An IS auditor is tasked with reviewing an organization's purchase invoices to discover fictitious entries that may have been created as part of a suspected fraud scheme. Which of the following is the MOST effective data analysis technique for this situation?
CCNPWILL
1 day, 7 hours ago