Contents

Cover

Title Page

Copyright

Dedication

Preface

About the Author

Chapter 1: Using Access in Forensic Investigations

An Introduction to Access

The Architecture of Access

A Review of Access Tables

Importing Data into Access

A Review of Access Queries

Converting Excel Data into a Usable Access Format

Using the Access Documenter

Database Limit of 2 GB

Miscellaneous Access Notes

Summary

Chapter 2: Using Excel in Forensic Investigations

Pitfalls in Using Excel

Importing Data into Excel

Reporting Forensic Analytics Results

Protecting Excel Spreadsheets

Using Excel Results in Word Files

Excel Warnings and Indicators

Summary

Chapter 3: Using PowerPoint in Forensic Presentations

Overview of Forensic Presentations

An Overview of PowerPoint

Planning the Presentation

Color Schemes for Forensic Presentations

Problems with Forensic Reports

Summary

Chapter 4: High-Level Data Overview Tests

The Data Profile

The Data Histogram

The Periodic Graph

Preparing the Data Profile Using Access

Preparing the Data Profile Using Excel

Calculating the Inputs for the Periodic Graph in Access

Preparing a Histogram in Access Using an Interval Table

Summary

Chapter 5: Benford's Law: The Basics

An Overview of Benford's Law

From Theory to Application in 60 Years

Which Data Sets Should Conform to Benford's Law?

The Effect of Data Set Size

The Basic Digit Tests

Running the First-Two Digits Test in Access

Summary

Chapter 6: Benford's Law: Assessing Conformity

One Digit at a Time: The Z-Statistic

The Chi-Square and Kolmogorov-Smirnoff Tests

The Mean Absolute Deviation (MAD) Test

Tests Based on the Logarithmic Basis of Benford's Law

Creating a Perfect Synthetic Benford Set

The Mantissa Arc Test

Summary

Chapter 7: Benford's Law: The Second-Order and Summation Tests

A Description of the Second-Order Test

The Summation Test

Summary

Chapter 8: Benford's Law: The Number Duplication and Last-Two Digits Tests

The Number Duplication Test

Running the Number Duplication Test in Access

Running the Number Duplication Test in Excel

The Last-Two Digits Test

Summary

Chapter 9: Testing the Internal Diagnostics of Current Period and Prior Period Data

A Review of Descriptive Statistics

An Analysis of Alumni Gifts

An Analysis of Fraudulent Data

Summary and Discussion

Chapter 10: Identifying Fraud Using the Largest Subsets and Largest Growth Tests

Findings from the Largest Subsets Test

Running the Largest Subsets Test in Access

Running the Largest Growth Test in Access

Running the Largest Subsets Test in Excel

Running the Largest Growth Test in Excel

Summary

Chapter 11: Identifying Anomalies Using the Relative Size Factor Test

Relative Size Factor Test Findings

Running the RSF Test

Running the Relative Size Factor Test in Access

Running the Relative Size Factor Test in Excel

Summary

Chapter 12: Identifying Fraud Using Abnormal Duplications within Subsets

The Same-Same-Same Test

The Same-Same-Different Test

The Subset Number Duplication Test

Running the Same-Same-Same Test in Access

Running the Same-Same-Different Test in Access

Running the Subset Number Duplication Test in Access

Running the Same-Same-Same Test in Excel

Running the Same-Same-Different Test in Excel

Running the Subset Number Duplication Test in Excel

Summary

Chapter 13: Identifying Fraud Using Correlation

The Concept of Correlation

Correlation Calculations

Using Correlation to Detect Fraudulent Sales Numbers

Using Correlation to Detect Electricity Theft

Using Correlation to Detect Irregularities in Election Results

Detecting Irregularities in Pollution Statistics

Calculating Correlations in Access

Calculating the Correlations in Excel

Summary

Chapter 14: Identifying Fraud Using Time-Series Analysis

Time-Series Methods

An Application Using Heating Oil Sales

An Application Using Stock Market Data

An Application Using Construction Data

An Analysis of Streamflow Data

Running Time-Series Analysis in Excel

Calculating the Seasonal Factors

Running a Linear Regression

Fitting a Curve to the Historical Data

Calculating the Forecasts

Summary

Chapter 15: Fraud Risk Assessments of Forensic Units

The Risk Scoring Method

The Forensic Analytics Environment

A Description of the Risk-Scoring System

P1: High Food and Supplies Costs

P2: Very High Food and Supplies Costs

P3: Declining Sales

P4: Increase in Food Costs

P5: Irregular Seasonal Pattern for Sales

P6: Round Numbers Reported as Sales Numbers

P7: Repeating Numbers Reported as Sales Numbers

P8: Inspection Rankings

P9: High Receivable Balance

P10: Use of Automated Reporting Procedures

Final Results

An Overview of the Reporting System and Future Plans

Some Findings

Discussion

Summary

Chapter 16: Examples of Risk Scoring with Access Queries

The Audit Selection Method of the IRS

Risk Scoring to Detect Banking Fraud

Final Risk Scores

Risk Scoring to Detect Travel Agent Fraud

Final Results

Risk Scoring to Detect Vendor Fraud

Vendor Risk Scoring Using Access

Summary

Chapter 17: The Detection of Financial Statement Fraud

The Digits of Financial Statement Numbers

Detecting Biases in Accounting Numbers

An Analysis of Enron's Reported Numbers

An Analysis of Biased Reimbursement Numbers

Detecting Manipulations in Monthly Subsidiary Reports

Predictor Weightings

Conclusions

Summary

Chapter 18: Using Analytics on Purchasing Card Transactions

Purchasing Cards

The National Association of Purchasing Card Professionals

A Forensic Analytics Dashboard

An Example of Purchasing Card Data

High-Level Data Overview

The First-Order Test

The Summation Test

The Last-Two Digits Test

The Second-Order Test

The Number Duplication Test

The Largest Subsets Test

The Same-Same-Same Test

The Same-Same-Different Test

The Relative Size Factor Test

Conclusions with Respect to Card Purchases

A Note on Microsoft Office

A Note on the Forensic Analytic Tests

Conclusion

References

Index