Fraud Analysis Techniques Using ACL
Home > Business and Economics > Finance and accounting > Accounting > Management accounting, bookkeeping and auditing > Fraud Analysis Techniques Using ACL
Fraud Analysis Techniques Using ACL

Fraud Analysis Techniques Using ACL


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Table of Contents:
Preface ix About This Toolkit ix Who Should Use This Toolkit? ix What Is Included in This Toolkit? ix System Requirements ix How to Use This Toolkit ix Install the Fraud Toolkit Application x How This Book Is Structured x Script Code Conventions xi Flowcharts xi Modifications/Updates xii Contacting the Author xii Acknowledgments xii Introduction 2 Using Data Analysis to Detect Fraud 2 Fraud: Risks and Costs 2 Why Do People Commit Fraud? 2 Why Use Data Analysis Software? 3 Identifying Fraud 4 Proactive Fraud Investigation 5 Benefits ofData Analysis with CAATTs 6 About Scripts 6 What Is a Script? 6 Benefits of Scripts 6 Preparing Scripts for Use 7 Copying Scripts 7 Copying Table Layouts 7 Working with Scripts 8 Launching the Fraud Toolkit Application 8 Running the Scripts 9 Filtering 10 Customizing Scripts 11 Customizing: An Example 12 Creating YourOwn Fraud Application 13 Further Reading 14 Chapter 1: Start and Menu 16 Launching the Fraud Toolkit Tests 16 Starting the Fraud Toolkit Application 16 Placement of Start and Fraud Menu Scripts 17 How the ScriptsWork 17 Start 17 Fraud Menu 18 Log Files 18 Exiting a Script 20 Working without the Fraud Menu 20 Chapter 2: Completeness andIntegrity 22 Checking for Blanks and Data Type Mismatches 22 Running Completeness and Integrity 23 How the ScriptsWork 24 Carriage Returns 24 Understanding the Verify Command 24 Understanding the Group Command 25 Deleting Temporary Variables, Fields, and Files 26 Variables for Complete 27 Review and Analysis 27 Case Study: General Ledger AccountsUnaccounted For 29 Chapter 3: Cross-Tabulation 30 Organizing Your Data to Find Trends 30 Running Cross-Tabulation 30 Benefits of Cross-Tabulation 32 How the Scripts Work 33 Challenges of Cross-Tabulation 34 X-Axis Labels 34 Workspaces 35 Deleting Temporary Variables, Fields, and Files 36 Variables for Cross Tabs 36 Review and Analysis 36 Case Study: Not Enough Clients 37 Case Study: Calling Cards 37 Chapter 4: Duplicates 38 Finding Higher-Risk Items 38 Payroll 38 Accounts Payable 38 Running Duplicates 38 How the Scripts Work 40 The Role of Subscripts 40 Case Study: Duplicate Payments 42 Dup Dialog Script 43 If Statements 43 Dup Multiple Keys1 44 Macro Substitution 44 Key Change 45 Define Field 46 LENGTH() andHEX() 46 Deleting Temporary Variables, Fields, and Files 46 Review and Analysis 47 Checking for Duplicates 47 Payroll Example 48 Accounts Payable Example 50 Chapter 5: Gaps 52 Identifying Transactions Missing from a Sequence 52 Running Gaps 52 How the Scripts Work 53 Deleting Temporary Variables, Fields, and Files 54 Review and Analysis 54 Case Study: Free Calls 55 Chapter 6:Data Profile 56 Establishing Normal Values and Investigating Exceptions 56 Running Data Profile 56 How the Scripts Work 57 Flow of Data in Data Profile 59 Data Profile Test Parameters 59 Deleting Temporary Variables, Fields, and Files 61 Review and Analysis 62 Statistics 62 Stratify 63 Round Amounts, Exact Multiples, and Frequent Values 65 Round Amounts: Multiples of 5, 10, 25, or 100 65 Exact Multiples of 66 Frequently Used Values 66 Profiling with Character Fields 67 Items with the Most Exact Multiples 67 Least/Most Used Items 68 Case Study: Receipt of Inventory 69 Case Study: Exact Multiples 71 Filtering and Drilling Down 71 Filtering before Profiling 71 Filtering after Profiling 72 Chapter 7: Ratio Analysis 74 Pinpointing Suspect Transactions and Trends 74 Running Ratio Analysis 74 How the Scripts Work 78 Max/Max2 and Max/Min Ratios 78 Two Fields: Num field1 / Num field2 Ratio 80 Deleting Temporary Variables, Fields, and Files 80 Review and Analysis 81 Case Study: Dormant but Not Forgotten 84 Case Study: Doctored Bills 85 Chapter 8: Benford’s Law 88 Identifying Anomalous Data 88 Understanding Benford’s Law 88 Identifying Irregularities 88 Running Benford Analysis 89 Running Benford Custom Analysis 90 Creating the Custom Distribution 90 Division by Zero 91 Testing against the Custom Distribution 92 How the Benford Scripts Work 93 Standard Benford Analysis 93 Benford Custom Analysis 95 Deleting Temporary Variables, Fields, and Files 96 Review and Analysis 96 Case Study: Signing Authority 98 Further Reading 98 Chapter 9: Developing ACL Scripts 100 Introduction 100 Data Analysis: Generic Approach 100 ACL Commands 102 DISPLAY Command 102 SET Command 102 DELETE Command 103 OPEN Command 103 Commands for Defining Relationships 103 Basic ACL Commands 103 IF Command 104 Variables 104 User-Defined Variables 106 Using System and User-Defined Variables 106 DEFINE Field/Expression 106 Workspaces 107 Sharing Workspaces 109 Scripts 109 What Is a Script? 109 Creating Scripts 109 Commenting Scripts 113 COMMENT 113 END 113 Editing Scripts 113 Running Scripts 114 RUN ACL Script from DOS 115 Saving a Script to a BAT file 115 Interactive Scripts 117 ACCEPT Command 117 Dialog Boxes 118 Adding Selections to Drop-Down and Project ItemLists 119 Macro Substitution 120 Editing Dialog Boxes 120 Subscripts 122 Special Uses for Subscripts 122 Repeating a Script 123 Error Trapping 123 Consolidation Exercise 124 Advanced ACL Scripting Techniques 125 GROUP Command 125 Simple GROUP 126 Conditional GROUP 126 Nested GROUP 128 LOOP and OFFSET() 132 Applications Menu 135 Building an Application Menu 137 Creating Submenus 137 Chapter 10: Utility Scripts 138 Auto Execute 138 Extract Values 139 Ending Balance Verification 140 Running Total 142 Maximum and Minimum Values 143 Appendix: ACL Installation Process 145 Glossary 149 Index 155

About the Author :
David Coderre has over twenty years of experience in internal audit, management consulting, management information systems, system development, and application implementation areas. He is currently President of CAATS (Computer-Assisted Analysis Techniques and Solutions). He is the author of three highly regarded books on using data analysis for audit and fraud detection and the Institute of Internal Auditors' publication on Continuous Auditing (GTAG #3).


Best Sellers


Product Details
  • ISBN-13: 9780470508473
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • ISBN-10: 0470508477
  • Publisher Date: 23 Jul 2009
  • Binding: Digital (delivered electronically)
  • No of Pages: 176


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Fraud Analysis Techniques Using ACL
John Wiley & Sons Inc -
Fraud Analysis Techniques Using ACL
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Fraud Analysis Techniques Using ACL

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!