Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

SAP System as Vendor Fraud Detector


Affiliations
1 Department of Computer Applications, NIT, Jamshedpur, Jharkhand, India
     

   Subscribe/Renew Journal


In the last decade, Enterprise Resource Planning (ERP) systems are one of the most important IT developments, which improve productivity and profitability of the organisation. SAP is the leading market player in ERP systems. The vendor master file in SAP is used to store information about critical and sensitive data of vendors and this data is target of fraudsters. However, fraud is increasing and it becomes a risk to supply chain management. Hence, it is a requirement to plug the opportunity of fraudsters by help of system. The present paper presents a review of red flags of vendor master, different vendor fraud etc. Further, this study makes the development of a prototype model for detection of vendor fraud based on analysis of SAP security log data, segregations of duties and fraudulent scenarios.

Keywords

ERP, Fraud, SAP, Vendor.
Subscription Login to verify subscription
User
Notifications
Font Size


  • ACFE. (2014). Report to the nation on occupational fraud and abuse. Retrieved from http://www.acfe.com/rttn
  • Albrecht, W. S., Albrecht, C. C., Albrecht, C. D., & Zimbelman, M. (2009). Fraud Examination (3rd Ed.). Thomson/South-Western, Mason OH.
  • Alles, M., Brennan, G., Kogan, A., & Vasarhelyi, M. A. (2006). Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens. International Journal of Accounting Information Systems, 7(2), 137-161.
  • Best, P. J., Rikhardson, P., & Toleman, M. (2009). Continuous fraud detection in enterprise systems through audit trail analysis. Journal of Digital Forensics, Security and Law, 4(1).
  • Broady, D. V., & Roland, H. A. (2008). SAP GRC for dummies. Retrieved from http://library.books24x7.com.ezproxy.usq.edu.au/toc.asp?bkid=25161
  • Coderre, D., & Warner, P. D. (1999). Computer-asisted techniques for fraud detection. CPA Journal, 69(8), 57.
  • Cressey, D. R. (1953). Other people’s money: A study of the social psychology of embezzlement. New York, NY US: Free Press.
  • Debreceny, R. S., Gray, G. L., Jun-Jin Ng, J., Siow-Ping Lee, K., & Yau, W. F. (2005). Embedded audit modules in enterprise resource planning systems: Implementation and functionality. Journal of Information Systems, 19(2), 7-27.
  • Edge, M. E., & Falcone Sampaio, P. R. (2009). A survey of signature based methods for financial fraud detection. Computers & Security, 28(6), 381-394.
  • Islam, A., Corney, M., Mohay, G., Clark, A., Bracher, S., Raub, T., & Flegel, U. (2010). Fraud detection in ERP systems using scenario matching. Proceedings of the Twenty-Fifth IFIP International Conference on Information Security, 112-123.
  • Little, A. G., & Best, P. J. (2003). A framework for separation of duties in an SAP R/3 environment. Managerial Auditing Journal, 18(5), 419-430.
  • Narayan, V. (2008). Financial Accounting (FI). SAP FI/CO questions and answers. Sudbury: Infinity Science Press.
  • O’Gara, J. D. (2004). Corporate fraud case studies in detection and prevention. Hoboken, NJ: Wiley & Sons.
  • Padhi, S. N (2010). SAP ERP financials and FICO handbook. Burlington, MA: Jones and Bartlett.
  • Phua, C., Lee, V., Smith, K., & Gayler, R. (2010). A com prehensive survey of data mining-based fraud detection research. arXiv 1-14.
  • Potla, L. (2003). Detecting accounts payable abuse through continuous auditing. IT Audit, 6(3). Retrieved from http://www.theiia.org/itaudit/index.cfm?fuseaction=forum&fid=5458.
  • Singh, K., & Best, P. J. (2015). Design and Implemen-tation of Continuous Monitoring and Auditing in SAP Enterprise Resource Planning. International Journal of Auditing, 19, 307-317. doi:10.1111/ijau.12051
  • Singleton, T., Singleton, A., Bologna, J., & Lindquist, R. (2008). Fraud auditing and forensic accounting. Hoboken, NJ: John Wiley & Sons.
  • Srinidhi, B. (1994). The influence of segregation of duties on internal control judgements. Journal of Accounting, Auditing & Finance, 9(3), 423-444.
  • Wells, J. T. (2002a). Billing schemes, part 1: Shell companies that don’t deliver. Journal of Accountancy, 194(1), 76-79.
  • Wells, J. T. (2008). Principles of fraud examination (2nd Ed.). Hoboken, NJ: John Wiley & Sons.
  • Wells, J. T. (2011). Principles of fraud examination (3rd Ed.). Hoboken, NJ: John Wiley & Sons.

Abstract Views: 301

PDF Views: 0




  • SAP System as Vendor Fraud Detector

Abstract Views: 301  |  PDF Views: 0

Authors

T. N. Varma
Department of Computer Applications, NIT, Jamshedpur, Jharkhand, India
D. A. Khan
Department of Computer Applications, NIT, Jamshedpur, Jharkhand, India

Abstract


In the last decade, Enterprise Resource Planning (ERP) systems are one of the most important IT developments, which improve productivity and profitability of the organisation. SAP is the leading market player in ERP systems. The vendor master file in SAP is used to store information about critical and sensitive data of vendors and this data is target of fraudsters. However, fraud is increasing and it becomes a risk to supply chain management. Hence, it is a requirement to plug the opportunity of fraudsters by help of system. The present paper presents a review of red flags of vendor master, different vendor fraud etc. Further, this study makes the development of a prototype model for detection of vendor fraud based on analysis of SAP security log data, segregations of duties and fraudulent scenarios.

Keywords


ERP, Fraud, SAP, Vendor.

References