Exam 2 Flashcards

1
Q

Data-driven fraud detection

A

using data, usually through the mining of those data, to identify patterns, anomolies, etc. to find possible fraud symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accounting errors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Statistical analysis

A

is a component of data analytics. Statistical analysis involves collecting and scrutinizing every data sample in a set of items from which samples can be drawn. A sample, in statistics, is a representative selection drawn from a total population

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Open Database Connectivity (ODBC)

A

A connector between the front-end analysis and the back-end corporate database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data warehouse

A

a repository for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Benford’s law

A

the first digit of random data sets will begin with a 1 more often than with a 2, a 2 more often than with a 3, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Analysis

A

the art of analyzing the digits that make up number sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stratification

A

the splitting of complex data sets into groupings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Summarization

A

runs one or more calculations on the subtables to produce a single record representing each subtable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Time trend analysis

A

analysis of prices, quantities, costs, or other values over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fuzzy matching

A

a technique that allows for searches to be performed that will find matches between some text and entries in a database that are less than 100 percent identical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vertical analysis

A

compares numbers in the statement from one period to the next

aka calculates percent of total for each line item and look for anomalies. Compares everything in relation to total income.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Horizontal analysis

A

key financial statement ratios are calculated and changes in these ratios from period to period are compared.

aka time trend analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of ratios:

A
  • Gross Margin Ratio
  • A/R Turnover Ratio
  • Profit Margin
  • Current Ratio
  • Quick Ratio
  • Net Profit Margin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 6 data analysis steps?

A
  1. Understand the Business
  2. Identify possible frauds that could exist
  3. Catalog possible fraud symptoms
  4. Use technology to gather data about symptoms
  5. Analyze results
  6. Investigate Symptoms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is the most important step in data analysis?

A

Catalog Possible Fraud Symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Types of Fraud Symptoms:

A

Accounting Errors, Internal Control Weaknesses, Analytical Errors, Extravagant Lifestyles, Unusual Behaviors, and Tips and Complaints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Difference between errors and frauds:

A

Errors are usually carried throughout the data set, so an auditor can usually see errors using a statistical sample, but frauds are like a needle in a haystack and may only be present in a couple transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When should you use Benford’s law?

A

Just use it as a sanity check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Methods for Gathering Data:

A
  • Open Database Connectivity
  • Text Import
  • Hosting a Data Warehouse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The most important and often overlooked step:

A

Getting the right data, in the right format, during the right time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the least effective method of financial statement analysis?

A

Comparing account balances from one period to the next.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data analysis techniques:

A
  • Outlier investigation
  • Time trend analysis
  • Fuzzy matching.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Vulnerability Chart

A

a tool that explicitly considers all aspects of the fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Theft act investigation

A

activities that directly investigate the fraud act

26
Q

Surveillance

A

watching or recording the physical facts, acts, and movements, which are part of the theft act of a fraud

27
Q

Invigilation

A

a theft act investigative technique that involves close supervision of suspects during an examination period. (generally 2 week period where you also check before and after that period.)

28
Q

Computer forensics

A

gathering of electronic evidence

29
Q

Predication

A

circumstances to believe fraud has, will, or could occur.

30
Q

CRC Checksum

A

a calculation (using encryption algorithms) based on the contents of a disk or file.

helps keep track of documents, and helps prove the authenticity of a document due to hashed values.

31
Q

Factors to consider when deciding whether or not to investigate fraud:

A

costs, $ amount suspected, predication, and nature of the fraud.

32
Q

Ways to gather physical evidence

A
  • confiscating computers is the most common now
33
Q

Vulnerability Chart components

A
  1. Assets that were taken or are missing
  2. Individuals who had theft opportunities
  3. Theft investigative methods
  4. Concealment possibilities
  5. Conversion Possibilities
  6. Symptoms observed
  7. Pressures of possible perpetrators.
  8. Rationalization of perpetrators
  9. Key internal controls that had to be compromised for the theft to occur.
34
Q

Theft Act Investigation Techniques

A

Surveillance, covert operations, invigilation, obtaining physical evidence, and gathering electronic information.

important to remain unbiased and maintain confidentiality.

35
Q

Three types of surveillance:

A
  1. Stationary/Fixed Point
  2. Moving or tailing
  3. Electronic Surveillance.
36
Q

Various investigative methods

A

Theft Investigative Methods, Conversion Investigative Methods, Concealment Investigative Methods, and Inquiry Investigative Methods.

37
Q

What order to interview people during an investigation?

A

Work from the outside in to narrow in on the suspect.

38
Q

Four steps to seizing and searching computers:

A
  1. Secure
  2. Clone & CRC
  3. Search Manually
  4. Search using automation
39
Q

Chain of custody:

A

a record must be kept of when a document is received and what has happened to it since its receipt

40
Q

Bates Number

A

used by attorneys involved in litigation to track all documents

41
Q

Discovery Sampling:

A

a form of statistical sampling that allows an auditor to generalize and make inferences from the sample to the population

42
Q

Sampling Risk

A

the possibility that the sample will not be representative of the population

43
Q

Nonsampling risk

A

to examine a fraudulent check and not recognize it as such

44
Q

Subpoenas

A

a written order in the name of the court, requiring a witness to submit to a deposition, give testimony at trial, or report to an administrative body

45
Q

Document Examination

A

a specialized form of investigation that applies forensic chemistry, microscopy, light, and photography in making determinations about documents

46
Q

How to reduce sampling risk?

A

Get a larger sample size or take a random sample

47
Q

How to Get Hard-to-Get Documentary Evidence:

A
  1. Subpoena
  2. Search Warrant
  3. Voluntary Consent.
48
Q

Rules which must be observed in obtaining documentary evidence:

A
  1. Proper chain of evidence
  2. Marking of evidence
  3. Organization of evidence
  4. Coordination
  5. Photocopies
49
Q

Four Concealment Investigation Methods:

A
  1. Document Examination
  2. Audits
  3. Electronic Searches
  4. Physical Asset Counts
50
Q

How are most frauds concealed?

A

Manipulating documents, so remember to mark documents and keep track of them.

51
Q

Warning signs that a document should be sent to a document examiner:

A

Alterations or substitutions, Use of two or more colors of ink, abrasions or chemical pen or pencil erasures, disguised or unnatural writings, charred, mutilated, or torn pages, Pencil or carbon marks along the writing lines, Existence of lines made during photocopying, signs of inconsistency or disruption in the continuity of the content, any suspicious appearance or unusual form.

52
Q

Interview

A

a question-and-answer session designed to elicit information

53
Q

Trashing

A

looking through a person’s trash for possible evidence

54
Q

Postal Inspectors

A

investigators who handle major fraud cases involving the use of mail, and they work for the prosecution of offenders who violate postal laws

55
Q

Opting out

A

sending written notice to the bank denying the bank the right to sell someone’s personal bank information

56
Q

Net worth method

A

based on a person’s assets (things owned), liabilities (debts), living expenses, and income.

Used to discover the amount of unknown sources of funds.

57
Q

Why are conversion searches performed?

A
  1. To determine the extent of embezzlement
  2. To gather evidence to be used during interrogation.
58
Q

Federal sources of investigation:

A

Department of defense, Department of Justice, Federal Bureau of Prisons, the IRS, the Secret Service, the Social Security Administration.

59
Q

State Sources of information:

A

State Attorney General, State Prisons, Secretary of State, the DMV, the Department of Vital Statistics, Department of Business Regulation

60
Q

Local Sources of Information:

A

County Land Office and Tax Assessor’s Office, the County Clerk, County Sheriff, Local Courts, and Permit Departments.

61
Q

Credit reporting agencies are of two types:

A
  1. File-based credit-reporting agencies, which develop information from their credit files
  2. Public records and investigative agencies, which gather most of their information through interviews.
62
Q

Types of information credit reporting agencies maintain:

A
  1. Consumer information
  2. Account information
  3. Marketing information
  4. Information on current and former employers.