Professional Documents
Culture Documents
ACCOUNTANTS
“Everyone, especially those who practice a
profession which deals with the proper
functioning of a country’s economic life, is
asked to play a positive, constructive role in
performing their daily work.”
FRAUD
1. False Representation
2. Material fact
3. Intent
4. Justifiable Reliance
5. Injury or loss
LEVELS OF FRAUD
PRESSURE
OPPORTUNITY RATIONALIZATION
PRESSURE
f
r
a
u
d
F
r
a
u
d
Ethics Ethics
FRAUD DIAMOND
INCENTIVE/
OPPORTUNITY
PRESSURE
CAPABILITY RATIONALIZATION
CAPABILITY
Position
Intelligence/Creativity and Ego
Coercion, deceit or stress
POSITION
COMPETENCE/
ARROGANCE CAPABILITY
OPPORTUNITY RATIONALIZATION
PRESSURE
ARROGANCE
CEO’s picture
CEO’s duality
AUDITOR’S RESPONSIBILIT Y FOR
DETECTING FRAUD
1. Plan the IT audit engagement based on an assessed
level of risk that irregular and illegal acts might
occur and that such acts could be material to the
subject matter of the IT auditor’s report
Process mining
Bayesian belief network
Genetic algorithm
Text mining
Response surface methodology
Neutral network
Logistic regression
Group method of data handling
Support vector machine
Decision trees
Hybrid methods
Self-organizing maps
Fuzzy logic
Artificial immune system
FRAUD DETECTION TECHNIQUE
Process mining
Securities and Commodities Fraud
Bayesian belief network
Genetic algorithm
Text mining
Response surface methodology
Neutral network
Logistic regression
Group method of data handling
Support vector machine
Decision trees
Hybrid methods
Self-organizing maps
Fuzzy logic
Artificial immune system
FRAUD DETECTION TECHNIQUE
Process mining
Bayesian belief network
Genetic algorithm
Text mining
Response surface methodology
Neutral network
Financial Statement Fraud
Logistic regression
Group method of data handling
Support vector machine
Decision trees
Hybrid methods
Self-organizing maps
Fuzzy logic
Artificial immune system
FRAUD DETECTION TECHNIQUE
Process mining
Bayesian belief network
Genetic algorithm
Text mining
Response surface methodology
Neutral network
Logistic regression Insurance Fraud
Group method of data handling
Support vector machine
Decision trees
Hybrid methods
Self-organizing maps
Fuzzy logic
Artificial immune system
FRAUD DETECTION TECHNIQUE
Process mining
Bayesian belief network
Genetic algorithm
Text mining
Response surface methodology
Neutral network
Logistic regression
Group method of data handling
Support vector machine
Decision trees
Hybrid methods
Credit Card Fraud
Self-organizing maps
Fuzzy logic
Artificial immune system
ETHICAL ISSUES
ETHICAL ISSUES
Computer Crime
Intellectual Property
Software Piracy
Job Displacement
COMPUTER CRIME