• Complain

Vona - Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems

Here you can read online Vona - Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Hoboken;New Jersey, year: 2017, publisher: John Wiley & Sons, Incorporated, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems
  • Author:
  • Publisher:
    John Wiley & Sons, Incorporated
  • Genre:
  • Year:
    2017
  • City:
    Hoboken;New Jersey
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Vona: author's other books


Who wrote Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems? Find out the surname, the name of the author of the book and a list of all author's works by series.

Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents List of Illustrations Chapter 1 Chapter 2 Chapter 3 - photo 1
Table of Contents
List of Illustrations
  1. Chapter 1
  2. Chapter 2
  3. Chapter 3
  4. Chapter 4
  5. Chapter 5
  6. Chapter 6
  7. Chapter 7
Guide
Pages

Copyright 2017 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Cataloging-in-Publication Data:

Names: Vona, Leonard W., 1955- author.

Title: Fraud data analytics methodology : the fraud scenario approach to uncovering fraud in core business systems / Leonard W. Vona.

Description: Hoboken, New Jersey : John Wiley & Sons, [2017] | Includes index.

Identifiers: LCCN 2016036161 | ISBN 9781119186793 (cloth) | ISBN 9781119270348 (ePDF) | ISBN 9781119270355 (epub)

Subjects: LCSH: Auditing. | Forensic accounting. | FraudPrevention. | Auditing, Internal.

Classification: LCC HF5667 .V659 2017 | DDC 658.4/73dc23

LC record available at https://lccn.loc.gov/2016036161

Cover design: Wiley

Cover image: kentoh/Shutterstock

The Wiley Corporate F&A series provides information, tools, and insights to corporate professionals responsible for issues affecting the profitability of their company, from accounting and finance to internal controls and performance management.

Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offices in North America, Europe, Asia, and Australia, Wiley is globally committed to developing and marketing print and electronic products and services for our customers professional and personal knowledge and understanding.

This book is dedicated to my family, Patricia, Amy, David, and Jeffrey, for supporting me in my quest to explain fraud auditing. In the memory of my dad, who told me to go to college, and the memory of the women who shaped my life.

Preface

Even the world's best auditor using the world's best audit program cannot detect fraud unless their sample includes a fraudulent transaction. That is why fraud data analytics is so essential to the auditing profession.

Fraud auditing is a methodology tool used to respond to the risk of fraud in core business systems. The methodology must start with the fraud risk identification. Fraud data analytics is about searching for a fraud scenario versus a data anomaly. I have often referred to fraud data analytics as code breaking. The fraud auditor is studying millions of transactions in the attempt to find the needle in the haystack, called the fraud scenario. It is my hope that my years of professional experience in using fraud data analytics will move the auditing profession to become the numberone reason for fraud detection.

This book is about the science of fraud data analytics. It is a systematic study of fraud scenarios and their relationship to data. Like all scientific principles, the continual study of the science and the practical application of the science are both necessary for success in the discovery of fraud scenarios that are hiding in all core business systems.

The methodology described in the book is intended to provide a stepbystep process for building the fraud data analytics plan for your company. The first five chapters explain each phase of the process. Later chapters illustrate how to implement the methodology in asset misappropriation schemes, corruption schemes, and financial reporting schemes.

The practitioner will learn that fraud data analytics is both a science and an art. In baseball, there is a science to hitting a baseball. The mechanics of swinging a bat is taught to players of all ages. However, you can read all the books in the world about swinging a bat, but unless you actually stand in the batting box and swing the bat, you will never truly learn the art of hitting a baseball. Likewise, the fraud auditor needs to learn to analyze data and to employ the tools to do so in order to be able to find fraud scenarios hiding in your data systems.

Acknowledgments

To my friends at Audimation Services: Carolyn Newman, Jill Davies, and Carol Ursell. It is because of working with you that I developed the art of fraud data analytics.

To Sheck Cho (Executive Editor), who encouraged me to write my books, and to the editors at Wiley, without you I could not have written this book.

To Nicki Hindes, who keeps my office going while I travel the world.

To all those people who have inspired me. Thank you!

Chapter 1
Introduction to Fraud Data Analytics

The world's best auditor using the world's best audit program cannot detect fraud unless their sample includes a fraudulent transaction. This is why fraud data analytics (FDA) is so critical to the auditing profession.

How we use fraud data analytics largely depends on the purpose of the audit project. If the fraud data analytics is used in a whistle blower allegation, then the fraud data analytics plan is designed to refute or corroborate the allegation. If the fraud data analytics plan is used in a control audit, then the fraud data analytics would search for internal control compliance or internal control avoidance. If the fraud data analytics is used for fraud testing, then the fraud data analytics is used to search for a specific fraud scenario that is hidden in your database. This book is written for fraud auditors who want to integrate fraud testing into their audit program. The concepts are the same for fraud investigation and internal control avoidancewhat changes is the scope and context of the audit project.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems»

Look at similar books to Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems»

Discussion, reviews of the book Fraud data analytics methodology: the fraud scenario approach to uncovering fraud in core business systems and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.