Xpertsleague
Audit-Article & Blog

Simple Fraud Analytics for Accounts Payable

Simple Fraud Analytics for Accounts Payable

By David Coderre, President, CAATS, Chief Data Analyst, CTRLmatters

There is a lot of talk about Artificial Intelligent (AI) and unstructured data and how this will identify fraud and make life easier for financial monitoring, internal control and audit. 

This all sounds great, but we are not even making use of the structured data we have and some basic analysis techniques.  How then can we jump to AI and obtain reliable, understandable, actionable results?

So, let me give you some simple examples of how you can use data analysis techniques to understand your accounts payable business process and find fraud indicators and control weaknesses. 

I usually start with the data that supports the A/P business process, in this case: invoice number, vendor name and number, payment terms, invoice date, payment date, approver, entry clerk and amount. 

Next, consider the risks associated with each data element (e.g. what would happen if the invoice number was changed – duplicate payments; what if a clerk made changes to the payment terms – early or late payments).  Then determine the analysis that will determine if the data is being manipulated.  So, let’s look at some tests that can easily be performed using ACL software.

Improper entry of invoice numbers can lead to duplicate payments.  A simple addition of a period at the end of the invoice will allow invoice numbers “A123”, “a123” A 123” and “A123.” to be considered “not duplicates”.  Creating a invoice number that strips off all special characters and spaces goes a long way towards addressing this problem (Clean_InvNo = INCLUDE(UPPER(Invoice_No), “A~Z0~9” would change all the above invoice numbers to “A123”.

Improper entry of payment terms can lead to early or late payments.  Typically, the payment terms are stored in the vendor master data, but these can be changed when the invoice is entered.  Comparing the payment terms on the master record with the payment terms applied to the invoice will identify this problem.  Summarizing invoices, where this is the case, by entry user will determine who is doing this.

Duplicate vendor numbers can result is duplicate payments and payments made to fictitious vendors.  A simple test is to look for duplicates in the vendor master file.  Once again, it is important to use an intelligent duplicate test so the “AbC Corp” and “ABC Corporation” are considered duplicates.  With Arbutus’s Normalize() function you can address variations such as “The Corporate Group Ltd” and “Corporate Group Limited”.

User entry name is same as Vendor name – possible fraud.  By relating the user table to the detailed vendor payments, you can apply a filter that searches for instances where the name of the clerk doing the entry is similar to the vendor name (e.g. user “DCoderre” entered an invoice for “The Coderre Group Ltd”)

Vendor-Employee address match to employees with vendors.  First normalize the data (e.g. “St”, “St.” “Street”, etc. all become “St”).

Vendor only used by one user – possible fraud.  You can quickly summarize by Vendor and User to find cases where all payments to a vendor were processed by a single user.

You can also examine vendor payments to look for fictitious vendors.  Have you ever thought, “if only I could use analytics to find anomalies within subsets of my data – without having to isolate each subset individually.”  For example, identify payments to a vendor that do not match that vendor’s normal payment profile.  Take the example of 500,000 invoices and 100,000 vendors.  You are not going to filter on each of the vendors and examine their payments.

If you have ever wished you could perform this type of analysis, whether it is to provide assurance or to find possible fraud, waste and abuse, it is now as easy as a click of the mouse.  A simple CLASSIFY or SUMMARIZE using ACL software provides you with a file that shows the total amount of payments, the average, minimum (lowest) and Maximum (highest) payment for each vendor.

Vend # Total Average Min Max Std Dev
94905 50,803,060.81 3,175,191.30 452.08 50,000,000.00 12,090,709.28
90481 5,526,793.81 425,137.99 5,033.60 1,603,609.08 399,603.44
38105 2,711,402.20 225,950.18 108,486.38 1,084,863.78 263,694.87
34326 2,835,667.83 24,657.98 152.62 2,000,000.00 185,222.23
94902 1,900,638.11 45,253.29 476.54 1,091,548.00 164,716.32
94899 999,449.05 43,454.31 425.52 700,000.00 141,744.58

Given the above example, this would still result in a file with 10,000 rows – but we are not done yet.  You can sort the summarized file in descending order on the standard deviation and then filter for counts (number of invoices) greater than 10.  This will present the vendor payments that are anomalies – for that vendor – and identify the 10-20 worth further review.   The review can start with pulling up the detailed payment files (500,000 records) a filtering for the vendor you want to examine.  Now you have a small number of transactions for a vendor, one of which is significantly larger than all the others.  Check to see if the vendor invoice matches the vendor’s invoicing sequence; look at who certified the invoice; the fund or responsibility center, etc.  Typically, you will find one of the following: a fictitious payment; a payment to the wrong vendor; an incorrect amount; or an unusual, but appropriate, transaction.

The same type of analysis – examining transactions for slices of the data – can be applied to a wide variety of analyses.   I found a fraud where a low-level clerk was getting paid $62K – almost three times the amount of all other clerks.  Other examples areas include:

Basically, any area where there are multiple categories and multiple receivers – this approach to identifying values beyond the usual can be applied.

I hope this gives you a taste of what can be done with Arbutus and simple analytics.

 

Related posts

Fraud Report Affirms Internal Audit’s Value at Critical Time

Xpertsleague Visitor
3 years ago

Shall internal auditors be prepared to “Metaverse”?

Mikhail Ben Rabah
3 years ago

Guest Auditor Programs: Six Pitfalls to Avoid

Mikhail Ben Rabah
4 years ago
Exit mobile version