• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
    • Instructor
  • Class Materials
    • Classroom Recordings
    • Lectures
  • Class Blogs
    • About Blogs
    • Read Blogs Here
  • Schedule
    • ACL
      • Class 01 – Introduction to the Course and to Fraud
      • Class 02 – Fighting and Preventing Fraud
      • Class 03 – Fraud Detection
      • Class 04 – Data Driven Fraud Detection – Investigating Concealment and Money Laundering
    • ACL Labs
      • Lab 01 – Install ACL / Review and Work with On-Line Documentation
      • Lab 02 – ACL Analytics Basics | CPE (1.5)
      • Lab 03 – Fraud Scandals of Note
      • Lab 04 – ACL Analytics Foundations (CPE) (ACL 101 V4 CPE)
      • Lab 05 – Remediating Issues & Reporting Results (CPE) (ACL 105 V1 CPE)
      • Lab 06 – ACL Analytics Introduction to Scripting (CPE) (ACL 106 V1 CPE)
      • Lab 07 – Basics of Datetime Fields Learning Series (Basic-Intermediate) (ACL 210)
      • Lab 08 – Basics of Datetime Fields Learning Series (Basic-Intermediate) (ACL 210) (Continued…)
  • Quizzes and Tests
    • Mid-Term Exam
    • Final Exam
  • Grading and Policies
  • WEBEX

MIS5208 Spring 2018

DATA ANALYTICS FOR IT AUDITORS AND CYBERSECURITY

Week 3 blog post: Understanding data to find fraud

February 7, 2018 by Mahugnon B. Sohou

Today auditors and investigators can read multiple types of data thanks to audit software. The CAATTs computer-assisted audit tools and techniques outlines the firsts steps needed to ensure that the auditor understands how the data can be used to address specific audit objectives. The first step in finding the information needed for fraud detection is to identify the goals of the investigation. Then audit management needs to find the skills and technical capabilities required to proceed with the investigation.

The continuous improvement of auditing software gives auditors and investigators better tools to better interpret the data. There is a a variety of analysis techniques that can be used to understand the data and also to find fraud. This also encourages auditors to think about potentially new auditing applications to use in their operational environment.

 

Filed Under: General Tagged With:

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in