6-1. 6-2 06 Fraud Detection McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

Slides:



Advertisements
Similar presentations
Learning Objectives LO1 Differentiate among frauds, errors, and illegal acts that might occur in an organization. LO2 Explain the auditing standards related.
Advertisements

Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Auditing Concepts.
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
Learning Objectives LO6 Explain the auditing standards related to external, internal, and governmental auditors’ responsibilities to detect and report.
Auditing Computer-Based Information Systems
McGraw-Hill/Irwin ©2007 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Management Fraud and Audit Risk "It takes 20 years to build a.
Understanding the Client and General Planning
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Working with Financial Statements Chapter Three.
6-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Internal Control Evaluation: Assessing Control Risk.
Roger S. Debreceny Shidler College of Business University of Hawai‘i at Mānoa Glen L. Gray College of Business & Economics California State University,
18- 1 © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 18 Integrated Audits of Internal Control (For Public Companies Under Sarbanes-Oxley.
Internal Control in a Financial Statement Audit
Cash and Financial Investments. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Internal Control Over --Cash Receipts.
Lecture 8 Understanding entity and its environment
Chapter 6 Data-Driven Fraud Detection. Sampling ISA 240 emphasizes that Fraud is more difficult to detect than unintentional errors Errors- sampling is.
1 Rittenberg/Schwieger/Johnstone Auditing: A Business Risk Approach Sixth Edition Chapter 7 Performing an Integrated Audit Copyright © 2008 Thomson South-Western,
© Copyright 2012 Pearson Education. All Rights Reserved. Chapter 10 Fraud & Internal Control ACCOUNTING INFORMATION SYSTEMS The Crossroads of Accounting.
Internal Auditing and Outsourcing
Fraud Examination, 3E Chapter 4: Preventing Fraud
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
Preventing Fraud: What are the central securities depositories doing to mitigate this risk? Cancún, May 21, 2015.
Auditing Internal Control over Financial Reporting
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
Chapter 5 Internal Control over Financial Reporting
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Audit Risk. "Audit risk" means the risk that the auditor gives an inappropriate audit opinion when the financial statements are materially misstated Audit.
Internal Control in a Financial Statement Audit
International Auditing and Assurance Standards Board (IAASB) Issues:
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
FRAUD Prevention & Detection. Group Members Raven Smith Tommy Harville Kedron Hilario.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 5-1 Chapter Five Audit Planning and Types of Audit Tests Chapter.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Auditing and the Public Accountant Profession Importance of Auditing Bodies required to have an annual audit: All public and larger private companies.
Learning Objectives LO1 Differentiate among frauds, errors, and illegal acts that might occur in an organization. LO2 Explain the auditing standards related.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
5 - 1 Copyright  2003 Pearson Education Canada Inc. CHAPTER 5 Audit Responsibilities and Objectives.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 2-1 Chapter Two The Financial Statement Auditing Environment.
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 2-1 Chapter Two The Financial Statement Auditing Environment.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Chapter 9 Audit Sampling – Part a.
Chapter 3-Auditing Computer-based Information Systems.
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Internal Control. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition A process...designed.
and Types of Audit Tests
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Illinois Office of the Comptroller Financial Training Workshop 2016.
Auditing Concepts.
Performing an Integrated Audit
Internal control objectives
Audit Planning, Types of Audit Tests, and Materiality
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

6-1

Fraud Detection McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

6-3 The Fraud Detection Process The fraud detection process involves identifying indicators of fraud that suggest a need for further investigation. Various means of detecting fraud exist, including tips and hotlines, financial statement audits, and by accident.

6-4 Hotlines and Fraud Discovery Hotlines are very effective They must have a disclosure policy Confidentiality and anonymity They must be supplemented by an ethics code, employee training proper monitoring, advertising, and the right tone from top management

6-5 Other Means of Fraud Discovery By accident This happens frequently, especially in companies with weak controls. But it might happen too late for a small company to survive. By external auditors. SAS 99 requires that auditors design financial statement audits in such a way so as to have a reasonable chance of detecting misstatements in the financial reports. But not all fraud leads to misstatements. Still, external auditors must consider fraud risk and should use the fraud triangle. External auditors must report frauds to the appropriate level of management.

6-6 Other Means of Fraud Discovery By internal auditors Internal auditors should report directly to the board of directors By inspectors general By security departments

6-7 Fraud Issues Often fraud and waste or errors are indistinguishable from one another There is a tradeoff between prevention, detection, and correction Detection produces false positives and false negatives False positives indicate fraud when there is none False negatives indicate no fraud where this is fraud One goal is to balance the rate of false positives versus the rate of false negatives so that Total Fraud Costs are minimized Total Fraud Costs = Prevention Costs + Detection Costs + Correction Costs + Fraud Losses

6-8 Fraud Indicators Composite indicators Are typically produced from weighted sums of individual indicators. The weighted sum is called a risk score. One example of a risk score is a FICO credit score Single-factor indicators Are also called red flags In the typical scenario, a single red flag may initiate an investigation In many cases, the reliance on fraud indicators alone is not sufficient. Random tests also may be needed, because fraudsters may manipulate fraud indicators, or the set of detectors in use might not be capable of detecting some frauds.

6-9 Data-Driven Fraud Detection Data-driven fraud detection involves the formal process of sifting through data in search of fraud indicators. Sources of data include internal control data, basic tips and hotlines, security breaches, and pattern data. Internal control data include reconciliation failures, control total failures, exception transactions, and apparent errors. Security breaches occur when an individual accesses some entity resources without first being granted a sufficient privilege to do so. Pattern data analysis, or data mining, combines different data items in complex and non-intuitive ways to signal fraud.

6-10 Steps in Building a Fraud Detection System The general approach involves 1) risk analysis and control development, 2) exploitation of expert knowledge, 3) knowledge discovery, 4) implementation. Knowledge discovery involves SEMMA: Sampling, Exploration, Modification, Modeling, and Assessment. Various common modeling techniques exist, including linear regression analysis, for example. Various special modeling techniques also exist, including social network analysis, content analysis and text analysis, and Benford analysis, for example.

6-11 Benford Analysis