You are on page 1of 32

FraudandForensicAccounting

InaDigitalEnvironment
WhitePaperfor
TheInstitutefor
FraudPrevention
ConanC.Albrecht
MarriottSchoolofManagement
BrighamYoungUniversity
conan@warp.byu.edu
FraudandForensicAccounting
InaDigitalEnvironment
ABSTRACT
Thispaperdiscussesfouraspectsofcomputeraidedfrauddetection thatareof
primaryinteresttofraudinvestigatorsandforensicaccountants:dataminingtechniques
forthedetectionofinternalfraud,ratioanalysisfor thedetectionoffinancialstatement
fraud,theissuessurroundingexternalinformationsources,andcomputerforensicsduring
fraudinvestigations. Itprovidesaninformativebackgroundandthendetailsthecurrent
statusofresearchineacharea.Itdescribeswhatiscurrentlyunknown,anditproposes
futureresearchtopics.
Keywords:Fraud,ComputerForensics,ProactiveFraudDetection,DigitalAccounting
1 INTRODUCTION
Themoderndigitalenvironmentoffersnewopportunitiesforbothperpetrators
andinvestigatorsoffraud.Inmanyways,ithaschangedthewayfraudexaminers
conductinvestigations,themethodsinternalauditorsusetoplanandcompletework,and
theapproachesexternalauditors taketoassessriskandperformaudits.Whilesome
methods,suchasonlineworkingpapers,aremerely computerizedversionsoftraditional
tasks,others,suchasriskanalysisbasedonneuralnetworks, arerevolutionizingthefield.
Manyauditorsandresearchersfindthemselvesworkingamidaneverchanging
workplace,withcomputerbasedmethodsleadingthecharge.
Perhapsthemostdifficultaspecttocomputerbasedtechniquesistheapplication
ofasingletermtoawidevarietyofmethodslikedigitalanalysis,electronicevidence
collection,datamining,andcomputerforensics. Indeed,computerbasedfrauddetection
involvesaplethoraofdifferenttechnologies,methodologies,andgoals.Sometechniques
requireastrongbackgroundincomputerscienceorstatistics,whileothersrequire
understandingofdataminingtechniquesandquerylanguages.
In theauthorsexperience,discussionsaboutcomputerbasedfrauddetection
techniquesinmostaccountingcirclesarerevolvearound theuseof BenfordsLawto
discoverfalseinvoicesorotherfraudulentamountsincorporatedatabases. Analysisof
dataagainstBenfordsdistributionisuseful,butitisonlyoneofmanycomputerbased
frauddetectiontechniquesthatshouldbeusedbyprofessionalsandresearchedby
academics.
Thispaperreviewsthedifferentaspectsofcomputeraidedfrauddetection.In
particular,itdescribeseachtopicalarea,itsresearchtodate,andneededresearchforboth
professionalsandacademics.
1.1 TypesofFraudDetection
Frauditselfcomprisesalargevarietyofactivitiesandincludesbribery,political
corruption,businessandemployeefraud,consumertheft,network hacking,bankruptcy
anddivorcefraud,andidentitytheft.Businessfraudoftencalledoccupationalfraud
isusuallymostinterestingtoaccountingprofessionalsandfacultyandistheprimary
subjectofthispaper(ACFE,2008). Withintheareaofbusinessfraud,manyfindit
helpfultoseparatebetweeninternalandexternalfraud(Albrecht,et.al.,2008). Internal
businessfraudinvolvesschemesagainstacompany(i.e.tostealmoneyfroma
company).Internalfraudincludesschemeslikeemployeeembezzlementandkickback
relationships.Internalfraudisusuallyfoundbyinternalauditorsordedicatedfraud
detectionteamsthrough hotlines,dataminingefforts,andinternalaudits.
Externalbusinessfraud,orfinancialstatementfraud,involvesschemesonbehalf
ofacompany.Thisismostoftendonebymisrepresentationof thefinancialstatementsto
improvecompanyimageandmisleadstockholdersandotherinterestedparties.Common
externalschemesinvolverevenueandinventoryoverstatements,liability
understatements,inadequatedisclosurefraud,andothermanipulationstothefinancial
statementsandcompanyrecords(Wells,2002).
Theactoffraudinvestigationiscomprisedofseveralactivities,includinginitial
discovery,publicrecordsearch,interviewsofvarioustypes,documentrecoveryand
search,legalprosecution,andcomputerforensics.Thetypicalfraudinvestigatoris
heavilyinvolvedwithmanyoftheseactivities,butheorshegenerallyworkswithlegal
counselorinformationsecurityprofessionalsformorespecializedtasks.
Evenwithintherelativelynarrowfieldofcomputerbasedfrauddetection,
significantdifferencesintaskperformanceandknowledgerequirementsexist.For
example,computerforensicsrequiresknowledgeofdiskcloning,operatingsystems,file
andgraphicsformats,andscriptingforautomation.Incontrast,datatheftpreventionand
investigationrequiresknowledgeofdatabases,security,intrusiondetection,hacking
principles,andencryption.
1.2 PaperScope
Thispaperfocusesonfourcentralthemesthatrunthroughthetopicsdescribed
above.Theseareoutlinedasfollows:
1. Dataminingforfraud:Techniquesandmethodologiesfordiscovering
fraudincorporatedatabases.
2. Financialstatementfraud: Ratioanalysisandothermethodsoffinding
financialstatementmanipulation.
3. Externalinformationsources:Informationaboutperpetratorfinancesand
otherdata,usuallyfoundinwebsites.
4. Computerforensics:Investigatingbysiftingthroughcomputerharddrives
andotherinformationdevices.
Thispaperdoesnotcoveranumberofperipheraltopicsthatmightbetermed
computeraidedfrauddetection.ITauditinginvolvesthereviewoftechnicalsystems,
suchasERPapplicationsanddatabases,forrisksandcontrolweaknesses.Computer
aidedauditriskassessmentistheprocessofusingexpertsystems,neural networks,or
othercomputerbasedprogramstoassessvariousauditandinherentrisksduringthe
planningphasesofaudits.ITcontrolandsecurityplanninginvolvesrequirements
definitiononpermissionsandsecurityinacorporatesystems.Evidencecollection
techniquesareusefulinlargefraudcasestheirassociatedsoftwarehouseslargesetsof
documents,data,andotherinformationinfraudinvestigations.Finally,deepforensics
topicssuchasencryptioncrackingandintrusiondetectionarebettersuitedtocomputer
sciencejournals. Theaforementionedtopicsarebeyondthescopeofthispaperandare
notincluded.
1.3 StructureofthePaper
Thispaperprovidesasectionforeachofthefourtopicsnotedabove.Because
thesetopicsareminipapersin theirownright,thesectionsaresplitintothreeareas:a
detailedintroductionanddescriptionofthetopic,aliteraturereviewandcurrentstatus,
andasummaryofareasstillunknownandresearchpossibilities.
2 DATAMININGFORFRAUD
In2002,GeneMorsefoundaround$500milliondebittoaPP&Eaccountat
WorldCom.Hediscoveredtheanomalythroughsearchesinacustomdatawarehousehe
haddevelopedintheEssbasemultidimensionaldatabase.WorldComwouldnotgive
Morseaccesstofullfinancial systems,sohecreatedhisownwarehouseandusedbasic
dataminingtechniquestosearchit.UsingasmallscriptandMicrosoftAccess,Morse
followedtheaccountthroughthefinancialreportingsystemandultimatelydiscovereda
$1.7billionentryof capitalizedlinecostsin2001(Lamoreaux,2007).
TheWorldComfrauddiscovery isoneexampleof usingcomputertechnologyto
searchfullpopulationsofdataforanomalies,trends,andfraud.Traditionalauditinguses
techniqueslikediscovery,stratified,orrandomsamplingtodeterminewhethera
populationcontainserrors(AlbrechtandAlbrecht,2002).Thisapproachworkswell
whenauditorsaresearchingforanomaliesunintentionalerrorsusuallycausedby
weaknessesincontrolsbecauseanomaliesoccuratregularintervalsthroughoutthedata
set.Incontrast,fraudintentionalerrorscausedbyintelligenthumanbeingscanoccur
inonlyafewtransactions.Whileasampleofapopulationcontaininganomaliesshould
berepresentative,asampleofapopulationcontainingfraudmaynotberepresentative.
Assumingafraudisrecordedinonlyafewtransactions,asamplingrateof5percent
resultsina95percentriskthefraudwillnotbesampledandwillbemissed. Fraud
detectionmethodsshouldusefullpopulationswheneverpossible,andsincefull
populationscanbevoluminous,theyalmostalwaysrequirecomputersanddatamining
techniques.
2.1.1 Methodology
Oneoftheassumptionsthatunderlietraditionalauditingmethodsisthepresence
ofanintelligenthumanbeing.Whenanauditorchecksitemsinasample,heorsheis
abletoapplyhumanreasonandcommonsensetotransactions.Fraudinvestigations
oftenstartwiththeauditorconductingaroutineaudittask,lookingatatransaction,and
saying,thatdoesntmakesense. Thisapproachcanbeseenasaninductiveapproach
theauditorinvestigatesfurtherwhenanomaliesarefound.
Dataminingroutinesrunbycomputerdonothavethisinnatesenseof
normality.Queriesandscriptsdoexactlywhattheyareprogrammedtodo.Theydonot
digdeeperunlesstheuserspecificallyprogramsthemtodoso.Toaccommodate this
limitation,thefraudhypothesistestingapproachhasbeenproposed(Albrecht,et.al.,
2000).Thisapproachhasalsobeenlabeledthedeductiveorproactiveapproachtofraud
detectionitinvolvesthefollowingsixstepapproach:
1. Auditorsgainasolidunderstandingofthebusinessprocesses,controls,
andenvironment.Thisunderstandingallowsthemtoproactivelypredict
thefraudsthatmightbeoccurring.
2. Theteambrainstormsthepossiblefraudsthatcouldexistinthe
environmenttheyareauditing.Thismightresultin50potentialschemes.
3. Oncepotentialschemesareidentified,theteamoutlinesthewaysthese
schemeswouldshowupindata.Theseindicators,orredflags,arethe
primaryindicatorsthatthefraudmaybeoccurring.
4. Foreachindicator,theteamsearchescorporatedatabasesusingqueries,
scripts,anddataminingtechniques.Anyanomaloustransactionsare
pulledforfurtherinvestigation.Thiscouldbeseenasasample(albeit
notinthetraditionalsense)thatshouldbelookedatmoreclosely.
5. Auditorsanalyzethequeryresultstodeterminepossibleexplanationsfor
theanomalies,whichcouldbefraud,weakcontrols,orotherreasons.
6. Theteamfollowsuponthoseindicatorsthatmaybecausedbyfraud.
Thesefurtherinvestigationsemployadditionalqueriesortraditional
meanstodeterminethetruecauseoftheanomalies.
Thehypothesistestingapproachhasbeenusedsuccessfullyinseveralcase
studies,includingliquorsales(LoftusandVermeer,2003), universityenvironments
(DailyTarHeel,2007),andhealthcareinIndia(Albrecht,2008).
2.1.2 ContinuousAuditing
Oncecomputerqueriesandscriptsarewritten,continuousauditingispossible.
Ratherthantestingonhistoricaldata(thenormalauditprocess),testscanbeprogrammed
intolivecorporatesystemstoprovidecontinuousmonitoringoftransactions. Continuous
monitoringusinginformationtechnologyhasbeensuccessfullyusedatanumberof
companies(Hermanson,2006).Forafullliteraturereview,seethepaperbyRezaee,et.
al.(2002)which proposesageneralizedapproachtoaudittestingandanalysis.The
methodissimilartothehypothesistestingapproach desecribedearlier.
2.2 CommonTechniques
Thetechniquesusedtoperformdataminingforfraudrangefromsimple
statisticalaveragestocomplexneuralnetworksandclusteranalyses.Thissection
presentssomeofthemorecommontechniquesfoundinliterature.
2.2.1 DigitalAnalysis
In 2000,MarkNigrinipublishedanimportantbookcalledDigitalAnalysis
UsingBenfordsLaw(Nigrini,2000). Although BenfordsLawisnowacenturyold
andwasdiscussedinfraudliterature(Hill,1995BustaandWeinberg,1998Nigrini,
1999)priortothebook,Nigrinisworkintroducedthetechniquetothelargeaudienceof
auditors.
BenfordsLawworksbecausenatureproducesmoresmallthingsthanlarge
things. Therearemoreinsectsthanlargemammals,moresmallhousesthanlargeones,
andmoresmalllakesthanlargebodiesofwater. Similarly,businessesproducemore
transactionswithsmallamountsthanwithlargeamounts.BenfordsLawpredictsthat
amountswillstartwiththedigit1moreoftenthan thedigit9,anditevenprovidesa
mathematicalformuladescribingthelawandpercentages.Thedigit1shouldshowup
about30percentofthetime,whilethedigit9shouldoccurlessthan5percentofthe
time.
Digitalanalysisisattractivebecauseitisdeeplynonintuitiveandintriguing,
simpleenoughtobedescribed(ifnotfullyexplained)eventothosewithoutanyformal
traininginmath(ChoandGaines,2007).Itcanberunondatawithlittleregardto
context.Forexample,whendatafrom acertainvendorareroutinelyoutsidetheexpected
percentages,furtherinvestigationisalmostalwayswarranted.
Theprimary limitationtoBenfordsLawisbusinessdatadonotalwaysfollow
naturalpatterns thereexistalargenumberofreasonsthattransactionsmaynotmatch
BenfordsLaw.Explanationslikerecurringfixedexpenses,unusualbusinesscycles,and
assignedamountsareoftenfound.Theauthorhastaughtdigitalanalysistothousandsof
professionalauditorsintenyearsofaskingparticipantsabouttheirsuccesswithdigital
analysis,onlythreeindividualshavereportedfindingfraudwithBenfordsLaw(others
havereportedthatdigitalanalysiscouldhavebeenusedtofindalreadydiscoveredfrauds,
buthindsightisnotprediction). Insomeways,theauditfieldmayhaveoverestimated
theusefulnessofdigitalanalysis.Butdespiteitslimitations,BenfordsLawremainsone
ofthemostpopulardataminingtechniquesforfraud.
2.2.2 OutlierDetection
Oneoftheprimarymethodsofdetectingfraudisdiscoveringdatavaluesthatare
outsidethenormalcourseofbusiness.Forexample,akickbackschememightbethe
reasonpurchasesfromonevendoraretwiceashighassimilarpurchasesfromanother
vendor.
Thesimplestmethodofoutlierdetectionisthestatisticalzscorecalculation.This
formula,givenas(valuemean)/standarddeviation,providesasimpleandcompact
methodofmeasuringoutliers.Thenumeratorshiftseachpointtoazerobasedscale,and
thedenominatoradjuststhedistributiontoastandarddeviationofone.Oncethedataare
transformedintothisstandardizedscale,generalizedstatementscanbemade.Inthe
authorsexperience,outlierscoresof5,8,oreven12areoftenfoundinrealworlddata.
Attimesthesemaybetheresultofnonnormaldistributions,buteveninthosecases,the
scoreprovidesanindicatortopotentialproblems.
Moreadvancedtechniqueshavebeenusedin specializedareas.Forexample,
creditcardfraudcanbediscoveredbyidentifyingtransactionsthroughbothunsupervised
andsupervisedlearning.BoltonandHand(2001)usedbehavioraloutlierdetectionwith
unsupervisedlearningtodetectabnormalspendingbehavioraswellasincreased
frequencyofuse.Othershaveusedregressionmodels,DiscreteGaussianExponential,
depthbasedtechniques,distancebasedtechniques,andanumberofothertechniquesto
identifyoutliers. TheseresearchstreamscanbefoundinAgyemang,et.al.(2005)and
Kou,et.al.(2004).
2.2.3 Trending
Inaddition tocomparingsameperiodnumbersfromdifferentvendors,
employees,orcustomers,fraudcanbediscoveredbycomparingnumbersovertime.
Becausealmostallperpetratorsaregreedy(Albrecht,2008),fraudincreases
exponentiallyovertime.Auditorscaneasilyspotanincreasingtrendonalinechart
computersarenotneededifonlyoneitemisbeingaudited(oneemployee,onevendor,
etc.).Theneedforautomationisduringtheinitialphaseofafraudinvestigation.If
auditorsdonotknowwhichitemisincreasing,theymustlookthroughthousandsof
graphstodeterminewhichitemrequiresadditionalinvestigation.Trendingmethods
allowthecomputertodeterminewhichtrendsareincreasingsotheauditorcanfocuson
thoseitems.
Oneofthemostbasicmethodsofdetermininganincreasingtrendislinear
regression.Oncethecomputerfitsalinetothedata, theslopeandgoodnessoffit
provideasimplemeasureoftrend.NonlinearregressionandBoxJenkinsanalysis
providemoreadvancedmethodsofmeasuringtrend. StatisticalpackageslikeSASand
SPSSprovidefulltrendingmodulesfortheinterestedauditor.
2.3 AdvancedStatisticalTechniques
Workhasbeendoneinstatisticalandcomputersciencefieldonadvanced
methodsforfrauddetection.ThesemethodsincludeBayesianNetworks,genetic
algorithms,statetransitionanalysis,rulematching,andclusteranalysis.SeeAgyemang,
et.al.(2005)andKou,et.al.(2004)foradetailedreviewoftheseandothermethods.
Thereadershouldnote,though,thatmostoftheseadvancedtechnicalmethodologiesare
notgenerallyusedintypicalbusinesssystems(suchaspayroll,sales,purchasing
databases).Theyaremostoftenusedinhighlyspecializedareaslikecreditcardfraud,
healthcareclaims,andvoterfraud.
2.4 Applications
Whileacademicoutletsgenerallypublishmethodologiesandtechniques,
professionalpublicationshighlightthecommonfraudorienteddataminingplatforms
(Nigrini,1999CoglitoreandMatson,2007 Lehman,2008 SecurityProcedure.com,
2008).ThemostpopularapplicationsaregeneralpurposeauditprogramslikeACLand
IDEA.Specializedfrauddetectionsoftwareismakinganentryintothemarket,with
fraudmodulereleasesfrombothACLandIDEA,fraudcomponentsinSASandSPSS,
andadedicatedfrauddetectionprograminPicalo.
2.5 FutureResearch
Inthepasttenyears,researchershavepublishedmanymethodsandtechniques
forfrauddetection.However,thesetechniquesareeithernotdevelopedsufficiently or
tootechnicalforthetypicalauditor.Researchontechniquesisneededintwoareas.
First,thefieldneedsabetterunderstandingofwhatsimpletechniquesforoutlier
detection,trending,linkanalysis,andfulltextanalysisareusefulforfrauddetection.To
date,onlyBenfordsLawhasseenwideuse,andwhileitisinteresting,itseffectiveness
foractuallyfindingfraudisnotwellprovenespeciallyondiscoveringfraudsthathave
nototherwisebeendiscoveredwithothertechniques.Second,alargebodyofadvanced
statisticalandcomputerscienceliteratureisavailable.Applicationofthesetechniquesto
thefraudareahasbeendoneinafewpapers,butsignificantworkstill remains. The
literatureprovideslittleclarityonwhichtechnologiescanbeusedtodiscoverfraud.
Bothempiricalandcasestudyresearchisneededtodeterminehowthesetechniquescan
besuccessfullyimplemented.
Beyondthetechniquesthemselves,auditorshavelittletrainingincomputer
programming,querylanguages,andstatistics.Inaddition,theydonothavesufficient
timetoperformthesealgorithmsintypicalaudits.Detectletsareonemethodofencasing
theknowledge,routine,andalgorithmintoawizardlikeinterface(Albrecht,2008).
Theymaybeabletosolveboththetrainingandtimeproblem.Developmentofdetectlets
oranothersolutionisneededbeforetheauditfieldcanrealizesuccesswiththese
advancedtechniques.Thisisaprimaryareathatinformationsystemsandtechnically
savvyaccountingresearcherscanaddvaluableknowledgetotheauditfield.
Itisoftensaidthatthepreparationofdataismoredifficultthantheanalysisofit.
Researchisneededintothebesttools,techniques,andmethodologiesthatauditorscan
usetopreparedataforanalysisfromsourcebusinessdatabases. Cutoffpoints,missing
values,abnormaltrends,andotherdifficultiesariseduringpreparation.Oneexciting
prospectistheautomaticconversionofdatabasesfromoneschematoanother(currently
beingworkedonindatabasecircles).Ifprogramscouldautomaticallyinterpretdatabase
columntypesandrelationships,theycouldtransformthedatabasefromanycompany
intoastandardschema.Algorithmswrittentothestandardschemacouldthenberunon
thestandardschemawithoutworryingaboutdifferencesbetweencompaniesand
locations. Thisconversioncouldbethebasisforanofftheshelf,frauddetection
solution.
Finally,manyauditorssimplydonotknowhowtoincorporatedatamininginto
theirwork. SoftwarecompanieslikeACLandIDEAprovideworkbooksthatcanbe
usedincourses,buttheseworkbookshavefewexamplesofdirectfrauddetection
especiallywithadvancedtechniques. Methodologieslikethehypothesistestingapproach
areafirststepin providingmethodologyresearch,butsignificantadditionalresearch
bothempiricalandfieldareneededtovalidateandextendtheexistingmethodologies.
Thesemethodologiescanthenbetaughtinuniversitycoursestofutureauditors.
3 FINANCIALSTATEMENTFRAUD
StatementonAuditingStandards(SAS)No.99,ConsiderationofFraudina
FinancialStatementAudit(AICPA2002),requiresauditorstoassesstheriskthatfraud
maymateriallymisstatefinancialstatements.DespiteSAS99beinganimportant
requirementtowardsincreasedfrauddetection,asurveybyMarczewskiandAkers
(2005)revealedthatCPAsdontanticipatethatSAS99willsubstantiallyincreaseaudit
effectiveness.AnotherstudyfoundthatwhileSAS99increasedauditorresponsibility,
mostauditorshaddifficultyidentifyingfraudanditsrisks(BeasleyandJenkins2003).
Notwithstandingthesedifficulties,failuretodetectfraudulentfinancialreporting
notonlyplacestheauditfirmatrisk,butalsoexposestheauditprofessiontoincreased
publicandgovernmentalcriticism.Cecchini,etal.(2006)presentevidencethatresearch
aidingauditorsinassessingtheriskofmaterialmisstatementduringtheplanningphase
ofanauditcanhelpreduceinstancesoffraudulentreporting.
3.1 RatioAnalysis
Traditionalmethodsforthedetectionoffinancialstatementfraud,suchasvertical
andhorizontalanalysis,tiplines,analysisofrelationshipsbetweenmanagementand
others,comparisonswithindustry,andanalyticalsymptoms,arewelldocumentedin
textbooks(Albrecht,et.al.,2009). Morerecently,researchhasfocusedonratioanalysis
forthedetectionoffinancialstatementfraud.
Ratioanalysisinvolvescalculatingbothtraditionalandnontraditionalfinancial
ratios,suchasaccrualstoassets,assetquality,assetturnover,dayssalesinreceivables,
deferredchargestoassets,depreciation,grossmargin,increaseinintangibles,inventory
growth,leverage,operatingperformancemargin,percentuncollectibles,salesgrowth,
SGEexpense,andworkingcapitalturnover.Sinceratiosstandardizefirmsforsizeand
otherfactors,onewouldexpectfirmswithinanindustrytofollowsimilartrends.
Earlystudiesusestatisticaltechniqueslikeprobitandlogisticregression,while
laterstudieshavebranchedouttoneuralnetworks,classificationschemes,andrule
ensembles.Studiesthatusebothinternalandexternaldatahaveprovenmoresuccessful,
butthegoalofmostoftheresearchistouseonlyexternallyavailabledataforanalysis
(limitingtheresearchtodataavailabletomoststakeholders). Areviewofmanyofthese
studiesfollows.
Inanexploratorystudy,Loebbecke,etal.(1989)refinedanearliermodeldevelopedby
LoebbeckeandWillingham(1988)using77fraudcasesandtestedthemappingsof
variousredflagstocreateclassificationsinthreemainareas:conditions,motivation,and
attitude.Theyfoundatleastonefactorfromeachareapresentin86percentofthefraud
cases.
Hansen,etal.(1996)developedageneralizedqualitativeresponsemodeltoanalyze
managementfraudusingthesetofcasesdevelopedfrominternalsourcesbyLoebbeke,et
al.(1989).Themodelwasinitiallytestedassumingsymmetricmisclassificationcosts
betweentwoclassesoffirms(fraudulentandnonfraudulent).Usingover20cross
validationtrialsoffivepercentholdoutcases,anoverall89.5percentpredictiveaccuracy
wasrealizedbutaccuracyinpredictingfraudwasonly62.8percent.Asecondmodel
adjustedforasymmetriccoststoreflectthegreaterimportanceofpredictingfraud.While
theoverallaccuracydroppedto85.3percenttheaccuracyinpredictingfraudulent
companiesincreasedto88.6percent.Thecorrespondingreductioninpredictionaccuracy
fornonfraudulentfirmswasfrom95.5percentto84.5percent.
GreenandChoi(1997)usedaneuralnetworktoclassifyalargesetoffraudulentand
nonfraudulentdata.Theresearchersusedfiveratios(allowancefordoubtfulaccounts/net
sales,allowancefordoubtfulaccounts/accountsreceivable,netsales/accountsreceivable,
grossmargin/netsales,andaccountsreceivable/totalassets)andthreeaccountvariables
(netsales,accountsreceivable,allowancefordoubtfulaccounts)toidentifyrisk.The
selectionofthesevariablesbiasedtheirresultstowardcertaintypesofrevenuefraudsbut
theirmethodshowedpotentialforneuralnetworksasfraudinvestigativeanddetection
tools.
Eining,etal.(1997)examinedhowthefollowingthreetypesofdecisionaidshelped
auditorsfindfraud:checklists,logisticregressionmodels,andexpertsystems.Theexpert
systemusedaredflagapproachtoidentifyhighriskareasandprovedtobethemost
effectiveofthethree.
SummersandSweeney(1998)investigatedtherelationshipbetweeninsidertrading
andfraudulentcompanies. Usinglogisticregression,aninitialmodelwasdeveloped
basedsolelyonfirmspecificfinancialdata.Overallpredictionaccuracywiththismodel
was60percent,with68percentaccuracyachievedinpredictingfraudulentcompanies.A
secondmodelthatincorporatedbothfirmspecificfinancialdataandinsidertrading
factorswasabletoimproveoverallclassificationaccuracyto67percent,with72percent
accuracyinpredictingfraudulentcompanies.
Beneish(1999)developedaprobitmodelandconsideredseveralquantitativefinancial
variablesforfrauddetection.Fiveoftheeightvariablesinvolvedyeartoyearvariations.
Thestudyconsidereddifferinglevelsofrelativeerrorcost.With40:1asymmetriccosts,
56percentofthemanipulatorswerecorrectlyidentifiedinaholdoutsample.Results
showedthattheDaysReceivableIndexandtheSalesGrowthIndexweremosteffective
inseparatingthemanipulatorsfromthenonmanipulators.Mostoftheratiosusedinour
researchwereadaptedfromthisstudy.
BellandCarcello(2000)constructedalogisticregressionmodeltopredictthe
likelihoodoffraudulentfinancialreporting.Thisanalysisreliedonriskfactorsidentified
asweakinternalcontrolenvironment,rapidcompanygrowth,inadequateorinconsistent
relativeprofitability,managementplacingundueemphasisonmeetingearnings
projections,managementlyingtotheauditorsorbeingoverlyevasive,theownership
status(publicvs.private)oftheentity,andaninteractiontermbetweenaweakcontrol
environmentandanaggressivemanagementattitudetowardfinancialreporting.The
modelwastestedonthesamesampleof77fraudengagementsand305nonfraud
engagementsusedbyHansen,etal.(1996).Fraudwaspredictedwith81percent
accuracy,andnonfraudwasdetectedwith86percentaccuracy.Themodelscoredbetter
thanauditingprofessionalsinthedetectionoffraudandperformedaswellasaudit
professionalsinpredictingnonfraudoutcomes.
Morerecently,researchhasfocusedonratioanalysiswithmoreadvanced
statisticalandcomputersciencemethodsorwithmoreratios.GroveandCook(2004)
testtheviabilityofnewratiosasredflags.Foradetailedreviewofstatisticaltechniques
usedtoanalyzeratios,seePhua,et.al.(2005)andKirkos,et.al.(2007).
3.2 FutureResearch
Comparingfinancialratiosbetweencompanies,industries,andgeneratedmodels
stillrequiresmuchresearch.Todate,themostsuccessfultechniques(usingexternaldata
andholdoutsthroughtheentirelearningprocess)haveachievedonly70percentsuccess.
Since50percentsuccesscanbeachievedwithrandomguessing,moreresearchisneeded
toimprovethemodels.
Severalpotentialareasofimprovementshouldbenoted.First,traditional
financialratios(likeassetturnoveranddayssalesinreceivables)havebeenusedto
differentiatefraudfromnonfraudfirms.Researchintothedevelopmentofnewfraud
specificratiosmightprovideinsightintoformulasthataremoresuccessfulatdetecting
fraud.
Second,mostresearchhascomparedknownfraudfirmsagainstasimilarfirm.
Whatdefinessimilar?Shouldthepairedfirmbeselectedbasedonsimilarrevenues,
profits,assets,orliabilities?Canindustrymodelsbecreatedthatbetterapproximatethe
industry(andcreateabetterpairedfirm)?
Third,thecorrecttimeframeofcomparisonneedsresearch.Isitsufficientto
analyzedatafor5years,ordolongerorshortertermsmakesense? Shouldyearlyor
quarterlyreportsbeused?Thedeterminationofwheretheanomaliesarefoundin
externaldatahasseenconsiderableresearch,butitisstill notwellunderstood.
Fourth,mostresearchonratioanalysisdoesnotapproximatetherealworld.Most
researchmakesonetoonecomparisons,essentiallyassumingthat50percentoffirmsare
fraudulent. Inreality,fraudulentfirmsareprobablylessthanafewpercentofthetotal
numberoffirmsthatreportfinancial statements.Thisdifferencebecomesimportantin
learningalgorithms.Also,thecostsassociatedwithType1andType2errorsmustbe
factoredintomany algorithms.Thecostofmissinganexistingfraudisgenerally
regardedasmuchhigherthanrejectingapotentialclientbecauseitmightbefraudulent
(but,inreality,wasnot),yetmostresearchsimplyassumesa50/50cost.
Finally,whileratioanalysisisthecurrentfocus,entirelydifferentstreamsmay
providebetterresults.Exploratoryresearchintonewmethodsofcombiningpublicly
availablecompanyinformationcouldproveeffective.Intheend,researchmayshowthat
financialstatementsaresimplytoosummarizedforeffectivedataminingforfraud.
However,financialprofessionals,shareholders,andindeed,theentireauditprofession
wouldbeforeverchangedifcomputerbasedresearchproducedareliableandrepeatable
methodofdiscoveringfraudinfinancialstatements.
4 EXTERNALINFORMATIONSOURCES
Inrecentyears,astorehouseofpubliclyavailabledatahasbecomeavailableon
theInternet.Priortothe1990s,investigatorswantingpublicinformationhadtosearch
through recordsatcourthouses,libraries,universities,andpublicrecordsoffices.Many
times,theserecordswereinpaperform,andevenwhentheywereelectronic,thetask
wasdauntingtomostinvestigators.Indeed,searchingeachcountrycourthouseinTexas
meanttravelingthroughthestatetovisitatleast254locations!
CompanieslikeLexisNexishavelongcollectednewsarticles,legaldocuments,
andotherinformation.However,the1990ssawanexplosionofinformationcollecting
bycompanieslikeChoicePoint,Accurint,andLexisNexis.Whiletheinformationhad
alwaysbeenpublic,bringingittogetherintooneplacerepresentedaleapforwardinits
accessibilityitbroughtexternalinformationsearchingintothecomputerorientedfraud
detectionarea.
Searchingforexternalinformation onpeopleandcompaniesbecomesimportant
inatleasttwoareas.First,investigationsthathaveidentifiedkeyindividualscansearch
publicrecordsforinformationonthoseindividuals.Theseindividualsarenormally
identifiedthroughinternaldataminingefforts,anonymoustips,orothermethods.
Second,regulationslikeSarbanesOxleyrequirethatauditorspaycloseattentiontotop
levelmanagement.Externalinformationcanbeusefulindeterminingintoplevel
managementarespendingexcessivelyorotherwiseengaginginactivitiesthatcause
concern.
4.1 AvailableInformation
Fewacademicpapersexistontheavailabilityofexternalinformation.Because
theinformationispublishedbyprivatecompaniesthatcollectthepublicinformationinto
onlinedatabases,professionaloutletsgenerallycarryinformationonproductandcontent
availability(Frost,2004 Cameron,2001). Booksandtextbooksalsoprovidelinksto
websiteswithinformation(Tyberski,2004Albrecht,et.al.,2009).
Thefollowingisasamplingoftheavailableinformationforinvestigatorsonthese
websites.Seetheabovereferencesforafulltreatmentofthesubject.
Incorporationrecords
Propertyandotherassetrecords
Civillawsuits
Criminalrecords
Taxliens
Civiljudgmentrecords
Bankruptcyfilings
Homevalues,loans,neighborcontactinformation
Newsarticles,currentevents
TheinformationstorehouseslikeChoicePointarenottheonlysourceofonline
information.Mapping,satellitephotos,birdseyeviews,andentirestreetviewsare
availablefromGoogleandMicrosoft.DeepwebsearchengineslikeCompletePlanetand
DeepDyveprovideonestopsearchingforsitesthatnormallyrequirelogins(andarethus
notincludedintraditionalsearchengines). Other,specializedservicesexistformost
informationneeds.
4.2 PrivacyIssues
Oneareathathasseenconsiderableresearchistheprivacyissuesraisedbythese
newwebsites.Thenewinformationwebsitesarenotprovidinganyinformationthathad
notbeenpreviouslyavailable.However,bybothbringingtheinformationtogetherinto
oneplaceandbydigitizingpaperrecords,theinformationissignificantlymoreavailable
to thepublic.Inaddition,techniqueslikelinkanalysisandcorrelationscanbedoneon
therecords,effectivelycreatinginformationthatwasnotpreviouslyavailable.Many
worryaboutthesignificantlossofprivacythathasoccurredinrecentdecades(Black,
2002Paletta,2005Lovett, 1955). Complicatingmattersisthefactthatdifferentstates
disagreeabouttheonlineaccesstocourtrecords,makinglegislationdifficult(Swartz,
2004).
Forexample,whenGooglereleasedstreetviewatoolwhichprovidespictoral
viewsofmoststreetsintheUSAtheUSmilitaryaskedittoremoveallpictureswithin
afewmilesofitsbases(TechnologyExpert,2008).Websiteslike
GoogleSightseeing.com(notaffiliatedwithGoogle)publishthemostinteresting,popular,
andsometimesembarrassingandintrusivepicturestakenbyGooglecameras. In2008,
Googlelaunchedasatellitecapableoftakingpicturesatresolutionspreviouslyunknown
toprivateentities(Jones,2008). Finally,GoogleDocs,Gmail,andothercloudbased
servicesgiveincreasingamountsofdatatoasinglecompany. Whilethispaperisnot
proposingaconspiracytheory ortryingtodiscouragetheuseofGoogleservices,the
companyservesasanexampleof thepotentialprivacyconcernsthatisoccurringwithin
privatecompaniesandgovernments. Bothacademicresearchersandprofessionalsare
concernedwiththelossofprivacynewtechnologiesbring(Stafford,2005Samborn,
2002).
Highlightingtherisksofcompilingtoomuchinformationintooneplaceisthe
highlypublicizedChoicePointbreach.In2005,hackersgrabbeddataon163,000
individualsfromChoicePointsdatabases(Swartz,2007Freeman,2006).Whilethe
ChoicePointhackingwasextremelyserious,itiscertainlynottheonlysignificantbreach
successfulhackingattemptsarereportedweekly inthepopularmedia.
4.3 FutureResearch
Littleacademicresearchhasbeendoneonexternalinformationgathering.Most
neededismethodologiesforsearching,compiling,andusingthesedatainfraud
investigations.Mostsourcesonlylisttheavailablesourcesmorestructuredwaysof
workingwiththesedataareneeded.Thesemethodologiescanbeincludedintextbooks
anduniversitycourses.
Therehasbeensomeworkdoneonprivacyissues,especiallybythelawfield.
However,moreresearchisneededonhowtoregulatedataproviders,howtokeep
informationsafe,andwherethelinesofprivacyshouldbedrawn. Asthesewebsites
continuetheirmovetointernationaldata,differencesincountrypoliciesandcultureswill
becomeimportantresearchtopics.
5 COMPUTERFORENSICS
Today,almosteveryfinancialfraudincorporatestheuseofacomputer,whether
thefraudisfalsifyinginvoicesorelectronicmoneylaundering(Smith,2005).Inthecase
offinancialstatementfraud,entriesprobablyexistaselectronicjournalentries,login
recordsfoundinlogfiles,andelectroniccorrespondencebetweeninvolvedindividuals.
Inrecentyears,auditorsfindthemselvesincreasinglyinvolvedinevidencecollection
throughcomputerforensics.
Asitpertainstofrauddetection,computerforensicsistheprocessofimagingdata
forsafekeepingandthensearchingclonedcopiesforevidence(Gavish,2007Dixon,
2005). Perhapsthemostcommon exampleisseizingthecomputerof asuspectfor
analysis. Ingainingaccesstoorauditingthedataonadigitaldevice,computerforensics
canalsoinvolvewhitehat(legal)hacking,passwordandencryptioncracking,key
logging,digital surveillance,andintrusiondetection.
Arguablythemostcommonformofelectronicevidenceisemailcorrespondence.
Whenanindividual sendsanemail,acopyisnormallykeptinatleastfourplaces:onhis
orherworkstation,onthesendingmailserver,onthereceivingmailserver,andonthe
recipientscomputer.Computerforensicsonanylocationshouldprovidethefulltextof
theemail,includinganyattachments.
5.1 ToolsoftheTrade
Aswithexternaldatasources,mostofthewritteninformationaboutcomputer
forensicsiscontainedintextbooksandprofessionaloutlets.Thetwoleadingproducts,
EnCaseandFTK(describedbelow),arematuresoftwaresuites.Bothsoftware
companiesprovidecomprehensivetrainingonforensicsoftwareandtechniques.
Academicoutletsaregenerallyreservedforencryptioncrackingalgorithms,
steganography,hacking,operatingsystemweaknesses,andprotocols.Whiletheseideas
maybeusefulinsomeforensicaudits,theyarebeyondthescopeofthispaper.Theycan
befoundincomputerscience,mathematics,andstatisticalliterature.
5.1.1 ForensicSuites
ThetwoleadingsoftwarepackagesareEnCasebyGuidanceSoftwareandthe
ForensicToolkit(FTK)byAccessData(Kuchta,2001).Thesesuitesprovideshorter
learningcurvesthanprevioussinglepurposeutilitiesandbringagreaternumberof
professionalstothefieldmorequickly.Bothpackagesprovidetaskorientedprocesses
forsecuringandcloningtheharddrive,calculatingmd5 or shachecksums,searchingfor
graphics,andkeywordsearch.
Inrecentyears,Linuxbasedtoolshavebecomepopularasfreealternativestothe
traditionalsuites.Helix,thePenguinSleuth,andSecurityToolsDistributionareLinux
distributionsthatrundirectlyfrom CD,providingcleanenvironmentsforsearchinga
computerwithouttheneedforcloning(Causey,2005).Thesetoolsbootasuspect
computerdirectlytoLinuxandmounttheuserharddrivesinreadonlymode,essentially
bypassingmostpasswordsandsecurityprotections.WhileLinuxbasedtoolsaremore
difficulttouseanddonothavethesameprecedentincourtasEnCaseandFTK,they
havebecomepopularwithsomeauditors.
Morespecializedtoolsusuallygearedtoasinglepurposelikepassword
crackingorfileundeletingareavailable(Kuchta,2001).Thesetoolsmakeupthe
toolkitofaforensicinvestigator.Mostauditorsonlyneedtounderstandthegeneral
categoriestoeffectivelyworkwithdedicatedforensicpersonnel.
Forensicinvestigatorsgenerallylookforinformationinthefollowingareas:
Officesuitefilesincomputerdirectories
Graphicsindirectoriesandinthebrowsercache
Email,instantmessaginglogs,andothercomputerbasedcommunications.
Cellphonetextmessagelogsandcallrecords.
Memoryanddiskcaches
Deletedspaceonharddrives
OtherdigitaldeviceslikeUSBflashdrives
5.2 Methodologies
Beyondthetrainingprovidedbysoftwarecompanies,someacademicshave
researchedmethodologiesandtechniquesforcomputerforensics.Inparticular,Waldrup,
et.al.(2004)proposedageneralizedfivestepprocessforadefensibleforensic
accountingprocess. Theystatetheirprocessisdefensibleincourtandrobustfroma
technicalstandpoint.
Smith(2005)researchedtherelationshipbetweentheuseofdigitaldataby
auditorsandcomputerforensicspecialists.Byfocusingontherolesofthetwo
individuals,Smithinvestigatedhowcollectingdigitalevidencecanbenefitfraudoriented
audits.
Linkanalysisisamethodologythatanalyzeslinksbetweendatafoundindata
mining,fromexternalsources,andduringforensicinvestigations. Someresearchersare
investigatinghowlinkanalysiscanbeeffectivelyusedtocorrelatecomplexevidencein
forensicaccountingcases(Kovalerchuk,et.al.2007).
5.3 FutureResearch
Whilesignificantresearchhasbeendoneonindividualforensictechniquesinthe
computerscienceandmathematicsfields,additionalresearchisneededtoapplythese
techniquestotheforensicaccountingfield.Mostauditorsdonothavethebackground
neededtounderstandhowtoapplyrigorousforensicalgorithmsiftechniquesarenot
includedinEnCaseorFTK,theyarenotgenerallyavailabletothefield.Academicswith
thisknowledgecouldbringadditionaltechniquestotheaccountingfield.
Ascanbeseeninthemethodologysectionabove,onlypreliminaryworkhasbeen
doneincreatingrobust,researchedmethodologiesforforensicauditors.Theproposed
methodologiesneedtobevalidatedandtested,andnewmethodologiesshouldbe
proposed.
Theproliferationofdatacapabledevicespresentsnewopportunitiesforthe
applicationofforensicsresearch.Deviceslikecellphones,iPodsandotherMP3players,
digital cameras,PDAs,USBkey fobs,externalharddrives,andevenwritinginstruments
withembeddedstoragearepotentialforensicsearchpoints.Forexample,therelatively
largeharddriveintodaysiPodsdespitetheirinnocuousandubiquitousnaturehas
surelybeenusedtostealdataorsensitiveinformationfromcompaniesandindividuals.
Asthistrendcontinues,regulation,privacy,andprotectionwillbecomeincreasingly
importantissues.Inaddition,theincreasingavailabilityofcloud(internet)storageand
backuppresentsnewopportunitiesforforensicauditors.
Finally,forensicauditingisarelativelynewfield.Researchintohowforensics
shouldbeincludedinaccountingcurriculawouldbeuseful.Fewteachersknowwhich
topicsshouldbetaughttoaccountingstudentsandwhichshouldbelefttoinformation
systemsorcomputerscienceclassrooms.Indeed,ifdedicatedfraudcoursesareonlynow
enteringthecurriculumofuniversityprograms,computerforensicsforaccounting
majorsifresearchshowsthatsuchathingshouldbedoneisrelativelyunknown.
6 CONCLUSION
Computeraidedfrauddetectionisanew,excitingfieldforaccounting
researchers.Topicslikedataminingtechniques,ratioanalysisforthedetectionof
financialstatementfraud,issuessurroundingexternalinformationsources,andcomputer
forensicsbringopportunitiesforrobustresearchandforcollaborationbetween
accountingfacultyandinformationsystems,legal,computerscience,mathematics,and
otherresearchers.
Currently,theresearchisspreadacrossawidevarietyofjournals,fromauditing
toinformationsystemstoinvestigativeoutlets.Thegoalofthispaperistointroduce
whatisknownabouteachtopicandproposeneededareasofstudyitisnotmeanttobea
comprehensiveliteraturereviewoneachtopic,butitreferencesotherreviewswhere
possible.
7 REFERENCES
ACFE(2008).2008ReporttotheNation.TheAssociationof CertifiedFraudExaminers.
Agyemang,M.,Barker,K.,&Alhajj,R.(2006).Acomprehensivesurveyofnumericand
symbolicoutlierminingtechniques.IntelligentDataAnalysis,10,521538.
AICPA(2002).SASNo.99:ConsiderationofFraudinaFinancialStatementAudit
Summary.
Albrecht,C.C.,Albrecht,W.S.,&Dunn,J.G.(2000).ConductingaProActiveFraud
Audit:ACaseStudy.JournalofForensicAccounting,II,203218.
Albrecht,C.C.(2008).Detectlets:ANewApproachtoFraudDetection.InEuropean
AcademyofManagementatLjubljana,Slovenia.
Albrecht,W.S.,&Albrecht,C.C.(2002).RootOutFinancialDeception.Journalof
Accountancy,3033.
Albrecht,W.S.,Albrecht,C.,&Albrecht,C.C.(2008).CurrentTrendsinFraudandits
Detection.InformationSecurityJournal:AGlobalPerspective,17(1).
Albrecht,W.S.,Albrecht,C.C.,Albrecht,C.O.,&Zimbelman,M.(2009).Fraud
Examination(3).SouthWesternCengageLearning.
Beasley,M.S.,&Jenkins,J.G.(2003).TheRelationof InformationTechnologyand
FinancialStatementFraud.JournalofForensicAccounting,4,217232.
Bell,T.B.,&Carcello,J.V.(2000).ResearchNotes,Adecisionaidforassessingthe
likelihoodoffraudulentfinancialreporting.Auditing:AJournalof Theoryand
Practice,19(1),169175.
Benish,M.(1999).TheDetectionofEarningsManipulation.FinancialAnalystsJournal,
55,2436.
Black,J.(2002).PublicRecordsinPublicViewOnline?.BusinessWeekOnline.
Bolton,R.J.,&Hand,D.J.(2001).Unsupervisedprofilingmethodforfrauddetection.
InConferenceofCreditScoringandCreditControlVII,Edinburgh,UK.
Busta,B.(1998).RandyWeinberg.UsingBenford'slawandneuralnetworksasareview
procedure,13(6),356366.
Cameron,P.(2001). YouCan'tHidefromAccurint.LawTechnologyNews,8(9).
Causey,B.(2005).HowToRespondToAttacks.CertificationMagazine.
Cecchini,M.,Aytug,H.,Koehler,G.,&Pathak,P.(2005).DetectingManagementFraud
inPublicCompanies.UniversityofFloridaFisherSchoolofBusiness.
Cho,W.K.T.,&Gaines,B.J.(2007).Breakingthe(Benford)Law:StatisticalFraud
DetectioninCampaignFinance.TheAmericanStatistician,61(3),218223.
Coglitore,F.J.,&Matson,D.M.(2007).TheUseofComputerAssistedAuditing
TechniquesintheAuditCourse:FurtherEvidence.JournalofForensic
Accounting,VIII,201226.
DailyTarHeel(2007).ReportonSocialSecurityNumberFraud.UniversityofNorth
CarolinaatChapelHill,April26.
Dixon,P.D.(2005).An overviewofcomputerforensics.IEEEPotentials,24(5),710.
Eining,M.M.,Jones,D.R.,&Loebbecke,J.K.(1997).RelianceonDecisionAids:An
ExaminationofAuditors'AssessmentofManagementFraud.Auditing:AJournal
ofTheoryandPractice,16(2).
Freeman,E.H.(2006).DisclosureofInformationTheft:TheChoicePointSecurity
Breach.InformationSystemsSecurity,1115.
Frost,M.(2004).FindingSkeletonsinOnlineClosets.Searcher,12(6),5460.
Gavish,A.(2007).TheHiddenCostsofComputerMisconduct.Security.
Green,B.P.,&Choi,J.H.(1997).AssessingtheRiskofManagementFraudThrough
NeuralNetowrkTechnology.Auditing:AJournalofTheoryandPractice,16(1).
Grove,H.,&Cook,T.(2004).LessonsforAuditors:QuantitativeandQualitativeRed
Flags.JournalofForensicAccounting,V,131146.
Hansen,J.,McDonald,J.,Messier,W.,&Bell,T.(1996).AGeneralizedQualitative
ResponseModelandtheAnalysisofManagementFraud.ManagementScience,
42,10221033.
Heel,D.T.(2007).ReportonSocialSecurityNumberFraud.UniversityofNorth
CarolinaatChapelHill.
Hermanson,D.R.,Moran,B.,Rossie,C.S.,&Wolfe,D.T.(2006).Continuous
MonitoringofTransactionstoReduceFraud,Misuse,andErrors.Journalof
ForensicAccounting,VII,1730.
Hill,T.P.(1995).AStatisticalDerivationoftheSignificantDigitLaw.Statistical
Science,10,354363.
Jones,M.W.(2008).DoesGoogleHaveItsGeoEyeOnYou. .Electronicdocument,
http://tech.blorge.com/Structure:%20/2008/10/10/doesgooglehaveitsgeoeye
onyou/,accessed.
Kirkos,E.,Spathis,C.,&Manolopoulos,Y.(2007).Dataminingforthedetectionof
fraudulentfinancialstatements.ExpertSystemswithApplications,23.
Kou,Y.,Lu,C.,&Sirwongwattana,S.(2004).SurveyofFraudDetectionTechniques.In
2004InternationalConferenceonNetworking,Sensing,andControl(pp.749
754).
Kovalerchuk,B.,Vityaev,E.,&Holtfreter,R.(2007).Correlation ofComplexEvidence
inForensicAccountingUsingDataMining.JournalofForensicAccounting,VIII,
5388.
Kuchta,K.J.(2001).YourComputerForensicToolkit.InformationSystemsSecurity.
Lamoreaux,M.(2007).InternalAuditorUsedComputerTooltoDetectWorldCom
Fraud.JournalofAccountancy,35.
Lehman,M.W.(2008).JointheHunt.JournalofAccountancy,4649.
Loebbecke,J.,Eining,M.,&Willingham,J.(1989).Auditors'ExperiencewithMaterial
Irregularities:Frequency,Nature,andDetectability.Auditing:AJournalof
TheoryandPractice,9,128.
Loebbecke,J.K.,&J.J.Willingham,J.(1988).ReviewofSECAccountingand
AuditingEnforcementReleases.UniversityofUtah.
Loftus,J.T.,&Vermeer,T.E.(2003).ProActiveFraudAuditing:Technology,Fraud
Auditing,andLiquor.JournalofForensicAccounting,IV,307310.
Lovett,R.W.(1955).LookingAround.HarvardBusinessReview.
Marczewski,D.,&Akers,M.(2005).CPA'sPerceptionsoftheImpactofSAS99.CPA
Journal,75,3840.
Nigrini,M.J.(1999).I'veGotYourNumber.JournalofAccountancy.
Nigrini,M.J.(2000).DigitalanalysisusingBenford'sLaw.GlobalAuditPublications.
Paletta,D.(2005).RegulatingChoicePoint:WhoseJobIsIt,Anyway?.American
Banker.
Phua,C.,Lee,V.,Smith,K.,&Gaylor,R.(2005).Acomprehensivesurveyofdata
miningbasedfrauddetectionresearch.WorkingPaper.
Procedure,S.(2008).RetrievedNovember17,2008from
http://www.securityprocedure.com/downloadpicaloopensourcealternativeacl
audit.
Rezaee,Z.,Sharbatoghlie,A.,Elam,R.,&McMickle,P.L.(2002).Continuous
Auditing:BuildingAutomatedAuditingCapability.Auditing:AJournalof
TheoryandPractice,21(1).
Samborn,H.V.(2002).NoPlaceToHide.ABAJournal.
Smith,G.S.(2000).BlackTechForensics:CollectionandControlofElectronic
Evidence.JournalofForensicAccounting,I,283290.
Smith,G.S.(2005).ComputerForensics:HelpingtoAchievetheAuditor'sFraud
Mission.JournalofForensicAccounting,VI,119=134.
Stafford,A.(2005).InformationBrokers:PrivacyInPeril.PCWorld,101104.
Summers,S.L.,&Sweeny,J.T.(1998).FraudulentlyMisstatedFinancialStatements
andInsiderTrading:AnEmpiricalAnalysis.TheAccountingReview,73(1),131
146.
Swartz,N.(2004).U.S.StatesDisagreeAboutOnlineAccesstoCourtRecords.
InformationManagementJournal,11.
TechnologyExpert(2008).Google'sStreetView"OfftheMap"atU.S.MilitaryBases.
RetrievedNovember17from http://technologyexpert.blogspot.com
/2008/03/googlestreetviewoffmapatus.html.
Tyburski,G.(2004).IntroductiontoOnlineLegal,Regulatory,andIntellectualProperty
Research.SouthWesternEducationalPub.
Waldrup,B.,Capriotti,K.,&Anderson,S.C.(2004).ForensicAccountingTechniques:
ADefensibleInvestigatoryProcessforLitigationPurposes.JournalofForensic
Accounting,V,116.
Wells,J.T.(2002).OccupationalFraud:TheAuditasDeterrent.JournalofAccountancy.

You might also like