Notice
As part of Phase 3 of our return to campus plan, most units will now run tutorials, seminars and other small group learning activities on campus for the second half-year, while keeping an online version available for those students unable to return or those who choose to continue their studies online.
To check the availability of face to face activities for your unit, please go to timetable viewer. To check detailed information on unit assessments visit your unit's iLearn space or consult your unit convenor.
Unit convenor and teaching staff |
Unit convenor and teaching staff
Moderator
Michael Quilter
Kathleen Clough
|
---|---|
Credit points |
Credit points
10
|
Prerequisites |
Prerequisites
ACCG6011 or ACCG611 or (admission to MActPrac or MBkgFin or GradCertForAccg or GradDipForAccg or MForAccgFinCri)
|
Corequisites |
Corequisites
|
Co-badged status |
Co-badged status
|
Unit description |
Unit description
In this unit students will be exposed to the theory and application of data analytics skills and techniques in relation to fraud detection and identifying business risks. The unit will introduce students to mechanisms and principles relevant to tracing assets, investigating flow of funds and reconstructing accounting information. Visual and location analytic capabilities that use a variety of tools and techniques, along with external data sets, will be explored. The unit will also equip students with the capacity to appraise applications and strategies to enable collection, assessment, review, production and presentation of unstructured data. |
Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates
On successful completion of this unit, you will be able to:
Late Submission(s) of Assessment
Late Submission(s): Where assessment is to be submitted through Turnitin, late assessment must also, where applicable, be submitted through Turnitin. No extensions will be granted. There will be a deduction of 10% of the total available marks made from the total awarded mark for each 24 hour period or part thereof that the submission is late (for example, 25 hours late in submission incurs a 20% penalty). Late submissions will not be accepted after solutions have been discussed and/or made available. This penalty does not apply for cases in which an application for Special Consideration is made and approved. Note: applications for Special Consideration Policy must be made within 5 (five) business days of the due date and time.
Name | Weighting | Hurdle | Due |
---|---|---|---|
Critical Essay | 40% | No | Wednesday, 9th September 2020 (2PM) - Week 7 |
Online Test | 20% | No | Saturday, 22nd August 2020 (9.30AM) |
Written Presentation | 20% | No | Wednesday, 28th October 2020 (2PM) - Week 12 |
Participation | 20% | No | Weekly, 11.59PM Sunday |
Assessment Type 1: Essay
Indicative Time on Task 2: 34 hours
Due: Wednesday, 9th September 2020 (2PM) - Week 7
Weighting: 40%
In this assessment students will be required to critically reflect on the key issues and principles of professional digital forensic practice in the recovery of digital evidence to support an investigation. The submission should not exceed 2500 words.
Assessment Type 1: Quiz/Test
Indicative Time on Task 2: 18 hours
Due: Saturday, 22nd August 2020 (9.30AM)
Weighting: 20%
The Online test may include one, or a combination of, the following types of assessment: multiple-choice questions, true/false questions, short answer style questions, problem scenario or evidence-based questions.
Assessment Type 1: Presentation
Indicative Time on Task 2: 18 hours
Due: Wednesday, 28th October 2020 (2PM) - Week 12
Weighting: 20%
In this assessment students will submit a written presentation that requires a consolidation of the theory, and application of data analytics skills and techniques to enable the assessment, review, and presentation of unstructured data relevant to advance a forensic accounting investigation. A summary report will be required to accompany the presentation.
Assessment Type 1: Participatory task
Indicative Time on Task 2: 20 hours
Due: Weekly, 11.59PM Sunday
Weighting: 20%
This assessment involves evidence of preparation for, participation in, and contribution to seminars and online discussion forums.
1 If you need help with your assignment, please contact:
2 Indicative time-on-task is an estimate of the time required for completion of the assessment task and is subject to individual variation
This is an online unit. Details of assessments and online forums will be available on iLearn.
WEEK |
LEARNING OBJECTIVE |
CONTENT |
READINGS |
Week 1 |
LO1: Evaluate the theory, and principles of application, of data analytics skills and techniques relevant to forensic accounting |
Introduction to Fraud Types of Fraud The Need for Analysis Tools Matrices Link Diagrams Social Network Analysis Analysing Networks |
Forensic Accounting and Fraud Investigation for Non-Experts, H. Silverstone and M. Sheetz, Chapter 2, Fraud in Society
Forensic Accounting and Fraud Investigation for Non-Experts, H. Silverstone and M. Sheetz, Chapter 12, Analysis Tools for Investigators
|
Week 2 |
LO1: Evaluate the theory, and principles of application, of data analytics skills and techniques relevant to forensic accounting |
Introduction to Financial Analysis Key Ratios Data Mining as an Analysis Tool |
Forensic Accounting and Fraud Investigation for Non-Experts, H. Silverstone and M. Sheetz, Chapter 5, Fundamental Principles of Financial Analysis
|
Week 3 |
LO1: Evaluate the theory, and principles of application, of data analytics skills and techniques relevant to forensic accounting |
Introduction to Data Mining Data Classification Association Analysis Cluster Analysis Outlier Analysis Application: Data Mining to Detect Money Laundering Tracing |
Statistical Techniques for Forensic Accounting, S. K. Dutta, Chapter 5, Understanding the Theory and Application of Data Analysis
Financial Investigation and Forensic Accounting, G. A. Manning, Chapter 14, Accounting and Audit Techniques |
Week 4 |
LO2: Investigate applications and strategies, including data mining, to enable collection, assessment, review, production and presentation of unstructured data |
Data Mining Routines Understanding the Integrity of the Data Understanding the Norm of the Data Entity Structures and Search Routines Strategies for Data Mining |
The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems, L. W. Vona, Chapter 7, Data Mining for Fraud |
Week 5 |
LO2: Investigate applications and strategies, including data mining, to enable collection, assessment, review, production and presentation of unstructured data |
Disbursement Fraud Payroll Fraud Fraud Risk Structure Data Analysis Data Mining Planning |
The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems, L. W. Vona, Chapter 10, Disbursement Fraud
The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems, L. W. Vona, Chapter 12, Payroll Fraud |
Week 6 |
LO2: Investigate applications and strategies, including data mining, to enable collection, assessment, review, production and presentation of unstructured data |
Revenue Misstatement Inventory Fraud Fraud Risk Structure Data Analysis Data Mining Planning |
The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems, L. W. Vona, Chapter 13, Revenue Misstatement
The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems, L. W. Vona, Chapter 14, Inventory Fraud |
Week 7 |
LO3: Manage and interpret complex or disparate sets of data to underpin business development, interpret risk, understand behavioural patterns, and detect suspicious or irregular behaviour
|
Industry Data Financial Analysis Types of Fraud Revisited Fraud Detection Interpreting Potential Red Flags Professional Scepticism Fraud Triangle Risk Factors Information Gathering Analytical Procedures and Techniques Sampling Theory Statistical Sampling Techniques Non-statistical Sampling Techniques |
Financial Investigation and Forensic Accounting, G. A. Manning, Chapter 24, Audit Programs
A Guide to Forensic Accounting Investigation, W. Kenyon and P. D. Tilton, Chapter 13, Potential Red Flags and Fraud Detection Techniques
Statistical Techniques for Forensic Accounting, S. K. Dutta, Chapter 9, Sampling Theory and Techniques |
MID-SEMESTER BREAK |
|||
Week 8 |
LO3: Manage and interpret complex or disparate sets of data to underpin business development, interpret risk, understand behavioural patterns, and detect suspicious or irregular behaviour |
Probability Schematic Representation of Evidence Probative Value of Evidence Constraints and Limitations of Data Analysis Collection of Data Data Analysis Tools Descriptive Statistics Models for Displaying Data Data Analysis Software Benford’s Law |
Statistical Techniques for Forensic Accounting, S. K. Dutta, Chapter 6, Transitioning to Evidence
Forensic Accounting, R. Rufus, L. Miller and W. Hahn, Chapter 8, Transforming Data into Evidence (Part 1)
Forensic Accounting, R. Rufus, L. Miller and W. Hahn, Chapter 9, Transforming Data into Evidence (Part 2) |
Week 9 |
LO4: Examine issues and key principles of professional digital forensic practice, including chain of custody and best practice procedures
|
Critical Steps in Gathering Evidence Chain of Custody Evidence Created Introduction to Digital Forensics |
A Guide to Forensic Accounting Investigation, W. Kenyon and P. D. Tilton, Chapter 10, Building a Case: Gathering and Documenting Evidence
Essentials of Forensic Accounting, M. A. Crain and others, Chapter 11, Digital Forensics |
Week 10 |
LO4: Examine issues and key principles of professional digital forensic practice, including chain of custody and best practice procedures |
Forensic Soundness Forensic Analysis Fundamentals Crime Reconstruction Networks and the Internet |
Handbook of Digital Forensics and Investigation, E. Casey, Chapter 1, Introduction |
Week 11 |
LO5: Diagnose and appraise mechanisms to uncover or recover evidence from digital devices to support litigation and investigations
|
Scientific Method and Digital Forensics Digital Forensic Analysis Data Gathering and Observation Conclusions and Reporting |
Handbook of Digital Forensics and Investigation, E. Casey, Chapter 2, Forensic Analysis |
Week 12 |
LO5: Diagnose and appraise mechanisms to uncover or recover evidence from digital devices to support litigation and investigations
|
Introduction to Electronic Discovery Case Management Identification of Electronic Data Forensic Preservation of Data Data Processing Production of Electronic Data |
Handbook of Digital Forensics and Investigation, E. Casey, Chapter 3, Electronic Discovery |
Week 13 |
Revision |
Macquarie University policies and procedures are accessible from Policy Central (https://staff.mq.edu.au/work/strategy-planning-and-governance/university-policies-and-procedures/policy-central). Students should be aware of the following policies in particular with regard to Learning and Teaching:
Students seeking more policy resources can visit the Student Policy Gateway (https://students.mq.edu.au/support/study/student-policy-gateway). It is your one-stop-shop for the key policies you need to know about throughout your undergraduate student journey.
If you would like to see all the policies relevant to Learning and Teaching visit Policy Central (https://staff.mq.edu.au/work/strategy-planning-and-governance/university-policies-and-procedures/policy-central).
Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/study/getting-started/student-conduct
Results published on platform other than eStudent, (eg. iLearn, Coursera etc.) or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit ask.mq.edu.au or if you are a Global MBA student contact globalmba.support@mq.edu.au
Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/
Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to help you improve your marks and take control of your study.
The Library provides online and face to face support to help you find and use relevant information resources.
Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.
For all student enquiries, visit Student Connect at ask.mq.edu.au
If you are a Global MBA student contact globalmba.support@mq.edu.au
For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/.
When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.