Icon

Split Transactions

<p><strong>Split Transactions</strong></p><p>This analytic test is used to identify activities that potentially could represent split transactions. This analytic can be applied to a wide variety of data (e.g. invoices, purchase orders, requisitions, corporate card transactions etc.)</p><p>A split transaction occurs when multiple transactions are made in order to stay within a single transaction authorization limit. While each individual transaction may appear to be authorized and valid, it is only when these transactions are linked that the circumvention becomes evident. Split transactions are a good example of how the intent of a control can be violated even though the designed ‘rule’ (in this case a single authorization limit) was never technically broken.</p>

Split Transactions

This analytic test is used to identify activities that potentially could represent split transactions. This analytic can be applied to a wide variety of data (e.g. invoices, purchase orders, requisitions, corporate card transactions etc.)

A split transaction occurs when multiple transactions are made in order to stay within a single transaction authorization limit. While each individual transaction may appear to be authorized and valid, it is only when these transactions are linked that the circumvention becomes evident. Split transactions are a good example of how the intent of a control can be violated even though the designed ‘rule’ (in this case a single authorization limit) was never technically broken.

Split Transactions

This analytic test is used to identify activities that potentially could represent split transactions. This analytic can be applied to a wide variety of data (e.g. invoices, purchase orders, requisitions, corporate card transactions etc.)

A split transaction occurs when multiple transactions are made in order to stay within a single transaction authorization limit. While each individual transaction may appear to be authorized and valid, it is only when these transactions are linked that the circumvention becomes evident. Split transactions are a good example of how the intent of a control can be violated even though the designed ‘rule’ (in this case a single authorization limit) was never technically broken.

Import Data

Data Exploration & Validation

Field Selection & Data Manipulation

Data Visualization

Summary Stats
Statistics of Dataset
Split Transaction
Split Transaction Threshold
Validation
Data Validation
Visualize the data & send the report
Analysis Dashboard
Upload yourselected file
File Upload
Field Selection
Field Selection

Nodes

Extensions

Links