000 03856cam a2200361 a 4500
001 2008053433
003 DLC
005 20151013135758.0
008 081219s2009 njua b 001 0 eng
010 _a 2008053433
015 _aGBA928586
_2bnb
016 7 _a014932769
_2Uk
020 _a9780470392430 (cloth)
020 _a0470392436 (cloth)
035 _a(OCoLC)ocn246887310
040 _aDLC
_cDLC
_dBTCTA
_dYDXCP
_dC#P
_dUKM
_dCDX
_dBWX
_dKSU
_dOMB
_dBDX
_dDLC
050 0 0 _aHV8079.F7
_bC62 2009
082 0 0 _a364.4
_222
100 1 _aCoderre, David G.
245 1 0 _aComputer-aided fraud prevention and detection :
_ba step-by-step guide /
_cDavid Coderre.
260 _aHoboken, N.J. :
_bJohn Wiley & Sons,
_cc2009.
300 _axviii, 280 p. :
_bill. ;
_c24 cm. +
_e1 CD-ROM (4 3/4 in.)
504 _aIncludes bibliographical references (p. 275-276) and index.
505 0 _aWhat is fraud? : Fraud: a definition ; Why fraud happens ; Who is responsible for fraud detection? ; What is a fraud awareness program? ; What is a corporate fraud policy? -- Fraud prevention and detection : Detecting fraud ; Determining the exposure to fraud ; Assessing the risk that fraud is occurring (or will occur) ; External symptoms ; Identifying areas of high risk for fraud ; Looking at the exposures from the fraudster's perspective ; Approach 1: Control weaknesses ; Approach 2: Key fields ; Being alert to the symptoms of fraud ; Building programs to look for symptoms ; Investigating and reporting instances of fraud ; Implementing controls for fraud prevention -- Why use data analysis to detect fraud? : Increased reliance on computers ; Developing CAATT's capabilities ; Integrated analysis and value-added audit ; Recognizing opportunities for CAATT's ; Developing a fraud investigation plan -- Solving the data problem : Setting audit objectives ; Defining the information requirements ; Accessing data ; Data paths ; Data file attributes and structures ; Assessing data integrity ; Overview of the application system ; Overview of the data -- Understanding the data : Computer analysis ; Analysis techniques ; Assessing the completeness of the data ; Expression/equation ; Gaps ; Statistical analysis ; Duplicates ; Sorting and indexing -- Overview of the data : Summarization ; Stratification ; Cross tabulation/pivot tables -- Working with the data : Aging ; Join/relation -- Analyzing trends in the data : Trend analysis ; Regression analysis ; Parallel simulation -- Known symptoms of fraud : Known and unknown symptoms ; Fraud in the payroll area ; Fraud in the purchasing area ; Symptoms of purchasing fraud -- Unknown symptoms of fraud (using digital analysis) : Data profiling ; Ratio / variance analysis ; Benford's law -- Automating the detection process : Fraud applications or templates ; Fraud application development -- Verifying the results : Confirmationletters ; Sampling ; Judgmental or directed sampling ; Statistical sampling ; Quality assurance ; Quality assurance methodology ; Preventive controls ; Detective controls ; Corrective controls ; Ensuring reliability ; Data analysis and prosecuting fraud -- Appendix A. Fraud investigation plans : Insurance policies: too good to be true ; Paid by the numbers -- Appendix B. Application of CAATT's by functional area -- Appendix C. ACL installation process.
520 _aThis thorough and highly readable guide is filled with authoritative tips, techniques, and advice on: what fraud is really costing your organisation; why use data analysis to detect fraud? How to assess the risk that fraud is occurring and automating your corporate fraud detection process.
590 _arpm 22/05/13
591 _aLoans
650 0 _aFraud.
650 0 _aFraud investigation.
650 0 _aFraud
_xPrevention.
650 0 _aAuditing, Internal
_xData processing.
942 _2ddc
_cBOOK
999 _c181
_d181