Continuous Audit at Insurance Companies

Slides:



Advertisements
Similar presentations
A business makes payments for what it buys, In return it receives payments for goods it sells or services it provides.
Advertisements

1 Continuity Equations: Analytical Monitoring of Business Processes and Anomaly Detection in Continuous Auditing Michael G. Alles Alexander Kogan Miklos.
Unemployment Insurance Integrity Conference April 19, 2010 Forensic Techniques And Automated Oversight Brett Baker, PhD, CPA, CISA.
Practical Issues of Implementing Continuous Assurance Systems Presented by John Verver CA, CISA, CMC to the 5 th Continuous Assurance Symposium November.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 10A.1 Audit Sampling.
Operational risk management Margaret Guerquin, FSA, FCIA Canadian Institute of Actuaries 2006 General Meeting Chicago Confidential © 2006 Swiss Re All.
Cluster Analysis for Anomaly Detection Sutapat Thiprungsri Rutgers Business School July 31 th 2010.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Chapter 9 Audit Sampling: An Application to Substantive Tests of Account Balances McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
September 2003 Fraud Formalization and Detection Bharat Bhargava, Yuhui Zhong, Yunhua Lu Center for Education and Research in Information Assurance and.
1 Software Testing and Quality Assurance Lecture 30 – Testing Systems.
Purpose of the Standards
Lecture 8 Understanding entity and its environment
AUDIT PROCEDURES. Commonly used Audit Procedures Analytical Procedures Analytical Procedures Basic Audit Approaches - Basic Audit Approaches - System.
Enterprise systems infrastructure and architecture DT211 4
Copyright © 2007 Pearson Education Canada 1 Chapter 12: Audit Sampling Concepts.
Business Logic Abuse Detection in Cloud Computing Systems Grzegorz Kołaczek 1st International IBM Cloud Academy Conference Research Triangle Park, NC April.
Lab2 CPIT 440 Data Mining and Warehouse.
Data Mining By Jason Baltazar, Phil Cademas, Jillian Latham, Rachel Peeler & Kamila Singh.
Fraud Detection McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
© 2010 IBM Corporation © 2011 IBM Corporation September 6, 2012 NCDHHS FAMS Overview for Behavioral Health Managed Care Organizations.
The Islamic University of Gaza
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Chapter 1 Introduction to Data Mining
Knowledge Discovery and Data Mining Evgueni Smirnov.
System Specification Specify system goals Develop scenarios Define functionalities Describe interface between the agent system and the environment.
1 © Greenlight Technologies. All rights reserved. 1 Evolution Of The Internal Audit Function: From Controls Testing To Corporate Performance Management.
S7: Audit Planning. Session Objectives To explain the need for planning To explain the need for planning To outline the essential elements of planning.
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Knowledge Discovery and Data Mining Evgueni Smirnov.
Audit Planning. Session Objectives To explain the need for planning To outline the essential elements of planning process To finalise the audit approach.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
S14: Analytical Review and Audit Approaches. Session Objectives To define analytical review To define analytical review To explain commonly used analytical.
Auditing: The Art and Science of Assurance Engagements
Copyright © 2007 Pearson Education Canada 1 Chapter 14: Completing the Tests in the Sales and Collection Cycle: Accounts Receivable.
 Fundamentally, data mining is about processing data and identifying patterns and trends in that information so that you can decide or judge.  Data.
Audit Sampling: An Overview and Application to Tests of Controls
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Examining Relationships in Quantitative Research
a guidance to conversion
Discriminant Analysis Discriminant analysis is a technique for analyzing data when the criterion or dependent variable is categorical and the predictor.
Continuous Auditing at Unibanco Washington Lopes
CRM - Data mining Perspective. Predicting Who will Buy Here are five primary issues that organizations need to address to satisfy demanding consumers:
Learning Objectives LO1 Differentiate among frauds, errors, and illegal acts that might occur in an organization. LO2 Explain the auditing standards related.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
C. Lawrence Zitnick Microsoft Research, Redmond Devi Parikh Virginia Tech Bringing Semantics Into Focus Using Visual.
1 Data Mining: Concepts and Techniques (3 rd ed.) — Chapter 12 — Jiawei Han, Micheline Kamber, and Jian Pei University of Illinois at Urbana-Champaign.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
Conference Workshop Continuous Auditing: An Approach for Today Univ. of Salford, 5 December December 2015 Presented by Anton Bouwer
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Analytical Review and Audit Approaches
9-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Copyright ©2005 by South-Western, a division of Thomson Learning. All rights reserved. Introduction to Marketing.
Chapter 9 Audit Sampling – Part a.
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 9 CH 8 ISO MEASUREMENT, ANALYSIS AND IMPROVEMENT INTERNAL AUDITS.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Do Not Pay Business Center- Using Analytics to Help Agencies Prevent Improper Payments JFMIP May 2016.
PS Research Methods I with Kimberly Maring Unit 9 – Experimental Research Chapter 6 of our text: Zechmeister, J. S., Zechmeister, E. B., & Shaughnessy,
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
TITLE Subtitle Using Data Analytics in Audits.
BY: NASUMBA KIZITO KWATUKHA
Framework for a Forensic Audit and Investigative Capability
Technology & Analytics
Defining Internal Control
Baselining PMU Data to Find Patterns and Anomalies
A survey of network anomaly detection techniques
PolyAnalyst Web Report Training
AUDIT TESTS.
Presentation transcript:

Continuous Audit at Insurance Companies Youngbum Kim, PhD. Student, Rutgers Univ. Sutapat Thiprungsri, PhD. Student, Rutgers Univ.

Outline Objectives Scope Methods Research Framework Q&A A Rule-based model for Anomaly Detection Clustering Q&A

Objectives Creating an architecture for a future continuous audit of the systems in question Assisting the audit with analytical support Creating system specific filters of eventually preventive nature

Scope Historical disbursements & claims data to develop filters that may detect fraud, discrepancies and internal control weaknesses Maturity Model Automated Continuous Audit Continuous Control Monitoring

Methods

An evolving continuous audit framework Data Audit Continuous Risk Monitoring and Assessment Continuous Control Monitoring Automation Sensoring ERP E-Commerce 6 6

Steps in the continuous forensic and audit process Identify system and understand its structure and features Capture relevant data Clean and scrub data Create KPI and extraction models Run models under different scenarios Examine the exceptions found on an interactive basis Decide on profile of risk

Cont. Place filters in the entrance of processes Create an audit by exception mechanism within the internal audit organization Create interfaces between management continuous monitoring and audit by exception Continue the forensic model development process based also on the filtering results Work on external audit reliance on the process

Framework

A Rule-Based model for Anomaly Detection 10

Research Question Prior Research Focuses on fraud by outsiders such as customers, criminals, and intruders ( external fraud).  Little research on Internal Fraud Highly depends on ‘labeled/classified’ data. Known internal fraud examples are rarely documented and disclosed.  Unsupervised method of profiling Practicability Rarely considers actual implementation by internal auditors  Rule-based indicators and suspicion scoring system How can we develop a rule-based model to detect abnormal (internal fraudulent/erroneous) wire transfers?

Obstacles to Anomaly Detection Anomaly (including internal fraud) detection When anomaly prevention fails (how to know?). Detects in a timely manner (or at least not too late, especially for internal fraud). Too small number of anomaly cases. Continuous Auditing/Monitoring process Unawareness that the anomaly prevention control has failed. Highly adaptive existing fraudsters (=fraud perpetuators) and New comers. Cost of undetected anomaly (esp. internal fraud) is significant.

Model Development Process Information collection Discussion with Internal Auditors for Validation Result Investigation by Internal Auditors Rule Creation (addition/deletion/revision) Model Testing with Data (Re-testing) Note. ( ): After the first round

Anomaly Detection Process A transaction Anomaly detecting model Suspicion Score Calculation Greater than criterion? N No Reports Y Labeled as potential anomaly Final Results Test of detail by internal auditors

Indicators Category 21types (38 indicators) of anomaly indicators. Purport to identify abnormally low or high values, abnormally positive slope, or abnormally different from population norms. Conditional tests Pass/Fail or Yes/No types Some of them are directly related to controls. Statistical tests PI/CI, Frequency test, Correlation test, or Clustering Developed by using either prediction intervals, correlation, or clustering. 15 15

Anomaly Indicators: Example (Note. All the examples are fictitious.) Questions Possible Filtering rules to test The payee transactions payment amount is out of the range of payment amounts. Amount range for each payee (or all payees) & check outliers. The payee transaction payment trend line over time has a positive slope. Correlation between date (or sequence numbers) and payee amounts for each payee The payee is an outlier to payee baseline activity. (Send to a payee that normally do not send to) Payee frequency by each initiator & check the payees that have the least frequencies. The transaction amount is out of range of normal activity from this bank account. The 90, 95, and 99 PI amts for each sending/receiving bank account and check the exceptions. The transaction initiator is not a normal sender from this bank account. First, check the list of sender bank account, then create exception list of initiators by sending bank account. The transaction payee is not a normal receiver from this bank account. A list of payees by sending banks who have least frequency:

Suspicion Scores (All the numbers are fictitious.) Statistical score All wires Last Qtr only Total 197505 52574 81922 32666 1 7943 2092 101384 18227 2 1867 485 17596 2824 3 762 281 5772 1425 4 150 92 1072 266 5 12 10 384 84 6 83 32 7 21 Conditional 8 86613 34472 102686 17787 14063 2183 If Target Flags are between 25 and 30, 5 for Statistical, 6 for Conditional, and 7 for Total scores. 4327 987 402 80 133 22 15

Examples of Flagged Wires wireID amount Statistical score Conditional Total 10 950,000 5 25 22,600,000 1 6 33 4,000 42 11,500,000 2 7 50 8,200,000 52 600,000,000 3 8 63 85,000,000 13

Contribution Proposes developing a detection model of internal fraud with unlabeled/unclassified data. Describes the development process of an anomaly detection model that is implementable by internal auditors. Shows that developing process of anomaly detection model can help internal auditors to identify weakly-controlled areas and thus provide additional assurance.

Limitations and Future Study False negatives may exist in model development. Some anomaly indicators may not be applicable to the other companies. Future Study Needs more fine-tuning, that is, specification and customization to consider transactional characteristics. Thus, Next step will examine the relevance of relevant attributes. If relevant and effective, they will improve the current model.

Clustering For Anomaly Detection 21

Insurance Claims Objective To detect potential fraud or errors in the claims process by using clustering techniques Steps in Cluster Analysis Selecting attributes Selecting distance measurement Selecting cluster techniques Analyzing the resulting clusters Identifying anomaly and/or outliers 22

Visualizing combination of attributes, we will be able to see similarity and differences among claims 23

Analyzing individual variables, we will be able to see clearly that some claims have rare values 24

Contribution Clustering can be used to build a model for anomaly detection when the labeled data are not available. It may help to discover some hidden pattern or clusters in the dataset. 25

Limitations and Future Study Cluster Analysis always generates clusters, regardless of the properties of the data-set. The interpretation of the results might not be clear. How to define anomaly could also be a problem. 26

Thank you for your attention!