You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Straightforward, practical guidance for working fraud examiners and forensic accountants In Data Sleuth: Using Data in Forensic Accounting Engagements and Fraud Investigations, certified fraud examiner, former FBI support employee, private investigator, and certified public accountant Leah Wietholter delivers a step-by-step guide to financial investigation that can be applied to almost any forensic accounting use-case. The book emphasizes the use of best evidence as you work through problem-solving data analysis techniques that address the common challenge of imperfect and incomplete information. The accomplished author bridges the gap between modern fraud investigation theory and practical ...
Become the forensic analytics expert in your organization using effective and efficient data analysis tests to find anomalies, biases, and potential fraud—the updated new edition Forensic Analytics reviews the methods and techniques that forensic accountants can use to detect intentional and unintentional errors, fraud, and biases. This updated second edition shows accountants and auditors how analyzing their corporate or public sector data can highlight transactions, balances, or subsets of transactions or balances in need of attention. These tests are made up of a set of initial high-level overview tests followed by a series of more focused tests. These focused tests use a variety of qua...
A powerful new tool for all forensic accountants, or anyone whoanalyzes data that may have been altered Benford's Law gives the expected patterns of the digits in thenumbers in tabulated data such as town and city populations orMadoff's fictitious portfolio returns. Those digits, in unaltereddata, will not occur in equal proportions; there is a large biastowards the lower digits, so much so that nearly one-half of allnumbers are expected to start with the digits 1 or 2. Thesepatterns were originally discovered by physicist Frank Benford inthe early 1930s, and have since been found to apply to alltabulated data. Mark J. Nigrini has been a pioneer in applyingBenford's Law to auditing and foren...
A practical, hands-on guide to forensic accounting Careers in forensic accounting are hot-US News & World Report recently designated forensic accounting as one of the eight most secure career tracks in America., Forensic accountants work in most major accounting firms and demand for their services is growing with then increasing need for investigations of mergers and acquisitions, tax inquiries, and economic crime. In addition, forensic accountants perform specialized audits, and assist in all kinds of civil litigation, and are often involved in terrorist investigations. Forensic Accounting For Dummies will track to a course and explain the concepts and methods of forensic accounting. Covers everything a forensic accountant may face, from investigations of mergers and acquisitions to tax inquiries to economic crime What to do if you find or suspect financial fraud in your own organization Determining what is fraud and how to investigate Whether you're a student pursuing a career in forensic accounting or just want to understand how to detect and deal with financial fraud, Forensic Accounting For Dummies has you covered.
Detect fraud faster—no matter how well hidden—with IDEA automation Fraud and Fraud Detection takes an advanced approach to fraud management, providing step-by-step guidance on automating detection and forensics using CaseWare's IDEA software. The book begins by reviewing the major types of fraud, then details the specific computerized tests that can detect them. Readers will learn to use complex data analysis techniques, including automation scripts, allowing easier and more sensitive detection of anomalies that require further review. The companion website provides access to a demo version of IDEA, along with sample scripts that allow readers to immediately test the procedures from the ...
Investigative computer forensics is playing an increasingly important role in the resolution of challenges, disputes, and conflicts of every kind and in every corner of the world. Yet, for many, there is still great apprehension when contemplating leveraging these emerging technologies, preventing them from making the most of investigative computer forensics and its extraordinary potential to dissect everything from common crime to sophisticated corporate fraud. Empowering you to make tough and informed decisions during an internal investigation, electronic discovery exercise, or while engaging the capabilities of a computer forensic professional, Investigative Computer Forensics explains th...
Fraud can happen anywhere-even in the most successful companies. Most businesses, large and small, lose an average of 5% of their annual gross revenues to insider fraud. The worst part? The Thief in Your Company is most likely the person you trust the most. Forensic accountant Tiffany Couch is a sleuth with an adding machine. She has seen theft in many forms, but what sticks with her the most is not the fraud schemes or the dollar losses. It's the victims who all experience the same emotional devastation that these crimes leave in their wake. And her warning: It can happen to you. The Thief in Your Company will educate you and entertain you, pull at your heart strings, and convince you to pu...
Detect fraud earlier to mitigate loss and prevent cascading damage Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques is an authoritative guidebook for setting up a comprehensive fraud detection analytics solution. Early detection is a key factor in mitigating fraud damage, but it involves more specialized techniques than detecting fraud at the more advanced stages. This invaluable guide details both the theory and technical aspects of these techniques, and provides expert insight into streamlining implementation. Coverage includes data gathering, preprocessing, model building, and post-implementation, with comprehensive guidance on various learning techniques and t...
A fascinating examination of the world of private investigators by a 21st-century private eye. Today's world is complicated: companies are becoming more powerful than nations, the lines between public and corporate institutions grow murkier, and the internet is shredding our privacy. To combat these onslaughts, people everywhere -- rich and not so rich, in business and in their personal lives -- are turning away from traditional police, lawyers, and government regulators toward a new champion: the private investigator. As a private investigator, Tyler Maroney has traveled the globe, overseeing sensitive investigations and untying complicated cases for a wide array of clients. In his new book...
Your most trusted employee. Your right hand. However, something just doesn't feel right about your business. Could an employee be stealing from you? Certainly you're mistaken, right? After all, this person helped you grow your business, has full access to everything from passwords to bank statements. Sure, that gives your employee the opportunity, but he or she would never take advantage of it. We lock our cars and our houses to protect ourselves. What do you do to protect your business? This book is designed to help you prevent, detect, and investigate embezzlement. You will learn how opportunity, pressure, and rationalization are the basis for fraud. Kelly Paxton is a former federal agent ...