# Technology in Auditing Using Benford?s Law

Length: 1523 words (4.4 double-spaced pages)

Rating: Excellent

#### Essay Preview

Technology in Auditing Using Benford’s Law

What started out as a curious observation by an astronomer in 1881 has the potential to have a significant impact on the audit profession 125 years later. In 1881, the astronomer “Simon Newcomb noticed that the front pages of his logarithmic tables frayed faster than the rest of the pages…”. Newcomb concluded “the first digit is oftener 1 than any other digit”. Newcomb quantified the probability of the occurrence of the different digits as being the first digit and as well as the second digit. For the most part, Newcomb just considered it a curiosity and left it at that. (Caldwell 2004)

In the 1920’s, a physicist at the GE Research Laboratories, Frank Benford, thought it more than a curiosity and conducted extensive testing of naturally occurring data and computed the expected frequencies of the digits. In Table 1, there is a table of these expected frequencies for the first four positions. Benford also determined that the data could not be constrained to only show a restricted range of numbers such as market values of stock nor could it be a set of assigned numbers such as street addresses or social security numbers. (Nigrini 1999)

The underlying theory behind why this happens can be illustrated using investments as an example. If you start with an investment of \$100 and assume a 5% annual return, it would be the 15th year before the value of the investment would reach \$200 and therefore change the first digit value to 2. It would only take an additional 8 years to change the first digit vale to 3, an additional 6 years to change the first digit to 4, etc. Once the value of the investment grew to \$1,000 the time it would take to change the first digit (going from \$1,000 to \$2,000) would revert back to the same pace as it took to change it from \$100 to \$200. Unconstrained naturally occurring numbers will follow this pattern with remarkable predictability. (Ettredge and Srivastava 1998)

In 1961, Roger Pinkham tested and proved that Benford’s law was scale invariant and therefore would apply to any unit of measure and any type currency. In the 1990’s, Dr Mark Nigrini discovered a powerful auditing tool using Benford’s law. He was able to determine that most people assume that the first digit of numbers would be distributed equally amount the digits and that people that make up numbers tend to use numbers starting with digits in the mid range (5, 6, 7).

MLA Citation:
"Technology in Auditing Using Benford?s Law." 123HelpMe.com. 24 Feb 2020
<https://www.123helpme.com/view.asp?id=87979>.

## Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

## Technology and Sex Essay

- Technology and Sex Two years ago the word sexting did not exist. The combination of the words “sex” and “text” is now a term that is heavily discussed and causes issues for parents, students, educators, and law enforcement. Although there is no legal definition of sexting, it generally refers to writing sexually explicit messages, taking sexually explicit photos of themselves or others in their peer group and technologically transmitting those photos and/or messages to their peers. Now many people don’t know the problems associated with sexting....   [tags: Technology]

Research Papers
2001 words (5.7 pages)

## Key Developments Within Coso 2013-15 Essay

- Key Developments within COSO 2013-15 • COSO released an updated internal control- integrated framework in 2013 which will supersede the 1992 framework by Dec 14 2014 • The SEC has stated the staff intends to monitor the transition for issuers using the 1992 Framework to evaluate rather any staff of commission action will be needed in the future. As the Framework was updated on Dec 14 2014 the staff that still abide by the 1992 Framework are likely to be questioned by the SEC regarding whether or not the 1992 Framework is a suitable framework • It is recommended that the SEC registrants that are subject to reporting requirements related to internal controls (ICRF) use the 2013 framework for r...   [tags: Internal control, Audit, Auditing, Enron]

Research Papers
1301 words (3.7 pages)

## Essay about Information Technology Based Fraud Tools

- Information Technology-based Fraud Tools Two of the biggest advancements in fraud-fighting techniques are data mining and continuous controls monitoring. Highlighting the need for advances in the industry, the PCAOB and the SEC collaborated together earlier last year to form a fraud-fighting task force and debuted the Accounting Quality Model (AQM), which is an advanced data mining auditing tool (Stuart, 2013). Numerous research studies have touted the effectiveness, in various environments while using data mining techniques....   [tags: Data mining, Data analysis, Regression analysis]

Research Papers
734 words (2.1 pages)

## The Impact Of International Auditing Standards On Auditing Essay

- The topic on auditing also prepares the accounting students to undertake quality audits so as to conform to the standards by reviewing the objective evidence. Quality audits verify the effectiveness of the management system. They are also essential in providing evidence that is concerned with the elimination and the reduction of problem areas since they are management tools for achieving continuous improvement in the organization. In addition, the knowledge on international auditing standards acts as a competitive advantage for the accounting students in the job market....   [tags: Audit, Auditor's report, Auditing]

Research Papers
1256 words (3.6 pages)

## Information Technology and The Auditing Professional: The Statements of Auditing Standards No. 109

- Today’s auditors must possess additional skills in order to perform their work. As more and more businesses use information technologies (IT) and set up an information system (IS) to process all their data, auditors must get acquainted with essential aspects of their clients’ information systems and also make use of information technology in order to perform their duties. In this essay, we will attempt to answer the following two questions: 1) “What aspects of clients' accounting information systems must be understood by auditing professionals?” and 2) “How should auditing professionals use their firm's information technology in performing their work?” As the use of information systems has e...   [tags: Information Technology]

Research Papers
877 words (2.5 pages)

## Risk Management Process Is Comprehensive And On Going Essay

- 2.3.5. Ensuring Risk Management Process Is Comprehensive And On-going Risk management refers to an activity that integrates the identification of risk, its assessment, developing various strategies to manage risk, and the mitigation of various risk through the use of managerial resources (Galorath, 2006). Financial risk management is done by auditor and the audit committee focuses on risks that can be managed using various financial instruments (ISO, 2008). Objective of risk management activity is to decrease various risks related to financial records in companies (SBP, 2003)....   [tags: Risk management, Risk, Auditing, Management]

Research Papers
1091 words (3.1 pages)

## The Importance of IT Auditing in the Modern World of Business Essay

- ... Some organizations have a full time IA team while still requiring assurance services from the EAs. Having both audit functions may result in the possible reduction in audit fees, the increased tendency by IA to be effective in the identification and prevention of internal fraud, professional collaboration between the audit functions that prevents duplication, and the cross-training that may result by the synergetic effect from both functions (Schneider, 2009). This part of the course expands the different function of IA and EA and discusses the changes brought by the SOX Act....   [tags: foundations of computer network auditing]

Research Papers
1312 words (3.7 pages)

## The Impact of Technology on Law Enforcement and Organized Crime Essay

- Organized crime involves the illicit flow of goods and services in one direction and the flow of the profits of crime in the other. Technology has created much change in the way organized crime groups conduct operations. It has also caused law enforcement organizations to evolve and use a variety of techniques and methods to effectively combat organized crime groups. In order for law enforcement to effectively target and prosecute these groups they must adapt as the organized crime groups have in their use of technology....   [tags: Law Enforcement, technology, criminal justice]

Research Papers
2658 words (7.6 pages)

## Essay on Auditing Quality And Audit Quality

- Introduction Auditors play an important role to promote the public interest by providing accurate and independent audit reports about the financial report (Public Company Accounting Oversight Board, 2016). However, scandals like Enron and WorldCorn have cause public doubt and distrust the auditor and audit quality. The public thinks only auditors contribute to the outcome of auditing. However, professions believe auditor not only responsible for audit quality but also many stakeholders affect audit quality....   [tags: Audit, Auditing, Auditor's report]

Research Papers
1919 words (5.5 pages)

## Essay on Auditing

- Auditing Auditing has been around since the mid-1800's, which originated in British. Some of firms today have been around since the 1800's, such as Deloitte & Co. Price Waterhouse & Co. In this paper, I will state the functions of auditing, the nature of auditing, how the standards apply to financial, operational, and compliance audits, and some other items that pertain to auditing in general. Nature of Auditing The nature of auditing is that auditors are placed with a special purpose, which is to provide credibility to the information that is reported on the financial statements, along with any other audits that are done by them....   [tags: Accounting Audit]

Free Essays
1104 words (3.2 pages)

### Popular Essays

Therefore, performing an analysis of a set of numbers comparing their distribution of the digits to the frequency expected under Benford’s Law can indicate that there may be manipulation of the set of numbers and this manipulation could represent fraud. Dr. Nigrini has continued to focus on ways to use Benford’s Law as a fraud detection tool. (Walthoe et al. 1999)

As I first learned of this predictability of numbers and how they could be used to detect fraud, my interest perked. I understand the basic logic of how and why this works but I am most interested in how to apply Benford’s Law in the work I do. It appears fairly simple, with the power of computers and the easy access to enormous amounts of data, to quantify how a set of data compares to the expected results using digital analysis based on Benford’s Law. Once you compare the results, what does it all mean?

The first criterion is to have sufficient data. Dr. Nigrini suggests that a minimum of 1,000 records are needed to expect good conformity to Benford’s law. A data set with 3,000 or more records should provide excellent conformity to Benford’s Law. Data sets below 300 records are not practical to be tested using Benford’s Law and data sets between 300 and 1,000 records should be expected to have higher deviations from Benford’s Law. Secondly, we must choose the tool we will use to perform the analysis. Microsoft Excel will perform the analysis but you will be limited to data sets with less than 65,536 records. Microsoft Access seems to be a preferred choice as it is not limited as to the number of records in the data set and it can easily read various files using its ODBC capabilities. Access also has strong grouping and data filtering features that are useful for digital analysis. There are also many specialized data analysis software products which are usually more expensive than Microsoft Access. (Nigrini 2002)

Once you have performed the analysis, how do you interpret the results? You are looking for an abnormal occurrence of a set of digits. The most appropriate test is to test the occurrence of the first 2 digits. Once you find an abnormal occurrence, you would group and filter the data to isolate the abnormal transactions and evaluate the items to determine what caused this abnormality. In one example, there was a high occurrence of the first 2 digits of 50 and 80 based on a data set of 89,000 check payments. Upon further review, it was determined that there was a high incidence of travel advances of \$500 and \$800. While this abnormality did not represent fraud, it did lead to a management recommendation that credit cards be issue to key employees to reduce the need for the excessive travel advance transactions. Likewise, you can test the last 2 digits. In one example, a company that typically would not have sales that lead to zero cents tested their data based on the last 2 digits. The results produced an abnormally high incidence of sales ending in zero cents, fifty cents and seventy-five cents. After filtering out these transactions and reviewing the sales orders, it became apparent that the sales were made to a company that did not exist and the goods were located in the garage of the sales person. (Lanza 1999)

The auditor should consider that the analysis may test normal for the entire population of the data set but when it is subdivided into logical subsets such as office locations, the analysis may show abnormal distribution. Since the fraud is probably limited to a particular office, performing an analysis on these subsets should also be a part of the tests. (Albrecht 2002)

Tax authorities have determined that the use of Benford’s Law will help them detect fraud as taxpayers who make-up numbers when completing their tax returns fail to consider that the numbers do not follow the distribution patterns of Benford’s Law. Therefore, more and more tax compliance software includes digital analysis of the numbers on tax returns to identify potential fraudulent returns. The returns must still be reviewed or audited to determine if there was fraud.

Using Benford’s Law to detect fraud is limited when the incidence of the fraudulent transactions is a small number of transactions. Likewise, a data set that does not conform to Benford’s Law does not mean there was fraud. This can be illustrated by the excessive travel advances mentioned earlier. If the data set “being tested has a large number of transactions, it will take a smaller proportion of inconsistent numbers to trigger a significant difference from expected…”. For example, it would take 75 (0.75%) abnormal transactions to signal a deviation in a data set of 10,000 records while it would take 23 (2.3%) abnormal transactions in a data set of 1,000 records. Since the analysis is relatively easy and quick, it makes sense to test the entire data set rather than a sample. (Durtschi et al. 2004)

Benford’s law is also limited in the type of fraud it will detect. The person perpetrating the fraud has either added transactions or removed transactions on a basis that would not conform to Benford’s law. (Durtschi et al. 2004)

Benford’s Law lends itself to assist in meeting the requirement under SAS 99 to use analytical tests in the planning stages of the audit. The auditor must also realize that Benford’s law has limitations and cannot be relied upon as the sole method used to detect fraud. Benford’s Law is best considered as a tool to identify accounts reflecting abnormal distributions and further investigation and analysis should be performed. (Durtschi et al. 2004)

Benford's Law
Expected Frequencies of Digits

Position in Number
Digit     1st     2nd     3rd     4th

0          11.968%     10.178%     10.018%
1     30.103%     11.389%     10.138%     10.014%
2     17.609%     10.882%     10.097%     10.010%
3     12.494%     10.433%     10.057%     10.006%
4     9.691%     10.031%     10.018%     10.002%
5     7.918%     9.668%     9.979%     9.998%
6     6.695%     9.337%     9.940%     9.994%
7     5.799%     9.035%     9.902%     9.990%
8     5.115%     8.757%     9.864%     9.986%
9     4.576%     8.500%     9.827%     9.982%

Table 1

Source: Nigrini, M.     1996. A taxpayer compliance application of Benford’s Law. The Journal of the American Taxation Association 18 (Spring): 72-91.

REFERENCES
Albrecht, W.     2002. Root out financial deception: detect and eliminate fraud or suffer the consequences. Journal of Accountancy (April).

Caldwell, C.     2004. Benford’s law. The Prime Glossary.

Durtschi, C., and Hillison, W., and Pacini, C. 2004. The Effective Use of Benford’s Law to Assist in Detecting Fraud in Accounting Data. Journal of Forensic Accounting (Vol. V): 17-34.

Ettredge, M., and Srivastava, R     1998. Using Digital Analysis to Enhance Data Integrity.

Lanza, R.     1999. Digital Analysis? Real World Eaxmples. ITAUDIT (Vol. 2, July).

Nigrini, M.     1999. I’ve Got Your Number. Journal of Accountancy (May).

Nigrini, M.     2002.     Using Microsoft Access for Data Analysis and Interrogation : 17.

Walthoe, J., and Hunt, R., and Pearson, M.     1999. Looking out for number one.