|
|
|
|
LEADER |
07547nam a2200745 4500 |
001 |
ocn881387996 |
003 |
OCoLC |
005 |
20170124071236.6 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
140611s2014 nju o 001 0 eng |
010 |
|
|
|a 2014022943
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d OCLCF
|d N$T
|d EBLCP
|d YDXCP
|d DG1
|d DEBSZ
|d CDX
|d RECBK
|d TEFOD
|d VT2
|d DEBBG
|d GrThAP
|
019 |
|
|
|a 897480706
|a 908280500
|
020 |
|
|
|a 9781118779675
|q electronic bk.
|
020 |
|
|
|a 1118779673
|q electronic bk.
|
020 |
|
|
|a 9781118779668
|q electronic bk.
|
020 |
|
|
|a 1118779665
|q electronic bk.
|
020 |
|
|
|z 9781118779651 (hardback)
|
020 |
|
|
|z 9781118936764
|
020 |
|
|
|z 1118936760
|
020 |
|
|
|a 1118779657
|
020 |
|
|
|a 9781118779651
|
028 |
0 |
1 |
|a EB00588401
|b Recorded Books
|
029 |
1 |
|
|a DEBSZ
|b 422929298
|
029 |
1 |
|
|a NZ1
|b 15913243
|
029 |
1 |
|
|a CHVBK
|b 334090954
|
029 |
1 |
|
|a CHBIS
|b 010442262
|
029 |
1 |
|
|a DEBBG
|b BV043625854
|
029 |
1 |
|
|a DEBBG
|b BV043613462
|
029 |
1 |
|
|a DEBBG
|b BV043396902
|
035 |
|
|
|a (OCoLC)881387996
|z (OCoLC)897480706
|z (OCoLC)908280500
|
037 |
|
|
|a 56CECB8B-27A5-44B2-B57C-5109AD322C76
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a HV6691
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
0 |
|a 658.4/73
|2 23
|
084 |
|
|
|a BUS001000
|2 bisacsh
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Gee, Sunder.
|
245 |
1 |
0 |
|a Fraud and fraud detection :
|b a data analytics approach /
|c Sunder Gee.
|
264 |
|
1 |
|a Hoboken :
|b Wiley,
|c 2014.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
0 |
|
|a Wiley corporate F&A series
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a "Detect fraud faster--no matter how well hidden--with IDEA automationFraud and Fraud Detection takes an advanced approach to fraud management, providing step-by-step guidance on automating detection and forensics using CaseWare's IDEA software. The book begins by reviewing the major types of fraud, then details the specific computerized tests that can detect them. Readers will learn to use complex data analysis techniques, including automation scripts, allowing easier and more sensitive detection of anomalies that require further review. The companion website provides access to a demo version of IDEA, along with sample scripts that allow readers to immediately test the procedures from the book.Business systems' electronic databases have grown tremendously with the rise of big data, and will continue to increase at significant rates. Fraudulent transactions are easily hidden in these enormous datasets, but Fraud and Fraud Detection helps readers gain the data analytics skills that can bring these anomalies to light. Step-by-step instruction and practical advice provide the specific abilities that will enhance the audit and investigation process. Readers will learn to: Understand the different areas of fraud and their specific detection methods Identify anomalies and risk areas using computerized techniques Develop a step-by-step plan for detecting fraud through data analytics Utilize IDEA software to automate detection and identification procedures The delineation of detection techniques for each type of fraud makes this book a must-have for students and new fraud prevention professionals, and the step-by-step guidance to automation and complex analytics will prove useful for even experienced examiners. With datasets growing exponentially, increasing both the speed and sensitivity of detection helps fraud professionals stay ahead of the game. Fraud and Fraud Detection is a guide to more efficient, more effective fraud identification"--
|c Provided by publisher.
|
505 |
8 |
|
|a Machine generated contents note: Preface Acknowledgments Chapter 1: Introduction Defining Fraud Anomalies versus Fraud Types of Fraud Assess the Risk of Fraud Conclusion Notes Chapter 2: Fraud Detection Recognizing Fraud Data Mining versus Data Analysis and Analytics Data Analytic Software Anomalies versus Fraud within Data Fraudulent Data Inclusions and Deletions Conclusion Notes Chapter 3: The Data Analysis Cycle Evaluating and Analysis Obtaining Data Files File Format Types Preparation for Data Analysis Arranging and Organizing Data Conclusion Notes Chapter 4: Statistics and Sampling Descriptive Statistics Inferential Statistics Measures of Center Measure of Dispersion Measure of Variability Sampling Conclusion Notes Chapter 5: Data Analytical Tests Benford's Law Number Duplication Test (NDT) Z- Score Relative Size Factor Test (RSF) Same -- Same -- Same Test (SSS) Same -- Same -- Different Test (SSD) Even Amounts Conclusion Notes Chapter 6: Advanced Data Analytical Tests Correlation Trend Analysis GEL -- 1 and GEL -2 Conclusion Note Chapter 7: Skimming and Cash Larceny Skimming Cash Larceny Case Study Conclusion Chapter 8: Billing Schemes Data and Data Familiarization Benford's Law Tests Relative Size Factor Test Z-Score Even Dollar Amounts Same-Same-Same Test Same-Same-Different Test Payments without Purchase Orders Test Length of Time between Invoice and Payment Dates Test Search for Post Office Box Match Employee Address to Supplier Duplicate addresses in Vendor Master Payments to vendors not in Master Gap Detection of Cheque number sequences Conclusion Note Chapter 9: Cheque Tampering Schemes Electronic Payments Fraud Prevention Cheque Tampering Data Analytic Tests Conclusion Chapter 10: Payroll Fraud Data and Data Familiarization Data Analysis The Payroll Register Payroll Master and Commission Tests Conclusion Notes Chapter 11: Expense Reimbursement Schemes Data and Data Analysis Conclusion and Audit Trail Notes Chapter 12: Register Disbursement Schemes False Refunds and Adjustments False Voids Concealment Data Analytic Tests Conclusion Chapter 13: Non-Cash Misappropriations Types of Non-Cash Misappropriations Concealment of Non-Cash Misappropriations Data Analytics Conclusion Chapter 14: Corruption Bribery Tender Schemes Kickbacks, Illegal Gratuities and Extortion Conflict of Interest Data Analytic Tests Concealment Conclusion Chapter 15: Money Laundering The Money Laundering Process Other Money Transfer Systems and New Opportunities Audit Areas and Data Files Conclusion Notes Chapter 16: Zapper Fraud Point of Sales System Case Study Quantifying the Zapped Records Additional POS Data Files to Analyse Missing and Modified Bills The Mark-up Ratios Conclusions and Solutions Notes Chapter 17: Automation and IDEAScript Considerations for Automation Creating IDEAScripts Conclusion Chapter 18: Conclusion Financial Statement Fraud IDEA Features Demonstrated Projects Overview Data Analytics: Final Words Notes About the Companion Website About the Author Index .
|
588 |
|
|
|a Description based on print version record and CIP data provided by publisher.
|
650 |
|
0 |
|a Fraud.
|
650 |
|
0 |
|a Managerial accounting.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS / Accounting / General.
|2 bisacsh
|
650 |
|
7 |
|a Data mining.
|2 fast
|0 (OCoLC)fst00887946
|
650 |
|
7 |
|a Fraud.
|2 fast
|0 (OCoLC)fst00933786
|
650 |
|
7 |
|a Managerial accounting.
|2 fast
|0 (OCoLC)fst01007320
|
655 |
|
4 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Gee, Sunder.
|t Fraud and fraud detection
|d Hoboken : Wiley, 2014
|z 9781118779651
|w (DLC) 2014021352
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781118936764
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|