mis 5208 –data analytics for it auditors and cybersecurity
TRANSCRIPT
![Page 1: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/1.jpg)
MIS5208 – Data Analyt ics for IT Audi tors and Cybersecur i ty
EdFerrara,MSIA,[email protected]
Lecture02:TheNatureofFraud
![Page 2: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/2.jpg)
Learn ing Outcomes
§ Fraudisaseriousissue§ Whatisfraud?§ Differenttypesoffraud§ Understandfraudagainstandonbehalfofanorganization§ Criminalandcivilfraud§ Fraudfightingcareers
![Page 3: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/3.jpg)
TheManyFacesofFraud
![Page 4: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/4.jpg)
Fraud
Theft(Misappropriation)
CorruptionDeceptiveStatements
![Page 5: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/5.jpg)
FraudTheintenttodeceivetoobtainanunearnedbenefit.
Fraud:• Isanillegalactoracts(intentionalwrongdoing thatviolatesalaworlaws)• Includestheconcealmentoftheactoracts• Resultsinthe perpetratorsgaining financialbenefitfromtheact(monetizingthe
gains- cashoranothervaluablecommodity)
Examples:• Borrowingmoneyusingsomeoneelse’sidentity• Misrepresenttheprofitabilityofapubliclytradedcompanytoartificiallyinflatethe
company’sstockprice• Misrepresenttheprofitabilityofaprivatelyheldcompany,whensellingthe
company,tomakethebuyerbelievethecompanyisworthmorethanitactuallyis• Plantsmallquantitiesofvaluableoreonlandforsaletodeceivepotentialbuyers
aboutthevalueoftheland• Usingastolencreditcardtopurchasegoodsandorservices
• Oftenseeninconjunctionwithmoneylaunderingtohidetheproceedsofthefraud
![Page 6: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/6.jpg)
FraudOther ExamplesFraudthatbenefits AnOrganization Fraudthatharms anorganizationImpropertransferpricingbetweenrelatedentities
Stealingmoney,property orfalsifyingfinancialrecordstocoverupatheft
Intentional improperrelated-partytransactionswhereonepartyreceivessomebenefitnotobtainableinanormalarm’slengthtransaction.
Intentionally misrepresentingorconcealingeventsordata
Legallytransferring(assignment)fictitiousormisrepresentedassetsor sales
Submitting claimsforservicesorgoodsnotactuallyprovidedbytheorganization.
Deliberatemisrepresentingorvaluingassets,liabilitiesorsalesinafinancialtransaction
Conductingbusinessactivities thatviolategovernmentstatutes,rules,regulations,orcontracts
Misrepresentingthefinancial statusofanorganizationtooutsidepartiesbyintentionallyfailingtodisclosesignificantinformation.
![Page 7: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/7.jpg)
Assoc iat ion of Cert i f ied FraudExaminers§ Theworld'slargestanti-
fraudorganizationandpremierproviderofanti-fraudtrainingandeducation.
![Page 8: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/8.jpg)
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 9: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/9.jpg)
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 10: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/10.jpg)
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 11: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/11.jpg)
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 12: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/12.jpg)
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 13: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/13.jpg)
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 14: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/14.jpg)
FraudCosts
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 15: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/15.jpg)
FraudCosts
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 16: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/16.jpg)
FraudCosts
© 2014 Association of Certified Fraud Examiners, Inc. All rights reserved. “ACFE,” “CFE,” “Certified Fraud Examiner,”
![Page 17: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/17.jpg)
TheMovies
![Page 18: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/18.jpg)
In t roduct ion to Fraud
Source: © 2016 Cengage Learning. All Rights Reserved.
![Page 19: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/19.jpg)
TheWizard of L ies
“Therearenoinvestments,”hesayswithchillingsimplicity.“Imadethemup.Itooksome
moneyfromsomepeopleandgaveitotherpeople.There’s
nothingleft.”
Fraud,Greed,DeceptionandConfidence
Source:Rorke, R. (2017). HBO’s Madoff movie is a powerful character study. New York Post. Retrieved from https://nypost.com/2017/05/19/hbos-madoff-movie-is-a-powerful-character-study/
![Page 20: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/20.jpg)
Ponz i Schemes
Source: http://www.investologic.in/wp-content/uploads/2014/03/Ponzi-Schemes.jpg
Source: http://thelabeconomics.blogspot.com/2013/01/our-whole-economy-is-ponzi-scheme.html
![Page 21: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/21.jpg)
Types of Fraud
Victim Thetargetorganization
Perpetrator Employeeoroutsiderwho“cons”employees
Victim(s) Shareholders
Perpetrators Corporate officers
AgainstanOrganizationorIndividual OnBehalfofanOrganization
![Page 22: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/22.jpg)
Secur i t ies Fraud§ Pennystockfraud§ Stockpricerisesdueto
brokerbuyingthestockartificiallyinflatingtheprice
§ Usingfalsereportingandmanipulativebusinessactivities
§ http://www.fbi.gov/cleveland/press-releases/2014/penny-stock-fraud-nets-millions
§ http://www.wsj.com/articles/sec-charges-two-with-penny-stock-fraud-1405716923
![Page 23: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/23.jpg)
FraudC lass i f i cat ionOccupationalFraud- AFCE Description
Assetmisappropriation Misuseofanorganization’sassets
Corruption Influencewrongfullyusedtochangetheoutcomeofabusinesstransactionforthebenefitoftheperpetrator
Fraudulentfinancialstatements Adulteration offinancialstatementstohideoroverstatefinancialperformance– fraudulentlyinfluencinginvestorinterest.
Victim Perpetrator
Companyor Organization Employeeembezzlement – employeeistheperpetratorVendorfraud – vendoristheperpetratorCustomer fraud– customeristheperpetrator
Shareholders,debt-holders oftheorganization
Management
Investor(Stock,Bond,RealEstate)
Dishonest brokerages,individuals
Miscellaneous Probablytoo manytoname,counterfeitRolexwatches,PokeMoncards,etc.
![Page 24: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/24.jpg)
Types of FraudTypeofFraud Perpetrator Victim Explanation
Employeeembezzlement Employees Employer Employeesusetheirpositionstotakeordivertassetsbelongingtotheiremployer.Thisisthemostcommontypeoffraud.
Vendorfraud Vendors Theorganizationtowhichthevendorssellgoodsorservices
Vendorseitheroverbillorprovidelowerqualityorfewergoodsthanagreed.
Customerfraud Customer Theorganizationwhichsellstothecustomers
Customersdon'tpay,paytoolittle,orgettoomuchfromtheorganizationthroughdeception.
Managementfraud(Financialstatementfraud)
Management Shareholdersand/ordebt-holdersandregulators(taxingauthorities,etc.)
Managementmanipulatesthefinancialstatementstomakethecompanylookbetterthanitis.Thisisthemostexpensivetypeoffraud.
Investmentscamsandotherconsumerfrauds
Fraudperpetrators(all)
Investors ThesetypesoffraudsarecommittedontheInternetandinpersonandobtaintheconfidenceofindividualstogetthemtoinvestmoneyinworthlessschemes
Other(Miscellaneous)typesoffraud
Fraudperpetrators(all)
Allkinds—dependsonthesituation
Anytimeanyonetakesadvantageoftheconfidenceofanotherpersontodeceivehimorher.
![Page 25: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/25.jpg)
HowOccupat iona l Fraud i s Committed
![Page 26: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/26.jpg)
Occupat iona l Fraud – Percentageof Cases
26
![Page 27: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/27.jpg)
Occupat iona l Fraud – Median Loss
27
![Page 28: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/28.jpg)
Occupat iona l Fraud – In i t ia l Detect ion
28
![Page 29: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/29.jpg)
EmployeeEmbezz lement
§ Occupationalfraud(mostcommon)§ Employeesstealcompanyassets§ Isdirectorindirect
§ Direct:employeedirectlystealscompanycash,inventory,tools,supplies,orotherassets
§ Indirect:employeetakesbribesorkickbacksfromvendors,customers,orothersforlowersalesprices,higherpurchaseprices,nondelivery ofgoods,orthedeliveryofinferiorgoods
§ Example:CVCConstruction(direct)
![Page 30: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/30.jpg)
Vendor Fraud
§ Twomainvarieties:§ throughvendorsalone§ throughcollusionbetweenbuyersandvendors
§ Usuallyresultsin:§ overchargeforpurchasedgoods§ shipmentofinferiorgoods§ Nonshipment ofpurchasedgoods
§ Example:Halliburton
![Page 31: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/31.jpg)
Customer Fraud
§ Whencustomers§ donotpayforgoods§ paytoolittle§ getsomethingfornothing§ deceiveorganizationsintogivingthemsomethingtheyshould
nothave§ Example:ChicagoBank
§ $525KCashier’sCheck§ $70MtoSwissBankAccounts
![Page 32: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/32.jpg)
Management Fraud
§ Financialstatementfraud§ Topmanagementdeceptivelymisstatesfinancialstatements§ Examples:
§ Enron§ WorldCom§ Sunbeam
© 2016
![Page 33: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/33.jpg)
InvestmentandConsumerFraud§ Worthlessinvestmentssoldtoinvestors§ Examples:
§ Ponzischemes§ Telemarketingfraud§ Nigerianletterormoneyscams(419)§ Identitytheft§ Advancefeescams§ Redemption/strawman/bondfraud§ Letterofcreditfraud§ Internetfraud
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied, or duplicated, or posted to a publicly accessible website, in whole or in part.
![Page 34: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/34.jpg)
Fraud’s Impact
![Page 35: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/35.jpg)
United States Fraud StatutesStatute Title&Code Description
BriberyofPublicOfficialsandWitnesses
Title18,USCode§201 Briberyispunishable byuptofifteenyearsinprison,threetimesofthevaluegivenorreceived,anddisqualificationoftheofficerinvolved.
Anti-kickbackActof1986 Title41, USCode§51to58 Thegiving orreceivinganythingofvaluebyasubcontractor,toaprimecontractorinUSgovernmentcontractsisillegal.Violationsarepunishablebyafineandupto10yearsinprison.
MailFraud Title18, USCode§1341 The useofthemailsystemtodefraudanotherindividualororganizationisillegal.Violationsarepunishablebybothfinesandimprisonment.
BankFraud Title18,USCode§1344 Protects banksfromfraudbycustomers,officers,employees,andownersofabank,creditunionandotherorganizationsinsuredbyaUSfederalagency.
RacketeerInfluencedandCorruptOrganizations(RICO)Statute
Title 18,USCode§1961 Prohibits“racketeeringactivity”– twoormoreenumerated criminalviolationsthatcrossstatelines.
ComputerFraud Title18,USCode§1030 Punishestheintentional unauthorizedusetoa“protectedcomputer”forthepurposeofobtainingrestricteddatapertainingtonationalsecurity,confidentialfinancialinformation,committingfraud,damaging,ordestroyinginformationcontainedinthecomputer.
Securities Fraud Rule10(b)5Securities Actof1934,§17(a) Theuse ofmaterialinsideinformationtoinfluencethepurchaseorsaleofcompanysecuritieseitherdirectlyorthroughanexchangeisillegal.
ForeignCorruptPracticesAct(FCPA) Title15,USCode§78m,78a(b),78dd-1,78dd-2,78ff
Itisillegaltobribeforeignofficials
TaxEvasion Title26,USCode§7201
![Page 36: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/36.jpg)
Chinese Fraud Statutes§ Chinahastwosetsoflawsrelatedtobribery:
§ Onesetoflawsdealswithpaymentsgiventostateofficials,andadifferentsetappliestocommercialbriberybetweenprivatepersons.Lawsthatcriminalizeofficialcorruption,definedaspaymentstostateofficials,includeArticles389–95ofthePRCCriminalLaw.
§ Aseparatesetoflawsdealswithcommercialbribery.CommercialbriberyisprohibitedbyArticle8oftheAnti-UnfairCompetitionLaw(AUCL)andbyArticle163ofthePRCCriminalLaw.
§ PRCCRIMINALLAW,supranote18,atarts.389–95(amended1997).Article389provides:§ Anyone,whoviolatesthestateregulationsbyofferingmoneyorpropertytoa
statefunctionarywhileengaginginabusinesstransaction,wheretheamountinvolvedisrelativelylarge,orviolatesthestateregulationsbyofferinganykickbacksortransactionfeestoastatefunctionarywhileengaginginabusinesstransaction,shallbetreatedashavingcommittedthecrimeofbribery.
Source: Chow, D. (2012). The Interplay Between China’s Anti-Bribery Laws and the Foreign Corrupt Practices Act. Ohio State Law Journal, 73:5.
![Page 37: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/37.jpg)
Cr imina l and C iv i l F raud Laws
Various claims may be joined in one actionOnly one claim at a timeClaims
Parties may stipulate to a less than unanimous verdict
Unanimous verdictVerdict
Filing of a claim by a plaintiffDetermination by a grand jury that sufficient evidence exists to indict
Initiation
May consist of fewer than 12 personsJury must have 12 peopleJury
"Preponderance of evidence""Beyond a reasonable doubt"Burden of Proof
Restitution and damage paymentsJail and/or finesConsequences
To obtain a remedyTo right a wrongPurpose
CIVIL CASECRIMINAL CASE
![Page 38: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/38.jpg)
Civ i l Law§ ThecivillawsystemisderivedfromtheRomanCorpusJurisCivilus ofEmperor
JustinianI;itdiffersfromacommon-lawsystem,whichreliesonpriordecisionstodeterminetheoutcomeofalawsuit.MostEuropeanandSouthAmericancountrieshaveacivillawsystem.Englandandmostofthecountriesitdominatedorcolonized,includingCanadaandtheUnitedStates,haveacommon-lawsystem.However,withinthesecountries,Louisiana,Quebec,andPuertoRicoexhibittheinfluenceofFrenchandSpanishsettlersintheiruseofcivillawsystems.
§ IntheUnitedStates,thetermcivillawhastwomeanings.OnemeaningofcivillawreferstoalegalsystemprevalentinEuropethatisbasedonwrittencodes.Civillawinthissenseiscontrastedwiththecommon-lawsystemusedinEnglandandmostoftheUnitedStates,whichreliesonpriorcaselawtoresolvedisputesratherthanwrittencodes.Thesecondmeaningofcivillawreferstothebodyoflawsgoverningdisputesbetweenindividuals,asopposedtothosegoverningoffensesthatarepublicandrelatetothegovernment—thatis,civillawasopposedtoCriminalLaw.
Source: https://legal-dictionary.thefreedictionary.com/civil+law
![Page 39: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/39.jpg)
USCr imina l vs . C iv i lCriminal Civil
Purpose ToRightaWrong Toobtain aremedy
Consequences Jailandorfines Restitutionanddamagepayments
BurdenofProof Beyondareasonabledoubt Preponderanceofevidence
Jury Jurymusthave12people Mayconsistoffewerthan 12persons
Initiation Determinationbyagrandjurythatsufficientevidenceexiststoindict
Filingaclaim bytheplaintiff
Verdict Unanimousverdict Parties maystipulatetoalessthanunanimousverdict
Claims Onlyoneclaimatatime Variousclaimsmaybejoinedinoneaction
![Page 40: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/40.jpg)
Careers
![Page 41: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/41.jpg)
Fraud Invest igat ion Careers
§ AnalyticalSkills§ Examinedataforsymptomsof
fraud§ CommunicationSkills
§ Effectivelyinterviewwitnessesandsuspects
§ Communicatefindingstowitnesses,courtsandothers
§ TechnologicalSkills§ Searchforfraudbyeffectively
usinginformationsystems
§ AccountingandBusinessSkills§ LegalSkills
§ Civilandcriminallaw§ Criminology§ Privacyissues§ Employeerights§ Fraudstatutes§ Otherlegalfraud-relatedissues
§ Languageandculturalskills§ Theabilitytospeakandwritein
aforeignlanguage§ Aknowledgeofhumanbehavior
Skills
![Page 42: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/42.jpg)
Becomea Cert i f ied FraudExaminer
§ BeanassociatememberoftheACFEingoodstanding§ Meetminimumacademicandprofessionalrequirements:
§ Bachelor’sDegree§ Twoyearsofprofessionalexperiencedirectlyorindirectly
relatedtofraudexamination§ Beofhighmoralcharacter§ PasstheCFEExamination§ AgreetoabidebytheBylawsandCodeofProfessionalEthics
oftheACFE
![Page 43: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/43.jpg)
USFraud- f ight ing Careers
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied, or duplicated, or posted to a publicly accessible website, in whole or in part.
Lawyers provide litigation and defense work for companies and individuals being sued for fraud and provide special investigation services when fraud is suspected.
Law firms
Serve as an independent consultant in litigation fraud work, serve as expert witness, consult in fraud prevention and detection, and provide other fee-based work.
Consulting
Prevent, detect, and investigate fraud within a company. Includes internal auditors, corporate security officers, and in-house legal counsels.
Corporations
Conduct investigations, support firms in litigation, do bankruptcy-related accounting work, and provide internal audit and internal control consulting work.
CPA firms
FBI, postal inspectors, Criminal Investigation Division of the IRS, U.S. marshals, inspector generals of various governmental agencies, state investigators, and local law enforcement officials.
Government and law enforcement
TYPE OF CAREERTYPES OF EMPLOYERS
![Page 44: MIS 5208 –Data Analytics for IT Auditors and Cybersecurity](https://reader031.vdocument.in/reader031/viewer/2022012300/61e0a79872a5d9444061cfa8/html5/thumbnails/44.jpg)
NextLecture:WhyPeopleCommitFraud