SlideShare ist ein Scribd-Unternehmen logo
Using Benford’s Law
for Fraud Detection & Auditing
Rohit Kundu, CAATs Expert
July 2014
• AuditNet® features:
• Over 2,000 Reusable Templates, Audit Programs,
Questionnaires and Control Matrices
• Networking Groups & Online Forums through LinkedIn, Google
and Yahoo
• Audit Guides, Manuals, and Books on Audit Basics
CaseWare Analytics (IDEA) users receive full access to AuditNet templates
• Founded in 1988
• An industry leader in providing technology solutions for
finance, accounting, governance, risk and audit professionals
• Over 400,000 users of our technologies across 130 countries
and 16 languages
• Customers include Fortune 500 and Global 500 companies
• Microsoft Gold Certified Partner
CaseWare International
International Acceptance
• What is Benford’s Law?
• Conforming/Non-Conforming Data Types
• Practical Applications of Benford’s Law
• Major Digit Tests
• Demo
• Q&A
Agenda
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Simon Newcomb’s Theory:
Frequency of Use of the Different Digits in Natural Numbers
“A multi-digit number is more likely to begin with ‘1’ than any other number.”
Pg. 40. American Journal of Mathematics,
The Johns Hopkins University Press
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Frank Benford:
• Analyzed 20,229 sets of numbers, including, areas of rivers, baseball
averages, atomic weights of atoms, electricity bills, etc.
Conclusion
Multi digit numbers beginning with 1, 2 or 3 appear more frequently than
multi digit numbers beginning with 4, 5, 6, etc.
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Data First Digit 1 First Digit 2 First Digit 3
Populations 33.9 20.4 14.2
Batting Averages 32.7 17.6 12.6
Atomic Weight 47.2 18.7 10.4
X-Ray Volts 27.917 15.7
Average 30.6% 18.5% 12.4%
Timeline
1881- Simon Newcomb
1938 – Frank Benford
1961 - Roger Pinkham
1992 - Mark Nigrini
From Theory to Application
Roger Pinkham:
Research conducted revealed that Benford’s probabilities are scale invariant.
Dr. Mark Nigrini:
Published a thesis noting that Benford’s Law could be used to detect fraud
because human choices are not random; invented numbers are unlikely to
follow Benford’s Law.
The number 1 occurs as the
leading digit 30.1% of the
time, while larger numbers
occur in the first digit less
frequently.
For example, the number 3879
 3 - first digit
 8 - second digit
 7 - third digit
 9 – fourth digit
Benford’s Law
Benford’s Law Key Facts
 For naturally occurring numbers, the leading digit(s) is (are)
distributed in a specific, non-uniform way.
 While one might think that the number 1 would appear as
the first digit 11 percent of the time, it actually appears
about 30 percent of the time.
 Therefore the number 1 predominates most progressions.
 Scale invariant – works with numbers denominated as
dollars, yen, euros, pesos, rubles, etc.
 Not all data sets are suitable for analysis.
Benford’s Law Defined
Conforming Data Types
• Data set should describe similar data (e.g. town populations)
• Large Data Sets
• Data that has a wide variety in the number of figures e.g.
plenty of values in the hundreds, thousands, tens of
thousands, etc.
• No built-in maximum or minimum values
Some common characteristics of accounting data…
Conforming Data Types - Examples
• Accounts payable transactions
• Credit card transactions
• Customer balances and refunds
• Disbursements
• Inventory prices
• Journal entries
• Loan data
• Purchase orders
• Stock prices, T&E expenses, etc.
Non-Conforming Data Types
• Data where pre-arranged, artificial limits or nos. influenced
by human thought exist i.e. built-in maximum or minimum
values
– Zip codes, telephone nos., YYMM#### as insurance policy no.
– Prices sets at thresholds ($1.99, ATM withdrawals, etc.)
– Airline passenger counts per plane
• Aggregated data
• Data sets with 500 or few transactions
• No transaction recorded
– Theft, kickback, skimming, contract rigging, etc.
Usage of Benford’s Law
• Within a comprehensive Anti-Fraud Program
COSO Framework
Risk
Assessment
Control
Environment
Control
Activities
Information and
Communication
Specify
organizational
objectives
Monitoring
High- Level Usage of Benford’s Law
• Risk-Based Audits
– Planning Phase
 Early warning sign that past data patterns have changed
or abnormal activity
Data Set X represents the first
digit frequency of 10,000 vendor
invoices.
High- Level Usage of Benford’s Law
• Forensic Audits
– Check fraud, bypassing permission limits, improper
payments
• Audit of Financial Statements
– Manipulation of checks, cash on hand, etc.
• Corporate Finance/Company Evaluation
– Examine cash-flow-forecasts for profit centers
Major Digit Tests (using IDEA)
• 1st Digit Test
• 2nd Digit Test
• First two digits
• First three digits
• Last two digits
• Second Order Test
1st & 2nd Digit Tests
1st Digit Test
• High Level Test
• Will only identify the blinding glimpse of the obvious
• Should not be used to select audit samples, as the sample
size will be too large
2nd Digit Test
• Also a high level test
• Used to identify conformity
• Should not be used to select audit samples
First Two Digits Test
• More focused and examines the frequency of the numerical
combinations 10 through 99 on the first two digits of a series
of numbers
• Can be used to select audit targets for preliminary review
Example:
10,000 invoices -- > 2600 invoices
-- > (1.78% + 1.69%) x 10,000
-- > (178 + 169) = 347 invoices
Only examine invoices beginning with the
first two digits 31 and 33.
Source: Using Benford’s Law to Detect Fraud , ACFE
First Three Digits Test
• Highly Focused
• Used to select audit samples
• Tends to identify number duplication
Last Two Digits Test
• Used to identify invented (overused) and rounded numbers
• It is expected that the right-side two digits be distributed
evenly. With 100 possible last two digits numbers (00, 01,
02...., 98, 99), each should occur approximately 1% of the
time.
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New
Jersey
Second Order Test
• Based on the 1st two digits in the data.
• A numeric field is sorted from the smallest to largest
(ordered) and the value differences between each pair of
consecutive records should follow the digit frequencies of
Benford’s Law.
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New
Jersey
Continuous Monitoring Framework
• Automated & Repeatable Analysis
• Input New Analytics with Ease
• Remediation Workflow & Resolution Guidelines
• KPIs (Root Cause Analysis)
Continuous Monitoring Framework
Turn-key Solutions
• P2P
• Purchasing Cards and T&E Monitoring
– Identify transaction policy violations
– Spend, Expense & Vendor profiling
– Identify card issuance processing errors
– Evaluate trends for operational/process improvements
Conclusion
Benford’s Law
• One person invents all the numbers
• Lots of different people have an incentive to manipulate
numbers in the same way
• Useful first step to give us a better understanding of our data
• Need to use Benford’s Law together with other drill down
tests
• Technology enables this faster and easier to produce results
Rohit Kundu
Rohit.kundu@caseware.com
Sunder Gee
Sunder.Gee@ZapConsulting.ca
IDEA Inquiries
salesidea@caseware.com
Q & A

Weitere ähnliche Inhalte

Was ist angesagt?

Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in AccountingMuhammad Qasim
 
Tax evasion a_forensicexpertsviewpoint_gfsu
Tax evasion a_forensicexpertsviewpoint_gfsuTax evasion a_forensicexpertsviewpoint_gfsu
Tax evasion a_forensicexpertsviewpoint_gfsuKartik T. Vayeda & Co.
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudRussell James
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
Detecting and investigating vendor fraud mvw
Detecting and investigating vendor fraud mvwDetecting and investigating vendor fraud mvw
Detecting and investigating vendor fraud mvwCase IQ
 
Cryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorCryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorIlan Alon
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Madoff securities case slides (auditing case)/ Case 1.11 / Presentation for A...
Madoff securities case slides (auditing case)/ Case 1.11 / Presentation for A...Madoff securities case slides (auditing case)/ Case 1.11 / Presentation for A...
Madoff securities case slides (auditing case)/ Case 1.11 / Presentation for A...Akhmadjon (James) Mashrabov
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk AssessmentTahir Abbas
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Fraud Detection Techniques
Fraud Detection TechniquesFraud Detection Techniques
Fraud Detection TechniquesVhena Pilongo
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 
Entire forensic accounting project
Entire forensic accounting projectEntire forensic accounting project
Entire forensic accounting projectavinash mathias
 
Credit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperCredit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperGarvit Burad
 

Was ist angesagt? (20)

Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in Accounting
 
Money laundering by Imad Feneir
Money laundering by Imad FeneirMoney laundering by Imad Feneir
Money laundering by Imad Feneir
 
Tax evasion a_forensicexpertsviewpoint_gfsu
Tax evasion a_forensicexpertsviewpoint_gfsuTax evasion a_forensicexpertsviewpoint_gfsu
Tax evasion a_forensicexpertsviewpoint_gfsu
 
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraudPonzis, Pyramids, and Bubbles: An introduction to financial fraud
Ponzis, Pyramids, and Bubbles: An introduction to financial fraud
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Detecting and investigating vendor fraud mvw
Detecting and investigating vendor fraud mvwDetecting and investigating vendor fraud mvw
Detecting and investigating vendor fraud mvw
 
Cryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorCryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking Sector
 
Red flags fraud
Red flags fraudRed flags fraud
Red flags fraud
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Madoff securities case slides (auditing case)/ Case 1.11 / Presentation for A...
Madoff securities case slides (auditing case)/ Case 1.11 / Presentation for A...Madoff securities case slides (auditing case)/ Case 1.11 / Presentation for A...
Madoff securities case slides (auditing case)/ Case 1.11 / Presentation for A...
 
Fraud analysis
Fraud analysisFraud analysis
Fraud analysis
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Fraud Detection Techniques
Fraud Detection TechniquesFraud Detection Techniques
Fraud Detection Techniques
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
Entire forensic accounting project
Entire forensic accounting projectEntire forensic accounting project
Entire forensic accounting project
 
Credit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperCredit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research Paper
 

Andere mochten auch

Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our ResponsibilitiesJason Lundell
 
Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsCaseWare IDEA
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
Benfords Law
Benfords LawBenfords Law
Benfords LawEd Tobias
 
VAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderVAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderLinkurious
 
Outlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopOutlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopPranab Ghosh
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)Amazon Web Services
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detectionMk Kim
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaData Driven Innovation
 
PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014Sri Ambati
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picaloguest4ea866f
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraudsteinkamps6
 
Continuing professional development this time its personal!
Continuing professional development this time its personal!Continuing professional development this time its personal!
Continuing professional development this time its personal!joedale
 

Andere mochten auch (20)

Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
Benford's law
Benford's lawBenford's law
Benford's law
 
Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred Lyons
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Benfords Law
Benfords LawBenfords Law
Benfords Law
 
VAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing traderVAT fraud detection : the mysterious case of the missing trader
VAT fraud detection : the mysterious case of the missing trader
 
Outlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopOutlier and fraud detection using Hadoop
Outlier and fraud detection using Hadoop
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detection
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
 
Deep Learning for Fraud Detection
Deep Learning for Fraud DetectionDeep Learning for Fraud Detection
Deep Learning for Fraud Detection
 
PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
 
Continuing professional development this time its personal!
Continuing professional development this time its personal!Continuing professional development this time its personal!
Continuing professional development this time its personal!
 

Ähnlich wie Using benford's law for fraud detection and auditing

Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussioneasternman99
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Robert Hillard
 
Nov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYNov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYFay Teplitsky
 
Phone Fraud Detection
Phone Fraud DetectionPhone Fraud Detection
Phone Fraud DetectionSri Kanajan
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna CainKaren Harkavy
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BIJen Stirrup
 
Data analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit ConferenceData analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit ConferenceMatthew Green
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesMensah Sitti
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To KnowRaffa Learning Community
 
10 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt110 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt1Lavante, Inc.
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...emermell
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to KnowRaffa Learning Community
 

Ähnlich wie Using benford's law for fraud detection and auditing (20)

Mathematics ib ia example
Mathematics ib ia exampleMathematics ib ia example
Mathematics ib ia example
 
Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
 
benfords Law
benfords Lawbenfords Law
benfords Law
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
 
Nov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKYNov-Dec INTA -FAY TEPLITSKY
Nov-Dec INTA -FAY TEPLITSKY
 
Phone Fraud Detection
Phone Fraud DetectionPhone Fraud Detection
Phone Fraud Detection
 
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BI
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
 
Data analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit ConferenceData analysis for auditors presented at CA ANZ 2018 Audit Conference
Data analysis for auditors presented at CA ANZ 2018 Audit Conference
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologies
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know
 
10 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt110 ways to identify Accounts Payable fraud Pt1
10 ways to identify Accounts Payable fraud Pt1
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know
 

Mehr von Jim Kaplan CIA CFE

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsJim Kaplan CIA CFE
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) Jim Kaplan CIA CFE
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 

Mehr von Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 

Kürzlich hochgeladen

一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单ewymefz
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?DOT TECH
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJames Polillo
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIAlejandraGmez176757
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsalex933524
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sMAQIB18
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictJack Cole
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxDilipVasan
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesStarCompliance.io
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBAlireza Kamrani
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxStephen266013
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsCEPTES Software Inc
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单enxupq
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单enxupq
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .NABLAS株式会社
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...elinavihriala
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundOppotus
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...correoyaya
 

Kürzlich hochgeladen (20)

一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptx
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 

Using benford's law for fraud detection and auditing

  • 1. Using Benford’s Law for Fraud Detection & Auditing Rohit Kundu, CAATs Expert July 2014
  • 2. • AuditNet® features: • Over 2,000 Reusable Templates, Audit Programs, Questionnaires and Control Matrices • Networking Groups & Online Forums through LinkedIn, Google and Yahoo • Audit Guides, Manuals, and Books on Audit Basics CaseWare Analytics (IDEA) users receive full access to AuditNet templates
  • 3. • Founded in 1988 • An industry leader in providing technology solutions for finance, accounting, governance, risk and audit professionals • Over 400,000 users of our technologies across 130 countries and 16 languages • Customers include Fortune 500 and Global 500 companies • Microsoft Gold Certified Partner CaseWare International
  • 5. • What is Benford’s Law? • Conforming/Non-Conforming Data Types • Practical Applications of Benford’s Law • Major Digit Tests • Demo • Q&A Agenda
  • 6. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Simon Newcomb’s Theory: Frequency of Use of the Different Digits in Natural Numbers “A multi-digit number is more likely to begin with ‘1’ than any other number.” Pg. 40. American Journal of Mathematics, The Johns Hopkins University Press
  • 7. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Frank Benford: • Analyzed 20,229 sets of numbers, including, areas of rivers, baseball averages, atomic weights of atoms, electricity bills, etc. Conclusion Multi digit numbers beginning with 1, 2 or 3 appear more frequently than multi digit numbers beginning with 4, 5, 6, etc.
  • 8. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Data First Digit 1 First Digit 2 First Digit 3 Populations 33.9 20.4 14.2 Batting Averages 32.7 17.6 12.6 Atomic Weight 47.2 18.7 10.4 X-Ray Volts 27.917 15.7 Average 30.6% 18.5% 12.4%
  • 9. Timeline 1881- Simon Newcomb 1938 – Frank Benford 1961 - Roger Pinkham 1992 - Mark Nigrini From Theory to Application Roger Pinkham: Research conducted revealed that Benford’s probabilities are scale invariant. Dr. Mark Nigrini: Published a thesis noting that Benford’s Law could be used to detect fraud because human choices are not random; invented numbers are unlikely to follow Benford’s Law.
  • 10. The number 1 occurs as the leading digit 30.1% of the time, while larger numbers occur in the first digit less frequently. For example, the number 3879  3 - first digit  8 - second digit  7 - third digit  9 – fourth digit Benford’s Law
  • 11. Benford’s Law Key Facts  For naturally occurring numbers, the leading digit(s) is (are) distributed in a specific, non-uniform way.  While one might think that the number 1 would appear as the first digit 11 percent of the time, it actually appears about 30 percent of the time.  Therefore the number 1 predominates most progressions.  Scale invariant – works with numbers denominated as dollars, yen, euros, pesos, rubles, etc.  Not all data sets are suitable for analysis.
  • 13. Conforming Data Types • Data set should describe similar data (e.g. town populations) • Large Data Sets • Data that has a wide variety in the number of figures e.g. plenty of values in the hundreds, thousands, tens of thousands, etc. • No built-in maximum or minimum values Some common characteristics of accounting data…
  • 14. Conforming Data Types - Examples • Accounts payable transactions • Credit card transactions • Customer balances and refunds • Disbursements • Inventory prices • Journal entries • Loan data • Purchase orders • Stock prices, T&E expenses, etc.
  • 15. Non-Conforming Data Types • Data where pre-arranged, artificial limits or nos. influenced by human thought exist i.e. built-in maximum or minimum values – Zip codes, telephone nos., YYMM#### as insurance policy no. – Prices sets at thresholds ($1.99, ATM withdrawals, etc.) – Airline passenger counts per plane • Aggregated data • Data sets with 500 or few transactions • No transaction recorded – Theft, kickback, skimming, contract rigging, etc.
  • 16. Usage of Benford’s Law • Within a comprehensive Anti-Fraud Program COSO Framework Risk Assessment Control Environment Control Activities Information and Communication Specify organizational objectives Monitoring
  • 17. High- Level Usage of Benford’s Law • Risk-Based Audits – Planning Phase  Early warning sign that past data patterns have changed or abnormal activity Data Set X represents the first digit frequency of 10,000 vendor invoices.
  • 18. High- Level Usage of Benford’s Law • Forensic Audits – Check fraud, bypassing permission limits, improper payments • Audit of Financial Statements – Manipulation of checks, cash on hand, etc. • Corporate Finance/Company Evaluation – Examine cash-flow-forecasts for profit centers
  • 19. Major Digit Tests (using IDEA) • 1st Digit Test • 2nd Digit Test • First two digits • First three digits • Last two digits • Second Order Test
  • 20. 1st & 2nd Digit Tests 1st Digit Test • High Level Test • Will only identify the blinding glimpse of the obvious • Should not be used to select audit samples, as the sample size will be too large 2nd Digit Test • Also a high level test • Used to identify conformity • Should not be used to select audit samples
  • 21. First Two Digits Test • More focused and examines the frequency of the numerical combinations 10 through 99 on the first two digits of a series of numbers • Can be used to select audit targets for preliminary review Example: 10,000 invoices -- > 2600 invoices -- > (1.78% + 1.69%) x 10,000 -- > (178 + 169) = 347 invoices Only examine invoices beginning with the first two digits 31 and 33. Source: Using Benford’s Law to Detect Fraud , ACFE
  • 22. First Three Digits Test • Highly Focused • Used to select audit samples • Tends to identify number duplication
  • 23. Last Two Digits Test • Used to identify invented (overused) and rounded numbers • It is expected that the right-side two digits be distributed evenly. With 100 possible last two digits numbers (00, 01, 02...., 98, 99), each should occur approximately 1% of the time. Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 24. Second Order Test • Based on the 1st two digits in the data. • A numeric field is sorted from the smallest to largest (ordered) and the value differences between each pair of consecutive records should follow the digit frequencies of Benford’s Law. Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 25. Continuous Monitoring Framework • Automated & Repeatable Analysis • Input New Analytics with Ease • Remediation Workflow & Resolution Guidelines • KPIs (Root Cause Analysis)
  • 26. Continuous Monitoring Framework Turn-key Solutions • P2P • Purchasing Cards and T&E Monitoring – Identify transaction policy violations – Spend, Expense & Vendor profiling – Identify card issuance processing errors – Evaluate trends for operational/process improvements
  • 27. Conclusion Benford’s Law • One person invents all the numbers • Lots of different people have an incentive to manipulate numbers in the same way • Useful first step to give us a better understanding of our data • Need to use Benford’s Law together with other drill down tests • Technology enables this faster and easier to produce results