Contents. xiii xv. Case Studies Preface



Similar documents
Using Data Analytics to Detect Fraud

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

Advanced Data Analytics, the Fraudsters Worst Enemy

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST

Contents. xv xvii xxi. Case Studies Preface Acknowledgments

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant

Fraud Detection & Data Analytics

Invoice Number Vendor Number Amount A $1, A $1,035.71

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A

Working Capital. Management. Applications and Cases JAMES S. SAGNER. WlLEY

Table of Contents. Bibliografische Informationen digitalisiert durch

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Use of Data Extraction & Analysis Software In a Financial Statement Audit

SCOPE OF WORK FOR PERFORMING INTERNAL CONTROL AND STATUTORY/REGULATORY COMPLIANCE AUDITS FOR RECIPIENTS OF SPECIAL MUNICIPAL AID

Investigative Techniques

Module #9 Payroll Schemes

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Accounts Payable. Best Practices: Existing Control: Control Gap: Controls Evaluation and Gap Analysis. Purchasing

Data analysis for Internal Audit

Chapter 7: Solutions. Multiple Choice Questions From CPA Examinations a. (2) b. (1) c. (4) d. (4) 7-28 a. (3) b. (3) c. (4) d.

Audits of Automobile Body and Repair Shops

Abila. MIP Fund Accounting. Solutions overview. Accounts payable. Accounts receivable reporting, billing, and sales order entry

The following figures summarize ways in which dut:es could be segregated with two, three and four people.

Comparison of Generalized Audit Software

Using Technology to Automate Fraud Detection Within Key Business Process Areas

ACCOUNTING POLICIES AND PROCEDURES SAMPLE MANUAL

B Resource Guide: Implementing Financial Controls

Leveraging Big Data to Mitigate Health Care Fraud Risk

Fraud Workshop Finding the truth in the transactions

SAMPLE FINANCIAL PROCEDURES MANUAL

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics

Chapter 7. Special Journals and Subsidiary Ledgers

Accounts Receivable. Chapter

ACCOUNTING SYSTEMS APPLICATIONS ACCT Credit Hours

Financial Transactions and Fraud Schemes

INTERNAL CONTROL POLICIES

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

A Municipal Checklist for Internal Control-Part I, Cash Controls

ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

FINANCIAL AND PURCHASING RECORDS. Includes records showing a summary of receipts, disbursements and other activity against each account.

Agency Escrow Accounting Standards.

How To Manage A Corporation

THE ABC S OF DATA ANALYTICS

Blackbaud FundWare Accounts Receivable Guide VOLUME 1 SETTING UP ACCOUNTS RECEIVABLE

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

CARRIAGE MUSEUM OF AMERICA ACCOUNTING POLICIES AND PROCEDURES MANUAL. February 2014

5:31-7 Appendix B LOCAL AUTHORITIES - ACCOUNTING AND AUDITING IF ANY ARE NOT APPLICABLE, INSERT N/A AS YOUR ANSWER. FIRE DISTRICT YEAR UNDER AUDIT

Basic Concepts of Accounting Subsidiary Subsidiary Special Special Inform Infor a m tion Ledgers Ledger Journals Jour Systems

Audit of Cash Balances

FRAUD RISK ASSESSMENT

Software Monthly Maintenance (Non Accounting Use) Quick Reference Guide

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

R I T From the Controller s Office

Why is a budget important? I. What is a budget? II.

SAMPLE NPO Fiscal Policies & Procedures

Vendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER

Essentials of Working Capital Management. Essentials Series

PART A: OVERVIEW INTRODUCTION APPLICABILITY OBJECTIVE...1 PART B: LEGAL PROVISIONS LEGAL PROVISIONS...

FINANCIAL MANAGEMENT POLICIES AND PROCEDURES

GLOBAL PORTS INVESTMENTS PLC

Generic Business Process (1) Expenditure Cycle & Revenue Cycle

Chapter 15 Auditing the Expenditure Cycle

Plan and Track Your Finances

10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process

Compensating the Sales Force

Abila. MIP Fund Accounting. Solution module overview

THE EXPENDITURE CYCLE Part I

Electronic Funds Transfer Policy

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

SERVICE MANAGEMENT AN INTEGRATED APPROACH TO SUPPLY CHAIN MANAGEMENT AND OPERATIONS. Cengiz Haksever Barry Render

BUSINESS BOOKS. Accounting SIXTH EDITION. Peter J. Eisen Assistant Principal Retired Accounting & Business Practice N.YC. Department of Education

PeopleSoft Enterprise Real Estate Management 9.1 PeopleBook

STUDIO DESIGNER. Accounting 4 Participant

SOFTWARE TESTING AS A SERVICE

Internal Audit Department NeighborWorks America. Audit Review of Accounts Payable/ACH Transactions

Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6

COMPUTER ACCOUNTING WITH QUICKBOOKS 2013 CHAPTER 10

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009

We now examine the documents and procedures used to perform each step. Step 1: Capture Transaction Data on Source Documents

3. Current Auditing Computerized Tools

--Inputs and posts journal vouchers to the general ledger; prepares month-end closing journal entries.

Expenditures Internal Audit Report

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments

INTUIT PROFESSIONAL EDUCATION. QuickBooks Files: Sharing, Managing, and Maintaining Data Integrity

NINTH EDITION A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT

Tips to Prevent and Detect Workplace Fraud

KITTI MUNICIPAL GOVERNMENT STATE OF POHNPEI AUDIT REPORT YEARS ENDED SEPTEMBER 30, 1999 AND 2000

Transcription:

Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants 12 What Is a Corporate Fraud Policy? 12 Notes 15 CHAPTER 2 Fraud Prevention and Detection 17 Detecting Fraud 18 Determining the Exposure to Fraud 19 Assessing the Risk that Fraud Is Occurring (or Will Occur) 23 External Symptoms 24 Identifying Areas of High Risk for Fraud 25 Looking at the Exposures from the Fraudster s Perspective 26 Approach 1: Control Weaknesses 27 Who Could Benefit from the Identified Control Weaknesses? 27 What Can They Influence, Control, or Affect? 28 Can They Act Alone or Is Collusion Required? 29 Approach 2: Key Fields 30 Which Data Fields Can Be Manipulated and by Whom? 30 vii

viii Contents Additional Fraud Risk Considerations 31 Understanding the Symptoms of Fraud 31 Being Alert to the Symptoms of Fraud 34 Building Programs to Look for Symptoms 36 Investigating and Reporting Instances of Fraud 37 Implementing Controls for Fraud Prevention 38 Notes 39 CHAPTER 3 Why Use Data Analysis to Detect Fraud? 41 Increased Reliance on Computers 42 Developing CAATTs Capabilities 44 Integrated Analysis and Value-Added Audit 48 Recognizing Opportunities for CAATTs 49 Developing a Fraud Investigation Plan 49 Notes 54 CHAPTER 4 Solving the Data Problem 55 Setting Audit Objectives 55 Defining the Information Requirements 57 Accessing Data 58 Data Paths 59 Data File Attributes and Structures 61 Assessing Data Integrity 65 Overview of the Application System 68 Overview of the Data 69 Notes 70 CHAPTER 5 Understanding the Data 71 Computer Analysis 71 Analysis Techniques 74 Filter/Display Criteria 75 Expressions/Equations 75 Gaps 75 Statistical Analysis 76 Duplicates 76 Sort/Index 76 Summarization 77 Stratification 77 Cross Tabulation/Pivot Tables 78 Aging 78

ix Join/Relate 79 Trend Analysis 79 Regression Analysis 79 Parallel Simulation 80 Benford s Law 80 Digital Analysis 80 Confirmation Letters 81 Sampling 81 Combining Techniques 82 Assessing the Completeness of the Data 82 Filter or Display Criteria 83 Expression/Equation 85 Gaps 93 Statistical Analysis 96 Duplicates 100 Sorting and Indexing 106 Notes 110 CHAPTER 6 Overview of the Data 111 Summarization 111 Stratification 125 Cross Tabulation/Pivot Tables 128 CHAPTER 7 Working with the Data 133 Aging 133 Join/Relation 147 CHAPTER 8 Analyzing Trends in the Data 159 Trend Analysis 159 Regression Analysis 165 Parallel Simulation 168 Notes 170 CHAPTER 9 Known Symptoms of Fraud 171 Known and Unknown Symptoms 172 Fraud in the Payroll Area 173 Ghost Employees 174 Terminated Employees 177 Overpayment 178

x Contents Fraud in the Purchasing Area 185 Employee Activities 186 Vendor Action and Employee Inaction 186 Collusion between Vendor and Employee 187 Symptoms of Purchasing Fraud 187 Kickbacks 187 Fixed Bidding 190 Goods Not Received 191 Duplicate Invoices 191 Inflated Prices 191 Inferior Quality 191 Excess Quantities 191 CHAPTER 10 Unknown Symptoms of Fraud (Using Digital Analysis) 193 Data Profiling 194 Statistical Analysis 195 Stratification 195 Frequently Used Values 196 Even Amounts and Rounding 197 Least/Most Used Categories 198 Ratio/Variance Analysis 199 Maximum/Minimum 200 Maximum/Second Highest 201 Current/Previous 201 One Business Area/Another 202 Benford s Law 205 Notes 209 CHAPTER 11 Automating the Detection Process 211 Fraud Applications or Templates 213 Fraud Application Development 217 CHAPTER 12 Verifying the Results 219 Confirmation Letters 219 Sampling 223 Judgmental or Directed Sampling 223 Statistical Sampling 224 Quality Assurance 229 Quality Assurance Methodology 230

xi Preventive Controls 231 Detective Controls 232 Corrective Controls 232 Ensuring Reliability 233 Data Analysis and Prosecuting Fraud 233 Notes 238 APPENDIX A Fraud Investigation Plans 239 Insurance Policies Too Good to Be True 239 Paid by the Numbers 244 APPENDIX B Application of CAATTs by Functional Area 249 Accounts Receivable Tests 250 Accounts Payable Tests 251 General Ledger Tests 253 Materials Management and Inventory Control Tests 253 Salary and Payroll Tests 256 Purchase Order Management Tests 257 Conflict-of-Interest Tests 257 Kickback Tests 258 Bid-Rigging Tests 258 Policy and Administration Tests 259 Vendor Management Tests 260 Retail Loss Prevention Tests 260 Sales Analysis Tests 261 Work in Progress Tests 262 Cash Disbursement Tests 263 Customer Service Management Tests 263 Loan Tests 264 Deposit Tests 264 Real Estate Loans 265 Credit Card Management 265 Life Insurance Tests 266 Travel Claims 266 APPENDIX C ACL Installation Process 267 Epilogue 273 References 275 Index 277