Preview

Working Capital Management

Powerful Essays
Open Document
Open Document
7715 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Working Capital Management
Fraud and Forensic Accounting In a Digital Environment

White Paper for The Institute for Fraud Prevention

Conan C. Albrecht Marriott School of Management Brigham Young University conan@warp.byu.edu

Fraud and Forensic Accounting In a Digital Environment

ABSTRACT This paper discusses four aspects of computer­aided fraud detection that are of primary interest to fraud investigators and forensic accountants: data mining techniques for the detection of internal fraud, ratio analysis for the detection of financial statement fraud, the issues surrounding external information sources, and computer forensics during fraud investigations. It provides an informative background and then details the current status of research in each area. It describes what is currently unknown, and it proposes future research topics.

Keywords: Fraud, Computer Forensics, Proactive Fraud Detection, Digital Accounting

1 INTRODUCTION The modern digital environment offers new opportunities for both perpetrators and investigators of fraud. In many ways, it has changed the way fraud examiners conduct investigations, the methods internal auditors use to plan and complete work, and the approaches external auditors take to assess risk and perform audits. While some methods, such as online working papers, are merely computerized versions of traditional tasks, others, such as risk analysis based on neural networks, are revolutionizing the field. Many auditors and researchers find themselves working amid an ever­changing workplace, with computer­based methods leading the charge. Perhaps the most difficult aspect to computer­based techniques is the application of a single term to a wide variety of methods like digital analysis, electronic evidence collection, data mining, and computer forensics. Indeed, computer­based fraud detection involves a plethora of different technologies, methodologies, and goals. Some techniques require a strong background in



References: ACFE (2008). 2008 Report to the Nation. The Association of Certified Fraud Examiners.  Agyemang, M., Barker, K., & Alhajj, R. (2006). A comprehensive survey of numeric and  symbolic outlier mining techniques. Intelligent Data Analysis, 10, 521­538.  AICPA (2002). SAS No. 99: Consideration of Fraud in a Financial Statement Audit  Summary.  Albrecht, C. C., Albrecht, W. S., & Dunn, J. G. (2000). Conducting a Pro­Active Fraud  Audit: A Case Study. Journal of Forensic Accounting, II, 203­218.  Albrecht, C. C. (2008). Detectlets: A New Approach to Fraud Detection. In European  Academy of Management at Ljubljana, Slovenia.  Albrecht, W. S., & Albrecht, C. C. (2002). Root Out Financial Deception. Journal of  Accountancy, 30­33.  Albrecht, W. S., Albrecht, C., & Albrecht, C. C. (2008). Current Trends in Fraud and its  Detection. Information Security Journal: A Global Perspective, 17(1).  Albrecht, W. S., Albrecht, C. C., Albrecht, C. O., & Zimbelman, M. (2009). Fraud  Examination (3).  South­Western Cengage Learning.  Beasley, M. S., & Jenkins, J. G. (2003). The Relation of Information Technology and  Financial Statement Fraud. Journal of Forensic Accounting, 4, 217­232.  Bell, T. B., & Carcello, J. V. (2000). Research Notes, A decision aid for assessing the  likelihood of fraudulent financial reporting. Auditing: A Journal of Theory and  Practice, 19(1), 169­175.  Benish, M. (1999). The Detection of Earnings Manipulation. Financial Analysts Journal,  55, 24­36.  Black, J. (2002). Public Records in Public View­­Online?. Business Week Online.  Bolton, R. J., & Hand, D. J. (2001). Unsupervised profiling method for fraud detection.  In Conference of Credit Scoring and Credit Control VII, Edinburgh, UK.  Busta, B. (1998). Randy Weinberg. Using Benford 's law and neural networks as a review  procedure, 13(6), 356­366.  Cameron, P. (2001). You Can 't Hide from Accurint. Law Technology News, 8(9).  Causey, B. (2005). How To Respond To Attacks. Certification Magazine. Cecchini, M., Aytug, H., Koehler, G., & Pathak, P. (2005). Detecting Management Fraud  in Public Companies. University of Florida Fisher School of Business.  Cho, W. K. T., & Gaines, B. J. (2007). Breaking the (Benford) Law: Statistical Fraud  Detection in Campaign Finance. The American Statistician, 61(3), 218­223.  Coglitore, F. J., & Matson, D. M. (2007). The Use of Computer­Assisted Auditing  Techniques in the Audit Course: Further Evidence. Journal of Forensic  Accounting, VIII, 201­226.  Daily Tar Heel (2007).  Report on Social Security Number Fraud.  University of North  Carolina at Chapel Hill, April 26.  Dixon, P. D. (2005). An overview of computer forensics. IEEE Potentials, 24(5), 7­10.  Eining, M. M., Jones, D. R., & Loebbecke, J. K. (1997). Reliance on Decision Aids: An  Examination of Auditors ' Assessment of Management Fraud. Auditing: A Journal  of Theory and Practice, 16(2).  Freeman, E. H. (2006). Disclosure of Information Theft: The ChoicePoint Security  Breach. Information Systems Security, 11­15.  Frost, M. (2004). Finding Skeletons in Online Closets. Searcher, 12(6), 54­60.  Gavish, A. (2007). The Hidden Costs of Computer Misconduct. Security.  Green, B. P., & Choi, J. H. (1997). Assessing the Risk of Management Fraud Through  Neural Netowrk Technology. Auditing: A Journal of Theory and Practice, 16(1).  Grove, H., & Cook, T. (2004). Lessons for Auditors: Quantitative and Qualitative Red  Flags. Journal of Forensic Accounting, V, 131­146.  Hansen, J., McDonald, J., Messier, W., & Bell, T. (1996). A Generalized Qualitative­  Response Model and the Analysis of Management Fraud. Management Science,  42, 1022­1033.  Heel, D. T. (2007). Report on Social Security Number Fraud. University of North  Carolina at Chapel Hill.  Hermanson, D. R., Moran, B., Rossie, C. S., & Wolfe, D. T. (2006). Continuous  Monitoring of Transactions to Reduce Fraud, Misuse, and Errors. Journal of  Forensic Accounting, VII, 17­30.  Hill, T. P. (1995). A Statistical Derivation of the Significant Digit Law. Statistical  Science, 10, 354­363. Jones, M. W. (2008). Does Google Have Its GeoEye On You. . Electronic document,  http://tech.blorge.com/Structure:%20/2008/10/10/does­google­have­its­geoeye­  on­you/, accessed .  Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data mining for the detection of  fraudulent financial statements. Expert Systems with Applications, 23.  Kou, Y., Lu, C., & Sirwongwattana, S. (2004). Survey of Fraud Detection Techniques. In  2004 International Conference on Networking, Sensing, and Control (pp. 749­  754).  Kovalerchuk, B., Vityaev, E., & Holtfreter, R. (2007). Correlation of Complex Evidence  in Forensic Accounting Using Data Mining. Journal of Forensic Accounting, VIII,  53­88.  Kuchta, K. J. (2001). Your Computer Forensic Toolkit. Information Systems Security.  Lamoreaux, M. (2007). Internal Auditor Used Computer Tool to Detect WorldCom  Fraud. Journal of Accountancy, 35.  Lehman, M. W. (2008). Join the Hunt. Journal of Accountancy, 46­49.  Loebbecke, J., Eining, M., & Willingham, J. (1989). Auditors ' Experience with Material  Irregularities: Frequency, Nature, and Detectability. Auditing: A Journal of  Theory and Practice, 9, 1­28.  Loebbecke, J. K., & J. J. Willingham, J. (1988). Review of SEC Accounting and  Auditing Enforcement Releases. University of Utah.  Loftus, J. T., & Vermeer, T. E. (2003). Pro­Active Fraud Auditing: Technology, Fraud  Auditing, and Liquor. Journal of Forensic Accounting, IV, 307­310.  Lovett, R. W. (1955). Looking Around. Harvard Business Review.  Marczewski, D., & Akers, M. (2005). CPA 's Perceptions of the Impact of SAS 99. CPA  Journal, 75, 38­40.  Nigrini, M. J. (1999). I 've Got Your Number. Journal of Accountancy.  Nigrini, M. J. (2000). Digital analysis using Benford 's Law.  Global Audit Publications.  Paletta, D. (2005). Regulating ChoicePoint: Whose Job Is It, Anyway?. American  Banker.  Phua, C., Lee, V., Smith, K., & Gaylor, R. (2005). A comprehensive survey of data  mining­based fraud detection research. Working Paper. Procedure, S. (2008). Retrieved November 17, 2008 from  http://www.securityprocedure.com/download­picalo­open­source­alternative­acl­  audit.  Rezaee, Z., Sharbatoghlie, A., Elam, R., & McMickle, P. L. (2002). Continuous  Auditing: Building Automated Auditing Capability. Auditing: A Journal of  Theory and Practice, 21(1).  Samborn, H. V. (2002). No Place To Hide. ABA Journal.  Smith, G. S. (2000). Black Tech Forensics: Collection and Control of Electronic  Evidence. Journal of Forensic Accounting, I, 283­290.  Smith, G. S. (2005). Computer Forensics: Helping to Achieve the Auditor 's Fraud  Mission. Journal of Forensic Accounting, VI, 119=134.  Stafford, A. (2005). Information Brokers: Privacy In Peril. PC World, 101­104.  Summers, S. L., & Sweeny, J. T. (1998). Fraudulently Misstated Financial Statements  and Insider Trading: An Empirical Analysis. The Accounting Review, 73(1), 131­  146.  Swartz, N. (2004). U.S. States Disagree About Online Access to Court Records.  Information Management Journal, 11.  Technology Expert (2008). Google 's Street View "Off the Map" at U.S. Military Bases.  Retrieved November 17 from http://technologyexpert.blogspot.com  /2008/03/google­street­view­off­map­at­us.html.  Tyburski, G. (2004). Introduction to Online Legal, Regulatory, and Intellectual Property  Research.  South­Western Educational Pub.  Waldrup, B., Capriotti, K., & Anderson, S. C. (2004). Forensic Accounting Techniques:  A Defensible Investigatory Process for Litigation Purposes. Journal of Forensic  Accounting, V, 1­16.  Wells, J. T. (2002). Occupational Fraud: The Audit as Deterrent. Journal of Accountancy.

You May Also Find These Documents Helpful

  • Powerful Essays

    Week 1 Acc556

    • 1151 Words
    • 5 Pages

    Singleton, T. W., Singleton, A. J. (2010). Fraud Auditing and Forensic Accounting. (4th ed.). Hoboken, NJ: Wiley.…

    • 1151 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    operations you would use to collect evidence related to the fraud. Analyze technological options for…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    “As the FASB struggles to tighten the loopholes in accounting, and Congress and the SEC try to build safeguards for corporate governance, one group of accountants has been quietly helping corporations and investors alike in rebuilding confidence in financial statements. These are the forensic accountants.” The forensic accountant actively looks for fraudulent transactions and misrepresentations. Such an accountant has a major role to play in this new environment, and universities have the responsibility to train future accountants to adequately meet the demands of the business world.…

    • 941 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Bus 508 Assignment 3

    • 2009 Words
    • 9 Pages

    References: Crumbley, D.L., Heitger, L.E., & Smith, G.S. (2007). Forensic and Investigative Accounting. London: CCH…

    • 2009 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Double Deceit Summary

    • 1476 Words
    • 6 Pages

    Double Deceit: A True Story of a Nigerian Scam Dr. Agnes Chambers-Glenn, privately published, 106-14 Greenview Drive, Kingston, Ontario, K7M 7T5, docglenn23@yahoo.ca, 2013. 244pp. ISBN 978-1-4669-9438-6. CAD$15 In the novel, Double Deceit by Dr. Agnes Chambers-Glenn, the author follows the story of a medical doctor, Dr. Hassan Mashaal, a long time retire, on his pursuit as he takes down the money scammers who were responsible for the US $10.5 million scandal.…

    • 1476 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Irwin Margolies

    • 5801 Words
    • 24 Pages

    Wells, J. T. (2008). Principles of fraud examination (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc.…

    • 5801 Words
    • 24 Pages
    Powerful Essays
  • Better Essays

    Wells, J. T. (2011). Principles of fraud examination (3rd ed.). Retrieved from The University of…

    • 1086 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Through fraud examination, organizations can be able to determine if fraud occurs and in such case help to gather relevant evidence for the crime, the financial records are analyzed by financial detectives and relevant surveillance conducted to mitigate such hideous acts. A comprehensive review on the organizations internal control is carried out to ensure all workers comply with the relevant regulatory standards and industry benchmarks. This process also conducts analytical review on key accounting areas to reveal possible fraudulent activities.…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Throughout history, There have been many examples where groups of people have been denied their human rights. Individuals, groups, and governments have attempted to end many of these human violations, although they may not have always been successful. One example from history where human rights have been denied was the holocaust. The holocaust was horrendous because many harmless people died. During world war II, Hitler created concentration camps and death camps to kill the Jews because he thought no one else should survive that not Germanic. Another example where human rights was denied was the Rape of Nanjing. The rape of Nanjing was when Japan and china were arguing during WWII because China abandoned their nationalist capital, Nanjing.…

    • 809 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Singleton, T., Singleton, A., Bologna, J., & Linquist, R. (2006). Fraud Auditing and Forensic Accounting (3rd ed.). Hoboken, NJ: John Wiley & Sons, Inc.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    Finding Fraud on the Internet (1996, October) 14 (4), Internal Auditor, Retrieved July 1st from Gale Power Search Database…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mulford, C. W., & Comiskey, E. E. (2002). The Financial Numbers Game. Hoboken, NJ: John Wiley & Sons, Inc.…

    • 934 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fraud Accounting Memo

    • 457 Words
    • 2 Pages

    In this memorandum, I will explain the reasons as to why managers feel more pressure than in past years. Also, I will discuss several ways that managers can commit fraud for personal gain, and how these schemes are eventually caught by forensic accountants.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Over the last several years, Canadians and Americans have witnessed a rash of accounting and financial fraud incidents, including the debacles at now-bankrupt WorldCom and Enron, the Martha Stewart stock scandal, and recently, the largest Ponzi scheme in history allegedly perpetrated by Bernard Madoff.…

    • 2537 Words
    • 11 Pages
    Powerful Essays

Related Topics