Using Data Analytics to Detect Fraud. Other Data Analysis Techniques



Similar documents
Taking Data Analytics to the Next Level

Demystifying Big Data Analytics

Investigative Techniques

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Emerging Trends in Fraud Analytics:

Social Media Monitoring, Planning and Delivery

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

LGMA Qld Governance and Corporate Planning Village Forum

INTERNATIONAL STANDARD ON REVIEW ENGAGEMENTS 2410 REVIEW OF INTERIM FINANCIAL INFORMATION PERFORMED BY THE INDEPENDENT AUDITOR OF THE ENTITY CONTENTS

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Text Analytics Beginner s Guide. Extracting Meaning from Unstructured Data

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

Advanced Data Analytics, the Fraudsters Worst Enemy

The auditors responsibility to consider fraud in an audit of financial statements

Fraud-Related Compliance

Predictive Customer Intelligence

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)

Managing data security and privacy risk of third-party vendors

Integrating Data Analytics into Internal Audit

FRAUD RISK ASSESSMENT

Text Mining - Scope and Applications

REGULATORY COMPLIANCE SOFTWARE SOLUTIONS. Dynamic Solutions. Superior Results.

Being protected Using data analytics to detect fraud

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

1. Overview of audits and reviews of financial statements

Description of the ten core competencies

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Fraud and Role of Information Technology. September 2008

INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS

Using Data Analytics to Detect Fraud

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

Enterprise Risk Management (ERM) & Compliance

Social Business Intelligence For Retail Industry

Driving business performance Using data analytics

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL

Fraud: Real Stories, Real People, Real Impact

Accounts Payable Automation: Top 9 Reasons to Automate: The Essential Guide to Why Your Business Needs to Automate its Invoice Processing.

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s

Procedure for Managing a Privacy Breach

Business Conduct, Compliance and Ethics Program. important

Fraud Checklist. From the enquiries made and procedures performed in completing Part B of this checklist we consider the risk of irregularities to be

Transmittal Letter Objectives and Scope Approach Financial System Permitting Application... 9

Data Warehousing and Data Mining in Business Applications

Chapter 15 Auditing the Expenditure Cycle

IT28 GOING PAPERLESS WITH MICROSOFT DYNAMICS NAV Tom Taylor, Microsoft

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Social Media Implementations

IBM SPSS Modeler Premium

How to achieve excellent enterprise risk management Why risk assessments fail

Plan for the audit of the 2011 financial statements

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY

Autonomy Consolidated Archive

Big Data: Key Concepts The three Vs

CHAPTER 7 PLANNING THE AUDIT: IDENTIFYING AND RESPONDING TO THE RISKS OF MATERIAL MISSTATEMENT

THE ABC S OF DATA ANALYTICS

FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01

Consideration of Laws and Regulations in an Audit of Financial Statements

Risk Management Primer

Pr a c t i c a l Litigator s Br i e f Gu i d e t o Eva l u at i n g Ea r ly Ca s e

Hexaware E-book on Predictive Analytics

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

Best Practices in Account Takeover

Audit Guide for Audit Committees of Small Nonprofit Organizations

The Informatica Solution for Improper Payments

Implementation Tool for Auditors

Neil Meikle, Associate Director, Forensic Technology, PwC

Moving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

OCC 98-3 OCC BULLETIN

Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples

STAR WARS AND THE ART OF DATA SCIENCE

Tax Fraud in Increasing

Sarbanes-Oxley Compliance for Cloud Applications

Understanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners

Guided Reading 9 th Edition. informed consent, protection from harm, deception, confidentiality, and anonymity.

Using Social Media to Grow Your Brand. we give brands life

Chapter 6. Foundations of Business Intelligence: Databases and Information Management

The Danielson Group Behavior Specialists

Executive Management of Information Security

CITY OF BURLINGTON COSO FRAMEWORK & COMPLIANCE

Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context

Solving the Problem of Data Silos: Process and Architecture

Top Ten Technology Risks Facing Colleges and Universities

Transcription:

Using Data Analytics to Detect Fraud Other Data Analysis Techniques

Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is the process used to collect and analyze unstructured data. It requires extreme organization, as data sets tend to be quite large. It is best used in conjunction with quantitative data analysis.

Textual Analytics Analysis of unstructured, text-based data for keywords that reveal patterns, sentiments, and relationships indicative of fraud Uses linguistic technologies, statistical techniques, and scoring algorithms to categorize and analyze textual data Requires: Sophisticated software Thorough understanding of the legal issues regarding employee rights and workplace searches

Textual Analytics Data Sources Email Voice files News feeds Instant messages User documents Social media posts Apps Presentations Video Sales and marketing

Textual Analytics Emotive tone derogatory, surprised, secretive, angry, worried, or confused communications Ethical behavior harassing, secretive, cursing Concept, entity, relationship, or event extraction Text link analysis Social network analysis

Developing a List of Keywords Keywords depend on industry, relevant fraud risks, and data set. Use fraud triangle as reference. Deadline Quota Short Problem Concern Reasonable Deserve Borrow Therefore Override Write off Adjust Discount

Visual Analytics Some data sets are so vast or complex that they are difficult to analyze using traditional means. Visual analytics can help identify patterns or anomalies in such data.

Word Clouds Risky Creative jobs Uncertainty unbalanced Weak delay moderate Liability overstate critical audit accrual strategy

Heat Maps

Tree Maps Accounting Accounts Payable Information Technology Financial Misstatement Penalties and Fines Thefts of Assets Fraudulent Disbursements System Failures Reputation Risk Research and Development Financial Misstatement Sales Financial Misstatement Fraudulent Disbursements Theft of Assets Natural Disasters Administrative Reputation Risk Penalties and Fines Natural Disasters System Failures Theft of Assets Fraudulent Disbursements Reputation Risk Theft of Assets Fraudulent Disbursements

Link Analysis

Geospatial Analysis

Timeline Analysis Highlight key times, dates, and facts. More readily determine a sequence of events. Analyze multiple or concurrent sequences of events. Track unaccounted-for time. Identify inconsistencies or impossibilities in data.

Conflict Checking Use of specialized software to identify potentially problematic relationships: Conflicts of interest on a company s board of directors Relationships between potential new hires and business units Vendors that operate from addresses that previously have been associated with fraud Vendors that are not listed in any online commercial database or that are listed on government excluded party lists

Log-In Monitoring Software Used to identify anomalies in log-ins to company system: Unusual times or days Unusual locations Excessive log-ins Unauthorized log-ins

Employee Risk Ranking Brings together big data both structured and unstructured data to identify and monitor highrisk employees Aggregates all tests and analytics into dashboard Similar analysis can be performed for vendors or customers Data privacy and employee rights are integral concerns

Employee Risk Ranking Example 1. Keywords Percentage of keywords around pressure, opportunity, and rationalization in email and IM communications Scaling: 3 2. T&E analysis Ranking of T&E out-of-compliance hits and overall email scoring Scaling: 3 3. Sales activity Ranking of sales activity, field notes, and sales returns and allowances Scaling: 4 4. User activity 5. Third-party risk 6. Alias clustering 7. Emotive tone Percentage of instances within period where custodian sends or receives information involving those outside of peer group, as identified through hierarchies Instances where employee is linked to high-risk third parties (e.g., customers, vendors, state-owned entities, etc.) in email, T&E, or sales activity Percentage of instances within that week where custodian sends or receives ESI involving at least one of their identified communicative aliases Percentage of instances where the employee sends or receives ESI with negative emotions (angry, frustrated, secretive, etc.) identified through linguistic analyses Scaling: 2 Scaling: 2 Scaling: 3 Scaling: 5 Custodian C1 C2 C3 C4 C5 C6 C7 Scaling C1 Scaling C2 Scaling C3 Scaling C4 Scaling C5 Scaling C6 Scaling C7 Score A, Week 1 1 3 3 4 6 2 3 3 3 4 2 2 3 5 A, Week 2 2 2 4 5 3 4 2 37 45

Transaction Risk Scoring Brings multiple analytics together Monitors and scores transactions based on number of breaches: Round-dollar amounts Incomplete invoice Keyword in payment description field Can apply weights to certain tests to influence the overall risk score