SlideShare a Scribd company logo
USING BENFORD’S LAW FOR FRAUD
DETECTION & AUDITING
AGENDA
• What is Benford’s Law?
• Conforming/Non-Conforming Data Types
• Practical Applications of Benford’s Law
• Major Digit Tests
FROM THEORY TO APPLICATION
Timeline
• 1881- Simon Newcomb
• 1938 – Frank Benford
• 1961 - Roger Pinkham
• 1992 - Mark Nigrini
Simon Newcomb: Looked at frequency of use of the different
digits in natural numbers - “A multi-digit number is more likely
to begin with ‘1’ than any other number.”
FROM THEORY TO APPLICATION
Timeline
• 1881- Simon Newcomb
• 1938 – Frank Benford
• 1961 - Roger Pinkham
• 1992 - Mark Nigrini
Frank Benford: Analyzed 20,229 sets of numbers, including, areas of
rivers, baseball averages, atomic weights, electricity bills, and more -
Multi digit numbers beginning with 1, 2 or 3 appear more frequently
than multi digit numbers beginning with 4, 5, 6,...
FROM THEORY TO APPLICATION
Timeline
• 1881- Simon Newcomb
• 1938 – Frank Benford
• 1961 - Roger Pinkham
• 1992 - Mark Nigrini
Data Sets First Digit = 1 First Digit = 2 First Digit = 3
Populations 33.9 20.4 14.2
Batting averages 32.7 17.6 12.6
Atomic weight 47.2 18.7 10.4
X-ray volts 27.917 15.7
Average 30.6% 18.5% 12.4%
FROM THEORY TO APPLICATION
Timeline
• 1881- Simon Newcomb
• 1938 – Frank Benford
• 1961 - Roger Pinkham
• 1992 - Mark Nigrini
Roger Pinkham: Research conducted revealed that Benford’s
probabilities are scale invariant.
Dr. Mark Nigrini: Published a thesis noting that Benford’s Law could be
used to detect fraud because human choices are not random, invented
numbers are unlikely to follow Benford’s Law.
BENFORD’S LAW
The number 1 occurs as the
leading digit 30.1% of the
time, while larger numbers
occur in the first digit less
frequently.
For example, the number
3879
• 3 - first digit
• 8 - second digit
• 7 - third digit
• 9 – fourth digit
BENFORD’S LAW KEY FACTS
• For naturally occurring numbers, the leading digit(s) is (are)
distributed in a specific, non-uniform way.
• While one might think that the number 1 would appear as
the first digit 11 percent of the time, it actually appears
about 30 percent of the time.
• Therefore the number 1 predominates most progressions.
• Scale invariant – works with numbers denominated as
dollars, yen, euros, pesos, rubles, etc.
• Not all data sets are suitable for analysis.
BENFORD’S LAW DEFINED
DATA TYPES
• Data set should describe similar data (e.g. town
populations)
• Large data sets
• Data that has a wide variety in the number of figures e.g.
plenty of values in the hundreds, thousands, tens of
thousands, etc.
• No built-in maximum or minimum values
• Some common characteristics of accounting data…
CONFORMING DATA TYPES
• Accounts payable transactions
• Credit card transactions
• Customer balances and refunds
• Disbursements
• Inventory prices
• Journal entries
• Loan data
• Purchase orders
• Stock prices, T&E expenses, etc.
NON-CONFORMING DATA TYPES
• Data where pre-arranged, artificial limits or numbers
influenced by thought exist, i.e. built-in max or min values
• Zip codes, telephone nos., YYMM#### as insurance policy no.
• Prices sets at thresholds ($1.99, ATM withdrawals, etc.)
• Airline passenger counts per plane
• Aggregated data
• Data sets with 500 or few transactions
• No transaction recorded - Theft, kickback, skimming,
contract rigging, etc.
USAGE OF BENFORD’S LAW
Within a comprehensive Anti-Fraud Program
Risk
Assessment
Control
Environment
Control
Activities
Information and
Communication
Specify
organizational
objectives
Monitoring
COSO Framework
BENFORD’S IN RISK-BASED AUDITS
• Early warning sign that past data patterns have changed or
abnormal activity
Data Set X represents the first digit
frequency of 10,000 vendor
invoices.
USE IN RISK-BASED AUDITS
• Risk-based audits - Early warning sign that past data
patterns have changed or abnormal activity
Data Set X represents the first digit
frequency of 10,000 vendor
invoices.
USE IN OTHER AUDITS
• Forensic audits - Check fraud, bypassing permission limits,
improper payments
• Audit of financial statements - Manipulation of checks, cash
on hand, etc.
• Corporate finance/company evaluation - Examine cash-
flow-forecasts for profit centers
USING DATA ANALYTICS (IDEA)
• 1st Digit Test
• 2nd Digit Test
• First two digits
• First three digits
• Last two digits
• Second Order Test
1ST AND 2ND DIGIT TESTS
1st Digit Test
• High Level Test - Will only identify the blinding glimpse of
the obvious
• Should not be used to select audit samples, as the sample
size will be too large
2nd Digit Test
• Also a high level test - Used to identify conformity
• Should not be used to select audit samples
FIRST TWO DIGITS TEST
• More focused and examines frequency of numerical
combinations 10 through 99 on the first two digits of a
series of numbers
• Can be used to select audit targets for preliminary review
Example:
10,000 invoices -- > 2,600 invoices
-- > (1.78% + 1.69%) x 10,000
-- > (178 + 169) = 347 invoices
Only examine invoices beginning
with the first two digits 31 and 33.
FIRST THREE DIGITS TEST
• Highly Focused - Used to select audit samples
• Tends to identify number duplication
LAST TWO DIGITS TEST
• Used to identify invented (overused) and rounded numbers
• Expected that right-side two digits be distributed evenly.
With 100 possible last two digits numbers (00, 01, 02....,
98, 99), each should occur approximately 1% of time
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
SECOND ORDER TEST
• Based on the 1st two digits in the data.
• A numeric field is sorted from the smallest to largest and
value differences between each pair of consecutive records
should follow the digit frequencies of Benford’s Law.
Source: Fraud and Fraud Detection: A Data Analytics
Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
SUMMARY
• Benford Law works well to detect invented numbers when:
• One person invents all the numbers
• Lots of different people have an incentive to manipulate numbers
in the same way
• Useful first step to give a better understanding of our data
• Need to use Benford’s Law with other drill down tests to
detect fraud, errors, biases, and other anomalies
• Technology enables faster and easier to produce results
WANT TO SEE BENFORD’S LAW IN IDEA?
Contact us at salesidea@caseware.com to
schedule a demonstration
USING BENFORD’S LAW FOR FRAUD
DETECTION & AUDITING
Visit casewareanalytics.com
Email salesidea@caseware.com
Ad

More Related Content

What's hot (20)

Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing
Jim Kaplan CIA CFE
 
Benford's Law and Fraud Detection
Benford's Law and Fraud DetectionBenford's Law and Fraud Detection
Benford's Law and Fraud Detection
Ozan Gurel
 
Benfords Law
Benfords LawBenfords Law
Benfords Law
Ed Tobias
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
FraudBusters
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Forensic accounting in india
Forensic accounting in indiaForensic accounting in india
Forensic accounting in india
JashandeepsinghBhatt1
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
Sreekanth Narendran
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
Dominic Sroda Korkoryi
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...
Dr. Sanjay Sawant Dessai
 
Information System audit
Information System auditInformation System audit
Information System audit
Pratapchandra
 
chapter 1 introduction forensic accounting
chapter 1 introduction  forensic accountingchapter 1 introduction  forensic accounting
chapter 1 introduction forensic accounting
MohamedAbdi347025
 
Forensic audit ppt
Forensic audit pptForensic audit ppt
Forensic audit ppt
Nikhil Priya
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
Dr. Sushil Bansode
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
Harshita Ved
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
Salih Islam
 
Revenue Assurance & Improvement
Revenue Assurance & ImprovementRevenue Assurance & Improvement
Revenue Assurance & Improvement
Paulo Pantigoso
 
Best practices in conducting Financial Investigations
Best practices in conducting Financial InvestigationsBest practices in conducting Financial Investigations
Best practices in conducting Financial Investigations
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Foundation Of Information Systems In Business
Foundation Of Information Systems In BusinessFoundation Of Information Systems In Business
Foundation Of Information Systems In Business
Dr Vijay Pithadia Director
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
Tommy Zul Hidayat
 
Investigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environmentInvestigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environment
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing
Jim Kaplan CIA CFE
 
Benford's Law and Fraud Detection
Benford's Law and Fraud DetectionBenford's Law and Fraud Detection
Benford's Law and Fraud Detection
Ozan Gurel
 
Benfords Law
Benfords LawBenfords Law
Benfords Law
Ed Tobias
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
FraudBusters
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
Sreekanth Narendran
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
Dominic Sroda Korkoryi
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...
Dr. Sanjay Sawant Dessai
 
Information System audit
Information System auditInformation System audit
Information System audit
Pratapchandra
 
chapter 1 introduction forensic accounting
chapter 1 introduction  forensic accountingchapter 1 introduction  forensic accounting
chapter 1 introduction forensic accounting
MohamedAbdi347025
 
Forensic audit ppt
Forensic audit pptForensic audit ppt
Forensic audit ppt
Nikhil Priya
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
Dr. Sushil Bansode
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
Harshita Ved
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
Salih Islam
 
Revenue Assurance & Improvement
Revenue Assurance & ImprovementRevenue Assurance & Improvement
Revenue Assurance & Improvement
Paulo Pantigoso
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
Tommy Zul Hidayat
 

Viewers also liked (19)

Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred Lyons
CaseWare IDEA
 
Audit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data AnalyticsAudit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data Analytics
CaseWare IDEA
 
Perform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodPerform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling Method
Tao Li CPA,CA
 
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Jim Kaplan CIA CFE
 
Teaching the Effective Use of Data in Business Coverage by Steve Doig
Teaching the Effective Use of Data in Business Coverage by Steve DoigTeaching the Effective Use of Data in Business Coverage by Steve Doig
Teaching the Effective Use of Data in Business Coverage by Steve Doig
Reynolds Center for Business Journalism
 
Data Journalism for Business Reporting
Data Journalism for Business ReportingData Journalism for Business Reporting
Data Journalism for Business Reporting
Reynolds Center for Business Journalism
 
Logistics Service Providers: Export Fines
Logistics Service Providers: Export FinesLogistics Service Providers: Export Fines
Logistics Service Providers: Export Fines
Integration Point
 
Anirban Dasgupta Bio - April 2016
Anirban Dasgupta Bio - April 2016Anirban Dasgupta Bio - April 2016
Anirban Dasgupta Bio - April 2016
Anirban Dasgupta
 
Managing the Logistics of a Medical Device Audit
Managing the Logistics of a Medical Device AuditManaging the Logistics of a Medical Device Audit
Managing the Logistics of a Medical Device Audit
Generis
 
Data Audit – Global Logistics Company
Data Audit – Global Logistics CompanyData Audit – Global Logistics Company
Data Audit – Global Logistics Company
Ogilvy Consulting
 
S2B Group Case Study: Transportation Logistics Automation
S2B Group Case Study: Transportation Logistics AutomationS2B Group Case Study: Transportation Logistics Automation
S2B Group Case Study: Transportation Logistics Automation
Inna Kotykova
 
3g 2 Audit Administration Software Webmars Features
3g   2   Audit Administration Software Webmars   Features3g   2   Audit Administration Software Webmars   Features
3g 2 Audit Administration Software Webmars Features
Rajeswaran Muthu Venkatachalam
 
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Jim Kaplan CIA CFE
 
Marginal Product of Labor
Marginal Product of LaborMarginal Product of Labor
Marginal Product of Labor
Brian Coil
 
Business economics basics of math derivatives
Business economics   basics of math derivativesBusiness economics   basics of math derivatives
Business economics basics of math derivatives
Rachit Walia
 
3. internal analysis
3. internal analysis3. internal analysis
3. internal analysis
drebenkhaled
 
Stocks, flows, financial statements
Stocks, flows, financial statementsStocks, flows, financial statements
Stocks, flows, financial statements
Julio Huato
 
Chap015
Chap015Chap015
Chap015
ravichander333
 
What is New in Track and Trace Technology?
What is New in Track and Trace Technology?What is New in Track and Trace Technology?
What is New in Track and Trace Technology?
Angela Carver
 
Auditor Spotlight - Fred Lyons
Auditor Spotlight - Fred LyonsAuditor Spotlight - Fred Lyons
Auditor Spotlight - Fred Lyons
CaseWare IDEA
 
Audit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data AnalyticsAudit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data Analytics
CaseWare IDEA
 
Perform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodPerform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling Method
Tao Li CPA,CA
 
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Jim Kaplan CIA CFE
 
Logistics Service Providers: Export Fines
Logistics Service Providers: Export FinesLogistics Service Providers: Export Fines
Logistics Service Providers: Export Fines
Integration Point
 
Anirban Dasgupta Bio - April 2016
Anirban Dasgupta Bio - April 2016Anirban Dasgupta Bio - April 2016
Anirban Dasgupta Bio - April 2016
Anirban Dasgupta
 
Managing the Logistics of a Medical Device Audit
Managing the Logistics of a Medical Device AuditManaging the Logistics of a Medical Device Audit
Managing the Logistics of a Medical Device Audit
Generis
 
Data Audit – Global Logistics Company
Data Audit – Global Logistics CompanyData Audit – Global Logistics Company
Data Audit – Global Logistics Company
Ogilvy Consulting
 
S2B Group Case Study: Transportation Logistics Automation
S2B Group Case Study: Transportation Logistics AutomationS2B Group Case Study: Transportation Logistics Automation
S2B Group Case Study: Transportation Logistics Automation
Inna Kotykova
 
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Jim Kaplan CIA CFE
 
Marginal Product of Labor
Marginal Product of LaborMarginal Product of Labor
Marginal Product of Labor
Brian Coil
 
Business economics basics of math derivatives
Business economics   basics of math derivativesBusiness economics   basics of math derivatives
Business economics basics of math derivatives
Rachit Walia
 
3. internal analysis
3. internal analysis3. internal analysis
3. internal analysis
drebenkhaled
 
Stocks, flows, financial statements
Stocks, flows, financial statementsStocks, flows, financial statements
Stocks, flows, financial statements
Julio Huato
 
What is New in Track and Trace Technology?
What is New in Track and Trace Technology?What is New in Track and Trace Technology?
What is New in Track and Trace Technology?
Angela Carver
 
Ad

Similar to Using Benford's Law for Fraud Detection and Auditing (12)

Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
easternman99
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
Robert Hillard
 
Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...
Dr Danilo Samà
 
Prepare to practice
Prepare to practicePrepare to practice
Prepare to practice
Valerie Aggerbeck
 
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
inventionjournals
 
Introduction to Stats, basic of statistics, z-score, (1).pptx
Introduction to Stats, basic of statistics, z-score, (1).pptxIntroduction to Stats, basic of statistics, z-score, (1).pptx
Introduction to Stats, basic of statistics, z-score, (1).pptx
rohitopener77
 
Introduction to Stats, basic of statistics, z-score, (1).pptx
Introduction to Stats, basic of statistics, z-score, (1).pptxIntroduction to Stats, basic of statistics, z-score, (1).pptx
Introduction to Stats, basic of statistics, z-score, (1).pptx
rohitopener77
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BI
Jen Stirrup
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
Big Data Week
 
Ch11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary DataCh11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary Data
yxl007
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
Karen Harkavy
 
Chapter12
Chapter12Chapter12
Chapter12
tashillary
 
Final Initial Project Development With Discussion
Final Initial Project Development With DiscussionFinal Initial Project Development With Discussion
Final Initial Project Development With Discussion
easternman99
 
Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)Data quality applications_of_benford's_law_(finalv2)
Data quality applications_of_benford's_law_(finalv2)
Robert Hillard
 
Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...Cartel detection and collusion screening: an empirical analysis of the London...
Cartel detection and collusion screening: an empirical analysis of the London...
Dr Danilo Samà
 
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
Modelling Conformity of Nigeria’s Recent Population Censuses With Benford’s D...
inventionjournals
 
Introduction to Stats, basic of statistics, z-score, (1).pptx
Introduction to Stats, basic of statistics, z-score, (1).pptxIntroduction to Stats, basic of statistics, z-score, (1).pptx
Introduction to Stats, basic of statistics, z-score, (1).pptx
rohitopener77
 
Introduction to Stats, basic of statistics, z-score, (1).pptx
Introduction to Stats, basic of statistics, z-score, (1).pptxIntroduction to Stats, basic of statistics, z-score, (1).pptx
Introduction to Stats, basic of statistics, z-score, (1).pptx
rohitopener77
 
Data forensics with R and Power BI
Data forensics with R and Power BIData forensics with R and Power BI
Data forensics with R and Power BI
Jen Stirrup
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
Big Data Week
 
Ch11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary DataCh11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary Data
yxl007
 
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
36 Top Science Writing Jobs (Become A Science Writer) - Elna Cain
Karen Harkavy
 
Ad

More from CaseWare IDEA (20)

IDEA 10.3 Launch Webinar
IDEA 10.3 Launch WebinarIDEA 10.3 Launch Webinar
IDEA 10.3 Launch Webinar
CaseWare IDEA
 
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
CaseWare IDEA
 
Auditor Destacado: Marcelo Barreto Rodrigues
Auditor Destacado: Marcelo Barreto Rodrigues Auditor Destacado: Marcelo Barreto Rodrigues
Auditor Destacado: Marcelo Barreto Rodrigues
CaseWare IDEA
 
Auditrice Sous Les Projecteurs: Bistra Dimitrova
Auditrice Sous Les Projecteurs: Bistra Dimitrova Auditrice Sous Les Projecteurs: Bistra Dimitrova
Auditrice Sous Les Projecteurs: Bistra Dimitrova
CaseWare IDEA
 
How to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital worldHow to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital world
CaseWare IDEA
 
Auditor Descado - Robert Berry
Auditor Descado - Robert BerryAuditor Descado - Robert Berry
Auditor Descado - Robert Berry
CaseWare IDEA
 
Auditeur sous les Projecteurs - Robert Berry
Auditeur sous les Projecteurs - Robert BerryAuditeur sous les Projecteurs - Robert Berry
Auditeur sous les Projecteurs - Robert Berry
CaseWare IDEA
 
Auditor Spotlight: Robert Berry
Auditor Spotlight: Robert Berry Auditor Spotlight: Robert Berry
Auditor Spotlight: Robert Berry
CaseWare IDEA
 
The Data Behind Audit Analytics
The Data Behind Audit AnalyticsThe Data Behind Audit Analytics
The Data Behind Audit Analytics
CaseWare IDEA
 
Auditora Destacada - Anke Eckardt
Auditora Destacada - Anke EckardtAuditora Destacada - Anke Eckardt
Auditora Destacada - Anke Eckardt
CaseWare IDEA
 
Auditeur sous les Projecteurs - Anke Eckardt
Auditeur sous les Projecteurs - Anke EckardtAuditeur sous les Projecteurs - Anke Eckardt
Auditeur sous les Projecteurs - Anke Eckardt
CaseWare IDEA
 
Audit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy stepsAudit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy steps
CaseWare IDEA
 
How to find new ways to add value to your audits
How to find new ways to add value to your auditsHow to find new ways to add value to your audits
How to find new ways to add value to your audits
CaseWare IDEA
 
Auditor Spotlight - Erin Baker
Auditor Spotlight - Erin BakerAuditor Spotlight - Erin Baker
Auditor Spotlight - Erin Baker
CaseWare IDEA
 
Auditeur Sous Les Projecteurs: Fred Lyons
Auditeur Sous Les Projecteurs: Fred LyonsAuditeur Sous Les Projecteurs: Fred Lyons
Auditeur Sous Les Projecteurs: Fred Lyons
CaseWare IDEA
 
Auditeur Sous Les Projecteurs: Erin Baker
Auditeur Sous Les Projecteurs: Erin BakerAuditeur Sous Les Projecteurs: Erin Baker
Auditeur Sous Les Projecteurs: Erin Baker
CaseWare IDEA
 
Auditor Destacado - Fred Lyons
Auditor Destacado - Fred LyonsAuditor Destacado - Fred Lyons
Auditor Destacado - Fred Lyons
CaseWare IDEA
 
Why You Need to STOP Using Spreadsheets for Audit Analysis
Why You Need to STOP Using Spreadsheets for Audit AnalysisWhy You Need to STOP Using Spreadsheets for Audit Analysis
Why You Need to STOP Using Spreadsheets for Audit Analysis
CaseWare IDEA
 
The Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringThe Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls Monitoring
CaseWare IDEA
 
Integrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanIntegrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit Plan
CaseWare IDEA
 
IDEA 10.3 Launch Webinar
IDEA 10.3 Launch WebinarIDEA 10.3 Launch Webinar
IDEA 10.3 Launch Webinar
CaseWare IDEA
 
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
Auditor Sous Les Projecteurs: Marcelo Barreto Rodrigues
CaseWare IDEA
 
Auditor Destacado: Marcelo Barreto Rodrigues
Auditor Destacado: Marcelo Barreto Rodrigues Auditor Destacado: Marcelo Barreto Rodrigues
Auditor Destacado: Marcelo Barreto Rodrigues
CaseWare IDEA
 
Auditrice Sous Les Projecteurs: Bistra Dimitrova
Auditrice Sous Les Projecteurs: Bistra Dimitrova Auditrice Sous Les Projecteurs: Bistra Dimitrova
Auditrice Sous Les Projecteurs: Bistra Dimitrova
CaseWare IDEA
 
How to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital worldHow to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital world
CaseWare IDEA
 
Auditor Descado - Robert Berry
Auditor Descado - Robert BerryAuditor Descado - Robert Berry
Auditor Descado - Robert Berry
CaseWare IDEA
 
Auditeur sous les Projecteurs - Robert Berry
Auditeur sous les Projecteurs - Robert BerryAuditeur sous les Projecteurs - Robert Berry
Auditeur sous les Projecteurs - Robert Berry
CaseWare IDEA
 
Auditor Spotlight: Robert Berry
Auditor Spotlight: Robert Berry Auditor Spotlight: Robert Berry
Auditor Spotlight: Robert Berry
CaseWare IDEA
 
The Data Behind Audit Analytics
The Data Behind Audit AnalyticsThe Data Behind Audit Analytics
The Data Behind Audit Analytics
CaseWare IDEA
 
Auditora Destacada - Anke Eckardt
Auditora Destacada - Anke EckardtAuditora Destacada - Anke Eckardt
Auditora Destacada - Anke Eckardt
CaseWare IDEA
 
Auditeur sous les Projecteurs - Anke Eckardt
Auditeur sous les Projecteurs - Anke EckardtAuditeur sous les Projecteurs - Anke Eckardt
Auditeur sous les Projecteurs - Anke Eckardt
CaseWare IDEA
 
Audit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy stepsAudit Webinar How to get the right data for your audit in 3 easy steps
Audit Webinar How to get the right data for your audit in 3 easy steps
CaseWare IDEA
 
How to find new ways to add value to your audits
How to find new ways to add value to your auditsHow to find new ways to add value to your audits
How to find new ways to add value to your audits
CaseWare IDEA
 
Auditor Spotlight - Erin Baker
Auditor Spotlight - Erin BakerAuditor Spotlight - Erin Baker
Auditor Spotlight - Erin Baker
CaseWare IDEA
 
Auditeur Sous Les Projecteurs: Fred Lyons
Auditeur Sous Les Projecteurs: Fred LyonsAuditeur Sous Les Projecteurs: Fred Lyons
Auditeur Sous Les Projecteurs: Fred Lyons
CaseWare IDEA
 
Auditeur Sous Les Projecteurs: Erin Baker
Auditeur Sous Les Projecteurs: Erin BakerAuditeur Sous Les Projecteurs: Erin Baker
Auditeur Sous Les Projecteurs: Erin Baker
CaseWare IDEA
 
Auditor Destacado - Fred Lyons
Auditor Destacado - Fred LyonsAuditor Destacado - Fred Lyons
Auditor Destacado - Fred Lyons
CaseWare IDEA
 
Why You Need to STOP Using Spreadsheets for Audit Analysis
Why You Need to STOP Using Spreadsheets for Audit AnalysisWhy You Need to STOP Using Spreadsheets for Audit Analysis
Why You Need to STOP Using Spreadsheets for Audit Analysis
CaseWare IDEA
 
The Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringThe Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls Monitoring
CaseWare IDEA
 
Integrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanIntegrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit Plan
CaseWare IDEA
 

Recently uploaded (20)

md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptxmd-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
fatimalazaar2004
 
chapter3 Central Tendency statistics.ppt
chapter3 Central Tendency statistics.pptchapter3 Central Tendency statistics.ppt
chapter3 Central Tendency statistics.ppt
justinebandajbn
 
Defense Against LLM Scheming 2025_04_28.pptx
Defense Against LLM Scheming 2025_04_28.pptxDefense Against LLM Scheming 2025_04_28.pptx
Defense Against LLM Scheming 2025_04_28.pptx
Greg Makowski
 
Data Science Courses in India iim skills
Data Science Courses in India iim skillsData Science Courses in India iim skills
Data Science Courses in India iim skills
dharnathakur29
 
Flip flop presenation-Presented By Mubahir khan.pptx
Flip flop presenation-Presented By Mubahir khan.pptxFlip flop presenation-Presented By Mubahir khan.pptx
Flip flop presenation-Presented By Mubahir khan.pptx
mubashirkhan45461
 
GenAI for Quant Analytics: survey-analytics.ai
GenAI for Quant Analytics: survey-analytics.aiGenAI for Quant Analytics: survey-analytics.ai
GenAI for Quant Analytics: survey-analytics.ai
Inspirient
 
VKS-Python-FIe Handling text CSV Binary.pptx
VKS-Python-FIe Handling text CSV Binary.pptxVKS-Python-FIe Handling text CSV Binary.pptx
VKS-Python-FIe Handling text CSV Binary.pptx
Vinod Srivastava
 
DPR_Expert_Recruitment_notice_Revised.pdf
DPR_Expert_Recruitment_notice_Revised.pdfDPR_Expert_Recruitment_notice_Revised.pdf
DPR_Expert_Recruitment_notice_Revised.pdf
inmishra17121973
 
Medical Dataset including visualizations
Medical Dataset including visualizationsMedical Dataset including visualizations
Medical Dataset including visualizations
vishrut8750588758
 
Calories_Prediction_using_Linear_Regression.pptx
Calories_Prediction_using_Linear_Regression.pptxCalories_Prediction_using_Linear_Regression.pptx
Calories_Prediction_using_Linear_Regression.pptx
TijiLMAHESHWARI
 
Classification_in_Machinee_Learning.pptx
Classification_in_Machinee_Learning.pptxClassification_in_Machinee_Learning.pptx
Classification_in_Machinee_Learning.pptx
wencyjorda88
 
AI Competitor Analysis: How to Monitor and Outperform Your Competitors
AI Competitor Analysis: How to Monitor and Outperform Your CompetitorsAI Competitor Analysis: How to Monitor and Outperform Your Competitors
AI Competitor Analysis: How to Monitor and Outperform Your Competitors
Contify
 
Molecular methods diagnostic and monitoring of infection - Repaired.pptx
Molecular methods diagnostic and monitoring of infection  -  Repaired.pptxMolecular methods diagnostic and monitoring of infection  -  Repaired.pptx
Molecular methods diagnostic and monitoring of infection - Repaired.pptx
7tzn7x5kky
 
C++_OOPs_DSA1_Presentation_Template.pptx
C++_OOPs_DSA1_Presentation_Template.pptxC++_OOPs_DSA1_Presentation_Template.pptx
C++_OOPs_DSA1_Presentation_Template.pptx
aquibnoor22079
 
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptxPerencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
PareaRusan
 
Minions Want to eat presentacion muy linda
Minions Want to eat presentacion muy lindaMinions Want to eat presentacion muy linda
Minions Want to eat presentacion muy linda
CarlaAndradesSoler1
 
Digilocker under workingProcess Flow.pptx
Digilocker  under workingProcess Flow.pptxDigilocker  under workingProcess Flow.pptx
Digilocker under workingProcess Flow.pptx
satnamsadguru491
 
Ch3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendencyCh3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendency
ayeleasefa2
 
183409-christina-rossetti.pdfdsfsdasggsag
183409-christina-rossetti.pdfdsfsdasggsag183409-christina-rossetti.pdfdsfsdasggsag
183409-christina-rossetti.pdfdsfsdasggsag
fardin123rahman07
 
FPET_Implementation_2_MA to 360 Engage Direct.pptx
FPET_Implementation_2_MA to 360 Engage Direct.pptxFPET_Implementation_2_MA to 360 Engage Direct.pptx
FPET_Implementation_2_MA to 360 Engage Direct.pptx
ssuser4ef83d
 
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptxmd-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
fatimalazaar2004
 
chapter3 Central Tendency statistics.ppt
chapter3 Central Tendency statistics.pptchapter3 Central Tendency statistics.ppt
chapter3 Central Tendency statistics.ppt
justinebandajbn
 
Defense Against LLM Scheming 2025_04_28.pptx
Defense Against LLM Scheming 2025_04_28.pptxDefense Against LLM Scheming 2025_04_28.pptx
Defense Against LLM Scheming 2025_04_28.pptx
Greg Makowski
 
Data Science Courses in India iim skills
Data Science Courses in India iim skillsData Science Courses in India iim skills
Data Science Courses in India iim skills
dharnathakur29
 
Flip flop presenation-Presented By Mubahir khan.pptx
Flip flop presenation-Presented By Mubahir khan.pptxFlip flop presenation-Presented By Mubahir khan.pptx
Flip flop presenation-Presented By Mubahir khan.pptx
mubashirkhan45461
 
GenAI for Quant Analytics: survey-analytics.ai
GenAI for Quant Analytics: survey-analytics.aiGenAI for Quant Analytics: survey-analytics.ai
GenAI for Quant Analytics: survey-analytics.ai
Inspirient
 
VKS-Python-FIe Handling text CSV Binary.pptx
VKS-Python-FIe Handling text CSV Binary.pptxVKS-Python-FIe Handling text CSV Binary.pptx
VKS-Python-FIe Handling text CSV Binary.pptx
Vinod Srivastava
 
DPR_Expert_Recruitment_notice_Revised.pdf
DPR_Expert_Recruitment_notice_Revised.pdfDPR_Expert_Recruitment_notice_Revised.pdf
DPR_Expert_Recruitment_notice_Revised.pdf
inmishra17121973
 
Medical Dataset including visualizations
Medical Dataset including visualizationsMedical Dataset including visualizations
Medical Dataset including visualizations
vishrut8750588758
 
Calories_Prediction_using_Linear_Regression.pptx
Calories_Prediction_using_Linear_Regression.pptxCalories_Prediction_using_Linear_Regression.pptx
Calories_Prediction_using_Linear_Regression.pptx
TijiLMAHESHWARI
 
Classification_in_Machinee_Learning.pptx
Classification_in_Machinee_Learning.pptxClassification_in_Machinee_Learning.pptx
Classification_in_Machinee_Learning.pptx
wencyjorda88
 
AI Competitor Analysis: How to Monitor and Outperform Your Competitors
AI Competitor Analysis: How to Monitor and Outperform Your CompetitorsAI Competitor Analysis: How to Monitor and Outperform Your Competitors
AI Competitor Analysis: How to Monitor and Outperform Your Competitors
Contify
 
Molecular methods diagnostic and monitoring of infection - Repaired.pptx
Molecular methods diagnostic and monitoring of infection  -  Repaired.pptxMolecular methods diagnostic and monitoring of infection  -  Repaired.pptx
Molecular methods diagnostic and monitoring of infection - Repaired.pptx
7tzn7x5kky
 
C++_OOPs_DSA1_Presentation_Template.pptx
C++_OOPs_DSA1_Presentation_Template.pptxC++_OOPs_DSA1_Presentation_Template.pptx
C++_OOPs_DSA1_Presentation_Template.pptx
aquibnoor22079
 
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptxPerencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
PareaRusan
 
Minions Want to eat presentacion muy linda
Minions Want to eat presentacion muy lindaMinions Want to eat presentacion muy linda
Minions Want to eat presentacion muy linda
CarlaAndradesSoler1
 
Digilocker under workingProcess Flow.pptx
Digilocker  under workingProcess Flow.pptxDigilocker  under workingProcess Flow.pptx
Digilocker under workingProcess Flow.pptx
satnamsadguru491
 
Ch3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendencyCh3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendency
ayeleasefa2
 
183409-christina-rossetti.pdfdsfsdasggsag
183409-christina-rossetti.pdfdsfsdasggsag183409-christina-rossetti.pdfdsfsdasggsag
183409-christina-rossetti.pdfdsfsdasggsag
fardin123rahman07
 
FPET_Implementation_2_MA to 360 Engage Direct.pptx
FPET_Implementation_2_MA to 360 Engage Direct.pptxFPET_Implementation_2_MA to 360 Engage Direct.pptx
FPET_Implementation_2_MA to 360 Engage Direct.pptx
ssuser4ef83d
 

Using Benford's Law for Fraud Detection and Auditing

  • 1. USING BENFORD’S LAW FOR FRAUD DETECTION & AUDITING
  • 2. AGENDA • What is Benford’s Law? • Conforming/Non-Conforming Data Types • Practical Applications of Benford’s Law • Major Digit Tests
  • 3. FROM THEORY TO APPLICATION Timeline • 1881- Simon Newcomb • 1938 – Frank Benford • 1961 - Roger Pinkham • 1992 - Mark Nigrini Simon Newcomb: Looked at frequency of use of the different digits in natural numbers - “A multi-digit number is more likely to begin with ‘1’ than any other number.”
  • 4. FROM THEORY TO APPLICATION Timeline • 1881- Simon Newcomb • 1938 – Frank Benford • 1961 - Roger Pinkham • 1992 - Mark Nigrini Frank Benford: Analyzed 20,229 sets of numbers, including, areas of rivers, baseball averages, atomic weights, electricity bills, and more - Multi digit numbers beginning with 1, 2 or 3 appear more frequently than multi digit numbers beginning with 4, 5, 6,...
  • 5. FROM THEORY TO APPLICATION Timeline • 1881- Simon Newcomb • 1938 – Frank Benford • 1961 - Roger Pinkham • 1992 - Mark Nigrini Data Sets First Digit = 1 First Digit = 2 First Digit = 3 Populations 33.9 20.4 14.2 Batting averages 32.7 17.6 12.6 Atomic weight 47.2 18.7 10.4 X-ray volts 27.917 15.7 Average 30.6% 18.5% 12.4%
  • 6. FROM THEORY TO APPLICATION Timeline • 1881- Simon Newcomb • 1938 – Frank Benford • 1961 - Roger Pinkham • 1992 - Mark Nigrini Roger Pinkham: Research conducted revealed that Benford’s probabilities are scale invariant. Dr. Mark Nigrini: Published a thesis noting that Benford’s Law could be used to detect fraud because human choices are not random, invented numbers are unlikely to follow Benford’s Law.
  • 7. BENFORD’S LAW The number 1 occurs as the leading digit 30.1% of the time, while larger numbers occur in the first digit less frequently. For example, the number 3879 • 3 - first digit • 8 - second digit • 7 - third digit • 9 – fourth digit
  • 8. BENFORD’S LAW KEY FACTS • For naturally occurring numbers, the leading digit(s) is (are) distributed in a specific, non-uniform way. • While one might think that the number 1 would appear as the first digit 11 percent of the time, it actually appears about 30 percent of the time. • Therefore the number 1 predominates most progressions. • Scale invariant – works with numbers denominated as dollars, yen, euros, pesos, rubles, etc. • Not all data sets are suitable for analysis.
  • 10. DATA TYPES • Data set should describe similar data (e.g. town populations) • Large data sets • Data that has a wide variety in the number of figures e.g. plenty of values in the hundreds, thousands, tens of thousands, etc. • No built-in maximum or minimum values • Some common characteristics of accounting data…
  • 11. CONFORMING DATA TYPES • Accounts payable transactions • Credit card transactions • Customer balances and refunds • Disbursements • Inventory prices • Journal entries • Loan data • Purchase orders • Stock prices, T&E expenses, etc.
  • 12. NON-CONFORMING DATA TYPES • Data where pre-arranged, artificial limits or numbers influenced by thought exist, i.e. built-in max or min values • Zip codes, telephone nos., YYMM#### as insurance policy no. • Prices sets at thresholds ($1.99, ATM withdrawals, etc.) • Airline passenger counts per plane • Aggregated data • Data sets with 500 or few transactions • No transaction recorded - Theft, kickback, skimming, contract rigging, etc.
  • 13. USAGE OF BENFORD’S LAW Within a comprehensive Anti-Fraud Program Risk Assessment Control Environment Control Activities Information and Communication Specify organizational objectives Monitoring COSO Framework
  • 14. BENFORD’S IN RISK-BASED AUDITS • Early warning sign that past data patterns have changed or abnormal activity Data Set X represents the first digit frequency of 10,000 vendor invoices.
  • 15. USE IN RISK-BASED AUDITS • Risk-based audits - Early warning sign that past data patterns have changed or abnormal activity Data Set X represents the first digit frequency of 10,000 vendor invoices.
  • 16. USE IN OTHER AUDITS • Forensic audits - Check fraud, bypassing permission limits, improper payments • Audit of financial statements - Manipulation of checks, cash on hand, etc. • Corporate finance/company evaluation - Examine cash- flow-forecasts for profit centers
  • 17. USING DATA ANALYTICS (IDEA) • 1st Digit Test • 2nd Digit Test • First two digits • First three digits • Last two digits • Second Order Test
  • 18. 1ST AND 2ND DIGIT TESTS 1st Digit Test • High Level Test - Will only identify the blinding glimpse of the obvious • Should not be used to select audit samples, as the sample size will be too large 2nd Digit Test • Also a high level test - Used to identify conformity • Should not be used to select audit samples
  • 19. FIRST TWO DIGITS TEST • More focused and examines frequency of numerical combinations 10 through 99 on the first two digits of a series of numbers • Can be used to select audit targets for preliminary review Example: 10,000 invoices -- > 2,600 invoices -- > (1.78% + 1.69%) x 10,000 -- > (178 + 169) = 347 invoices Only examine invoices beginning with the first two digits 31 and 33.
  • 20. FIRST THREE DIGITS TEST • Highly Focused - Used to select audit samples • Tends to identify number duplication
  • 21. LAST TWO DIGITS TEST • Used to identify invented (overused) and rounded numbers • Expected that right-side two digits be distributed evenly. With 100 possible last two digits numbers (00, 01, 02...., 98, 99), each should occur approximately 1% of time Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 22. SECOND ORDER TEST • Based on the 1st two digits in the data. • A numeric field is sorted from the smallest to largest and value differences between each pair of consecutive records should follow the digit frequencies of Benford’s Law. Source: Fraud and Fraud Detection: A Data Analytics Approach, John Wiley & Sons, Inc., Hoboken, New Jersey
  • 23. SUMMARY • Benford Law works well to detect invented numbers when: • One person invents all the numbers • Lots of different people have an incentive to manipulate numbers in the same way • Useful first step to give a better understanding of our data • Need to use Benford’s Law with other drill down tests to detect fraud, errors, biases, and other anomalies • Technology enables faster and easier to produce results
  • 24. WANT TO SEE BENFORD’S LAW IN IDEA? Contact us at [email protected] to schedule a demonstration
  • 25. USING BENFORD’S LAW FOR FRAUD DETECTION & AUDITING Visit casewareanalytics.com Email [email protected]

Editor's Notes

  • #11: Benford’s Law does not apply to all sets of numbers. For it to apply the numbers must reflect the size of some phenomenon; big numbers must refer to big things. There must be no built-in maximum or minimum values. Tax returns have minimum or maximum amounts in various places. The numbers must not be labels such as highway numbers, social security numbers, or flight numbers. Accounting Data usually conforms.
  • #20: Examines the frequency of the numerical combinations 10 through 99 on the first two digits of a series of numbers. In particular the output serves for the analysis of avoided threshold values. Thus, these tests help to clearly visualize when order or permission limits have been systematically avoided Example: We detected an abundance of invoices beginning with 3. Based upon that review, we need to examine approximately 2,600 invoices.   However, using the first two digits test, we can see that not all of the invoices need to be examined. Instead, we need only examine those invoices beginning with the first two digits 31 and 33. As you can see in the chart, these are the first two digits whose actual frequencies differ the most from their expected frequencies (-.40 and -.39, respectively). Therefore, if we focus on numbers beginning with 31 or 33, we only need to review 347 (178 + 169) invoices. This was calculated by multiplying 1.78% (actual frequency percentage for the first two digits 31) by 10,000 (number of total invoices) and adding that to 1.69% (actual frequency percentage for the first two digits 33) times 10,000 (number of total invoices). This test results in a required audit sample of more than 2,000 fewer invoices — certainly a more efficient and focused sample