Group Members :
Rifda Nadifah (C1I016020)
Fatikhah Geya Rizki Syah Putri (C1I016035)
Safira Ulfa (C1I016049)
Khoirunnisa Abidah (C1I016050)
Top Five Fraud Axioms IT Auditors Should Know
1 .
Professional Skeptism
Professional skepticism is a critical component of an
auditor's duty of care that applies throughout any engagement. It's an attitude that includes a questioning
mind and a critical assessment of the appropriateness and sufficiency of audit
evidence. It requires being alert to
conditions that may indicate possible misstatement due to error, neglect or
fraud, and a critical assessment of audit evidence.
Therefore One of
the first things with which IT auditorscneed to get comfortable is the
realistic view of th scope of fraud. According to the Association of Certified
Fraud Examiners (ACFE), the total loss from fraud in any one year in the US is
between 5 and 7 percent of gross revenues, with the latest statistic estimating
total losses in the US economy at almost US $1 billion. So, the conclusion is
twofold: Fraud has a vast scope, and it can happen anywhere. Therefore, it is
important to be consistent with professional skepticism. Also, the fraudster
(white-collar criminal) is usually someone that is least suspected. In fact, fraudsters
frequently do not look like crooks at all. Statistical profiles of white-collar
criminals describe them as tending to be tenured at the entity, in a trusted
position because they earned the trust of management, and relatively well
educated.2 Again, professional skepticism is necessary to prevent one from
being fooled, and, even then, there is a chance a fraudster can get away with a
crime.
In the
International Standards on Auditing 200 (IAASB, 2009) too emphasized the
importance of professional skepticism. It was stated that the auditor must plan
and carry out the audit process based on scepticism professionals by being
aware of possible material errors financial statements. The auditor's work is
always related to proof and search for the truth of the evidence from documents
and working papers, and from the procedure the standards they adhere to, but
this does not mean the auditor only works to fulfill existing standard
procedures, especially when important evidence is found, because without the courage
to compete arguments about management assertions, the auditor will not be able
to run its function as prevention and detection of fraud (Financial Reporting
Council,2010). For this reason, the auditor must be able to apply the right
level of professional skepticism.
2.
Toe
In The Water
Toe
in the water means trial and error, like a finger dipped in water to test and
find out the temperature of the water. One theory of fraud suggests that
fraudsters begin their slippery slope into crime with a “test.” That is, they
put together a fraudulent transaction or event and “float” it out into the
entity’s environment to see if they can get away with the fraud.
If
they get a notification, they will apologize "oops, I made mistake"
to defend themselves and cover up their actions. and if they don't get a
notification they will continue the fraudulent action. IT Auditors must know
actions like this and must be able to handle them properly, for example if the
IT Auditor encounters irregularities, then the IT Auditor must meet the
responsible party and follow up firmly. The IT auditor should
exercise due diligence in obtaining independent verification where feasible and
should
obtain it before approaching the party responsible for the transaction, where
feasible—
Especially
where circumstances increase suspicion. For example, in one fraud case, the
auditor came to the responsible party and asked why a certain account amount
was exactly double what it should have been. The accounting clerk stuttered,
having been surprised, and the auditor himself gave the person an opportunity
to use the “oops” defense, as he said to her, “You must have accidentally
double paid the vendor.” In reality, it was a fraud scheme and not an
overpayment.
3.
Escalation
Of The Crime
Most fraudsters who get caught tend
to escalate their crime. the fraudster who floats the test and finds that it
goes unnoticed will decide to take more from the victim. That can be done by
committing more fraudulent transactions in a shorter period of time, taking
larger amounts in each transaction or adding a new scheme. But, this escalation
is good news to those looking for evidence of fraud because it makes it easier
to discover. for example IT Auditors can see from a significant increase in
purchases from one vendor suspected of having a red flag.
4.
Tip
From Iceberg
Often, fraud is discovered
accidentally as the
result of a deliberate procedure. In such cases, usually clever auditors see an
event or transaction (for example, a check worth US $ 2,000), become suspicious
for one reason or another (often described by experts as a "smell
test"), and choose to dig deeper (for example, to find dozens of other
checks totaling US $ 400,000 and other fraud schemes). This is the "tip of
the iceberg" theory or what we often know as iceberg theory. The
understanding of the tip of the iceberg theory states that behavior is
determined by the subconscious which contains instincts or natural instincts
and human biological impulses.
While in the unconscious mind we can
never see the biggest part of the human mind. If this is related to the theory
of success, we cannot argue that someone usually gets success after making
various choices of actions or words that can be seen or actually done as in the
theory of decision making in psychology.
Psychological conditions that are not
always seen by Freud are divided into three structures of human consciousness,
namely: conscious, conscious (unconscious), unconscious.
a. Conscious
At this level, awareness contains
all the things that have been observed at a certain time. It's just that a
small part of mental life (memory, perception is fulfilled by things, feelings
and thoughts) that will enter into this level of consciousness.
In all processes that occur at this
level of consciousness (memories, perceptions, feelings and thoughts) are the
results of screening which is regulated by stimulus and will not last long. So
that the mental processes that occur will then be suppressed and enter into
prejudice (preconscious) or unconscious (unconscious).
b. Consciousness
Awareness or preconscious is part
of available memory, where at this level it becomes a bridge between conscious
and unconscious. Because its function is to become a bridge then at the level
of the prasadar contains material that comes from conscious (unconscious)
(unconscious).
When what has happened and experienced
is no longer observed, all processes will be moved into the prasadar then then
unconscious. But at any time, memories from the unconscious can appear to the
preamble in symbolic form in the form of dreams, wrong speech or reflex
movements and self-defense mechanisms.
c. Unconscious
This part is the deepest level of
the structure of human consciousness according to Freud. In particular,
according to Freud he proved that unconsciousness is not hypothetical
abstraction but an empirical reality.
On this unconscious level or more
commonly known as the human subconscious it contains instincts or instincts,
stimuli, natural impulses brought by humans from birth, and traumatic
experiences that can be repressed or suppressed from the conscious level to the
unconscious. All mental processes that are suppressed into unconscious thinking
can last long and can affect human behavior without realizing it.
This certainly becomes a symbol that the
ice that is always on the surface of the water will only leave a few parts that
appear to the surface and most are below the surface of the water. This is the
same as the level of human consciousness where more mental processes occur at
the unconscious level and only a few are at the conscious level in the
psychology of communication.
Ice which is mostly below the surface of
the water is likened to the level of human unconscious thinking, while the
parallel part of the ice on the surface of the water is the level of prejudice
and ice that is at the top of the surface of the water is human consciousness.
In addition to dividing this mental
process into three levels of consciousness, in its development Freud also
divided the process of dynamics of human psychology into three important
components that are interrelated and related to each other in producing
behavior.
For example, if an IT auditor pays
attention in data that an employee receives two checks in one pay period for
the same gross amount and company policy does not allow more than one check per
payment period, that would be an anomaly (red) flag). Someone might give
reasons that sound legitimate for duplication ("oops"), but IT
auditors should consider tracing these facts to see if there is more fraud and
/ or suspicious data there.
This concept extends to the invention of
fraudsters. It is very common for fraudsters who are caught and choose to
confess, recognizing the amount of fraud known to date, or a number far below the
actual number (that is, claiming to be at the tip of the iceberg or
significantly smaller than the entire iceberg). Obviously, fraudsters hope the
victims will stop looking for and deal with lower amounts. For example,
fraudsters can decide that it is easier to claim to be US $ 30,000 and repay
it, rather than recognizing the actual US $ 400,000 fraud. Thus, IT auditors
and fraud investigation teams must consider a thorough fraud audit to determine
the amount of loss independent of the fraudster, to the extent practicable.
Subsequent fraud audits will likely benefit from data mining and data analysis
by IT auditors.
5. Data Mining And Analysis
Data can be invaluable
in a fraud investigation.
Proper data mining and data analysis can lead to a proper description
of the fraud, how it took place, what controls were thwarted, the approximate
level of loss and even
who committed the fraud. So the IT auditor can play an invaluable role in
gathering data, mining it, analyzing it, and providing the lead
investigator with evidence and information. Also, the IT auditor
can be an invaluable resource to convert the mass of data into
something that a judge or members of a jury can easily understand and
assimilate into their thought processes
(e.g., charts, diagrams, other high-tech visual aids).
But,
usually, the data alone are insufficient to make a case, even if it is a
corporate investigation. A court case will likely require more than just
the data. Therefore, the IT auditor needs to work closely with the lead investigator
and others on the
investigation team, as the team will likely need to conduct interviews and perform
other tasks to collect more evidence and information.
Witten
and Frank defined data mining as the process of discovering patterns in data.
The process must be automatic or (more usually) semi automatic. The patterns
discovered must be meaningful in that they lead to some advantages, usually an
economic advantage. The data is invariable present in substantial quantities. In other words, we
could describe data mining as the use of sophisticated data search in order to
discover patterns and connections in large pre-accessible databases.
In
general, data mining techniques can be classified into two categories according
to the type of the machine learning techniques as:
1)
Supervised Learning for
Fraud Detection
This method uses supervised
learning in which all the available records are classified as „fraudulent‟ and
„non-fraudulent‟. Then machines are trained to identify records according to
this classification. However, these methods are only capable of identifying
frauds that has already occurred and about which the system has been trained.
2) Unsupervised
Learning for Fraud Detection
This
method only identifies the likelihood of some records to be more fraudulent
than others without
statistical analysis assurance.
Fraud possibilities co-evolve with
technology, esp. Information technology Business reengineering,
reorganization or downsizing may weaken or eliminate control, while new information systems may present additional
opportunities to commit fraud.
Traditional methods of data analysis have
long been used to detect fraud.
They require complex and time-consuming investigations that deal with different
domains of knowledge like financial, economics, business practices and law.
Fraud often consists of many instances or incidents involving repeated
transgressions using the same method. Fraud instances can be similar in content
and appearance but usually are not identical.
The first industries to use data analysis
techniques to prevent fraud were the telephone companies, the insurance companies and the banks (Decker 1998).
One early example of successful implementation of data analysis techniques in
the banking industry is the FICO Falcon fraud assessment system, which is based
on a neural network shell.
Retail industries also suffer from fraud
at POS. Some supermarkets have started to make use
of digitized closed-circuit television (CCTV)
together with POS data of most susceptible transactions to fraud.
Conclusion
The
IT auditor has a key role in fraud detection, prevention and investigation in
today’s business world. It is important for the IT auditor to
understand the key aspects of antifraud as it relates to IT audit.
This knowledge could help the IT auditor be prepared to
recognize a piece of fraud evidence, develop a sense of red flags and
understand how certain fraud schemes are perpetrated. These five issues are a
start in developing the
knowledge and skills to be effective at detecting and investigating frauds.