SlideShare a Scribd company logo
1 of 14
Download to read offline
Visual analytics
                           Revealing corruption,
                           fraud, waste and abuse




Deloitte Forensic Center
Although humans receive, evaluate and accumulate
“Between the birth of the world and 2003, there were five                        more information now than ever before, the rich
                                                                                 insights within that data may be difficult to identify
exabytes of information created. We [now] create five                            by traditional means and often remain hidden. Yet, in
exabytes every two days. See why it’s so painful to operate                      the realm of fraud detection for example, the ability
                                                                                 to reveal relationships, communications, locations and
in information markets?”1                                                        patterns can make the difference between uncovering a
                                                                                 fraud scheme at an early stage and having it grow into a
                                                                                 major incident.
                    So said global technology executive Eric Schmidt in 2010
                    and anyone who has tried to clear their email inbox can      Against this backdrop, practitioners are turning to visual
                    relate to that. Schmidt’s comment shows why “the sexy        analytic tools and techniques to detect and reduce
                    job in the next ten years” will be “to access, understand,   corruption, fraud, waste and abuse in the enterprise.
                    and communicate the insights you get from data               From money-laundering schemes to bribery violations of
                    analysis.”2                                                  the U.S. Foreign Corrupt Practices Act and other anti-
                                                                                 corruption laws, from manipulating financial statements
                                                                                 by reporting fictitious revenues to inappropriate
                                                                                 purchases using p-cards, graphically representing and
                                                                                 exploring data can bring clarity to executives’ concerns
                                                                                 and to performance improvement opportunities.
                                                                                  Eric Schmidt speaking at Zeitgeist Europe 2010, recorded at 19.48 minutes
                                                                                 1	

                                                                                  in the video http://www.youtube.com/watch?v=Qr2-2XY_QsQ.

                                                                                  Hal Varian on How the Web Challenges Managers, McKinsey Quarterly,
                                                                                 2	

                                                                                  January 2009.


                                                                                 As used in this document Deloitte means Deloitte Financial Advisory
                                                                                 Services LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/
                                                                                 about for a detailed description of the legal structure of Deloitte LLP and its
                                                                                 subsidiaries. Certain services may not be available to attest clients under the
                                                                                 rules and regulations of public accounting.

                                                                                                                                                              1
Beyond spreadsheets

         While spreadsheets offer a quick way to understand
         simple facts and figures, their utility diminishes as the
         data grow in volume and complexity. Visual analytics
         builds on humans’ natural ability to absorb a greater
         volume of information in visual than in numeric form
         and to perceive certain patterns, shapes and shades
         more easily than others.

         Visual representations such as word clouds, which
         display words in a size that reflects their frequency of
         use (Figure 1), and social networking diagrams, which         Figure 1. Word cloud
         indicate relationships within a given community (Figure
         2), are good examples of expressing complex data in a
         form that can be understood intuitively.

         Using mathematical techniques to evaluate patterns and
         outliers, effective visuals can translate multidimensional
         data such as frequency, time, and relationships into an
         intuitive picture.

         Consider a project to identify potential fictitious vendors
         that may have been created by an entity’s employees
         to receive payments generated by phony invoices and
         purchase orders. A traditional detection technique
         would be to list the invoice or purchase order numbers
         on a spreadsheet and sort them to identify numbers
         that are repeated, occur out of sequence, or increase
         by unusually small amounts over time (suggesting the
         vendor has few or no other customers).
                                                                       Figure 2. Social networking diagram

                                                                                                             2
It may be easier to spot anomalies among a group of                  This type of data analysis capability was once reserved
                         vendors by generating a graphic such as the one in                   for a small number of highly trained specialists. Yet
                         Figure 3. This chart shows, for each of many vendors,                recent software advances have made this capability
                         lines connecting the purchase order numbers relating to              available to people such as compliance officers, internal
                         each of that vendor’s invoices over a three-year period.             auditors, fraud investigators and operations personnel
                         An analyst can identify some potential wrongdoing                    with just a short learning curve.
                         relatively quickly because the transactions highlighted
                         in red have purchase order numbers that either are                   Where applications have traditionally offered static
                         repeated or run out of sequence. There may be valid                  reports, these advances create dynamic environments
                         reasons for these anomalies, but experience suggests                 that enable findings to be explored visually. Professionals
                         they merit further investigation.                                    with knowledge of their specific business domains can
                                                                                              formulate hypotheses, test them and receive results
                                                                                              instantly as they make changes to queries. As a result,
                                                                                              visual analytics can augment one’s ability to explore, test
                                                                                              and confirm hypotheses more quickly.




Figure 3. Purchase order numbers used for each of multiple vendors over a three-year period
                                                                                                                                                          3
Visual whistleblowing?

         In its 2010 Report to the Nations on Occupational Fraud               Tree maps
         and Abuse, compiled from a study of 1,843 cases of                    Tree maps are a type of heat map in which a rectangular
         occupational fraud that occurred worldwide between                    space is divided into regions, and then each region is
         January 2008 and December 2009, the Association of                    divided again for each level in the hierarchy. The size
         Certified Fraud Examiners highlighted that 40 percent                 and shading of the rectangles represent two additional
         of these frauds were identified by tips, the largest single           data points, allowing the viewer to identify patterns in
         method of fraud detection.3 While the Sarbanes-Oxley                  complex data. The original motivation for tree maps
         Act of 2002 and the Dodd-Frank Act of 2010 included                   was to show the contents of computer hard disks with
         measures to encourage the use of whistleblowing                       tens of thousands of files in 5-15 levels of directories.
         to detect corporate fraud, this still leaves another 60               Tree maps are especially effective in showing data
         percent of frauds to be detected by other means. Data                 represented by several dimensions (e.g., region, facility,
         analytics, and visual analytics in particular, may be the             account, and product line). The hierarchical structure
         breakthrough companies are seeking in anti-fraud                      provided by tree maps can reveal such multi-faceted
         techniques.                                                           information more quickly than spreadsheets, bar charts
                                                                               or line graphs.
         While financial services companies are at the forefront
         of using visual analytics techniques to combat money
         laundering, conduct trading analyses, and perform
         continuous monitoring, their use in other industries is
         growing as internal audit and compliance functions
         are often being asked to enhance risk management
         effectiveness but with fewer resources. The growing
         diversity of uses is matched by the variety of visual
         analytics techniques available, of which we present a
         selection below.




          Association of Certified Fraud Examiners, Report to the Nations on
         3	

          Occupational Fraud and Abuse, 2010 at 16.
                                                                                                                                        4
Figure 4, for example, translates a table of vendor                      Even without understanding the data, the viewer
payments and risk scores for many vendors into a                         is drawn to the larger red squares. These vendors
tree map. The five regions of the tree map represent                     present the most risk and the analyst can begin making
the vendor categories, with each individual rectangle                    assessments based also on the size of the vendor and
representing individual vendors. The shading is an                       category.
indication of the risk score associated with a vendor.




Figure 4. Tree map showing vendor risk by vendor category and payments
                                                                                                                                  5
Link analysis
                                        Identifying hidden relationships, demonstrating complex       Here, based on data from multiple sources, visual
                                        networks and tracking the movement of money is                connections are made between a variety of entities
                                        difficult using tabular methods. For this reason, link        that share an address and bank account number and
                                        analysis, one of the more common visual analytics             a fictitious vendor created to embezzle funds from
                                        techniques, has been successfully deployed to combat          a company. Link analysis is particularly effective for
                                        those issues. This approach is particularly useful in anti-   identifying indirect relationships and those that may be
                                        money laundering investigations. Figure 5 shows an            connected only through several intermediaries.
                                        example of using link analysis to identify unexpected
                                        relationships.                                                In the realm of electronic discovery, data analytics
                                                                                                      software can help lawyers to identify changes over time
                                                                                                      in communications and social networks, and let them
                                                                                                      explore clusters of various words and ideas – “concept
                                                                                                      clusters” – used by those involved in the matter.4 Using
                                                                                                      link analysis to associate communications like email and
                                                                                                      instant messages with events and individuals may also
                                                                                                      reveal connections among custodians and new topics at
                                                                                                      the earliest stages of case assessment. These techniques
                                                                                                      can create efficiencies in the document review and
                                                                                                      production process, help craft discovery requests and
                                                                                                      responses, and impact strategic case decisions.




Figure 5. Link analysis showing a fictitious vendor, related entities and a shared bank account




                                                                                                                                                                 6
Geospatial analysis
                                      Financial transactions, asset information, customer data,   Figures 6 through 9 show how a Geographic
                                      and contracts, among many others, are records that          Information System (GIS) can be used to transform
                                      may contain a reference to a location including a place     tabular data into location-specific clues to wrongdoing.
                                      name and an address. In a geospatial analysis, visual       This example relates to health care fraud.
                                      analytics shows intersections between this data and its
                                      location, helping to uncover a hidden relationship.         Figure 6 illustrates geocoding, the process of converting
                                                                                                  an address, place name or location reference into
                                                                                                  latitude and longitude coordinates that can be placed
                                                                                                  on a map. Here, we show a list of certain health
                                                                                                  care clinic addresses in Miami, Florida, and their
                                                                                                  corresponding locations by latitude and longitude,
                                                                                                  shown as red dots.




                                                                                                   John Markoff, Armies of Expensive Lawyers, Replaced by Cheaper
                                                                                                  4	

                                                                                                   Software, The New York Times, March 4, 2011.
Figure 6. Geocoding an address into latitude and longitude coordinates




                                                                                                                                                                    7
A map symbol’s size, shading and shape can each                                Figure 7 begins to tell a story of the transactions at issue
indicate an attribute of the clinic. In Figure 7, the                          by supplementing the location data with the number of
symbol’s size indicates the number of reimbursement                            claims filed for each facility.
claims submitted for services provided at each location
to senior citizens. Further detail could be added by
labeling each symbol with the attribute value itself,
namely the number of transactions.




                                         HYPOTHETICAL SCENARIO




Figure 7. Map of certain clinics with dot size representing their volume of reimbursement claims

                                                                                                                                          8
One can easily identify the large outlier     Since the facility in question is located 20
                                                                       from the data simply by studying              miles away from the socio-demographic
                                                                       the purple dots, since it is so much          profile of a typical beneficiary (as
                                                                       larger than the other purple dots and         indicated in Figure 9), this analysis raises
                                                                       is located away from the others. But          additional red flags, justifying further
                                                                       one would also expect to see the              investigation. Similar analysis could be
                                                                       largest number of claims in the area          used for the other clinics, which may
                                                                       populated by senior citizens and lower        reveal anomalies that are more subtle and
                                                                       income residents for whom services are        harder to spot with simpler tests.
                                                                       eligible for reimbursement. The highest
                                                                       concentration of these people can be          Visual analytics can help to focus
                                                                       seen in red on the heat map in Figure 8.      investigations on particular activities and
                                                                                                                     connect disparate pieces of information
Figure 8. Heat map showing concentration of population age 65 & over   A cluster analysis of patient addresses for   to form a cohesive story. In the above
                                                                       the large outlier clinic (light blue points   example, symbols depicting clinic
                                                                       in figure 9) reveals:                         locations and transaction volume, along
                                                                                                                     with a patient profile attribute (such as
                                                                       •	 Patients are retirement or nursing         the concentration of residents aged 65
                                                                          home residents                             and over, shown as a heat map) provide
                                                                       •	 Patients are low income senior citizens    more vivid detail than the statistics
                                                                       •	 They live outside the average drive-       themselves.
                                                                          time distance to a clinic
                                                                                                                     One could also overlay market
                                                                                                                     segmentation data on the clinic addresses
                                                                                                                     and run queries to determine statistically
                                                                                                                     significant relationships between facilities.




Figure 9. Overlay of patients’ addresses (light blue)
                                                                                                                                                                   9
Conclusion

                                  Identifying potential corruption, fraud, waste and
                                  abuse in large volumes of data has historically been
                                  difficult and quite costly. New visual analytics tools
                                  and techniques can enable compliance personnel, risk
                                  managers and others to “do more with less” by helping
                                  to identify previously hidden patterns. Entities should
                                  consider equipping their personnel to employ these
                                  techniques to meet the growing challenge of reducing
                                  corruption, fraud, waste and abuse in the enterprise.
                                                                                                        Deloitte Forensic Center
                                  This article is published as part of ForThoughts, the                 The Deloitte Forensic Center is a think tank aimed at
                                  Deloitte Forensic Center’s newsletter series, which is                exploring new approaches for mitigating the costs, risks
                                  edited by Toby Bishop, director of the Deloitte Forensic              and effects of fraud, corruption, and other issues facing
                                  Center. ForThoughts highlights trends and issues in                   the global business community.
                                  fraud, corruption, and other complex business issues.
                                  To subscribe to ForThoughts, visit                                    The Center aims to advance the state of thinking in
                                  www.deloitte.com/forensiccenter or send an e-mail                     areas such as fraud and corruption by exploring issues
                                  to dfc@deloitte.com.                                                  from the perspective of forensic accountants, corporate
                                                                                                        leaders, and other professionals involved in forensic
                                                                                                        matters.
Authors                                                                                                 The Deloitte Forensic Center is sponsored by Deloitte
Tony DeSantis is a principal in the Analytic and Forensic Technology practice of Deloitte Financial     Financial Advisory Services LLP. Please visit www.
Advisory Services LLP. He may be reached at andesantis@deloitte.com.
                                                                                                        deloitte.com/forensiccenter or scan the code for
Matthew Gentile is a principal in the Analytic and Forensic Technology practice of Deloitte Financial   more information.
Advisory Services LLP. He may be reached at magentile@deloitte.com.

Rich Simon is a senior manager in the Analytic and Forensic Technology practice of Deloitte
Financial Advisory Services LLP. He may be reached at risimon@deloitte.com.


                                                                                                                                                                10
Deloitte Forensic Center

         The following material is available on the Deloitte        •	 The Cost of Fraud: Strategies for Managing a Growing
         Forensic Center Web site www.deloitte.com/                    Expense
         forensiccenter or from dfc@deloitte.com.                   •	 Compliance and Integrity Risk: Getting M&A Pricing
                                                                       Right
         Deloitte Forensic Center book:                             •	 Procurement Fraud and Corruption: Sourcing from
         •	 Corporate Resiliency: Managing the Growing Risk of         Asia
            Fraud and Corruption
                                                                    •	 Ten Things about Financial Statement Fraud - Third
            –– Chapter 1 available for download                        edition
                                                                    •	 The Expanded False Claims Act: FERA Creates New
         ForThoughts newsletters:
                                                                       Risks
         •	 Anti-Corruption Practices Survey 2011: Cloudy with a
                                                                    •	 Avoiding Fraud: It’s Not Always Easy Being Green
            Chance of Prosecution?
                                                                    •	 Foreign Corrupt Practices Act (FCPA) Due Diligence in
         •	 Fraud, Bribery and Corruption: Protecting Reputation
                                                                       M&A
            and Value	
                                                                    •	 The Fraud Enforcement and Recovery Act “FERA”
         •	 Ten Things to Improve Your Next Internal
            Investigation: Investigators Share Experiences          •	 Ten Things About Bankruptcy and Fraud
         •	 Sustainability Reporting: Managing Risks and            •	 Applying Six Degrees of Separation to Preventing
            Opportunities                                              Fraud
         •	 The Inside Story: The Changing Role of Internal Audit   •	 India and the FCPA
            in Dealing with Financial Fraud                         •	 Helping to Prevent University Fraud
         •	 Major Embezzlements: How Can they Get So Big?           •	 Avoiding FCPA Risk While Doing Business in China
         •	 Whistleblowing and the New Race to Report: The          •	 The Shifting Landscape of Health Care Fraud and
            Impact of the Dodd-Frank Act and 2010’s Changes to         Regulatory Compliance
            the U.S. Federal Sentencing Guidelines                  •	 Some of the Leading Practices in FCPA Compliance
         •	 Technology Fraud: The Lure of Private Companies         •	 Monitoring Hospital-Physician Contractual
         •	 E-discovery: Mitigating Risk Through Better                Arrangements to Comply with Changing Regulations
            Communication                                           •	 Managing Fraud Risk: Being Prepared
         •	 White-Collar Crime: Preparing for Enhanced              •	 Ten Things about Fraud Control
            Enforcement
                                                                                                                          11
Notable material in other publications:                    •	 Where There’s Smoke, There’s Fraud, CFO magazine,
•	 The Hidden Risks of Doing Business in Brazil, Agenda,      March 2011
   October 2011                                            •	 Will New Regulations Deter Corporate Fraud?
•	 High Tide: From Paying For Transparency To ‘I Did Not      Financial Executive, January 2011
   Pay A Bribe’, WSJ.com, September 2011                   •	 The Countdown to a Whistleblower Bounty Begins,
•	 Executives Worry About Corruption Risks: Survey,           Compliance Week, November 9, 2010
   Reuters, September 2011                                 •	 Deploying Countermeasures to the SEC’s Dodd-Frank
•	 Whistleblowing After Dodd-Frank — Timely Actions           Whistleblower Awards, Business Crimes Bulletin,
   for Compliance Executives to Consider, Corporate           October 2010
   Compliance Insights, September 2011                     •	 Temptation to Defraud, Internal Auditor magazine,
•	 Corporate Criminals Face Tougher Penalties, Inside         October 2010
   Counsel, August 2011                                    •	 Shop Talk: Compliance Risks in New Data
•	 Follow the Money: Worldcom to ‘Whitey,’ CFOworld,          Technologies, Compliance Week, July 2010
   July 2011                                               •	 Many Companies Ill-Equipped to Handle Social Media
•	 Whistleblower Rules Could Set Off a Rash of Internal       e-discovery, BoardMember.com, June 2010
   Investigations, Compliance Week, June 2011              •	 Many Companies Expect to Face Difficulties in
•	 Whistleblowing After Dodd-Frank: New Risks, New            Assessing Financial Statement Fraud Risks, BNA
   Responses, WSJ Professional, May 2011                      Corporate Accountability Report, May 2010
•	 The Government Will Pay You Big Bucks to Find the       •	 Who’s Allegedly ‘Cooking the Books’ and Where?,
   Next Madoff, Forbes.com, May 2011                          Business Crimes Bulletin, January 2010
•	 Major Embezzlements: When Minor Risks Become            •	 Being Ready for the Worst, Fraud Magazine,
   Strategic Threats, Business Crimes Bulletin, May 2011      November/December 2009
•	 As Bulging Client Data Heads for the Cloud, Law Firms   •	 Mapping Your Fraud Risks, Harvard Business Review,
   Ready for a Storm, and More Discovery Woes from            October 2009
   Web 2.0, ABA Journal, April 2011                        •	 Listen to Your Whistleblowers, Corporate Board
•	 The Dodd-Frank Act’s Robust Whistleblowing                 Member, Third Quarter, 2009
   Incentives, Forbes.com, April 2011                      •	 Use Heat Maps to Expose Rare but Dangerous Frauds,
                                                              HBR NOW, June 2009
                                                                                                              12
This publication contains general information only and is based on the experiences and research of Deloitte practitioners. Deloitte
is not, by means of this publication, rendering accounting, auditing, business, financial, investment, legal, or other professional
advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any
decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you
should consult a qualified professional advisor.

Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this publication.

Copyright © 2011 Deloitte Development LLC. All rights reserved.
Member of Deloitte Touche Tohmatsu Limited

More Related Content

Similar to Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse

Anomaly42 Context Data Broker FINAL 5
Anomaly42 Context Data Broker FINAL 5Anomaly42 Context Data Broker FINAL 5
Anomaly42 Context Data Broker FINAL 5Freddie McMahon
 
White_Paper_Beyond_Visualisation copy
White_Paper_Beyond_Visualisation copyWhite_Paper_Beyond_Visualisation copy
White_Paper_Beyond_Visualisation copyTania Mushtaq
 
The business-case-for-advanced-data-visualization
The business-case-for-advanced-data-visualizationThe business-case-for-advanced-data-visualization
The business-case-for-advanced-data-visualizationInyene Edwin Etefia
 
Global Technology Outlook 2012 Booklet
Global Technology Outlook 2012 BookletGlobal Technology Outlook 2012 Booklet
Global Technology Outlook 2012 BookletIBM Danmark
 
Pivotal CRM - Analytics
Pivotal CRM - Analytics Pivotal CRM - Analytics
Pivotal CRM - Analytics Pivotal CRM
 
Whitepaper: Big Data 101 - Creating Real Value from the Data Lifecycle - Happ...
Whitepaper: Big Data 101 - Creating Real Value from the Data Lifecycle - Happ...Whitepaper: Big Data 101 - Creating Real Value from the Data Lifecycle - Happ...
Whitepaper: Big Data 101 - Creating Real Value from the Data Lifecycle - Happ...Happiest Minds Technologies
 
Big Data 101 - Creating Real Value from the Data Lifecycle - Happiest Minds
 Big Data 101 - Creating Real Value from the Data Lifecycle - Happiest Minds Big Data 101 - Creating Real Value from the Data Lifecycle - Happiest Minds
Big Data 101 - Creating Real Value from the Data Lifecycle - Happiest Mindshappiestmindstech
 
Over 70% of all acquisitions never realize their potential
Over 70% of all acquisitions never realize their potentialOver 70% of all acquisitions never realize their potential
Over 70% of all acquisitions never realize their potentialTom Rieger
 
The serendipity economy
The serendipity economy The serendipity economy
The serendipity economy Office
 
Artificial Intelligence Impacts
Artificial Intelligence ImpactsArtificial Intelligence Impacts
Artificial Intelligence ImpactsFarooq Omar
 
Artificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceArtificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceFarooq Omar
 
Social Models, Trusted Clouds
Social Models, Trusted CloudsSocial Models, Trusted Clouds
Social Models, Trusted CloudsPeter Coffee
 
The Trouble With Enterprise SoftwareF A L L 2 0 0 7 .docx
The Trouble With Enterprise SoftwareF A L L  2 0 0 7    .docxThe Trouble With Enterprise SoftwareF A L L  2 0 0 7    .docx
The Trouble With Enterprise SoftwareF A L L 2 0 0 7 .docxssusera34210
 
tugas e business nova veronika.pptx
tugas e business nova veronika.pptxtugas e business nova veronika.pptx
tugas e business nova veronika.pptxTatawarsita
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
Optimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITOptimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITcapstera
 
Aligning business and tech thru capabilities - A capstera thought paper
Aligning business and tech thru capabilities  - A capstera thought paperAligning business and tech thru capabilities  - A capstera thought paper
Aligning business and tech thru capabilities - A capstera thought paperSatyaIluri
 

Similar to Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse (20)

Anomaly42 Context Data Broker FINAL 5
Anomaly42 Context Data Broker FINAL 5Anomaly42 Context Data Broker FINAL 5
Anomaly42 Context Data Broker FINAL 5
 
White_Paper_Beyond_Visualisation copy
White_Paper_Beyond_Visualisation copyWhite_Paper_Beyond_Visualisation copy
White_Paper_Beyond_Visualisation copy
 
The business-case-for-advanced-data-visualization
The business-case-for-advanced-data-visualizationThe business-case-for-advanced-data-visualization
The business-case-for-advanced-data-visualization
 
Global Technology Outlook 2012 Booklet
Global Technology Outlook 2012 BookletGlobal Technology Outlook 2012 Booklet
Global Technology Outlook 2012 Booklet
 
Pivotal CRM - Analytics
Pivotal CRM - Analytics Pivotal CRM - Analytics
Pivotal CRM - Analytics
 
Whitepaper: Big Data 101 - Creating Real Value from the Data Lifecycle - Happ...
Whitepaper: Big Data 101 - Creating Real Value from the Data Lifecycle - Happ...Whitepaper: Big Data 101 - Creating Real Value from the Data Lifecycle - Happ...
Whitepaper: Big Data 101 - Creating Real Value from the Data Lifecycle - Happ...
 
Big Data 101 - Creating Real Value from the Data Lifecycle - Happiest Minds
 Big Data 101 - Creating Real Value from the Data Lifecycle - Happiest Minds Big Data 101 - Creating Real Value from the Data Lifecycle - Happiest Minds
Big Data 101 - Creating Real Value from the Data Lifecycle - Happiest Minds
 
Optimizing Identity and Access Management (IAM) Frameworks
Optimizing Identity and Access Management (IAM) FrameworksOptimizing Identity and Access Management (IAM) Frameworks
Optimizing Identity and Access Management (IAM) Frameworks
 
The Business Value of Predictive Analytics
The Business Value of Predictive AnalyticsThe Business Value of Predictive Analytics
The Business Value of Predictive Analytics
 
The Business Value of Predictive Analytics
The Business Value of Predictive AnalyticsThe Business Value of Predictive Analytics
The Business Value of Predictive Analytics
 
Over 70% of all acquisitions never realize their potential
Over 70% of all acquisitions never realize their potentialOver 70% of all acquisitions never realize their potential
Over 70% of all acquisitions never realize their potential
 
The serendipity economy
The serendipity economy The serendipity economy
The serendipity economy
 
Artificial Intelligence Impacts
Artificial Intelligence ImpactsArtificial Intelligence Impacts
Artificial Intelligence Impacts
 
Artificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceArtificial intel impacts on organizational performance
Artificial intel impacts on organizational performance
 
Social Models, Trusted Clouds
Social Models, Trusted CloudsSocial Models, Trusted Clouds
Social Models, Trusted Clouds
 
The Trouble With Enterprise SoftwareF A L L 2 0 0 7 .docx
The Trouble With Enterprise SoftwareF A L L  2 0 0 7    .docxThe Trouble With Enterprise SoftwareF A L L  2 0 0 7    .docx
The Trouble With Enterprise SoftwareF A L L 2 0 0 7 .docx
 
tugas e business nova veronika.pptx
tugas e business nova veronika.pptxtugas e business nova veronika.pptx
tugas e business nova veronika.pptx
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
Optimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITOptimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and IT
 
Aligning business and tech thru capabilities - A capstera thought paper
Aligning business and tech thru capabilities  - A capstera thought paperAligning business and tech thru capabilities  - A capstera thought paper
Aligning business and tech thru capabilities - A capstera thought paper
 

Recently uploaded

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 

Recently uploaded (20)

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse

  • 1. Visual analytics Revealing corruption, fraud, waste and abuse Deloitte Forensic Center
  • 2. Although humans receive, evaluate and accumulate “Between the birth of the world and 2003, there were five more information now than ever before, the rich insights within that data may be difficult to identify exabytes of information created. We [now] create five by traditional means and often remain hidden. Yet, in exabytes every two days. See why it’s so painful to operate the realm of fraud detection for example, the ability to reveal relationships, communications, locations and in information markets?”1 patterns can make the difference between uncovering a fraud scheme at an early stage and having it grow into a major incident. So said global technology executive Eric Schmidt in 2010 and anyone who has tried to clear their email inbox can Against this backdrop, practitioners are turning to visual relate to that. Schmidt’s comment shows why “the sexy analytic tools and techniques to detect and reduce job in the next ten years” will be “to access, understand, corruption, fraud, waste and abuse in the enterprise. and communicate the insights you get from data From money-laundering schemes to bribery violations of analysis.”2 the U.S. Foreign Corrupt Practices Act and other anti- corruption laws, from manipulating financial statements by reporting fictitious revenues to inappropriate purchases using p-cards, graphically representing and exploring data can bring clarity to executives’ concerns and to performance improvement opportunities. Eric Schmidt speaking at Zeitgeist Europe 2010, recorded at 19.48 minutes 1 in the video http://www.youtube.com/watch?v=Qr2-2XY_QsQ. Hal Varian on How the Web Challenges Managers, McKinsey Quarterly, 2 January 2009. As used in this document Deloitte means Deloitte Financial Advisory Services LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/ about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. 1
  • 3. Beyond spreadsheets While spreadsheets offer a quick way to understand simple facts and figures, their utility diminishes as the data grow in volume and complexity. Visual analytics builds on humans’ natural ability to absorb a greater volume of information in visual than in numeric form and to perceive certain patterns, shapes and shades more easily than others. Visual representations such as word clouds, which display words in a size that reflects their frequency of use (Figure 1), and social networking diagrams, which Figure 1. Word cloud indicate relationships within a given community (Figure 2), are good examples of expressing complex data in a form that can be understood intuitively. Using mathematical techniques to evaluate patterns and outliers, effective visuals can translate multidimensional data such as frequency, time, and relationships into an intuitive picture. Consider a project to identify potential fictitious vendors that may have been created by an entity’s employees to receive payments generated by phony invoices and purchase orders. A traditional detection technique would be to list the invoice or purchase order numbers on a spreadsheet and sort them to identify numbers that are repeated, occur out of sequence, or increase by unusually small amounts over time (suggesting the vendor has few or no other customers). Figure 2. Social networking diagram 2
  • 4. It may be easier to spot anomalies among a group of This type of data analysis capability was once reserved vendors by generating a graphic such as the one in for a small number of highly trained specialists. Yet Figure 3. This chart shows, for each of many vendors, recent software advances have made this capability lines connecting the purchase order numbers relating to available to people such as compliance officers, internal each of that vendor’s invoices over a three-year period. auditors, fraud investigators and operations personnel An analyst can identify some potential wrongdoing with just a short learning curve. relatively quickly because the transactions highlighted in red have purchase order numbers that either are Where applications have traditionally offered static repeated or run out of sequence. There may be valid reports, these advances create dynamic environments reasons for these anomalies, but experience suggests that enable findings to be explored visually. Professionals they merit further investigation. with knowledge of their specific business domains can formulate hypotheses, test them and receive results instantly as they make changes to queries. As a result, visual analytics can augment one’s ability to explore, test and confirm hypotheses more quickly. Figure 3. Purchase order numbers used for each of multiple vendors over a three-year period 3
  • 5. Visual whistleblowing? In its 2010 Report to the Nations on Occupational Fraud Tree maps and Abuse, compiled from a study of 1,843 cases of Tree maps are a type of heat map in which a rectangular occupational fraud that occurred worldwide between space is divided into regions, and then each region is January 2008 and December 2009, the Association of divided again for each level in the hierarchy. The size Certified Fraud Examiners highlighted that 40 percent and shading of the rectangles represent two additional of these frauds were identified by tips, the largest single data points, allowing the viewer to identify patterns in method of fraud detection.3 While the Sarbanes-Oxley complex data. The original motivation for tree maps Act of 2002 and the Dodd-Frank Act of 2010 included was to show the contents of computer hard disks with measures to encourage the use of whistleblowing tens of thousands of files in 5-15 levels of directories. to detect corporate fraud, this still leaves another 60 Tree maps are especially effective in showing data percent of frauds to be detected by other means. Data represented by several dimensions (e.g., region, facility, analytics, and visual analytics in particular, may be the account, and product line). The hierarchical structure breakthrough companies are seeking in anti-fraud provided by tree maps can reveal such multi-faceted techniques. information more quickly than spreadsheets, bar charts or line graphs. While financial services companies are at the forefront of using visual analytics techniques to combat money laundering, conduct trading analyses, and perform continuous monitoring, their use in other industries is growing as internal audit and compliance functions are often being asked to enhance risk management effectiveness but with fewer resources. The growing diversity of uses is matched by the variety of visual analytics techniques available, of which we present a selection below. Association of Certified Fraud Examiners, Report to the Nations on 3 Occupational Fraud and Abuse, 2010 at 16. 4
  • 6. Figure 4, for example, translates a table of vendor Even without understanding the data, the viewer payments and risk scores for many vendors into a is drawn to the larger red squares. These vendors tree map. The five regions of the tree map represent present the most risk and the analyst can begin making the vendor categories, with each individual rectangle assessments based also on the size of the vendor and representing individual vendors. The shading is an category. indication of the risk score associated with a vendor. Figure 4. Tree map showing vendor risk by vendor category and payments 5
  • 7. Link analysis Identifying hidden relationships, demonstrating complex Here, based on data from multiple sources, visual networks and tracking the movement of money is connections are made between a variety of entities difficult using tabular methods. For this reason, link that share an address and bank account number and analysis, one of the more common visual analytics a fictitious vendor created to embezzle funds from techniques, has been successfully deployed to combat a company. Link analysis is particularly effective for those issues. This approach is particularly useful in anti- identifying indirect relationships and those that may be money laundering investigations. Figure 5 shows an connected only through several intermediaries. example of using link analysis to identify unexpected relationships. In the realm of electronic discovery, data analytics software can help lawyers to identify changes over time in communications and social networks, and let them explore clusters of various words and ideas – “concept clusters” – used by those involved in the matter.4 Using link analysis to associate communications like email and instant messages with events and individuals may also reveal connections among custodians and new topics at the earliest stages of case assessment. These techniques can create efficiencies in the document review and production process, help craft discovery requests and responses, and impact strategic case decisions. Figure 5. Link analysis showing a fictitious vendor, related entities and a shared bank account 6
  • 8. Geospatial analysis Financial transactions, asset information, customer data, Figures 6 through 9 show how a Geographic and contracts, among many others, are records that Information System (GIS) can be used to transform may contain a reference to a location including a place tabular data into location-specific clues to wrongdoing. name and an address. In a geospatial analysis, visual This example relates to health care fraud. analytics shows intersections between this data and its location, helping to uncover a hidden relationship. Figure 6 illustrates geocoding, the process of converting an address, place name or location reference into latitude and longitude coordinates that can be placed on a map. Here, we show a list of certain health care clinic addresses in Miami, Florida, and their corresponding locations by latitude and longitude, shown as red dots. John Markoff, Armies of Expensive Lawyers, Replaced by Cheaper 4 Software, The New York Times, March 4, 2011. Figure 6. Geocoding an address into latitude and longitude coordinates 7
  • 9. A map symbol’s size, shading and shape can each Figure 7 begins to tell a story of the transactions at issue indicate an attribute of the clinic. In Figure 7, the by supplementing the location data with the number of symbol’s size indicates the number of reimbursement claims filed for each facility. claims submitted for services provided at each location to senior citizens. Further detail could be added by labeling each symbol with the attribute value itself, namely the number of transactions. HYPOTHETICAL SCENARIO Figure 7. Map of certain clinics with dot size representing their volume of reimbursement claims 8
  • 10. One can easily identify the large outlier Since the facility in question is located 20 from the data simply by studying miles away from the socio-demographic the purple dots, since it is so much profile of a typical beneficiary (as larger than the other purple dots and indicated in Figure 9), this analysis raises is located away from the others. But additional red flags, justifying further one would also expect to see the investigation. Similar analysis could be largest number of claims in the area used for the other clinics, which may populated by senior citizens and lower reveal anomalies that are more subtle and income residents for whom services are harder to spot with simpler tests. eligible for reimbursement. The highest concentration of these people can be Visual analytics can help to focus seen in red on the heat map in Figure 8. investigations on particular activities and connect disparate pieces of information Figure 8. Heat map showing concentration of population age 65 & over A cluster analysis of patient addresses for to form a cohesive story. In the above the large outlier clinic (light blue points example, symbols depicting clinic in figure 9) reveals: locations and transaction volume, along with a patient profile attribute (such as • Patients are retirement or nursing the concentration of residents aged 65 home residents and over, shown as a heat map) provide • Patients are low income senior citizens more vivid detail than the statistics • They live outside the average drive- themselves. time distance to a clinic One could also overlay market segmentation data on the clinic addresses and run queries to determine statistically significant relationships between facilities. Figure 9. Overlay of patients’ addresses (light blue) 9
  • 11. Conclusion Identifying potential corruption, fraud, waste and abuse in large volumes of data has historically been difficult and quite costly. New visual analytics tools and techniques can enable compliance personnel, risk managers and others to “do more with less” by helping to identify previously hidden patterns. Entities should consider equipping their personnel to employ these techniques to meet the growing challenge of reducing corruption, fraud, waste and abuse in the enterprise. Deloitte Forensic Center This article is published as part of ForThoughts, the The Deloitte Forensic Center is a think tank aimed at Deloitte Forensic Center’s newsletter series, which is exploring new approaches for mitigating the costs, risks edited by Toby Bishop, director of the Deloitte Forensic and effects of fraud, corruption, and other issues facing Center. ForThoughts highlights trends and issues in the global business community. fraud, corruption, and other complex business issues. To subscribe to ForThoughts, visit The Center aims to advance the state of thinking in www.deloitte.com/forensiccenter or send an e-mail areas such as fraud and corruption by exploring issues to dfc@deloitte.com. from the perspective of forensic accountants, corporate leaders, and other professionals involved in forensic matters. Authors The Deloitte Forensic Center is sponsored by Deloitte Tony DeSantis is a principal in the Analytic and Forensic Technology practice of Deloitte Financial Financial Advisory Services LLP. Please visit www. Advisory Services LLP. He may be reached at andesantis@deloitte.com. deloitte.com/forensiccenter or scan the code for Matthew Gentile is a principal in the Analytic and Forensic Technology practice of Deloitte Financial more information. Advisory Services LLP. He may be reached at magentile@deloitte.com. Rich Simon is a senior manager in the Analytic and Forensic Technology practice of Deloitte Financial Advisory Services LLP. He may be reached at risimon@deloitte.com. 10
  • 12. Deloitte Forensic Center The following material is available on the Deloitte • The Cost of Fraud: Strategies for Managing a Growing Forensic Center Web site www.deloitte.com/ Expense forensiccenter or from dfc@deloitte.com. • Compliance and Integrity Risk: Getting M&A Pricing Right Deloitte Forensic Center book: • Procurement Fraud and Corruption: Sourcing from • Corporate Resiliency: Managing the Growing Risk of Asia Fraud and Corruption • Ten Things about Financial Statement Fraud - Third –– Chapter 1 available for download edition • The Expanded False Claims Act: FERA Creates New ForThoughts newsletters: Risks • Anti-Corruption Practices Survey 2011: Cloudy with a • Avoiding Fraud: It’s Not Always Easy Being Green Chance of Prosecution? • Foreign Corrupt Practices Act (FCPA) Due Diligence in • Fraud, Bribery and Corruption: Protecting Reputation M&A and Value • The Fraud Enforcement and Recovery Act “FERA” • Ten Things to Improve Your Next Internal Investigation: Investigators Share Experiences • Ten Things About Bankruptcy and Fraud • Sustainability Reporting: Managing Risks and • Applying Six Degrees of Separation to Preventing Opportunities Fraud • The Inside Story: The Changing Role of Internal Audit • India and the FCPA in Dealing with Financial Fraud • Helping to Prevent University Fraud • Major Embezzlements: How Can they Get So Big? • Avoiding FCPA Risk While Doing Business in China • Whistleblowing and the New Race to Report: The • The Shifting Landscape of Health Care Fraud and Impact of the Dodd-Frank Act and 2010’s Changes to Regulatory Compliance the U.S. Federal Sentencing Guidelines • Some of the Leading Practices in FCPA Compliance • Technology Fraud: The Lure of Private Companies • Monitoring Hospital-Physician Contractual • E-discovery: Mitigating Risk Through Better Arrangements to Comply with Changing Regulations Communication • Managing Fraud Risk: Being Prepared • White-Collar Crime: Preparing for Enhanced • Ten Things about Fraud Control Enforcement 11
  • 13. Notable material in other publications: • Where There’s Smoke, There’s Fraud, CFO magazine, • The Hidden Risks of Doing Business in Brazil, Agenda, March 2011 October 2011 • Will New Regulations Deter Corporate Fraud? • High Tide: From Paying For Transparency To ‘I Did Not Financial Executive, January 2011 Pay A Bribe’, WSJ.com, September 2011 • The Countdown to a Whistleblower Bounty Begins, • Executives Worry About Corruption Risks: Survey, Compliance Week, November 9, 2010 Reuters, September 2011 • Deploying Countermeasures to the SEC’s Dodd-Frank • Whistleblowing After Dodd-Frank — Timely Actions Whistleblower Awards, Business Crimes Bulletin, for Compliance Executives to Consider, Corporate October 2010 Compliance Insights, September 2011 • Temptation to Defraud, Internal Auditor magazine, • Corporate Criminals Face Tougher Penalties, Inside October 2010 Counsel, August 2011 • Shop Talk: Compliance Risks in New Data • Follow the Money: Worldcom to ‘Whitey,’ CFOworld, Technologies, Compliance Week, July 2010 July 2011 • Many Companies Ill-Equipped to Handle Social Media • Whistleblower Rules Could Set Off a Rash of Internal e-discovery, BoardMember.com, June 2010 Investigations, Compliance Week, June 2011 • Many Companies Expect to Face Difficulties in • Whistleblowing After Dodd-Frank: New Risks, New Assessing Financial Statement Fraud Risks, BNA Responses, WSJ Professional, May 2011 Corporate Accountability Report, May 2010 • The Government Will Pay You Big Bucks to Find the • Who’s Allegedly ‘Cooking the Books’ and Where?, Next Madoff, Forbes.com, May 2011 Business Crimes Bulletin, January 2010 • Major Embezzlements: When Minor Risks Become • Being Ready for the Worst, Fraud Magazine, Strategic Threats, Business Crimes Bulletin, May 2011 November/December 2009 • As Bulging Client Data Heads for the Cloud, Law Firms • Mapping Your Fraud Risks, Harvard Business Review, Ready for a Storm, and More Discovery Woes from October 2009 Web 2.0, ABA Journal, April 2011 • Listen to Your Whistleblowers, Corporate Board • The Dodd-Frank Act’s Robust Whistleblowing Member, Third Quarter, 2009 Incentives, Forbes.com, April 2011 • Use Heat Maps to Expose Rare but Dangerous Frauds, HBR NOW, June 2009 12
  • 14. This publication contains general information only and is based on the experiences and research of Deloitte practitioners. Deloitte is not, by means of this publication, rendering accounting, auditing, business, financial, investment, legal, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this publication. Copyright © 2011 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited