Forensic analytics: methods and techniques for forensic accounting investigations
"The book will review and discuss (with Access and Excel examples) the methods and techniques that investigators can use to uncover anomalies in corporate and public sector data. These anomalies would include errors, biases, duplicates, number rounding, and omissions. The focus will be the dete...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
c2011
|
Schriftenreihe: | Wiley corporate F & A.
|
Schlagworte: | |
Online-Zugang: | HWR01 |
Zusammenfassung: | "The book will review and discuss (with Access and Excel examples) the methods and techniques that investigators can use to uncover anomalies in corporate and public sector data. These anomalies would include errors, biases, duplicates, number rounding, and omissions. The focus will be the detection of fraud, intentional errors, and unintentional errors using data analytics. Despite the quantitative and computing bias, the book will still be interesting to read with interesting vignettes and illustrations. Most chapters will be understandable by accountants and auditors that usually are lacking in the rigors of mathematics and statistics. The data interrogation methods are based on (a) known statistical techniques, and (b) the author's own published research in the field"-- |
Beschreibung: | Includes bibliographical references and index Front Matter -- Using Access in Forensic Investigations -- Using Excel in Forensic Investigations -- Using PowerPoint in Forensic Presentations -- High b6 sLevel Data Overview Tests -- Benford's Law: The Basics -- Benford's Law: Assessing Conformity -- Benford's Law: The Second b6 sOrder and Summation Tests -- Benford's Law: The Number Duplication and Last b6 sTwo Digits Tests -- Testing the Internal Diagnostics of Current Period and Prior Period Data -- Identifying Fraud Using the Largest Subsets and Largest Growth Tests -- Identifying Anomalies Using the Relative Size Factor Test -- Identifying Fraud Using Abnormal Duplications within Subsets -- Identifying Fraud Using Correlation -- Identifying Fraud Using Time b6 sSeries Analysis -- Fraud Risk Assessments of Forensic Units -- Examples of Risk Scoring with Access Queries -- The Detection of Financial Statement Fraud -- Using Analytics on Purchasing Card Transactions -- References -- Index |
Beschreibung: | 1 Online-Ressource (xvi, 463 Seiten) Ill. |
ISBN: | 9781118087688 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041425986 | ||
003 | DE-604 | ||
005 | 20180608 | ||
007 | cr|uuu---uuuuu | ||
008 | 131120s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781118087688 |c Online |9 978-1-118-08768-8 | ||
035 | |a (OCoLC)1039818110 | ||
035 | |a (DE-599)BVBBV041425986 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s |a DE-Aug4 | ||
100 | 1 | |a Nigrini, Mark John |e Verfasser |0 (DE-588)171545818 |4 aut | |
245 | 1 | 0 | |a Forensic analytics |b methods and techniques for forensic accounting investigations |c Mark J. Nigrini |
264 | 1 | |a Hoboken, NJ |b Wiley |c c2011 | |
300 | |a 1 Online-Ressource (xvi, 463 Seiten) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Wiley corporate F & A. | |
500 | |a Includes bibliographical references and index | ||
500 | |a Front Matter -- Using Access in Forensic Investigations -- Using Excel in Forensic Investigations -- Using PowerPoint in Forensic Presentations -- High b6 sLevel Data Overview Tests -- Benford's Law: The Basics -- Benford's Law: Assessing Conformity -- Benford's Law: The Second b6 sOrder and Summation Tests -- Benford's Law: The Number Duplication and Last b6 sTwo Digits Tests -- Testing the Internal Diagnostics of Current Period and Prior Period Data -- Identifying Fraud Using the Largest Subsets and Largest Growth Tests -- Identifying Anomalies Using the Relative Size Factor Test -- Identifying Fraud Using Abnormal Duplications within Subsets -- Identifying Fraud Using Correlation -- Identifying Fraud Using Time b6 sSeries Analysis -- Fraud Risk Assessments of Forensic Units -- Examples of Risk Scoring with Access Queries -- The Detection of Financial Statement Fraud -- Using Analytics on Purchasing Card Transactions -- References -- Index | ||
520 | |a "The book will review and discuss (with Access and Excel examples) the methods and techniques that investigators can use to uncover anomalies in corporate and public sector data. These anomalies would include errors, biases, duplicates, number rounding, and omissions. The focus will be the detection of fraud, intentional errors, and unintentional errors using data analytics. Despite the quantitative and computing bias, the book will still be interesting to read with interesting vignettes and illustrations. Most chapters will be understandable by accountants and auditors that usually are lacking in the rigors of mathematics and statistics. The data interrogation methods are based on (a) known statistical techniques, and (b) the author's own published research in the field"-- | ||
650 | 7 | |a LAW / Forensic Science |2 bisacsh | |
650 | 7 | |a Betrug |2 swd | |
650 | 7 | |a Rechnungslegung |2 swd | |
650 | 7 | |a Wirtschaftspr ufung |2 swd | |
650 | 4 | |a Forensic accounting | |
650 | 4 | |a Fraud | |
650 | 4 | |a Misleading financial statements | |
650 | 0 | 7 | |a Betrug |0 (DE-588)4006249-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaftsprüfung |0 (DE-588)4066505-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnungslegung |0 (DE-588)4128343-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnungslegung |0 (DE-588)4128343-0 |D s |
689 | 0 | 1 | |a Betrug |0 (DE-588)4006249-1 |D s |
689 | 0 | 2 | |a Wirtschaftsprüfung |0 (DE-588)4066505-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Rechnungslegung |0 (DE-588)4128343-0 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Wirtschaftsprüfung |0 (DE-588)4066505-7 |D s |
689 | 2 | |5 DE-604 | |
912 | |a ZDB-22-CAN | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026872953 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://hwr.ciando.com/book/index.cfm?bok_id=497295 |l HWR01 |p ZDB-22-CAN |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804151545700286464 |
---|---|
any_adam_object | |
author | Nigrini, Mark John |
author_GND | (DE-588)171545818 |
author_facet | Nigrini, Mark John |
author_role | aut |
author_sort | Nigrini, Mark John |
author_variant | m j n mj mjn |
building | Verbundindex |
bvnumber | BV041425986 |
collection | ZDB-22-CAN |
ctrlnum | (OCoLC)1039818110 (DE-599)BVBBV041425986 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03716nmm a2200553zc 4500</leader><controlfield tag="001">BV041425986</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180608 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131120s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118087688</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-118-08768-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1039818110</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041425986</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nigrini, Mark John</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)171545818</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Forensic analytics</subfield><subfield code="b">methods and techniques for forensic accounting investigations</subfield><subfield code="c">Mark J. Nigrini</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 463 Seiten)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley corporate F & A.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Front Matter -- Using Access in Forensic Investigations -- Using Excel in Forensic Investigations -- Using PowerPoint in Forensic Presentations -- High b6 sLevel Data Overview Tests -- Benford's Law: The Basics -- Benford's Law: Assessing Conformity -- Benford's Law: The Second b6 sOrder and Summation Tests -- Benford's Law: The Number Duplication and Last b6 sTwo Digits Tests -- Testing the Internal Diagnostics of Current Period and Prior Period Data -- Identifying Fraud Using the Largest Subsets and Largest Growth Tests -- Identifying Anomalies Using the Relative Size Factor Test -- Identifying Fraud Using Abnormal Duplications within Subsets -- Identifying Fraud Using Correlation -- Identifying Fraud Using Time b6 sSeries Analysis -- Fraud Risk Assessments of Forensic Units -- Examples of Risk Scoring with Access Queries -- The Detection of Financial Statement Fraud -- Using Analytics on Purchasing Card Transactions -- References -- Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The book will review and discuss (with Access and Excel examples) the methods and techniques that investigators can use to uncover anomalies in corporate and public sector data. These anomalies would include errors, biases, duplicates, number rounding, and omissions. The focus will be the detection of fraud, intentional errors, and unintentional errors using data analytics. Despite the quantitative and computing bias, the book will still be interesting to read with interesting vignettes and illustrations. Most chapters will be understandable by accountants and auditors that usually are lacking in the rigors of mathematics and statistics. The data interrogation methods are based on (a) known statistical techniques, and (b) the author's own published research in the field"--</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Forensic Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Betrug</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Rechnungslegung</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wirtschaftspr ufung</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic accounting</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Misleading financial statements</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaftsprüfung</subfield><subfield code="0">(DE-588)4066505-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnungslegung</subfield><subfield code="0">(DE-588)4128343-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnungslegung</subfield><subfield code="0">(DE-588)4128343-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Wirtschaftsprüfung</subfield><subfield code="0">(DE-588)4066505-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnungslegung</subfield><subfield code="0">(DE-588)4128343-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Wirtschaftsprüfung</subfield><subfield code="0">(DE-588)4066505-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-22-CAN</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026872953</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://hwr.ciando.com/book/index.cfm?bok_id=497295</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-22-CAN</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041425986 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:56:32Z |
institution | BVB |
isbn | 9781118087688 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026872953 |
oclc_num | 1039818110 |
open_access_boolean | |
owner | DE-2070s DE-Aug4 |
owner_facet | DE-2070s DE-Aug4 |
physical | 1 Online-Ressource (xvi, 463 Seiten) Ill. |
psigel | ZDB-22-CAN |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley |
record_format | marc |
series2 | Wiley corporate F & A. |
spelling | Nigrini, Mark John Verfasser (DE-588)171545818 aut Forensic analytics methods and techniques for forensic accounting investigations Mark J. Nigrini Hoboken, NJ Wiley c2011 1 Online-Ressource (xvi, 463 Seiten) Ill. txt rdacontent c rdamedia cr rdacarrier Wiley corporate F & A. Includes bibliographical references and index Front Matter -- Using Access in Forensic Investigations -- Using Excel in Forensic Investigations -- Using PowerPoint in Forensic Presentations -- High b6 sLevel Data Overview Tests -- Benford's Law: The Basics -- Benford's Law: Assessing Conformity -- Benford's Law: The Second b6 sOrder and Summation Tests -- Benford's Law: The Number Duplication and Last b6 sTwo Digits Tests -- Testing the Internal Diagnostics of Current Period and Prior Period Data -- Identifying Fraud Using the Largest Subsets and Largest Growth Tests -- Identifying Anomalies Using the Relative Size Factor Test -- Identifying Fraud Using Abnormal Duplications within Subsets -- Identifying Fraud Using Correlation -- Identifying Fraud Using Time b6 sSeries Analysis -- Fraud Risk Assessments of Forensic Units -- Examples of Risk Scoring with Access Queries -- The Detection of Financial Statement Fraud -- Using Analytics on Purchasing Card Transactions -- References -- Index "The book will review and discuss (with Access and Excel examples) the methods and techniques that investigators can use to uncover anomalies in corporate and public sector data. These anomalies would include errors, biases, duplicates, number rounding, and omissions. The focus will be the detection of fraud, intentional errors, and unintentional errors using data analytics. Despite the quantitative and computing bias, the book will still be interesting to read with interesting vignettes and illustrations. Most chapters will be understandable by accountants and auditors that usually are lacking in the rigors of mathematics and statistics. The data interrogation methods are based on (a) known statistical techniques, and (b) the author's own published research in the field"-- LAW / Forensic Science bisacsh Betrug swd Rechnungslegung swd Wirtschaftspr ufung swd Forensic accounting Fraud Misleading financial statements Betrug (DE-588)4006249-1 gnd rswk-swf Wirtschaftsprüfung (DE-588)4066505-7 gnd rswk-swf Rechnungslegung (DE-588)4128343-0 gnd rswk-swf Rechnungslegung (DE-588)4128343-0 s Betrug (DE-588)4006249-1 s Wirtschaftsprüfung (DE-588)4066505-7 s 1\p DE-604 DE-604 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Nigrini, Mark John Forensic analytics methods and techniques for forensic accounting investigations LAW / Forensic Science bisacsh Betrug swd Rechnungslegung swd Wirtschaftspr ufung swd Forensic accounting Fraud Misleading financial statements Betrug (DE-588)4006249-1 gnd Wirtschaftsprüfung (DE-588)4066505-7 gnd Rechnungslegung (DE-588)4128343-0 gnd |
subject_GND | (DE-588)4006249-1 (DE-588)4066505-7 (DE-588)4128343-0 |
title | Forensic analytics methods and techniques for forensic accounting investigations |
title_auth | Forensic analytics methods and techniques for forensic accounting investigations |
title_exact_search | Forensic analytics methods and techniques for forensic accounting investigations |
title_full | Forensic analytics methods and techniques for forensic accounting investigations Mark J. Nigrini |
title_fullStr | Forensic analytics methods and techniques for forensic accounting investigations Mark J. Nigrini |
title_full_unstemmed | Forensic analytics methods and techniques for forensic accounting investigations Mark J. Nigrini |
title_short | Forensic analytics |
title_sort | forensic analytics methods and techniques for forensic accounting investigations |
title_sub | methods and techniques for forensic accounting investigations |
topic | LAW / Forensic Science bisacsh Betrug swd Rechnungslegung swd Wirtschaftspr ufung swd Forensic accounting Fraud Misleading financial statements Betrug (DE-588)4006249-1 gnd Wirtschaftsprüfung (DE-588)4066505-7 gnd Rechnungslegung (DE-588)4128343-0 gnd |
topic_facet | LAW / Forensic Science Betrug Rechnungslegung Wirtschaftspr ufung Forensic accounting Fraud Misleading financial statements Wirtschaftsprüfung |
work_keys_str_mv | AT nigrinimarkjohn forensicanalyticsmethodsandtechniquesforforensicaccountinginvestigations |