The Fraud Detection Process - McGraw Hill Higher Education

Download Report

Transcript The Fraud Detection Process - McGraw Hill Higher Education

6-1
6-2
06
Fraud Detection
McGraw-Hill/Irwin
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
6-3
The Fraud Detection Process
 The
fraud detection process involves identifying indicators
of fraud that suggest a need for further investigation.
 Various means of detecting fraud exist, including tips and
hotlines, financial statement audits, and by accident.
6-4
Hotlines and Fraud Discovery
 Hotlines
are very effective
 They must have a disclosure policy
 Confidentiality
 They
and anonymity
must be supplemented by an ethics code, employee
training proper monitoring, advertising, and the right tone
from top management
6-5
Other Means of Fraud Discovery
 By
accident
 This
happens frequently, especially in companies with weak
controls. But it might happen too late for a small company to
survive.
 By
external auditors. SAS 99 requires that auditors design
financial statement audits in such a way so as to have a
reasonable chance of detecting misstatements in the
financial reports. But not all fraud leads to misstatements.
Still, external auditors must consider fraud risk and should
use the fraud triangle.
 External
auditors must report frauds to the appropriate level of
management.
6-6
Other Means of Fraud Discovery
 By
internal auditors
 Internal auditors should report directly to the board of
directors
 By inspectors general
 By security departments
6-7
Fraud Issues
 Often
fraud and waste or errors are indistinguishable from
one another
 There is a tradeoff between prevention, detection, and
correction
 Detection produces false positives and false negatives
 False
positives indicate fraud when there is none
 False negatives indicate no fraud where this is fraud
 One
goal is to balance the rate of false positives versus the
rate of false negatives so that Total Fraud Costs are
minimized
 Total
Fraud Costs = Prevention Costs + Detection Costs +
Correction Costs + Fraud Losses
6-8
Fraud Indicators
 Composite
indicators
 Are
typically produced from weighted sums of individual
indicators. The weighted sum is called a risk score.

One example of a risk score is a FICO credit score
 Single-factor
 Are

 In
indicators
also called red flags
In the typical scenario, a single red flag may initiate an
investigation
many cases, the reliance on fraud indicators alone is not
sufficient. Random tests also may be needed, because
fraudsters may manipulate fraud indicators, or the set of
detectors in use might not be capable of detecting some
frauds.
6-9
Data-Driven Fraud Detection
 Data-driven
fraud detection involves the formal process of
sifting through data in search of fraud indicators.
 Sources
of data include internal control data, basic tips and
hotlines, security breaches, and pattern data.
 Internal
control data include reconciliation failures, control
total failures, exception transactions, and apparent errors.
 Security breaches occur when an individual accesses some
entity resources without first being granted a sufficient
privilege to do so.
 Pattern data analysis, or data mining, combines different
data items in complex and non-intuitive ways to signal
fraud.
6-10
Steps in Building a Fraud Detection
System
 The
general approach involves 1) risk analysis and control
development, 2) exploitation of expert knowledge, 3)
knowledge discovery, 4) implementation.
 Knowledge
discovery involves SEMMA: Sampling,
Exploration, Modification, Modeling, and Assessment.
 Various common modeling techniques exist, including linear
regression analysis, for example.
 Various special modeling techniques also exist, including
social network analysis, content analysis and text analysis,
and Benford analysis, for example.
6-11
Benford Analysis