"e;When people ask me what they can do to better utilize ACL, I tell them, 'Take an instructor lead course, participate in the ACL Forum, and study (not read, study) David Coderre's Fraud Analysis Techniques Using ACL.' I studied this book, and would not be where I am today without it. Even without the anti-fraud material, the book is worth the investment as a tool to learning ACL!"e; Porter Broyles, President and founder of the Texas ACL User Group, Keynote Speaker at ACL's 2009 San Francisco Conference, Official ACL Super User "e;For individuals interested in learning about fraud analysis techniques or the art of ACL scripting, this book is a must-read. For those individuals interested in learning both, this book is a treasure."e; Jim Hess, Principal, Hess Group, LLC Your very own ACL Fraud Toolkit at your fingertips Fraud Analysis Techniques Using ACL offers auditors and investigators: Authoritative guidance from David Coderre, renowned expert on the use of computer-assisted audit tools and techniques in fraud detection A website containing an educational version of ACL from the world leader in fraud detection software An accompanying website containing a thorough Fraud Toolkit with two sets of customizable scripts to serve your specific audit needs Case studies and sample data files that you can use to try out the tests Step-by-step instructions on how to run the tests A self-study course on ACL script development with exercises, data files, and suggested answers The toolkit also contains 12 'utility scripts' and a self-study course on ACL scripting which includes exercises, data files, and proposed answers. Filled with screen shots, flow charts, example data files, and descriptive commentary highlighting and explaining each step, as well as case studies offering real-world examples of how the scripts can be used to search for fraud, Fraud Analysis Techniques Using ACL is the only toolkit you will need to harness the power of ACL to spot fraud.



Autorentext
David Coderre has over twenty years of experience in internal audit, management consulting, management information systems, system development, and application implementation areas. He is currently President of CAATS (Computer-Assisted Analysis Techniques and Solutions). He is the author of three highly regarded books on using data analysis for audit and fraud detection and the Institute of Internal Auditors' publication on Continuous Auditing (GTAG #3).

Inhalt

Preface ix

About This Toolkit ix

Who Should Use This Toolkit? ix

What Is Included in This Toolkit? ix

System Requirements ix

How to Use This Toolkit ix

Install the Fraud Toolkit Application x

How This Book Is Structured x

Script Code Conventions xi

Flowcharts xi

Modifications/Updates xii

Contacting the Author xii

Acknowledgments xii

Introduction 2

Using Data Analysis to Detect Fraud 2

Fraud: Risks and Costs 2

Why Do People Commit Fraud? 2

Why Use Data Analysis Software? 3

Identifying Fraud 4

Proactive Fraud Investigation 5

Benefits ofData Analysis with CAATTs 6

About Scripts 6

What Is a Script? 6

Benefits of Scripts 6

Preparing Scripts for Use 7

Copying Scripts 7

Copying Table Layouts 7

Working with Scripts 8

Launching the Fraud Toolkit Application 8

Running the Scripts 9

Filtering 10

Customizing Scripts 11

Customizing: An Example 12

Creating YourOwn Fraud Application 13

Further Reading 14

Chapter 1: Start and Menu 16

Launching the Fraud Toolkit Tests 16

Starting the Fraud Toolkit Application 16

Placement of Start and Fraud Menu Scripts 17

How the ScriptsWork 17

Start 17

Fraud Menu 18

Log Files 18

Exiting a Script 20

Working without the Fraud Menu 20

Chapter 2: Completeness andIntegrity 22

Checking for Blanks and Data Type Mismatches 22

Running Completeness and Integrity 23

How the ScriptsWork 24

Carriage Returns 24

Understanding the Verify Command 24

Understanding the Group Command 25

Deleting Temporary Variables, Fields, and Files 26

Variables for Complete 27

Review and Analysis 27

Case Study: General Ledger AccountsUnaccounted For 29

Chapter 3: Cross-Tabulation 30

Organizing Your Data to Find Trends 30

Running Cross-Tabulation 30

Benefits of Cross-Tabulation 32

How the Scripts Work 33

Challenges of Cross-Tabulation 34

X-Axis Labels 34

Workspaces 35

Deleting Temporary Variables, Fields, and Files 36

Variables for Cross Tabs 36

Review and Analysis 36

Case Study: Not Enough Clients 37

Case Study: Calling Cards 37

Chapter 4: Duplicates 38

Finding Higher-Risk Items 38

Payroll 38

Accounts Payable 38

Running Duplicates 38

How the Scripts Work 40

The Role of Subscripts 40

Case Study: Duplicate Payments 42

Dup Dialog Script 43

If Statements 43

Dup Multiple Keys1 44

Macro Substitution 44

Key Change 45

Define Field 46

LENGTH() andHEX() 46

Deleting Temporary Variables, Fields, and Files 46

Review and Analysis 47

Checking for Duplicates 47

Payroll Example 48

Accounts Payable Example 50

Chapter 5: Gaps 52

Identifying Transactions Missing from a Sequence 52

Running Gaps 52

How the Scripts Work 53

Deleting Temporary Variables, Fields, and Files 54

Review and Analysis 54

Case Study: Free Calls 55

Chapter 6:Data Profile 56

Establishing Normal Values and Investigating Exceptions 56

Running Data Profile 56

How the Scripts Work 57

Flow of Data in Data Profile 59

Data Profile Test Parameters 59

Deleting Temporary Variables, Fields, and Files 61

Review and Analysis 62

Statistics 62

Stratify 63

Round Amounts, Exact Multiples, and Frequent Values 65

Round Amounts: Multiples of 5, 10, 25, or 100 65

Exact Multiples of 66

Frequently Used Values 66

Profiling with Character Fields 67

Items with the Most Exact Multiples 67

Least/Most Used Items 68

Case Study: Receipt of Inventory 69

Case Study: Exact Multiples 71

Filtering and Drilling Down 71

Filtering before Profiling 71

Filtering after Profiling 72

Chapter 7: Ratio Analysis 74

Pinpointing Suspect Transactions and Trends 74

Running Ratio Analysis 74

How the Scripts Work 78

Max/Max2 and Max/Min Ratios 78

Two Fields: Num field1 / Num field2 Ratio 80

Deleting Temporary Variables, Fields, and Files 80

Review and Analysis 81

Case Study: Dormant but Not Forgotten 84

Case Study: Doctored Bills 85

Chapter 8: Benford's Law 88

Identifying Anomalous Data 88

Understanding Benford's Law 88

Identifying Irregularities 88

Running Benford Analysis 89

Running Benford Custom Analysis 90

Creating the Custom Distribution 90

Division by Zero 91

Testing against the Custom Dist...

Titel
Fraud Analysis Techniques Using ACL
EAN
9780470508480
ISBN
978-0-470-50848-0
Format
E-Book (epub)
Hersteller
Herausgeber
Veröffentlichung
24.07.2009
Digitaler Kopierschutz
Adobe-DRM
Dateigrösse
6.65 MB
Anzahl Seiten
176
Jahr
2009
Untertitel
Englisch