SlideShare une entreprise Scribd logo
1  sur  41
Ed Tobias, CISA, CIA June 8, 2010 Data Mining
Topics Introduction & Current Perceptions What is Data Mining? How is Data Mining used? Why is Data Mining important? Questions
A little story involving … New G/L system Curious Audit Manager  Questionable accounting entries
Introduction  IT Audit Manager for Hillsborough County Certified as a CISA and CIA Spend 50% doing Data Mining Audit Risk Assessment Testing control effectiveness Compliance Fraud Detection
Introduction  Who are you? Accountants Auditors Consultants Other industries
Current Perceptions about DM What do you think Data Mining is?
Heard of CAATs? Computer Assisted Audit Techniques Formerly a specialized skill for IT Auditors Common in every audit Term is practically obsolete
What is Data Mining? Automate the detection of relevant patterns  Look at current & historical data Predict future trends Efficient method for analyzing large amounts of data Enhance key item sampling Means for continuous auditing
How is Data Mining used? Proactively review business processes Identify anomalies Risk Assessment Reactively assist law enforcement in investigations
How is Data Mining used? Outside of Audit, DM is used to generate revenue Automating the detection of relevant patterns  Look at current & historical data Predict future trends – “Predictive Analysis” aka Business Intelligence / Data Warehouse
Charity Fundraising May, 2010 issue of SmartMoneymagazine 2 data mining articles
Charity Fundraising Hospital in San Diego, CA  Patients get their treatment and their assets scanned  Donor research on your salary history, LinkedIn connections, satellite images of your pool
Charity Fundraising Brown University – 6 of 10 donors who gave $100K+ identified through DM
Charity Fundraising ASPCA – using DM and Predictive Analysis to determine donors 4x donations over 5 years - $80M
Charity Fundraising Charity’s Junk Mail Strategy Mailings Double Dip – another request Virus effect “Dear Friend” – personal recognition
How is Data Mining used? Audit Process Risk Assessment Control Assessment Observations Fraud Detection and Prevention
How is Data Mining used? Risk Assessment Data analysis for high risk areas High Dollar amounts Potential for fraud Potential for non-compliance
How is Data Mining used? Risk Assessment What can be detected? Potential fraud or control weaknesses Duplicate vendors Duplicate invoices Duplicate amounts Benford’s Law – identify suspicious transactions Focus audit on high risk areas
How is Data Mining used? Control Assessment Traditional audit used sampling approach Auditors placed disclaimers regarding the accuracy of their statistical sampling Not affordable or available anymore Total assurance & clear indication of errors DM uses 100% of transactions  Increases credibility & value of audit
Why is Data Mining important? Examples of Data Mining Proactive - Purchasing and Procurement Reactive - Health Plan Auditing
Purchasing and Procurement Common area for fraud Abuse of financial authority Technical manipulation of specifications Internal collusion to circumvent controls External collusion with suppliers Manipulation of bid review Overbilling Bogus invoices
Purchasing and Procurement 2003 review - five local government procurement agencies in London Purchasing managers Specified the bid criteria Suggested pre-approved companies Suspected in collusion with suppliers DM used to identify possible trends
Purchasing and Procurement Analyzed “win/lose” statistics of the vendors Number of bids won Number of bids lost due to cost Number of bids where vendor failed approval Number of bids lost for “other” reasons
Purchasing and Procurement Determined two key elements: Vendors that consistently lost their bids – “shadow bidders” Vendors that won over 95% of bids Team of forensic experts were used for contract review and work performed
Purchasing and Procurement Collusion to circumvent controls in place Required to have five bids Used shadow bidders Bid review group Ensured that a selected (and corrupt) supplier was chosen every time Allowed substitution of inferior materials
Health Plan Auditing 2010 case study – Conducted by St. Joseph’s Univ. & Healthcare Data Mgmt Two large companies’ health insurance claims data over two year period Company A – 108,000 claims,   $25.3M paid Company B – 464,000 claims, $118.4M paid
Health Plan Auditing Compared the results of 100% auditing vs. random-sampling claims (300-400 samples) 100% auditing produced very distinct results Company A - $3.12M exception claims Company B - $5.47M exception claims
Health Plan Auditing 1 – Average of the two Post-Audit years
Health Plan Auditing
Health Plan Auditing Company A - $3.12M in exception claims (9,315 records)
Health Plan Auditing Company B - $5.47M in exception claims (20,395 records)
Health Plan Auditing Random-sampling claims  - used best “analysis” to simulate the audits Using exceptions from the 100% auditing approach 100 random samples of 300 exceptions 100 random samples of 400 exceptions Statistically close to their “population of exceptions” parameters from 100% auditing
Health Plan Auditing – 300 samples ,[object Object],[object Object],[object Object]
Health Plan Auditing Random-sampling missed a significant amount of exception claim amounts Increasing the sample size from 300 to 400  Did not significantly identify more errors Over 90% of claim errors still missed Significant amounts of money are wasted
Health Plan Auditing Random-sampling does not identify root cause of errors Trend analysis only possible through data mining
Questions
Contact Information  ed.tobias@hillsclerk.com LinkedIn - http://www.linkedin.com/in/ed3200
References ACFE. 2008 Report to the Nation on Occupational Fraud & Abuse. 2008. Retrieved 6/1/10 fromhttp://www.acfe.com/documents/2008-rttn.pdf Barrier, M. One right path: Cynthia Cooper. 2003. Retrieved 6/2/10 from http://findarticles.com/p/articles/mi_m4153/is_6_60/ai_111737943/ Bourke, J. Computer Assisted Audit Techniques or CAATS.  2010. Retrieved 5/25/10 from https://www.cpa2biz.org/Content/media/PRODUCER_CONTENT/Newsletters/Articles_2010/CPA/Jan/CAATS.jsp Deeson, M. Audit says Office Depot overcharged county one million dollars.  2010. Retrieved 6/3/10 from http://www.wtsp.com/news/local/story.aspx?storyid=130518 Denker, B. Data Mining and the Auditor’s Responsibility. 2003. Retrieved 6/1/10 from http://www.isaca.org/Content/ContentGroups/InfoBytes/20032/Data_Mining_and_the_Auditors_Responsibility.htm Kadet, A. Are Charity Fundraisers Spying on You? 2010. Retrieved 6/1/10 from http://www.smartmoney.com/personal-finance/estate-planning/are-charity-fundraisers-spying-on-you
References Kadet, A. Your Charity’s Junk-Mail Strategy. 2010. Retrieved 6/1/10 from http://www.smartmoney.com/personal-finance/estate-planning/are-charity-fundraisers-spying-on-you Kusnierz, R. A Case for Data Mining. 2003. Retrieved 6/1/10 from http://www2.northumberland.gov.uk/fraud/Documents/HM%20Treasury%20Reports/fraud_anti_fraud_adv_02-03.pdf Sayana, A. Using CAATs to Support IS Audit. 2003. Retrieved 6/1/10 from http://www.isaca.org/Journal/Past-Issues/2003/Volume-1/Pages/Using-CAATS-to-Support-IS-Audit.aspx Sillup, G. and Klimberg, R. Health Plan Auditing: 100-Percent-of-Claims vs. Random-Sample Audits.  2010. Retrieved 6/1/10 from http://www.sawgrassbc.com/captives/Health%20Plan%20Auditing_%20100%20Percent%20verses%20Random%20Sample%2001.2010%20.pdf Silltow, J. Data Mining 101: Tools and Techniques.  2006. Retrieved 5/25/10 from http://www.theiia.org/intAuditor/itaudit/archives/2006/august/data-mining-101-tools-and-techniques/ Wolfe, J. Effective Data Mining for Financial Services Companies. 2008. Retrieved 6/1/10 from http://www.theiia.org/intAuditor/in-the-industry/2008/november/effective-data-mining-for-financial-services-companies/index.cfm?print&search=jonathan%20wolfe&Y=1899 (IIA members only URL) Zink, J. Office Depot billing disputed.  2010. Retrieved 6/3/10 from http://www.tampabay.com/news/localgovernment/article1090581.ece
Data Mining
Data Mining

Contenu connexe

Tendances

Importance of Background Screening
Importance of Background ScreeningImportance of Background Screening
Importance of Background ScreeningGlobal HR Research
 
Automated Techniquesfor Detectionof Procurement Fraud
Automated Techniquesfor Detectionof Procurement FraudAutomated Techniquesfor Detectionof Procurement Fraud
Automated Techniquesfor Detectionof Procurement FraudEZ-R Stats, LLC
 
Transforming Clinical Trials Through CRO-ePRO Partnerships
Transforming Clinical Trials Through CRO-ePRO PartnershipsTransforming Clinical Trials Through CRO-ePRO Partnerships
Transforming Clinical Trials Through CRO-ePRO PartnershipsCRF Health
 
Careers In Clinical Research
Careers In Clinical ResearchCareers In Clinical Research
Careers In Clinical ResearchKhyati Dholakia
 
Interpace Diagnostics Investor Presentation
Interpace Diagnostics Investor PresentationInterpace Diagnostics Investor Presentation
Interpace Diagnostics Investor PresentationRedChip Companies, Inc.
 
Regulatory Compliance, Risk Management, and the Trustee's Role
Regulatory Compliance, Risk Management, and the Trustee's RoleRegulatory Compliance, Risk Management, and the Trustee's Role
Regulatory Compliance, Risk Management, and the Trustee's RolePYA, P.C.
 
Implementing an Effective Compliance Plan in Response to a Medicare Audit
Implementing an Effective Compliance Plan in Response to a Medicare AuditImplementing an Effective Compliance Plan in Response to a Medicare Audit
Implementing an Effective Compliance Plan in Response to a Medicare AuditSuperCoder LLC
 
EAI Compliance Infographic
EAI Compliance InfographicEAI Compliance Infographic
EAI Compliance InfographicIdeba
 
Avoca Presentation to Medical Devices Conferences
Avoca Presentation to Medical Devices ConferencesAvoca Presentation to Medical Devices Conferences
Avoca Presentation to Medical Devices ConferencesThe Avoca Group
 
Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreBrett Reynolds
 
Trends in Warning and NOV Letters 2013
Trends in Warning and NOV Letters 2013Trends in Warning and NOV Letters 2013
Trends in Warning and NOV Letters 2013Alan Bergstrom
 
Software Advice BuyerView: Electronic Health Records Report 2014
Software Advice BuyerView: Electronic Health Records Report 2014Software Advice BuyerView: Electronic Health Records Report 2014
Software Advice BuyerView: Electronic Health Records Report 2014Software Advice
 
Shap webinar 1 20 2011 lukanen
Shap webinar 1 20 2011 lukanenShap webinar 1 20 2011 lukanen
Shap webinar 1 20 2011 lukanensoder145
 
Semantic web mining for Pharmaceutical Business Intelligence
Semantic web mining for Pharmaceutical Business IntelligenceSemantic web mining for Pharmaceutical Business Intelligence
Semantic web mining for Pharmaceutical Business IntelligenceDavid Cocker
 
Super data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analyticsSuper data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analyticsJim Kaplan CIA CFE
 
PPD Competitive Analysis
PPD Competitive AnalysisPPD Competitive Analysis
PPD Competitive AnalysisThomas Lawrence
 

Tendances (20)

Importance of Background Screening
Importance of Background ScreeningImportance of Background Screening
Importance of Background Screening
 
Automated Techniquesfor Detectionof Procurement Fraud
Automated Techniquesfor Detectionof Procurement FraudAutomated Techniquesfor Detectionof Procurement Fraud
Automated Techniquesfor Detectionof Procurement Fraud
 
Transforming Clinical Trials Through CRO-ePRO Partnerships
Transforming Clinical Trials Through CRO-ePRO PartnershipsTransforming Clinical Trials Through CRO-ePRO Partnerships
Transforming Clinical Trials Through CRO-ePRO Partnerships
 
Careers In Clinical Research
Careers In Clinical ResearchCareers In Clinical Research
Careers In Clinical Research
 
Interpace Diagnostics Investor Presentation
Interpace Diagnostics Investor PresentationInterpace Diagnostics Investor Presentation
Interpace Diagnostics Investor Presentation
 
Regulatory Compliance, Risk Management, and the Trustee's Role
Regulatory Compliance, Risk Management, and the Trustee's RoleRegulatory Compliance, Risk Management, and the Trustee's Role
Regulatory Compliance, Risk Management, and the Trustee's Role
 
SaMD Lastest Trend
SaMD Lastest TrendSaMD Lastest Trend
SaMD Lastest Trend
 
Implementing an Effective Compliance Plan in Response to a Medicare Audit
Implementing an Effective Compliance Plan in Response to a Medicare AuditImplementing an Effective Compliance Plan in Response to a Medicare Audit
Implementing an Effective Compliance Plan in Response to a Medicare Audit
 
EAI Compliance Infographic
EAI Compliance InfographicEAI Compliance Infographic
EAI Compliance Infographic
 
My slides
My slidesMy slides
My slides
 
Avoca Presentation to Medical Devices Conferences
Avoca Presentation to Medical Devices ConferencesAvoca Presentation to Medical Devices Conferences
Avoca Presentation to Medical Devices Conferences
 
PtCS_Demo_Sales_v2016.3
PtCS_Demo_Sales_v2016.3PtCS_Demo_Sales_v2016.3
PtCS_Demo_Sales_v2016.3
 
Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and more
 
Trends in Warning and NOV Letters 2013
Trends in Warning and NOV Letters 2013Trends in Warning and NOV Letters 2013
Trends in Warning and NOV Letters 2013
 
Software Advice BuyerView: Electronic Health Records Report 2014
Software Advice BuyerView: Electronic Health Records Report 2014Software Advice BuyerView: Electronic Health Records Report 2014
Software Advice BuyerView: Electronic Health Records Report 2014
 
USCIPP 2013 Chicago
USCIPP 2013 ChicagoUSCIPP 2013 Chicago
USCIPP 2013 Chicago
 
Shap webinar 1 20 2011 lukanen
Shap webinar 1 20 2011 lukanenShap webinar 1 20 2011 lukanen
Shap webinar 1 20 2011 lukanen
 
Semantic web mining for Pharmaceutical Business Intelligence
Semantic web mining for Pharmaceutical Business IntelligenceSemantic web mining for Pharmaceutical Business Intelligence
Semantic web mining for Pharmaceutical Business Intelligence
 
Super data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analyticsSuper data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analytics
 
PPD Competitive Analysis
PPD Competitive AnalysisPPD Competitive Analysis
PPD Competitive Analysis
 

Similaire à Data Mining

Managing The Business Risk Of Fraud
Managing The Business Risk Of FraudManaging The Business Risk Of Fraud
Managing The Business Risk Of FraudEZ-R Stats, LLC
 
Data Mining 11-18-10
Data Mining 11-18-10Data Mining 11-18-10
Data Mining 11-18-10Ed Tobias
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksRachel Hamilton
 
How Big Data Analysis Can Protect You From Fraud
How Big Data Analysis Can Protect You From FraudHow Big Data Analysis Can Protect You From Fraud
How Big Data Analysis Can Protect You From FraudTrendwise Analytics
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesContinuity Control
 
Final-Audit-Sampling.pdf
Final-Audit-Sampling.pdfFinal-Audit-Sampling.pdf
Final-Audit-Sampling.pdfssuser5945a3
 
Transforming Pharmaceutical Operational Performance with Supply Chain Traceab...
Transforming Pharmaceutical Operational Performance with Supply Chain Traceab...Transforming Pharmaceutical Operational Performance with Supply Chain Traceab...
Transforming Pharmaceutical Operational Performance with Supply Chain Traceab...SupplyScape
 
OPY-150702_BigData_Healthcare_070915
OPY-150702_BigData_Healthcare_070915OPY-150702_BigData_Healthcare_070915
OPY-150702_BigData_Healthcare_070915Ravi Sripada
 
Data Governance in the age of Social Media
Data Governance in the age of Social MediaData Governance in the age of Social Media
Data Governance in the age of Social MediaExperian
 
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's NextSarah Fane
 
Big Risks Requires Big Data Thinking
Big Risks Requires Big Data ThinkingBig Risks Requires Big Data Thinking
Big Risks Requires Big Data ThinkingTableau Software
 
Trace Days 2013 | Knoxville, TN
Trace Days 2013 | Knoxville, TNTrace Days 2013 | Knoxville, TN
Trace Days 2013 | Knoxville, TNTraceByTWSG
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 
Chapter_04(Information for Marketing Decisions)(Chapter 3).pptx
Chapter_04(Information for Marketing Decisions)(Chapter 3).pptxChapter_04(Information for Marketing Decisions)(Chapter 3).pptx
Chapter_04(Information for Marketing Decisions)(Chapter 3).pptxSongSong34
 
IFM Panel Book 9/2018
IFM Panel Book 9/2018IFM Panel Book 9/2018
IFM Panel Book 9/2018Thiện Quang
 
Turning internal audit into the data analytics epicenter for your organization
Turning internal audit into the data analytics epicenter for your organizationTurning internal audit into the data analytics epicenter for your organization
Turning internal audit into the data analytics epicenter for your organizationACL Services
 
The Digital Innovation Award - Shift TechnologyShift insurance-suite
The Digital Innovation Award - Shift TechnologyShift insurance-suiteThe Digital Innovation Award - Shift TechnologyShift insurance-suite
The Digital Innovation Award - Shift TechnologyShift insurance-suiteThe Digital Insurer
 

Similaire à Data Mining (20)

Managing The Business Risk Of Fraud
Managing The Business Risk Of FraudManaging The Business Risk Of Fraud
Managing The Business Risk Of Fraud
 
Data Mining 11-18-10
Data Mining 11-18-10Data Mining 11-18-10
Data Mining 11-18-10
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
How Big Data Analysis Can Protect You From Fraud
How Big Data Analysis Can Protect You From FraudHow Big Data Analysis Can Protect You From Fraud
How Big Data Analysis Can Protect You From Fraud
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
 
Final-Audit-Sampling.pdf
Final-Audit-Sampling.pdfFinal-Audit-Sampling.pdf
Final-Audit-Sampling.pdf
 
Chapter 6 e-marketing research
Chapter 6   e-marketing researchChapter 6   e-marketing research
Chapter 6 e-marketing research
 
Ch 11. Evidence and Sampling
Ch 11. Evidence and SamplingCh 11. Evidence and Sampling
Ch 11. Evidence and Sampling
 
Transforming Pharmaceutical Operational Performance with Supply Chain Traceab...
Transforming Pharmaceutical Operational Performance with Supply Chain Traceab...Transforming Pharmaceutical Operational Performance with Supply Chain Traceab...
Transforming Pharmaceutical Operational Performance with Supply Chain Traceab...
 
OPY-150702_BigData_Healthcare_070915
OPY-150702_BigData_Healthcare_070915OPY-150702_BigData_Healthcare_070915
OPY-150702_BigData_Healthcare_070915
 
Data Governance in the age of Social Media
Data Governance in the age of Social MediaData Governance in the age of Social Media
Data Governance in the age of Social Media
 
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
 
Big Risks Requires Big Data Thinking
Big Risks Requires Big Data ThinkingBig Risks Requires Big Data Thinking
Big Risks Requires Big Data Thinking
 
Trace Days 2013 | Knoxville, TN
Trace Days 2013 | Knoxville, TNTrace Days 2013 | Knoxville, TN
Trace Days 2013 | Knoxville, TN
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Chapter_04(Information for Marketing Decisions)(Chapter 3).pptx
Chapter_04(Information for Marketing Decisions)(Chapter 3).pptxChapter_04(Information for Marketing Decisions)(Chapter 3).pptx
Chapter_04(Information for Marketing Decisions)(Chapter 3).pptx
 
IFM Panel Book 9/2018
IFM Panel Book 9/2018IFM Panel Book 9/2018
IFM Panel Book 9/2018
 
Turning internal audit into the data analytics epicenter for your organization
Turning internal audit into the data analytics epicenter for your organizationTurning internal audit into the data analytics epicenter for your organization
Turning internal audit into the data analytics epicenter for your organization
 
The Digital Innovation Award - Shift TechnologyShift insurance-suite
The Digital Innovation Award - Shift TechnologyShift insurance-suiteThe Digital Innovation Award - Shift TechnologyShift insurance-suite
The Digital Innovation Award - Shift TechnologyShift insurance-suite
 

Data Mining

  • 1. Ed Tobias, CISA, CIA June 8, 2010 Data Mining
  • 2. Topics Introduction & Current Perceptions What is Data Mining? How is Data Mining used? Why is Data Mining important? Questions
  • 3. A little story involving … New G/L system Curious Audit Manager Questionable accounting entries
  • 4. Introduction IT Audit Manager for Hillsborough County Certified as a CISA and CIA Spend 50% doing Data Mining Audit Risk Assessment Testing control effectiveness Compliance Fraud Detection
  • 5. Introduction Who are you? Accountants Auditors Consultants Other industries
  • 6. Current Perceptions about DM What do you think Data Mining is?
  • 7. Heard of CAATs? Computer Assisted Audit Techniques Formerly a specialized skill for IT Auditors Common in every audit Term is practically obsolete
  • 8. What is Data Mining? Automate the detection of relevant patterns Look at current & historical data Predict future trends Efficient method for analyzing large amounts of data Enhance key item sampling Means for continuous auditing
  • 9. How is Data Mining used? Proactively review business processes Identify anomalies Risk Assessment Reactively assist law enforcement in investigations
  • 10. How is Data Mining used? Outside of Audit, DM is used to generate revenue Automating the detection of relevant patterns Look at current & historical data Predict future trends – “Predictive Analysis” aka Business Intelligence / Data Warehouse
  • 11. Charity Fundraising May, 2010 issue of SmartMoneymagazine 2 data mining articles
  • 12. Charity Fundraising Hospital in San Diego, CA Patients get their treatment and their assets scanned Donor research on your salary history, LinkedIn connections, satellite images of your pool
  • 13. Charity Fundraising Brown University – 6 of 10 donors who gave $100K+ identified through DM
  • 14. Charity Fundraising ASPCA – using DM and Predictive Analysis to determine donors 4x donations over 5 years - $80M
  • 15. Charity Fundraising Charity’s Junk Mail Strategy Mailings Double Dip – another request Virus effect “Dear Friend” – personal recognition
  • 16. How is Data Mining used? Audit Process Risk Assessment Control Assessment Observations Fraud Detection and Prevention
  • 17. How is Data Mining used? Risk Assessment Data analysis for high risk areas High Dollar amounts Potential for fraud Potential for non-compliance
  • 18. How is Data Mining used? Risk Assessment What can be detected? Potential fraud or control weaknesses Duplicate vendors Duplicate invoices Duplicate amounts Benford’s Law – identify suspicious transactions Focus audit on high risk areas
  • 19. How is Data Mining used? Control Assessment Traditional audit used sampling approach Auditors placed disclaimers regarding the accuracy of their statistical sampling Not affordable or available anymore Total assurance & clear indication of errors DM uses 100% of transactions Increases credibility & value of audit
  • 20. Why is Data Mining important? Examples of Data Mining Proactive - Purchasing and Procurement Reactive - Health Plan Auditing
  • 21. Purchasing and Procurement Common area for fraud Abuse of financial authority Technical manipulation of specifications Internal collusion to circumvent controls External collusion with suppliers Manipulation of bid review Overbilling Bogus invoices
  • 22. Purchasing and Procurement 2003 review - five local government procurement agencies in London Purchasing managers Specified the bid criteria Suggested pre-approved companies Suspected in collusion with suppliers DM used to identify possible trends
  • 23. Purchasing and Procurement Analyzed “win/lose” statistics of the vendors Number of bids won Number of bids lost due to cost Number of bids where vendor failed approval Number of bids lost for “other” reasons
  • 24. Purchasing and Procurement Determined two key elements: Vendors that consistently lost their bids – “shadow bidders” Vendors that won over 95% of bids Team of forensic experts were used for contract review and work performed
  • 25. Purchasing and Procurement Collusion to circumvent controls in place Required to have five bids Used shadow bidders Bid review group Ensured that a selected (and corrupt) supplier was chosen every time Allowed substitution of inferior materials
  • 26. Health Plan Auditing 2010 case study – Conducted by St. Joseph’s Univ. & Healthcare Data Mgmt Two large companies’ health insurance claims data over two year period Company A – 108,000 claims, $25.3M paid Company B – 464,000 claims, $118.4M paid
  • 27. Health Plan Auditing Compared the results of 100% auditing vs. random-sampling claims (300-400 samples) 100% auditing produced very distinct results Company A - $3.12M exception claims Company B - $5.47M exception claims
  • 28. Health Plan Auditing 1 – Average of the two Post-Audit years
  • 30. Health Plan Auditing Company A - $3.12M in exception claims (9,315 records)
  • 31. Health Plan Auditing Company B - $5.47M in exception claims (20,395 records)
  • 32. Health Plan Auditing Random-sampling claims - used best “analysis” to simulate the audits Using exceptions from the 100% auditing approach 100 random samples of 300 exceptions 100 random samples of 400 exceptions Statistically close to their “population of exceptions” parameters from 100% auditing
  • 33.
  • 34. Health Plan Auditing Random-sampling missed a significant amount of exception claim amounts Increasing the sample size from 300 to 400 Did not significantly identify more errors Over 90% of claim errors still missed Significant amounts of money are wasted
  • 35. Health Plan Auditing Random-sampling does not identify root cause of errors Trend analysis only possible through data mining
  • 37. Contact Information ed.tobias@hillsclerk.com LinkedIn - http://www.linkedin.com/in/ed3200
  • 38. References ACFE. 2008 Report to the Nation on Occupational Fraud & Abuse. 2008. Retrieved 6/1/10 fromhttp://www.acfe.com/documents/2008-rttn.pdf Barrier, M. One right path: Cynthia Cooper. 2003. Retrieved 6/2/10 from http://findarticles.com/p/articles/mi_m4153/is_6_60/ai_111737943/ Bourke, J. Computer Assisted Audit Techniques or CAATS. 2010. Retrieved 5/25/10 from https://www.cpa2biz.org/Content/media/PRODUCER_CONTENT/Newsletters/Articles_2010/CPA/Jan/CAATS.jsp Deeson, M. Audit says Office Depot overcharged county one million dollars. 2010. Retrieved 6/3/10 from http://www.wtsp.com/news/local/story.aspx?storyid=130518 Denker, B. Data Mining and the Auditor’s Responsibility. 2003. Retrieved 6/1/10 from http://www.isaca.org/Content/ContentGroups/InfoBytes/20032/Data_Mining_and_the_Auditors_Responsibility.htm Kadet, A. Are Charity Fundraisers Spying on You? 2010. Retrieved 6/1/10 from http://www.smartmoney.com/personal-finance/estate-planning/are-charity-fundraisers-spying-on-you
  • 39. References Kadet, A. Your Charity’s Junk-Mail Strategy. 2010. Retrieved 6/1/10 from http://www.smartmoney.com/personal-finance/estate-planning/are-charity-fundraisers-spying-on-you Kusnierz, R. A Case for Data Mining. 2003. Retrieved 6/1/10 from http://www2.northumberland.gov.uk/fraud/Documents/HM%20Treasury%20Reports/fraud_anti_fraud_adv_02-03.pdf Sayana, A. Using CAATs to Support IS Audit. 2003. Retrieved 6/1/10 from http://www.isaca.org/Journal/Past-Issues/2003/Volume-1/Pages/Using-CAATS-to-Support-IS-Audit.aspx Sillup, G. and Klimberg, R. Health Plan Auditing: 100-Percent-of-Claims vs. Random-Sample Audits. 2010. Retrieved 6/1/10 from http://www.sawgrassbc.com/captives/Health%20Plan%20Auditing_%20100%20Percent%20verses%20Random%20Sample%2001.2010%20.pdf Silltow, J. Data Mining 101: Tools and Techniques. 2006. Retrieved 5/25/10 from http://www.theiia.org/intAuditor/itaudit/archives/2006/august/data-mining-101-tools-and-techniques/ Wolfe, J. Effective Data Mining for Financial Services Companies. 2008. Retrieved 6/1/10 from http://www.theiia.org/intAuditor/in-the-industry/2008/november/effective-data-mining-for-financial-services-companies/index.cfm?print&search=jonathan%20wolfe&Y=1899 (IIA members only URL) Zink, J. Office Depot billing disputed. 2010. Retrieved 6/3/10 from http://www.tampabay.com/news/localgovernment/article1090581.ece