From the Publisher

"When people ask me what they can do to better utilize ACL, I tell them, 'Take an instructor lead course, participate in the ACL Forum, and study (not read, study) David Coderre's Fraud Analysis Techniques Using ACL.' I studied this book, and would not be where I am today without it. Even without the anti-fraud material, the book is worth the investment as a tool to learning ACL!"—Porter Broyles, President and founder of the Texas ACL User Group, Keynote Speaker at ACL's 2009 San Francisco Conference, Official ACL Super User "For individuals interested in learning about fraud analysis techniques or the art of ACL scripting, this book is a must-read. For those individuals interested in learning both, this book is a treasure."—Jim Hess, Principal, Hess Group, LLCYour very own ACL Fraud Toolkit—at your fingertips Fraud Analysis Techniques Using ACL offers auditors and investigators:Authoritative guidance from David Coderre, renowned expert on the use of computer-assisted audit tools and techniques in fraud detectionA CD-ROM containing an educational version of ACL from the world leader in fraud detection softwareAn accompanying CD-ROM containing a thorough Fraud Toolkit with two sets of customizable scripts to serve your specific audit needsCase studies and sample data files that you can use to try out the testsStep-by-step instructions on how to run the testsA self-study course on ACL script development with exercises, data files, and suggested answers The toolkit also contains 12 'utility scripts' and a self-study course on ACL scripting which includes exercises, data files, and proposed answers. Filled with screen shots, flow charts, example data files, and descriptive commentary highlighting and explaining each step, as well as case studies offering real-world examples of how the scripts can be used to search for fraud, Fraud Analysis Techniques Using ACL is the only toolkit you will need to harness the power of ACL to spot fraud.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.Preface. Acknowledgments. Introduction. About this Toolkit. Using Data Analysis to Detect Fraud. About Scripts. Customizing Scripts.1. Start and Menu. Launching the Fraud Toolkit Tests. Starting the Fraud Toolkit Application. Placement of Start and Fraud_Menu Scripts. How the Scripts Work. Start. Fraud Menu. Log Files. Exiting a Script. Working Without the Fraud Menu.2. Completeness and Integrity. Checking for Blanks and Data Type Mismatches. Running Completeness and Integrity. How the Scripts Work. Carriage Returns. Understanding the Verify Command. Understanding the Group Command. Deleting Temporary Variables, Fields, and Files. Review and Analysis.Case Study: General Ledger Accounts Unaccounted For. Organizing Your Data to Find Trends.3. Cross-Tabulation. Organizing Your Data to Find Trends. Running Cross-Tabulation. Benefits of Cross-Tabulation. How the Scripts Work. Challenges of Cross-Tabulation. Deleting Temporary Variables, Fields, and Files. Review and Analysis.Case Study: Not Enough Clients.Case Study: Calling Cards.4. Duplicates. Finding Higher-Risk Items. Running Duplicates. How the Scripts Work. The Role of Sub-Scripts.Case Study: Duplicate Payments. Dup_Dialog Script. If Statements. Dup_Multiple_Keys1. Macro Substitution. Keychange. Define Field. LEN() and HEX(). Deleting Temporary Variables, Fields, and Files. Review and Analysis. Checking for Duplicates. Example—Payroll. Accounts Payable Example.5. Gaps. Identifying Transactions Missing From a Sequence. Running Gaps. How the Scripts Work. Deleting Temporary Variables, Fields, and Files. Review and Analysis.Case Study: Free Calls.6. Data Profile. Establishing Normal Values and investigating Exceptions. Running Data Profile. How the Scripts Work. Data Profile Test Parameters. Deleting Temporary Variables, Fields, and Files. Re
Published: Wiley on
ISBN: 9780470508466
List price: $200.00
Read on Scribd mobile: iPhone, iPad and Android.
Availability for Fraud Analysis Techniques Using ACL
  1. This book can be read on up to 6 mobile devices.