Premium Essay

Fraud Detection

In:

Submitted By aclift1972
Words 1074
Pages 5
We are looking at employee fraud and the identification of the fraud and the classifications. In this case, we are looking at an employee who first paid for a family meal with a company credit card and then submitted the receipt for reimbursement of his business expenses. In my opinion this behavior is fraud. First, the company has already paid for these meals with the co-worker’s family by the employee using his corporate credit card to pay for these meals. The amount of the receipt has no bearing on whether the actions of the co-worker is considered fraud. When you think about all the stories of employee’s embezzling funds from their employer, they will start with small amounts that are barely noticeable and without proper internal controls, these amounts can go unnoticed for years before they are caught. In determining that the behavior is fraudulent, it is our responsibility to report the fraud to upper management, first, because this type of behavior could have been going on for months or years because someone was afraid to report it or they lacked the ethical responsibility to their employer to report it. In the scenario provided, the employee was confronted by the other party who witnessed the expense fraud. At which point the employee claimed it was an error and he did not realize what he had done. The question here is: Was this an error or Fraud?
Fraud is defined as “a generic term, and embraces all the multifarious means which human ingenuity can devise, which are resorted to by one individual” (Albrecht, Albrecht, Albrecht & Zimbelman, 2012, P 6). Errors on the other hand are misinterpretations or mistakes. In the scenario we were provided, I would have to say there was fraud that took place and the employee did not simply make an error in his expense reporting. It is said “there are six symptoms related to employee fraud” (Cottrell

Similar Documents

Premium Essay

Fraud Detection and Deterrance

...millions in tax refund Over the past few years prisoner tax refund fraud has sky rocketed. According to the article - (Prisoners rake in millions from tax fraud, 2013) “In 2010, more than 91,000 inmate returns claimed $759 million in fraudulent refunds.” 1 That figure was more than double from the previous year. How is it a convicted felon who is behind bars still gets to cheat the system by robbing innocent tax payers of billions in tax refunds on an annual basis? This type of white collar crime is easily committed, all that is needed is the use of a computer with internet access and a great deal of time which a prisoner is in no shortage of having. They can educate themselves on how to hack into hundreds of databases that contains people’s personal information including social security numbers. Once that information is gathered they can begin the process of stealing tax refunds they are certainly not due by filing fraudulent income tax forms, sometimes hundreds at a time by using legitimate names and social security numbers, sometimes the names of their inmates, relatives or even people who are deceased. It is the duty of the IRS to fix this problem. This paper will highlight a few cases of inmate tax refund fraud and what measures the IRS has taken and will continue to take in order to protect innocent victims against this type of fraud. Case summaries involving inmate tax refund fraud The following cases are classic examples of how easily criminals in...

Words: 2300 - Pages: 10

Premium Essay

Fraud Detection Paper

...INTRO Fraud has plagued the world of accounting since the establishment of the profession. Fraud can be committed against an individual or a business. In order to identify fraud, an auditor must be able to differentiate between what is considered fraud and what is considered error. Fraud as defined in our textbook as “intentional misstatements that can be classified as fraudulent financial reporting and/or misappropriation of assets.” On the other hand, error is “unintentional misstatements or omissions of amounts or disclosures.” This simply means that fraud and error can have the same affect on a company and its books, the main difference between the two is the intent of the perpetrator. This paper will explore the basic types of fraud, preventing and detecting fraud, an example of a major fraud committed in United States history and the governments reaction to the prevalence of frauds in the 1990s and early 2000s. TYPES OF FRAUD There are three basic types of fraud perpetrated by employees. They are misappropriation of assets, bribery and corruption, and fraudulent financial reporting. Misappropriation of assets is the theft or misuse of assets that belong to a company. Misappropriation of assets is the most common type of fraud; statics show that it has occurred in over 91% of fraud schemes. It is also the simplest type of fraud to understand and commit which might explain its prevalence in many business fraud schemes. Asset misappropriation is also the least expensive...

Words: 1627 - Pages: 7

Premium Essay

The Role of Auditors in Fraud Detection, Prevention and Reporting in Nigeria

...ROLE OF AUDITORS IN FRAUD DETECTION, PREVENTION AND REPORTING IN NIGERIA Ayobami Oluwagbemiga Oyinlola Mr Tai Solarin University of education,Ijagun, Ijebu-Ode, oluwagbemiga@in.com Follow this and additional works at: http://digitalcommons.unl.edu/libphilprac Part of the Library and Information Science Commons Oyinlola, Ayobami Oluwagbemiga Mr, "THE ROLE OF AUDITORS IN FRAUD DETECTION, PREVENTION AND REPORTING IN NIGERIA" (2010). Library Philosophy and Practice (e-journal). Paper 517. http://digitalcommons.unl.edu/libphilprac/517 THE ROLE OF AUDITORS IN FRAUD DETECTION, PREVENTION AND REPORTING IN NIGERIA OYINLOLA OLUWAGBEMIGA oluwagbemiga@in.com Tai Solarin University of Education, Ijagun , Ijebu-ode Ogun State. Abstract This study investigates the role of auditors in the detection, prevention and reporting of fraud. Data were obtained from 184 respondents in Nigeria. The findings revealed that the respondents are very concerned about the problem of fraud. In addition, the respondents placed very high expectation on auditors’ duties on fraud prevention and detection. This perception is in contrast with the stated primary objective of an audit, as stipulated in ISA 200, which merely required auditors to form an opinion on the financial statements, but not of fraud detection. Keywords: Auditors, fraud, detection, prevention Introduction That an auditor has the responsibility for the prevention, detection and reporting of fraud, other illegal acts...

Words: 3964 - Pages: 16

Premium Essay

Real-Time Fraud Detection

...inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis ...

Words: 56858 - Pages: 228

Premium Essay

Business Analytics

...Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems? Mieke Jans, Nadine Lybaert, Koen Vanhoof Abstract Fraud is a million dollar business and it’s increasing every year. The numbers are shocking, all the more because over one third of all frauds are detected by ’chance’ means. The second best detection method is internal control. As a result, it would be advisable to search for improvement of internal control systems. Taking into consideration the promising success stories of companies selling data mining software, along with the positive results of research in this area, we evaluate the use of data mining techniques for the purpose of fraud detection. Are we talking about real success stories, or salesmanship? For answering this, first a theoretical background is given about fraud, internal control, data mining and supervised versus unsupervised learning. Starting from this background, it is interesting to investigate the use of data mining techniques for detection of asset misappropriation, starting from unsupervised data. In this study, procurement fraud stands as an example of asset misappropriation. Data are provided by an international service-sector company. After mapping out the purchasing process, ’hot spots’ are identified, resulting in a series of known frauds and unknown frauds as object of the study. 1 Introduction Fraud is a million dollar business and it is increasing every year. ”45% of companies worldwide have fallen victim...

Words: 6259 - Pages: 26

Premium Essay

The Emereald

...Anatomy of computer accounting frauds A. Seetharaman, M. Senthilvelmurugan and Rajan Periyanayagam Faculty of Management, Multimedia University, Malaysia Keywords Fraud, Corruption, Financial reporting, Whistleblowing, Internal control, Corporate governance Abstract This paper introduces fraud as asset misappropriations (85 per cent of cases), corruption and fraudulent statements. Symptoms include accounting anomalies, lack of internal control environment, lifestyle and behaviour. The most effective tools for fraud detection are internal audit review, specific investigation by management, and whistle-blowing. The paper details the fraud investigation process and the role of auditors as fraud examiners. The correlation of fraud perpetrators’ personality with the size of losses is examined. Personality is analysed into age, gender, position, educational background and collusion. A strong system of internal control is most effective in fraud prevention. Fraud prevention procedures, targeted goals and improvements to system weaknesses feature in the paper. Fraud impacts on accounting transactions in accounts receivable, receipts and disbursements, accounts payable, inventories and fixed assets, and financial reporting. The monetary impact resulting from fraud is analysed by the type of victim and the amount of loss. Internal control and good employment practices prevent fraud and mitigate loss. Computer accounting frauds 1055 Introduction Accounting fraud involves an intentional action...

Words: 8560 - Pages: 35

Premium Essay

Acc 578 Complete Course Acc578 Complete Course

...Discussion "Fraud  "  Please respond to the following: * From the e-Activity, evaluate the cause(s) of the fraud. Recommend a strategy that could have prevented the fraud. Support your recommendation with examples. ACC 578 Week 2 Discussion 1 "Data Analysis and Fraud Investigation" Please respond to the following: * Imagine that you have been hired as a fraud examiner to review the risk of fraud at a major retailer. Analyze the data analysis tools available to you and propose a plan for which tools you will use. Provide a rationale for your plan. ACC 578 Week 2 Discussion 2 "Audit Objectives and Computer Analysis" Please respond to the following: * You have been tasked by your audit manager to develop an audit plan of a major bank.  Propose the key elements of your audit plan and the end result you expect from implementing the audit. Justify the key elements you chose for the plan. * From the e-Activity, analyze the systems the company used and propose a computer analysis plan that would have detected the fraud. Support your analysis with examples.  ACC 578 Week 2 Assignment 1 Fraud Prevention and Detection Policy Due Week 2 and worth 160 points You are a senior accountant at a new start-up information technology company known as Dingwow Inc. You have just recently been hired and the company has charged you with recommending a fraud policy. Use the Internet, Strayer databases, or your text, to research the elements of an effective fraud policy. Write...

Words: 2341 - Pages: 10

Premium Essay

Accounting Fraud

...Effective Accounting Fraud Detection Method         The stacked bar chart exhibits which between manual methods and automated methods is more commonly used and is more effective in detecting accounting frauds, according to the perception of accounting professionals in DLSU. Unexpectedly, majority of the accounting professors perceive (x [mean] = 2.06, σ [standard deviation] = 0.79) the most commonly used accounting fraud detection methods as manual in form. The reason for this is in line with a previous study conducted by Shapiro (2011) which states that it is nearly impossible to eliminate the risks of accounting fraud, for it is generally a manual activity, and not a mere automated activity. In addition, Ms. Catada also asserted that manual methods are more ideal for detecting accounting misrepresentations since they constitute to scrutinizing supporting documents which could only be facilitated through manual checking. However, she also stated that automated accounting fraud detection methods could still be helpful in assisting and easing these manual processes. Based on the survey, the respondents disagreed (x = 2.39, σ = 0.93) to the idea that automated detection methods are more frequently used than manual methods in detecting fictitious sales. According to Ms. Catada, this type of fraud may be detected through bank reconciliation, third party confirmation or supporting documents to verify whether the sale actually occurred. Likewise, for the detection of incorrect valuation...

Words: 4742 - Pages: 19

Premium Essay

Integrated Fraud Management

...Integrated Fraud Management Actimize Integrated Fraud Management solutions deliver real-time, customer-centric fraud prevention that supports a holistic, enterprise-wide fraud management program. Fully integrated channel and line-of-business specific detection solutions that seamlessly share data for true cross-channel fraud management Advanced and comprehensive set of fraud framework services that provide detection, decisioning, and operations capabilities Used by top global banks, such as Bank of America and BB&T, and recognized as Best-In-Class in Enterprise Fraud by CEB TowerGroup. Card Fraud Customer-centric, cross-channel, and cross-product fraud detection covers ATM, PIN and signature POS, and card not present transactions. Remote Banking Cross-channel models for retail online and mobile banking, call center, and IVR channels, to detect fraudulent monetary and non-monetary transactions. Commercial Banking Multi-channel monitoring and analytics for commercial banking transactions (e.g. wires, ACH, payroll) and non-monetary transactions (e.g. template creation, transaction approval) with user, account, and company-level profiling. Deposit Fraud Best practice rules and analytics for detection of suspicious incoming funds via electronic transactions and checks, to address schemes such as kiting and bust out fraud. Employee Fraud Proven rules and analytics, combined with proactive investigation tools...

Words: 426 - Pages: 2

Premium Essay

Acc 578 Course Career Path Begins / Tutorialrank.Com

...ACC 578 Assignment Data Analysis and Fraud Investigation For more course tutorials visit www.tutorialrank.com "Data Analysis and Fraud Investigation" Please respond to the following: Imagine that you have been hired as a fraud examiner to review the risk of fraud at a major retailer. Analyze the data analysis tools available to you and propose a plan for which tools you will use. Provide a rationale for your plan. Your company’s management suspects that fraud has been committed. You have been tasked by your company management to develop a fraud investigation plan related to this suspected fraud. Develop a strategy to implement a plan and propose what your plan will accomplish "Audit Objectives and Computer Analysis" Please respond to the following: You have been tasked by your audit manager to develop an audit plan of a major bank. Propose the key elements of your audit plan and the end result you expect from implementing the audit. Justify the key elements you chose for the plan. From the e-Activity, analyze the systems the company used and propose a computer analysis plan that would have detected the fraud. Support your analysis with examples. "Fraud Detection Techniques" Please respond to the following: You suspect that the payroll manager is stealing from the company. Construct a plan that would reveal the theft, and recommend techniques that could be used to expose the fraud and also to prevent future payroll fraud. Support your plan with examples. You are...

Words: 561 - Pages: 3

Premium Essay

Report to Nations

...REPORT TO THE NATIONS O N O C C U PAT I O N A L F R A U D A N D A B U S E 2012 GLOBAL FRAUD STUDY Letter from the President & CEO More than 15 years ago, the ACFE’s founder and Chairman, Dr. Joseph T. Wells, CFE, CPA, conceptualized a groundbreaking research project to study the costs, methodologies and perpetrators of fraud within organizations. The result was the 1996 publication of the ACFE’s first Report to the Nation on Occupational Fraud and Abuse. Since then, we have released six additional Reports that have each expanded our knowledge and understanding of the tremendous financial impact occupational fraud and abuse has on businesses and organizations. We are proud to say that the information contained in the original Report and its successors has become the most authoritative and widely quoted body of research on occupational fraud. The data presented in our 2012 Report is based on 1,388 cases of occupational fraud that were reported by the Certified Fraud Examiners (CFEs) who investigated them. These offenses occurred in nearly 100 countries on six continents, offering readers a view into the global nature of occupational fraud. As in previous years, what is perhaps most striking about the data we gathered is how consistent the patterns of fraud are around the globe and over time. We believe this consistency reaffirms the value of our research efforts and the reliability of our findings as truly representative of the characteristics of occupational fraudsters...

Words: 5423 - Pages: 22

Premium Essay

Fraud Terms

...• ACFE= Association of Certified Fraud Examiners; conducts comprehensive fraud studies; Report to the Nation on Occupational Fraud & Abuse • Fraud - deception that includes: a representation, about a material point, which is false, and intentionally or recklessly so, which is believed, and acted upon by the victim to the victim’s damage. Fraud is an act of dishonesty with the intention to deceive or cover the truth to gain an advantage. Most critical element: confidence. Fraud can be classified as (in terms of organization): against or on behalf of • Occupational fraud - use of one’s occupation for personnel enrichment through deliberate misuse or misapplication of the employing org’s resources or assets. Categories: Asset misappropriation (steal asset), f.s fraud (manipulate f.s), Corruption scheme (misuse connections). • Employee embezzlement-can be: direct (e.g: asset misappropriation, making dummy company and making employer pay for goods not actually delivered) (from perpetrator to employer); or indirect (corruption, taking bribes from outside) (3rd party involved) • Management fraud- aka financial statement fraud; involves top management’s deceptive manipulation of f.s.; more inclusive • Investment scam-consumer fraud: Ponzi scheme, telemarketing, identity theft, money scam, advance fee scam, letter of credit fraud, etc. • Vendor fraud-overcharge, send inferior goods, charge for goods not shipped; • Customer fraud-not pay, shoplift; • Miscellaneous¬-other ...

Words: 1542 - Pages: 7

Premium Essay

Internal Control System

...which has a crucial role to play in the economic development of a nation is now being characterized by macro economic instability, slow growth in real economic activities, corruption and the risk of fraud. Fraud, which is the major reason for setting up on internal control system, has become a great pain in the neck of many Nigerian bank managers. It has also become an unfortunate staple in Nigeria’s international reputation. Fraud is really eating deep into the Nigerian banking system and that any bank with a weak internal control system, is dangerously exposed to bank fraud. The CBN reported that cases of attempted fraud and forgery in banks, as at half-year 2007 have surpassed what was recorded for the whole year 2006. The CBN half-year report for 2007, revealed a total of 741 cases of attempted fraud and forgery, involving 5.4 billion, $35,406.1, 150 Euros were reported as at June, 2007. In 2006, 1,193 cases were reported involving 4.6 billion, $1.8 million and 14,389.7 pound sterling. The CBN also reported that the backward development was attributable to weaknesses in the internal control systems of the banks. This has clearly pointed the picture of how fraud has penetrated in the financial strength of Nigerian Banks. In a nut-shell, the damage which this menace, called fraud has done to the banks is innumerable and needs urgent attention. Therefore, the attempt to put an end to this economic degradation, gave rise to the topic of this research study the impact of...

Words: 5108 - Pages: 21

Free Essay

Acct 571: Computer Fraud Case

...| Computer Fraud | | By | [Type the author name] | 9/14/2013 | DeVry University’s Keller Graduate School of Management | A University of Oklahoma student was charged with computer fraud on May 16, 2013 by the Cleveland County District Court. The University of Oklahoma student, Roja Osman Hamad, is accused of improperly changing his grades. Roja Hamad now faces five counts of computer fraud. Mr. Hamad was a former student employee of the university’s information technology department. This is where Mr. Hamad was able to access the university’s computer system to change six faculty member’s passwords without the faculty member’s permission. University official’s state, Roja Hamad broke into the university’s computer system and changed his grades. Roja Hamad fits the majority of the profile of the average fraud perpetrator. According to the ACFE, the average fraud perpetrator has no prior fraud charges or convictions and is more likely to be male rather than female. The ACFE states that the offender is commonly between the ages of 31-45. Even though Mr. Hamad is only 24 years old, he possessed the knowledge to commit the fraud. Since Roja Hamad was a student employee of the university, he was probably a trusted employee. As a trusted employee of the University, this gave Hamad an opportunity to perpetuate the fraud. Lack of proper internal controls, failure to enforce controls, and incompetent management personnel enabled Hamad to commit the fraud. The three...

Words: 1093 - Pages: 5

Premium Essay

Fraud Risk Assessment

...The focus on fraud from a business perspective has significantly increased over the last decade. Every business, company or entity is subject to fraud risk; there is no immunity when it comes to fraud. There has been much legislation passed by the government and many new guidelines required by different accounting agencies. The Implementation or addition of an internal audit department has been wide spread. External audit independence, corporate governance and most recently the use of a fraud risk assessment have been a few recent developments of such new legislation and rules set forth. Businesses as well as the public were skeptical of the changes but admitted something had to be done. “The fraud triangle, developed by Donald R. Cressey, tells us that there are three interrelated elements that enable someone to commit fraud: the non-sharable financial need that drives a person to want to commit the fraud, the opportunity that enables him to commit the fraud, and the ability to rationalize the fraudulent behavior. The vulnerability that an organization has to those capable of overcoming these three elements is fraud risk,” (Wells, 2011). A fraud risk assessment is a process designed to proactively assess and correct these vulnerabilities to both internal and external fraud to defend against and reduce the chances of fraud. The objective of a fraud risk assessment is to identify and address these vulnerabilities to reduce that risk of fraud. In a 2008 study by the ACFE...

Words: 1260 - Pages: 6