The patterns of the numbers used in occupational fraud schemes

Mark J. Nigrini (Department of Accounting, West Virginia University, Morgantown, West Virginia, USA)

Managerial Auditing Journal

ISSN: 0268-6902

Publication date: 7 May 2019



This study aims to classify the numbers used in recent financial statement, corruption and asset misappropriation fraud schemes in such a way that these classes can be used to design effective proactive analytics-based fraud detection tests.


The data sources for the classification scheme include the court records of fraud prosecutions, investigative reports and research papers related to fraud cases.


Fraudulent numbers are most often amounts that are round, have a strong period-over-period growth, are just above or below internal control thresholds or other targets, are deviations from Benford’s Law, are purposeful duplicates of authentic transactions, are outliers due to being excessively large and are excessively rounded up or down. The study includes several examples of fraudulent numbers.

Research limitations/implications

The fraudulent number types are based on a sample of fraud-related court documents, and the sample might not be representative of the population of detected and undetected frauds. Further research is needed into the detection of corruption/bribery schemes.

Practical implications

The results are important for auditors and forensic accountants running proactive fraud detection tests. The discussions emphasize that the analysis should include refining and rerunning the tests, and then using groupings and filtering to deal with false positives. The importance of an effective audit of the notable transactions is stressed in the concluding section.


The study is an original in-depth coverage of the patterns found in fraudulent numbers. The discussion sections review implementation issues and considerations for future research.



Mark J. Nigrini (2019) "The patterns of the numbers used in occupational fraud schemes", Managerial Auditing Journal, Vol. 34 No. 5, pp. 606-626

Download as .RIS





Emerald Publishing Limited

Copyright © 2019, Emerald Publishing Limited

Please note you might not have access to this content

You may be able to access this content by login via Shibboleth, Open Athens or with your Emerald account.
If you would like to contact us about accessing this content, click the button and fill out the form.
To rent this content from Deepdyve, please click the button.