SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Using Benford’s Law
for Fraud Detection & Auditing
Rohit Kundu, CAATs Expert
July 2014
• AuditNet® features:
• Over 2,000 Reusable Templates, Audit Programs,
Questionnaires and Control Matrices
• Networking Groups & Online Forums through LinkedIn, Google
and Yahoo
• Audit Guides, Manuals, and Books on Audit Basics
CaseWare Analytics (IDEA) users receive full access to AuditNet templates
• Founded in 1988
• An industry leader in providing technology solutions for
finance, accounting, governance, risk and audit professionals
• Over 400,000 users of our technologies across 130 countries
and 16 languages
• Customers include Fortune 500 and Global 500 companies
• Microsoft Gold Certified Partner
CaseWare International
International Acceptance
• What is Benford’s Law?
• Conforming/Non-Conforming Data Types
• Practical Applications of Benford’s Law
• Major Digit Tests
• Demo
• Q&A
Agenda
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Simon Newcomb’s Theory:
Frequency of Use of the Different Digits in Natural Numbers
“A multi-digit number is more likely to begin with ‘1’ than any other number.”
Pg. 40. American Journal of Mathematics,
The Johns Hopkins University Press
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Frank Benford:
• Analyzed 20,229 sets of numbers, including, areas of rivers, baseball
averages, atomic weights of atoms, electricity bills, etc.
Conclusion
Multi digit numbers beginning with 1, 2 or 3 appear more frequently than
multi digit numbers beginning with 4, 5, 6, etc.
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Data First Digit 1 First Digit 2 First Digit 3
Populations 33.9 20.4 14.2
Batting Averages 32.7 17.6 12.6
Atomic Weight 47.2 18.7 10.4
X-Ray Volts 27.917 15.7
Average 30.6% 18.5% 12.4%
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Roger Pinkham:
Research conducted revealed that Benford’s probabilities are scale invariant.
Dr. Mark Nigrini:
Published a thesis noting that Benford’s Law could be used to detect fraud
because human choices are not random; invented numbers are unlikely to
follow Benford’s Law.
The number 1 occurs as the
leading digit 30.1% of the
time, while larger numbers
occur in the first digit less
frequently.
For example, the number 3879
 3 - first digit
 8 - second digit
 7 - third digit
 9 – fourth digit
Benford’s Law
Benford’s Law Key Facts
 For naturally occurring numbers, the leading digit(s) is (are)
distributed in a specific, non-uniform way.
 While one might think that the number 1 would appear as
the first digit 11 percent of the time, it actually appears
about 30 percent of the time.
 Therefore the number 1 predominates most progressions.
 Scale invariant – works with numbers denominated as
dollars, yen, euros, pesos, rubles, etc.
 Not all data sets are suitable for analysis.
Benford’s Law Defined
Conforming Data Types
• Data set should describe similar data (e.g. town populations)
• Large Data Sets
• Data that has a wide variety in the number of figures e.g.
plenty of values in the hundreds, thousands, tens of
thousands, etc.
• No built-in maximum or minimum values
Some common characteristics of accounting data…
Conforming Data Types - Examples
• Accounts payable transactions
• Credit card transactions
• Customer balances and refunds
• Disbursements
• Inventory prices
• Journal entries
• Loan data
• Purchase orders
• Stock prices, T&E expenses, etc.
Non-Conforming Data Types
• Data where pre-arranged, artificial limits or nos. influenced
by human thought exist i.e. built-in maximum or minimum
values
– Zip codes, telephone nos., YYMM#### as insurance policy no.
– Prices sets at thresholds ($1.99, ATM withdrawals, etc.)
– Airline passenger counts per plane
• Aggregated data
• Data sets with 500 or few transactions
• No transaction recorded
– Theft, kickback, skimming, contract rigging, etc.
Usage of Benford’s Law
• Within a comprehensive Anti-Fraud Program
COSO Framework
Risk
Assessment
Control
Environment
Control
Activities
Information and
Communication
Specify
organizational
objectives
Monitoring
High- Level Usage of Benford’s Law
• Risk-Based Audits
– Planning Phase
 Early warning sign that past data patterns have changed
or abnormal activity
Data Set X represents the first
digit frequency of 10,000 vendor
invoices.
High- Level Usage of Benford’s Law
• Forensic Audits
– Check fraud, bypassing permission limits, improper
payments
• Audit of Financial Statements
– Manipulation of checks, cash on hand, etc.
• Corporate Finance/Company Evaluation
– Examine cash-flow-forecasts for profit centers
Major Digit Tests (using IDEA)
• 1st Digit Test
• 2nd Digit Test
• First two digits
• First three digits
• Last two digits
• Second Order Test
1st & 2nd Digit Tests
1st Digit Test
• High Level Test
• Will only identify the blinding glimpse of the obvious
• Should not be used to select audit samples, as the sample
size will be too large
2nd Digit Test
• Also a high level test
• Used to identify conformity
• Should not be used to select audit samples
First Two Digits Test
• More focused and examines the frequency of the numerical
combinations 10 through 99 on the first two digits of a series
of numbers
• Can be used to select audit targets for preliminary review
Example:
10,000 invoices -- > 2600 invoices
-- > (1.78% + 1.69%) x 10,000
-- > (178 + 169) = 347 invoices
Only examine invoices beginning with the
first two digits 31 and 33.
Source: Using Benford’s Law to Detect Fraud , ACFE
First Three Digits Test
• Highly Focused
• Used to select audit samples
• Tends to identify number duplication
Last Two Digits Test
• Used to identify invented (overused) and rounded numbers
• It is expected that the right-side two digits be distributed
evenly. With 100 possible last two digits numbers (00, 01,
02...., 98, 99), each should occur approximately 1% of the
time.
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New
Jersey
Second Order Test
• Based on the 1st two digits in the data.
• A numeric field is sorted from the smallest to largest
(ordered) and the value differences between each pair of
consecutive records should follow the digit frequencies of
Benford’s Law.
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New
Jersey
Continuous Monitoring Framework
• Automated & Repeatable Analysis
• Input New Analytics with Ease
• Remediation Workflow & Resolution Guidelines
• KPIs (Root Cause Analysis)
Continuous Monitoring Framework
Turn-key Solutions
• P2P
• Purchasing Cards and T&E Monitoring
– Identify transaction policy violations
– Spend, Expense & Vendor profiling
– Identify card issuance processing errors
– Evaluate trends for operational/process improvements
Conclusion
Benford’s Law
• One person invents all the numbers
• Lots of different people have an incentive to manipulate
numbers in the same way
• Useful first step to give us a better understanding of our data
• Need to use Benford’s Law together with other drill down
tests
• Technology enables this faster and easier to produce results
Rohit Kundu
Rohit.kundu@caseware.com
Sunder Gee
Sunder.Gee@ZapConsulting.ca
IDEA Inquiries
salesidea@caseware.com
Q & A

Weitere ähnliche Inhalte

Was ist angesagt?

Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
rickycfe
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
Blackbaud
 
7 keys to fraud prevention
7 keys to fraud prevention7 keys to fraud prevention
7 keys to fraud prevention
Ron Steinkamp
 
Money Laundering Basics And Impact
Money Laundering   Basics And ImpactMoney Laundering   Basics And Impact
Money Laundering Basics And Impact
Paul_R_Freeman
 

Was ist angesagt? (20)

Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Financial Crimes
Financial CrimesFinancial Crimes
Financial Crimes
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
7 keys to fraud prevention
7 keys to fraud prevention7 keys to fraud prevention
7 keys to fraud prevention
 
Bank frauds vk (2)
Bank frauds vk (2)Bank frauds vk (2)
Bank frauds vk (2)
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
Types of Fraud.pptx
Types of Fraud.pptxTypes of Fraud.pptx
Types of Fraud.pptx
 
Workshop on Fraud Investigation
Workshop on Fraud InvestigationWorkshop on Fraud Investigation
Workshop on Fraud Investigation
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Facebook
FacebookFacebook
Facebook
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Show
 
Money Laundering Basics And Impact
Money Laundering   Basics And ImpactMoney Laundering   Basics And Impact
Money Laundering Basics And Impact
 

Andere mochten auch

What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
steinkamps6
 

Andere mochten auch (20)

Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
Benford's law
Benford's lawBenford's law
Benford's law
 
Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred Lyons
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Benfords Law
Benfords LawBenfords Law
Benfords Law
 
VAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderVAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing trader
 
Outlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopOutlier and fraud detection using Hadoop
Outlier and fraud detection using Hadoop
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detection
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
 
Deep Learning for Fraud Detection
Deep Learning for Fraud DetectionDeep Learning for Fraud Detection
Deep Learning for Fraud Detection
 
PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
 

Ähnlich wie Using benford's law for fraud detection and auditing

Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
easternman99
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
Robert Hillard
 
Nov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYNov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKY
Fay Teplitsky
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
Alejandro Correa Bahnsen, PhD
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
Stephen Cobb
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologies
Mensah Sitti
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
Alejandro Correa Bahnsen, PhD
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
emermell
 

Ähnlich wie Using benford's law for fraud detection and auditing (20)

Mathematics ib ia example
Mathematics ib ia exampleMathematics ib ia example
Mathematics ib ia example
 
Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
 
benfords Law
benfords Lawbenfords Law
benfords Law
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
 
Nov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYNov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKY
 
Phone Fraud Detection
Phone Fraud DetectionPhone Fraud Detection
Phone Fraud Detection
 
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BI
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
 
Data analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit ConferenceData analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit Conference
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologies
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know
 
10 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt110 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt1
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know
 

Mehr von Jim Kaplan CIA CFE

Mehr von Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 

Kürzlich hochgeladen

Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
vexqp
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Klinik kandungan
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
ahmedjiabur940
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
HyderabadDolls
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
chadhar227
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
HyderabadDolls
 

Kürzlich hochgeladen (20)

Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service AvailableVastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
 
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
 

Using benford's law for fraud detection and auditing

  • 1. Using Benford’s Law for Fraud Detection & Auditing Rohit Kundu, CAATs Expert July 2014
  • 2. • AuditNet® features: • Over 2,000 Reusable Templates, Audit Programs, Questionnaires and Control Matrices • Networking Groups & Online Forums through LinkedIn, Google and Yahoo • Audit Guides, Manuals, and Books on Audit Basics CaseWare Analytics (IDEA) users receive full access to AuditNet templates
  • 3. • Founded in 1988 • An industry leader in providing technology solutions for finance, accounting, governance, risk and audit professionals • Over 400,000 users of our technologies across 130 countries and 16 languages • Customers include Fortune 500 and Global 500 companies • Microsoft Gold Certified Partner CaseWare International
  • 5. • What is Benford’s Law? • Conforming/Non-Conforming Data Types • Practical Applications of Benford’s Law • Major Digit Tests • Demo • Q&A Agenda
  • 6. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Simon Newcomb’s Theory: Frequency of Use of the Different Digits in Natural Numbers “A multi-digit number is more likely to begin with ‘1’ than any other number.” Pg. 40. American Journal of Mathematics, The Johns Hopkins University Press
  • 7. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Frank Benford: • Analyzed 20,229 sets of numbers, including, areas of rivers, baseball averages, atomic weights of atoms, electricity bills, etc. Conclusion Multi digit numbers beginning with 1, 2 or 3 appear more frequently than multi digit numbers beginning with 4, 5, 6, etc.
  • 8. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Data First Digit 1 First Digit 2 First Digit 3 Populations 33.9 20.4 14.2 Batting Averages 32.7 17.6 12.6 Atomic Weight 47.2 18.7 10.4 X-Ray Volts 27.917 15.7 Average 30.6% 18.5% 12.4%
  • 9. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Roger Pinkham: Research conducted revealed that Benford’s probabilities are scale invariant. Dr. Mark Nigrini: Published a thesis noting that Benford’s Law could be used to detect fraud because human choices are not random; invented numbers are unlikely to follow Benford’s Law.
  • 10. The number 1 occurs as the leading digit 30.1% of the time, while larger numbers occur in the first digit less frequently. For example, the number 3879  3 - first digit  8 - second digit  7 - third digit  9 – fourth digit Benford’s Law
  • 11. Benford’s Law Key Facts  For naturally occurring numbers, the leading digit(s) is (are) distributed in a specific, non-uniform way.  While one might think that the number 1 would appear as the first digit 11 percent of the time, it actually appears about 30 percent of the time.  Therefore the number 1 predominates most progressions.  Scale invariant – works with numbers denominated as dollars, yen, euros, pesos, rubles, etc.  Not all data sets are suitable for analysis.
  • 13. Conforming Data Types • Data set should describe similar data (e.g. town populations) • Large Data Sets • Data that has a wide variety in the number of figures e.g. plenty of values in the hundreds, thousands, tens of thousands, etc. • No built-in maximum or minimum values Some common characteristics of accounting data…
  • 14. Conforming Data Types - Examples • Accounts payable transactions • Credit card transactions • Customer balances and refunds • Disbursements • Inventory prices • Journal entries • Loan data • Purchase orders • Stock prices, T&E expenses, etc.
  • 15. Non-Conforming Data Types • Data where pre-arranged, artificial limits or nos. influenced by human thought exist i.e. built-in maximum or minimum values – Zip codes, telephone nos., YYMM#### as insurance policy no. – Prices sets at thresholds ($1.99, ATM withdrawals, etc.) – Airline passenger counts per plane • Aggregated data • Data sets with 500 or few transactions • No transaction recorded – Theft, kickback, skimming, contract rigging, etc.
  • 16. Usage of Benford’s Law • Within a comprehensive Anti-Fraud Program COSO Framework Risk Assessment Control Environment Control Activities Information and Communication Specify organizational objectives Monitoring
  • 17. High- Level Usage of Benford’s Law • Risk-Based Audits – Planning Phase  Early warning sign that past data patterns have changed or abnormal activity Data Set X represents the first digit frequency of 10,000 vendor invoices.
  • 18. High- Level Usage of Benford’s Law • Forensic Audits – Check fraud, bypassing permission limits, improper payments • Audit of Financial Statements – Manipulation of checks, cash on hand, etc. • Corporate Finance/Company Evaluation – Examine cash-flow-forecasts for profit centers
  • 19. Major Digit Tests (using IDEA) • 1st Digit Test • 2nd Digit Test • First two digits • First three digits • Last two digits • Second Order Test
  • 20. 1st & 2nd Digit Tests 1st Digit Test • High Level Test • Will only identify the blinding glimpse of the obvious • Should not be used to select audit samples, as the sample size will be too large 2nd Digit Test • Also a high level test • Used to identify conformity • Should not be used to select audit samples
  • 21. First Two Digits Test • More focused and examines the frequency of the numerical combinations 10 through 99 on the first two digits of a series of numbers • Can be used to select audit targets for preliminary review Example: 10,000 invoices -- > 2600 invoices -- > (1.78% + 1.69%) x 10,000 -- > (178 + 169) = 347 invoices Only examine invoices beginning with the first two digits 31 and 33. Source: Using Benford’s Law to Detect Fraud , ACFE
  • 22. First Three Digits Test • Highly Focused • Used to select audit samples • Tends to identify number duplication
  • 23. Last Two Digits Test • Used to identify invented (overused) and rounded numbers • It is expected that the right-side two digits be distributed evenly. With 100 possible last two digits numbers (00, 01, 02...., 98, 99), each should occur approximately 1% of the time. Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 24. Second Order Test • Based on the 1st two digits in the data. • A numeric field is sorted from the smallest to largest (ordered) and the value differences between each pair of consecutive records should follow the digit frequencies of Benford’s Law. Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 25. Continuous Monitoring Framework • Automated & Repeatable Analysis • Input New Analytics with Ease • Remediation Workflow & Resolution Guidelines • KPIs (Root Cause Analysis)
  • 26. Continuous Monitoring Framework Turn-key Solutions • P2P • Purchasing Cards and T&E Monitoring – Identify transaction policy violations – Spend, Expense & Vendor profiling – Identify card issuance processing errors – Evaluate trends for operational/process improvements
  • 27. Conclusion Benford’s Law • One person invents all the numbers • Lots of different people have an incentive to manipulate numbers in the same way • Useful first step to give us a better understanding of our data • Need to use Benford’s Law together with other drill down tests • Technology enables this faster and easier to produce results