FRAUD Prevention & Detection. Group Members Raven Smith Tommy Harville Kedron Hilario.

Slides:



Advertisements
Similar presentations
Fraud and Internal Control Presented by Andy Harper Pugh & Company, P.C. April 28, 2011.
Advertisements

OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Chapter 14 Fraud Risk Assessment.
Ownership, Control and Compensation
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Introduction to the Investigative Audit Services Group.
How JCPenney is Managing Corporate Risk
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
Auditing Computer Systems
Auditing Computer-Based Information Systems
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
The Islamic University of Gaza
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Review of Introduction to Auditing
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Presented By: Donna Denker, CPA Donna Denker & Associates.
Forensic Accounting Research Chapter 10. Types of value added services Risk assessment of fraud and illegal acts Risk assessment of fraud and illegal.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Welcome to the Board! (and did we mention your Fiduciary Responsibility?)
Internal Auditing and Outsourcing
Performance Audit Fraud management in local government Report 19: David Toma Manager 24 July 2015.
Fraud Detection McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Overview of Financial Statement Analysis
2015 ANNUAL TRAINING By: Denise Goff
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 16: Audit of Cash Balances
Where’s the Money Going? 10 Things You Should Know about Internal Controls and Fraud Donna S. Brown, CPA Bob Powell, CPA November 12, 2010.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter 5 Internal Control over Financial Reporting
Chapter 10 Incentive Issues IDIS 364 – Spring 2007.
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
1 Application of SAS 112 in a Single Audit GAQC Member Conference Call January 15, 2008 Presented by Mandy Nelson, CPA George Rippey, CPA.
Chapter 10 Identifying and preventing fraud Qiang Jiang School of Business Sichuan University, China
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
Fraud and Abuse Don Pursley, Col Ret. USAFA, BSE, MS, DBA The speaker does not have any relevant financial relationships with any commercial interests.
Ensuring the Integrity of Financial Information Ensuring the Integrity of Financial Information C H A P T E R 5.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Learning Objectives LO1 Differentiate among frauds, errors, and illegal acts that might occur in an organization. LO2 Explain the auditing standards related.
©2010 Association of Certified Fraud Examiners, Inc.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Update on Recommendations from KPMG, Management Partners, and Task Force City Council Meeting November 16,
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
INTERNAL AUDIT - ACCOUNTS PAYABLE AUDIT University of Washington August 11, 2011 Kim Herrenkohl, Director Western Washington University Office of the Internal.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Chapter 3-Auditing Computer-based Information Systems.
Presented By: W. Andrew Powell, CPA Principal Halt, Buzas & Powell, Ltd.
Best Practices in Finance for Volunteers Brandy Vannoy, CPA Tim Rodgers, CPA July 26, 2008.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
“2016 Will Be Better” (Prediction to the OCU Staff in November 2015)
Internal Control Procedures
Fraud & Internal Controls
Defining Internal Control
NHTCA New Tax Collector Training Series
Chapter 12: Fraud Schemes & Fraud Detection
Internal controls 01-Nov-2017.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

FRAUD Prevention & Detection

Group Members Raven Smith Tommy Harville Kedron Hilario

What is Fraud? Surprise Trickery Cunning Unfair ways by which another is cheated

Fraud is not accidental Fraud is done with intent to deceive Financial mistakes that occur by accident are not considered fraud

Types of Fraud Employee Embezzlement Vendor Fraud Customer Fraud Management Fraud Investment Scams Consumer Fraud

Employee Embezzlement Most Common Stolen Cash or inventory

Vendor Fraud Vendor overbills Fewer goods are provided Collaboration Dummy addresses & fictitious vendors

Customer Fraud Bills aren’t paid Pays less than the bill Counterfeit money Receive assets they do not deserve Theft Lies

Management Fraud Most expensive Managers/Top Executives Financial Statement manipulation Motif – higher compensation

Investment Scams A Ponzi scheme is a fraudulent investment operation where the operator, an individual or organization, pays returns to its investors from new capital paid to the operators by new investors, rather than from profit earned by the operator

Consumer Frauds Telemarketing Identity Theft Internet Fraud

Who Commits Fraud?

Why Frauds Occur?

Fraud Prevention

Creating A Control Environment Tone at the top Code of conduct/ethics Anti-fraud policies Whistleblower hotlines

Sharing Information & Communication Classroom-style fraud awareness training Consistent reinforcement Orientation of new hires Annual performance evaluations

Designing & Implementing Antifraud Control Activities Establishment and maintenance of internal controls Segregation of duties Avoidance/discouragement of related party transactions Providing Board of Directors with oversight of management Use of encryption and complex passwords

Monitoring Activities Monitoring effectiveness of antifraud policies and controls Regular enforcement of policies and procedures –Creates a motivation within employees to comply –Worse to have a written policy that isn’t enforced than to not have a policy at all

Performing Audit Risk Assessments Giving internal auditors investigation authority –Examine and evaluate internal controls –Determine effectiveness of management’s actions –Evaluate control environment, key indicators of fraud, identify internal control weaknesses, recommend investigations –Perform fraud risk assessment

Fraud Detection

Who’s Responsible? Fraud Detection from and Auditor’s Perspective Fraud Detection using Data Analytics –Neural Networks –Decision Tree –Hidden Markov Models –Artificial Immune Systems –Genetic Algorithm

Fraud Detection Who’s Responsible? –Auditors –Management –Financial Staff

Fraud Detection Frequent evaluations of internal controls by auditors are suggested Auditors look for stressed relationships and lack of compliance with audit requests as a potential sign of fraudulent activity Companies with strong internal controls are tested more frequently on transactions. Testing on transactions has proven to be a very effective fraud detection technique used by auditors

Fraud Detection Data mining fraud detection techniques –Efficient –Specific in use –Vary in accuracy and price

Fraud Detection Neural Networks –Banks are considered to be the largest user –Ability to learn from previous instances Supervised training – training with fraudulent and non- fraudulent data in the same set. Unsupervised training – training on only one type of data –The ability to detect fraud comes from pattern recognition developed by training techniques

Fraud Detection Decision Trees –A type of network that uses a set of rules to break down one complex issue into many, manageable problems. –Can flag multiple transactions as fraud in a given instance by grouping similar transactions –Has the ability to learn and recognize patterns –Very flexible and operate quickly

Fraud Detection Hidden Markov Model –Depends on a profile set up to recognize spending habits –Profile logs amount spent, vendor, city, time of purchase etc. –Uses 3 categories to classify transactions High Profile Medium Profile Low Profile –Excellent at detecting fraud quickly, but also can overreact to changes in spending habits

Fraud Detection Artificial Immune Systems –Typically used to prevent intrusions and detect viruses –Only needs non-fraudulent data to train on to recognize fraudulent transactions –Adaptive capabilities –Favorable technique due to its relatively low cost, accuracy, and speed

Fraud Detection Genetic Algorithms –Commonly used to detect searching problems –Often combined with other data mining techniques to decrease the sensitivity of alerts

Class Discussion Are there any other fraud prevention tactics you would suggest? Are there any other fraud detection techniques you would suggest?

Conclusion What is fraud? Fraud Prevention Fraud Detection

In the famous words of Porky Pig…