Table Of Content3GFFIRS 09/11/2013 3:21:23 Pagevi
3GFFIRS 09/11/2013 3:21:23 Pagei
Fraud Analytics
3GFFIRS 09/11/2013 3:21:23 Pageii
Founded in 1807, John Wiley & Sons is the oldest independent publishing
companyintheUnitedStates.WithofficesinNorthAmerica,Europe,Asia,and
Australia,Wileyisgloballycommittedtodevelopingandmarketingprintand
electronic products and services for our customers’ professional and personal
knowledge and understanding.
TheWileyCorporateF&Aseriesprovidesinformation,tools,andinsightsto
corporateprofessionalsresponsibleforissuesaffectingtheprofitabilityoftheir
company, from accounting and finance to internal controls and performance
management.
3GFFIRS 09/11/2013 3:21:23 Pageiii
Fraud Analytics
Strategies and Methods for
Detection and Prevention
DELENA D. SPANN
3GFFIRS 09/11/2013 3:21:23 Pageiv
Cover image: iStockphoto.com/Alexandr Mitiuc
Coverdesign:Wiley
Copyright©2014byJohnWiley&Sons,Inc.Allrightsreserved.
PublishedbyJohnWiley&Sons,Inc.,Hoboken,NewJersey.
PublishedsimultaneouslyinCanada.
Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,ortransmittedin
anyformorbyanymeans,electronic,mechanical,photocopying,recording,scanning,or
otherwise,exceptaspermittedunderSection107or108ofthe1976UnitedStates
CopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorization
throughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,Inc.,
222RosewoodDrive,Danvers,MA01923,(978)750-8400,fax(978)646-8600,oronthe
Web at www.copyright.com. Requests to the Publisher for permission should be addressed
tothePermissionsDepartment,JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/
permissions.
LimitofLiability/DisclaimerofWarranty:Whilethepublisherandauthorhaveusedtheir
besteffortsinpreparingthisbook,theymakenorepresentationsorwarrantieswithrespect
totheaccuracyorcompletenessofthecontentsofthisbookandspecificallydisclaimany
impliedwarrantiesofmerchantabilityorfitnessforaparticularpurpose.Nowarrantymay
becreatedorextendedbysalesrepresentativesorwrittensalesmaterials.Theadviceand
strategiescontainedhereinmaynotbesuitableforyoursituation.Youshouldconsultwith
aprofessionalwhereappropriate.Neitherthepublishernorauthorshallbeliableforanyloss
ofprofitoranyothercommercialdamages,includingbutnotlimitedtospecial,incidental,
consequential,orotherdamages.
Forgeneralinformationonourotherproductsandservicesorfortechnicalsupport,please
contactourCustomerCareDepartmentwithintheUnitedStatesat(800)762-2974,
outsidetheUnitedStatesat(317)572-3993orfax(317)572-4002.
Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Some
materialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-books
orinprint-on-demand.IfthisbookreferstomediasuchasaCDorDVDthatisnotincluded
in the version you purchased, you may download this material at http://booksupport.wiley.
com. For more information about Wiley products, visit www.wiley .com.
LibraryofCongressCataloging-in-PublicationData:
Spann,DelenaD.,1967-
Fraudanalytics:strategiesandmethodsfordetectionandprevention/DelenaD.Spann.
pagescm.–(TheWileycorporateF&A)
ISBN978-1-118-23068-8(hardback)–ISBN978-1-118-28699-9(ePDF)–
ISBN978-1-118-28273-1(ePub) 1. Fraud. 2. Fraudinvestigation. 3. Fraud–
Prevention. I. Title.
HV8079.F7S682013
658.4073–dc23
2013019909
PrintedintheUnitedStatesofAmerica
10 9 8 7 6 5 4 3 2 1
3GFFIRS 09/11/2013 3:21:23 Pagev
Tomydadandmom,PeterandRethaCookSpann,thegiversofmylife,whoboth
lovemejustasmuchasIlovemyselfandtothegreatcloudofwitnesseswho
keepwatchoverme
3GFFIRS 09/11/2013 3:21:23 Pagevi
3GFTOC 09/11/2013 3:23:7 Pagevii
Contents
Foreword xi
Preface xiii
Acknowledgments xv
Chapter1: TheSchematicsofFraudandFraudAnalytics 1
HowDoWeDefineFraudAnalytics? 2
MiningtheField:FraudAnalyticsinitsNewPhase 6
HowDoWeUseFraudAnalytics? 10
FraudDetection 10
HowDoWeDefineFraudAnalytics? 12
FraudAnalyticsRefined 12
Notes 13
Chapter2: TheEvolutionofFraudAnalytics 15
WhyUseFraudAnalytics? 17
TheEvolutionContinues 19
FraudPreventionandDetectioninFraudAnalytics 19
Incentives,Pressures,andOpportunities 21
Notes 22
Chapter3: TheAnalyticalProcessandtheFraud
AnalyticalApproach 23
TheTurnofTheAnalyticalWheel 23
ItTakesMoreThanOneStep 24
ProbabilitiesofFraudandWhereitAllBegins 28
WhatShouldtheFraudAnalyticsProcessLookLike? 29
DataAnalyticsExposed 31
Notes 32
vii
3GFTOC 09/11/2013 3:23:7 Pageviii
viii & Contents
Chapter4: UsingACLAnalyticsintheFaceofExcel 33
TheDevilRemainsintheDetails 50
Notes 55
Chapter5: FraudAnalyticsversusPredictiveAnalytics 57
OverviewofFraudAnalysisandPredictiveAnalysis 58
ComparingandContrastingMethodologies 60
13StepScoreDevelopmentversusFraudAnalysis 64
CRISP-DMversusFraudDataAnalysis 66
SAS/SEMMAversusFraudDataAnalysis 68
ConflictswithinMethodologies 69
CompositeMethodology 70
ComparingandContrastingPredictiveModeling
andDataAnalysis 72
Notes 76
Chapter6: CaseWareIDEADataAnalysisSoftware 77
DetectingFraudwithIDEA 79
FraudAnalysisPointsofIDEA 82
Correlation,TrendAnalysis,andTimeSeriesAnalysis 83
WhatisIDEA’sPurpose? 83
ASimpleScheme:ThePurchaseFraudofanEmployee
asaVendor 86
StagesofUsingIDEA 87
Notes 89
Chapter7: CentrifugeAnalytics:IsBigDataEnough? 91
SophisticatedLinkAnalysis 92
TheChallengewithAnti-Counterfeiting 93
InteractiveAnalytics:TheCentrifugeWay 93
FraudAnalysiswithCentrifugeVNA 95
TheFraudManagementProcess 100
Notes 105
Chapter8: i2Analyst'sNotebook:TheBestinFraudSolutions 107
RapidInvestigationofFraudandFraudsters 108
i2Analyst’sNotebook 109
i2Analyst’sNotebookandFraudAnalytics 113
HowtoUsei2Analyst’sNotebook:FraudFinancialAnalytics 116
Description:Proven guidance for expertly using analytics in fraud examinations, financial analysis,auditing and fraud prevention Fraud Analytics thoroughly reveals the elements of analysis that are used in today'sfraudexaminations, fraud investigations, and financial crime investigations. This valuable resource