ACC 427 6-3 Short Paper- Data Research
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
427
Subject
Accounting
Date
Nov 24, 2024
Type
docx
Pages
8
Uploaded by Barbara8289
1
6-3 Short Paper: Data Research
Harriet Creyer
6-3 Short Paper: Data Research
Southern New Hampshire University
ACC 427 – Investigating with Computers
2
6-3 Short Paper: Data Research
Examine the Practical Suspicious Email.txt File
A Data analyst tool is a phrase used to describe software and the applications that analysts use in order to “develop and perform analytical processes that help companies to make better, informed business decisions while decreasing costs and increasing profits.” (
Essential Data Analyst Tools discover a list of the 17 best data analysis software & tools on the market
)
During your monitoring operations, you find an employee that appears to be emailing a large book, and you decide to give this file further inspection. However, the book appears to be over 48,000 lines of text, and you cannot read each line.
For inspecting a large text file containing over 48,000 lines, I would choose an Ultra Edit for the Suspicious Email. It is currently being advertised as “the most flexible, powerful, and secure text editor.” (
UltraEdit text + code editing software
2023). It is also available across multiple platforms inc. Mac and Windows. Regular Expression Search: Find email addresses in the file. Search Query: grep -E -o
"..+@[A-Za-z0-9.-]+\.[A-Za-z]{2,}\b" (
Grep
) file.txt Description: This command uses a regular expression to search for email addresses in the file.txt. The -E option enables extended regular expressions, and the -o option displays only the matching portion of the line.
I also tried \b[A-Z0-9._%+-]
+@[A-Z0-9.-]+\.[A-Z]{2,}\b
(
Grep
)
. Both showing no results found.
3
6-3 Short Paper: Data Research
Regular Expression Search: Look for Social Security numbers in the file. Search Query: grep -E -o "\b(\+\d{1,3})?[-.\s]?\(?\d{3}\)?[-.\s]?\d{3}[-.\s]?\d{4}\b" (
Grep
)
file.txt Description: This command uses a regular expression to search for phone numbers in various formats in the file.txt. It can handle phone numbers with or without country codes, with or without parentheses, and with different separators. I also tried \b[A-Z0-9._%+-]
+@[A-Z0-
9.-]+\.[A-Z]{2,}\b
; again, showings no results. I tried to search for specific number for example 0-9 and the only results that were populated were the dates and the chapter numbers throughout the text.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
6-3 Short Paper: Data Research
Examine the Practical Suspicious Email Bonus.csv File
Once again, you are the investigator at the same U.S.-based bank. Your findings from the first monitoring effort have you very concerned, and you have decided to open a case on your subject employee. The next file you have under review is very different from the first, as it contains what appears to be a series of random numbers. Note that the file seems to be very large.
To investigate the second file containing random numbers, I would use Code Runner. I chose to use Code Runner as it was compatible with MAC and was a very easy to use tool. It is able to do an entire desktop search for the codes and information you request an input. I would perform regular expression searches to identify patterns, sensitive information, or anomalies within the data. (
CodeRunner 4
)
I would conduct my first search to identify anything that may resemble a social security number (SSN). I found there were 49,138 matches that could potentially be social security numbers The expression I used was \d{9} and \d{3}-\d{2}-\d{4} (
Grep
) just in case
this employee tried to ‘hide’ regularly formatted SSNs amongst the vast amount of information; I searched for 9 digits as a ‘standalone’ figure just incase there were any SSNs without any ‘-‘
. Because these numbers could potentially be social security numbers, it raises a red flag and there should be further investigation to compare these numbers with the company’s payroll department to determine if the sender of this document is stealing personally identifiable information from his employer that can be sold on the dark web. (Goyvaerts)
My concern would be that whoever obtained the information could potentially know who any SSN’s were hidden within these figures for example adding a 0/1 at the start of an
5
6-3 Short Paper: Data Research
SSN and/or an 8/9 at the end. This would create more numbers than what would be searched for but also ‘hide’ the SSN.
Another Regular expression that I did was to search for credit card numbers using regular expressions (e.g., \d{4}-\d{4}-\d{4}-\d{4}) and \b\d{13,16}\b (
Grep
)
; this would allow for a search for any numbers that are laid out in the format of a credit card number with
a 4-4-4-4 but also any specific numbers that are between 13-16 digits, for example an American express card has less digits than a standard credit card. Both of these regular expressions found no results within this information. (Goyvaerts)
However, a search for bank account numbers or routing numbers using regular expressions could potentially run into the same problems found when searching for SSN’s. It could potentially be ‘hidden’ within numbers and only the person who formatted this information would know.
6
6-3 Short Paper: Data Research
Summary
The information within the first email didn’t turn up any significant numerical information, however, that is not to say that the recipient of this email and the sender have some sort of code to break down the information. After reviewing this data, it has raised some
rather large red flags concerning how this information has been stored. The employee emailing just this information is extremely concerning and is clearly hiding something within
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
6-3 Short Paper: Data Research
the information to which they and the recipient may be the only ones to be able to read this information. I think it is difficult to fully interpret this information without having the ‘code’ if there is one. Within the large data files data can be easily manipulated as mentioned and it could possibly only be ‘translated’ by the sender.
8
6-3 Short Paper: Data Research
References
CodeRunner 4
. CodeRunner. (n.d.). https://coderunnerapp.com/
Command line compare of files and folders with DOS command prompt
. UltraEdit. (2022, December 20). https://www.ultraedit.com/support/tutorials-power-tips/ultracompare/
command-line/
Essential Data Analyst Tools discover a list of the 17 best data analysis software & tools on the market
. Top 17 Data Analytics Tools - Best Software for Data Analysts. (n.d.). https://www.datapine.com/articles/data-analyst-tools-software
Goyvaerts, J. (n.d.-a). Finding or verifying credit card numbers. https://www.regular-
expressions.info/creditcard.html
Goyvaerts, J. (n.d.-b).
Specialized tools and utilities for working with regular expressions
. Popular Tools, Utilities and Programming Languages That Support Regular Expressions. https://www.regular-expressions.info/tools.html
Grep . GNU Grep 3.11. (n.d.). https://www.gnu.org/software/grep/manual/grep.html#Command_002dline-Options
GREP(1) - linux manual page. (n.d.). https://man7.org/linux/man-pages/man1/grep.1.html
UltraEdit text + code editing software
. UltraEdit. (2023, April 25). https://www.ultraedit.com/products/ultraedit/
Related Documents
Related Questions
Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation:
Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?
Will different system access levels for different users be incorporated?
Will customer orders be received via the Internet?
Has the company identified an off‐site alternative computer processing location?
Does the project budget include line items for an upgraded, uninterrupted power source and firewall?
Required: In a two (2) page response, describe the control purpose for each point presented in the case.
arrow_forward
Big Data
Big data and data analytics are becoming an important part of an accountant's methods for analyzing the different companies and their performances. The use of these elements enhances organizational performance, improves fraud detection, and increases audit performance and scope.
Use the Internet or Strayer University Library databases to review at least two news articles or publications about current and future trends in the use of big data.
Choose a company that is not publicly traded (a small or medium-sized company).
Review the company, and suggest some of the ways in which big data would benefit this company.
arrow_forward
Sh6
Please help me.
Thankyou.
arrow_forward
How can an auditor use the following topic in his future work?
Apply key data wrangling best practices to real-world structured and unstructured data
Employ data wrangling principles using current industry tools and statistical programming languages, to develop and implement data transformation functions and models
Apply data operations processes to develop automated, repeatable solutions that address business goals
Communicate the opportunities for data transformation needs and solutions to address dynamic organizational data challenges
arrow_forward
5
Which of the following creates an audit trail that protects both consumers and businesses from fraud, serving as a solution to digital fraud and privacy breaches in various
industries?
Oa. Predictive analytics
Ob. Blockchain
OC. Cookies
d. Big data
Oe. Technology disruption
arrow_forward
Answer the following questions:
Some people believe that an automated accounting system is always better than a manual system. Describe circumstances, and provide examples, where a manual system would be recommendable rather than automated solution.
Provide an example of a business event. Explain how an enterprise system can provide the ability to share information and make the execution of business events efficient. Also, describe the various aspects of the business event that a company might want to capture from that event.
To what extent should auditors be involved in the system design process of an accounting information system? Discuss the pros and cons of auditor involvement in the development an accounting information system.
arrow_forward
Please answer multichoice question in photo
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Financial Accounting
Accounting
ISBN:9781337272124
Author:Carl Warren, James M. Reeve, Jonathan Duchac
Publisher:Cengage Learning

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,

Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Related Questions
- Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection? Will different system access levels for different users be incorporated? Will customer orders be received via the Internet? Has the company identified an off‐site alternative computer processing location? Does the project budget include line items for an upgraded, uninterrupted power source and firewall? Required: In a two (2) page response, describe the control purpose for each point presented in the case.arrow_forwardBig Data Big data and data analytics are becoming an important part of an accountant's methods for analyzing the different companies and their performances. The use of these elements enhances organizational performance, improves fraud detection, and increases audit performance and scope. Use the Internet or Strayer University Library databases to review at least two news articles or publications about current and future trends in the use of big data. Choose a company that is not publicly traded (a small or medium-sized company). Review the company, and suggest some of the ways in which big data would benefit this company.arrow_forwardSh6 Please help me. Thankyou.arrow_forward
- How can an auditor use the following topic in his future work? Apply key data wrangling best practices to real-world structured and unstructured data Employ data wrangling principles using current industry tools and statistical programming languages, to develop and implement data transformation functions and models Apply data operations processes to develop automated, repeatable solutions that address business goals Communicate the opportunities for data transformation needs and solutions to address dynamic organizational data challengesarrow_forward5 Which of the following creates an audit trail that protects both consumers and businesses from fraud, serving as a solution to digital fraud and privacy breaches in various industries? Oa. Predictive analytics Ob. Blockchain OC. Cookies d. Big data Oe. Technology disruptionarrow_forwardAnswer the following questions: Some people believe that an automated accounting system is always better than a manual system. Describe circumstances, and provide examples, where a manual system would be recommendable rather than automated solution. Provide an example of a business event. Explain how an enterprise system can provide the ability to share information and make the execution of business events efficient. Also, describe the various aspects of the business event that a company might want to capture from that event. To what extent should auditors be involved in the system design process of an accounting information system? Discuss the pros and cons of auditor involvement in the development an accounting information system.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Financial AccountingAccountingISBN:9781337272124Author:Carl Warren, James M. Reeve, Jonathan DuchacPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College

Financial Accounting
Accounting
ISBN:9781337272124
Author:Carl Warren, James M. Reeve, Jonathan Duchac
Publisher:Cengage Learning

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,

Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College