Fraud analysis techniques using ACL:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley & Sons
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes index. |
Beschreibung: | XII, 158 S. Ill. 2 CD-ROM (12 cm) |
ISBN: | 9780470392447 0470392444 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV039786119 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 120104s2009 xxua||| |||| 00||| eng d | ||
010 | |a 2009010846 | ||
015 | |a GBA951625 |2 dnb | ||
020 | |a 9780470392447 |c paper/cdrom |9 978-0-470-39244-7 | ||
020 | |a 0470392444 |c paper/cdrom |9 0-470-39244-4 | ||
035 | |a (OCoLC)301885126 | ||
035 | |a (DE-599)BVBBV039786119 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 | ||
050 | 0 | |a HV8079.F7 | |
082 | 0 | |a 657/.45028553 | |
084 | |a PH 8480 |0 (DE-625)136505: |2 rvk | ||
100 | 1 | |a Coderre, David G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Fraud analysis techniques using ACL |c David Coderre |
264 | 1 | |a Hoboken, N.J. |b Wiley & Sons |c 2009 | |
300 | |a XII, 158 S. |b Ill. |e 2 CD-ROM (12 cm) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index. | ||
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Fraud | |
650 | 4 | |a Fraud investigation | |
650 | 4 | |a Fraud |x Prevention | |
650 | 4 | |a Auditing, Internal |x Data processing | |
650 | 0 | 7 | |a Betrug |0 (DE-588)4006249-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Betrug |0 (DE-588)4006249-1 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024646868&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024646868 |
Datensatz im Suchindex
_version_ | 1804148708447617024 |
---|---|
adam_text | Titel: Fraud analysis techniques using ACL
Autor: Coderre, David G.
Jahr: 2009
Contents
Preface..................................................___ix
About This Toolkit........................................ix
Who Should Use This Toolkit?.............................ix
What Is Included in This Toolkit?...........................ix
System Requirements.....................................ix
How to Use This Toolkit...................................ix
Install the Fraud Toolkit Application........................x
How This Book Is Structured...............................x
Script Code Conventions..................................xi
Flowcharts...............................................xi
Modifications/Updates...................................xii
Contacting the Author....................................xii
Acknowledgments........................................xii
Introduction........................................2
Using Data Analysis to Detect Fraud.........................2
Fraud: Risks and Costs.....................................2
Why Do People Commit Fraud?............................2
Why Use Data Analysis Software?...........................3
Identifying Fraud..........................................4
Proactive Fraud Investigation...............................5
Benefits of Data Analysis with CAATTs......................6
About Scripts.............................................6
What Is a Script?........................................6
Benefits of Scripts.......................................6
Preparing Scripts for Use.................................7
Copying Scripts...........,.............................7
Copying Table Layouts.......»...........,............... 7
Working with Scripts........................,............8
Launching the Fraud Toolkit Application............____.8
Running the Scripts.,..................,......,___.....9
Filtering....................,...............,.........10
Customizing Scripts......................................11
Customizing: An Example..............................12
Creating Your Own Fraud Application......................13
Further Reading..........................................14
Chapter 1: Start and Menu............................16
Launching the Fraud Toolkit Tests..........................16
Starting the Fraud Toolkit Application......................16
Placement of Start and Fraud Menu Scripts.................17
How the Scripts Work....................................17
Start....................................................17
Fraud Menu.............................................18
Log Files................................................18
Exiting a Script..........................................20
Working without the Fraud Menu..........................20
Chapter 2: Completeness and Integrity..................22
Checking for Blanks and Data Type Mismatches.............22
Running Completeness and Integrity.......................23
How the Scripts Work....................................24
Carriage Returns.........................................24
Understanding the Verify Command.......,...............24
Understanding the Group Command.......................25
Deleting Temporary Variables, Fields, and Files............26
Variables for Complete..............................,27
Review and Analysis.,....................................27
Case Study: General Ledger Accounts Unaccounted For......29
Chapter 3; Cross-Tabulation...........................30
Organizing Your Data to Find Trends.......................30
Running Cross-Tabulation..................----..........30
Benefits of Cross-Tabulation............................... 32
Contents
How the Scripts Work....................................33
Challenges of Cross-Tabulation..........................34
X-Axis Labels............................................34
Workspaces..............................................35
Deleting Temporary Variables, Fields, and Files............36
Variables for Cross_Tabs..............................36
Review and Analysis......................................36
Case Study: Not Enough Clients...........................37
Case Study: Calling Cards.................................37
Chapter 4: Duplicates................................38
Finding Higher-Risk Items................................38
Payroll................................................38
Accounts Payable......................................38
Running Duplicates......................................38
How the Scripts Work....................................40
The Role of Subscripts....................................40
Case Study: Duplicate Payments...........................42
Dup.Dialog Script........................................43
If Statements............................................43
Dup_Multiple JCeysl......................................44
Macro Substitution.......................................44
KeyChange..............................................45
Define Field.............................................46
LENGTHO and HEX()................................... 46
Deleting Temporary Variables, Fields, and Files............46
Review and Analysis......................................47
Checking for Duplicates.................................. 47
Payroll Example........,.....,...........................48
Accounts Payable Example ..___..........................50
Chapter 5: Gaps....................................52
Identifying Transactions Missing from a Sequence...........52
Running Gaps...........................................52
How the Scripts Work....................................53
Deleting Temporary Variables, Fields, and Files............54
Review and Analysis......................................54
Case Study: Free Calls....................................55
Chapter 6: Data Profile...............................56
Establishing Normal Values and Investigating Exceptions____56
Running Data Profile.....................................56
How the Scripts Work....................................57
Flow of Data in Data Profile...............................59
Data Profile Test Parameters...............................59
Deleting Temporary Variables, Fields, and Files............61
Review and Analysis......................................62
Statistics................................................62
Stratify..................................................63
Round Amounts, Exact Multiples, and Frequent Values......65
Round Amounts: Multiples of 5,10, 25, or 100..............65
Exact Multiples of........................................66
Frequently Used Values...................................66
Profiling with Character Fields.............................67
Items with the Most Exact Multiples........................67
Least/Most Used Items....................................68
Case Study: Receipt of Inventory___.......................69
Case Study: Exact Multiples............................... 71
Filtering and Drilling Down...............................71
Filtering before Profiling___......................».....71
Filtering after Profiling.................................72
Chapter 7: Ratio Analysis.............................74
Pinpointing Suspect Transactions and Trends...............74
Running Ratio Analysis...................................74
How the Scripts Work....................................78
Max/Max2 and Max/Min Ratios...........................78
Two Fields: NumJieldl / Num_field2 Ratio.................80
Deleting Temporary Variables, Fields, and Files............80
Review and Analysis......................................81
Case Study: Dormant but Not Forgotten..................., 84
Case Study: Doctored Bills................................85
Chapter 8: Benford s Law.............................88
Identifying Anomalous Data...............................88
Understanding Benford s Law.............................88
Identifying Irregularities..................................88
Running Benford Analysis.................................89
Running Benford Custom Analysis.........................90
Creating the Custom Distribution.......................90
Division by Zero.......................................91
Testing against the Custom Distribution..................92
How the Benford Scripts Work............................93
Standard Benford Analysis..............................93
Benford Custom Analysis...............................95
Deleting Temporary Variables, Fields, and Files............96
Review and Analysis......................................96
Case Study: Signing Authority.............................98
Further Reading....................,.....................98
Chapter 9: Developing ACL Scripts..................... .100
Introduction........................................___100
Data Analysis: Generic Approach.........................100
Contents
ACL Commands........................................102
DISPLAY Command..................................102
SET Command.......................................102
DELETE Command...................................103
OPEN Command.....................................103
Commands for Defining Relationships..................103
Basic ACL Commands.................................103
IF Command.........................................104
Variables...............................................104
User-Defined Variables................................106
Using System and User-Defined Variables...............106
DEFINE Field/Expression................................106
Workspaces.............................................107
Sharing Workspaces...................................109
Scripts.................................................109
What Is a Script?......................................109
Creating Scripts......................................109
Commenting Scripts..................................113
COMMENT.......................................113
END..............................................113
Editing Scripts........................................113
Running Scripts......................................114
RUN ACL Script from DOS.............,................115
Saving a Script to a .BAT file..............................115
Interactive Scripts.......................................117
ACCEPT Command.....................................117
Dialog Boxes............................................118
Adding Selections to Drop-Down and Project
Item Lists........,...................................119
Macro Substitution.....................------............ 120
Editing Dialog Boxes.....................................120
yjf
Contents
Subscripts..............................................122
Special Uses for Subscripts.............................122
Repeating a Script..................................123
Error Trapping.....................................123
Consolidation Exercise...................................124
Advanced ACL Scripting Techniques......................125
GROUP Command.....................................125
Simple GROUP.......................................126
Conditional GROUP..................................126
Nested GROUP.......................................128
LOOP and OFFSETQ....................................132
Applications Menu...................................... 135
Building an Application Menu............................137
Creating Submenus.....................................137
Chapter 10: Utility Scripts............................138
Auto_Execute...........................................138
Extract-Values..........................................139
Ending Balance Verification..............................140
RunningJTotal..........................................142
Maximum and Minimum Values.........................143
Appendix: ACl Installation Process................................145
Glossary...................................................149
Index.....................................................755
|
any_adam_object | 1 |
author | Coderre, David G. |
author_facet | Coderre, David G. |
author_role | aut |
author_sort | Coderre, David G. |
author_variant | d g c dg dgc |
building | Verbundindex |
bvnumber | BV039786119 |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.F7 |
callnumber-search | HV8079.F7 |
callnumber-sort | HV 48079 F7 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | PH 8480 |
ctrlnum | (OCoLC)301885126 (DE-599)BVBBV039786119 |
dewey-full | 657/.45028553 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 657 - Accounting |
dewey-raw | 657/.45028553 |
dewey-search | 657/.45028553 |
dewey-sort | 3657 845028553 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Rechtswissenschaft Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01671nam a2200481zc 4500</leader><controlfield tag="001">BV039786119</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120104s2009 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2009010846</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA951625</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470392447</subfield><subfield code="c">paper/cdrom</subfield><subfield code="9">978-0-470-39244-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470392444</subfield><subfield code="c">paper/cdrom</subfield><subfield code="9">0-470-39244-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)301885126</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039786119</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8079.F7</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">657/.45028553</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PH 8480</subfield><subfield code="0">(DE-625)136505:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Coderre, David G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fraud analysis techniques using ACL</subfield><subfield code="c">David Coderre</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley & Sons</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 158 S.</subfield><subfield code="b">Ill.</subfield><subfield code="e">2 CD-ROM (12 cm)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Auditing, Internal</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024646868&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024646868</subfield></datafield></record></collection> |
id | DE-604.BV039786119 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:11:26Z |
institution | BVB |
isbn | 9780470392447 0470392444 |
language | English |
lccn | 2009010846 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024646868 |
oclc_num | 301885126 |
open_access_boolean | |
owner | DE-1050 |
owner_facet | DE-1050 |
physical | XII, 158 S. Ill. 2 CD-ROM (12 cm) |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley & Sons |
record_format | marc |
spelling | Coderre, David G. Verfasser aut Fraud analysis techniques using ACL David Coderre Hoboken, N.J. Wiley & Sons 2009 XII, 158 S. Ill. 2 CD-ROM (12 cm) txt rdacontent n rdamedia nc rdacarrier Includes index. Datenverarbeitung Fraud Fraud investigation Fraud Prevention Auditing, Internal Data processing Betrug (DE-588)4006249-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Betrug (DE-588)4006249-1 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024646868&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Coderre, David G. Fraud analysis techniques using ACL Datenverarbeitung Fraud Fraud investigation Fraud Prevention Auditing, Internal Data processing Betrug (DE-588)4006249-1 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4006249-1 (DE-588)4061963-1 |
title | Fraud analysis techniques using ACL |
title_auth | Fraud analysis techniques using ACL |
title_exact_search | Fraud analysis techniques using ACL |
title_full | Fraud analysis techniques using ACL David Coderre |
title_fullStr | Fraud analysis techniques using ACL David Coderre |
title_full_unstemmed | Fraud analysis techniques using ACL David Coderre |
title_short | Fraud analysis techniques using ACL |
title_sort | fraud analysis techniques using acl |
topic | Datenverarbeitung Fraud Fraud investigation Fraud Prevention Auditing, Internal Data processing Betrug (DE-588)4006249-1 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Datenverarbeitung Fraud Fraud investigation Fraud Prevention Auditing, Internal Data processing Betrug Unternehmen |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024646868&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT coderredavidg fraudanalysistechniquesusingacl |