Details

Fraud and Fraud Detection


Fraud and Fraud Detection

A Data Analytics Approach
Wiley Corporate F&A 1. Aufl.

von: Sunder Gee

52,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 05.11.2014
ISBN/EAN: 9781118779675
Sprache: englisch
Anzahl Seiten: 352

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Detect fraud faster—no matter how well hidden—with IDEA automation</b> <p><i>Fraud and Fraud Detection</i> takes an advanced approach to fraud management, providing step-by-step guidance on automating detection and forensics using CaseWare's IDEA software. The book begins by reviewing the major types of fraud, then details the specific computerized tests that can detect them. Readers will learn to use complex data analysis techniques, including automation scripts, allowing easier and more sensitive detection of anomalies that require further review. The companion website provides access to a demo version of IDEA, along with sample scripts that allow readers to immediately test the procedures from the book.</p> <p>Business systems' electronic databases have grown tremendously with the rise of big data, and will continue to increase at significant rates. Fraudulent transactions are easily hidden in these enormous datasets, but <i>Fraud and Fraud Detection</i> helps readers gain the data analytics skills that can bring these anomalies to light. Step-by-step instruction and practical advice provide the specific abilities that will enhance the audit and investigation process. Readers will learn to:</p> <ul> <li>Understand the different areas of fraud and their specific detection methods</li> <li>Identify anomalies and risk areas using computerized techniques</li> <li>Develop a step-by-step plan for detecting fraud through data analytics</li> <li>Utilize IDEA software to automate detection and identification procedures</li> </ul> <p>The delineation of detection techniques for each type of fraud makes this book a must-have for students and new fraud prevention professionals, and the step-by-step guidance to automation and complex analytics will prove useful for even experienced examiners. With datasets growing exponentially, increasing both the speed and sensitivity of detection helps fraud professionals stay ahead of the game. <i>Fraud and Fraud Detection</i> is a guide to more efficient, more effective fraud identification.</p>
<p>Foreword ix</p> <p>Preface xi</p> <p>Acknowledgments xv</p> <p><b>Chapter 1: Introduction 1</b></p> <p>Defining Fraud 1</p> <p>Anomalies versus Fraud 2</p> <p>Types of Fraud 2</p> <p>Assess the Risk of Fraud 4</p> <p>Conclusion 6</p> <p>Notes 6</p> <p><b>Chapter 2: Fraud Detection 7</b></p> <p>Recognizing Fraud 7</p> <p>Data Mining versus Data Analysis and Analytics 10</p> <p>Data Analytical Software 11</p> <p>Anomalies versus Fraud within Data 12</p> <p>Fraudulent Data Inclusions and Deletions 14</p> <p>Conclusion 14</p> <p>Notes 15</p> <p><b>Chapter 3: The Data Analysis Cycle 17</b></p> <p>Evaluation and Analysis 17</p> <p>Obtaining Data Files 19</p> <p>Performing the Audit 22</p> <p>File Format Types 24</p> <p>Preparation for Data Analysis 24</p> <p>Arranging and Organizing Data 33</p> <p>Conclusion 35</p> <p>Notes 35</p> <p><b>Chapter 4: Statistics and Sampling 37</b></p> <p>Descriptive Statistics 37</p> <p>Inferential Statistics 38</p> <p>Measures of Center 38</p> <p>Measure of Dispersion 39</p> <p>Measure of Variability 40</p> <p>Sampling 41</p> <p>Conclusion 65</p> <p>Notes 65</p> <p><b>Chapter 5: Data Analytical Tests 67</b></p> <p>Benford’s Law 68</p> <p>Number Duplication Test 77</p> <p>Z-Score 81</p> <p>Relative Size Factor Test 84</p> <p>Same-Same-Same Test 93</p> <p>Same-Same-Different Test 94</p> <p>Even Amounts 98</p> <p>Conclusion 99</p> <p>Notes 100</p> <p><b>Chapter 6: Advanced Data Analytical Tests 101</b></p> <p>Correlation 101</p> <p>Trend Analysis 104</p> <p>GEL-1 and GEL-2 109</p> <p>Conclusion 121</p> <p>Note 122</p> <p><b>Chapter 7: Skimming and Cash Larceny 123</b></p> <p>Skimming 123</p> <p>Cash Larceny 124</p> <p>Case Study 124</p> <p>Conclusion 131</p> <p><b>Chapter 8: Billing Schemes 133</b></p> <p>Data and Data Familiarization 134</p> <p>Benford’s Law Tests 138</p> <p>Relative Size Factor Test 139</p> <p>Z-Score 140</p> <p>Even Dollar Amounts 141</p> <p>Same-Same-Same Test 144</p> <p>Same-Same-Different Test 145</p> <p>Payments without Purchase Orders Test 146</p> <p>Length of Time between Invoice and Payment Dates Test 151</p> <p>Search for Post Office Box 152</p> <p>Match Employee Address to Supplier 155</p> <p>Duplicate Addresses in Vendor Master 157</p> <p>Payments to Vendors Not in Master 158</p> <p>Gap Detection of Check Number Sequences 161</p> <p>Conclusion 162</p> <p>Note 162</p> <p><b>Chapter 9: Check-Tampering Schemes 163</b></p> <p>Electronic Payments Fraud Prevention 164</p> <p>Check Tampering 165</p> <p>Data Analytical Tests 166</p> <p>Conclusion 171</p> <p><b>Chapter 10: Payroll Fraud 173</b></p> <p>Data and Data Familiarization 175</p> <p>Data Analysis 181</p> <p>The Payroll Register 193</p> <p>Payroll Master and Commission Tests 194</p> <p>Conclusion 195</p> <p>Notes 196</p> <p><b>Chapter 11: Expense Reimbursement Schemes 197</b></p> <p>Data and Data Analysis 201</p> <p>Conclusion and Audit Trail 219</p> <p>Notes 220</p> <p><b>Chapter 12: Register Disbursement Schemes 221</b></p> <p>False Refunds and Adjustments 221</p> <p>False Voids 222</p> <p>Concealment 222</p> <p>Data Analytical Tests 222</p> <p>Conclusion 233</p> <p><b>Chapter 13: Noncash Misappropriations 235</b></p> <p>Types of Noncash Misappropriations 235</p> <p>Concealment of Noncash Misappropriations 237</p> <p>Data Analytics 238</p> <p>Conclusion 240</p> <p><b>Chapter 14: Corruption 243</b></p> <p>Bribery 243</p> <p>Tender Schemes 244</p> <p>Kickbacks, Illegal Gratuities, and Extortion 245</p> <p>Conflict of Interest 246</p> <p>Data Analytical Tests 247</p> <p>Concealment 250</p> <p>Conclusion 250</p> <p><b>Chapter 15: Money Laundering 253</b></p> <p>The Money-Laundering Process 254</p> <p>Other Money Transfer Systems and New Opportunities 256</p> <p>Audit Areas and Data Files 257</p> <p>Conclusion 259</p> <p><b>Chapter 16: Zapper Fraud 261</b></p> <p>Point-of-Sales System Case Study 265</p> <p>Quantifying the Zapped Records 294</p> <p>Additional POS Data Files to Analyze 296</p> <p>Missing and Modified Bills 297</p> <p>The Markup Ratios 299</p> <p>Conclusions and Solutions 300</p> <p>Notes 302</p> <p><b>Chapter 17: Automation and IDEAScript 303</b></p> <p>Considerations for Automation 304</p> <p>Creating IDEAScripts 306</p> <p>Conclusion 316</p> <p><b>Chapter 18: Conclusion 319</b></p> <p>Financial Statement Fraud 319</p> <p>IDEA Features Demonstrated 321</p> <p>Projects Overview 323</p> <p>Data Analytics: Final Words 325</p> <p>Notes 326</p> <p>About the Author 327</p> <p>About the Website 329</p> <p>Index 333</p>
<p><b>SUNDER GEE</b> spent much of his career at the Canada Revenue Agency, including holding the position of Electronic Commerce Audit Advisor for the Head Office. He has advised tax authorities around the world on the topic of computer-assisted audit techniques (CAAT). Sunder has prepared widely respected corporate training material and college courses on forensic accounting, anti–money laundering, and data analytics.
<p>Big data and other emerging technologies can be a fraudster's dream come true. It's a cinch to hide a few fraudulent transactions within enormous, difficult-to-manage databases. And tech-savvy fraudsters can use new software to automate their risky activities. Unhappily for them, big data can also simplify the process of fraud detection. That's where <i>Fraud and Fraud Detection</i> comes in, showing auditors, investigators, and risk professionals how to use big data analytics to stay one step ahead of cyber criminals. <p>Only a tiny fraction of businesses worldwide are using big data technologies to aid in fraud detection. Why? One reason could be the lack of clear resources supporting the implementation of a fraud mitigation approach that is still on the cutting-edge. <i>Fraud and Fraud Detection</i> goes a very long way toward removing this obstacle. This hands-on book addresses all the major types of employee fraud, including cash skimming, billing schemes, payroll fraud, and many more. For each fraud type, author Sunder Gee provides tests that can be customized and automated, even for millions of transactions per day. <p>Data analytics software is a crucial element in bringing fraud detection into the 21<sup>st</sup> century. The techniques in <i>Fraud and Fraud Detection</i> can be used with any analytics software, and there is enough information here to develop a step-by-step plan for designing and implementing automated detection programs. Users of CaseWare's IDEA software will especially appreciate the downloadable IDEAScripts that can speed the process of making fraud detection automatic. On the companion website included with <i>Fraud and Fraud Detection</i>, readers have access to a fully functional version of IDEA. <p>A certain amount of fraud risk is acceptable in any organization—and Sunder Gee demonstrates this point artfully in <i>Fraud and Fraud Detection</i>. Still, fraudsters are evolving with the times, and fraud mitigation professionals need to keep up. Right now, there is enormous potential to improve the efficiency of fraud detection through big data analytics, but almost no one is taking advantage of this opportunity. <i>Fraud and Fraud Detection</i> opens up a clear path for accessing this untapped value.

Diese Produkte könnten Sie auch interessieren:

Counterparty Credit Risk, Collateral and Funding
Counterparty Credit Risk, Collateral and Funding
von: Damiano Brigo, Massimo Morini, Andrea Pallavicini
EPUB ebook
69,99 €
Risk Management for Islamic Banks
Risk Management for Islamic Banks
von: Imam Wahyudi, Fenny Rosmanita, Muhammad Budi Prasetyo, Niken Iwani Surya Putri
EPUB ebook
55,99 €