SlideShare a Scribd company logo
1 of 25
Download to read offline
USING BENFORD’S LAW FOR FRAUD
DETECTION & AUDITING
AGENDA
• What is Benford’s Law?
• Conforming/Non-Conforming Data Types
• Practical Applications of Benford’s Law
• Major Digit Tests
FROM THEORY TO APPLICATION
Timeline
• 1881- Simon Newcomb
• 1938 – Frank Benford
• 1961 - Roger Pinkham
• 1992 - Mark Nigrini
Simon Newcomb: Looked at frequency of use of the different
digits in natural numbers - “A multi-digit number is more likely
to begin with ‘1’ than any other number.”
FROM THEORY TO APPLICATION
Timeline
• 1881- Simon Newcomb
• 1938 – Frank Benford
• 1961 - Roger Pinkham
• 1992 - Mark Nigrini
Frank Benford: Analyzed 20,229 sets of numbers, including, areas of
rivers, baseball averages, atomic weights, electricity bills, and more -
Multi digit numbers beginning with 1, 2 or 3 appear more frequently
than multi digit numbers beginning with 4, 5, 6,...
FROM THEORY TO APPLICATION
Timeline
• 1881- Simon Newcomb
• 1938 – Frank Benford
• 1961 - Roger Pinkham
• 1992 - Mark Nigrini
Data Sets First Digit = 1 First Digit = 2 First Digit = 3
Populations 33.9 20.4 14.2
Batting averages 32.7 17.6 12.6
Atomic weight 47.2 18.7 10.4
X-ray volts 27.917 15.7
Average 30.6% 18.5% 12.4%
FROM THEORY TO APPLICATION
Timeline
• 1881- Simon Newcomb
• 1938 – Frank Benford
• 1961 - Roger Pinkham
• 1992 - Mark Nigrini
Roger Pinkham: Research conducted revealed that Benford’s
probabilities are scale invariant.
Dr. Mark Nigrini: Published a thesis noting that Benford’s Law could be
used to detect fraud because human choices are not random, invented
numbers are unlikely to follow Benford’s Law.
BENFORD’S LAW
The number 1 occurs as the
leading digit 30.1% of the
time, while larger numbers
occur in the first digit less
frequently.
For example, the number
3879
• 3 - first digit
• 8 - second digit
• 7 - third digit
• 9 – fourth digit
BENFORD’S LAW KEY FACTS
• For naturally occurring numbers, the leading digit(s) is (are)
distributed in a specific, non-uniform way.
• While one might think that the number 1 would appear as
the first digit 11 percent of the time, it actually appears
about 30 percent of the time.
• Therefore the number 1 predominates most progressions.
• Scale invariant – works with numbers denominated as
dollars, yen, euros, pesos, rubles, etc.
• Not all data sets are suitable for analysis.
BENFORD’S LAW DEFINED
DATA TYPES
• Data set should describe similar data (e.g. town
populations)
• Large data sets
• Data that has a wide variety in the number of figures e.g.
plenty of values in the hundreds, thousands, tens of
thousands, etc.
• No built-in maximum or minimum values
• Some common characteristics of accounting data…
CONFORMING DATA TYPES
• Accounts payable transactions
• Credit card transactions
• Customer balances and refunds
• Disbursements
• Inventory prices
• Journal entries
• Loan data
• Purchase orders
• Stock prices, T&E expenses, etc.
NON-CONFORMING DATA TYPES
• Data where pre-arranged, artificial limits or numbers
influenced by thought exist, i.e. built-in max or min values
• Zip codes, telephone nos., YYMM#### as insurance policy no.
• Prices sets at thresholds ($1.99, ATM withdrawals, etc.)
• Airline passenger counts per plane
• Aggregated data
• Data sets with 500 or few transactions
• No transaction recorded - Theft, kickback, skimming,
contract rigging, etc.
USAGE OF BENFORD’S LAW
Within a comprehensive Anti-Fraud Program
Risk
Assessment
Control
Environment
Control
Activities
Information and
Communication
Specify
organizational
objectives
Monitoring
COSO Framework
BENFORD’S IN RISK-BASED AUDITS
• Early warning sign that past data patterns have changed or
abnormal activity
Data Set X represents the first digit
frequency of 10,000 vendor
invoices.
USE IN RISK-BASED AUDITS
• Risk-based audits - Early warning sign that past data
patterns have changed or abnormal activity
Data Set X represents the first digit
frequency of 10,000 vendor
invoices.
USE IN OTHER AUDITS
• Forensic audits - Check fraud, bypassing permission limits,
improper payments
• Audit of financial statements - Manipulation of checks, cash
on hand, etc.
• Corporate finance/company evaluation - Examine cash-
flow-forecasts for profit centers
USING DATA ANALYTICS (IDEA)
• 1st Digit Test
• 2nd Digit Test
• First two digits
• First three digits
• Last two digits
• Second Order Test
1ST AND 2ND DIGIT TESTS
1st Digit Test
• High Level Test - Will only identify the blinding glimpse of
the obvious
• Should not be used to select audit samples, as the sample
size will be too large
2nd Digit Test
• Also a high level test - Used to identify conformity
• Should not be used to select audit samples
FIRST TWO DIGITS TEST
• More focused and examines frequency of numerical
combinations 10 through 99 on the first two digits of a
series of numbers
• Can be used to select audit targets for preliminary review
Example:
10,000 invoices -- > 2,600 invoices
-- > (1.78% + 1.69%) x 10,000
-- > (178 + 169) = 347 invoices
Only examine invoices beginning
with the first two digits 31 and 33.
FIRST THREE DIGITS TEST
• Highly Focused - Used to select audit samples
• Tends to identify number duplication
LAST TWO DIGITS TEST
• Used to identify invented (overused) and rounded numbers
• Expected that right-side two digits be distributed evenly.
With 100 possible last two digits numbers (00, 01, 02....,
98, 99), each should occur approximately 1% of time
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
SECOND ORDER TEST
• Based on the 1st two digits in the data.
• A numeric field is sorted from the smallest to largest and
value differences between each pair of consecutive records
should follow the digit frequencies of Benford’s Law.
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
SUMMARY
• Benford Law works well to detect invented numbers when:
• One person invents all the numbers
• Lots of different people have an incentive to manipulate numbers
in the same way
• Useful first step to give a better understanding of our data
• Need to use Benford’s Law with other drill down tests to
detect fraud, errors, biases, and other anomalies
• Technology enables faster and easier to produce results
WANT TO SEE BENFORD’S LAW IN IDEA?
Contact us at salesidea@caseware.com to
schedule a demonstration
USING BENFORD’S LAW FOR FRAUD
DETECTION & AUDITING
Visit casewareanalytics.com
Email salesidea@caseware.com

More Related Content

What's hot

Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Computer aided audit techniques (CAAT) sourav mathur
Computer aided audit techniques (CAAT)  sourav mathurComputer aided audit techniques (CAAT)  sourav mathur
Computer aided audit techniques (CAAT) sourav mathursourav mathur
 
Information system audit
Information system audit Information system audit
Information system audit Jayant Dalvi
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...central university of rajasthan
 
Internal control and internal audit presentation for bank
Internal control and internal audit  presentation for bankInternal control and internal audit  presentation for bank
Internal control and internal audit presentation for bankMohammad Halim Stanikzai
 
Data driven approach to KYC
Data driven approach to KYCData driven approach to KYC
Data driven approach to KYCPankaj Baid
 
Forensic accounting ppt (2)
Forensic accounting ppt (2)Forensic accounting ppt (2)
Forensic accounting ppt (2)Shriya Gupta
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Bank audit under computerised environment
Bank audit under computerised environmentBank audit under computerised environment
Bank audit under computerised environmentsandesh mundra
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesSaurabh Rai
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accountingSrideviHV
 
Reconciliations Done Right: Automate and Scale Your Bank and Credit Card Reco...
Reconciliations Done Right: Automate and Scale Your Bank and Credit Card Reco...Reconciliations Done Right: Automate and Scale Your Bank and Credit Card Reco...
Reconciliations Done Right: Automate and Scale Your Bank and Credit Card Reco...BlackLine
 
Integrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanIntegrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanCaseWare IDEA
 
Number Systems and Binary Aritmetics
Number Systems and Binary AritmeticsNumber Systems and Binary Aritmetics
Number Systems and Binary AritmeticsDelowar Hossain
 

What's hot (20)

Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Computer aided audit techniques (CAAT) sourav mathur
Computer aided audit techniques (CAAT)  sourav mathurComputer aided audit techniques (CAAT)  sourav mathur
Computer aided audit techniques (CAAT) sourav mathur
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
Information system audit
Information system audit Information system audit
Information system audit
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
 
Internal control and internal audit presentation for bank
Internal control and internal audit  presentation for bankInternal control and internal audit  presentation for bank
Internal control and internal audit presentation for bank
 
Data driven approach to KYC
Data driven approach to KYCData driven approach to KYC
Data driven approach to KYC
 
Mobile Money Analytics
Mobile Money AnalyticsMobile Money Analytics
Mobile Money Analytics
 
Forensic accounting ppt (2)
Forensic accounting ppt (2)Forensic accounting ppt (2)
Forensic accounting ppt (2)
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Bank audit under computerised environment
Bank audit under computerised environmentBank audit under computerised environment
Bank audit under computerised environment
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit Techniques
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Caat
CaatCaat
Caat
 
Reconciliations Done Right: Automate and Scale Your Bank and Credit Card Reco...
Reconciliations Done Right: Automate and Scale Your Bank and Credit Card Reco...Reconciliations Done Right: Automate and Scale Your Bank and Credit Card Reco...
Reconciliations Done Right: Automate and Scale Your Bank and Credit Card Reco...
 
Money of the future 2015\2016
Money of the future 2015\2016Money of the future 2015\2016
Money of the future 2015\2016
 
Integrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanIntegrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit Plan
 
Number Systems and Binary Aritmetics
Number Systems and Binary AritmeticsNumber Systems and Binary Aritmetics
Number Systems and Binary Aritmetics
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 

Viewers also liked

Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsCaseWare IDEA
 
Audit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data AnalyticsAudit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data AnalyticsCaseWare IDEA
 
Perform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodPerform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodTao Li CPA,CA
 
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Jim Kaplan CIA CFE
 
Logistics Service Providers: Export Fines
Logistics Service Providers: Export FinesLogistics Service Providers: Export Fines
Logistics Service Providers: Export FinesIntegration Point
 
Anirban Dasgupta Bio - April 2016
Anirban Dasgupta Bio - April 2016Anirban Dasgupta Bio - April 2016
Anirban Dasgupta Bio - April 2016Anirban Dasgupta
 
Managing the Logistics of a Medical Device Audit
Managing the Logistics of a Medical Device AuditManaging the Logistics of a Medical Device Audit
Managing the Logistics of a Medical Device AuditGeneris
 
Data Audit – Global Logistics Company
Data Audit – Global Logistics CompanyData Audit – Global Logistics Company
Data Audit – Global Logistics CompanyOgilvy Consulting
 
S2B Group Case Study: Transportation Logistics Automation
S2B Group Case Study: Transportation Logistics AutomationS2B Group Case Study: Transportation Logistics Automation
S2B Group Case Study: Transportation Logistics AutomationInna Kotykova
 
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Jim Kaplan CIA CFE
 
Marginal Product of Labor
Marginal Product of LaborMarginal Product of Labor
Marginal Product of LaborBrian Coil
 
Business economics basics of math derivatives
Business economics   basics of math derivativesBusiness economics   basics of math derivatives
Business economics basics of math derivativesRachit Walia
 
3. internal analysis
3. internal analysis3. internal analysis
3. internal analysisdrebenkhaled
 
Stocks, flows, financial statements
Stocks, flows, financial statementsStocks, flows, financial statements
Stocks, flows, financial statementsJulio Huato
 
What is New in Track and Trace Technology?
What is New in Track and Trace Technology?What is New in Track and Trace Technology?
What is New in Track and Trace Technology?Angela Carver
 

Viewers also liked (20)

Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred Lyons
 
Benford's law
Benford's lawBenford's law
Benford's law
 
Audit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data AnalyticsAudit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data Analytics
 
Perform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodPerform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling Method
 
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
 
Teaching the Effective Use of Data in Business Coverage by Steve Doig
Teaching the Effective Use of Data in Business Coverage by Steve DoigTeaching the Effective Use of Data in Business Coverage by Steve Doig
Teaching the Effective Use of Data in Business Coverage by Steve Doig
 
Data Journalism for Business Reporting
Data Journalism for Business ReportingData Journalism for Business Reporting
Data Journalism for Business Reporting
 
Logistics Service Providers: Export Fines
Logistics Service Providers: Export FinesLogistics Service Providers: Export Fines
Logistics Service Providers: Export Fines
 
Anirban Dasgupta Bio - April 2016
Anirban Dasgupta Bio - April 2016Anirban Dasgupta Bio - April 2016
Anirban Dasgupta Bio - April 2016
 
Managing the Logistics of a Medical Device Audit
Managing the Logistics of a Medical Device AuditManaging the Logistics of a Medical Device Audit
Managing the Logistics of a Medical Device Audit
 
Data Audit – Global Logistics Company
Data Audit – Global Logistics CompanyData Audit – Global Logistics Company
Data Audit – Global Logistics Company
 
S2B Group Case Study: Transportation Logistics Automation
S2B Group Case Study: Transportation Logistics AutomationS2B Group Case Study: Transportation Logistics Automation
S2B Group Case Study: Transportation Logistics Automation
 
3g 2 Audit Administration Software Webmars Features
3g   2   Audit Administration Software Webmars   Features3g   2   Audit Administration Software Webmars   Features
3g 2 Audit Administration Software Webmars Features
 
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
 
Marginal Product of Labor
Marginal Product of LaborMarginal Product of Labor
Marginal Product of Labor
 
Business economics basics of math derivatives
Business economics   basics of math derivativesBusiness economics   basics of math derivatives
Business economics basics of math derivatives
 
3. internal analysis
3. internal analysis3. internal analysis
3. internal analysis
 
Stocks, flows, financial statements
Stocks, flows, financial statementsStocks, flows, financial statements
Stocks, flows, financial statements
 
Chap015
Chap015Chap015
Chap015
 
What is New in Track and Trace Technology?
What is New in Track and Trace Technology?What is New in Track and Trace Technology?
What is New in Track and Trace Technology?
 

Similar to Using Benford's Law for Fraud Detection and Auditing

Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussioneasternman99
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Robert Hillard
 
Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...Dr Danilo Samà
 
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...inventionjournals
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BIJen Stirrup
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...Big Data Week
 
Ch11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary DataCh11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary Datayxl007
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna CainKaren Harkavy
 

Similar to Using Benford's Law for Fraud Detection and Auditing (11)

Mathematics ib ia example
Mathematics ib ia exampleMathematics ib ia example
Mathematics ib ia example
 
Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
 
Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...
 
Prepare to practice
Prepare to practicePrepare to practice
Prepare to practice
 
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BI
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
 
Ch11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary DataCh11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary Data
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
 
Chapter12
Chapter12Chapter12
Chapter12
 

More from CaseWare IDEA

IDEA 10.3 Launch Webinar
IDEA 10.3 Launch WebinarIDEA 10.3 Launch Webinar
IDEA 10.3 Launch WebinarCaseWare IDEA
 
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues CaseWare IDEA
 
Auditor Destacado: Marcelo Barreto Rodrigues
Auditor Destacado: Marcelo Barreto Rodrigues Auditor Destacado: Marcelo Barreto Rodrigues
Auditor Destacado: Marcelo Barreto Rodrigues CaseWare IDEA
 
Auditrice Sous Les Projecteurs: Bistra Dimitrova
Auditrice Sous Les Projecteurs: Bistra Dimitrova Auditrice Sous Les Projecteurs: Bistra Dimitrova
Auditrice Sous Les Projecteurs: Bistra Dimitrova CaseWare IDEA
 
How to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital worldHow to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital worldCaseWare IDEA
 
Auditor Descado - Robert Berry
Auditor Descado - Robert BerryAuditor Descado - Robert Berry
Auditor Descado - Robert BerryCaseWare IDEA
 
Auditeur sous les Projecteurs - Robert Berry
Auditeur sous les Projecteurs - Robert BerryAuditeur sous les Projecteurs - Robert Berry
Auditeur sous les Projecteurs - Robert BerryCaseWare IDEA
 
Auditor Spotlight: Robert Berry
Auditor Spotlight: Robert Berry Auditor Spotlight: Robert Berry
Auditor Spotlight: Robert Berry CaseWare IDEA
 
The Data Behind Audit Analytics
The Data Behind Audit AnalyticsThe Data Behind Audit Analytics
The Data Behind Audit AnalyticsCaseWare IDEA
 
Auditora Destacada - Anke Eckardt
Auditora Destacada - Anke EckardtAuditora Destacada - Anke Eckardt
Auditora Destacada - Anke EckardtCaseWare IDEA
 
Auditeur sous les Projecteurs - Anke Eckardt
Auditeur sous les Projecteurs - Anke EckardtAuditeur sous les Projecteurs - Anke Eckardt
Auditeur sous les Projecteurs - Anke EckardtCaseWare IDEA
 
Audit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy stepsAudit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy stepsCaseWare IDEA
 
How to find new ways to add value to your audits
How to find new ways to add value to your auditsHow to find new ways to add value to your audits
How to find new ways to add value to your auditsCaseWare IDEA
 
Auditor Spotlight - Erin Baker
Auditor Spotlight - Erin BakerAuditor Spotlight - Erin Baker
Auditor Spotlight - Erin BakerCaseWare IDEA
 
Auditeur Sous Les Projecteurs: Fred Lyons
Auditeur Sous Les Projecteurs: Fred LyonsAuditeur Sous Les Projecteurs: Fred Lyons
Auditeur Sous Les Projecteurs: Fred LyonsCaseWare IDEA
 
Auditeur Sous Les Projecteurs: Erin Baker
Auditeur Sous Les Projecteurs: Erin BakerAuditeur Sous Les Projecteurs: Erin Baker
Auditeur Sous Les Projecteurs: Erin BakerCaseWare IDEA
 
Auditor Destacado - Fred Lyons
Auditor Destacado - Fred LyonsAuditor Destacado - Fred Lyons
Auditor Destacado - Fred LyonsCaseWare IDEA
 
Why You Need to STOP Using Spreadsheets for Audit Analysis
Why You Need to STOP Using Spreadsheets for Audit AnalysisWhy You Need to STOP Using Spreadsheets for Audit Analysis
Why You Need to STOP Using Spreadsheets for Audit AnalysisCaseWare IDEA
 
The Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringThe Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringCaseWare IDEA
 
Audit: Breaking Down Barriers to Increase the Use of Data Analytics
Audit: Breaking Down Barriers to Increase the Use of Data AnalyticsAudit: Breaking Down Barriers to Increase the Use of Data Analytics
Audit: Breaking Down Barriers to Increase the Use of Data AnalyticsCaseWare IDEA
 

More from CaseWare IDEA (20)

IDEA 10.3 Launch Webinar
IDEA 10.3 Launch WebinarIDEA 10.3 Launch Webinar
IDEA 10.3 Launch Webinar
 
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
 
Auditor Destacado: Marcelo Barreto Rodrigues
Auditor Destacado: Marcelo Barreto Rodrigues Auditor Destacado: Marcelo Barreto Rodrigues
Auditor Destacado: Marcelo Barreto Rodrigues
 
Auditrice Sous Les Projecteurs: Bistra Dimitrova
Auditrice Sous Les Projecteurs: Bistra Dimitrova Auditrice Sous Les Projecteurs: Bistra Dimitrova
Auditrice Sous Les Projecteurs: Bistra Dimitrova
 
How to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital worldHow to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital world
 
Auditor Descado - Robert Berry
Auditor Descado - Robert BerryAuditor Descado - Robert Berry
Auditor Descado - Robert Berry
 
Auditeur sous les Projecteurs - Robert Berry
Auditeur sous les Projecteurs - Robert BerryAuditeur sous les Projecteurs - Robert Berry
Auditeur sous les Projecteurs - Robert Berry
 
Auditor Spotlight: Robert Berry
Auditor Spotlight: Robert Berry Auditor Spotlight: Robert Berry
Auditor Spotlight: Robert Berry
 
The Data Behind Audit Analytics
The Data Behind Audit AnalyticsThe Data Behind Audit Analytics
The Data Behind Audit Analytics
 
Auditora Destacada - Anke Eckardt
Auditora Destacada - Anke EckardtAuditora Destacada - Anke Eckardt
Auditora Destacada - Anke Eckardt
 
Auditeur sous les Projecteurs - Anke Eckardt
Auditeur sous les Projecteurs - Anke EckardtAuditeur sous les Projecteurs - Anke Eckardt
Auditeur sous les Projecteurs - Anke Eckardt
 
Audit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy stepsAudit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy steps
 
How to find new ways to add value to your audits
How to find new ways to add value to your auditsHow to find new ways to add value to your audits
How to find new ways to add value to your audits
 
Auditor Spotlight - Erin Baker
Auditor Spotlight - Erin BakerAuditor Spotlight - Erin Baker
Auditor Spotlight - Erin Baker
 
Auditeur Sous Les Projecteurs: Fred Lyons
Auditeur Sous Les Projecteurs: Fred LyonsAuditeur Sous Les Projecteurs: Fred Lyons
Auditeur Sous Les Projecteurs: Fred Lyons
 
Auditeur Sous Les Projecteurs: Erin Baker
Auditeur Sous Les Projecteurs: Erin BakerAuditeur Sous Les Projecteurs: Erin Baker
Auditeur Sous Les Projecteurs: Erin Baker
 
Auditor Destacado - Fred Lyons
Auditor Destacado - Fred LyonsAuditor Destacado - Fred Lyons
Auditor Destacado - Fred Lyons
 
Why You Need to STOP Using Spreadsheets for Audit Analysis
Why You Need to STOP Using Spreadsheets for Audit AnalysisWhy You Need to STOP Using Spreadsheets for Audit Analysis
Why You Need to STOP Using Spreadsheets for Audit Analysis
 
The Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringThe Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls Monitoring
 
Audit: Breaking Down Barriers to Increase the Use of Data Analytics
Audit: Breaking Down Barriers to Increase the Use of Data AnalyticsAudit: Breaking Down Barriers to Increase the Use of Data Analytics
Audit: Breaking Down Barriers to Increase the Use of Data Analytics
 

Recently uploaded

Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfNicoChristianSunaryo
 
Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfPratikPatil591646
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...Jack Cole
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaManalVerma4
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfnikeshsingh56
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are successPratikSingh115843
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etclalithasri22
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformationAnnie Melnic
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelBoston Institute of Analytics
 

Recently uploaded (17)

Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdf
 
Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdf
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in India
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdf
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are success
 
2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etc
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformation
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
 

Using Benford's Law for Fraud Detection and Auditing

  • 1. USING BENFORD’S LAW FOR FRAUD DETECTION & AUDITING
  • 2. AGENDA • What is Benford’s Law? • Conforming/Non-Conforming Data Types • Practical Applications of Benford’s Law • Major Digit Tests
  • 3. FROM THEORY TO APPLICATION Timeline • 1881- Simon Newcomb • 1938 – Frank Benford • 1961 - Roger Pinkham • 1992 - Mark Nigrini Simon Newcomb: Looked at frequency of use of the different digits in natural numbers - “A multi-digit number is more likely to begin with ‘1’ than any other number.”
  • 4. FROM THEORY TO APPLICATION Timeline • 1881- Simon Newcomb • 1938 – Frank Benford • 1961 - Roger Pinkham • 1992 - Mark Nigrini Frank Benford: Analyzed 20,229 sets of numbers, including, areas of rivers, baseball averages, atomic weights, electricity bills, and more - Multi digit numbers beginning with 1, 2 or 3 appear more frequently than multi digit numbers beginning with 4, 5, 6,...
  • 5. FROM THEORY TO APPLICATION Timeline • 1881- Simon Newcomb • 1938 – Frank Benford • 1961 - Roger Pinkham • 1992 - Mark Nigrini Data Sets First Digit = 1 First Digit = 2 First Digit = 3 Populations 33.9 20.4 14.2 Batting averages 32.7 17.6 12.6 Atomic weight 47.2 18.7 10.4 X-ray volts 27.917 15.7 Average 30.6% 18.5% 12.4%
  • 6. FROM THEORY TO APPLICATION Timeline • 1881- Simon Newcomb • 1938 – Frank Benford • 1961 - Roger Pinkham • 1992 - Mark Nigrini Roger Pinkham: Research conducted revealed that Benford’s probabilities are scale invariant. Dr. Mark Nigrini: Published a thesis noting that Benford’s Law could be used to detect fraud because human choices are not random, invented numbers are unlikely to follow Benford’s Law.
  • 7. BENFORD’S LAW The number 1 occurs as the leading digit 30.1% of the time, while larger numbers occur in the first digit less frequently. For example, the number 3879 • 3 - first digit • 8 - second digit • 7 - third digit • 9 – fourth digit
  • 8. BENFORD’S LAW KEY FACTS • For naturally occurring numbers, the leading digit(s) is (are) distributed in a specific, non-uniform way. • While one might think that the number 1 would appear as the first digit 11 percent of the time, it actually appears about 30 percent of the time. • Therefore the number 1 predominates most progressions. • Scale invariant – works with numbers denominated as dollars, yen, euros, pesos, rubles, etc. • Not all data sets are suitable for analysis.
  • 10. DATA TYPES • Data set should describe similar data (e.g. town populations) • Large data sets • Data that has a wide variety in the number of figures e.g. plenty of values in the hundreds, thousands, tens of thousands, etc. • No built-in maximum or minimum values • Some common characteristics of accounting data…
  • 11. CONFORMING DATA TYPES • Accounts payable transactions • Credit card transactions • Customer balances and refunds • Disbursements • Inventory prices • Journal entries • Loan data • Purchase orders • Stock prices, T&E expenses, etc.
  • 12. NON-CONFORMING DATA TYPES • Data where pre-arranged, artificial limits or numbers influenced by thought exist, i.e. built-in max or min values • Zip codes, telephone nos., YYMM#### as insurance policy no. • Prices sets at thresholds ($1.99, ATM withdrawals, etc.) • Airline passenger counts per plane • Aggregated data • Data sets with 500 or few transactions • No transaction recorded - Theft, kickback, skimming, contract rigging, etc.
  • 13. USAGE OF BENFORD’S LAW Within a comprehensive Anti-Fraud Program Risk Assessment Control Environment Control Activities Information and Communication Specify organizational objectives Monitoring COSO Framework
  • 14. BENFORD’S IN RISK-BASED AUDITS • Early warning sign that past data patterns have changed or abnormal activity Data Set X represents the first digit frequency of 10,000 vendor invoices.
  • 15. USE IN RISK-BASED AUDITS • Risk-based audits - Early warning sign that past data patterns have changed or abnormal activity Data Set X represents the first digit frequency of 10,000 vendor invoices.
  • 16. USE IN OTHER AUDITS • Forensic audits - Check fraud, bypassing permission limits, improper payments • Audit of financial statements - Manipulation of checks, cash on hand, etc. • Corporate finance/company evaluation - Examine cash- flow-forecasts for profit centers
  • 17. USING DATA ANALYTICS (IDEA) • 1st Digit Test • 2nd Digit Test • First two digits • First three digits • Last two digits • Second Order Test
  • 18. 1ST AND 2ND DIGIT TESTS 1st Digit Test • High Level Test - Will only identify the blinding glimpse of the obvious • Should not be used to select audit samples, as the sample size will be too large 2nd Digit Test • Also a high level test - Used to identify conformity • Should not be used to select audit samples
  • 19. FIRST TWO DIGITS TEST • More focused and examines frequency of numerical combinations 10 through 99 on the first two digits of a series of numbers • Can be used to select audit targets for preliminary review Example: 10,000 invoices -- > 2,600 invoices -- > (1.78% + 1.69%) x 10,000 -- > (178 + 169) = 347 invoices Only examine invoices beginning with the first two digits 31 and 33.
  • 20. FIRST THREE DIGITS TEST • Highly Focused - Used to select audit samples • Tends to identify number duplication
  • 21. LAST TWO DIGITS TEST • Used to identify invented (overused) and rounded numbers • Expected that right-side two digits be distributed evenly. With 100 possible last two digits numbers (00, 01, 02...., 98, 99), each should occur approximately 1% of time Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 22. SECOND ORDER TEST • Based on the 1st two digits in the data. • A numeric field is sorted from the smallest to largest and value differences between each pair of consecutive records should follow the digit frequencies of Benford’s Law. Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 23. SUMMARY • Benford Law works well to detect invented numbers when: • One person invents all the numbers • Lots of different people have an incentive to manipulate numbers in the same way • Useful first step to give a better understanding of our data • Need to use Benford’s Law with other drill down tests to detect fraud, errors, biases, and other anomalies • Technology enables faster and easier to produce results
  • 24. WANT TO SEE BENFORD’S LAW IN IDEA? Contact us at salesidea@caseware.com to schedule a demonstration
  • 25. USING BENFORD’S LAW FOR FRAUD DETECTION & AUDITING Visit casewareanalytics.com Email salesidea@caseware.com

Editor's Notes

  1. Benford’s Law does not apply to all sets of numbers. For it to apply the numbers must reflect the size of some phenomenon; big numbers must refer to big things. There must be no built-in maximum or minimum values. Tax returns have minimum or maximum amounts in various places. The numbers must not be labels such as highway numbers, social security numbers, or flight numbers. Accounting Data usually conforms.
  2. Examines the frequency of the numerical combinations 10 through 99 on the first two digits of a series of numbers. In particular the output serves for the analysis of avoided threshold values. Thus, these tests help to clearly visualize when order or permission limits have been systematically avoided Example: We detected an abundance of invoices beginning with 3. Based upon that review, we need to examine approximately 2,600 invoices.   However, using the first two digits test, we can see that not all of the invoices need to be examined. Instead, we need only examine those invoices beginning with the first two digits 31 and 33. As you can see in the chart, these are the first two digits whose actual frequencies differ the most from their expected frequencies (-.40 and -.39, respectively). Therefore, if we focus on numbers beginning with 31 or 33, we only need to review 347 (178 + 169) invoices. This was calculated by multiplying 1.78% (actual frequency percentage for the first two digits 31) by 10,000 (number of total invoices) and adding that to 1.69% (actual frequency percentage for the first two digits 33) times 10,000 (number of total invoices). This test results in a required audit sample of more than 2,000 fewer invoices — certainly a more efficient and focused sample