TY - BOOK AU - Nigrini,Mark J. TI - Forensic analytics: methods and techniques for forensic accounting investigations T2 - Wiley corporate F & A SN - 9781118087633 AV - HV6768 .N54 2011eb U1 - 363.25/963 22 PY - 2011/// CY - Hoboken, N.J. PB - Wiley KW - Forensic accounting KW - Fraud KW - Misleading financial statements KW - Social Science KW - LAW KW - Forensic Science KW - bisacsh KW - fast KW - Betrug KW - swd KW - Rechnungslegung KW - Wirtschaftsprüfung KW - Electronic books N1 - Includes bibliographical references and index; Front Matter -- Using Access in Forensic Investigations -- Using Excel in Forensic Investigations -- Using PowerPoint in Forensic Presentations -- High₆Level Data Overview Tests -- Benford's Law: The Basics -- Benford's Law: Assessing Conformity -- Benford's Law: The Second₆Order and Summation Tests -- Benford's Law: The Number Duplication and Last₆Two Digits Tests -- Testing the Internal Diagnostics of Current Period and Prior Period Data -- Identifying Fraud Using the Largest Subsets and Largest Growth Tests -- Identifying Anomalies Using the Relative Size Factor Test -- Identifying Fraud Using Abnormal Duplications within Subsets -- Identifying Fraud Using Correlation -- Identifying Fraud Using Time₆Series Analysis -- Fraud Risk Assessments of Forensic Units -- Examples of Risk Scoring with Access Queries -- The Detection of Financial Statement Fraud -- Using Analytics on Purchasing Card Transactions -- References -- Index N2 - "The book will review and discuss (with Access and Excel examples) the methods and techniques that investigators can use to uncover anomalies in corporate and public sector data. These anomalies would include errors, biases, duplicates, number rounding, and omissions. The focus will be the detection of fraud, intentional errors, and unintentional errors using data analytics. Despite the quantitative and computing bias, the book will still be interesting to read with interesting vignettes and illustrations. Most chapters will be understandable by accountants and auditors that usually are lacking in the rigors of mathematics and statistics. The data interrogation methods are based on (a) known statistical techniques, and (b) the author's own published research in the field"-- UR - http://dx.doi.org/10.1002/9781118386798 ER -