Course Competencies
ACC 543 - 09/A2

Upon completion of the course, the student will be able to:

Data Analysis Techniques and Methods

1.      Discuss fraud in general, its causes, and the general allegations flowchart for fraud investigation. (C2)
    Fraud Definitions
    Legal Elements of Typical Criminal Frauds

2.      Explain the requirements of SIAS #3 and SAS #99 as well as SAS #94 and SAS #31 (including SAS#80). (C3)
    Key Conditions for Detecting Fraud
    Symptoms of Fraud
    Accounting Standards for Fraud

3.      Define CAATTs and relate their use in audits to the standards above as well as to SAS #56. (C4)
    Accounting Standards for Fraud

4.      Understand how the use of CAATTs is dependent on the type of IS environment. (C4)
   
Fraud Considerations When Obtaining Data

5.      Fully explain and be able to create a fraud investigation plan utilizing CAATTs. (C4)

6.      Discuss each of the steps in the CAATTs checklist process. (C5)

7.      Explain the various file issues involved with different file attributes, structures, databases, and their relationship to the successful use of CAATTs in a particular instance. (C5)
    Distributed Databases
    Files and Databases - Obtaining Information

8.      Discuss the various approaches to an initial understanding of the data, including:  Assessing the completeness of the data, filter or display criteria, using equations, gaps, statistical analysis, duplicates, and sorting and indexing. (C6)
    Data Analysis Steps

    Files and Databases - Obtaining Information

9.      Discuss the various approaches to providing an overview of the data, including: Summarization, stratification, and cross tabs and pivot tables. (C7)
   
Data Reliability in Fraud Investigations

10.  Discuss the various approaches to working with the data, including: Aging and join and relation. (C8)

11.  Discuss the various approaches to analyzing trends in the data, including: Trend analysis, regression analysis, and parallel simulation. (C9)

12.  Understand and be able to apply the appropriate analysis techniques within the various accounting cycles when there are known symptoms (or allegations) of fraud. (C10)

13.  Understand and be able to apply the appropriate digital analysis techniques when symptoms of fraud are unknown, including: Data profiling, ratio and variance analysis, and Benford’s Law. (C11)
    
Digital Analysis for Unknown Fraud Symptoms

14.  Explain the appropriate use of scripts and templates in auditing, investigations, and as a part of a proactive fraud prevention program. (C12)

Related Areas

15.  Explain how changes in business processes and the legal environment effect the use of CAATTs. (lecture)
    Summary of changes to Federal Rules of Civil Procedure 12/01/2006
    Electronic Discovery Reference Model
    Full text with notes of changes to Federal Rules of Civil Procedure re: Electronic Evidence 12/2006.

    Five common legal terms IT should know
    Roadmap to eDiscovery

16. Understand the difference between an external audit, an internal audit, a fraud investigation, and other types of forensic uses. Discuss the impact of these differences on the appropriate use of CAATTs. (lecture)
    The 2006 Internal Auditor Software Survey Results

    Categories of Fraud Investigation

17.  Discuss the general topic of computer crime and computer fraud. (lecture)
    Computer Crime
    Evaluation of Biometric Techniques
    Types of Computer Fraud

18.  Understand the practice and capabilities of computer forensics, including general approaches, tools, and various sources of information. (lecture)
   
Computer Forensics
    Forensic Science, IT and Accounting

18A. Familiar with various types of software tools utilized in forensic accounting. (lecture)
   
Forensic Tools

18B. Explain the use of CAATs in proactive fraud prevention. (lecture)
    Proactive Fraud Detection Program

18C. Discuss current computer issues and trends related to computer auditing and investigation. (lecture)
   
Employee Monitoring

ACL Application

19.  Develop an overall understanding of the ACL software, including accessing data, appropriately analyzing data for both audit and investigative purposes, and generating reports.

20.  Be able to apply ACL software in a variety of case situations for both audit and investigative purposes.
   
ACL - FAQs

IDEA Application

21.  Develop an overall understanding of the IDEA software, including accessing data, appropriately analyzing data for both audit and investigative purposes, and generating reports.
    Helpful @ Functions in IDEA

22.  Be able to apply IDEA software in a variety of case situations for both audit and investigative purposes.
    IDEA - FAQs

General Application

23.  Diagnose specific case situations, determine appropriate approaches, develop analyses, and present quality reports.

24.  Prepare and professionally present relevant and appropriate questions on various data analysis and techniques application areas.

25.  Prepare and professionally present elements of an engagement.

- last revised 3/08/2009 -

Home

Main Page

Contact

Contact rkulzick@stu.edu with questions or comments about this web site.
Copyright © 2007-2009 Raymond S. Kulzick - Last modified: March 08, 2009