SlideShare una empresa de Scribd logo
1 de 45
DETECTING FRAUD
                     USING DATA MINING
                     TECHNIQUES


                    A Forensic Accountant’s Perspective




ADVISORY SERVICES
►   Designed specifically for auditors and investigators

      ►   Read only access to data imported

      ►   Creates log of all operations carried out and changes

      ►   Import and export data into multitude of formats

      ►   Read and process millions of records




ADVISORY SERVICES
 Compares, joins, appends and connects different files from
           different sources
        Extracts specific transactions, identifies gaps or duplicates
        Profiles data by summarizing, stratifying or aging the files
        Creates useful file statistics automatically
        Displays the data and results graphically
        Identifies duplicates and detects gaps
        Creates samples using different sampling methods




ADVISORY SERVICES
Traditional Sampling                   Data Mining

        Random and Scattered                 Exceptions targeted

     Highlights what "could happen"           Incident-oriented

      Conclusions are extrapolated    Clear picture of what is happening




ADVISORY SERVICES
ADVISORY SERVICES
   Planning
                       Requesting the data
                       Performing the transfer
                       Importing the data to the audit software
                       Insuring that the transfer is successful




ADVISORY SERVICES
   Fixed Length
                       Variable Length
                       Proprietary formats
                       Print or text files
                       Relational data bases
                       Date fields
                       Relational data bases
                       Date fields
                       Record definitions or data dictionaries




ADVISORY SERVICES
-    IDEA
               -    ACL
               -    Active Data for Excel
               -    Access




ADVISORY SERVICES
Step 1 – Understand the Business


                Step 2 – Identify the possible frauds that could exist


                    Step 3 – Catalog possible fraud symptoms


              Step 4 – Use technology to gather data about symptoms


                            Step 5 – Analyze the results


                        Step 6 – Investigate the symptoms




ADVISORY SERVICES
S te p 2 :
                                  S te p 1 :                                                                                       S te p 3 :
Analytica tic a l
    A n a ly
                            U n d e rsta n d th e
                                                                                    Id e n tify P o ssib le
                                                                                  F ra u d s th a t C o u ld
                                                                                                                            C a ta lo g P o ssib le
      S te p s :
l                               B u sin e ss
                                                                                              E xist
                                                                                                                            F ra u d S ym p to m s




                                                            S te p 4 :
                                                                                                               S te p 5 :
Technolog s : g y
    T e c h n o lo
        S te p
                                                    U se T e ch n o lo g y to
                                                    G a th e r D a ta A b o u t
                                                                                                               A n a lyze
                                                                                                                                             A u to m a te D e te ctio n
                                                                                                                                                   P ro ce d u re s
                                                                                                               R e su lts
y                                                         S ym p to m s




     In v e s tig a tiv e                                                                 S te p 6 :

Investigativ :
          S te p s
                                                                                        In ve stig a te
                                                                                        S ym p to m s
                                                                                                                                 F o llo w U p


e
    Duplicate payments tests
              Benford’s Law analysis
              Rounded amount invoices
              Invoices just below approval levels
           Abnormal invoice volume activity
             Rapid increase
             High variance
           Vendors with sequential invoice Numbers or where
            numbers and dates are inconsistent
           Merge vendor and employee files
           Relative Size Factor




ADVISORY SERVICES
 Benford’s Law predicts the digit patterns in “naturally
            occurring” sets of data.
           The law is named after Frank Benford, a physicist at the
            GE Research Laboratories in the 1930’s
           He tested his theory by tabulating the first digits for
            approximately 20,000 observations
           He used integral calculus to formulate the expected digit
            frequencies in lists of numbers
           His results shows clear bias towards the low digits, but the
            later digits become less pronounced
           The scale invariance theorem, by Pinkham, asserts that a
            set of numbers conforming to Benford’s Law, when
            multiplied by a nonzero constant, still conforms




ADVISORY SERVICES
 The numbers should represent the sizes of similar
              phenomena.
           There should be not built-in maximum or minimum
              values.
           The data should not consist of assigned numbers.
          .
           There should be more small items than large items.
           Data sets should have four or more digits for a good fit.
           As a data set increases in size, it becomes more
              feasible to get the expected digit frequencies.




ADVISORY SERVICES
 The populations of towns and cities in Europe? YES
           The daily and weekly number of shares bought and sold for an
              individual company listed on the NYSE? YES
           The five-digit postal zip codes used in the U.S.? NO
          .
           The street numbers for every house in the U.S? YES
           The dollar amounts of each air ticket sold or refunded by American
              Airlines for a year? NO
           The invoiced amount of each bill issued by DirectTV? NO
           The extended inventory values of a Wal-Mart warehouse with more
              than 20,000 line items? YES




ADVISORY SERVICES
First Digit  Second Digit
                        Digit   Frequency     Frequency
                         0           -             11.97%
                         1            30.10%       11.39%
                         2            17.61%       10.88%
                         3            12.49%       10.43%
                         4             9.69%       10.03%
                         5             7.92%        9.67%
                         6             6.70%        9.34%
                         7             5.80%        9.04%
                         8             5.12%        8.76%
                         9             4.58%        8.50%



            $1,546.20 – First digit is 1, second digit is 5, third digit is 4
              $55.95 – First digit is 5 second digit is 5, third digit is 9




ADVISORY SERVICES
35.00%

         30.00%              Digit 1
         25.00%              Digit 2
                             Digit 3
         20.00%              Digit 4
         15.00%              Digit 5
                             Digit 6
         10.00%
                             Digit 7
          5.00%              Digit 8
          0.00%              Digit 9
                    Digits




ADVISORY SERVICES
   First-digits
                               Second-digits
                               First-two-digits
                               First-three-digits
                               Number duplication
                               Last-two-digits
                               Rounded numbers


    1. If the data set is under 10,000 observations, the first-three-digits test
       should not be performed
    2. The last-two-digits test is only useful to look for signs of estimation




ADVISORY SERVICES
1. For fraudulent data, the Round Numbers test is the most consistent

    2. For error finding and payback, the two most successful tests are Same
       invoice number, Same dollar amount, Different vendor numbers and
       Relative Size Factor




ADVISORY SERVICES
ADVISORY SERVICES
ADVISORY SERVICES
ADVISORY SERVICES
ADVISORY SERVICES
ADVISORY SERVICES
ADVISORY SERVICES
DECOSIMO FORENSIC ACCOUNTING
                                                       Computer Consultants, Inc.
                                                           Payment History

EXHIBIT No. 3

                Difference                                                                                            Date
 Invoice         Invoice     Voucher   Vendor                                    Invoice                    Check    Cleared
 Number          Number      Number    Number            Vendor Name              Date         Amount       Number    Bank


 40008544                      10921      54382   COMPUTER CONSULTANTS,   INC.    3/15/2008     $1,495.00   172808    3/18/2008
 40102926          94,382      11752      54382   COMPUTER CONSULTANTS,   INC.    4/15/2008     $3,850.00   176683    4/20/2008
 40203702         100,776      12983      54382   COMPUTER CONSULTANTS,   INC.    5/20/2008     $4,500.00   179261    5/22/2008
 40300531          96,829      13182      54382   COMPUTER CONSULTANTS,   INC.     6/1/2008     $6,500.00   181708    6/10/2008
 40402424         101,893      13638      54382   COMPUTER CONSULTANTS,   INC.     7/1/2008     $8,500.00   187025    7/24/2008
 40500332          97,908      13806      54382   COMPUTER CONSULTANTS,   INC.     8/6/2008     $8,500.00   188868    8/12/2008
 40601247         100,915      14163      54382   COMPUTER CONSULTANTS,   INC.    9/15/2008     $9,500.00   193668    9/16/2008
 40701963         100,716      14478      54382   COMPUTER CONSULTANTS,   INC.   10/20/2008     $9,500.00   197621   10/27/2008
 40800036          98,073      14664      54382   COMPUTER CONSULTANTS,   INC.    11/1/2008     $8,825.00   199969    11/7/2008
 40900892         100,856      14951      54382   COMPUTER CONSULTANTS,   INC.    12/1/2008     $8,825.00   203053   12/11/2008
 40803762         (97,130)     14873      54382   COMPUTER CONSULTANTS,   INC.    12/2/2008     $9,080.00   201901    12/4/2008
 41002604         198,842      15286      54382   COMPUTER CONSULTANTS,   INC.     1/1/2009     $9,500.00   207486    1/26/2009
 41106182         103,578      15703      54382   COMPUTER CONSULTANTS,   INC.     2/1/2009     $9,500.00   212211     3/8/2009
 41205440          99,258      15913      54382   COMPUTER CONSULTANTS,   INC.     3/1/2009     $9,500.00   215828     4/1/2009
 50303352       9,097,912      16782      54382   COMPUTER CONSULTANTS,   INC.     3/8/2009     $8,440.00   225166    6/28/2009
 50105441        (197,911)     16263      54382   COMPUTER CONSULTANTS,   INC.     4/1/2009     $9,500.00   220013    5/10/2009
 50301195         195,754      16680      54382   COMPUTER CONSULTANTS,   INC.     5/1/2009     $9,500.00   223815    6/18/2009
 50302272           1,077      16727      54382   COMPUTER CONSULTANTS,   INC.     6/1/2009     $9,500.00   224479    6/18/2009
 50302271              (1)     16727      54382   COMPUTER CONSULTANTS,   INC.    6/10/2009     $8,160.00   224479    6/18/2009
 50303353           1,082      16782      54382   COMPUTER CONSULTANTS,   INC.    6/22/2009     $9,545.00   225167    6/28/2009
 50303354               1      16782      54382   COMPUTER CONSULTANTS,   INC.    6/23/2009     $8,520.00   225165    6/28/2009
 50303351              (3)     16782      54382   COMPUTER CONSULTANTS,   INC.    6/23/2009     $9,500.00   225168    6/28/2009


Total Checks Issued to Computer Consultants                                                   $174,895.00
Test   Vendor Num   Invoice Num   Invoice Date Invoice Amount
                                     1       Exact         Exact         Exact         Exact
Fields Needed:
                                     2      Different      Exact         Exact         Exact
Vendor/ supplier number              3       Exact        Similar        Exact         Exact
Invoice number                       4       Exact         Exact        Similar        Exact
Invoice date                         5       Exact         Exact         Exact        Similar
Invoice amount                       6       Exact        Similar        Exact        Similar
                                     7       Exact        Similar       Similar        Exact
                                     8       Exact         Exact        Similar       Similar
                                     9      Different      Exact        Similar        Exact



      Similar Invoice Numbers – If exact match after stripping out zeros,
      alphabetic and punctuation
      Similar Invoice Dates – If dates are within a certain period
      Similar Amounts – Difference within +/- 3%, one amount is exactly
      twice the other and amounts start with the first four digits




 ADVISORY SERVICES
Fields Needed:
Vendor/ supplier number
Invoice number
Invoice date                            Exact Matching
                                           Invoice                 Invoice
Invoice amount       Test   Vendor Num       Num    Invoice Date   Amount
                       A       Exact        Exact      Exact        Exact
                       B       Exact        Exact         -         Exact
                       C       Exact        Exact      Exact          -
                       D       Exact           -       Exact        Exact
                       E       Exact      Different    Exact        Exact
                       F      Different     Exact      Exact        Exact

                                        "Fuzzy" Match
                       G       Exact      Fuzzy         -          Similar    Letters and digits only
                       H       Exact      Fuzzy         -          Exact            Letters only
                       I       Exact      Fuzzy         -          Exact             Digits only
                       J       Exact      Fuzzy         -          Exact     Contain similar characters
                       K       Exact         -        Exact        Fuzzy     Within "blank" percentage




 ADVISORY SERVICES
ADVISORY SERVICES
STRATA
                                                              LEVELS            97%
   Purchase   $     1,000   Leases         $   100,000   $         500   $         485
              $     5,000                  $ 1,000,000   $       1,000   $         970
              $    10,000                                $       1,500   $       1,455
              $ 1,000,000   Write offs     $    50,000   $       5,000   $       4,850
                                           $   250,000   $      20,000   $      19,400
   POs        $    25,000                  $   500,000   $      25,000   $      24,250
              $   500,000                  $ 1,000,000   $      50,000   $      48,500
                                                         $     200,000   $     194,000
   Checks     $    20,000   Dispositions   $    10,000   $     250,000   $     242,500
                                                         $     500,000   $     485,000
                                                         $   1,000,000   $     970,000
                                                         $   2,000,000   $   1,940,000




ADVISORY SERVICES
John Smith Manufacturing, Inc.
                                                    Approval Levels
                                                   December 31, 2009
                                         Decosimo Forensic Accounting - Exhibit 22

  INV_NUM            NET_AMT VEND_NUM             VEND_NAME                CK_NUM     CK_NET         SESSION PAY_NUM INV_DATE

Approval Limit   $     10,000
   D42908        $    9,836.48   25679           VANGARD BC                 55787    $    9,836.48     55787   125074    1/11/2009
   D42909        $    9,836.48   25679           VANGARD BC                 59456    $    9,836.48     56370   131975    2/12/2009
   D42910        $    9,836.48   25679           VANGARD BC                 58269    $    9,836.48     56370   131975    3/13/2009
   D42911        $    9,836.48   25679           VANGARD BC                 55537    $    9,836.48     59070   554469    4/14/2009
   D42912        $    9,836.48   25679           VANGARD BC                 54540    $    9,836.48     59153   163295    5/15/2009
   D42913        $    9,836.48   25679           VANGARD BC                 56368    $    9,836.48     58269   153921    6/16/2009
   D42914        $    9,836.48   25679           VANGARD BC                 56415    $    9,836.48     58269   153921    7/17/2009
   D42915        $    9,836.48   25679           VANGARD BC                 56746    $    9,836.48     55537   123131    8/18/2009
   D42916        $    9,836.48   25679           VANGARD BC                 59070    $    9,836.48     55537   123131    9/19/2009
   D42917        $    9,836.48   25679           VANGARD BC                 59153    $    9,836.48     54540   115281   10/20/2009
  D43238-1       $    9,946.66   25679            AMERICHEM                 55787    $ 266,250.14      54540   115281    1/15/2009
 7290963188      $    9,895.74   34644         INVISTA SARL INC             58249    $2,459,481.91     58249   153491     8/9/2009
 7290963787      $    9,889.21   34644         INVISTA SARL INC             58249    $2,459,481.91     58249   153491    8/10/2009
    184201       $    9,900.00     558   BILL ACUFF & ASSOCIATES INC        57705    $ 22,326.00       57705   147993     7/9/2009
    186928       $    9,900.00     558   BILL ACUFF & ASSOCIATES INC        57705    $ 22,326.00       57705   147993     7/9/2009
 SLSTX 0807      $    9,985.64    2294   NEW YORK STATE SALES TAX           58283    $    9,985.64     58283   552406     9/7/2009
 SLSTX 0807      $    9,985.64    2294   NEW YORK STATE SALES TAX           58311    $    9,785.64     58311   552542     9/7/2009
  031775-41      $    9,922.93     226           CHEMICAL CO                57790    $ 638,822.55      57790   149135    5/15/2009
  031819-41      $    9,833.15     226           CHEMICAL CO                57790    $ 638,822.55      57790   149135    5/17/2009
   4591840       $    9,771.23     937     XPRESS GLOBAL SYSTEMS            54669    $ 153,859.49      54669   116592   12/14/2009
   4691297       $    9,922.03     937     XPRESS GLOBAL SYSTEMS            54669    $ 153,859.49      54669   116592   12/14/2009




ADVISORY SERVICES
   Extract all round dollar amounts
            Compare current year payroll file to terminated employees
            Compare payroll data to human resource data
            Extract employees without employee number or SS number
            Extract employees without deductions or taxes withheld
            Extract employees with payments after termination dates
            Check for sequential or duplicate SS numbers
            Duplicate mailing addresses paid in say period
            Calculate % of overtime to gross pay
            Compare current year to prior year payroll file to detect pay rate
             changes




ADVISORY SERVICES
► Incentive/Pressures – meet the deadline, make
             the number, under the gun, make the deal
             (sale), under pressure, afraid, problem, just
             book it, lose my job, get fired
        ► Opportunity – cookie jar reserve, facilitation fee,
             process fee, release expense, handover fee,
             hush money, improper payment, cash only kick
             back off the books
        ► Rationalization – everyone does it, it’s the
             culture, trust me, they owe me, sounds justified,
             fix it later, nobody will notice, just an error, she,
             he told me to do it




ADVISORY SERVICES
 Clearly define ownership of the vendor data
           Review and engage access controls
           Establish clear vendor setup procedures
           Enforce new vendor approval practices
           Determine when multiple vendor records will be allowed
           Manage one-time vendor accounts separately
           Apply consistent naming conventions
           Enforce Data Validation including the free IRS TIN matching system
           Remove employees from the master vendor file
           Perform maintenance on a regular basis
           Remove old/unused vendors
           Retain the right records
           Establish written, detailed procedures




ADVISORY SERVICES
Do not ignore a red flag – Studies of fraud cases
  consistently show that red flags were present, but were
  either not recognized or were recognized but not acted
  upon by anyone.

Sometimes an error is just an error – Red flags should
  lead to some kind of appropriate action, i.e. an
  investigation by a measured & responsible person, but
  sometimes an error is just an error and no fraud exists




ADVISORY SERVICES
Inc reas ing            D ec reas ing
                                               purc has es from        purc has es from
                                               fav ored v endor         other v endors


                                                                                                                                                       1099s from
                                                                                                 D ec reas ing
                                                                                                                                                    v endor c om pany
                                                                                                    quality
                                                                                                                                                    to buy er relativ es
                        Inc reas ing pric es




                                                                  A nalyt ical                                   D ocum en ts and
                                                                  S ym pt om s                                       R eco rd s
                                 Larger order
                                  quantities

                                                                                                                                                                                     A ll trans ac tions
                                                                                                                                                                                    eith one buy erand
                                                                                                                                                                                        one v endor
 B uy er does n't
 relate w ell to
other buy ers or
    v endors                                      B eh avio ral
                                                  S ym pt om s
                                                                                          K ic k b a c k s                            In ternal C o nt ro ls

                                                                                                                                                                                       U s e of
                                                                                                                                                                                    unapprov ed
         E m ploy ee w ork
                                                                                                                                                                                      v endors
          habits c hange




                              Q uality                                                                                                                          B uy er building
                        c om plaints about                         Tips and                                         Lyfestyle                                  ex pens iv e hom e
                            purc has ed                           C om p lain ts                                   S ym pt om s                                    (bey ond
                             produc ts                                                                                                                          ex pec tations )




                                       U ns uc c es s ful                                                                                                       B uy er ow ning
                                           v endor                       A nony m ous tips                          B uy er liv ing                            m ore ex pens iv e
                                        c om plaints                     about buy ers or                          bey ond k now n                               autom ibiles
                                                                             v endors                                  s alary
RED FLAGS ASSOCIATED WITH
EXPENSE REIMBURSEMENT SCHEMES
   ►   Failure of supervisors to adequately review expense reports
   ►   T&E expenses exceeding budget or prior years’ totals
   ►   T&E expenses significantly exceed those of other employees with
       similar responsibilities
   ►   Expense reports that lack support or are supported by photocopies
   ►   Claims for reimbursement of old expenses
   ►   Employees who pay higher dollar expenses in cash
   ►   Expense reports which consistently total to round numbers
   ►   Expense reports which consistently total at or just below the
       organization’s reimbursement limit
   ►   Expense reports that have been approved by a manager outside
       the claimant’s department




 ADVISORY SERVICES
RED FLAGS ASSOCIATED WITH
           BILLING SCHEMES
  ►   No segregation of duties in the purchasing function
  ►   Sharpe rise in the amount of service-related expenses or
      expenses in general
  ►   Inventory shortages
  ►   Absence of detail on vendor invoices
  ►   Absence of detail on vendor master
  ►   Recurring payments
  ►   New or unknown vendors
  ►   Duplicate payment to vendors
  ►   Unexplained or temporary changes to vendor files
  ►   Unfolded invoices
  ►   Phone numbers which do not correspond with physical location
  ►   Only PO Box for address or residential address



ADVISORY SERVICES
RED FLAGS ASSOCIATED WITH
    CHECK TAMPERING SCHEMES
     No segregation of duties in check preparation and check
      delivery
     Unusual or excessive entries to cash accounts
     Excessive voided checks
     Signatures not matching authorized signatures
     Cash checking account shortages
     Checks payable to cash or employee
     Out of sequence or duplicate number checks
     Canceled checks printed on inferior stock
     Canceled checks with dual endorsements
     Vendor complaints about non payment
     Bank statements with manual corrections


ADVISORY SERVICES
PAYROLL SCHEMES RED FLAGS
   ►   No segregation of duties in human resources and payroll
   ►   Payroll expenses exceed budgeted or prior years’ totals
   ►   Employees with the same personal information
   ►   Employees lacking payroll information such as taxes or
       insurance being withheld
   ►   Unexplained increases in overtime, either in departments or
       by employee
   ►   A non-linear correlation between sales and commission
       expenses
   ►   Disproportionately large increase in employee
       compensation




ADVISORY SERVICES
• Trust is placed in employees
          • Employees have detailed knowledge of the accounting systems and their
              weaknesses
          •   Management domination subverts normal internal controls
          •   Management adds pressure to “make the numbers”
          •   Expected moral behavior is not communicated to employees
          •   Unduly liberal accounting practices
          •   Ineffective or nonexistent internal auditing staff.
          •   Lack of effective internal controls.
          •   Poor accounting records.
          •   Related party transactions.
          •   Incomplete and out of date procedural documentation.
          •   Management sets a bad example.


ADVISORY SERVICES
• Cash flow does not match net           • Decrease in the Asset Quality Index
    income                                  – Noncurrent Assets, exclusive of
  • Receivables spike relative to sales –   PPE, relative to total assets in given
    Days’ Sales in Receivables              year
  • Management earning tied to            • Exceptionally strong sales growth
    performance                             from one year to next
  • Significant increase in Gross          • Low Total Accruals to Total Assets –
     Margin Index                             Working Capital, less Cash, less
  • High turnover of key management           Current Taxes Payable, less Current
  • Sales allowances, warranties and          Portion of LTD, less AD and
    other reserves out of line compared       Amortization, divided by Total Assets
    with others in industry



ADVISORY SERVICES
• Employee lifestyle changes    • High employee turnover


  • Significant personal debt and • Refusal to take vacation or
   credit problems                  sick leave

  • Behavioral changes            • Lack of segregation of duties
                                    in a high-risk (vulnerable)
  • Defensive                       area




ADVISORY SERVICES
• Reluctance to provide information to    • Weak internal control environment
  auditors                                • Unexpected overdrafts or declines in
• Photocopied or missing documents          cash balances
• Decisions dominated by an individual or • Accounting personnel are lax or
  small group                               inexperienced
• Excessive number of year-end            • High employee turnover rate
  transactions                            • Compensation is out of proportion
• Management displays significant         • Decentralization without adequate
  disrespect for regulatory bodies          monitoring
• Excessive number of or frequent         • Frequent changes in external auditors
  changes in checking accounts




ADVISORY SERVICES
• Excessive number of voids           • Excessive or unjustified cash
  • Presence of personal checks in        transactions
    petty cash                          • Large number of account write-offs
  • Sudden activity in a dormant        • Bank accounts not reconciled on a
    account                               timely basis
  • Taxpayer complaints that they are   • Unauthorized bank accounts
    receiving non-payment notices
  • Discrepancies between bank          • Abnormal number of expense items
    deposits and postings                 or reimbursement to an employee




ADVISORY SERVICES

Más contenido relacionado

La actualidad más candente

Deep learning for medical imaging
Deep learning for medical imagingDeep learning for medical imaging
Deep learning for medical imaginggeetachauhan
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)DheerajPachauri
 
Online Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningOnline Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningStefano Tempesta
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsDatamining Tools
 
Back propagation
Back propagationBack propagation
Back propagationNagarajan
 
Knowledge Discovery and Data Mining
Knowledge Discovery and Data MiningKnowledge Discovery and Data Mining
Knowledge Discovery and Data MiningAmritanshu Mehra
 
Ppt on data science
Ppt on data science Ppt on data science
Ppt on data science Ansh Budania
 
Introduction to Data mining
Introduction to Data miningIntroduction to Data mining
Introduction to Data miningHadi Fadlallah
 
Association rule mining
Association rule miningAssociation rule mining
Association rule miningAcad
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber SecurityRishi Kant
 
Ppt for Application of big data
Ppt for Application of big dataPpt for Application of big data
Ppt for Application of big dataPrashant Sharma
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAndrea Dal Pozzolo
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and SolutionsUlf Mattsson
 
Introdution and designing a learning system
Introdution and designing a learning systemIntrodution and designing a learning system
Introdution and designing a learning systemswapnac12
 

La actualidad más candente (20)

Text mining
Text miningText mining
Text mining
 
Deep learning for medical imaging
Deep learning for medical imagingDeep learning for medical imaging
Deep learning for medical imaging
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)
 
Online Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningOnline Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine Learning
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlations
 
Back propagation
Back propagationBack propagation
Back propagation
 
Knowledge Discovery and Data Mining
Knowledge Discovery and Data MiningKnowledge Discovery and Data Mining
Knowledge Discovery and Data Mining
 
Ppt on data science
Ppt on data science Ppt on data science
Ppt on data science
 
Introduction to Data mining
Introduction to Data miningIntroduction to Data mining
Introduction to Data mining
 
Association rule mining
Association rule miningAssociation rule mining
Association rule mining
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Ppt for Application of big data
Ppt for Application of big dataPpt for Application of big data
Ppt for Application of big data
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud Detection
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
Introdution and designing a learning system
Introdution and designing a learning systemIntrodution and designing a learning system
Introdution and designing a learning system
 
Deep learning
Deep learningDeep learning
Deep learning
 
Uncertainty in AI
Uncertainty in AIUncertainty in AI
Uncertainty in AI
 

Destacado

Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Data mining in Telecommunications
Data mining in TelecommunicationsData mining in Telecommunications
Data mining in TelecommunicationsMohsin Nadaf
 
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...DecosimoCPAs
 
Data Mining Concepts
Data Mining ConceptsData Mining Concepts
Data Mining ConceptsDung Nguyen
 
Forensic Accounting Topics and Issues
Forensic Accounting Topics and IssuesForensic Accounting Topics and Issues
Forensic Accounting Topics and Issueszcreichenbach
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisFraudBusters
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...Mohammed Kharma
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar reportmayurik19
 
Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Andrea Dal Pozzolo
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudRussell James
 

Destacado (20)

Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Data mining in Telecommunications
Data mining in TelecommunicationsData mining in Telecommunications
Data mining in Telecommunications
 
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Data Mining Concepts
Data Mining ConceptsData Mining Concepts
Data Mining Concepts
 
Forensic Accounting Topics and Issues
Forensic Accounting Topics and IssuesForensic Accounting Topics and Issues
Forensic Accounting Topics and Issues
 
HR Analytics & HR Tools
HR Analytics & HR ToolsHR Analytics & HR Tools
HR Analytics & HR Tools
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
 
Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
 

Similar a Detecting Fraud Using Data Mining Techniques

Oracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart TudreOracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart TudreORACLE USER GROUP ESTONIA
 
Alison Fleming Michael Upton Collaborating for Success
Alison Fleming Michael Upton Collaborating for SuccessAlison Fleming Michael Upton Collaborating for Success
Alison Fleming Michael Upton Collaborating for SuccessFuture Perfect 2012
 
Coding as a necessary part of the qualitative research method.pptx
Coding as a necessary part of the qualitative research method.pptxCoding as a necessary part of the qualitative research method.pptx
Coding as a necessary part of the qualitative research method.pptxlrbinala
 
Diplo 2010 output version
Diplo 2010 output versionDiplo 2010 output version
Diplo 2010 output versionDiploFoundation
 
Testability: Factors and Strategy
Testability: Factors and StrategyTestability: Factors and Strategy
Testability: Factors and StrategyBob Binder
 
Idiosyncratic risk matter chinbat
Idiosyncratic risk matter chinbatIdiosyncratic risk matter chinbat
Idiosyncratic risk matter chinbatchinbast
 
Yes systems engineering, you are a discipline
Yes systems engineering, you are a disciplineYes systems engineering, you are a discipline
Yes systems engineering, you are a disciplineJoseph KAsser
 
JADAPIIS0002817778650255
JADAPIIS0002817778650255JADAPIIS0002817778650255
JADAPIIS0002817778650255David Dolkart
 
Robert.webster
Robert.websterRobert.webster
Robert.websterNASAPMC
 
Patient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan SandhuPatient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan Sandhuabhigill
 
It’s time to make Digital Persuasive
It’s time to make Digital  Persuasive It’s time to make Digital  Persuasive
It’s time to make Digital Persuasive Peeyoosh Chandra (PC)
 
Investigating Theft and Embezzlement - In the Workplace
Investigating Theft and Embezzlement - In the WorkplaceInvestigating Theft and Embezzlement - In the Workplace
Investigating Theft and Embezzlement - In the WorkplaceDecosimoCPAs
 
Writing the Book on Investor Relations and Social Media
Writing the Book on Investor Relations and Social MediaWriting the Book on Investor Relations and Social Media
Writing the Book on Investor Relations and Social MediaKCSA Strategic Communications
 
Creating a digital media archive of irish health information
Creating a digital media archive of irish health informationCreating a digital media archive of irish health information
Creating a digital media archive of irish health informationaoifel
 
E1 Empowering Immigrant Seniors to Advocate for Better Community services: A ...
E1 Empowering Immigrant Seniors to Advocate for Better Community services: A ...E1 Empowering Immigrant Seniors to Advocate for Better Community services: A ...
E1 Empowering Immigrant Seniors to Advocate for Better Community services: A ...ocasiconference
 

Similar a Detecting Fraud Using Data Mining Techniques (20)

Digital Marketing Portfolio
Digital Marketing PortfolioDigital Marketing Portfolio
Digital Marketing Portfolio
 
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart TudreOracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
 
Alison Fleming Michael Upton Collaborating for Success
Alison Fleming Michael Upton Collaborating for SuccessAlison Fleming Michael Upton Collaborating for Success
Alison Fleming Michael Upton Collaborating for Success
 
Coding as a necessary part of the qualitative research method.pptx
Coding as a necessary part of the qualitative research method.pptxCoding as a necessary part of the qualitative research method.pptx
Coding as a necessary part of the qualitative research method.pptx
 
Diplo 2010 output version
Diplo 2010 output versionDiplo 2010 output version
Diplo 2010 output version
 
IGCLA Highlights
IGCLA HighlightsIGCLA Highlights
IGCLA Highlights
 
Fuzzy cognitive mapping
Fuzzy cognitive mappingFuzzy cognitive mapping
Fuzzy cognitive mapping
 
Testability: Factors and Strategy
Testability: Factors and StrategyTestability: Factors and Strategy
Testability: Factors and Strategy
 
Idiosyncratic risk matter chinbat
Idiosyncratic risk matter chinbatIdiosyncratic risk matter chinbat
Idiosyncratic risk matter chinbat
 
Yes systems engineering, you are a discipline
Yes systems engineering, you are a disciplineYes systems engineering, you are a discipline
Yes systems engineering, you are a discipline
 
JADAPIIS0002817778650255
JADAPIIS0002817778650255JADAPIIS0002817778650255
JADAPIIS0002817778650255
 
The MDM Project and Media Pluralism
The MDM Project and Media PluralismThe MDM Project and Media Pluralism
The MDM Project and Media Pluralism
 
Robert.webster
Robert.websterRobert.webster
Robert.webster
 
Patient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan SandhuPatient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan Sandhu
 
It’s time to make Digital Persuasive
It’s time to make Digital  Persuasive It’s time to make Digital  Persuasive
It’s time to make Digital Persuasive
 
Investigating Theft and Embezzlement - In the Workplace
Investigating Theft and Embezzlement - In the WorkplaceInvestigating Theft and Embezzlement - In the Workplace
Investigating Theft and Embezzlement - In the Workplace
 
Writing the Book on Investor Relations and Social Media
Writing the Book on Investor Relations and Social MediaWriting the Book on Investor Relations and Social Media
Writing the Book on Investor Relations and Social Media
 
Creating a digital media archive of irish health information
Creating a digital media archive of irish health informationCreating a digital media archive of irish health information
Creating a digital media archive of irish health information
 
Sdd HSC Summary
Sdd HSC SummarySdd HSC Summary
Sdd HSC Summary
 
E1 Empowering Immigrant Seniors to Advocate for Better Community services: A ...
E1 Empowering Immigrant Seniors to Advocate for Better Community services: A ...E1 Empowering Immigrant Seniors to Advocate for Better Community services: A ...
E1 Empowering Immigrant Seniors to Advocate for Better Community services: A ...
 

Más de DecosimoCPAs

Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...DecosimoCPAs
 
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneJust What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneDecosimoCPAs
 
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...DecosimoCPAs
 
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaWinning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaDecosimoCPAs
 
Employee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyEmployee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyDecosimoCPAs
 
Accounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskAccounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskDecosimoCPAs
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffDecosimoCPAs
 
Revenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanRevenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanDecosimoCPAs
 
Financial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanFinancial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanDecosimoCPAs
 
Reporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanReporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanDecosimoCPAs
 
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielGAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielDecosimoCPAs
 
Accounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanAccounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanDecosimoCPAs
 
Valuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrValuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrDecosimoCPAs
 
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities DecosimoCPAs
 
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesUsing Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesDecosimoCPAs
 
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...DecosimoCPAs
 
Forensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesForensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesDecosimoCPAs
 
Checklist presentations
Checklist presentationsChecklist presentations
Checklist presentationsDecosimoCPAs
 
What Was the FASB Thinking?
What Was the FASB Thinking? What Was the FASB Thinking?
What Was the FASB Thinking? DecosimoCPAs
 
Plans for Private Company Reporting
Plans for Private Company ReportingPlans for Private Company Reporting
Plans for Private Company ReportingDecosimoCPAs
 

Más de DecosimoCPAs (20)

Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
 
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneJust What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
 
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
 
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaWinning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
 
Employee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyEmployee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall Harvey
 
Accounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskAccounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy Lusk
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
 
Revenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanRevenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom Eiseman
 
Financial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanFinancial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul Beckman
 
Reporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanReporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom Eiseman
 
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielGAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
 
Accounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanAccounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer Goodman
 
Valuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrValuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon Farr
 
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
 
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesUsing Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
 
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
 
Forensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesForensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War Stories
 
Checklist presentations
Checklist presentationsChecklist presentations
Checklist presentations
 
What Was the FASB Thinking?
What Was the FASB Thinking? What Was the FASB Thinking?
What Was the FASB Thinking?
 
Plans for Private Company Reporting
Plans for Private Company ReportingPlans for Private Company Reporting
Plans for Private Company Reporting
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Detecting Fraud Using Data Mining Techniques

  • 1. DETECTING FRAUD USING DATA MINING TECHNIQUES A Forensic Accountant’s Perspective ADVISORY SERVICES
  • 2. Designed specifically for auditors and investigators ► Read only access to data imported ► Creates log of all operations carried out and changes ► Import and export data into multitude of formats ► Read and process millions of records ADVISORY SERVICES
  • 3.  Compares, joins, appends and connects different files from different sources  Extracts specific transactions, identifies gaps or duplicates  Profiles data by summarizing, stratifying or aging the files  Creates useful file statistics automatically  Displays the data and results graphically  Identifies duplicates and detects gaps  Creates samples using different sampling methods ADVISORY SERVICES
  • 4. Traditional Sampling Data Mining Random and Scattered Exceptions targeted Highlights what "could happen" Incident-oriented Conclusions are extrapolated Clear picture of what is happening ADVISORY SERVICES
  • 6. Planning  Requesting the data  Performing the transfer  Importing the data to the audit software  Insuring that the transfer is successful ADVISORY SERVICES
  • 7. Fixed Length  Variable Length  Proprietary formats  Print or text files  Relational data bases  Date fields  Relational data bases  Date fields  Record definitions or data dictionaries ADVISORY SERVICES
  • 8. - IDEA - ACL - Active Data for Excel - Access ADVISORY SERVICES
  • 9. Step 1 – Understand the Business Step 2 – Identify the possible frauds that could exist Step 3 – Catalog possible fraud symptoms Step 4 – Use technology to gather data about symptoms Step 5 – Analyze the results Step 6 – Investigate the symptoms ADVISORY SERVICES
  • 10. S te p 2 : S te p 1 : S te p 3 : Analytica tic a l A n a ly U n d e rsta n d th e Id e n tify P o ssib le F ra u d s th a t C o u ld C a ta lo g P o ssib le S te p s : l B u sin e ss E xist F ra u d S ym p to m s S te p 4 : S te p 5 : Technolog s : g y T e c h n o lo S te p U se T e ch n o lo g y to G a th e r D a ta A b o u t A n a lyze A u to m a te D e te ctio n P ro ce d u re s R e su lts y S ym p to m s In v e s tig a tiv e S te p 6 : Investigativ : S te p s In ve stig a te S ym p to m s F o llo w U p e
  • 11.
  • 12. Duplicate payments tests  Benford’s Law analysis  Rounded amount invoices  Invoices just below approval levels  Abnormal invoice volume activity  Rapid increase  High variance  Vendors with sequential invoice Numbers or where numbers and dates are inconsistent  Merge vendor and employee files  Relative Size Factor ADVISORY SERVICES
  • 13.  Benford’s Law predicts the digit patterns in “naturally occurring” sets of data.  The law is named after Frank Benford, a physicist at the GE Research Laboratories in the 1930’s  He tested his theory by tabulating the first digits for approximately 20,000 observations  He used integral calculus to formulate the expected digit frequencies in lists of numbers  His results shows clear bias towards the low digits, but the later digits become less pronounced  The scale invariance theorem, by Pinkham, asserts that a set of numbers conforming to Benford’s Law, when multiplied by a nonzero constant, still conforms ADVISORY SERVICES
  • 14.  The numbers should represent the sizes of similar phenomena.  There should be not built-in maximum or minimum values.  The data should not consist of assigned numbers. .  There should be more small items than large items.  Data sets should have four or more digits for a good fit.  As a data set increases in size, it becomes more feasible to get the expected digit frequencies. ADVISORY SERVICES
  • 15.  The populations of towns and cities in Europe? YES  The daily and weekly number of shares bought and sold for an individual company listed on the NYSE? YES  The five-digit postal zip codes used in the U.S.? NO .  The street numbers for every house in the U.S? YES  The dollar amounts of each air ticket sold or refunded by American Airlines for a year? NO  The invoiced amount of each bill issued by DirectTV? NO  The extended inventory values of a Wal-Mart warehouse with more than 20,000 line items? YES ADVISORY SERVICES
  • 16. First Digit Second Digit Digit Frequency Frequency 0 - 11.97% 1 30.10% 11.39% 2 17.61% 10.88% 3 12.49% 10.43% 4 9.69% 10.03% 5 7.92% 9.67% 6 6.70% 9.34% 7 5.80% 9.04% 8 5.12% 8.76% 9 4.58% 8.50% $1,546.20 – First digit is 1, second digit is 5, third digit is 4 $55.95 – First digit is 5 second digit is 5, third digit is 9 ADVISORY SERVICES
  • 17. 35.00% 30.00% Digit 1 25.00% Digit 2 Digit 3 20.00% Digit 4 15.00% Digit 5 Digit 6 10.00% Digit 7 5.00% Digit 8 0.00% Digit 9 Digits ADVISORY SERVICES
  • 18. First-digits  Second-digits  First-two-digits  First-three-digits  Number duplication  Last-two-digits  Rounded numbers 1. If the data set is under 10,000 observations, the first-three-digits test should not be performed 2. The last-two-digits test is only useful to look for signs of estimation ADVISORY SERVICES
  • 19. 1. For fraudulent data, the Round Numbers test is the most consistent 2. For error finding and payback, the two most successful tests are Same invoice number, Same dollar amount, Different vendor numbers and Relative Size Factor ADVISORY SERVICES
  • 26. DECOSIMO FORENSIC ACCOUNTING Computer Consultants, Inc. Payment History EXHIBIT No. 3 Difference Date Invoice Invoice Voucher Vendor Invoice Check Cleared Number Number Number Number Vendor Name Date Amount Number Bank 40008544 10921 54382 COMPUTER CONSULTANTS, INC. 3/15/2008 $1,495.00 172808 3/18/2008 40102926 94,382 11752 54382 COMPUTER CONSULTANTS, INC. 4/15/2008 $3,850.00 176683 4/20/2008 40203702 100,776 12983 54382 COMPUTER CONSULTANTS, INC. 5/20/2008 $4,500.00 179261 5/22/2008 40300531 96,829 13182 54382 COMPUTER CONSULTANTS, INC. 6/1/2008 $6,500.00 181708 6/10/2008 40402424 101,893 13638 54382 COMPUTER CONSULTANTS, INC. 7/1/2008 $8,500.00 187025 7/24/2008 40500332 97,908 13806 54382 COMPUTER CONSULTANTS, INC. 8/6/2008 $8,500.00 188868 8/12/2008 40601247 100,915 14163 54382 COMPUTER CONSULTANTS, INC. 9/15/2008 $9,500.00 193668 9/16/2008 40701963 100,716 14478 54382 COMPUTER CONSULTANTS, INC. 10/20/2008 $9,500.00 197621 10/27/2008 40800036 98,073 14664 54382 COMPUTER CONSULTANTS, INC. 11/1/2008 $8,825.00 199969 11/7/2008 40900892 100,856 14951 54382 COMPUTER CONSULTANTS, INC. 12/1/2008 $8,825.00 203053 12/11/2008 40803762 (97,130) 14873 54382 COMPUTER CONSULTANTS, INC. 12/2/2008 $9,080.00 201901 12/4/2008 41002604 198,842 15286 54382 COMPUTER CONSULTANTS, INC. 1/1/2009 $9,500.00 207486 1/26/2009 41106182 103,578 15703 54382 COMPUTER CONSULTANTS, INC. 2/1/2009 $9,500.00 212211 3/8/2009 41205440 99,258 15913 54382 COMPUTER CONSULTANTS, INC. 3/1/2009 $9,500.00 215828 4/1/2009 50303352 9,097,912 16782 54382 COMPUTER CONSULTANTS, INC. 3/8/2009 $8,440.00 225166 6/28/2009 50105441 (197,911) 16263 54382 COMPUTER CONSULTANTS, INC. 4/1/2009 $9,500.00 220013 5/10/2009 50301195 195,754 16680 54382 COMPUTER CONSULTANTS, INC. 5/1/2009 $9,500.00 223815 6/18/2009 50302272 1,077 16727 54382 COMPUTER CONSULTANTS, INC. 6/1/2009 $9,500.00 224479 6/18/2009 50302271 (1) 16727 54382 COMPUTER CONSULTANTS, INC. 6/10/2009 $8,160.00 224479 6/18/2009 50303353 1,082 16782 54382 COMPUTER CONSULTANTS, INC. 6/22/2009 $9,545.00 225167 6/28/2009 50303354 1 16782 54382 COMPUTER CONSULTANTS, INC. 6/23/2009 $8,520.00 225165 6/28/2009 50303351 (3) 16782 54382 COMPUTER CONSULTANTS, INC. 6/23/2009 $9,500.00 225168 6/28/2009 Total Checks Issued to Computer Consultants $174,895.00
  • 27. Test Vendor Num Invoice Num Invoice Date Invoice Amount 1 Exact Exact Exact Exact Fields Needed: 2 Different Exact Exact Exact Vendor/ supplier number 3 Exact Similar Exact Exact Invoice number 4 Exact Exact Similar Exact Invoice date 5 Exact Exact Exact Similar Invoice amount 6 Exact Similar Exact Similar 7 Exact Similar Similar Exact 8 Exact Exact Similar Similar 9 Different Exact Similar Exact Similar Invoice Numbers – If exact match after stripping out zeros, alphabetic and punctuation Similar Invoice Dates – If dates are within a certain period Similar Amounts – Difference within +/- 3%, one amount is exactly twice the other and amounts start with the first four digits ADVISORY SERVICES
  • 28. Fields Needed: Vendor/ supplier number Invoice number Invoice date Exact Matching Invoice Invoice Invoice amount Test Vendor Num Num Invoice Date Amount A Exact Exact Exact Exact B Exact Exact - Exact C Exact Exact Exact - D Exact - Exact Exact E Exact Different Exact Exact F Different Exact Exact Exact "Fuzzy" Match G Exact Fuzzy - Similar Letters and digits only H Exact Fuzzy - Exact Letters only I Exact Fuzzy - Exact Digits only J Exact Fuzzy - Exact Contain similar characters K Exact - Exact Fuzzy Within "blank" percentage ADVISORY SERVICES
  • 30. STRATA LEVELS 97% Purchase $ 1,000 Leases $ 100,000 $ 500 $ 485 $ 5,000 $ 1,000,000 $ 1,000 $ 970 $ 10,000 $ 1,500 $ 1,455 $ 1,000,000 Write offs $ 50,000 $ 5,000 $ 4,850 $ 250,000 $ 20,000 $ 19,400 POs $ 25,000 $ 500,000 $ 25,000 $ 24,250 $ 500,000 $ 1,000,000 $ 50,000 $ 48,500 $ 200,000 $ 194,000 Checks $ 20,000 Dispositions $ 10,000 $ 250,000 $ 242,500 $ 500,000 $ 485,000 $ 1,000,000 $ 970,000 $ 2,000,000 $ 1,940,000 ADVISORY SERVICES
  • 31. John Smith Manufacturing, Inc. Approval Levels December 31, 2009 Decosimo Forensic Accounting - Exhibit 22 INV_NUM NET_AMT VEND_NUM VEND_NAME CK_NUM CK_NET SESSION PAY_NUM INV_DATE Approval Limit $ 10,000 D42908 $ 9,836.48 25679 VANGARD BC 55787 $ 9,836.48 55787 125074 1/11/2009 D42909 $ 9,836.48 25679 VANGARD BC 59456 $ 9,836.48 56370 131975 2/12/2009 D42910 $ 9,836.48 25679 VANGARD BC 58269 $ 9,836.48 56370 131975 3/13/2009 D42911 $ 9,836.48 25679 VANGARD BC 55537 $ 9,836.48 59070 554469 4/14/2009 D42912 $ 9,836.48 25679 VANGARD BC 54540 $ 9,836.48 59153 163295 5/15/2009 D42913 $ 9,836.48 25679 VANGARD BC 56368 $ 9,836.48 58269 153921 6/16/2009 D42914 $ 9,836.48 25679 VANGARD BC 56415 $ 9,836.48 58269 153921 7/17/2009 D42915 $ 9,836.48 25679 VANGARD BC 56746 $ 9,836.48 55537 123131 8/18/2009 D42916 $ 9,836.48 25679 VANGARD BC 59070 $ 9,836.48 55537 123131 9/19/2009 D42917 $ 9,836.48 25679 VANGARD BC 59153 $ 9,836.48 54540 115281 10/20/2009 D43238-1 $ 9,946.66 25679 AMERICHEM 55787 $ 266,250.14 54540 115281 1/15/2009 7290963188 $ 9,895.74 34644 INVISTA SARL INC 58249 $2,459,481.91 58249 153491 8/9/2009 7290963787 $ 9,889.21 34644 INVISTA SARL INC 58249 $2,459,481.91 58249 153491 8/10/2009 184201 $ 9,900.00 558 BILL ACUFF & ASSOCIATES INC 57705 $ 22,326.00 57705 147993 7/9/2009 186928 $ 9,900.00 558 BILL ACUFF & ASSOCIATES INC 57705 $ 22,326.00 57705 147993 7/9/2009 SLSTX 0807 $ 9,985.64 2294 NEW YORK STATE SALES TAX 58283 $ 9,985.64 58283 552406 9/7/2009 SLSTX 0807 $ 9,985.64 2294 NEW YORK STATE SALES TAX 58311 $ 9,785.64 58311 552542 9/7/2009 031775-41 $ 9,922.93 226 CHEMICAL CO 57790 $ 638,822.55 57790 149135 5/15/2009 031819-41 $ 9,833.15 226 CHEMICAL CO 57790 $ 638,822.55 57790 149135 5/17/2009 4591840 $ 9,771.23 937 XPRESS GLOBAL SYSTEMS 54669 $ 153,859.49 54669 116592 12/14/2009 4691297 $ 9,922.03 937 XPRESS GLOBAL SYSTEMS 54669 $ 153,859.49 54669 116592 12/14/2009 ADVISORY SERVICES
  • 32. Extract all round dollar amounts  Compare current year payroll file to terminated employees  Compare payroll data to human resource data  Extract employees without employee number or SS number  Extract employees without deductions or taxes withheld  Extract employees with payments after termination dates  Check for sequential or duplicate SS numbers  Duplicate mailing addresses paid in say period  Calculate % of overtime to gross pay  Compare current year to prior year payroll file to detect pay rate changes ADVISORY SERVICES
  • 33. ► Incentive/Pressures – meet the deadline, make the number, under the gun, make the deal (sale), under pressure, afraid, problem, just book it, lose my job, get fired ► Opportunity – cookie jar reserve, facilitation fee, process fee, release expense, handover fee, hush money, improper payment, cash only kick back off the books ► Rationalization – everyone does it, it’s the culture, trust me, they owe me, sounds justified, fix it later, nobody will notice, just an error, she, he told me to do it ADVISORY SERVICES
  • 34.  Clearly define ownership of the vendor data  Review and engage access controls  Establish clear vendor setup procedures  Enforce new vendor approval practices  Determine when multiple vendor records will be allowed  Manage one-time vendor accounts separately  Apply consistent naming conventions  Enforce Data Validation including the free IRS TIN matching system  Remove employees from the master vendor file  Perform maintenance on a regular basis  Remove old/unused vendors  Retain the right records  Establish written, detailed procedures ADVISORY SERVICES
  • 35. Do not ignore a red flag – Studies of fraud cases consistently show that red flags were present, but were either not recognized or were recognized but not acted upon by anyone. Sometimes an error is just an error – Red flags should lead to some kind of appropriate action, i.e. an investigation by a measured & responsible person, but sometimes an error is just an error and no fraud exists ADVISORY SERVICES
  • 36. Inc reas ing D ec reas ing purc has es from purc has es from fav ored v endor other v endors 1099s from D ec reas ing v endor c om pany quality to buy er relativ es Inc reas ing pric es A nalyt ical D ocum en ts and S ym pt om s R eco rd s Larger order quantities A ll trans ac tions eith one buy erand one v endor B uy er does n't relate w ell to other buy ers or v endors B eh avio ral S ym pt om s K ic k b a c k s In ternal C o nt ro ls U s e of unapprov ed E m ploy ee w ork v endors habits c hange Q uality B uy er building c om plaints about Tips and Lyfestyle ex pens iv e hom e purc has ed C om p lain ts S ym pt om s (bey ond produc ts ex pec tations ) U ns uc c es s ful B uy er ow ning v endor A nony m ous tips B uy er liv ing m ore ex pens iv e c om plaints about buy ers or bey ond k now n autom ibiles v endors s alary
  • 37. RED FLAGS ASSOCIATED WITH EXPENSE REIMBURSEMENT SCHEMES ► Failure of supervisors to adequately review expense reports ► T&E expenses exceeding budget or prior years’ totals ► T&E expenses significantly exceed those of other employees with similar responsibilities ► Expense reports that lack support or are supported by photocopies ► Claims for reimbursement of old expenses ► Employees who pay higher dollar expenses in cash ► Expense reports which consistently total to round numbers ► Expense reports which consistently total at or just below the organization’s reimbursement limit ► Expense reports that have been approved by a manager outside the claimant’s department ADVISORY SERVICES
  • 38. RED FLAGS ASSOCIATED WITH BILLING SCHEMES ► No segregation of duties in the purchasing function ► Sharpe rise in the amount of service-related expenses or expenses in general ► Inventory shortages ► Absence of detail on vendor invoices ► Absence of detail on vendor master ► Recurring payments ► New or unknown vendors ► Duplicate payment to vendors ► Unexplained or temporary changes to vendor files ► Unfolded invoices ► Phone numbers which do not correspond with physical location ► Only PO Box for address or residential address ADVISORY SERVICES
  • 39. RED FLAGS ASSOCIATED WITH CHECK TAMPERING SCHEMES  No segregation of duties in check preparation and check delivery  Unusual or excessive entries to cash accounts  Excessive voided checks  Signatures not matching authorized signatures  Cash checking account shortages  Checks payable to cash or employee  Out of sequence or duplicate number checks  Canceled checks printed on inferior stock  Canceled checks with dual endorsements  Vendor complaints about non payment  Bank statements with manual corrections ADVISORY SERVICES
  • 40. PAYROLL SCHEMES RED FLAGS ► No segregation of duties in human resources and payroll ► Payroll expenses exceed budgeted or prior years’ totals ► Employees with the same personal information ► Employees lacking payroll information such as taxes or insurance being withheld ► Unexplained increases in overtime, either in departments or by employee ► A non-linear correlation between sales and commission expenses ► Disproportionately large increase in employee compensation ADVISORY SERVICES
  • 41. • Trust is placed in employees • Employees have detailed knowledge of the accounting systems and their weaknesses • Management domination subverts normal internal controls • Management adds pressure to “make the numbers” • Expected moral behavior is not communicated to employees • Unduly liberal accounting practices • Ineffective or nonexistent internal auditing staff. • Lack of effective internal controls. • Poor accounting records. • Related party transactions. • Incomplete and out of date procedural documentation. • Management sets a bad example. ADVISORY SERVICES
  • 42. • Cash flow does not match net • Decrease in the Asset Quality Index income – Noncurrent Assets, exclusive of • Receivables spike relative to sales – PPE, relative to total assets in given Days’ Sales in Receivables year • Management earning tied to • Exceptionally strong sales growth performance from one year to next • Significant increase in Gross • Low Total Accruals to Total Assets – Margin Index Working Capital, less Cash, less • High turnover of key management Current Taxes Payable, less Current • Sales allowances, warranties and Portion of LTD, less AD and other reserves out of line compared Amortization, divided by Total Assets with others in industry ADVISORY SERVICES
  • 43. • Employee lifestyle changes • High employee turnover • Significant personal debt and • Refusal to take vacation or credit problems sick leave • Behavioral changes • Lack of segregation of duties in a high-risk (vulnerable) • Defensive area ADVISORY SERVICES
  • 44. • Reluctance to provide information to • Weak internal control environment auditors • Unexpected overdrafts or declines in • Photocopied or missing documents cash balances • Decisions dominated by an individual or • Accounting personnel are lax or small group inexperienced • Excessive number of year-end • High employee turnover rate transactions • Compensation is out of proportion • Management displays significant • Decentralization without adequate disrespect for regulatory bodies monitoring • Excessive number of or frequent • Frequent changes in external auditors changes in checking accounts ADVISORY SERVICES
  • 45. • Excessive number of voids • Excessive or unjustified cash • Presence of personal checks in transactions petty cash • Large number of account write-offs • Sudden activity in a dormant • Bank accounts not reconciled on a account timely basis • Taxpayer complaints that they are • Unauthorized bank accounts receiving non-payment notices • Discrepancies between bank • Abnormal number of expense items deposits and postings or reimbursement to an employee ADVISORY SERVICES