Icon

Suspicious Date Range

<p><strong>Suspicious Date Range</strong></p><p>This workflow is useful to identify activities that appear suspicious based upon the chronological timing of transaction events (e.g., the PO date compared to the payment date).</p><p>Suspicious date range analytics are frequently used to help identify transactions that are fraudulent and intended to circumvent company policy, and to highlight potential controls that could be enhanced within the system or process. This workflow can be applied to a wide variety of data (e.g., invoices paid too early, invoices with unacceptable payment terms, retroactive purchase orders etc.)</p>

Suspicious Date Range


This workflow is useful to identify activities that appear suspicious based upon the chronological timing of transaction events (e.g., the PO date compared to the payment date).

Suspicious date range analytics are frequently used to help identify transactions that are fraudulent and intended to circumvent company policy, and to highlight potential controls that could be enhanced within the system or process. This workflow can be applied to a wide variety of data (e.g., invoices paid too early, invoices with unacceptable payment terms, retroactive purchase orders etc.)

Data Reading

Upload your own Excel file, or try the workflow with a provided sample file.

Data Exploration

Data Validation

Identify Suspicious vs. Normal Data Range

Dashboard & Report Generation

Select the type of reportyou want to generate
Analysis Dashboard & Report
SelectFrom/to date
Field Selection
For numeric columns:it checks missing values andcomputes summary stats
Statistics of Dataset
Apply different teststo validate data (numeric,strig, date&time,missing values, etc.)
Data Validation
Insert threshold, pick field to view,and select value from pie chart to see details in table view
Threshold Date Range
Upload your Excel file
File Upload

Nodes

Extensions

Links