASFiles... 27 UsingtheQueryWindow... 28 Modifying Tables... 31 Viewing and Editing
Moving Data Between Access and Excel
Moving Data Between Access and Excel This document provides basic techniques for exchanging data between Microsoft Access and Excel. Transferring from Excel to Access To bring data into Access from Excel,
BillQuick Microsoft Office Accounting
Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Microsoft Office Accounting Integration Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505
AN INTEGRATED APPROACH TO TEACHING SPREADSHEET SKILLS. Mindell Reiss Nitkin, Simmons College. Abstract
AN INTEGRATED APPROACH TO TEACHING SPREADSHEET SKILLS Mindell Reiss Nitkin, Simmons College Abstract As teachers in management courses we face the question of how to insure that our students acquire the
Accounts Receivable: Importing Remittance Data
Updated December 2015 Contents...3 Getting Started...3 Configuring the Excel Spreadsheet...3 Importing the Data...5 2015 ECi Software Solutions, Inc. This feature lets you import check remittance information
Invoicing User s Guide
Invoicing User s Guide Last updated: September 2010 PayPal Invoicing User s Guide Document Number: 10115.en_US-201009 2010 PayPal, Inc. All rights reserved. PayPal is a registered trademark of PayPal,
SAS. Cloud. Account Administrator s Guide. SAS Documentation
SAS Cloud Account Administrator s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Cloud: Account Administrator's Guide. Cary, NC:
