Details

Forensic Analytics


Forensic Analytics

Methods and Techniques for Forensic Accounting Investigations
Wiley Corporate F&A 2. Aufl.

von: Mark J. Nigrini

60,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 20.04.2020
ISBN/EAN: 9781119585909
Sprache: englisch
Anzahl Seiten: 544

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Become the forensic analytics expert in your organization </b><b>using effective and efficient data analysis tests to find anomalies, biases, and potential fraud—the updated new edition</b></p> <p><i>Forensic Analytics</i> reviews the methods and techniques that forensic accountants can use to detect intentional and unintentional errors, fraud, and biases. This updated second edition shows accountants and auditors how analyzing their corporate or public sector data can highlight transactions, balances, or subsets of transactions or balances in need of attention. These tests are made up of a set of initial high-level overview tests followed by a series of more focused tests. These focused tests use a variety of quantitative methods including Benford’s Law, outlier detection, the detection of duplicates, a comparison to benchmarks, time-series methods, risk-scoring, and sometimes simply statistical logic. The tests in the new edition include the newly developed vector variation score that quantifies the change in an array of data from one period to the next. The goals of the tests are to either produce a small sample of suspicious transactions, a small set of transaction groups, or a risk score related to individual transactions or a group of items.</p> <p>The new edition includes over two hundred figures. Each chapter, where applicable, includes one or more cases showing how the tests under discussion could have detected the fraud or anomalies. The new edition also includes two chapters each describing multi-million-dollar fraud schemes and the insights that can be learned from those examples. These interesting real-world examples help to make the text accessible and understandable for accounting professionals and accounting students without rigorous backgrounds in mathematics and statistics. Emphasizing practical applications, the new edition shows how to use either Excel or Access to run these analytics tests. The book also has some coverage on using Minitab, IDEA, R, and Tableau to run forensic-focused tests. The use of SAS and Power BI rounds out the software coverage. The software screenshots use the latest versions of the software available at the time of writing. This authoritative book:</p> <ul> <li>Describes the use of statistically-based techniques including Benford’s Law, descriptive statistics, and the vector variation score to detect errors and anomalies</li> <li>Shows how to run most of the tests in Access and Excel, and other data analysis software packages for a small sample of the tests</li> <li>Applies the tests under review in each chapter to the same purchasing card data from a government entity</li> <li>Includes interesting cases studies throughout that are linked to the tests being reviewed.</li> <li>Includes two comprehensive case studies where data analytics could have detected the frauds before they reached multi-million-dollar levels</li> <li>Includes a continually-updated companion website with the data sets used in the chapters, the queries used in the chapters, extra coverage of some topics or cases, end of chapter questions, and end of chapter cases.</li> </ul> <p>Written by a prominent educator and researcher in forensic accounting and auditing, the new edition of <i>Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations</i> is an essential resource for forensic accountants, auditors, comptrollers, fraud investigators, and graduate students.</p>
<p>List of Cases xiii</p> <p>About the Author xv</p> <p>Preface xvii</p> <p>Abbreviations xxi</p> <p>Analytics Software Used xxv</p> <p><b>Introduction 1</b></p> <p>Temptation in an Occupation 2</p> <p>Fraudulent Checks Written by the CFO 4</p> <p>Fraudulent Purchases Made by a Purchasing Manager 7</p> <p>Donna was a Gamblin’ Wreck at Georgia Tech 9</p> <p>Forensic Analytics 11</p> <p>An Overview of Tableau 13</p> <p>The Risk Assessment Standards 19</p> <p>Discussion 21</p> <p><b>Chapter 1: Using Microsoft Excel for Forensic Analytics 23</b></p> <p>The Fraud Types Relevant to Forensic Analytics 23</p> <p>The Main Steps in a Forensic Analytics Application 25</p> <p>The Final Report 27</p> <p>An Overview of Excel 28</p> <p>Importing Data into Excel 29</p> <p>Some Useful Excel Formatting Features 30</p> <p>Protecting Excel Spreadsheets 32</p> <p>The Valuable "IF" Function 33</p> <p>The PIVOTTABLE Routine 36</p> <p>The Valuable VLOOKUP Function 38</p> <p>Using Excel Results in Word Files 40</p> <p>Excel Warnings and Indicators 42</p> <p>Excel Dashboards 43</p> <p>Dashboards in Practice 46</p> <p>Summary 47</p> <p><b>Chapter 2: The Initial High-Level Overview Tests 50</b></p> <p>The Data Profile 51</p> <p>The Histogram 56</p> <p>The Periodic Graph 58</p> <p>Descriptive Statistics 60</p> <p>Preparing the Data Profile Using Excel 62</p> <p>Preparing the Data Profile Using Access 64</p> <p>Preparing the Histogram in Excel and Access 68</p> <p>Preparing the Histogram in IDEA and Tableau 72</p> <p>Preparing the Periodic Graph in Excel and Access 74</p> <p>Summary 76</p> <p><b>Chapter 3: Benford’s Law: The Basic Tests 79</b></p> <p>An Overview of Benford’s Law 80</p> <p>Some Early Discussions of Benford’s Law 83</p> <p>Selected Articles from the Eighties 85</p> <p>Selected Articles from the Nineties 88</p> <p>Scenarios Under Which Data Should Conform to Benford 90</p> <p>The Two Scenarios Under Which Accounting Data Sets Should Conform to Benford 93</p> <p>Other Considerations for the Conformity of Accounting Data 94</p> <p>Accounting Data Examples 95</p> <p>Preparing the Benford Graph Using Excel 98</p> <p>Preparing the Benford Graph Using Access 99</p> <p>Summary 101</p> <p><b>Chapter 4: Benford’s Law: Advanced Topics 103</b></p> <p>Conformity and the Likelihood of Material Errors 103</p> <p>The First Digits Versus the First-Two Digits 107</p> <p>Measuring Conformity Using the Z-Statistic 109</p> <p>The Chi-Square and the Kolmogorov-Smirnoff Tests of Conformity 111</p> <p>The Mean Absolute Deviation (MAD) Test 112</p> <p>The Effect of Data Set Size of Conformity to Benford 114</p> <p>Using Benford’s Law in a Forensic Accounting Setting 116</p> <p>Using Benford’s Law for Journal Entries in an External Audit 119</p> <p>Using Benford for Subsidiary Ledger Balances in an External Audit 123</p> <p>Preparing the Benford Graph in Excel 125</p> <p>Summary 126</p> <p><b>Chapter 5: Benford’s Law: Completing The Cycle 127</b></p> <p>The Number Duplication Test 127</p> <p>The Number Duplications in Accounting Textbooks 132</p> <p>The Electric Utility Company Fraud Case 134</p> <p>The Petty Cash Fraud Scheme 136</p> <p>The Last-Two Digits Test 139</p> <p>The Fraudulent Credit Card Sales Scheme 141</p> <p>The Missing Cash Sales Case 142</p> <p>Running the Number Duplication Test in Excel 144</p> <p>Running the Number Duplication Test in Access 146</p> <p>Running the Last-Two Digits Test in Excel 148</p> <p>Running the Last-Two Digits Test in Access 149</p> <p>Running the Number Duplication Test in R 151</p> <p>Summary 153</p> <p><b>Chapter 6: Identifying Anomalous Outliers: Part 1 154</b></p> <p>The Summation Test 155</p> <p>The Fraud That Was Red Flagged by Two Qualitative Outliers 158</p> <p>The Largest Subsets Test 161</p> <p>The Largest Subset Growth Test 165</p> <p>The School District Transportation Fraud 168</p> <p>The SkyBonus Fraud Scheme 170</p> <p>Running the Summation Test in Excel 170</p> <p>Running the Summation Test in Access 171</p> <p>Running the Largest Subsets Test in Excel 172</p> <p>Running the Largest Subsets Test in Access 173</p> <p>Running the Largest Growth Test in Excel 174</p> <p>Running the Largest Growth Test in Access 176</p> <p>Running the Largest Subsets Test in R 179</p> <p>Summary 180</p> <p><b>Chapter 7: Identifying Anomalous Outliers: Part 2 182</b></p> <p>Examples of Relative Size Factor Test Findings 184</p> <p>The Scheme That Used a Vault That Was Over Capacity 186</p> <p>The Scheme That Added Sold Cars to the Car Inventory Account 189</p> <p>The Vice Chairman of the Board Who Stole 0.5 Percent of His Salary 193</p> <p>Running the RSF Test in Excel 194</p> <p>Running the RSF Test in Access 199</p> <p>Running the RSF Test in SAS 208</p> <p>Summary 212</p> <p><b>Chapter 8: Identifying Abnormal Duplications 214</b></p> <p>The Same-Same-Same Test 215</p> <p>Duplicate Payments and Various Types of Fraud 217</p> <p>The Same-Same-Different (Near-Duplicates) Test 220</p> <p>The Near-Duplicates Fraud Scheme: Introduction 221</p> <p>The Near-Duplicates Fraud: The Act 222</p> <p>The Near-Duplicates Fraud: Getting the Legal Process Started 224</p> <p>The Near-Duplicates Fraud: Two Sentencing Hearings 228</p> <p>The Near-Duplicates Fraud: Epilogue 230</p> <p>The Subset Number Duplication Test 231</p> <p>Running the Same-Same-Same Test in Excel 233</p> <p>Running the Same-Same-Different Test in Excel 235</p> <p>Running the Subset Number Frequency Test in Excel 237</p> <p>Running the Same-Same-Same Test in Access 239</p> <p>Running the Same-Same-Different Test in Access 240</p> <p>Running the Subset Number Frequency Test in Access 242</p> <p>Summary 245</p> <p><b>Chapter 9: Comparing Current Period and Prior Period Data: Part 1 247</b></p> <p>A Review of Descriptive Statistics 249</p> <p>An Analysis of the Purchasing Card Data 250</p> <p>My Law: An Analysis of Payroll Data 255</p> <p>An Analysis of Machine Learning Data 257</p> <p>An Analysis of Grocery Store Sales 261</p> <p>The Scheme That Used Bank Transfers to a Secret Bank Account 263</p> <p>Running the Descriptive Statistics Tests in Excel 268</p> <p>Running the Descriptive Statistics Tests in Minitab 269</p> <p>Running the Descriptive Statistics Tests in SAS 270</p> <p>Summary and Discussion 272</p> <p><b>Chapter 10: Comparing Current Period and Prior Period Data: Part 2 274</b></p> <p>Vectors and Measures of Change 275</p> <p>An Analysis of the Purchasing Card Data 280</p> <p>Taxpayer Identity Theft Refund Fraud 282</p> <p>The Tax Return That Omitted a Million Dollar Prize 284</p> <p>The Tax Returns for 2000 and 2001 285</p> <p>The Indictment for Tax Evasion 291</p> <p>The Tax Evasion Trial 292</p> <p>The Verdict and Sentencing 298</p> <p>An Analysis of Joe Biden’s Tax Returns 299</p> <p>Running the VVS Test in SAS 303</p> <p>Summary and Discussion 304</p> <p><b>Chapter 11: Identifying Anomalies In Time-Series Data 306</b></p> <p>An Analysis of the Purchasing Card Data 307</p> <p>Using IDEA for Time-Series Analysis 311</p> <p>The Fraud Scheme That Withdrew Funds from Customer Accounts 312</p> <p>Employee Data Access After Termination 317</p> <p>A Time-Series Analysis of Grocery Store Sales 321</p> <p>Using Correlation to Detect Fraud and Errors 322</p> <p>Using the Angle <i>θ </i>on Trial Balance Data 324</p> <p>Using the VVS on Customer Rebates 327</p> <p>Showing the VVS Results in a Dashboard 332</p> <p>Running Time-Series Analysis in SAS 334</p> <p>Summary and Discussion 336</p> <p><b>Chapter 12: Scoring Forensic Units for Fraud Risk 338</b></p> <p>An Overview of Risk Scoring 339</p> <p>The Audit Selection Method of the IRS 340</p> <p>The Fraudulent Vendor with a Post Office Box in the Head Office 344</p> <p>Risk Scoring to Detect Vendor Fraud 348</p> <p>Risk Scoring to Detect Errors in Sales Reports 354</p> <p>The Predictors Used in the Sales Report Scoring Model 356</p> <p>The Results of the Sales Report Scoring Model 364</p> <p>Summary and Discussion 365</p> <p><b>Chapter 13: Case Study: An Employee’s Fraudulent Tax Refunds 367</b></p> <p>Background Information 368</p> <p>The Nicest Person in the Office 369</p> <p>The Early Years of Tax Refund Fraud Scheme 372</p> <p>The Later Years of Tax Refund Fraud Scheme 375</p> <p>An Analysis of the Fraudulent Refund Amounts 376</p> <p>The End Was Nigh 383</p> <p>The Letter of the Law 386</p> <p>Sentencing 391</p> <p>Mary Ayers-Zander 392</p> <p>Epilogue 393</p> <p>Appendix 13A: The Fraudulent Refunds 394</p> <p><b>Chapter 14: Case Study: A Supplier’s Fraudulent Shipping Claims 401</b></p> <p>Background Information 401</p> <p>The Fraudulent Shipping Charges Scheme 403</p> <p>An Analysis of the Shipping Charges 405</p> <p>Charlene’s Lifestyle 408</p> <p>The Scheme is Discovered 409</p> <p>The Corley Plea 412</p> <p>Charlene’s Appeal for a Reduced Sentence 415</p> <p>The Government’s Response to Charlene’s Memorandum 417</p> <p>The Sentencing Hearing 417</p> <p>The Sentence 419</p> <p>Motion to Delay the Prison Term 420</p> <p>Conclusions 423</p> <p><b>Chapter 15: Detecting Financial Statement Fraud 425</b></p> <p>An Overview of Financial Statement Fraud 426</p> <p>Biases in Financial Statement Numbers 427</p> <p>Enron’s Financial Statements 430</p> <p>Enron’s Chief Financial Officer 432</p> <p>HealthSouth’s Financial Statements 433</p> <p>WorldCom’s Financial Statements 436</p> <p>WorldCom’s Rounded Numbers 440</p> <p>Using Benford’s Law to Detect Financial Statement Misconduct 442</p> <p>Beneish’s M-Score 446</p> <p>Detection and Investigation Steps 447</p> <p>Detecting Manipulations in Monthly Subsidiary Reports 449</p> <p>Summary 454</p> <p><b>Chapter 16: Using Microsoft Access and R For Analytics 455</b></p> <p>An Introduction to Access 456</p> <p>The Architecture of Access 457</p> <p>A Review of Access Tables 459</p> <p>Importing Data into Access 461</p> <p>A Review of Access Queries 462</p> <p>Converting Excel Data into a Usable Access Format 465</p> <p>Using the Access Documenter 466</p> <p>Database Limit of 2 GB 468</p> <p>Reports 469</p> <p>Miscellaneous Access Notes 471</p> <p>An Introduction to R 472</p> <p>Installing R and R Studio 472</p> <p>The Advantages of Using R 474</p> <p>R Markdown 475</p> <p>Running Arithmetic Code in R 475</p> <p>Calculating the VVS in R 477</p> <p>Summary 479</p> <p>Appendix 16A: A Discussion of the Basic Commands 480</p> <p><b>Chapter 17: Concluding Notes on Fraud Prevention and Detection 482</b></p> <p>The Annual Cost of Employee Fraud 483</p> <p>The Legal Process 484</p> <p>”I’m a Lawyer, Trust [Account] Me” 485</p> <p>The Rights of the Defendant 487</p> <p>Possible Defenses Against an Embezzlement Charge 490</p> <p>The Economics of Crime Model 492</p> <p>Internal Controls 493</p> <p>Fraud Risk Assessments 495</p> <p>Detective Controls 496</p> <p>Crime Insurance 498</p> <p>Fraud Detection Methods 500</p> <p>Other Fraud Prevention Methods 501</p> <p>Final Words 504</p> <p>Bibliography 507</p> <p>Index 515</p>
<p><b>MARK J. NIGRINI, P<small>H</small>D</b>, is a professor at West Virginia University where he teaches highly-rated, graduate-level accounting technology and forensic accounting classes. He has published extensively in academic and professional journals on various topics related to forensic analytics. His current research addresses forensic and continuous monitoring techniques and advanced theoretical work on Benford's Law.
<p>The revised and updated <i>Second Edition</i> of <i>Forensic Analytics</i> offers an essential guide to detecting accounting fraud, biases, and errors in financial data. The author—a noted expert on the topic—explores the methods and techniques that investigators can use to identify anomalies in both corporate and public sector data. These anomalies include errors, biases, duplicates, number rounding, and omissions. <p><i>Forensic Analytics</i> is written as a resource for professional accountants and auditors who typically lack a rigorous understanding of complex math and statistics. While the book is filled with fascinating vignettes and illustrations, it puts the focus on the quantitative and computing aspects of forensics. One lengthy chapter discusses how to detect financial statement misconduct through the use of various statistical approaches. The use of Benford's Law, descriptive statistics, correlation, and timeseries analysis are also reviewed. The book's data interrogation methods are based on common statistical techniques and the author's own research in the field. The author shows how to use Access and Excel in a forensic framework to help connect the dots and to reveal any red flags. <p>This revised <i>Second Edition</i> contains updates to Access and Excel that help detect anomalies and potential fraud, a review of the use of R, a flexible and free program that can do almost anything when it comes to data analysis, and many fresh fraud cases that complement the techniques presented. In addition, <i>Forensic Analytics</i> includes a companion website designed to help practice the methods and to use the data sets used in the book as examples. <p><i>Forensic Analytics</i> provides the information and examples needed to help you hone your skills to become a forensics-related analytics expert in your organization.
<p><b>The essential guide for detecting fraud, errors, biases, and other anomalies, revised and updated</b> <p>Now in its updated <i>Second Edition, Forensic Analytics</i> offers a hands-on guide that shows how to detect fraud, errors, biases, and other anomalies in accounting data. Step by step the author explains how to identify the notable items in financial data by using data interrogation techniques. The main tools demonstrated in the book are Excel and Access, together with a coverage of IDEA, SAS, R, Tableau, and Minitab. <p>The methods and techniques would be valuable to organizations that are small or large, and for-profit or nonprofit. The chapters in <i>Forensic Analytics</i> include real-world, detailed fraud cases showing how the fraud scheme might have been detected by using the methods illustrated in that chapter. Designed as a practical resource for professional accountants, auditors, and graduate accounting students, the book is filled with contemporary examples that can be worked through and practice scenarios that should develop a better understanding of the information presented. With over 250 tables and figures that include graphs, computer screenshots, and photos, this new <i>Second Edition</i> makes for reading that is both interesting and valuable.

Diese Produkte könnten Sie auch interessieren:

The Psychology of Risk
The Psychology of Risk
von: Ari Kiev
PDF ebook
44,99 €
What To Do When Machines Do Everything
What To Do When Machines Do Everything
von: Malcolm Frank, Paul Roehrig, Ben Pring
PDF ebook
18,99 €
Forbes To The Limits
Forbes To The Limits
von: James M. Clash
PDF ebook
18,99 €