A RESEARCH TAXONOMY: THE APPLICATION OF DATA MINING TO FRAUD DETECTION Glen L. Gray California State University at Northridge Roger Debreceny University.

Slides:



Advertisements
Similar presentations
Empirical Factors Leading to a Good Fractured Reservoir Early recognition of fractures High fracture intensity & good connections Good interaction between.
Advertisements

AUDITING : AN OVERVIEW. Auditing defined It is a critical and systematic examination or review of accounting reports, documents, records, procedures and.
OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
DISCUSSANT’S COMMENTS - Data Mining Journal Entries for Fraud Detection: A Pilot Study – R S Debreceny & Glen L Gray Symposium 2009 Eckhardt Kriel.
ITAuditing Using GAS & CAATs
Chapter 16 General Ledger and Reporting System Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 16-1.
General Ledger and Reporting System
Copyright © 2015 Pearson Education, Inc. General Ledger and Reporting System Chapter
Traceability James D. Palmer Presented by: Megan Heffernan.
© University of Strathclyde Assessing Aesthetic Quality Martin Fitchie University of Strathclyde.
Learning Objectives LO6 Explain the auditing standards related to external, internal, and governmental auditors’ responsibilities to detect and report.
Chapter 9 DATA WAREHOUSING Transparencies © Pearson Education Limited 1995, 2005.
Discussion of Principles and Problems of Audit Automation as a Precursor for Continuous Auditing Zabihollah (Zabi) Rezaee, PhD, CPA, CMA, CIA, CFE, CGFM.
DATA WAREHOUSING.
The Elements of Auditing. Types of Audit Evidence Real Evidence – Physical (eg. building, inventory) – Nonphysical (eg. goodwill, rights) Documentary.
Roger S. Debreceny Shidler College of Business University of Hawai‘i at Mānoa Glen L. Gray College of Business & Economics California State University,
Introduction to Fraud Examination
16th World Continuous Auditing Symposium Continuous Auditing Process using Cross References and Key Performance Indicators Washington Lopes da Silva.
Lecture 8 Understanding entity and its environment
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Proactive Approaches to Detecting Fraud CHAPTER 6.
The 30,000-foot View of Financial Auditing. Financial Statements -Income Statement -Balance Sheet -Cash flow Statement -Notes to F/S Audit Opinions -Financial.
Data Warehousing: Defined and Its Applications Pete Johnson April 2002.
HOW TO WRITE A GOOD TERMS OF REFERENCE FOR FOR EVALUATION Programme Management Interest Group 19 October 2010 Pinky Mashigo.
Discussion of: A Taxonomy to Guide Research on the Application of Data Mining to Fraud Detection in Financial Statement Analysis Severin Grabski Department.
What is Business Intelligence? Business intelligence (BI) –Range of applications, practices, and technologies for the extraction, translation, integration,
Copyright © 2014 McGraw-Hill Education. All rights reserved
S T A M © 2000, KPA Ltd. Software Trouble Assessment Matrix Software Trouble Assessment Matrix *This presentation is extracted from SOFTWARE PROCESS QUALITY:
Data Mining Journal Entries for Fraud Detection: A Pilot Study by Roger S. Debreceny & Glen L. Gray Discussed by Severin Grabski.
Managerial Accounting: Conceptual Framework
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Pros and Cons Comparison By Justin Bost Olivia Bischoff.
Data Mining of s to Support Periodic & Continuous Assurance Glen L. Gray California State University at Northridge Roger Debreceny University of.
Data mining as a tool in fraud investigation 29 June 2015.
University of Waterloo - 5 th Symposium on Information Systems Assurance Oct , 2007.
S14: Analytical Review and Audit Approaches. Session Objectives To define analytical review To define analytical review To explain commonly used analytical.
System Integrity and Validity 1 Running Head: System Integrity and Validity System Integrity and Validity University of Phoenix Date:
Professional Certification Professional Certification October 11, 2007 Standard: Effective Teaching Criteria 1(b) Using a variety of assessment strategies.
1 Reviewing Data Warehouse Basics. Lessons 1.Reviewing Data Warehouse Basics 2.Defining the Business and Logical Models 3.Creating the Dimensional Model.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Audit Planning and Types of Audit Tests Chapter Five.
A Relative Cost Framework for Rethinking Assurance of XBRL Filings ISAIS 2011: Rome, Italy Glen L. Gray, California State University, Northridge, USA Michael.
Using Computer Assisted Audit Tools and Techniques (CAATTs)
Chapter 1 Introduction to Fraud Examination. 2 Learning Objectives Understand the fraud theory approach. Define occupational fraud. Define fraud. Define.
Text Analytics A Tool for Taxonomy Development Tom Reamy Chief Knowledge Architect KAPS Group Program Chair – Text Analytics World Knowledge Architecture.
©2008 Grant Thornton UK LLP. All rights reserved. Partner CAA Use of Resources Workshop Halifax 18 May 2009.
Skip Assurance on XBRL Instance Documents: A Conceptual Framework of Assertions A discussion and extension Clinton E. White, Jr Professor of Accounting.
Internet Strategies to Improve Farm Business Management Summary.
XBRL Enabled Tools Bob Cuthbertson CaseWare IDEA Inc.
Analytical Review and Audit Approaches
1-1 Introduction to Cost Management Financial Accounting Versus Management Accounting: A Systems Framework Accounting information systems Financial.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Experience of Leading Edge Organizations with CA/CM: Understanding the Challenges around People, Process and Technology.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
AUDIT QUALITY AND ASSURANCE 2 ND AND 3 RD OCTOBER 2014 HILTON HOTEL ANALYTICAL PROCEDURES 1.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
Cognos BI. What is Cognos? Cognos (Cognos Incorporated) was an Ottawa, Ontario-based company that makes Business Intelligence (BI) and Performance Management.
SAS 99: Consideration of Fraud in a Financial Statement Audit.
ACC 490 Week 2 DQ 2 The third generally accepted standard of audit fieldwork requires that auditors.
INTRODUCTION For effectively control the organizational activities, a large number of controlling techniques are available. They help to produce right.
Chapter 1 An Introduction to Assurance and Financial Statement Auditing.
Developing the Overall Audit Plan and Audit Program
Contextual Intelligence as a Driver of Services Innovation
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Completed Accounting Forms and Making Correcting Entries
Single Word Analysis Glory.
Web Mining Department of Computer Science and Engg.
MIS2502: Data Analytics Introduction to Advanced Analytics
Building better SWEATY paragraphs
Making the most of your money
AUDIT TESTS.
MKT 571 EDU best future education / mkt571edu.com.
Presentation transcript:

A RESEARCH TAXONOMY: THE APPLICATION OF DATA MINING TO FRAUD DETECTION Glen L. Gray California State University at Northridge Roger Debreceny University of Hawai‘i at Mānoa 8th Biennial Symposium on Information Integrity and Information Systems Assurance October, 2013

Introduction Observation The application of data mining to fraud detection during financial audits is at an early stage of development and researchers take a scatter-shot approach Objectives of our study Explore the application of data mining techniques to fraud detection Develop a taxonomy to support and guide future research

Data Examination Tools Data Analysis Data Mining Data Extraction & Query Software sophistication Predictive Power

GRAB THE LOW HANGING FRUIT..

Return on investment in data mining Spread investment in data mining over many clients

Return on investment in data mining Spread investment in data mining for one client over many possible fraud objects

LOOKING FOR THE SWEET SPOT.. Where can we leverage value from data mining in fraud detection?

Looking for the sweet spot! Scheme Fraud

Looking for the sweet spot!

Fraud Class by Evidence Scheme Gao, L., and R. P. Srivastava The Decomposition of Management Fraud Schemes: Analyses and Implications. Indian Accounting Review 15 (1):1-23.

Audit Specific Data Mining Scoring Scheme Source Target Signals Data Types Semantics Scoring Elements

Fraud Class, Evidence Scheme and Data Mining

FUTURE RESEARCH

Themes in Data Mining Mining External Information as Part of the Planning Phase Mining Client Non-financial performance data Analysis of Journal Entries Mining Accounting Information Systems and other textual sources