{"id":66,"date":"2015-01-06T02:23:50","date_gmt":"2015-01-06T02:23:50","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5208sp2015\/?page_id=53"},"modified":"2019-01-15T22:10:31","modified_gmt":"2019-01-16T03:10:31","slug":"week-2-fraud-detection-and-prevention","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/acl\/week-2-fraud-detection-and-prevention\/","title":{"rendered":"Fraud Detection and Prevention"},"content":{"rendered":"<h3>Class Presentation(s)<\/h3>\n<p>LE03 \u2013 Why People Commit Fraud (Ferrara)\u00a0MIS 5208 &#8211; LE03 &#8211; Why Commit Fraud<\/p>\n<p>LE04 \u2013 Preventing Fraud (Ferrara)\u00a0MIS 5208 &#8211; LE04 &#8211; Fighting Fraud<\/p>\n<h3>Required Reading(s)\/Viewing(s)<\/h3>\n<ol>\n<li>Coderre 1 \u2013 What Is Fraud?<\/li>\n<li>Coderre 2 \u2013 Fraud Prevention and Detection.<\/li>\n<li>Coderre 3 \u2013 Why Use Data Analysis to Detect Fraud?<\/li>\n<li>McGinty, J. C. (2014).\u00a0<a href=\"http:\/\/community.mis.temple.edu\/mis5208sp2015\/files\/2015\/01\/Accountants-Increasingly-Use-Data-Analysis-to-Catch-Fraud-WSJ.pdf\">Accountants Increasingly Use Data Analysis to Catch Fraud &#8211; Auditors Wield Mathematical Weapons to Detect Cheating<\/a>. The Wall Street Journal. (<a href=\"http:\/\/www.wsj.com\/articles\/accountants-increasingly-use-data-analysis-to-catch-fraud-1417804886\">Web Site<\/a>)<\/li>\n<\/ol>\n<h3>Optional Reading(s)\/Viewing(s)<\/h3>\n<ol>\n<li>Website:\u00a0<a href=\"http:\/\/www.journalofaccountancy.com\/issues\/2003\/jan\/auditorsresponsibilityforfrauddetection.htm\" target=\"_blank\" rel=\"noopener\">The Auditor\u2019s Responsibilities To Detect Fraud<\/a><\/li>\n<li>Monograph: Cser, A. (2010).<a href=\"http:\/\/community.mis.temple.edu\/mis5208sp2015\/files\/2015\/01\/Market_Overview_Fraud_Man.pdf\">Market Overview: Fraud Management Solutions &#8211; Seven Tenets Of Effectively Combating Fraud Costs.<\/a> Forrester Research.<\/li>\n<li>Video:<!--[if lt IE 9]><script>document.createElement('video');<\/script><![endif]-->\n\t<div class=\"wp-playlist wp-video-playlist wp-playlist-light\">\n\t\t<video controls=\"controls\" preload=\"none\" width=\"640\"\n\t\t height=\"360\"\t><\/video>\n\t<div class=\"wp-playlist-next\"><\/div>\n\t<div class=\"wp-playlist-prev\"><\/div>\n\t<noscript>\n\t<ol>\n\t\t<li><a href='https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-1-What-is-ACL.mp4'>Introduction to ACL Analytics - Module 1 (What is ACL)<\/a><\/li><li><a href='https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-2-Importing-Data.mp4'>Introduction to ACL Analytics - Module 2 (Importing Data)<\/a><\/li><li><a href='https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-3-Defining-Fields.mp4'>Introduction to ACL Analytics - Module 3 (Defining Fields)<\/a><\/li><li><a href='https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-4-Classifying-and-Summarizing-Data.mp4'>Introduction to ACL Analytics - Module 4 (Classifying and Summarizing Data)<\/a><\/li><li><a href='https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-5-Sorting-Extracting-and-Exporting-Data.mp4'>Introduction to ACL Analytics - Module 5 (Sorting, Extracting, and Exporting Data)<\/a><\/li><li><a href='https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-6-Joining-Data.mp4'>Introduction to ACL Analytics - Module 6 (Joining Data)<\/a><\/li><li><a href='https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-7-Age-and-Stratify-Data.mp4'>Introduction to ACL Analytics - Module 7 (Age and Stratify Data)<\/a><\/li><li><a href='https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-8-Sample.mp4'>Introduction to ACL Analytics - Module 8 (Sample)<\/a><\/li>\t<\/ol>\n\t<\/noscript>\n\t<script type=\"application\/json\" class=\"wp-playlist-script\">{\"type\":\"video\",\"tracklist\":true,\"tracknumbers\":true,\"images\":false,\"artists\":true,\"tracks\":[{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/files\\\/2018\\\/01\\\/Introduction-to-ACL-Analytics-Module-1-What-is-ACL.mp4\",\"type\":\"video\\\/mp4\",\"title\":\"Introduction to ACL Analytics - Module 1 (What is ACL)\",\"caption\":\"\",\"description\":\"\",\"meta\":{\"length_formatted\":\"18:47\"},\"dimensions\":{\"original\":{\"width\":1280,\"height\":720},\"resized\":{\"width\":640,\"height\":360}},\"image\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64},\"thumb\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64}},{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/files\\\/2018\\\/01\\\/Introduction-to-ACL-Analytics-Module-2-Importing-Data.mp4\",\"type\":\"video\\\/mp4\",\"title\":\"Introduction to ACL Analytics - Module 2 (Importing Data)\",\"caption\":\"\",\"description\":\"\",\"meta\":{\"length_formatted\":\"35:38\"},\"dimensions\":{\"original\":{\"width\":1280,\"height\":720},\"resized\":{\"width\":640,\"height\":360}},\"image\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64},\"thumb\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64}},{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/files\\\/2018\\\/01\\\/Introduction-to-ACL-Analytics-Module-3-Defining-Fields.mp4\",\"type\":\"video\\\/mp4\",\"title\":\"Introduction to ACL Analytics - Module 3 (Defining Fields)\",\"caption\":\"\",\"description\":\"\",\"meta\":{\"length_formatted\":\"18:35\"},\"dimensions\":{\"original\":{\"width\":1280,\"height\":720},\"resized\":{\"width\":640,\"height\":360}},\"image\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64},\"thumb\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64}},{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/files\\\/2018\\\/01\\\/Introduction-to-ACL-Analytics-Module-4-Classifying-and-Summarizing-Data.mp4\",\"type\":\"video\\\/mp4\",\"title\":\"Introduction to ACL Analytics - Module 4 (Classifying and Summarizing Data)\",\"caption\":\"\",\"description\":\"\",\"meta\":{\"length_formatted\":\"8:00\"},\"dimensions\":{\"original\":{\"width\":1280,\"height\":720},\"resized\":{\"width\":640,\"height\":360}},\"image\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64},\"thumb\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64}},{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/files\\\/2018\\\/01\\\/Introduction-to-ACL-Analytics-Module-5-Sorting-Extracting-and-Exporting-Data.mp4\",\"type\":\"video\\\/mp4\",\"title\":\"Introduction to ACL Analytics - Module 5 (Sorting, Extracting, and Exporting Data)\",\"caption\":\"\",\"description\":\"\",\"meta\":{\"length_formatted\":\"15:08\"},\"dimensions\":{\"original\":{\"width\":1280,\"height\":720},\"resized\":{\"width\":640,\"height\":360}},\"image\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64},\"thumb\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64}},{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/files\\\/2018\\\/01\\\/Introduction-to-ACL-Analytics-Module-6-Joining-Data.mp4\",\"type\":\"video\\\/mp4\",\"title\":\"Introduction to ACL Analytics - Module 6 (Joining Data)\",\"caption\":\"\",\"description\":\"\",\"meta\":{\"length_formatted\":\"8:27\"},\"dimensions\":{\"original\":{\"width\":1280,\"height\":720},\"resized\":{\"width\":640,\"height\":360}},\"image\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64},\"thumb\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64}},{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/files\\\/2018\\\/01\\\/Introduction-to-ACL-Analytics-Module-7-Age-and-Stratify-Data.mp4\",\"type\":\"video\\\/mp4\",\"title\":\"Introduction to ACL Analytics - Module 7 (Age and Stratify Data)\",\"caption\":\"\",\"description\":\"\",\"meta\":{\"length_formatted\":\"6:47\"},\"dimensions\":{\"original\":{\"width\":1280,\"height\":720},\"resized\":{\"width\":640,\"height\":360}},\"image\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64},\"thumb\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64}},{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/files\\\/2018\\\/01\\\/Introduction-to-ACL-Analytics-Module-8-Sample.mp4\",\"type\":\"video\\\/mp4\",\"title\":\"Introduction to ACL Analytics - Module 8 (Sample)\",\"caption\":\"\",\"description\":\"\",\"meta\":{\"length_formatted\":\"3:51\"},\"dimensions\":{\"original\":{\"width\":1280,\"height\":720},\"resized\":{\"width\":640,\"height\":360}},\"image\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64},\"thumb\":{\"src\":\"https:\\\/\\\/community.mis.temple.edu\\\/mis5208sec001spring2020\\\/wp-includes\\\/images\\\/media\\\/video.svg\",\"width\":48,\"height\":64}}]}<\/script>\n<\/div>\n\t<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Class Presentation(s) LE03 \u2013 Why People Commit Fraud (Ferrara)\u00a0MIS 5208 &#8211; LE03 &#8211; Why Commit Fraud LE04 \u2013 Preventing Fraud (Ferrara)\u00a0MIS 5208 &#8211; LE04 &#8211; Fighting Fraud Required Reading(s)\/Viewing(s) Coderre 1 \u2013 What Is Fraud? Coderre 2 \u2013 Fraud Prevention and Detection. Coderre 3 \u2013 Why Use Data Analysis to Detect Fraud? McGinty, J. C. [&hellip;]<\/p>\n","protected":false},"author":21825,"featured_media":0,"parent":2085,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"full-width-content","footnotes":""},"class_list":{"0":"post-66","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/users\/21825"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/66\/revisions"}],"predecessor-version":[{"id":4478,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/66\/revisions\/4478"}],"up":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/2085"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/media?parent=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}