Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Mark J. Nigrini, PH.D
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Cover
Title Page
Copyright
Dedication
Preface
About the Author
Chapter 1: Using Access in Forensic Investigations
An Introduction to Access
The Architecture of Access
A Review of Access Tables
Importing Data into Access
A Review of Access Queries
Converting Excel Data into a Usable Access Format
Using the Access Documenter
Database Limit of 2 GB
Miscellaneous Access Notes
Summary
Chapter 2: Using Excel in Forensic Investigations
Pitfalls in Using Excel
Importing Data into Excel
Reporting Forensic Analytics Results
Protecting Excel Spreadsheets
Using Excel Results in Word Files
Excel Warnings and Indicators
Summary
Chapter 3: Using PowerPoint in Forensic Presentations
Overview of Forensic Presentations
An Overview of PowerPoint
Planning the Presentation
Color Schemes for Forensic Presentations
Problems with Forensic Reports
Summary
Chapter 4: High-Level Data Overview Tests
The Data Profile
The Data Histogram
The Periodic Graph
Preparing the Data Profile Using Access
Preparing the Data Profile Using Excel
Calculating the Inputs for the Periodic Graph in Access
Preparing a Histogram in Access Using an Interval Table
Summary
Chapter 5: Benford's Law: The Basics
An Overview of Benford's Law
From Theory to Application in 60 Years
Which Data Sets Should Conform to Benford's Law?
The Effect of Data Set Size
The Basic Digit Tests
Running the First-Two Digits Test in Access
Summary
Chapter 6: Benford's Law: Assessing Conformity
One Digit at a Time: The Z-Statistic
The Chi-Square and Kolmogorov-Smirnoff Tests
The Mean Absolute Deviation (MAD) Test
Tests Based on the Logarithmic Basis of Benford's Law
Creating a Perfect Synthetic Benford Set
The Mantissa Arc Test
Summary
Chapter 7: Benford's Law: The Second-Order and Summation Tests
A Description of the Second-Order Test
The Summation Test
Summary
Chapter 8: Benford's Law: The Number Duplication and Last-Two Digits Tests
The Number Duplication Test
Running the Number Duplication Test in Access
Running the Number Duplication Test in Excel
The Last-Two Digits Test
Summary
Chapter 9: Testing the Internal Diagnostics of Current Period and Prior Period Data
A Review of Descriptive Statistics
An Analysis of Alumni Gifts
An Analysis of Fraudulent Data
Summary and Discussion
Chapter 10: Identifying Fraud Using the Largest Subsets and Largest Growth Tests
Findings from the Largest Subsets Test
Running the Largest Subsets Test in Access
Running the Largest Growth Test in Access
Running the Largest Subsets Test in Excel
Running the Largest Growth Test in Excel
Summary
Chapter 11: Identifying Anomalies Using the Relative Size Factor Test
Relative Size Factor Test Findings
Running the RSF Test
Running the Relative Size Factor Test in Access
Running the Relative Size Factor Test in Excel
Summary
Chapter 12: Identifying Fraud Using Abnormal Duplications within Subsets
The Same-Same-Same Test
The Same-Same-Different Test
The Subset Number Duplication Test
Running the Same-Same-Same Test in Access
Running the Same-Same-Different Test in Access
Running the Subset Number Duplication Test in Access
Running the Same-Same-Same Test in Excel
Running the Same-Same-Different Test in Excel
Running the Subset Number Duplication Test in Excel
Summary
Chapter 13: Identifying Fraud Using Correlation
The Concept of Correlation
Correlation Calculations
Using Correlation to Detect Fraudulent Sales Numbers
Using Correlation to Detect Electricity Theft
Using Correlation to Detect Irregularities in Election Results
Detecting Irregularities in Pollution Statistics
Calculating Correlations in Access
Calculating the Correlations in Excel
Summary
Chapter 14: Identifying Fraud Using Time-Series Analysis
Time-Series Methods
An Application Using Heating Oil Sales
An Application Using Stock Market Data
An Application Using Construction Data
An Analysis of Streamflow Data
Running Time-Series Analysis in Excel
Calculating the Seasonal Factors
Running a Linear Regression
Fitting a Curve to the Historical Data
Calculating the Forecasts
Summary
Chapter 15: Fraud Risk Assessments of Forensic Units
The Risk Scoring Method
The Forensic Analytics Environment
A Description of the Risk-Scoring System
P1: High Food and Supplies Costs
P2: Very High Food and Supplies Costs
P3: Declining Sales
P4: Increase in Food Costs
P5: Irregular Seasonal Pattern for Sales
P6: Round Numbers Reported as Sales Numbers
P7: Repeating Numbers Reported as Sales Numbers
P8: Inspection Rankings
P9: High Receivable Balance
P10: Use of Automated Reporting Procedures
Final Results
An Overview of the Reporting System and Future Plans
Some Findings
Discussion
Summary
Chapter 16: Examples of Risk Scoring with Access Queries
The Audit Selection Method of the IRS
Risk Scoring to Detect Banking Fraud
Final Risk Scores
Risk Scoring to Detect Travel Agent Fraud
Final Results
Risk Scoring to Detect Vendor Fraud
Vendor Risk Scoring Using Access
Summary
Chapter 17: The Detection of Financial Statement Fraud
The Digits of Financial Statement Numbers
Detecting Biases in Accounting Numbers
An Analysis of Enron's Reported Numbers
An Analysis of Biased Reimbursement Numbers
Detecting Manipulations in Monthly Subsidiary Reports
Predictor Weightings
Conclusions
Summary
Chapter 18: Using Analytics on Purchasing Card Transactions
Purchasing Cards
The National Association of Purchasing Card Professionals
A Forensic Analytics Dashboard
An Example of Purchasing Card Data
High-Level Data Overview
The First-Order Test
The Summation Test
The Last-Two Digits Test
The Second-Order Test
The Number Duplication Test
The Largest Subsets Test
The Same-Same-Same Test
The Same-Same-Different Test
The Relative Size Factor Test
Conclusions with Respect to Card Purchases
A Note on Microsoft Office
A Note on the Forensic Analytic Tests
Conclusion
References
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Table of Contents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset