SlideShare a Scribd company logo
2
Most read
4
Most read
9
Most read
FRAUD DETECTION 
TECHNIQUES
FRAUD DETECTION TECHNIQUES 
• ACL (Audit Command Language) 
ACL was designed as a meta-language for auditors to access data 
stored in various digital formats and to test them comprehensively. In fact, 
many of the problems associated with accessing complex data structures 
have been solved by ACL’s Open Database Connectivity (ODBC) interface. 
• Fraud Profile 
To find the trail in the masses of data, the auditor first develops a 
“fraud profile” that identifies the data characteristics that one would expect 
to find in a specific type of fraud scheme.
Three Common Fraud Schemes: 
 Payments to Fictitious Vendors 
 Payroll Fraud 
 Lapping Accounts Receivable
Payments to Fictitious Vendors 
A preliminary step in this scheme requires the perpetrator to 
create a phony vendor organization and establish it in the victim 
organization’s record as a legitimate supplier. 
The fraud profile describing the false-vendor scheme and the 
audit procedures are described next. 
 Sequential Invoice Numbers 
 Vendors with P.O. Boxes 
 Vendors with Employee Addresses 
 Multiple Companies with the Same Address 
 Invoice Amounts Slightly below the Review Threshold
o Sequential Invoice Numbers 
The audit procedure is to use ACL to sort the records of the 
invoice file by invoice number and vendor number. This will highlight 
records that possess series characteristics, which can then be 
retrieved for further review. 
o Vendors with P.O. Boxes 
The audit procedure is this: Using ACL’s expression builder, 
create a filter to select vendor records from the invoice file that use 
P.O. box addresses.
o Vendors with Employee Addresses 
The audit procedure is to use ACL to join the employee file and the 
invoice file using the address fields as the common key for both files. Only 
records that match should be passed to the resulting combined file. These 
records can then be reviewed further. 
o Multiple Companies with the Same 
Address 
As an audit safeguard, use ACL’s Duplicates command to generate a 
listing of mailing addresses that are common to two or more vendors.
o Invoice Amounts Slightly below the 
Review Threshold 
The audit procedure for this situation is to use ACL’s expression 
builder to create a value range around the control threshold. To highlight 
suspicious activity that warrants further investigation, sort payments records 
that fall within this range by vendor.
Payroll Fraud 
• Test for Excessive Hours Worked 
Use ACL’s Expression Builder to select payroll records that reflect 
excessive hours worked. 
• Test for Duplicate Payments 
Use ACL’s Duplicates function to search payroll records for employees 
with the following characteristics: 
• Same employee number, same name, same address, etc. (duplicate payments) 
• Same name with different mailing addresses 
• Same name with different checking accounts 
• Same name with different Social Security numbers 
• Same mailing address with different employee names 
• Test for Nonexistent Employees 
Use ACL’s Join feature to link the payroll and employee files using 
Employee Number as the common attribute.
Lapping Accounts Receivable 
• Lapping was described earlier in the chapter as the theft of a 
customer’s check received in payment on his account. 
• The Balance Forward Method 
The balance forward method is used extensively for 
consumer accounts. Total sales to customers for the period are 
itemized and billed at the period end. Customers are required to pay 
only a minimum amount off the balance. The rest of the balance, 
plus interest, is carried forward to the next period.
• The Open Invoice Method 
The open invoice method is often used to manage trade accounts 
receivable (sales to other business organizations). Each invoice is recorded 
as a separate item in the invoice file. Checks received from customers are 
usually in payment of individual invoices. Since good credit relations 
between customer and supplier are critical, payments tend to be on time 
and in full. Partial payments resulting in balances carried forward are the 
exception rather than the norm

More Related Content

PDF
Fraud Risk Assessment- detection and prevention- Part- 2,
PDF
ACFE Presentation on Analytics for Fraud Detection and Mitigation
PDF
Cybersecurity Incident Management Powerpoint Presentation Slides
PPTX
Banks and cybersecurity v2
PPTX
Fraud Risk and Control
DOCX
Security Assessment Plan (Template)
PPT
Cyber security awareness training by cyber security infotech(csi)
PPTX
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
Fraud Risk Assessment- detection and prevention- Part- 2,
ACFE Presentation on Analytics for Fraud Detection and Mitigation
Cybersecurity Incident Management Powerpoint Presentation Slides
Banks and cybersecurity v2
Fraud Risk and Control
Security Assessment Plan (Template)
Cyber security awareness training by cyber security infotech(csi)
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment

What's hot (20)

PPT
Audit,fraud detection Using Picalo
PDF
Process Automation Powerpoint Presentation Slides
PDF
Information Security Management System with ISO/IEC 27000:2018
PPTX
PDF
Managing with KPI's and KRI's
PPTX
ISOIEC 42001 AI Management System Slides
PPTX
Information Security Management System in the Banking Sector
PPTX
Fraud Management ppt.pptx
PPTX
Fraud risk management
PPTX
Banking & Lending AI Use Cases
PPTX
Logging, monitoring and auditing
PDF
Building continuous auditing capabilities
PPT
Cyber Security
PDF
Information Security Awareness for everyone
PPTX
Application Security Tools
PPTX
Identifying and Managing Sources of Business Growth
DOCX
The CIA Triad - Assurance on Information Security
PPTX
Continuous Auditing
PDF
Business Email Compromise Scam
PDF
Global Payment Reference Architecture
Audit,fraud detection Using Picalo
Process Automation Powerpoint Presentation Slides
Information Security Management System with ISO/IEC 27000:2018
Managing with KPI's and KRI's
ISOIEC 42001 AI Management System Slides
Information Security Management System in the Banking Sector
Fraud Management ppt.pptx
Fraud risk management
Banking & Lending AI Use Cases
Logging, monitoring and auditing
Building continuous auditing capabilities
Cyber Security
Information Security Awareness for everyone
Application Security Tools
Identifying and Managing Sources of Business Growth
The CIA Triad - Assurance on Information Security
Continuous Auditing
Business Email Compromise Scam
Global Payment Reference Architecture
Ad

Viewers also liked (20)

PPTX
Data Analysis for Audit Training (2016.06)
PPT
internal audit function ans controller's role in investors relation
PPT
Anomaly Detection Petty
PDF
Getting Started Using ACL in Your Next Audit
PDF
Conversion investigation methods
PPTX
ACL Presentation
PPT
Understanding Financial Statement fraud- Forensic Accounting Perspective
PDF
IT Control Objectives for SOX
PDF
Turning internal audit into the data analytics epicenter for your organization
PPTX
Internal Audit
PPT
Auditing sampling presentation
PDF
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
PPTX
Acl ppt
PPTX
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
PDF
7 Keys to Fraud Prevention, Detection and Reporting
PPTX
Fraud in the Banking Sector
PPTX
Advanced cardiac life support(acls)
PDF
Forensic Accounting – How To Uncover Fraud Jan 2012
Data Analysis for Audit Training (2016.06)
internal audit function ans controller's role in investors relation
Anomaly Detection Petty
Getting Started Using ACL in Your Next Audit
Conversion investigation methods
ACL Presentation
Understanding Financial Statement fraud- Forensic Accounting Perspective
IT Control Objectives for SOX
Turning internal audit into the data analytics epicenter for your organization
Internal Audit
Auditing sampling presentation
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
Acl ppt
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
7 Keys to Fraud Prevention, Detection and Reporting
Fraud in the Banking Sector
Advanced cardiac life support(acls)
Forensic Accounting – How To Uncover Fraud Jan 2012
Ad

Similar to Fraud Detection Techniques (20)

PDF
Connections09 Manuel Coello
PDF
Fraud detection guide
PDF
The Southbourne Tax Group: 10 Ways to Identify Accounts Payable Fraud
PDF
10 ways to identify Accounts Payable fraud Pt1
PDF
Fraud Prevention and Internal Controls - A Winning Combination
PDF
Scouting For Fraud - Parag Deodhar
PDF
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
PPT
Dealing with the Fraudulent Customer
PDF
LTE_ACL Best Practices AP
PDF
Whitinger & Company Fraud Seminar
PPTX
Discovering and Preventing Employee Dishonesty and Fraud
PPTX
Chapt ii
PPTX
Chapt II-Acctg Information Systems
PPTX
Chapt ii -Acctg Information systems
PDF
Vendor Management & AP Audit Report - Data Mining & Analytics
DOC
Glosaryoracleapps
PDF
White paper on fraud detection with acl (send afterwards)~9
PDF
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
PPTX
Audit .. 2nd
PDF
Recording Changes in QuickBooks
Connections09 Manuel Coello
Fraud detection guide
The Southbourne Tax Group: 10 Ways to Identify Accounts Payable Fraud
10 ways to identify Accounts Payable fraud Pt1
Fraud Prevention and Internal Controls - A Winning Combination
Scouting For Fraud - Parag Deodhar
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Dealing with the Fraudulent Customer
LTE_ACL Best Practices AP
Whitinger & Company Fraud Seminar
Discovering and Preventing Employee Dishonesty and Fraud
Chapt ii
Chapt II-Acctg Information Systems
Chapt ii -Acctg Information systems
Vendor Management & AP Audit Report - Data Mining & Analytics
Glosaryoracleapps
White paper on fraud detection with acl (send afterwards)~9
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Audit .. 2nd
Recording Changes in QuickBooks

Recently uploaded (20)

PDF
Digital Strategies for Manufacturing Companies
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
top salesforce developer skills in 2025.pdf
PPTX
Essential Infomation Tech presentation.pptx
PDF
AI in Product Development-omnex systems
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
System and Network Administraation Chapter 3
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Digital Strategies for Manufacturing Companies
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Design an Analysis of Algorithms II-SECS-1021-03
Navsoft: AI-Powered Business Solutions & Custom Software Development
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
top salesforce developer skills in 2025.pdf
Essential Infomation Tech presentation.pptx
AI in Product Development-omnex systems
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
How to Migrate SBCGlobal Email to Yahoo Easily
System and Network Administraation Chapter 3
How to Choose the Right IT Partner for Your Business in Malaysia
Which alternative to Crystal Reports is best for small or large businesses.pdf
Operating system designcfffgfgggggggvggggggggg
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
How Creative Agencies Leverage Project Management Software.pdf
Softaken Excel to vCard Converter Software.pdf
PTS Company Brochure 2025 (1).pdf.......
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)

Fraud Detection Techniques

  • 2. FRAUD DETECTION TECHNIQUES • ACL (Audit Command Language) ACL was designed as a meta-language for auditors to access data stored in various digital formats and to test them comprehensively. In fact, many of the problems associated with accessing complex data structures have been solved by ACL’s Open Database Connectivity (ODBC) interface. • Fraud Profile To find the trail in the masses of data, the auditor first develops a “fraud profile” that identifies the data characteristics that one would expect to find in a specific type of fraud scheme.
  • 3. Three Common Fraud Schemes:  Payments to Fictitious Vendors  Payroll Fraud  Lapping Accounts Receivable
  • 4. Payments to Fictitious Vendors A preliminary step in this scheme requires the perpetrator to create a phony vendor organization and establish it in the victim organization’s record as a legitimate supplier. The fraud profile describing the false-vendor scheme and the audit procedures are described next.  Sequential Invoice Numbers  Vendors with P.O. Boxes  Vendors with Employee Addresses  Multiple Companies with the Same Address  Invoice Amounts Slightly below the Review Threshold
  • 5. o Sequential Invoice Numbers The audit procedure is to use ACL to sort the records of the invoice file by invoice number and vendor number. This will highlight records that possess series characteristics, which can then be retrieved for further review. o Vendors with P.O. Boxes The audit procedure is this: Using ACL’s expression builder, create a filter to select vendor records from the invoice file that use P.O. box addresses.
  • 6. o Vendors with Employee Addresses The audit procedure is to use ACL to join the employee file and the invoice file using the address fields as the common key for both files. Only records that match should be passed to the resulting combined file. These records can then be reviewed further. o Multiple Companies with the Same Address As an audit safeguard, use ACL’s Duplicates command to generate a listing of mailing addresses that are common to two or more vendors.
  • 7. o Invoice Amounts Slightly below the Review Threshold The audit procedure for this situation is to use ACL’s expression builder to create a value range around the control threshold. To highlight suspicious activity that warrants further investigation, sort payments records that fall within this range by vendor.
  • 8. Payroll Fraud • Test for Excessive Hours Worked Use ACL’s Expression Builder to select payroll records that reflect excessive hours worked. • Test for Duplicate Payments Use ACL’s Duplicates function to search payroll records for employees with the following characteristics: • Same employee number, same name, same address, etc. (duplicate payments) • Same name with different mailing addresses • Same name with different checking accounts • Same name with different Social Security numbers • Same mailing address with different employee names • Test for Nonexistent Employees Use ACL’s Join feature to link the payroll and employee files using Employee Number as the common attribute.
  • 9. Lapping Accounts Receivable • Lapping was described earlier in the chapter as the theft of a customer’s check received in payment on his account. • The Balance Forward Method The balance forward method is used extensively for consumer accounts. Total sales to customers for the period are itemized and billed at the period end. Customers are required to pay only a minimum amount off the balance. The rest of the balance, plus interest, is carried forward to the next period.
  • 10. • The Open Invoice Method The open invoice method is often used to manage trade accounts receivable (sales to other business organizations). Each invoice is recorded as a separate item in the invoice file. Checks received from customers are usually in payment of individual invoices. Since good credit relations between customer and supplier are critical, payments tend to be on time and in full. Partial payments resulting in balances carried forward are the exception rather than the norm