Forensic Analytics
Home > Business and Economics > Finance and accounting > Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

|
     0     
5
4
3
2
1




Available


About the Book

Become the forensic analytics expert in your organization using effective and efficient data analysis tests to find anomalies, biases, and potential fraud—the updated new edition Forensic Analytics reviews the methods and techniques that forensic accountants can use to detect intentional and unintentional errors, fraud, and biases. This updated second edition shows accountants and auditors how analyzing their corporate or public sector data can highlight transactions, balances, or subsets of transactions or balances in need of attention. These tests are made up of a set of initial high-level overview tests followed by a series of more focused tests. These focused tests use a variety of quantitative methods including Benford’s Law, outlier detection, the detection of duplicates, a comparison to benchmarks, time-series methods, risk-scoring, and sometimes simply statistical logic. The tests in the new edition include the newly developed vector variation score that quantifies the change in an array of data from one period to the next. The goals of the tests are to either produce a small sample of suspicious transactions, a small set of transaction groups, or a risk score related to individual transactions or a group of items. The new edition includes over two hundred figures. Each chapter, where applicable, includes one or more cases showing how the tests under discussion could have detected the fraud or anomalies. The new edition also includes two chapters each describing multi-million-dollar fraud schemes and the insights that can be learned from those examples. These interesting real-world examples help to make the text accessible and understandable for accounting professionals and accounting students without rigorous backgrounds in mathematics and statistics. Emphasizing practical applications, the new edition shows how to use either Excel or Access to run these analytics tests. The book also has some coverage on using Minitab, IDEA, R, and Tableau to run forensic-focused tests. The use of SAS and Power BI rounds out the software coverage. The software screenshots use the latest versions of the software available at the time of writing. This authoritative book: Describes the use of statistically-based techniques including Benford’s Law, descriptive statistics, and the vector variation score to detect errors and anomalies Shows how to run most of the tests in Access and Excel, and other data analysis software packages for a small sample of the tests Applies the tests under review in each chapter to the same purchasing card data from a government entity Includes interesting cases studies throughout that are linked to the tests being reviewed. Includes two comprehensive case studies where data analytics could have detected the frauds before they reached multi-million-dollar levels Includes a continually-updated companion website with the data sets used in the chapters, the queries used in the chapters, extra coverage of some topics or cases, end of chapter questions, and end of chapter cases. Written by a prominent educator and researcher in forensic accounting and auditing, the new edition of Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations is an essential resource for forensic accountants, auditors, comptrollers, fraud investigators, and graduate students.

Table of Contents:
List of Cases xiii About the Author xv Preface xvii Abbreviations xxi Analytics Software Used xxv Introduction 1 Temptation in an Occupation 2 Fraudulent Checks Written by the CFO 4 Fraudulent Purchases Made by a Purchasing Manager 7 Donna was a Gamblin’ Wreck at Georgia Tech 9 Forensic Analytics 11 An Overview of Tableau 13 The Risk Assessment Standards 19 Discussion 21 Chapter 1: Using Microsoft Excel for Forensic Analytics 23 The Fraud Types Relevant to Forensic Analytics 23 The Main Steps in a Forensic Analytics Application 25 The Final Report 27 An Overview of Excel 28 Importing Data into Excel 29 Some Useful Excel Formatting Features 30 Protecting Excel Spreadsheets 32 The Valuable "IF" Function 33 The PIVOTTABLE Routine 36 The Valuable VLOOKUP Function 38 Using Excel Results in Word Files 40 Excel Warnings and Indicators 42 Excel Dashboards 43 Dashboards in Practice 46 Summary 47 Chapter 2: The Initial High-Level Overview Tests 50 The Data Profile 51 The Histogram 56 The Periodic Graph 58 Descriptive Statistics 60 Preparing the Data Profile Using Excel 62 Preparing the Data Profile Using Access 64 Preparing the Histogram in Excel and Access 68 Preparing the Histogram in IDEA and Tableau 72 Preparing the Periodic Graph in Excel and Access 74 Summary 76 Chapter 3: Benford’s Law: The Basic Tests 79 An Overview of Benford’s Law 80 Some Early Discussions of Benford’s Law 83 Selected Articles from the Eighties 85 Selected Articles from the Nineties 88 Scenarios Under Which Data Should Conform to Benford 90 The Two Scenarios Under Which Accounting Data Sets Should Conform to Benford 93 Other Considerations for the Conformity of Accounting Data 94 Accounting Data Examples 95 Preparing the Benford Graph Using Excel 98 Preparing the Benford Graph Using Access 99 Summary 101 Chapter 4: Benford’s Law: Advanced Topics 103 Conformity and the Likelihood of Material Errors 103 The First Digits Versus the First-Two Digits 107 Measuring Conformity Using the Z-Statistic 109 The Chi-Square and the Kolmogorov-Smirnoff Tests of Conformity 111 The Mean Absolute Deviation (MAD) Test 112 The Effect of Data Set Size of Conformity to Benford 114 Using Benford’s Law in a Forensic Accounting Setting 116 Using Benford’s Law for Journal Entries in an External Audit 119 Using Benford for Subsidiary Ledger Balances in an External Audit 123 Preparing the Benford Graph in Excel 125 Summary 126 Chapter 5: Benford’s Law: Completing The Cycle 127 The Number Duplication Test 127 The Number Duplications in Accounting Textbooks 132 The Electric Utility Company Fraud Case 134 The Petty Cash Fraud Scheme 136 The Last-Two Digits Test 139 The Fraudulent Credit Card Sales Scheme 141 The Missing Cash Sales Case 142 Running the Number Duplication Test in Excel 144 Running the Number Duplication Test in Access 146 Running the Last-Two Digits Test in Excel 148 Running the Last-Two Digits Test in Access 149 Running the Number Duplication Test in R 151 Summary 153 Chapter 6: Identifying Anomalous Outliers: Part 1 154 The Summation Test 155 The Fraud That Was Red Flagged by Two Qualitative Outliers 158 The Largest Subsets Test 161 The Largest Subset Growth Test 165 The School District Transportation Fraud 168 The SkyBonus Fraud Scheme 170 Running the Summation Test in Excel 170 Running the Summation Test in Access 171 Running the Largest Subsets Test in Excel 172 Running the Largest Subsets Test in Access 173 Running the Largest Growth Test in Excel 174 Running the Largest Growth Test in Access 176 Running the Largest Subsets Test in R 179 Summary 180 Chapter 7: Identifying Anomalous Outliers: Part 2 182 Examples of Relative Size Factor Test Findings 184 The Scheme That Used a Vault That Was Over Capacity 186 The Scheme That Added Sold Cars to the Car Inventory Account 189 The Vice Chairman of the Board Who Stole 0.5 Percent of His Salary 193 Running the RSF Test in Excel 194 Running the RSF Test in Access 199 Running the RSF Test in SAS 208 Summary 212 Chapter 8: Identifying Abnormal Duplications 214 The Same-Same-Same Test 215 Duplicate Payments and Various Types of Fraud 217 The Same-Same-Different (Near-Duplicates) Test 220 The Near-Duplicates Fraud Scheme: Introduction 221 The Near-Duplicates Fraud: The Act 222 The Near-Duplicates Fraud: Getting the Legal Process Started 224 The Near-Duplicates Fraud: Two Sentencing Hearings 228 The Near-Duplicates Fraud: Epilogue 230 The Subset Number Duplication Test 231 Running the Same-Same-Same Test in Excel 233 Running the Same-Same-Different Test in Excel 235 Running the Subset Number Frequency Test in Excel 237 Running the Same-Same-Same Test in Access 239 Running the Same-Same-Different Test in Access 240 Running the Subset Number Frequency Test in Access 242 Summary 245 Chapter 9: Comparing Current Period and Prior Period Data: Part 1 247 A Review of Descriptive Statistics 249 An Analysis of the Purchasing Card Data 250 My Law: An Analysis of Payroll Data 255 An Analysis of Machine Learning Data 257 An Analysis of Grocery Store Sales 261 The Scheme That Used Bank Transfers to a Secret Bank Account 263 Running the Descriptive Statistics Tests in Excel 268 Running the Descriptive Statistics Tests in Minitab 269 Running the Descriptive Statistics Tests in SAS 270 Summary and Discussion 272 Chapter 10: Comparing Current Period and Prior Period Data: Part 2 274 Vectors and Measures of Change 275 An Analysis of the Purchasing Card Data 280 Taxpayer Identity Theft Refund Fraud 282 The Tax Return That Omitted a Million Dollar Prize 284 The Tax Returns for 2000 and 2001 285 The Indictment for Tax Evasion 291 The Tax Evasion Trial 292 The Verdict and Sentencing 298 An Analysis of Joe Biden’s Tax Returns 299 Running the VVS Test in SAS 303 Summary and Discussion 304 Chapter 11: Identifying Anomalies In Time-Series Data 306 An Analysis of the Purchasing Card Data 307 Using IDEA for Time-Series Analysis 311 The Fraud Scheme That Withdrew Funds from Customer Accounts 312 Employee Data Access After Termination 317 A Time-Series Analysis of Grocery Store Sales 321 Using Correlation to Detect Fraud and Errors 322 Using the Angle θ on Trial Balance Data 324 Using the VVS on Customer Rebates 327 Showing the VVS Results in a Dashboard 332 Running Time-Series Analysis in SAS 334 Summary and Discussion 336 Chapter 12: Scoring Forensic Units for Fraud Risk 338 An Overview of Risk Scoring 339 The Audit Selection Method of the IRS 340 The Fraudulent Vendor with a Post Office Box in the Head Office 344 Risk Scoring to Detect Vendor Fraud 348 Risk Scoring to Detect Errors in Sales Reports 354 The Predictors Used in the Sales Report Scoring Model 356 The Results of the Sales Report Scoring Model 364 Summary and Discussion 365 Chapter 13: Case Study: An Employee’s Fraudulent Tax Refunds 367 Background Information 368 The Nicest Person in the Office 369 The Early Years of Tax Refund Fraud Scheme 372 The Later Years of Tax Refund Fraud Scheme 375 An Analysis of the Fraudulent Refund Amounts 376 The End Was Nigh 383 The Letter of the Law 386 Sentencing 391 Mary Ayers-Zander 392 Epilogue 393 Appendix 13A: The Fraudulent Refunds 394 Chapter 14: Case Study: A Supplier’s Fraudulent Shipping Claims 401 Background Information 401 The Fraudulent Shipping Charges Scheme 403 An Analysis of the Shipping Charges 405 Charlene’s Lifestyle 408 The Scheme is Discovered 409 The Corley Plea 412 Charlene’s Appeal for a Reduced Sentence 415 The Government’s Response to Charlene’s Memorandum 417 The Sentencing Hearing 417 The Sentence 419 Motion to Delay the Prison Term 420 Conclusions 423 Chapter 15: Detecting Financial Statement Fraud 425 An Overview of Financial Statement Fraud 426 Biases in Financial Statement Numbers 427 Enron’s Financial Statements 430 Enron’s Chief Financial Officer 432 HealthSouth’s Financial Statements 433 WorldCom’s Financial Statements 436 WorldCom’s Rounded Numbers 440 Using Benford’s Law to Detect Financial Statement Misconduct 442 Beneish’s M-Score 446 Detection and Investigation Steps 447 Detecting Manipulations in Monthly Subsidiary Reports 449 Summary 454 Chapter 16: Using Microsoft Access and R For Analytics 455 An Introduction to Access 456 The Architecture of Access 457 A Review of Access Tables 459 Importing Data into Access 461 A Review of Access Queries 462 Converting Excel Data into a Usable Access Format 465 Using the Access Documenter 466 Database Limit of 2 GB 468 Reports 469 Miscellaneous Access Notes 471 An Introduction to R 472 Installing R and R Studio 472 The Advantages of Using R 474 R Markdown 475 Running Arithmetic Code in R 475 Calculating the VVS in R 477 Summary 479 Appendix 16A: A Discussion of the Basic Commands 480 Chapter 17: Concluding Notes on Fraud Prevention and Detection 482 The Annual Cost of Employee Fraud 483 The Legal Process 484 ”I’m a Lawyer, Trust [Account] Me” 485 The Rights of the Defendant 487 Possible Defenses Against an Embezzlement Charge 490 The Economics of Crime Model 492 Internal Controls 493 Fraud Risk Assessments 495 Detective Controls 496 Crime Insurance 498 Fraud Detection Methods 500 Other Fraud Prevention Methods 501 Final Words 504 Bibliography 507 Index 515


Best Sellers


Product Details
  • ISBN-13: 9781119585763
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 257 mm
  • No of Pages: 544
  • Returnable: N
  • Sub Title: Methods and Techniques for Forensic Accounting Investigations
  • Width: 191 mm
  • ISBN-10: 1119585767
  • Publisher Date: 06 Jul 2020
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 36 mm
  • Weight: 1228 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
John Wiley & Sons Inc -
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!