12.07.2015 Views

acfe fraud prevention check-up - BKD

acfe fraud prevention check-up - BKD

acfe fraud prevention check-up - BKD

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Process ControlsProcess controls specifically designed to detect <strong>fraud</strong>ulent activity, as well as errors, include reconciliations,independent reviews, physical inspections/counts, analyses, and audits. A lack of, or weakness in, preventive controlsincreases the risk of <strong>fraud</strong> and places a greater burden on detective controls. The more significant the <strong>fraud</strong> risk, themore sensitive to occurrence (e.g., use of thresholds, performance frequency, and population tested) the detectivecontrol should be.The nature of <strong>fraud</strong> risks is such that there should be a systematic identification of the types of <strong>fraud</strong> schemesthat can be perpetrated against or within the organization to identify the process controls needed to reduce andcontrol the risks. Each industry is susceptible to different types of <strong>fraud</strong> schemes. The assessment becomes morecumbersome in organizations that span different industries. Organizations with multiple divisions/business unitswill need to first perform a broad organizationwide assessment and then perform more detailed and focusedassessments of individual business units to identify the necessary process controls to detect <strong>fraud</strong>.Proactive Fraud Detection ProceduresIn addition to detective process controls, organizations may be able to use data analysis, continuous auditingtechniques, and other technology tools effectively to detect <strong>fraud</strong>ulent activity. Data analysis uses technology toidentify anomalies, trends, and risk indicators within large populations of transactions. Users of this technologymay be able to drill down into journal entries looking for suspicious transactions occurring at the end of a period orthose that were made in one period and later reversed in the next period. These tools may also allow users to lookfor journal entries posted to revenue or expense accounts that improve net income to meet analysts’ expectationsor incentive compensation targets. Moreover, data analysis allows users to identify relationships among people,organizations, and events.Proactive consideration of how certain <strong>fraud</strong> schemes may result in identifiable types of transactions or trendsenhances an organization’s ability to design and implement effective data analysis. Data analytics can also be usedto cost-effectively ensure the effectiveness of other <strong>fraud</strong> preventive and detective controls.Continuous auditing is the use of data analytics on a continuous or real-time basis, thereby allowing management orauditing to identify and report <strong>fraud</strong>ulent activity more rapidly. For example, a Benford’s Law analysis 39 can examineexpense reports, general ledger accounts, and payroll accounts for unusual transactions, amounts, or patterns ofactivity that may require further analysis. Similarly, continuous monitoring of transactions subject to certain “flags”may promote quicker investigation of higher-risk transactions.Technology tools enhance the ability of management at all levels to detect <strong>fraud</strong>. Data analysis, data mining, anddigital analysis tools can:• Identify hidden relationships among people, organizations, and events.• Identify suspicious transactions.• Assess the effectiveness of internal controls.39Benford’s Law analysis is a process of comparing actual results vs. expected results by looking for unusual transactions that do not fit anexpected pattern.36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!