Fraud Examination, 3E Chapter 6: Data-Driven Fraud Detection COPYRIGHT © 2009 South-Western, a part of Cengage Learning.

Slides:



Advertisements
Similar presentations
Building Business Acumen Series: Making Dollars and Sense of Financial Statements Presented by : The Dean Consulting Group Diane D. Dean Principal December.
Advertisements

FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
School of Accounting Florida International University Fraud Detection Recognizing the symptoms of Fraud Proactive Approaches to Detecting Fraud.
Computer Assisted and Audit Tools and Techniques Drs. Haryono, Ak. M.Com & Dimas M. Widiantoro, SE., S.Kom., M.Sc. Pics from :
CENTURY 21 ACCOUNTING © 2009 South-Western, Cengage Learning LESSON 4-1 Preparing a Chart of Accounts 1.Describe the two parts of an account number. 2.List.
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 14 The Business Reporting (BR) Process.
Auditing Computer-Based Information Systems
Auditing Computer-Based Information Systems
Shenanigans 1-4 Article Overview Data Driven Fraud Detection Today’s Topics FORENSIC ACCOUNTING - BA124 – Spring
Learning Objectives LO6 Explain the auditing standards related to external, internal, and governmental auditors’ responsibilities to detect and report.
The Islamic University of Gaza
Fraud Examination, 3E Chapter 11: Financial Statement Fraud COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
CAATTs for Data Extraction and Analysis
MIS DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA MARTS MBNA
FORENSIC ACCOUNTING - BA124 - Fall 2011Slide 6-1 Today’s Topics n Data Analysis & Fraud Detection n Financial Statement Analysis and Detection n Shenanigan.
FORENSIC ACCOUNTING - BA124 - Fall 2009Slide 6-1 Today’s Topics n Inductive Fraud Detection n Financial Statement Analysis and Detection n High Technology.
FORENSIC ACCOUNTING - BA124 - Spring 2011Slide 6-1 Today’s Topics n Inductive Fraud Detection n Financial Statement Analysis and Detection n High Technology.
Chapter Seventeen Using Accounting Information. Copyright © Cengage Learning. All rights reserved. Learning Objectives 1.Explain why accounting information.
You can type your own categories and points values in this game board. Type your questions and answers in the slides we’ve provided. When you’re in slide.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Proactive Approaches to Detecting Fraud CHAPTER 6.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
A Framework for Financial Statement Analysis Chapter 11.
Chapter 6 Data-Driven Fraud Detection. Sampling ISA 240 emphasizes that Fraud is more difficult to detect than unintentional errors Errors- sampling is.
Presentation Overview Background Accessing Retail Data Warehouse Using ACL Accessing ODBC Accounting Package Using ACL Accessing AS400 Using ACL Accessing.
Learning Objectives LO1 Distinguish between management and auditor’s responsibilities regarding an auditee organization’s internal controls. LO2 Explain.
© The McGraw-Hill Companies, Inc., 2008 McGraw-Hill/Irwin Chapter Thirteen Financial Statement Analysis.
CBS Data Analysis with CATT Tool – IDEA
The McGraw-Hill Companies, Inc. 2008McGraw-Hill/Irwin CHAPTER 13 Financial Statement Analysis.
MIS DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA MARTS MBNA ebay
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
© EZ-R Stats, LLC Duplicate Payments Slide 1 Auditing for Duplicate Payments A better way … Presentation of
Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO1Construct a chart of accounts for a service business organized as a proprietorship.
Chapter 8: Client Risk Profile and Documentation
Chapter 9: Financial Statement Analysis
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Revenue- and Inventory-Related Financial Statement Frauds Chapter 12.
Chapter 5 Flowcharting Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Chapter 7: Business Intelligence and Decision Support Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Using Computer Assisted Audit Tools and Techniques (CAATTs)
Fraud Examination, 3E Chapter 13: Liability, Asset, and Inadequate Disclosure Frauds COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Chapter Thirteen Financial Statement Analysis McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
Accessing an ODBC Database. External Data ODBC Command From ACL Project Screen use External Data ODBC Command.
Fraud Detection FRAUD EXAMINATION ALBRECHT & ALBRECHT Proactive Approaches to Detecting Fraud CHAPTER 6.
Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 24 Comparative Financial Statement Analysis.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Proactive Approaches to Detecting Fraud CHAPTER 6.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Financial and Managerial Accounting Wild, Shaw, and Chiappetta Fourth Edition Wild, Shaw, and Chiappetta Fourth Edition McGraw-Hill/Irwin Copyright © 2011.
BUS 591 Week 6 DQ 2 Horizontal vs. Vertical Analysis (Ash) Horizontal vs. Vertical Analysis. Discuss the horizontal and vertical analysis of a financial.
ACC 571 EDU Education Terms/acc571edu.com
© 2014 Cengage Learning. All Rights Reserved.
Chapter 7: Computer Assisted Analytical Techniques
John J. Wild Sixth Edition
The Role of Accountants and Accounting Information
Chapter 2: Understanding the Accounting Cycle
© 2014 Cengage Learning. All Rights Reserved.
Systems Analysis and Design in a Changing World, 6th Edition
© 2014 Cengage Learning. All Rights Reserved.
Financial Statement Analysis
© 2014 Cengage Learning. All Rights Reserved.
FRAUD EXAMINATION ALBRECHT & ALBRECHT
© 2014 Cengage Learning. All Rights Reserved.
Integrity Filters in eProcurement Systems
BUSINESS HIGH SCHOOL-ACCOUNTING II
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
Data-Driven Fraud Detection
Presentation transcript:

Fraud Examination, 3E Chapter 6: Data-Driven Fraud Detection COPYRIGHT © 2009 South-Western, a part of Cengage Learning

Learning Objectives Describe the importance of data-driven fraud detection, including the difference between accounting anomalies and fraud. Explain the steps in the data analysis process. Be familiar with common data analysis packages. Understand the principles of data access, including open database connectivity (ODBC), text import, and data warehousing. 2

Learning Objectives Perform basic data analysis procedures for fraud detection. Read and analyze a Matasos matrix. Understand how fraud is detected by analyzing financial statements. 3

Data-Driven Fraud Detection Fraud vs. Anomalies Anomalies… – are not intentional – will be found throughout a data set Fraud… – is intentional – is found in very few data sets – is like “finding a needle in a haystack” 4

Proactive Method of Fraud Detection The Six Steps of the Proactive Method: 1.Understand the business 2.Identify Possible Frauds That Could Exist 3.Catalog Possible Fraud Symptoms 4.Use Technology to Gather Data About Symptoms 5.Analyze Results 6.Investigate Symptoms 5

Data Analysis Software Audit Command Language (ACL) – Powerful program for data analysis – Most widely used by auditors worldwide CaseWare’s IDEA – Powerful program for data analysis with more Windows-like user interface – ACL’s primary competitor Picalo – Similar to IDEA and ACL but incorporates “Detectlets”—small plug-ins to detect fraud indicators 6

Data Access Gathering the right data in the right format during the right time period. Methods include: Open Database Connectivity (ODBC) Text Import Hosting a Data Warehouse 7

Data Analysis Analysis techniques that are most commonly used by fraud investigators: Data Preparation Digital Analysis Outlier Investigation Stratification and Summarization Time Trend Analysis Fuzzy Matching Benford’s Law 8

Data Analysis – Matasos Matrix One way to view the results of multiple indicators is to use a chart called a Matasos matrix: 9 Contract Winning Vendor Number of Red Flags Lost Bids Brand Names Last Bidder Winner Sequential Bid Security Number Direct Corp.10%70%0% Satyoo20%68%0%100% Danicorp10%72%0% Under Inc.30%70%100%

Financial Statement Analysis Approaches to Financial Statement Analysis: comparing account balances from one period to the next calculating key ratios and comparing them from period to period performing horizontal analysis performing vertical analysis 10