SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Using Benford’s Law
for Fraud Detection & Auditing
Rohit Kundu, CAATs Expert
July 2014
• AuditNet® features:
• Over 2,000 Reusable Templates, Audit Programs,
Questionnaires and Control Matrices
• Networking Groups & Online Forums through LinkedIn, Google
and Yahoo
• Audit Guides, Manuals, and Books on Audit Basics
CaseWare Analytics (IDEA) users receive full access to AuditNet templates
• Founded in 1988
• An industry leader in providing technology solutions for
finance, accounting, governance, risk and audit professionals
• Over 400,000 users of our technologies across 130 countries
and 16 languages
• Customers include Fortune 500 and Global 500 companies
• Microsoft Gold Certified Partner
CaseWare International
International Acceptance
• What is Benford’s Law?
• Conforming/Non-Conforming Data Types
• Practical Applications of Benford’s Law
• Major Digit Tests
• Demo
• Q&A
Agenda
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Simon Newcomb’s Theory:
Frequency of Use of the Different Digits in Natural Numbers
“A multi-digit number is more likely to begin with ‘1’ than any other number.”
Pg. 40. American Journal of Mathematics,
The Johns Hopkins University Press
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Frank Benford:
• Analyzed 20,229 sets of numbers, including, areas of rivers, baseball
averages, atomic weights of atoms, electricity bills, etc.
Conclusion
Multi digit numbers beginning with 1, 2 or 3 appear more frequently than
multi digit numbers beginning with 4, 5, 6, etc.
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Data First Digit 1 First Digit 2 First Digit 3
Populations 33.9 20.4 14.2
Batting Averages 32.7 17.6 12.6
Atomic Weight 47.2 18.7 10.4
X-Ray Volts 27.917 15.7
Average 30.6% 18.5% 12.4%
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Roger Pinkham:
Research conducted revealed that Benford’s probabilities are scale invariant.
Dr. Mark Nigrini:
Published a thesis noting that Benford’s Law could be used to detect fraud
because human choices are not random; invented numbers are unlikely to
follow Benford’s Law.
The number 1 occurs as the
leading digit 30.1% of the
time, while larger numbers
occur in the first digit less
frequently.
For example, the number 3879
 3 - first digit
 8 - second digit
 7 - third digit
 9 – fourth digit
Benford’s Law
Benford’s Law Key Facts
 For naturally occurring numbers, the leading digit(s) is (are)
distributed in a specific, non-uniform way.
 While one might think that the number 1 would appear as
the first digit 11 percent of the time, it actually appears
about 30 percent of the time.
 Therefore the number 1 predominates most progressions.
 Scale invariant – works with numbers denominated as
dollars, yen, euros, pesos, rubles, etc.
 Not all data sets are suitable for analysis.
Benford’s Law Defined
Conforming Data Types
• Data set should describe similar data (e.g. town populations)
• Large Data Sets
• Data that has a wide variety in the number of figures e.g.
plenty of values in the hundreds, thousands, tens of
thousands, etc.
• No built-in maximum or minimum values
Some common characteristics of accounting data…
Conforming Data Types - Examples
• Accounts payable transactions
• Credit card transactions
• Customer balances and refunds
• Disbursements
• Inventory prices
• Journal entries
• Loan data
• Purchase orders
• Stock prices, T&E expenses, etc.
Non-Conforming Data Types
• Data where pre-arranged, artificial limits or nos. influenced
by human thought exist i.e. built-in maximum or minimum
values
– Zip codes, telephone nos., YYMM#### as insurance policy no.
– Prices sets at thresholds ($1.99, ATM withdrawals, etc.)
– Airline passenger counts per plane
• Aggregated data
• Data sets with 500 or few transactions
• No transaction recorded
– Theft, kickback, skimming, contract rigging, etc.
Usage of Benford’s Law
• Within a comprehensive Anti-Fraud Program
COSO Framework
Risk
Assessment
Control
Environment
Control
Activities
Information and
Communication
Specify
organizational
objectives
Monitoring
High- Level Usage of Benford’s Law
• Risk-Based Audits
– Planning Phase
 Early warning sign that past data patterns have changed
or abnormal activity
Data Set X represents the first
digit frequency of 10,000 vendor
invoices.
High- Level Usage of Benford’s Law
• Forensic Audits
– Check fraud, bypassing permission limits, improper
payments
• Audit of Financial Statements
– Manipulation of checks, cash on hand, etc.
• Corporate Finance/Company Evaluation
– Examine cash-flow-forecasts for profit centers
Major Digit Tests (using IDEA)
• 1st Digit Test
• 2nd Digit Test
• First two digits
• First three digits
• Last two digits
• Second Order Test
1st & 2nd Digit Tests
1st Digit Test
• High Level Test
• Will only identify the blinding glimpse of the obvious
• Should not be used to select audit samples, as the sample
size will be too large
2nd Digit Test
• Also a high level test
• Used to identify conformity
• Should not be used to select audit samples
First Two Digits Test
• More focused and examines the frequency of the numerical
combinations 10 through 99 on the first two digits of a series
of numbers
• Can be used to select audit targets for preliminary review
Example:
10,000 invoices -- > 2600 invoices
-- > (1.78% + 1.69%) x 10,000
-- > (178 + 169) = 347 invoices
Only examine invoices beginning with the
first two digits 31 and 33.
Source: Using Benford’s Law to Detect Fraud , ACFE
First Three Digits Test
• Highly Focused
• Used to select audit samples
• Tends to identify number duplication
Last Two Digits Test
• Used to identify invented (overused) and rounded numbers
• It is expected that the right-side two digits be distributed
evenly. With 100 possible last two digits numbers (00, 01,
02...., 98, 99), each should occur approximately 1% of the
time.
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New
Jersey
Second Order Test
• Based on the 1st two digits in the data.
• A numeric field is sorted from the smallest to largest
(ordered) and the value differences between each pair of
consecutive records should follow the digit frequencies of
Benford’s Law.
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New
Jersey
Continuous Monitoring Framework
• Automated & Repeatable Analysis
• Input New Analytics with Ease
• Remediation Workflow & Resolution Guidelines
• KPIs (Root Cause Analysis)
Continuous Monitoring Framework
Turn-key Solutions
• P2P
• Purchasing Cards and T&E Monitoring
– Identify transaction policy violations
– Spend, Expense & Vendor profiling
– Identify card issuance processing errors
– Evaluate trends for operational/process improvements
Conclusion
Benford’s Law
• One person invents all the numbers
• Lots of different people have an incentive to manipulate
numbers in the same way
• Useful first step to give us a better understanding of our data
• Need to use Benford’s Law together with other drill down
tests
• Technology enables this faster and easier to produce results
Rohit Kundu
Rohit.kundu@caseware.com
Sunder Gee
Sunder.Gee@ZapConsulting.ca
IDEA Inquiries
salesidea@caseware.com
Q & A

Más contenido relacionado

La actualidad más candente

Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Showvikas_k
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
Sarbanes-Oxley Act 2002
Sarbanes-Oxley Act 2002Sarbanes-Oxley Act 2002
Sarbanes-Oxley Act 2002Syed Shah
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
Anti-Money Laundering and Counter Financing of Terrorism
Anti-Money Laundering and Counter Financing of TerrorismAnti-Money Laundering and Counter Financing of Terrorism
Anti-Money Laundering and Counter Financing of TerrorismPuni Hariaratnam
 
Auditing sampling presentation
Auditing sampling  presentationAuditing sampling  presentation
Auditing sampling presentationDominic Korkoryi
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk AssessmentTahir Abbas
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Anti Money Laundering Framework
Anti Money Laundering FrameworkAnti Money Laundering Framework
Anti Money Laundering Frameworknikatmalik
 

La actualidad más candente (20)

Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Show
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
Fraud Analytics
Fraud AnalyticsFraud Analytics
Fraud Analytics
 
Sarbanes-Oxley Act 2002
Sarbanes-Oxley Act 2002Sarbanes-Oxley Act 2002
Sarbanes-Oxley Act 2002
 
Audit of Cash Balances
Audit of Cash BalancesAudit of Cash Balances
Audit of Cash Balances
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Anti-Money Laundering and Counter Financing of Terrorism
Anti-Money Laundering and Counter Financing of TerrorismAnti-Money Laundering and Counter Financing of Terrorism
Anti-Money Laundering and Counter Financing of Terrorism
 
Lecture 9, Chapter 13, Audit Sampling
Lecture 9, Chapter 13, Audit SamplingLecture 9, Chapter 13, Audit Sampling
Lecture 9, Chapter 13, Audit Sampling
 
Auditing sampling presentation
Auditing sampling  presentationAuditing sampling  presentation
Auditing sampling presentation
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Anti Money Laundering Framework
Anti Money Laundering FrameworkAnti Money Laundering Framework
Anti Money Laundering Framework
 
SA 530 Audit Sampling
SA 530 Audit SamplingSA 530 Audit Sampling
SA 530 Audit Sampling
 
Audit sampling
Audit samplingAudit sampling
Audit sampling
 
Aml cft training programme
Aml cft training programmeAml cft training programme
Aml cft training programme
 

Destacado

Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our ResponsibilitiesJason Lundell
 
Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsCaseWare IDEA
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
VAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderVAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderLinkurious
 
Outlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopOutlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopPranab Ghosh
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudRussell James
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)Amazon Web Services
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detectionMk Kim
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaData Driven Innovation
 
PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014Sri Ambati
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picaloguest4ea866f
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraudsteinkamps6
 
Continuing professional development this time its personal!
Continuing professional development this time its personal!Continuing professional development this time its personal!
Continuing professional development this time its personal!joedale
 

Destacado (20)

Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred Lyons
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
VAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderVAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing trader
 
Outlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopOutlier and fraud detection using Hadoop
Outlier and fraud detection using Hadoop
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detection
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
 
Deep Learning for Fraud Detection
Deep Learning for Fraud DetectionDeep Learning for Fraud Detection
Deep Learning for Fraud Detection
 
PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
 
Continuing professional development this time its personal!
Continuing professional development this time its personal!Continuing professional development this time its personal!
Continuing professional development this time its personal!
 

Similar a Using benford's law for fraud detection and auditing

Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussioneasternman99
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Robert Hillard
 
Nov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYNov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYFay Teplitsky
 
Phone Fraud Detection
Phone Fraud DetectionPhone Fraud Detection
Phone Fraud DetectionSri Kanajan
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna CainKaren Harkavy
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BIJen Stirrup
 
Data analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit ConferenceData analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit ConferenceMatthew Green
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesMensah Sitti
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To KnowRaffa Learning Community
 
10 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt110 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt1Lavante, Inc.
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...emermell
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to KnowRaffa Learning Community
 

Similar a Using benford's law for fraud detection and auditing (20)

Mathematics ib ia example
Mathematics ib ia exampleMathematics ib ia example
Mathematics ib ia example
 
Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
 
benfords Law
benfords Lawbenfords Law
benfords Law
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
 
Nov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYNov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKY
 
Phone Fraud Detection
Phone Fraud DetectionPhone Fraud Detection
Phone Fraud Detection
 
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BI
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
 
Data analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit ConferenceData analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit Conference
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologies
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know
 
10 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt110 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt1
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know
 

Más de Jim Kaplan CIA CFE

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsJim Kaplan CIA CFE
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) Jim Kaplan CIA CFE
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 

Más de Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 

Último

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 

Último (20)

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 

Using benford's law for fraud detection and auditing

  • 1. Using Benford’s Law for Fraud Detection & Auditing Rohit Kundu, CAATs Expert July 2014
  • 2. • AuditNet® features: • Over 2,000 Reusable Templates, Audit Programs, Questionnaires and Control Matrices • Networking Groups & Online Forums through LinkedIn, Google and Yahoo • Audit Guides, Manuals, and Books on Audit Basics CaseWare Analytics (IDEA) users receive full access to AuditNet templates
  • 3. • Founded in 1988 • An industry leader in providing technology solutions for finance, accounting, governance, risk and audit professionals • Over 400,000 users of our technologies across 130 countries and 16 languages • Customers include Fortune 500 and Global 500 companies • Microsoft Gold Certified Partner CaseWare International
  • 5. • What is Benford’s Law? • Conforming/Non-Conforming Data Types • Practical Applications of Benford’s Law • Major Digit Tests • Demo • Q&A Agenda
  • 6. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Simon Newcomb’s Theory: Frequency of Use of the Different Digits in Natural Numbers “A multi-digit number is more likely to begin with ‘1’ than any other number.” Pg. 40. American Journal of Mathematics, The Johns Hopkins University Press
  • 7. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Frank Benford: • Analyzed 20,229 sets of numbers, including, areas of rivers, baseball averages, atomic weights of atoms, electricity bills, etc. Conclusion Multi digit numbers beginning with 1, 2 or 3 appear more frequently than multi digit numbers beginning with 4, 5, 6, etc.
  • 8. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Data First Digit 1 First Digit 2 First Digit 3 Populations 33.9 20.4 14.2 Batting Averages 32.7 17.6 12.6 Atomic Weight 47.2 18.7 10.4 X-Ray Volts 27.917 15.7 Average 30.6% 18.5% 12.4%
  • 9. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Roger Pinkham: Research conducted revealed that Benford’s probabilities are scale invariant. Dr. Mark Nigrini: Published a thesis noting that Benford’s Law could be used to detect fraud because human choices are not random; invented numbers are unlikely to follow Benford’s Law.
  • 10. The number 1 occurs as the leading digit 30.1% of the time, while larger numbers occur in the first digit less frequently. For example, the number 3879  3 - first digit  8 - second digit  7 - third digit  9 – fourth digit Benford’s Law
  • 11. Benford’s Law Key Facts  For naturally occurring numbers, the leading digit(s) is (are) distributed in a specific, non-uniform way.  While one might think that the number 1 would appear as the first digit 11 percent of the time, it actually appears about 30 percent of the time.  Therefore the number 1 predominates most progressions.  Scale invariant – works with numbers denominated as dollars, yen, euros, pesos, rubles, etc.  Not all data sets are suitable for analysis.
  • 13. Conforming Data Types • Data set should describe similar data (e.g. town populations) • Large Data Sets • Data that has a wide variety in the number of figures e.g. plenty of values in the hundreds, thousands, tens of thousands, etc. • No built-in maximum or minimum values Some common characteristics of accounting data…
  • 14. Conforming Data Types - Examples • Accounts payable transactions • Credit card transactions • Customer balances and refunds • Disbursements • Inventory prices • Journal entries • Loan data • Purchase orders • Stock prices, T&E expenses, etc.
  • 15. Non-Conforming Data Types • Data where pre-arranged, artificial limits or nos. influenced by human thought exist i.e. built-in maximum or minimum values – Zip codes, telephone nos., YYMM#### as insurance policy no. – Prices sets at thresholds ($1.99, ATM withdrawals, etc.) – Airline passenger counts per plane • Aggregated data • Data sets with 500 or few transactions • No transaction recorded – Theft, kickback, skimming, contract rigging, etc.
  • 16. Usage of Benford’s Law • Within a comprehensive Anti-Fraud Program COSO Framework Risk Assessment Control Environment Control Activities Information and Communication Specify organizational objectives Monitoring
  • 17. High- Level Usage of Benford’s Law • Risk-Based Audits – Planning Phase  Early warning sign that past data patterns have changed or abnormal activity Data Set X represents the first digit frequency of 10,000 vendor invoices.
  • 18. High- Level Usage of Benford’s Law • Forensic Audits – Check fraud, bypassing permission limits, improper payments • Audit of Financial Statements – Manipulation of checks, cash on hand, etc. • Corporate Finance/Company Evaluation – Examine cash-flow-forecasts for profit centers
  • 19. Major Digit Tests (using IDEA) • 1st Digit Test • 2nd Digit Test • First two digits • First three digits • Last two digits • Second Order Test
  • 20. 1st & 2nd Digit Tests 1st Digit Test • High Level Test • Will only identify the blinding glimpse of the obvious • Should not be used to select audit samples, as the sample size will be too large 2nd Digit Test • Also a high level test • Used to identify conformity • Should not be used to select audit samples
  • 21. First Two Digits Test • More focused and examines the frequency of the numerical combinations 10 through 99 on the first two digits of a series of numbers • Can be used to select audit targets for preliminary review Example: 10,000 invoices -- > 2600 invoices -- > (1.78% + 1.69%) x 10,000 -- > (178 + 169) = 347 invoices Only examine invoices beginning with the first two digits 31 and 33. Source: Using Benford’s Law to Detect Fraud , ACFE
  • 22. First Three Digits Test • Highly Focused • Used to select audit samples • Tends to identify number duplication
  • 23. Last Two Digits Test • Used to identify invented (overused) and rounded numbers • It is expected that the right-side two digits be distributed evenly. With 100 possible last two digits numbers (00, 01, 02...., 98, 99), each should occur approximately 1% of the time. Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 24. Second Order Test • Based on the 1st two digits in the data. • A numeric field is sorted from the smallest to largest (ordered) and the value differences between each pair of consecutive records should follow the digit frequencies of Benford’s Law. Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 25. Continuous Monitoring Framework • Automated & Repeatable Analysis • Input New Analytics with Ease • Remediation Workflow & Resolution Guidelines • KPIs (Root Cause Analysis)
  • 26. Continuous Monitoring Framework Turn-key Solutions • P2P • Purchasing Cards and T&E Monitoring – Identify transaction policy violations – Spend, Expense & Vendor profiling – Identify card issuance processing errors – Evaluate trends for operational/process improvements
  • 27. Conclusion Benford’s Law • One person invents all the numbers • Lots of different people have an incentive to manipulate numbers in the same way • Useful first step to give us a better understanding of our data • Need to use Benford’s Law together with other drill down tests • Technology enables this faster and easier to produce results