1 / 9

University of Waterloo - 5 th Symposium on Information Systems Assurance Oct 11 - 13, 2007

University of Waterloo - 5 th Symposium on Information Systems Assurance Oct 11 - 13, 2007. Agenda. Introduction What’s not covered / What is covered Approach and Findings Conclusion. What’s not Covered. A discussion of the mathematical underpinnings. What is Covered.

Download Presentation

University of Waterloo - 5 th Symposium on Information Systems Assurance Oct 11 - 13, 2007

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. University of Waterloo - 5th Symposium on Information Systems AssuranceOct 11 - 13, 2007

  2. Agenda • Introduction • What’s not covered / What is covered • Approach and Findings • Conclusion

  3. What’s not Covered • A discussion of the mathematical underpinnings What is Covered • An evaluation of the paper from a practitioner’s point of view • Using 3 datasets with known fraudulent entries • A practical application from South Africa with demonstrated success • Comments on the paper

  4. Approach and Findings • Applied the concepts of second order tests to 3 datasets: • Extended Warranty Insurance company • Wake County Public School System procurement fraud • Journal entry training data • Results and conclusions of each

  5. Extended Warranty Insurance Co. Fraud

  6. Wake County Public School System - N Carolina- Procurement Fraud

  7. Journal Entry Training Data

  8. South African Example • “Using Benford’s Law To Predict Data Error and Fraud” – Dr, Adrian Saville, Chief Investment Officer, Cannon Asset Managers [www.cannonassets.co.za] • Used Benford’s Law to predict the failure of several listed companies in SA based upon publicly available data • “First, the tool has been used in a dumb and live environment with great success.  By way of example, the tool identified Nedbank’s financials as failing a first order test of Benford’s law.  Nedbank went on to report a series of investments that needed to restated and also had to go to shareholders for recapitalization.  The implication for investors was costly.  Further, the tool we employ identified two of South Africa’s large gold miners – JCI and Randgold – as producing questionable results and so steered us away from these companies as investment candidates.”

  9. Conclusion • When looking at the second order test results alone it is not immediately evident that fraud exists in the first two datasets • More research and guidance is needed to aid the practitioner • There is no doubt that Benford Analysis is useful and is providing competitive advantage to many organizations

More Related