comparing best software for fraud examinations

advertisement
Fraud data interrogation tools:
COMPARING BEST SOFTWARE
FOR FRAUD EXAMINATIONS
By Rich Lanza, CFE, CPA, PMP
Fraud examiners now have a wide
choice of data interrogation tools
they can use themselves without
bothering the IT department. Here’s
a comparison of the features of the
five most popular products.
Jack the fraud examiner had a problem. He had to analyze
thousands of figures in an accounts receivable case but his
small firm’s IT department was snowed under. So he
knew he needed to start the analysis himself but what
software should he use? Which ones had the features he
needed? And was he going to be able to perform the functions
with his limited high-tech ability?
In my travels, I am constantly talking to fraud examiners,
audit professionals, and other finance professionals who
want to use more data analysis to detect fraud. However,
they complain that the software is too difficult to learn.
But fraud investigation software has become easy to use.
Here we’ll compare five leading products.
We’ll explore:
• core data analysis functions;
• other product considerations; and
• ways to select a package.
Core data analysis functions
The matrix below summarizes the most common data
analysis functions by software vendor. A check mark is
placed next to each function if it’s a standard feature of
the tool or could easily be completed using the software’s
native functions. For example, it may be possible to join
or compare an employee address file to a vendor address
file using the VLOOKUP() function in Excel, but this
can be a complex function to use and isn’t flexible in
approach. Therefore, for the Join/Relate function below,
Excel wasn’t deemed to have this functionality. On the
other hand, IDEA software has a Cross Tabulate command that’s specifically listed as part of its standard menus
and so I note in the matrix that it has this function.
HERE ARE THE FIVE PRODUCTS WITH CONTACT INFORMATION
Product
Phone
Web site
ACL™
604-669-4225
www.acl.com
ActiveData for Excel™
613-569-4675
www.informationactive.com
IDEA™
888-641-2800
www.audimation.com
Micosoft Excel™ and Acess™
See web site for local
office listing
www.microsoft.com
FRAUDMAGAZINE | 1
Description
ACL™
Active
Data
For
Excel™
Aging
Produces aged summaries of data
based on established cutoff dates.
Append/Merge
Combines two files with
identical fields into a single file. An
example would be to merge two years
worth of accounts payable history into
one file.
Calculated Field/
Functions
Creates a calculated field (which can
use a Field/ function such as ABS for
the absolute value of Functions the
field) using data within the file. For
example, the net payroll pay to an
employee could be recalculated using
the gross pay field and deducting any
withholding/taxes.
Cross Tabulate
Allows you to analyze character fields
by setting them in rows and columns.
By cross-tabulating character fields,
you can produce various summaries,
explore areas of interest, and
accumulate numeric fields.
Digital Analysis/
Benford’s Law
Audit technology designed to find
abnormal duplications of specific digits,
digit combinations, specific numbers,
and round numbers in corporate data.
Since the objective is to find abnormal
duplications, auditors need a benchmark that indicates a normal level of
duplication. Benford’s Law gives auditors the expected frequencies of the
digits in tabulated data. The premise is
that we would expect authentic and
unmanipulated data to exhibit these
patterns. If a data set doesn’t follow
these patterns, this may be a cause for
auditor concern and review.
Data Analysis
Features
Excel™
IDEA™
Access™
FRAUDMAGAZINE | 2
Description
ACL™
Active
Data
For
Excel™
Duplicates
Identifies duplicate items within a
specified field in a file. For example,
this report could be used to identify
duplicate billings of invoices within
the sales file.
Export
Creates a file in another software
format (for example, Excel, Word) for
testing. An example would be to export
customer address information to Word
for “Mail Merge”ing to customer
confirmation letters.
Extract/Filter
Extracts specified items from one file
and copies them to another file,
normally using an “if” or “where”
statement. Examples include
extracting all balances over a
predefined limit.
Gaps
Identifies gaps within a specified field
in a file. For example, identify
any gaps in check sequence.
Index/Sort
Sorts a file in ascending or descending
order. An example would be sorting
a file by social security number to see
if any blank or “999999999” numbers
exist.
Join/Relate
Combines specified fields from two
different files into a single file using key
fields. This function is used to create
relational databases on key fields.
It can also be done in an unmatched
fashion to identify differences between
data files.
Regression
Regression analysis using statistical
means to calculate a dependent
variable balance (such as net sales)
based on various independent
variables (for example, product
purchases, inventory levels,
number of customers, etc.).
Data Analysis
Features
Excel™
IDEA™
Access™
Data Analysis
Features
Active
Data
For
Excel™
Description
ACL™
Sample
Creates random or monetary unit
samples from a specified population.
Statistics
Calculates various statistics on a
selected numeric field. These may be
total positive items, negative items,
average balance, etc.
Stratify
Counts the number and dollar value of
records of a population falling within
specified intervals. Stratifications also
provide a useful view into the largest,
smallest, and average dollar
transactions.
Summarize
Accumulates numerical values based
on a specified key field. An example
would be summarizing travel and
entertainment expense amounts by
employee to identify unusually high
payment amounts.
As you can see from the matrix, the tools have similar features. However, products like ACL™, ActiveData for
Excel®, and IDEA™ give more functions to fraud examiners because they were built specifically for that audience.
Microsoft Excel and Access, as ubiquitous and powerful
as they are, separately may not have all of the features you
want. But when combined, the Microsoft Excel/Access
platform works well especially when ActiveData for Excel
is loaded as an add-in to Excel. While price shouldn’t be
the prime selection criteria, the entire Microsoft/
ActiveData for Excel combination costs less than half of
one user license of ACL or IDEA (based on single-user
pricing). ACL, IDEA, and Microsoft Access should be
able to handle as much data as you can feed into these
tools. Because of increase memory both in PCs and these
software products it’s unusual to hear that any file is too
large for analysis.
ACL and IDEA are faster at analyzing large data file;
Access will take longer to process report requests. Excel
Excel™
IDEA™
Access™
(and the corresponding add-in Active Data for Excel) is
currently limited to 65,536 rows of information for
analysis. ACL and IDEA are read-only products so the
original data can’t ever be corrupted. Microsoft Access can
be set to read-only (with options in the program) and
Excel has a protection feature to ensure data is not overwritten. Rarely do examiners corrupt original data by
entering information onto that data. Rather, poor data
integrity is usually due to inadequate usage of the tools at
hand or insufficient training.
Other product considerations
Aside from the data analysis functionality, the fraud
examiner needs to consider other key factors when
making a product selection:
• data import;
• training;
• script development/procedure log; and
• remote access/server processing
FRAUDMAGAZINE | 4
Data import
One of the most daunting tasks is obtaining and importing client data into the software for analysis. Some software tools are better than others for importing data.
imported accurately. Excel, Access, and ActiveData for
Excel should be able to meet most of your needs but
many examiners will select ACL or IDEA simply due to
their strong ability to import any data.
All products provide a “wizard” that will assist in analyzing the following file types: Excel, Access, Dbase,
Delimited, and Fixed-Width. The wizard will do most of
the work in ensuring data of these types is imported correctly and, for the most part, this function is all that’s
needed for most examinations provided that most client
systems will be able to export data in an ASCII format
and in one of these common file types. Some older computer systems may only be able to provide data in a mainframe format (such as IBM’s EBCIDIC format) and for
these special instances, ACL™ and IDEA are the only
tools in our software lineup you can use to natively read
these files.
Training
All the products listed have training not only in their
functionality but also in how they can be used in a fraud
detection scenario. The software vendors or independent
firms using the software have produced a variety of selfstudy, group-study, and private instruction courses. For
more information, please see the ACFE’s bookstore at
CFEnet.com or the software vendor Web sites for numerous training options. All vendors have mailing list communities to help connect users of their products to discuss
practical application scenarios. Learn more about a software company’s help desk track record (which may be
best determined based on discussions with other current
users) because these resources can be pivotal to rectify any
technical issues encountered in the field.
Here are additional data import products:
Open Database Connectivity (ODBC) Utilities - This is
the standard database access method developed by
Microsoft and adopted by most accounting packages to
transfer data between systems. All products offer this
functionality allowing the user to import data files without any assistance from an MIS Department (given
appropriate security). Another added benefit is that the
data files are instantly defined in the software package for
analysis.
Other import utilities - IDEA provides free add-in utilities to assist in the importing of many major accounting
package data such as Simply Accounting, MYOB, and
Peachtree. ACL has a similar import utility for SAP systems with an added software fee.
Print report files - A report file is a text version of a printed report (on the PC). The main hurdle in defining these
files is stripping out report headers and in appending
information from one line (such as customer name) to
other detail lines (such as invoice billing information).
Both ACL and IDEA have functionality to easily define
report files. You may be able to define these files in Excel
by sorting the file but it’s less common and usually leads
to a resulting file with poor data integrity.
So tools like ACL and IDEA provide a virtual “Swiss
Army Knife” for importing data because they support all
formats and have the associated wizards to ensure data is
Make sure the trainers and help desk are educated not
only in the software but in the audit/fraud examination
process itself. “CaseWare IDEA Inc. effectively operates
through business partners and distributors to ensure a
local flavor to the all-important technical support and
training needs of users,” says Bob Cuthbertson, president
of CaseWare IDEA Inc.
“Distributors are staffed by qualified professionals who
are both IT- and audit-proficient and can demonstrate
knowledge in the best uses for IDEA as well as the best
ways to get the most out of the product,” Cuthbertson
says. Also, inspect user groups that the software maintains. For example, IDEA software has 11 user groups
in the United States that meet regularly.
Script development/audit log
Scripts, otherwise known as batches or macros, will automate a set of data analysis procedures so a fraud examiner can create a set of reports, save the steps, and simply
push a button called “Run Reports” to get the same
results every time. Scripting also opens the door for continuous monitoring - reports can be set to run on a periodic basis with no human intervention, which provides
a virtual fraud detection team always working to root out
malfeasance.
FRAUDMAGAZINE | 5
While all products have script functionality, ACL utilizes
a more simple text-based language which first-time users
seem to understand easily. IDEA, Excel, and Access use a
variant of Visual Basic which tends to be more complex
to learn but more powerful as it taps into the full extent
of Microsoft’s library of software components. All products provide standard sets of pre-developed scripts that
can be used to examine key accounting processes for
fraud. For more information on these pre-developed
scripts, see the ACFE Bookstore at CFEnet.com or the
associated software Web sites.
In addition to scripts, procedure logs provide a record of
data analysis procedures performed within the software
for work-paper documentation. ACL, ActiveData for
Excel, and IDEA all provide procedure logs while
Microsoft Access and Excel don’t.
Remote access/server processing
If you plan to process large amounts of information, need
more horsepower for larger data files, and/or plan to have
a great deal of remote processing away from the office,
you may want to consider server processing. Server access
can give you more confidence in the processed data
because you’ll link directly to the production machine
data. You’ll also use the power of a server to process the
data versus, for instance, a laptop that may not have as
much power. For example, Access can link to data tables
but the data is never downloaded but just accessed on the
production machine. The only problem is that Access
relies on Open Database Connectivity (ODBC) to download files so if the database is not ODBC-compliant, it
may not be able to easily connect via the network.
In contrast, ACL provides direct links to data housed on
numerous platforms including OrACLe, DB2, IMS, or
ADABAS databases. “Prior to ACL developing its serverbased solutions, the main technological barrier was the
practical issue of implementing a system that was nonintrusive on operational processes and capable of being
easily configured for specific risk tolerance requirements,”
says Peter Millar, director of product management at
ACL Services Ltd. “Now, with ACL Desktop/Network
edition and ACL’s versatile Server Editions and
Application technologies, audit and controls monitoring
can be implemented within virtually any business process
cycle. The applications are customized for each organization’s needs and accepted level of risk tolerance,” Millar
says. These server applications are generally installed on
just one company’s machine rather than being able to be
applied to numerous companies and clients.
On the remote access front, IDEA has one of the best
solutions in its IDEA Server product that provides a Web
interface to a data processing server on which the software
is loaded. The fraud examiner can perform data analysis
with any computer that has a browser so you don’t have
to carry the software and don’t have to have the most
recent version loaded. It’s all handled on the server back
at the office. All other products can be accessed via the
Web but require remote access software. Regardless which
approach is taken, a Virtual Private Network connection
generally would be required to ensure the secure processing of data over the Internet.
How to select a package Test drive
When I’m in the market for a car, I may like the appearance and look of a particular vehicle. And then I’ll look to
see how many cars of that model I see on the road. But I
finally base my decision on how the car feels. Almost any
car will get me from point A to B and will provide similar functions. Shopping for fraud interrogation software is
similar. Some of the bells and whistles may be requirements for a minority of users, but the core functionality
seems to be what most people want on a daily basis.
My best suggestion is to take a test drive: obtain demo
versions of the software packages, and run the same
report through each product. You can determine which
product feels best. Talk to the company representatives,
the help desk, and other users to help form your opinion.
If you need a set of data files and some sample tests to
perform, read past “Fear Not the Software” columns in
The White Paper and Fraud Magazine in which I provide
step-by-step case studies using many of the software products discussed in this article. I also give links to sample
data files to run the tests.
Start small
In the next year, start small and incrementally use some
of these software tools rather than run data analysis on
every examination. I think Michael Pluscauskas, the president of InformationActive, said it best. “We realized that
many groups invest tens of thousands of dollars purchasing and implementing fraud interrogation software only
to shelve it for a couple of months and hit a brick wall
when they went to use it again because they had forgotten most of what they had learned,” Pluscauskas said.
FRAUDMAGAZINE | 6
“Our goal was to develop a reasonably priced solution
that was extremely well integrated with Excel (ActiveData
for Excel), thus enabling people to use it every day. An
interesting side benefit that some of our users have told us
about is that because they are using data analysis concepts
in our software on a regular basis it actually makes them
much better users of their other more expensive data
analysis products.”
Not that difficult
I hope I’ve dispelled the idea that this category of software
is difficult and moved you closer to using proactive data
detection techniques. Definitely consider some due diligence but try not to spend too much time selecting the
perfect option. Just get started fighting fraud with these
powerful tools.
— 30 —
Richard B. Lanza, CFE, CPA, PMP, is a director at CPA2Biz where he focuses on developing business solutions. He also provides audit technology and project management assistance. Lanza is the founder of the non-profit Web site,
www.auditsoftware.net. His e-mail address is: rich@auditsoftware.net. His Web site is: www.infomagician.com .
FRAUDMAGAZINE | 7
Download