Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6



Similar documents
Comparison of Generalized Audit Software

Fraud data interrogation tools: COMPARING BEST SOFTWARE FOR FRAUD EXAMINATIONS

In search of Excellence Series Research - Study Material No. 18

Using Excel as an Audit Software

Using Data Analytics to Detect Fraud

Data analysis for Internal Audit

3. Current Auditing Computerized Tools

Internal Audit Tools. Selected Add-ins and Utility Programs for Increasing Audit Effectiveness and Efficiency

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

Better Business Through Data Analysis & Monitoring

ACL Command Reference

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

Benford s Law and Digital Frequency Analysis

VERSION NINE. Be A Better Auditor. You Have The Knowledge. We Have The Tools. NEW FEATURES AND ENHANCEMENTS

Microsoft Excel 2007 Mini Skills Overview of Tables

Qi Liu Rutgers Business School ISACA New York 2013

APPLYING BENFORD'S LAW This PDF contains step-by-step instructions on how to apply Benford's law using Microsoft Excel, which is commonly used by

TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL

Chapter 6: Developing a Proper Audit Trail for your EBS Environment

VERSION NINE. Be A Better Auditor. You Have The Knowledge. We Have The Tools. PRODUCT PROFILE

MANUAL AUDIT SAMPLING

Auditing Applications. ISACA Seminar: February 10, 2012

Microsoft Confidential

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

LIST OF TABLES. Table No. Table Name Page No Frequency tables on customization of services 56

How To Create A Report In Excel

Copyright 2006 ACL Services Ltd. All rights reserved.

Learn the Secrets Behind Turning Excel Analysis into Powerful, Trusted Report Analytics

Directions for the AP Invoice Upload Spreadsheet

Accurate identification and maintenance. unique customer profiles are critical to the success of Oracle CRM implementations.

Fraud Workshop Finding the truth in the transactions

Foundations of Business Intelligence: Databases and Information Management

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Use of Data Extraction & Analysis Software In a Financial Statement Audit

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

XI XI. Community Reinvestment Act Sampling Guidelines. Sampling Guidelines CRA. Introduction

How To Merge Multiple Reports In Jonas With Excel

STATISTICA. Financial Institutions. Case Study: Credit Scoring. and

Directions for the Well Allocation Deck Upload spreadsheet

Course MIS. Foundations of Business Intelligence

Inquisite Reporting Plug-In for Microsoft Office. Version 7.5. Getting Started

Data Discovery & Documentation PROCEDURE

Contents. xiii xv. Case Studies Preface

Fraud Prevention and Detection in a Manufacturing Environment

Why is Internal Audit so Hard?

White Paper: FSA Data Audit

THE AUDITOR S RESPONSES TO ASSESSED RISKS

Audit Phases. Phase 1: Planning and Risk Identification

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*

SPSS: Getting Started. For Windows

Security and Control Issues within Relational Databases

Sage 200 Business Intelligence Datasheet

THE ABC S OF DATA ANALYTICS

Oracle Database: SQL and PL/SQL Fundamentals NEW

Accounts Receivable Invoice Upload

Continuous Auditing with Data Analytics

Oracle Database: Introduction to SQL

Oracle SQL. Course Summary. Duration. Objectives

By: Peter K. Mulwa MSc (UoN), PGDE (KU), BSc (KU)

Audit Program for Accounts Payable and Purchases

Oracle Database: Introduction to SQL

An Auditor s Guide to Data Analytics

In This Issue: Excel Sorting with Text and Numbers

Self-checks and Controls in spreadsheets

Foundations of Business Intelligence: Databases and Information Management

Understanding Confidence Intervals and Hypothesis Testing Using Excel Data Table Simulation

Foundations of Business Intelligence: Databases and Information Management

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

MODULE 2: SMARTLIST, REPORTS AND INQUIRIES

Oracle Database: SQL and PL/SQL Fundamentals

Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT Learning Objectives

Data Analytics For the Restaurant Industry

4. The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A Between Tables

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Nominal Ledger. Month End Procedures

Commonly Used Excel Functions. Supplement to Excel for Budget Analysts

InfiniteInsight 6.5 sp4

Computer Assisted Audit Group A Guide to Computer Assisted Audit Techniques

Module 9 Ad Hoc Queries

Accounts Payable Automation: Top 9 Reasons to Automate: The Essential Guide to Why Your Business Needs to Automate its Invoice Processing.

Customer Analytics. Turn Big Data into Big Value

Ad Hoc Advanced Table of Contents

Invoice Number Vendor Number Amount A $1, A $1,035.71

Tommy B. Harrington 104 Azalea Drive Greenville, NC

Process Control Optimisation with SAP

IT Enabled System : Opportunities & Challenges for Assurance Professionals

User Guide. Trade Finance Global. Reports Centre. October nordea.com/cm OR tradefinance Name of document 8/8 2015/V1

auditing in a computer-based

Foundations of Business Intelligence: Databases and Information Management

Transcription:

Table of Contents Data Analysis Then & Now 1 Changing of the Guard 2 New Generation 4 Core Data Analysis Tasks 6

Data Analysis Then & Now Spreadsheets remain one of the most popular applications for auditing and fraud detection, due to its convenience. Originally designed for financial modeling and budgeting, it is still widely used for database manipulation and internal audit activities. However, as best practices and mandates of the internal audit and fraud detection professions With have matured, so have the reliance on spreadsheets diminished. With new directives from executive management to provide accurate and timely fact-based assessments, the savings typically associated with spreadsheets have become more an illusion than reality. Even though the investment for spreadsheet technology is low and the tool is familiar, the issues of data errors, record input limitations, and slow speed of analysis represent much greater hidden costs to the organization. With the increasing volume of transactions flowing through organizations today, the accurate examination of individual transactions is of paramount importance. Often times this cannot be accomplished using only spreadsheet analysis. Without the complete picture of honest data, organizations are more susceptible to fraud and abuse, possibly resulting in negative consequences. As a result of all of these adjustments, the company s third-quarter loss increased by $9 million there were too many zeros added to the employee s accrued severance. But it was an accrual. There was never a payment. Company Spokesperson, Multi-national equipment and services company, commenting on a severance error traced to a faulty spreadsheet that resulted in a $9 million loss and restructuring of the company earnings. For more insights on companies who have endured costly spreadsheet errors, visit: http://www.eusprig.org/stories.htm DRIVING BETTER DATA ANALYSIS 1

Changing of the Guard Attributes, such as ease of data input and manipulation that have made spreadsheets such a gift for people wanting to do data entry has become a curse for people needing to do thorough data analysis. Some of the primary reasons why more people are looking beyond spreadsheets for data analysis are: 1. Lack of Data Integrity Data values can be easily altered, in a number of ways, often times by accident and sometimes deliberately. Formula errors across spreadsheets also make the analysis logic prone to mistakes. Even the simple process of pulling data from different systems and formats into a spreadsheet can create errors. 2. Slow Data Analysis Analyzing millions or even billions of columns of data with spreadsheets is often sluggish or non-existent, due to its record limitations. Today s data comes in varying sizes and types; merging data across spreadsheets to get the true view of the data or for simply conducting analysis remains a complex task and requires many steps. The process also lends to manual errors. Example: Aging Formula Use the Age Band column as the column field in the Pivot Table. The oldest (i.e., first) date should be older than the oldest record. For simplicity, use 1 (1/1/1900) as the date. This will represent the X days + band. DRIVING BETTER DATA ANALYSIS 2

Changing of the Guard 3. No Security, Non-Compliance Due to the inherently risky and unsecure nature of spreadsheets, they pose a threat to proper retention of records. Most audit and compliance programs have strict standards and guidelines regarding retention and reliability of information. As a spreadsheet gets emailed along, users tend to have their own duplicates and possibly conflicting copies. There is no proper way to track the copying and pasting of data and formulas across spreadsheets or data input from multiple sources. The inability to track edits hampers spreadsheets in meeting industry standards for achieving high levels of assurance or compliance. In order to be suitable, information must be relevant, reliable and timely. COSO Guidance on Monitoring Internal Control Systems, Volume II: Application DRIVING BETTER DATA ANALYSIS 3

New Generation Internal auditors and fraud detection analysts have started using audit purpose built solutions to aid in analysis, to help manage the new responsibilities of capturing and providing more frequent business insights, as these solutions can provide: 1. Reliable and Accurate Data Data Access: Data Integrity: Get data from any source, such as text files (flat files generated from ERP stems), MS Access, MS Excel, SAP, Oracle, SQL, JD Edwards, or na ve PDF formats. Source data is protected and data access is readonly. This ensures reliable data. 2. Quick Analysis Audit Specific Tasks: Processing Power: Without needing to program intricate macros or mul ple pivot tables, algorithms exist to readily perform tests, simply by selec ng a task. Examples include tasks to do duplicate and gap detec on, join and relate databases, stra fy, or Benford s Law analysis. An infinite number of records can be read and processed in seconds. Example: Aging DRIVING BETTER DATA ANALYSIS 4

New Generation 3. Security & Compliance Audit Trails: Keep a record of all changes made and maintain an audit trail or log of all opera ons carried out on a database, including file and format imported, the type of analysis performed, and result created. Once imported, analyzing and extraction can be performed easily on the data to target the audit risks. You can manipulate the data without affecting the integrity of the original database and allows you to search for anomalies in an entire population, instead of just a sample of the population. Director, Audit Firm, on the capabilities of Audit Purpose Built solutions DRIVING BETTER DATA ANALYSIS 5

Core Data Analysis Tasks Tasks Description Spreadsheets IDEA Append/Merge Calculated Field/ Functions Cross Tabulate Export Extract/Filter Index/Sort Summarize Aging Benford s Law Duplicates Gaps Join/Relate Sample Stratify Combines two files with identical fields into a single file. For example, merge two years worth of accounts payable history into one file. Creates expressions or computed fields in order to calculate or recalculate key values. For example, the net pay to an employee could be recalculated using the gross pay field and deducting any withholdings/taxes. Allows you to analyze Character fields by setting them in rows and columns. By cross-tabulating Character fields, you can produce various summaries, explore areas of interest, and accumulate Numeric fields. Creates a new file that can be used in another software format. For example, export information to MS Word. Extracts specified items from one file and copies them to another file, normally using an IF statement. For example, extracting all account balances over a predefined limit. Sorts a file in ascending or descending order. For example, sorting a file by social security number to see if any blank or 999999999 numbers exist. Accumulates numerical values based on a specified key field. For example, summarizing travel and entertainment expense amounts by employee to identify unusually high payment amounts. Produces aged summaries of data based on established cutoff dates. Finds abnormal duplications of specific digits and round numbers in corporate data, based on a deviation from the expected frequencies as inferred from Benford s Law. Identifies duplicate items within a specified field in a file. For example, identify duplicate billings of invoices within the sales file. Identifies gaps within a specified field in a file. For example, identify any gaps in check number sequence. Creates a new data file using a common field to combine two separate data files. This task is used to create relational databases on key fields and identify differences between data files. Creates random or monetary unit samples from a specified population. Categorizes the data into various strata, or ranges, for a given Numeric field. DRIVING BETTER DATA ANALYSIS 6