SlideShare a Scribd company logo
Investigation and Forensic Audit Methodology in
a Computerized Work Environment
Compiled and Presented
By:
Godwin Emmanuel OYEDOKUN
(HND, BSc. Ed, MBA, MTP (SA), ACA, ACIB, FCTI, AMNIM, ACCA-CertIFR, CFA, CFE, CNA, FCFIP, FCE, CICA, ABR, CPFA)
godwinoye@yahoo.com +2348033737184, +2348055863944
Assistant Director (Head) Education, Research & Technical
The Chartered Institute of Taxation of Nigeria
And
Chief Technical Consultant
OGE Professorial Services Ltd
Being a lecture delivered at 2-Day Capacity Building Workshop for the Staff of
Internal Audit Department of Niger Delta Development Commission (NDDC)
Held at Limpopo Spring Hotel, Aba Road, Port-Harcourt, Rivers State
on March 6 - 7, 2015
Organized by Gexim Nigeria Limited
2
3
The Facilitator- “Nemo Dat Quod Non Habet”
Godwin Emmanuel Oyedokun, HND, BSc.Ed, MBA, MSc., MTP (SA), ACA, FCTI, ACIB, AMNIM, CAN, FCFIP, CICA, CFA,CFE, CPFA, ABR,
CertIFR
Assistant Director (Head) – Education, Research & Technical Directorate of The Chartered Institute
of Taxation of Nigeria (CITN)
Godwin is an Experience Certified Fraud Examiner, Chartered Accountant, Chartered Tax Professional,
Certified Forensic Accountant, Chartered Banker, Chartered Manager, Insolvency Practitioner, and Financial
Analyst of good repute.
He also holds a Certificate in International Financial Reporting (CertIFR) of Association of Certified
Chartered Accountant (ACCA)
He is a seasoned professional who is currently serving as an Advisory Council Member of Association of
Fraud Examiner (ACFE), Austin, USA, and Vice President of Nigeria Chapter of same Association
Godwin is a leader in Forensic Accounting and Fraud Investigation, he is a sought after intellectual, who has
presented over 35 technical papers in various Training/Seminars on Forensic Accounting, Fraud
Investigation, Internal Audit & Control, Risk Management, IFRS, ICT, Strategic Management, Finance &
Accounting related subjects. He is also an Examiner to The Chartered Institute of Bankers of Nigeria (CIBN)
on “Introduction to Financial Accounting (FA)” and “Information Communication Technology (ICT)”
He has been trained on Forensic Accounting, Accountancy and Fraud Investigation and other Finance &
Accounting related courses, in Ghana, Senegal, Liberia, Cote d’Ivore, Canada- Toronto, at some States in
United State of American and in Nigeria including Lagos Business School of Pan Atlantic University.
He was the Assistant Director (Head) – Finance & ICT of The Chartered Institute of Taxation of Nigeria
(CITN).
He is the Chief Technical Consultant to OGE & CO Professional Services Ltd. (www.ogecops.com) and A &
D Forensic Consults Ltd. Nigeria (www.adforensicconsults.com).
This presentation will cover the following major sub topics :
• Concept of Investigations
• Forensic Investigations
• Forensic Audit Investigation Methodology
• Forensic Audit and the Internal Auditor
• Forensic in Computerized Work Environment
• Forensic Investigation & Audit Reporting
• Conclusion
Contents
Oyedokun Godwin Emmanuel
Introduction
 It is not a gaining saying that forensic accounting/audit has taken an important
role in both private and public companies since the birth of the 21st century.
 One can but always remember the avoidable failure of some formerly prominent
public companies like Enron and Tyco in the late 1990s, so also terrorist attacks of
September 11, 2001, contributed immensely to the high demand for forensic
accounting expert that can bring about a new, important and lucrative specialty.
 Forensic accounting procedures target financial and operational fraud, discovery
of hidden assets, and adherence to federal regulations (Pirraglia, nd).
 Forensic Investigation and Forensic Audit are better forensic strategies in
resolving the allegations of fraudulent activities as signs of financial crime can be
initially detected in a variety of ways; by accident, by whistle-blowing, by
auditors, by data mining, by controls and testing, or by the organization's top
management requesting an inspection on the basis of mere suspicion.
 This paper will help the readers in understanding the concept of Investigations,
forensic investigations, forensic audit investigation methodology, forensic audit
and the internal auditor, forensics in computerized work environment, and
forensic investigation & audit reporting.

Concept of Investigations
 Investigation is the act or process of investigating or the condition of being investigated.
 A searching inquiry for ascertaining facts; detailed or careful examination
(dictionary.reference.com).
 Investigation is a vital part of forensic accounting and auditing process but only applied
when the event or transaction is beclouded. It is carried out when lapse has been
established to ascertain who is responsible, the reason for the action including the extent of
damage if any.
 It could be referred to as a detailed verification and clarification of doubt about a
transaction or event.
 It is the search and examination of the particulars of an event to determine the hidden,
unique, or complex facts surrounding the event.
 A deliberate search and review of records in accordance with the laid down and agreed
policies in order to ascertain if and why the keeping of the records resulted in a gap and the
responsible person.
 Investigation is a structured gathering of documentary evidence and testimony to resolve
an allegation of improper activity.
 In most cases, fraud investigations are investigations of white collar crime, which involves
surveillance and careful consideration of complicated financial records.
Types of Investigations
 Fraud Investigation
 A fraud investigation tries to determine whether fraud has taken place and tries
to detect evidence of fraud has occurred.
 Fraud is considered to involve misrepresentation with intent to deceive.
 Most fraud investigations begin with a meeting between the investigator and the
client.
 A good fraud investigator will use this initial information to find more evidence
and more facts.
 A fraud investigator may use surveillance, asset searches, background checks,
employee investigations, business investigations, and other types of methods to
get to the bottom of a case.
 In most cases, fraud investigations are investigations of white collar crime, which
involves surveillance and careful consideration of complicated financial records.
8
Types of Investigations
 Corruption
There are three types of corruption fraud:
1. conflicts of interest,
2. bribery, and
3. extortion.
 In a conflict of interest fraud, the fraudster exerts their influence to
achieve a personal gain which detrimentally affects the company.
 The fraudster may not benefit financially, but rather receives an
undisclosed personal benefit as a result of the situation.
 For example, a manager may approve the expenses of an employee who is
also a personal friend in order to maintain that friendship, even if the
expenses are inaccurate.
 Bribery is when money (or something else of value) is offered in order to
influence a situation.
 Extortion is the opposite of bribery, and happens when money is
demanded (rather than offered) in order to secure a particular outcome.
10
Types of Investigations
 Asset misappropriation
 The common feature is the theft of cash or other assets from the company, for example:
1. Cash theft – the stealing of physical cash, for example petty cash, from the premises of a
company.
2. Fraudulent disbursements – company funds being used to make fraudulent payments.
Common examples include billing schemes, where payments are made to a fictitious
supplier, and payroll schemes, where payments are made to fictitious employees (often
known as ‘ghost employees’).
3. Inventory frauds – the theft of inventory from the company.
4. Misuse of assets – employees using company assets for their own personal interest.
 Financial statement fraud
 This is also known as fraudulent financial reporting, and is a type of fraud that causes a
material misstatement in the financial statements.
 It can include deliberate falsification of accounting records; omission of transactions,
balances or disclosures from the financial statements; or the misapplication of financial
reporting standards.
 This is often carried out with the intention of presenting the financial statements with a
particular bias, for example concealing liabilities in order to improve any analysis of
liquidity and gearing.
Saturday, March 7, 2015 12
Fraud Investigations & Govt. Agencies
Interview and Interrogation
 They are two major techniques in investigation.
 Used to elicit responses from the suspect or accused.
 The investigator (interviewer or interrogator) cannot usurp the power of the
court of competent jurisdiction by pronouncing the suspect or accused guilty.
 An interview is non-accusatory (Fred, John, Joseph, Brian, 2004)
 Interrogation is an art. You can master it through your study and experience.
 A good investigator is not necessarily a good interrogator.
 To be a good interrogator you need to be a good actor and must have an insight of
human psychology.
 Interview is conducted in a cordial atmosphere where a witness is more
comfortable physically and psychologically.
 On the other hand, whenever a person is questioned in an uncomfortable
atmosphere (interrogation room) where he is under the psychological pressure, it
is an interrogation.
 Only when an interrogator overpowers a suspect psychologically, he gets a
confession or the fact of a case which is not possible otherwise (Becca and Jay,
2004).
14
Forensic Audit Investigation Methodology
 Forensic investigation is the utilization of specialized investigative skills in carrying
out an inquiry conducted in such a manner that the outcome will have application
to a court of law.
 Forensic Investigators are to be grounded in accounting, medicine, engineering or
some other discipline.
 Forensic investigation is the examination of evidence regarding an assertion to
determine its correspondence to established criteria carried out in a manner
suitable to the court.
 Fraud/forensic auditors/investigators could approach their
examinations/investigations from both the angels of whether the fraud could have
occurred and whether it could not have occurred (Umeraziz, 2014) viz:
1. Analyzing data which is available
2. Creating a hypothesis based on such data
3. Testing the hypothesis
4. Refining and altering the hypothesis
5. Communicating Results
Fraud Auditors’ Skills
 An effective fraud auditor should know, with some degree of
depth, what fraud is from the following perspectives:
1. Human and individual
2. Organizational, cultural, and motivational
3. Economic/Competitive
4. Social
5. Regulatory, legal, and evidential (how to discern, detect, and
document such frauds)
6. Accounting, audit, and internal control (when, where, and
how fraud is most likely to occur in books of account and in
financial statements)
Fraud Auditors’ Skills
 An effective fraud auditor should be able to do the following competently:
1. Conduct a review of internal controls.
2. Assess the strengths and weaknesses of those controls.
3. Design scenarios of potential fraud losses based on identified weaknesses
in internal controls.
4. Identify questionable and exceptional situations in account balances.
5. Identify questionable and exceptional transactions (too high, too low, too
often, too rare, too much, too little, odd times, odd places, odd people).
6. Distinguish between simple human errors, and omissions in entries and
fraudulent entries (international error, such as recurring small errors
versus unintentional random error and ignorance).
7. Follow the flow of documents that support transactions.
8. Follow the flow of funds into and out of an organization’s account.
9. Search for underlying support documents for questionable transactions.
Fraud Auditors’ Skills
10. Review such documents for peculiarities such as raised amounts; forgery;
counterfeiting; fake billings; invoicing of claims; destruction of data; improper
account classification; irregularities in serial sequences, quantity, pricing,
extensions, and footings; and substitution of copies for original documents.
11. Gather and preserve evidence to corroborate asset losses, fraudulent transactions,
and financial statements.
12. Document and report a fraud loss criminal, civil, or insurance claims.
13. Be aware of management, administrative, and organizational policies, procedures,
and practices.
14. Test the organization’s motivational and ethical climate.
15. The skills of a criminal investigator are in some respects similar to those of an
auditor. An auditor and a detective both seek the truth of or with respect to the
proper accounting of business transactions and the detective/investigator with
respect to the proper (legal) behavior of citizens. Both should have inquisitive
minds and challenge things that appear out of order and out of sequence, such as
odd times, odd places, and odd places – in a word, things that are the opposite of
what one would logically expect.
Thirteen Principles of Fraud Auditing
1. Fraud auditing is unlike financial auditing. It is more a mind-set than a
methodology.
2. Fraud auditors are unlike financial auditors. Fraud auditors focus on exceptions,
oddities, accounting irregularities, and patterns of conduct, not on errors and
omissions.
3. Fraud auditing is learned primarily from experience, not from audit text books or
last year’s work papers. Learning to be a fraud auditor means learning to think
like a thief— “ Where are the weakest links in this chain of internal controls?”
4. From an audit perspective, fraud is intentionally misrepresenting financial facts of
a material nature. From fraud-audit perspective, fraud is an international
misrepresentation of finance facts.
5. Frauds are committed for economic, egocentric, ideological, and psychotic
reasons. Of the four, the economic motive is the most.
6. Fraud tend to encompass the theory structure around the motive, opportunity,
and benefit
7. Fraud is a computerized accounting environment can be committed at any state of
processing---input, throughout, or output. Input frauds (entering false and
fraudulent data) are the most common
Thirteen Principles of Fraud Auditing
8. The most common fraudulent schemes by lower-level employees involve
disbursement (payable, payroll, and benefit and expense claims).
9. The most common fraudulent schemes by higher-level managers involve
“profit smoothing” (deferring expenses, booking sales too early,
overstating inventory).
10. Accounting-type frauds are caused more often by absence of controls
than by loose controls.
11. Fraud incidents are not growing exponentially, but lose are.
12. Accounting frauds are discovered more often by accident than by
financial audit purposes or design. Over 90 percent of financial frauds are
discovered.
13. Fraud prevention is a matter of adequate controls and work environment
that places a high value on personal honesty and fair dealing.
Forensic Audit and the Internal Auditor
 Internal Control
 It is the methods put in place by a company to ensure the integrity of financial and accounting
information, meet operational and profitability targets and transmit management policies
throughout the organization.
 Internal controls work best when they are applied to multiple divisions and deal with the
interactions between the various business departments. No two systems of internal controls
are identical, but many core philosophies regarding financial integrity and accounting
practices have become standard management practices.
 Internal Control according to Business dictionary is Systematic measures (such as reviews,
checks and balances, methods and procedures) instituted by an organization to (1) conduct its
business in an orderly and efficient manner, (2) safeguard its assets and resources, (3) deter
and detect errors, fraud, and theft, (4) ensure accuracy and completeness of its accounting
data, (5) produce reliable and timely financial and management information, and (6) ensure
adherence to its policies and plans.
 Internal control and risk management are fundamental components of good corporate
governance. Good corporate governance means that the board must identify and manage all
risks for a company. In terms of risk management, internal control systems span finance,
operations, compliance and other areas, i.e. all the activities of the company. Controls
attempt to ensure that risks, those factors which stop the achievement of company objectives,
are minimized (Kaplan 2012).
Forensic Audit and the Internal Auditor
 An internal control system (ICS) comprises the whole network of
systems established in an organisation to provide reasonable assurance
that organisational objectives will be achieved.
 The Internal Control System (ICS) consists of a set of rules, procedures
and organizational structures which aim to ensure that corporate strategy
is implemented, achieve effective and efficient corporate processes,
safeguard the value of corporate assets, ensure the reliability and integrity
of accounting and management data and ensure that operations comply
with all existing rules and regulations.
 Internal management control refers to the procedures and policies in
place to ensure that company objectives are achieved.
 It is the control procedures and policies provide the detailed controls
implemented within the company (Kaplan 2012, Unicreditgroup 2012).
Forensic Audit and the Internal Auditor
 Internal Auditing
 Internal Auditing is an independent, objective assurance and consulting activities designed
to add value and improve an organisation’s operation. It help an organization accomplish its
objectives by bringing a systematic, disciplined approach to evaluate and improve the
effectiveness of risk management, control and governance process (IIA, Millichamp and
Taylor, 2008), .
 Internal auditors are different from external auditors because they do not focus solely on
financial statements or financial risks, much of their work is looking at operational or
strategic risks (Millichamp and Taylor, 2008, p 262).
 Internal audits are conducted by employees of a business or by external auditors acting as
subcontractors.
 They are becoming increasingly important because of the development of Corporate
Governance. These differ from statutory audits because the priorities are set by the
management who, to some extent, control the work of internal auditors (Millichamp and
Taylor, 2008).
24
Forensic in Computerized Work Environment
 Computer forensics is the practice of collecting, analysing and reporting on digital
data in a way that is legally admissible. It can be used in the detection and
prevention of crime and in any dispute where evidence is stored digitally. Computer
forensics follows a similar process to other forensic disciplines, and faces similar
issues.
 There are few areas of crime or dispute where computer forensics cannot be
applied. Law enforcement agencies have been among the earliest and heaviest users
of computer forensics and consequently have often been at the forefront of
developments in the field.
 Computers may constitute a ‘scene of a crime’, for example with hacking or denial
of service attacks or they may hold evidence in the form of emails, internet history,
documents or other files relevant to crimes such as murder, kidnap, fraud and drug
trafficking.
 It is not just the content of emails, documents and other files which may be of
interest to investigators but also the ‘metadata’ associated with those files. A
computer forensic examination may reveal when a document first appeared on a
computer, when it was last edited, when it was last saved or printed and which user
carried out these actions.
Stages of computer forensic examination
 Computer forensic examination process could be
divided into six stages, presented in their usual
chronological order.
 Readiness
 Evaluation
 Collection
 Analysis
 Presentation
 Review
Issues facing computer forensics
 The issues facing computer forensics examiners can be broken down into
three broad categories: technical, legal and administrative.

 Technical issues
 Encryption
 Increasing storage space
 New technologies
 Anti-forensics
 Legal issues
 Administrative issues
 Accepted standards
 Fit to practice
Forensic Investigation & Audit Reporting
 Forensic accountants/auditors should be familiar with the
issues of attorney work product while preparing their reports,
analyses, and notes.
 He added that forensic accountants must bear in mind that
almost everything involved in the process, including their
drafts and notes, may be subject to discovery by the opposing
party.
 Scrupulous caution is advised whenever forensic accountants
undertake an engagement (Renick, 2007).
Conclusion
 Increasingly, as various parties perceive the value of such evidence, grounded as it is
in "accounting facts," forensic accountants are called upon to play important
peremptive roles (as of right, without cause), offering independent assurance in
such diverse areas as audit committee advisory services, merger and underwriting
due diligence, investment analyst research, and enterprise risk management.
 The validation and enhancement of the body of knowledge (the models and
methodologies) relating to the evidentiary value of accounting data, within a strict
legal framework, is the raison d'être of the Journal of Forensic Accounting.
 Forensic accounting techniques are useful in prevention, detection, and deterrence
in the area of fraud, money laundering, investigations, crime and terrorist
financing.
 These techniques includes, investigative skills, audit skills, legal skill etc.
 It is now clear that audit, investigation and forensic accounting are much related
but they cannot be used interchangeably.
Conclusion
 It is hereby recommended that all would be forensic accountants/investigators,
fraud/forensic auditors, statutory auditors, and investigative accountants, should
be well equipped with forensic accounting techniques in obtaining admissible
evidence suitable for litigation purposes.
 Forensic accountants are currently in great demand, with the public need for
honesty, fairness and transparency in reporting increasing exponentially.
 These forensic accountants need accounting, finance, law, investigative and
research skills to identify, interpret, communicate and prevent fraud.
 As more and more companies look for forensic accountants and professional
organizations offer certifications in the area, it is becoming evident that the
forensic accountant has a skill set that is very different from an auditor or a
financial accountant.
Thank you
 See the complete paper for the references
References & Further Reading

More Related Content

PPT
Letter Of Credit
PPSX
Forensic Auditing Show
PDF
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
PPT
Vouching and verfication
PPTX
Vouching
PPTX
Role and responsibilities of auditor
PDF
Ebook audit case study
PPTX
Audit Programme: Concept, Types, Functions, Advantages & Disadvantages
Letter Of Credit
Forensic Auditing Show
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
Vouching and verfication
Vouching
Role and responsibilities of auditor
Ebook audit case study
Audit Programme: Concept, Types, Functions, Advantages & Disadvantages

What's hot (20)

PPTX
Forensic audit
PPTX
Unit 2 Preparations Before Auditing
PPTX
Cross cheques And Endorsement
PPTX
9. audit evidence
PPTX
General Overview of forensic accounting and forensic audit
PPTX
Auditing Chapter III --
PPTX
Chapter 7 -Internal check
PPTX
AML Sanctions Presentation
PPSX
Electronic fund transfer
PPTX
Chapter 1 -introduction to auditing
PDF
CAAT - Data Analysis and Audit Techniques
PDF
Payment settlement act
PPSX
Payment of cheques chapter 1
PPT
Letter of credit
PPTX
Forensic audit ppt
PPTX
Forensic accounting ppt (2)
PPTX
Collecting banker
PPTX
Core banking solution
PPTX
Bills discounting
PDF
FORENSIC AUDIT
 
Forensic audit
Unit 2 Preparations Before Auditing
Cross cheques And Endorsement
9. audit evidence
General Overview of forensic accounting and forensic audit
Auditing Chapter III --
Chapter 7 -Internal check
AML Sanctions Presentation
Electronic fund transfer
Chapter 1 -introduction to auditing
CAAT - Data Analysis and Audit Techniques
Payment settlement act
Payment of cheques chapter 1
Letter of credit
Forensic audit ppt
Forensic accounting ppt (2)
Collecting banker
Core banking solution
Bills discounting
FORENSIC AUDIT
 
Ad

Viewers also liked (17)

PPTX
PPT
Forense Digital - Conceitos e Técnicas
PDF
Palestra Forense Digital
PDF
Trabalho SASI
PPTX
Excel as a potent forensic accounting tool
PPTX
OBJECTIVES OF SITE INVESTIGATION BASED ON BS 5930 (1981)
DOCX
E discovery2
PPT
ClaudiaPosterPresentation
PPTX
Computer forensic investigation
PDF
Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01
PPT
How really to prepare for a credit card compromise (PCI) forensics investigat...
PPTX
The secret to professional investigations
PDF
Trabalho De SASI
PDF
POC2 - Bernardo M. R.
PDF
Auditoria em sistemas linux - LinuxCon Brazil 2011
PDF
Arch Linux – Simplesmente Linux
PPTX
Data mining and Forensic Audit
Forense Digital - Conceitos e Técnicas
Palestra Forense Digital
Trabalho SASI
Excel as a potent forensic accounting tool
OBJECTIVES OF SITE INVESTIGATION BASED ON BS 5930 (1981)
E discovery2
ClaudiaPosterPresentation
Computer forensic investigation
Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01
How really to prepare for a credit card compromise (PCI) forensics investigat...
The secret to professional investigations
Trabalho De SASI
POC2 - Bernardo M. R.
Auditoria em sistemas linux - LinuxCon Brazil 2011
Arch Linux – Simplesmente Linux
Data mining and Forensic Audit
Ad

Similar to Investigation and forensic audit in a computerized work environment (20)

PDF
Understanding forensic investigation process by G. E. Oyedokun
PPT
Managing the Risk of Fraud Investigation
PPTX
Forensic Accounting in Brief
PPTX
Case study on forensic audit
PDF
Audit, investigation & forensic accounting: Exploring the nexus
PPTX
Kenya AMC Presentation 2
PPTX
Kenya AMC Presentation 1
PDF
Subject Forensic AccountngAs we move forward, and computer te.pdf
PPTX
Introduction to Forensic Accounting, Fraud Investigation and Fraud Examination
PDF
Impact of Provision of Litigation Supports through Forensic Investigations on...
PDF
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
PPTX
Accountants in Forensic and Investigative Accounting
PPTX
Forensic Audit.pptx
PDF
FORENSIC AUDIT.pdf hhhhdhdhdhdhdhddhddhddhhdd
PPTX
Best practices in conducting Financial Investigations
PPTX
Forensic Audit Procedures
PPTX
Setting up Fraud Investigation Practice Prof. Oyedokun.pptx
DOCX
Discussion #1Based on authoritative sources (including peer revi.docx
PPTX
NECO Forensic Audit Raising the Bar of Internal Audit - Prof Oyedokun.pptx
PPTX
Application of Forensic Accounting Skills and Detection of Financial Crimes i...
Understanding forensic investigation process by G. E. Oyedokun
Managing the Risk of Fraud Investigation
Forensic Accounting in Brief
Case study on forensic audit
Audit, investigation & forensic accounting: Exploring the nexus
Kenya AMC Presentation 2
Kenya AMC Presentation 1
Subject Forensic AccountngAs we move forward, and computer te.pdf
Introduction to Forensic Accounting, Fraud Investigation and Fraud Examination
Impact of Provision of Litigation Supports through Forensic Investigations on...
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
Accountants in Forensic and Investigative Accounting
Forensic Audit.pptx
FORENSIC AUDIT.pdf hhhhdhdhdhdhdhddhddhddhhdd
Best practices in conducting Financial Investigations
Forensic Audit Procedures
Setting up Fraud Investigation Practice Prof. Oyedokun.pptx
Discussion #1Based on authoritative sources (including peer revi.docx
NECO Forensic Audit Raising the Bar of Internal Audit - Prof Oyedokun.pptx
Application of Forensic Accounting Skills and Detection of Financial Crimes i...

More from Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR (20)

PPTX
Introduction to IFRS and Pension Accounting Framework - Prof Oyedokun.pptx
PPTX
Best Practices for a Sustainable Town and Gown Partnership - Prof Oyedokun.pptx
PPTX
The Future of Tax Education in Nigeria Bridging Academic Excellence with Prac...
PPTX
LASU The Future of Accounting and Taxation in a Global Dynamic Economy - Prof...
PPTX
RCCG Fathers Nurturing Resilience and Shaping Futures -Prof Oyedokun.pptx
PPTX
ACFE Zambia Effective Fraud Reporting and Whistleblowing Mechanisms Protectin...
PPTX
CITN Abuja- Fiscal Transformation Embracing the 2024 Tax Reforms Bills- Prof ...
PPTX
ICMA Integrating the Informal and Gig Sectors- Prof Oyedokun.pptx
PPTX
OGE Lecture 4 Intl Tax and Transfer Pricing -Prof Oyedokun.pptx
PPTX
OGE Lecture 3 Transfer Pricing - Prof Oyedokun.pptx
PPTX
OGE Lecture 2 Transfer Pricing - Prof Oyedokun.pptx
PPTX
CFBC Impact of Faith Based Education on Economic Development - Prof Oyedokun....
PPTX
OGE Lecture 1 International Taxation and Transfer Pricing - Prof Oyedokun.pptx
PPTX
PAFA The Role of Tax Planning in Forensic Accounting and Compliance Assurance...
PPTX
PAFA IESBAs New Tax Planning Standard - Prof Oyedokun.pptx
PPTX
CERI 4 Competent and Transparent Institutional FundsRevenue Management - Prof...
PPTX
CERI 3 Improved Institutional Fiscal Transparecy- Roles of Financial Experts ...
PPTX
CERI 2 Fraud Elements Associated with IPSAS Practice- The way Forward - Prof ...
PPTX
CERI 1 IPSAS Adoption in Africa and Challenges of Technical Advancement - Pro...
PPTX
LEVERAGING AI AND DATA ANALYTICS IN DECISION MAKING.pptx
Introduction to IFRS and Pension Accounting Framework - Prof Oyedokun.pptx
Best Practices for a Sustainable Town and Gown Partnership - Prof Oyedokun.pptx
The Future of Tax Education in Nigeria Bridging Academic Excellence with Prac...
LASU The Future of Accounting and Taxation in a Global Dynamic Economy - Prof...
RCCG Fathers Nurturing Resilience and Shaping Futures -Prof Oyedokun.pptx
ACFE Zambia Effective Fraud Reporting and Whistleblowing Mechanisms Protectin...
CITN Abuja- Fiscal Transformation Embracing the 2024 Tax Reforms Bills- Prof ...
ICMA Integrating the Informal and Gig Sectors- Prof Oyedokun.pptx
OGE Lecture 4 Intl Tax and Transfer Pricing -Prof Oyedokun.pptx
OGE Lecture 3 Transfer Pricing - Prof Oyedokun.pptx
OGE Lecture 2 Transfer Pricing - Prof Oyedokun.pptx
CFBC Impact of Faith Based Education on Economic Development - Prof Oyedokun....
OGE Lecture 1 International Taxation and Transfer Pricing - Prof Oyedokun.pptx
PAFA The Role of Tax Planning in Forensic Accounting and Compliance Assurance...
PAFA IESBAs New Tax Planning Standard - Prof Oyedokun.pptx
CERI 4 Competent and Transparent Institutional FundsRevenue Management - Prof...
CERI 3 Improved Institutional Fiscal Transparecy- Roles of Financial Experts ...
CERI 2 Fraud Elements Associated with IPSAS Practice- The way Forward - Prof ...
CERI 1 IPSAS Adoption in Africa and Challenges of Technical Advancement - Pro...
LEVERAGING AI AND DATA ANALYTICS IN DECISION MAKING.pptx

Recently uploaded (20)

PPTX
Session 14-16. Capital Structure Theories.pptx
PDF
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
PPTX
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
PDF
how_to_earn_50k_monthly_investment_guide.pdf
PDF
Copia de Minimal 3D Technology Consulting Presentation.pdf
PDF
CLIMATE CHANGE AS A THREAT MULTIPLIER: ASSESSING ITS IMPACT ON RESOURCE SCARC...
PDF
way to join Real illuminati agent 0782561496,0756664682
PPTX
4.5.1 Financial Governance_Appropriation & Finance.pptx
PPT
KPMG FA Benefits Report_FINAL_Jan 27_2010.ppt
PDF
ECONOMICS AND ENTREPRENEURS LESSONSS AND
PPTX
The discussion on the Economic in transportation .pptx
PPTX
Session 11-13. Working Capital Management and Cash Budget.pptx
PDF
THE EFFECT OF FOREIGN AID ON ECONOMIC GROWTH IN ETHIOPIA
PPTX
Introduction to Customs (June 2025) v1.pptx
PPTX
How best to drive Metrics, Ratios, and Key Performance Indicators
PDF
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
PDF
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
PPTX
social-studies-subject-for-high-school-globalization.pptx
PDF
discourse-2025-02-building-a-trillion-dollar-dream.pdf
PPTX
Who’s winning the race to be the world’s first trillionaire.pptx
Session 14-16. Capital Structure Theories.pptx
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
how_to_earn_50k_monthly_investment_guide.pdf
Copia de Minimal 3D Technology Consulting Presentation.pdf
CLIMATE CHANGE AS A THREAT MULTIPLIER: ASSESSING ITS IMPACT ON RESOURCE SCARC...
way to join Real illuminati agent 0782561496,0756664682
4.5.1 Financial Governance_Appropriation & Finance.pptx
KPMG FA Benefits Report_FINAL_Jan 27_2010.ppt
ECONOMICS AND ENTREPRENEURS LESSONSS AND
The discussion on the Economic in transportation .pptx
Session 11-13. Working Capital Management and Cash Budget.pptx
THE EFFECT OF FOREIGN AID ON ECONOMIC GROWTH IN ETHIOPIA
Introduction to Customs (June 2025) v1.pptx
How best to drive Metrics, Ratios, and Key Performance Indicators
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
social-studies-subject-for-high-school-globalization.pptx
discourse-2025-02-building-a-trillion-dollar-dream.pdf
Who’s winning the race to be the world’s first trillionaire.pptx

Investigation and forensic audit in a computerized work environment

  • 1. Investigation and Forensic Audit Methodology in a Computerized Work Environment Compiled and Presented By: Godwin Emmanuel OYEDOKUN (HND, BSc. Ed, MBA, MTP (SA), ACA, ACIB, FCTI, AMNIM, ACCA-CertIFR, CFA, CFE, CNA, FCFIP, FCE, CICA, ABR, CPFA) godwinoye@yahoo.com +2348033737184, +2348055863944 Assistant Director (Head) Education, Research & Technical The Chartered Institute of Taxation of Nigeria And Chief Technical Consultant OGE Professorial Services Ltd Being a lecture delivered at 2-Day Capacity Building Workshop for the Staff of Internal Audit Department of Niger Delta Development Commission (NDDC) Held at Limpopo Spring Hotel, Aba Road, Port-Harcourt, Rivers State on March 6 - 7, 2015 Organized by Gexim Nigeria Limited
  • 2. 2
  • 3. 3 The Facilitator- “Nemo Dat Quod Non Habet” Godwin Emmanuel Oyedokun, HND, BSc.Ed, MBA, MSc., MTP (SA), ACA, FCTI, ACIB, AMNIM, CAN, FCFIP, CICA, CFA,CFE, CPFA, ABR, CertIFR Assistant Director (Head) – Education, Research & Technical Directorate of The Chartered Institute of Taxation of Nigeria (CITN) Godwin is an Experience Certified Fraud Examiner, Chartered Accountant, Chartered Tax Professional, Certified Forensic Accountant, Chartered Banker, Chartered Manager, Insolvency Practitioner, and Financial Analyst of good repute. He also holds a Certificate in International Financial Reporting (CertIFR) of Association of Certified Chartered Accountant (ACCA) He is a seasoned professional who is currently serving as an Advisory Council Member of Association of Fraud Examiner (ACFE), Austin, USA, and Vice President of Nigeria Chapter of same Association Godwin is a leader in Forensic Accounting and Fraud Investigation, he is a sought after intellectual, who has presented over 35 technical papers in various Training/Seminars on Forensic Accounting, Fraud Investigation, Internal Audit & Control, Risk Management, IFRS, ICT, Strategic Management, Finance & Accounting related subjects. He is also an Examiner to The Chartered Institute of Bankers of Nigeria (CIBN) on “Introduction to Financial Accounting (FA)” and “Information Communication Technology (ICT)” He has been trained on Forensic Accounting, Accountancy and Fraud Investigation and other Finance & Accounting related courses, in Ghana, Senegal, Liberia, Cote d’Ivore, Canada- Toronto, at some States in United State of American and in Nigeria including Lagos Business School of Pan Atlantic University. He was the Assistant Director (Head) – Finance & ICT of The Chartered Institute of Taxation of Nigeria (CITN). He is the Chief Technical Consultant to OGE & CO Professional Services Ltd. (www.ogecops.com) and A & D Forensic Consults Ltd. Nigeria (www.adforensicconsults.com).
  • 4. This presentation will cover the following major sub topics : • Concept of Investigations • Forensic Investigations • Forensic Audit Investigation Methodology • Forensic Audit and the Internal Auditor • Forensic in Computerized Work Environment • Forensic Investigation & Audit Reporting • Conclusion Contents Oyedokun Godwin Emmanuel
  • 5. Introduction  It is not a gaining saying that forensic accounting/audit has taken an important role in both private and public companies since the birth of the 21st century.  One can but always remember the avoidable failure of some formerly prominent public companies like Enron and Tyco in the late 1990s, so also terrorist attacks of September 11, 2001, contributed immensely to the high demand for forensic accounting expert that can bring about a new, important and lucrative specialty.  Forensic accounting procedures target financial and operational fraud, discovery of hidden assets, and adherence to federal regulations (Pirraglia, nd).  Forensic Investigation and Forensic Audit are better forensic strategies in resolving the allegations of fraudulent activities as signs of financial crime can be initially detected in a variety of ways; by accident, by whistle-blowing, by auditors, by data mining, by controls and testing, or by the organization's top management requesting an inspection on the basis of mere suspicion.  This paper will help the readers in understanding the concept of Investigations, forensic investigations, forensic audit investigation methodology, forensic audit and the internal auditor, forensics in computerized work environment, and forensic investigation & audit reporting. 
  • 6. Concept of Investigations  Investigation is the act or process of investigating or the condition of being investigated.  A searching inquiry for ascertaining facts; detailed or careful examination (dictionary.reference.com).  Investigation is a vital part of forensic accounting and auditing process but only applied when the event or transaction is beclouded. It is carried out when lapse has been established to ascertain who is responsible, the reason for the action including the extent of damage if any.  It could be referred to as a detailed verification and clarification of doubt about a transaction or event.  It is the search and examination of the particulars of an event to determine the hidden, unique, or complex facts surrounding the event.  A deliberate search and review of records in accordance with the laid down and agreed policies in order to ascertain if and why the keeping of the records resulted in a gap and the responsible person.  Investigation is a structured gathering of documentary evidence and testimony to resolve an allegation of improper activity.  In most cases, fraud investigations are investigations of white collar crime, which involves surveillance and careful consideration of complicated financial records.
  • 7. Types of Investigations  Fraud Investigation  A fraud investigation tries to determine whether fraud has taken place and tries to detect evidence of fraud has occurred.  Fraud is considered to involve misrepresentation with intent to deceive.  Most fraud investigations begin with a meeting between the investigator and the client.  A good fraud investigator will use this initial information to find more evidence and more facts.  A fraud investigator may use surveillance, asset searches, background checks, employee investigations, business investigations, and other types of methods to get to the bottom of a case.  In most cases, fraud investigations are investigations of white collar crime, which involves surveillance and careful consideration of complicated financial records.
  • 8. 8
  • 9. Types of Investigations  Corruption There are three types of corruption fraud: 1. conflicts of interest, 2. bribery, and 3. extortion.  In a conflict of interest fraud, the fraudster exerts their influence to achieve a personal gain which detrimentally affects the company.  The fraudster may not benefit financially, but rather receives an undisclosed personal benefit as a result of the situation.  For example, a manager may approve the expenses of an employee who is also a personal friend in order to maintain that friendship, even if the expenses are inaccurate.  Bribery is when money (or something else of value) is offered in order to influence a situation.  Extortion is the opposite of bribery, and happens when money is demanded (rather than offered) in order to secure a particular outcome.
  • 10. 10
  • 11. Types of Investigations  Asset misappropriation  The common feature is the theft of cash or other assets from the company, for example: 1. Cash theft – the stealing of physical cash, for example petty cash, from the premises of a company. 2. Fraudulent disbursements – company funds being used to make fraudulent payments. Common examples include billing schemes, where payments are made to a fictitious supplier, and payroll schemes, where payments are made to fictitious employees (often known as ‘ghost employees’). 3. Inventory frauds – the theft of inventory from the company. 4. Misuse of assets – employees using company assets for their own personal interest.  Financial statement fraud  This is also known as fraudulent financial reporting, and is a type of fraud that causes a material misstatement in the financial statements.  It can include deliberate falsification of accounting records; omission of transactions, balances or disclosures from the financial statements; or the misapplication of financial reporting standards.  This is often carried out with the intention of presenting the financial statements with a particular bias, for example concealing liabilities in order to improve any analysis of liquidity and gearing.
  • 12. Saturday, March 7, 2015 12 Fraud Investigations & Govt. Agencies
  • 13. Interview and Interrogation  They are two major techniques in investigation.  Used to elicit responses from the suspect or accused.  The investigator (interviewer or interrogator) cannot usurp the power of the court of competent jurisdiction by pronouncing the suspect or accused guilty.  An interview is non-accusatory (Fred, John, Joseph, Brian, 2004)  Interrogation is an art. You can master it through your study and experience.  A good investigator is not necessarily a good interrogator.  To be a good interrogator you need to be a good actor and must have an insight of human psychology.  Interview is conducted in a cordial atmosphere where a witness is more comfortable physically and psychologically.  On the other hand, whenever a person is questioned in an uncomfortable atmosphere (interrogation room) where he is under the psychological pressure, it is an interrogation.  Only when an interrogator overpowers a suspect psychologically, he gets a confession or the fact of a case which is not possible otherwise (Becca and Jay, 2004).
  • 14. 14
  • 15. Forensic Audit Investigation Methodology  Forensic investigation is the utilization of specialized investigative skills in carrying out an inquiry conducted in such a manner that the outcome will have application to a court of law.  Forensic Investigators are to be grounded in accounting, medicine, engineering or some other discipline.  Forensic investigation is the examination of evidence regarding an assertion to determine its correspondence to established criteria carried out in a manner suitable to the court.  Fraud/forensic auditors/investigators could approach their examinations/investigations from both the angels of whether the fraud could have occurred and whether it could not have occurred (Umeraziz, 2014) viz: 1. Analyzing data which is available 2. Creating a hypothesis based on such data 3. Testing the hypothesis 4. Refining and altering the hypothesis 5. Communicating Results
  • 16. Fraud Auditors’ Skills  An effective fraud auditor should know, with some degree of depth, what fraud is from the following perspectives: 1. Human and individual 2. Organizational, cultural, and motivational 3. Economic/Competitive 4. Social 5. Regulatory, legal, and evidential (how to discern, detect, and document such frauds) 6. Accounting, audit, and internal control (when, where, and how fraud is most likely to occur in books of account and in financial statements)
  • 17. Fraud Auditors’ Skills  An effective fraud auditor should be able to do the following competently: 1. Conduct a review of internal controls. 2. Assess the strengths and weaknesses of those controls. 3. Design scenarios of potential fraud losses based on identified weaknesses in internal controls. 4. Identify questionable and exceptional situations in account balances. 5. Identify questionable and exceptional transactions (too high, too low, too often, too rare, too much, too little, odd times, odd places, odd people). 6. Distinguish between simple human errors, and omissions in entries and fraudulent entries (international error, such as recurring small errors versus unintentional random error and ignorance). 7. Follow the flow of documents that support transactions. 8. Follow the flow of funds into and out of an organization’s account. 9. Search for underlying support documents for questionable transactions.
  • 18. Fraud Auditors’ Skills 10. Review such documents for peculiarities such as raised amounts; forgery; counterfeiting; fake billings; invoicing of claims; destruction of data; improper account classification; irregularities in serial sequences, quantity, pricing, extensions, and footings; and substitution of copies for original documents. 11. Gather and preserve evidence to corroborate asset losses, fraudulent transactions, and financial statements. 12. Document and report a fraud loss criminal, civil, or insurance claims. 13. Be aware of management, administrative, and organizational policies, procedures, and practices. 14. Test the organization’s motivational and ethical climate. 15. The skills of a criminal investigator are in some respects similar to those of an auditor. An auditor and a detective both seek the truth of or with respect to the proper accounting of business transactions and the detective/investigator with respect to the proper (legal) behavior of citizens. Both should have inquisitive minds and challenge things that appear out of order and out of sequence, such as odd times, odd places, and odd places – in a word, things that are the opposite of what one would logically expect.
  • 19. Thirteen Principles of Fraud Auditing 1. Fraud auditing is unlike financial auditing. It is more a mind-set than a methodology. 2. Fraud auditors are unlike financial auditors. Fraud auditors focus on exceptions, oddities, accounting irregularities, and patterns of conduct, not on errors and omissions. 3. Fraud auditing is learned primarily from experience, not from audit text books or last year’s work papers. Learning to be a fraud auditor means learning to think like a thief— “ Where are the weakest links in this chain of internal controls?” 4. From an audit perspective, fraud is intentionally misrepresenting financial facts of a material nature. From fraud-audit perspective, fraud is an international misrepresentation of finance facts. 5. Frauds are committed for economic, egocentric, ideological, and psychotic reasons. Of the four, the economic motive is the most. 6. Fraud tend to encompass the theory structure around the motive, opportunity, and benefit 7. Fraud is a computerized accounting environment can be committed at any state of processing---input, throughout, or output. Input frauds (entering false and fraudulent data) are the most common
  • 20. Thirteen Principles of Fraud Auditing 8. The most common fraudulent schemes by lower-level employees involve disbursement (payable, payroll, and benefit and expense claims). 9. The most common fraudulent schemes by higher-level managers involve “profit smoothing” (deferring expenses, booking sales too early, overstating inventory). 10. Accounting-type frauds are caused more often by absence of controls than by loose controls. 11. Fraud incidents are not growing exponentially, but lose are. 12. Accounting frauds are discovered more often by accident than by financial audit purposes or design. Over 90 percent of financial frauds are discovered. 13. Fraud prevention is a matter of adequate controls and work environment that places a high value on personal honesty and fair dealing.
  • 21. Forensic Audit and the Internal Auditor  Internal Control  It is the methods put in place by a company to ensure the integrity of financial and accounting information, meet operational and profitability targets and transmit management policies throughout the organization.  Internal controls work best when they are applied to multiple divisions and deal with the interactions between the various business departments. No two systems of internal controls are identical, but many core philosophies regarding financial integrity and accounting practices have become standard management practices.  Internal Control according to Business dictionary is Systematic measures (such as reviews, checks and balances, methods and procedures) instituted by an organization to (1) conduct its business in an orderly and efficient manner, (2) safeguard its assets and resources, (3) deter and detect errors, fraud, and theft, (4) ensure accuracy and completeness of its accounting data, (5) produce reliable and timely financial and management information, and (6) ensure adherence to its policies and plans.  Internal control and risk management are fundamental components of good corporate governance. Good corporate governance means that the board must identify and manage all risks for a company. In terms of risk management, internal control systems span finance, operations, compliance and other areas, i.e. all the activities of the company. Controls attempt to ensure that risks, those factors which stop the achievement of company objectives, are minimized (Kaplan 2012).
  • 22. Forensic Audit and the Internal Auditor  An internal control system (ICS) comprises the whole network of systems established in an organisation to provide reasonable assurance that organisational objectives will be achieved.  The Internal Control System (ICS) consists of a set of rules, procedures and organizational structures which aim to ensure that corporate strategy is implemented, achieve effective and efficient corporate processes, safeguard the value of corporate assets, ensure the reliability and integrity of accounting and management data and ensure that operations comply with all existing rules and regulations.  Internal management control refers to the procedures and policies in place to ensure that company objectives are achieved.  It is the control procedures and policies provide the detailed controls implemented within the company (Kaplan 2012, Unicreditgroup 2012).
  • 23. Forensic Audit and the Internal Auditor  Internal Auditing  Internal Auditing is an independent, objective assurance and consulting activities designed to add value and improve an organisation’s operation. It help an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control and governance process (IIA, Millichamp and Taylor, 2008), .  Internal auditors are different from external auditors because they do not focus solely on financial statements or financial risks, much of their work is looking at operational or strategic risks (Millichamp and Taylor, 2008, p 262).  Internal audits are conducted by employees of a business or by external auditors acting as subcontractors.  They are becoming increasingly important because of the development of Corporate Governance. These differ from statutory audits because the priorities are set by the management who, to some extent, control the work of internal auditors (Millichamp and Taylor, 2008).
  • 24. 24
  • 25. Forensic in Computerized Work Environment  Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines, and faces similar issues.  There are few areas of crime or dispute where computer forensics cannot be applied. Law enforcement agencies have been among the earliest and heaviest users of computer forensics and consequently have often been at the forefront of developments in the field.  Computers may constitute a ‘scene of a crime’, for example with hacking or denial of service attacks or they may hold evidence in the form of emails, internet history, documents or other files relevant to crimes such as murder, kidnap, fraud and drug trafficking.  It is not just the content of emails, documents and other files which may be of interest to investigators but also the ‘metadata’ associated with those files. A computer forensic examination may reveal when a document first appeared on a computer, when it was last edited, when it was last saved or printed and which user carried out these actions.
  • 26. Stages of computer forensic examination  Computer forensic examination process could be divided into six stages, presented in their usual chronological order.  Readiness  Evaluation  Collection  Analysis  Presentation  Review
  • 27. Issues facing computer forensics  The issues facing computer forensics examiners can be broken down into three broad categories: technical, legal and administrative.   Technical issues  Encryption  Increasing storage space  New technologies  Anti-forensics  Legal issues  Administrative issues  Accepted standards  Fit to practice
  • 28. Forensic Investigation & Audit Reporting  Forensic accountants/auditors should be familiar with the issues of attorney work product while preparing their reports, analyses, and notes.  He added that forensic accountants must bear in mind that almost everything involved in the process, including their drafts and notes, may be subject to discovery by the opposing party.  Scrupulous caution is advised whenever forensic accountants undertake an engagement (Renick, 2007).
  • 29. Conclusion  Increasingly, as various parties perceive the value of such evidence, grounded as it is in "accounting facts," forensic accountants are called upon to play important peremptive roles (as of right, without cause), offering independent assurance in such diverse areas as audit committee advisory services, merger and underwriting due diligence, investment analyst research, and enterprise risk management.  The validation and enhancement of the body of knowledge (the models and methodologies) relating to the evidentiary value of accounting data, within a strict legal framework, is the raison d'être of the Journal of Forensic Accounting.  Forensic accounting techniques are useful in prevention, detection, and deterrence in the area of fraud, money laundering, investigations, crime and terrorist financing.  These techniques includes, investigative skills, audit skills, legal skill etc.  It is now clear that audit, investigation and forensic accounting are much related but they cannot be used interchangeably.
  • 30. Conclusion  It is hereby recommended that all would be forensic accountants/investigators, fraud/forensic auditors, statutory auditors, and investigative accountants, should be well equipped with forensic accounting techniques in obtaining admissible evidence suitable for litigation purposes.  Forensic accountants are currently in great demand, with the public need for honesty, fairness and transparency in reporting increasing exponentially.  These forensic accountants need accounting, finance, law, investigative and research skills to identify, interpret, communicate and prevent fraud.  As more and more companies look for forensic accountants and professional organizations offer certifications in the area, it is becoming evident that the forensic accountant has a skill set that is very different from an auditor or a financial accountant.
  • 32.  See the complete paper for the references References & Further Reading