You are on page 1of 12

Should digital

transformation
be on your
agenda, or
running it?
With digital transformation on the increase,
the Consumer Products & Retail (CPR)
sector now face a new set of emerging risks.

ey.com/forensics/retail #ConsumerProducts&Retail
2 Should digital transformation be on your agenda, or running it?

How digital
transformation
increases
consumer and
retail fraud risks
Digital transformation has swept across the Consumer Products
& Retail (CPR) sector, from manufacturing process automation, to
sales and distribution, and logistics and digitization of customer
payments. Yet, as CPR companies adopt impressive new
technologies, they also encounter new fraud risks.

This paper examines the emergent digital fraud dynamics when


organizations undergo a digital transformation journey. The
EY Forensics team outline ways that companies can address
loopholes, tackle misconduct and put in place monitoring
mechanisms to potentially preempt and mitigate fraud.
Should digital transformation be on your agenda, or running it? 3

What is driving the digital


transformation in CPR?
Direct-to-consumer brands
are accelerating their digital
transformation. The e-retail market
has grown by more than 100% a year
The e-retail market has grown by
over the past five years and in 2017, more than 100% a year over the past
e-retail sales accounted for 10.2% of
global retail sales,1 with the fastest
five years and in 2017, e-retail sales
growing online retail markets being accounted for 10.2% of global retail
Indonesia, India, Mexico and China.
In 2019, e-retail sales are set to sales, with the fastest growing online
account for up to one-third of total retail markets being Indonesia, India,
retail sales in China.2

Consumer expectations are changing


Mexico and China.
as direct-to-consumer brands acquire
individual customers at scale, forcing
traditional retailers to move online has helped companies on the path to Digital transformation is reshaping
themselves. Omni-channel retail digitization. CPR behind the scenes as automation
has now become the new normal. streamlines manufacturing, logistics
Digitization allows suppliers and
Retailers need to align their product and payments, and expedites
consumers to access fast-growing
portfolio and customer experience with integration with third-party
emerging markets and enables
consumer preferences and behaviors to networks that link subcontractors,
multidirectional supply chains
increase sales and compete effectively. manufacturers, stockists and
connecting importers and exporters,
The CPR industry has responded distributors. These processes produce
suppliers, carriers, distributors and
to consumer expectations — for real-time data, which can be used
customers. E-commerce extends
speed, ease and convenience — by for more precise management and
customer choice with faster service and
transforming the point of sale (PoS) monitoring. This includes monitoring
more products via multiple channels. In
process in traditional retail stores, of trade and distribution spends,
addition, e-commerce offers multiple
online platforms for direct consumer brand visibility promotions, as well as
payment options and online interaction
reach, as well as the supply chain tracking secondary sales at distributor
between retailers and customers,
systems that expedite the ordering and retailer level. On the customer
including chat features and order
and purchasing process. Investing side, data is leveraged to reduce order
tracking. Retailers have a clearer audit
in technology, such as a distribution processing and delivery times, as well
trail, richer transaction data and a
management system (DMS) for tracking as to enable targeted and personalized
direct feedback loop along with the
secondary sales (distributor to retailer), sales, which fuels marketing and
potential to reduce customer services
PoS terminals for tertiary sales product development in line with
staff while adding rapid response to the
(retailer to consumer), and sales force consumer trends and preferences.
customer experience.
automation software for performance
monitoring and sales route optimization

1
“Annual retail e-commerce sales growth worldwide from 2014 to 2021,” Statista, statista.com/statistics/288487/forecast-of-global-b2c-e-commerce-growth/,
accessed 11 March 2019.
2
“E-commerce share of total global retail sales from 2015 to 2021,” Statista, statista.com/statistics/534123/e-commerce-share-of-retail-sales-worldwide/, accessed
11 March 2019.
4 Should digital transformation be on your agenda, or running it?

Emergent problems

As more stakeholders — vendors,


suppliers, distributors, retailers and
sales teams — use digitized technology,
• Insider risk: Fraud involving company
employees misusing internal systems
and processes (see Incidents of fraud
36
of respondents considered
fraud and corruption as the
%

such as automated operational in sales systems p6)


processes, real-time data analysis and greatest risk to business
Proactive fraud risk assessments
digital payments, the risk landscape
have uncovered specific examples of
is changing too. Incidents of fraud
the above-mentioned vulnerabilities
perpetrated by company insiders,
affecting CPR companies, such as
connected organizations and external
scams involving loyalty card sharing,
parties are exposing and exploiting
bulk buying to collect loyalty points and
the new vulnerabilities of networked
resale of goods in the gray market.
business models.
Digitization links online systems and
Digitization has focused concerns
physical processes, sharing real-time
on fraud. The EY 15th Global Fraud
data between internal functions and
Survey3 found that 36% of respondents
third parties to reduce order response
considered fraud and corruption as the
times and mitigate overstocked
greatest risk to business and 37% rated
inventories. This opens up new
cyber attack as the greatest risk.
vulnerabilities, particularly when
The primary vulnerabilities faced by the companies fail to upgrade control and
CPR sector are: monitoring measures. These include:

• Sensitive personal data collected PoS: Digitization has transformed


through e-commerce: Retailers are the PoS functionality by recording
targeted because they hold up-to- and aggregating transactional data.
date data that criminals can use, However, PoS is also a major target
• Self-service checkouts that attract
such as names, addresses and credit for fraud, opening up in-store retail to
fraud perpetrated by customers,
card details. High-profile hacks e-commerce vulnerabilities. Some of
for example scanning one item and
have business and reputational the common vulnerabilities include:
packing another more expensive
consequences for companies
• The risk of the terminal itself being item, or several items
• Cyber threats to online transaction targeted — mobile PoS devices being
In emerging markets, modern trade
platform: Denial-of-service or vulnerable to malware via in-store
businesses face issues like wholesale
distributed denial-of-service (DoS Wi-Fi networks
outlets purchasing high-discount
or DDoS) attacks represent a major
• Most terminals accepting contactless necessity consumer goods in high
business risk as sales are halted
payments, including via apps, which volumes from the store — resulting in
whenever the website is down. This
present additional risks around stock-outs (products becoming out
can be the result of a malicious
authentication and security for rapid of stock) and thereby, drop in footfall
attack or a system failure because
customer onboarding and a reduction in repeated visits from
the platform has not been configured
the customer.
to respond to the volume of traffic on
peak sales days, such as Black Friday

3
“ Integrity in the spotlight: The future of compliance,” 15th Global Fraud Survey: Emerging Markets Perspective, fraudsurveys.ey.com/ey-global-fraud-survey-2018,
accessed 11 March 2019.
Should digital transformation be on your agenda, or running it? 5

37
rated cyber
attack as the
%

greatest risk

These small incidents extrapolated for sales made through an online driving up the advertising cost with
across multiple stores can represent marketplace lower conversion rates and skewed
significant losses. user data for online businesses
• Cost arbitrage fraud: Sellers
Online marketplace: Online trading buy their own products that • Listing payment fraud: Fraudulent
scales up retail operations — enabling have cashback offers listed on the sellers list products for sale and
retailers to trade faster and with more online marketplace and then resell request advance payment. The seller
people — but it also increases the risk of them offline takes payment, but the product does
fraudulent activities that are damaging not exist, or is not sent, and the
• Cashback or promo fraud:
e-commerce. Some recent fraud buyers’ bank or credit card details
Employees inflate cashbacks and
trends include: may be used as part of a wider
promo schemes on certain products
fraud scheme
• Listing fraud: Employees receive to favor specific sellers and receive
kickbacks from sellers in exchange kickbacks in return Loyalty programs: Loyalty program
for manipulating a listing on the fraud is endemic, particularly in
• Click fraud: Competitors and others
marketplace for higher visibility emerging markets. For example in Asia,
deliberately click on pay-per-click
where most purchases are by cash
• Commission fraud: Employees (PPC) adverts (sometimes using
on delivery or by mobile applications,
receive favors from sellers for technology) to generate fraudulent
rather than a credit card. Loyalty apps
reducing the commission percentage charges for advertisers, undermining
record all of a customer’s transactions,
that is to be paid by the seller the PPC campaigns. This results in
6 Should digital transformation be on your agenda, or running it?

including cash transactions, and award themselves, and friends and depending on cultural norms,
collect rich customer data for retailers family extra points, with or without a shopping habits and levels of tech
regarding customer choices and purchase, in exchange for goods or adoption. Safeguards and solutions
behaviors, including bank account and cash. must reflect this. For example,
location information. This valuable data developed economies are seen to be
Risk management in organizations
attracts hackers. Loyalty programs are experimenting with face recognition
needs to consider that while risks
also targeted by insider fraud, including as part of the payment authorization.
associated with transactions are
abuse of points, offers and promotions, However, in emerging Asian economies,
broadly similar, the scenario on the
whereby employees are not passing which are experiencing the highest
ground differs between regions,
on promotions to customers, or growth in e-commerce, payments are
mostly completed by cash on delivery,
smartphone apps and prepaid cards,
which are all transferable, not linked
to bank accounts and do not require a
Incidents of fraud in sales systems credit reference.

Secondary sales system • PoS system used only for


(distributor to retailer) billing promotional products,
Supply chain
Examples of insider fraud by abuse thereby, transactional data vulnerabilities
of secondary sales system include: not being indicative of real Digitization also brings supply chain
• Inflated sales on new or customer behavior vulnerabilities. Inventory management
existing retailer outlets to claim • Promotional benefits not passed and control systems that track and
undue benefits — sales staff on to the end consumer — the locate warehouse items, and integrate
manipulating the system to customer paying full price and with back-office systems (accounting
claim incentives the employee claiming the or enterprise resource planning (ERP))
promotion separately (e.g., if are often in use with PoS and asset
• Incentives claimed by creation
it’s two for one, they keep the management software to monitor stock
of “ghost salesmen” — a
extra item) levels and movements. However, CPR
response to pressure for
organizations are reporting incidents
incentives and targets • Sales booked in non-business of fraud that are exposing loopholes in
• Loopholes in the retail outlet hours — some sales not recorded secondary and tertiary sales systems
creation process that sometimes on the system (see Incidents of fraud in sales systems)
allow the creation of fake retail • Hackers exploiting vulnerabilities Drilling down into primary, secondary
outlets in the secondary sales in the digital transaction and tertiary sales data uncovers more
system by distributors to claim platforms, including insiders specific vulnerabilities. For instance,
undue trade scheme benefits who find loopholes in the system although mobile PoS devices and
• Leakage in scheme pay-outs and external hackers who DMS systems have improved visibility
made for inflated sales or fake understand the system of transactions and stock levels,
retail outlets • Sharing of credentials among transparency levels vary depending
users on site to accumulate on the software package used. Large-
• D
● atabase security issues
benefits and promotions scale systems that deal with high
around permissions enabling
volumes of transactions, particularly
unauthorized access to back-end • Misuse of reward points to claim
in Asia, may miss small incidents
databases and work-arounds, points on customer purchases
that are individually insignificant,
such as sharing passwords to and apply them to another
but widespread across the business.
bypass approval workflows loyalty card (an employee’s own
Consequently, although companies
card or one belonging to a family
are aware that there is some leakage
Tertiary sales system (retailer to member or friend)
from the secondary sales system, they
end consumer) are not aware of the magnitude of the
Examples of fraud by abuse of overall losses.
tertiary sales system include:
Should digital transformation be on your agenda, or running it? 7

Fix the leak:


a proactive approach
to assess vulnerability
to fraud risks
8 Should digital transformation be on your agenda, or running it?

CPR companies are spending large


sums on technology transformation
projects in their key business A proactive strategy requires organizations
operations. It has become necessary
for the key stakeholders responsible for
to determine where the issues are and take
the transformation projects to evaluate steps to address them using a combination of
the fraud vulnerabilities that arise for
the business from the adoption of new
controls, monitoring and encouragement to
technology and practices associated change behaviors.
with digital transformation initiatives.
Specific focus is required on high-value Anurag Kashyap
projects that have a financial impact in Partner, EY India
Global CPR Sector Leader, Forensic & Integrity Services

Digital integrity This framework includes process


automation to facilitate case
in customer or employee behavior
or unusual activities, Forensic Data
analytics investigations, internal audits and Analytics can identify the possibility
data management, and collaboration, of an individual store or cashier being
When an organization’s key risks have
which can highlight vulnerabilities and targeted by organized crime.
been identified using test scenarios
workflow improvements.
and data analytics within the three- EY teams have developed a PoS
way approach above, monitoring Once the risks identified are analytics tool for a global coffee retail
for specific types of incidents can mitigated, companies must continue chain using forensic analysis to risk
be incorporated into the control to monitor activities and measure score activities and identify problems
framework. However, considering the effectiveness of the anti-fraud within stores in terms of misuse by
the quantity of electronic records measures. A risk management staff. The tool runs analytics across
and transactions, which have been framework needs to be institutionalized data sets, including the number of
increasing significantly, companies face to identify threats in the form of red complimentary cups and the number of
an uphill task. They need to proactively flags. However, as the examples below staff “freebies” against the number of
harness analytics to evaluate demonstrate, regular independent transactions per day. It then scores the
data, ascertain gaps and identify analysis is required to uncover new results to identify which store present
patterns using intuitive technology- loopholes and work-arounds. the highest risk of losing revenue
assisted tools. through this type of staff conduct.
Risk analysis is applied to geographic
EY Forensics has an analytics
platform for monitoring and managing
Some practical regions, stores, employees and

external and insider risk. It applies a examples transactions.

six-step process: EY Forensic professsionals advised


Forensics professionals implemented
a global company in Southeast Asia,
• Data collection and validation PoS data mapping and analytics to
which operates a loyalty program
from all sources relevant for the identify potential fraud in stores spread
whereby all transactions attract points
organization across multiple states within the US.
that can be redeemed for cash. The
• Data completeness checks to ensure Breaking down activities by region,
high volume of data that this generates
the quality of data obtained store, product, type of sale (cash
increases the potential risk of large-
or card) and cashier, EY teams can
• Data mapping from the client’s scale fraud. Forensic data analysis
identify suspicious activities ranging
system to the unified data model devised and conducted by EY teams
from pilfering — where goods or cash
confirmed that the program was indeed
• Data analytics based on select go missing — to large-scale leakages.
being misused by staff and customers.
parameters An example is by identifying a spike
The purpose of data analysis was
in the number of expensive purchases
• Risk scoring for transactions twofold: to plug any gaps in the system
being returned for a refund or multiple
and to continuously identify red flags.
• Case management capability to store cards being registered to the
The organization took action against
handle the exceptions noted same address. By highlighting patterns
the employees whose misuse of the
Should digital transformation be on your agenda, or running it? 9

the form of incentives or payouts for them using a combination of controls, • Understand the purpose and
company employees and external third monitoring and encouragement objectives of the transformation
parties involved in the value chain. to change behaviors. A three-way initiative
approach to proactive forensic
This supplements the need for a • Understand the key performance
assessment can add value for
proactive strategy to detect and indicators (KPIs) linked to the
businesses seeking to mitigate the
address loopholes in processes transformation project that would
potential leaks;
and systems involved in the digital potentially result in benefits to
transformation initiative, with a internal and external stakeholders,
view to preventing fraud before it 1. Identify and and their financial impact on the
happens rather than reacting after the understand organization
event. A proactive strategy requires
• Identify the transformation initiative • Analyze links between business-
organizations to determine where the
with the highest financial impact critical processes and systems
issues are and take steps to address
involved in the transformation
initiative
system had been identified by patterns to predict which orders
this process, put in place controls might be fraudulent. This fraud
2. Functionality testing
to prevent such instances from prevention system operates almost
recurring and subsequently changed in real time, with the capability of
and data analytics
internal processes to include ongoing flagging and preventing potential • Perform functionality testing of the
monitoring and data analysis. fraud before it happens. system application or platform being
implemented
Proactive DMS reviews have helped Business intelligence tools
multiple companies operating in incorporating data visualization • Design fraud risk scenarios relevant
developing markets identify the and machine learning enable large to the business processes linked to
potential fraud vulnerabilities in organizations to identify trends the system application or platform
existing DMS systems, operating around potentially fraudulent under focus
schemes and incentive programs activities and communicate with • Extract data from relevant sources
for general trade operations. Data employees who fall into the top 10%, and perform forensic data analytics
analytics have helped pinpoint the in terms of suspicious transactions. to test the hypothesis for fraud risk
exact sales behavior of outlets aimed Rather than having to discipline or scenarios applicable to the business
at achieving the scheme or incentive dismiss individuals who are caught,
criteria defined by the company. EY it is possible to identify where the • Conduct additional checks to validate
teams have also helped companies risk is in the business and proactively the exceptions identified based on
set up post-implementation change behaviors. It is important to data analytics
monitoring frameworks to identify continue monitoring and measuring
red flags themselves going forward. transaction integrity to identify 3. Mitigate
which strategies and processes are • I● dentify vulnerable areas and
EY proactive analysis is used to
making a difference, and ensure categorize them in order of priority
highlight a potentially fraudulent
the right activities and groups are
activity. Trend analytics of online • Devise practical controls to
being targeted.
sales data help spot illicit purchasing mitigate risks
patterns, such as bulk buying and
• Build a monitoring framework
repeat returns of particular types
that helps identify red flags on a
of goods. Retrospective analytics
continuous basis going forward
on PoS terminals have been used to
identify inappropriate or fraudulent • A
● ssist in implementation of the
activities, complementing the controls in consultation with
payment analytics conducted by management
credit card providers.
• Define and agree an ongoing review
A casual dining organization in the mechanism for the controls
US uses machine-learning algorithms
to analyze trading and order
10 Should digital transformation be on your agenda, or running it?

Conclusion and key


takeaways
Digitization has transformed dishonest or careless Today’s CPR industry requires
the CPR environment in many employees, to fraudulent systems for identifying
positive ways as e-commerce third parties deliberately and combating fraud risks
expedites almost instant trade seeking opportunities to created by digitization.
in a wide range of products exploit loopholes or system New developments in retail
sourced from all over the world. work-arounds in ways that technology also bring new
make the system vulnerable opportunities for interception
Successful online and omni- to interceptions or scams. and exploitation. So
channel retail is highly The digitized CPR industry independent forensic analysis
profitable, but digitization is produces vast quantities of and measurement is needed
also opening up a different data, which can be leveraged to on an ongoing basis as digital
risk horizon. New threats grow businesses — and protect integrity is a critical success
range from cyber criminals them as well. factor for any business.
intercepting physical and
online sales systems, and

How can EY help? • Ensure the right controls are in place

• Monitor and analyze retrospectively and in real time


EY teams, with experience in forensics for the CPR
sector, helps businesses develop data analytics This helps create an incident plan for rapid reaction and
capabilities to: business continuity to protect trade and reputation,
should the worst happen.
• Identify and anticipate the specific risks affecting
the business
Should digital transformation be on your agenda, or running it? 11
EY | Assurance | Tax | Transactions | Advisory

About EY
EY is a global leader in assurance, tax, transaction and advisory services. The
insights and quality services we deliver help build trust and confidence in the capital
markets and in economies the world over. We develop outstanding leaders who team
to deliver on our promises to all of our stakeholders. In so doing, we play a critical
role in building a better working world for our people, for our clients and for our
communities.

EY refers to the global organization, and may refer to one or more, of the member
firms of Ernst & Young Global Limited, each of which is a separate legal entity.
Ernst & Young Global Limited, a UK company limited by guarantee, does not provide
services to clients. Information about how EY collects and uses personal data and a
description of the rights individuals have under data protection legislation is available
via ey.com/privacy. For more information about our organization, please visit ey.com.

About EY’s Forensic & Integrity Services


Dealing with complex issues of fraud, regulatory compliance and business disputes
can detract from efforts to succeed. Better management of fraud risk and compliance
exposure is a critical business priority — no matter the size or industry sector. With
approximately 4,500 forensic professionals around the world, we will assemble the
right multidisciplinary and culturally aligned team to work with you and your legal
advisors. We work to give you the benefit of our broad sector experience, our deep
subject-matter knowledge and the latest insights from our work worldwide.

© 2019 EYGM Limited.


All Rights Reserved.

EYG no: 003376-19Gbl 

BMC Agency
GA 1011776

ED None

In line with EY’s commitment to minimize its impact on the environment, this document has
been printed on paper with a high recycled content.

This material has been prepared for general informational purposes only and is not intended to
be relied upon as accounting, tax or other professional advice. Please refer to your advisors for
specific advice.

The views of third parties set out in this publication are not necessarily the views of the global
EY organization or its member firms. Moreover, they should be seen in the context of the time
they were made.

ey.com/forensics

You might also like