Thursday, November 12, 2009

Using business technologies to detect fraud

       Has your company faced a case of fraud from within? If not, think about the following cases.
       An accounts-payable clerk makes fictitious entries to steal money from the company to pay off his debts; a rogue trader creates false entries and counterparty accounts to mainipulate his trading position so as to receive a bigger bonus; or an accounting employee pays expense claims for employees who are not on the employee master file.
       These are only three among countless potential fraud situations that could devastate a company, not lonly from a financial perspective, but also in terms of its loss of reputation.
       So how do you manage fraud risk proactively - before suspicions are raised? How do you use widely available business technologies to create better anti-fraud programmes or for early identification of suspicious transactions?
       Some companies invest heavily in various information-management technologies, such as business intelligence, data warehousing, data mining, customer relationship management, analytics, integration and content management news. These technologies help generate different typres of data used mainly in operational and management processes. They also make report generation more efficient and provide analytical views from existing data. Companies can generate weekly management-information-system data, bi-weekly sales forcasts, or calculate monthly profit margins easily and automatically. new reports or queries can also be generated simply, if data are available.
       A number of these information-management technologies can be employed in different ways, one of which is to create a fraud-detection process to highlight suspicious transactions. You can use these technologies to perform in-depth analyses on large volumes of data embedded in your company's key sub-ledgers, including accounts receivable, accounts payable, revenue, inventory, payroll and fixed assets.
       To get started, here are few simple steps:
       Know what you have. Make an inventory of what systems you have in your environment (reporting tools, business intelligence, extract, transform and load, enterprise resource planning, customer relations managementm identity management and so on).
       Undersyand your data. What types of data are generated in your environment? Is the data correct? Is it consistent across systems? If not, what needs to be done to improve the data quality? Is manual reconciliation required? How long will the process take?
       Create exception reports for various fraud scenarios. To perform an in-depth analysis, use your information-management technologies to match existing data against fraud scenarios (for example, to identify an employee whose address is similar to a vendor's, or identify payments made to two invoices with the same reference numbers). List the exception reports each management division must monitor. These will highlight abnormal transactions that require investigation. Systems can even be configured to generate alert messages or automaltically send a notification to a supervisor or upper management, to enable prompt investigation of suspicious transactions.
       Existing technologies can be used to detect fraud. The key to success is the availability of good-quality data. If such data is not available, it is time to discuss why data that is important to fraud monitoring does not exist in your environment. This will provide good feedback on which to base performance improvement in your operations.
       If you take the suggested steps immediately, they will improve your ability to create a robust fraud-monitoring mechanism in your organisation.

No comments:

Post a Comment