Topics

Filter By:

Topic

Results: (86)

Upgrade your electronic document reviews with LLMs

When reviewing extensive amounts of electronic data, large language models can help fraud examiners work faster to reveal key details that may otherwise be overlooked. Here’s what you need to know to use this technology effectively to improve your electronic document reviews.

Written By: Chetan Lunkar, CFE

    • Computers and Technology
    • Fraud Investigation and Examination

Generative artificial intelligence is now the fraud perpetrator

Fraud examiners have historically relied on reviewing documents to identify fabricated invoices, altered records and falsified financial statements. But now fraudsters are using generative artificial intelligence to autonomously produce near-perfect fraudulent artifacts. GAI is now the fraud perpetrator. Here are ways to detect and deter it.

Written By: Zachary M. Kelley, Carolyn Conn, Ph.D., CFE, CPA

    • Computers and Technology
    • Fraud Prevention and Deterrence

Beware the dangers of AI chatbots but embrace investigatory advantages

AI chat prompts and results can persist on third-party servers, posing security risks but also offering investigative value. The authors provide strategies to safeguard data and leverage it effectively.

Written By: Carolyn Conn, Ph.D., CFE, CPA, Zachary M. Kelley

    • Computers and Technology
    • Cyberfraud
    • Technology

AI can simplify complexity in litigation support

Artificial intelligence can enhance litigation support by helping accounting experts simplify complex accounting concepts and present compelling evidence. Here’s how to navigate the technology’s limitations, legal implications and best practices for using AI to advance justice.

Written By: Rick C. Warne, Ph.D., CFE, CPA, Kim Charron, Ph.D., CPA, CMA, Robert M. Cornell, Ph.D., CMA

    • Accounting and Auditing
    • Computers and Technology
    • Legal Elements of Fraud

Separating objects from value: A high-tech approach to fraud prevention

Financial statement fraud is one of the costliest and most complex forms of fraud. Despite being the least common type of fraud (5% of cases), organizations lost a median $766,000 from it. The author explains how the 3P framework can help fraud examiners detect and prevent financial statement fraud.

Written By: Kurt Ramin, CFE, Klara Weiand, Ph.D., Tim Danne

    • Computers and Technology
    • Fraud Investigation and Examination
    • Fraud Prevention and Deterrence

Investigating data leaks from fraudulent tracking technologies

Unauthorized tracking technologies can steal personal data and threaten the security of company websites and applications. Here, the authors explore the benefits and disadvantages of using tracking technologies and lay out specific steps for investigating data leaks caused by unauthorized trackers. 

Written By: Karen Schuler, CFE, FIP, Taryn Crane, FIP

    • Computers and Technology
    • Consumer Fraud and Scams
    • Fraud Investigation and Examination

The data detective

The trove of leaked files from the Panama Papers and Paradise Papers exposed the secret offshore financial dealings of the global elite. Digging through those terabytes of data were hundreds of reporters led by Marina Walker Guevara. The Pulitzer-Prize-winning journalist talks to Fraud Magazine about managing news media collaborations, data investigations and the urgency for stories that hold the powerful to account.  

Written By: Jennifer Liebman, CFE

    • Anti-Fraud Laws Regulations and Compliance
    • Bribery and Corruption
    • Computers and Technology

Infiltrating the IT industry

Companies across the globe have unknowingly hired remote information technology workers acting on behalf of the Democratic People’s Republic of Korea (DPRK). Using stolen identities and gaining access to sensitive data, the workers illicitly generate revenue for the DPRK’s Weapons of Mass Destruction (WMD) and ballistic missiles programs (weapons program). The author breaks down elements of the scheme and provides tactics for organizations to avoid hiring bad actors.

Written By: Trisha Gangadeen, CFE

    • Computers and Technology
    • Fraud Prevention and Deterrence
    • Fraud Schemes

Detecting fraud without historical data

Datasets of documented fraud cases can be instrumental in detecting anomalies and patterns in all sorts of transactions, but many times those datasets aren’t available. With fraudsters perpetrating increasingly sophisticated schemes, fraud fighters need an edge on the criminals with advanced techniques. Here, the author describes how to use machine-learning models and other advanced techniques to detect fraud when you don’t have historical data to learn from.

Written By: Penny Li, CFE, CPA, Ning Ping Wang

    • Computers and Technology
    • Data Analytics
    • Fraud Investigation and Examination

Fraud investigations gone wrong

Failures in fraud investigations can hinder the pursuit of justice and the deterrence of fraudulent activities. The author examines two case studies that illustrate the immense impact that botched investigations can have on individuals, organizations and society.

Written By: Adesola Osuji, LLM, CFE, CISA

    • Accounting and Auditing
    • Computers and Technology
    • Corporate Governance

Begin Your Free 30-Day Trial

Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.