Framework for a Forensic Audit and Investigative Capability

Slides:



Advertisements
Similar presentations
C6 Databases.
Advertisements

ITAuditing Using GAS & CAATs
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Unemployment Insurance Integrity Conference April 19, 2010 Forensic Techniques And Automated Oversight Brett Baker, PhD, CPA, CISA.
1 1 of 22 Data Analytics Updated: 3/6/ of 22 Agenda Updated: 11/10/2010 About UsAbout Us Define Data AnalyticsDefine Data Analytics Data DiagramData.
The Database Environment
Information Systems Chapter 2 Organizing Data and Information.
Continuous Audit at Insurance Companies
Shipi Kankane Prashanth Nakirekommula.  Applying analytics and risk- management capabilities to health insurance through LexisNexis data platforms. 
Forensic and Investigative Accounting
1 ACCTG 6910 Building Enterprise & Business Intelligence Systems (e.bis) Introduction to Data Mining Olivia R. Liu Sheng, Ph.D. Emma Eccles Jones Presidential.
Database Management: Getting Data Together Chapter 14.
Organizing Data & Information
Computer Assisted Audit Techniques
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
Chapter 14 The Second Component: The Database.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 1: The Database Environment
Continuous Monitoring as a tool for Fraud Detection Anton Bouwer CQS Technology Holdings
TURKISH STATISTICAL INSTITUTE INFORMATION TECHNOLOGIES DEPARTMENT (Muscat, Oman) DATA MINING.
Chapter 4-1. Chapter 4-2 Database Management Systems Overview  Not a database  Separate software system Functions  Enables users to utilize database.
Ihr Logo Data Explorer - A data profiling tool. Your Logo Agenda  Introduction  Existing System  Limitations of Existing System  Proposed Solution.
5.1 © 2007 by Prentice Hall 5 Chapter Foundations of Business Intelligence: Databases and Information Management.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 13 Database Management Systems: Getting Data Together.
CIS 9002 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 3 Content Management.
ITEC224 Database Programming
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
© 2007 by Prentice Hall 1 Introduction to databases.
Auditing Information Systems (AIS)
ACL Duplicate Invoices Detection Overview Using ACL to detect and report Duplicate Invoices within and between a Rail Entity’s Ariba procurement, Ellipse.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
5-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Introduction – Addressing Business Challenges Microsoft® Business Intelligence Solutions.
Chapter 4 Data and Databases. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe the differences between data,
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
National Science Foundation Office of Inspector General Update
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
TITLE Subtitle Using Data Analytics in Audits.
ACL Training.
Pengantar Sistem Informasi
PRIMARY DATA vs SECONDARY DATA RESEARCH Lesson 23 June 2016
Discovering Computers 2010: Living in a Digital World Chapter 14
Chapter 7: Computer Assisted Analytical Techniques
Auditing Information Technology
Chapter 7: Computer Assisted Analytical Techniques
Fundamentals & Ethics of Information Systems IS 201
Fraud Risk Management at Digital Insurance Market
Chapter 7: Computer Assisted Analytical Techniques
Auditing & Investigations I
Data Warehouse.
Basic Concepts in Data Management
System And Application Software
MANAGING DATA RESOURCES
Integrity Filters in eProcurement Systems
Types of CAATs Session 3.
Databases and Information Management
The Database Environment
Spreadsheets, Modelling & Databases
McGraw-Hill Technology Education
The Database Environment
Financial Accounting (FI)
Tools and Techniques for the Auditor: Fieldwork
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management
Presentation transcript:

Framework for a Forensic Audit and Investigative Capability Forensic Techniques And Automated Oversight Unemployment Insurance Integrity Conference April 19, 2010 Brett Baker, PhD, CPA, CISA

Overview Forensic Techniques and Automated Oversight Data Mining Equipment and Software Forensic Approach Brett M. Baker, PhD, CPA, CISA

Forensic Techniques and Automated Oversight Definition of Forensic Audit Audit that specifically looks for financial misconduct, abusive or wasteful activity. Close coordination with investigators More than Computer Assisted Audit Techniques (CAATs) Forensic audit is growing in the Federal government GAO’s Forensic Audit and Special Investigations (FSI) Department of Defense Data Mining Federal outlays are $2 trillion annually OMB estimates improper payments for Federal government at $98B (4%) 100% review using automated business rules versus statistical sampling There is a place for both Automated Oversight Continuous monitoring Quick response Brett M. Baker, PhD, CPA, CISA

FY2008 Improper Payment Estimates Brett M. Baker, PhD, CPA, CISA

What is Data Mining? Refers to the use of machine learning and statistical analysis for the purpose of finding patterns in data sets. If You Know Exactly What You Are Looking for, Use Structured Query Language (SQL). If You Know Only Vaguely What You Are Looking for, Turn to Data Mining. Most often used (up until recently) in marketing and customer analysis Brett M. Baker, PhD, CPA, CISA

Different Levels of Knowledge Data Facts, numbers Information Summary Reports ACL, IDEA, MS Access Knowledge Descriptive Analytics SAS, SPSS, ACL, IDEA Wisdom Predictive Analytics Clementine Intelligent Miner Enterprise Miner Brett M. Baker, PhD, CPA, CISA

Data Analysis Software - Fosters Creativity Can perform the tests wanted, instead of being limited to what technical staff can, or will, provide Not limited to just predetermined data formats and/or relationships Can create relationships, check calculations and perform comparisons Can examine all records, not just a sample Useful for identifying misappropriation of assets and fraudulent financial reporting Allows limitless number of analytical relationships to be assessed within large databases comparing large databases Identifies anomalies Brett M. Baker, PhD, CPA, CISA

Common Data Analysis Tests and Techniques Join Summarization Corrupt data (conversion) Blank fields (noteworthy if field is mandatory) Invalid dates Bounds testing Completeness Uniqueness Invalid codes Unreliable computed fields Illogical field relationships Trend analysis Duplicates Brett M. Baker, PhD, CPA, CISA

Simple Queries Use Tight Selection Criteria You Know Exactly What You’re Looking For e.g. All Payments to a Particular Vendor Use Tight Selection Criteria E.g. Vendor = “Smith Company” Use Looser Selection Criteria E.g. Vendor = “*Smith*” Finds Smith Company, Smith Co., The Smith Manufacturing Company, etc. 9

Complex Queries Use Tight Selection Criteria You Know The Specific Condition You’re Looking For e.g. Duplicate Payments Use Tight Selection Criteria E.g. Payments With Same Contract #, Invoice # and Invoice Amount Few False Positives Use Looser Selection Criteria E.g. Payments With Same Contract # and Invoice # or Same Contract # and Invoice Amount More False Positives More Detected Duplicates 10

You Only Know The General Condition You’re Looking For e.g. Fraud Sophisticated Solutions You Only Know The General Condition You’re Looking For e.g. Fraud Subject Matter Experts Can Describe Indicators Translate Indicators to Detection Logic Apply Indicators Against Population Many False Positives Combine Indicators Reduce False Positives 1 5 7 2 8 4 12 15 3 Combine Indicators 11

Control Charts Brett M. Baker, PhD, CPA, CISA

Frequency Distribution Anomalous Activity Normal Activity Anomalous Activity Brett M. Baker, PhD, CPA, CISA

(Three-Bucket Theory) Comparing Data Files (Three-Bucket Theory) Vendors Paid and In Vendor Table Vendors Paid but not In Vendor Table Vendors Not Paid Yet Vendor Table Disbursing Transactions Brett M. Baker, PhD, CPA, CISA

Hardware and Software Applications SQL servers Mainframe (QMF) Docking stations Terminal server Software Applications Data mining and predictive analytics, e.g., Clementine Data interrogation – e.g., ACL, IDEA, MS Access, Excel Statistical analysis – e.g., SPSS and SAS Link analysis – I2 Lexis-Nexis Data conversion utilities (Monarch) Internet, open-source research Access to system query tools Brett M. Baker, PhD, CPA, CISA

Forensic Approach Start with objectives Structured brainstorming Consider SME conference Identify indicators of potential fraud and ways to find in data Process to identify financial risks Map out the end-to-end process Identify systems and key processes Identify key controls Identify and obtain transaction-level data Record layout Look at 1000 records before examining all records ACL, IDEA, and Monarch can read virtually any data format Flat files, Delimited files, Dbase files, MS Access, Report files, …. No file size limits Build targeted business rules and run against data Examine anomalies Brett M. Baker, PhD, CPA, CISA

End-to-End Payment Universe Forensic Audit Approach Personnel Systems $$ Treasury Check People Pay Entitlement Systems Federal Reserve System Accounting Systems Disbursing Systems Commercial Bank Commercial Pay Entitlement Systems Contracting Systems Central Contractor Registry Data Analysis Brett M. Baker, PhD, CPA, CISA

Unemployment Insurance Unemployment Benefits Over-payments Unemployment Benefits Employment Employment Under-payments

How To Apply In Your Organization Decide What You Are Looking For Assign Personnel With Analytical Skills Gather Data Understand Data and Business Rules Select Detection Method/Tools Produce and Research Anomalies Refine the Detection Process Discover the Irregular/Illegal Transactions Improve the Business Process Automated oversight Continuous monitoring