Managing Counterparty Risk in an Unstable Financial System
ERIC Educational Resources Information Center
Belmont, David
2012-01-01
The recent flow of headlines excoriating bankers and financiers for malfeasance, fraud, and collusion has been almost biblical in proportion. Counterparties that appeared creditworthy based on financial statements and ratings have revealed that they are impaired either due to computer errors, control failures, malfeasance, or potential regulatory…
A Review of Financial Accounting Fraud Detection based on Data Mining Techniques
NASA Astrophysics Data System (ADS)
Sharma, Anuj; Kumar Panigrahi, Prabin
2012-02-01
With an upsurge in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection (FAFD) has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of specialized procedures to detect financial accounting fraud, collective known as forensic accounting. Data mining techniques are providing great aid in financial accounting fraud detection, since dealing with the large data volumes and complexities of financial data are big challenges for forensic accounting. This paper presents a comprehensive review of the literature on the application of data mining techniques for the detection of financial accounting fraud and proposes a framework for data mining techniques based accounting fraud detection. The systematic and comprehensive literature review of the data mining techniques applicable to financial accounting fraud detection may provide a foundation to future research in this field. The findings of this review show that data mining techniques like logistic models, neural networks, Bayesian belief network, and decision trees have been applied most extensively to provide primary solutions to the problems inherent in the detection and classification of fraudulent data.
Reducing Fraudulent Financial Reporting: An Expanded Role for Business Education in the 1990s.
ERIC Educational Resources Information Center
Urbancic, Frank R.
1988-01-01
The author reports findings of the National Commission on Fraudulent Financial Reporting concerning the role of business education in reducing fraud in financial reporting. Issues covered include teaching financial regulations, developing skills needed to detect fraud, teaching ethical values, and preparing faculty to teach about financial fraud.…
ERIC Educational Resources Information Center
Calbom, Linda M.
This report to Congressional Requesters is concerned with internal control problems found in the U.S. Department of Education. Significant internal control weaknesses in the U.S. Department of Education's payment processes and poor physical control over its computer assets made the department vulnerable to (and in some cases resulted in) fraud,…
Financial fraud and health: the case of Spain.
Zunzunegui, Maria Victoria; Belanger, Emmanuelle; Benmarhnia, Tarik; Gobbo, Milena; Otero, Angel; Béland, François; Zunzunegui, Fernando; Ribera-Casado, Jose Manuel
To examine whether financial fraud is associated with poor health sleeping problems and poor quality of life. Pilot study (n=188) conducted in 2015-2016 in Madrid and León (Spain) by recruiting subjects affected by two types of fraud (preferred shares and foreign currency mortgages) using venue-based sampling. Information on the monetary value of each case of fraud; the dates when subjects became aware of being swindled, lodged legal claim and received financial compensation were collected. Inter-group comparisons of the prevalence of poor physical and mental health, sleep and quality of life were carried according to type of fraud and the 2011-2012 National Health Survey. In this conventional sample, victims of financial fraud had poorer health, more mental health and sleeping problems, and poorer quality of life than comparable populations of a similar age. Those who had received financial compensation for preferred share losses had better health and quality of life than those who had not been compensated and those who had taken out foreign currency mortgages. The results suggest that financial fraud is detrimental to health. Further research should examine the mechanisms through which financial fraud impacts health. If our results are confirmed psychological and medical care should be provided, in addition to financial compensation. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.
Elder Fraud and Financial Exploitation: Application of Routine Activity Theory.
DeLiema, Marguerite
2017-03-10
Elder financial exploitation, committed by individuals in positions of trust, and elder fraud, committed by predatory strangers, are two forms of financial victimization that target vulnerable older adults. This study analyzes differences between fraud and financial exploitation victims and tests routine activity theory as a contextual model for victimization. Routine activity theory predicts that criminal opportunities arise when a motivated offender and suitable target meet in the absence of capable guardians. Fifty-three financial exploitation and fraud cases were sampled from an elder abuse forensic center. Data include law enforcement and caseworker investigation reports, victim medical records, perpetrator demographic information, and forensic assessments of victim health and cognitive functioning. Fraud and financial exploitation victims performed poorly on tests of cognitive functioning and financial decision making administered by a forensic neuropsychologist following the allegations. Based on retrospective record review, there were few significant differences in physical health and cognitive functioning at the time victims' assets were taken, although their social contexts were different. Significantly more fraud victims were childless compared with financial exploitation victims. Fraud perpetrators took advantage of elders when they had no trustworthy friends or relatives to safeguard their assets. Findings support an adapted routine activity theory as a contextual model for financial victimization. Fraud most often occurred when a vulnerable elder was solicited by a financial predator in the absence of capable guardians. Prevention efforts should focus on reducing social isolation to enhance protection. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Burnes, David; Henderson, Charles R; Sheppard, Christine; Zhao, Rebecca; Pillemer, Karl; Lachs, Mark S
2017-08-01
The financial exploitation of older adults was recently recognized by the Centers for Disease Control and Prevention as a serious public health problem. Knowledge of the prevalence of elder financial exploitation is mostly limited to the category of financial abuse, which occurs in relationships involving an expectation of trust. Little is known about the other major category of elder financial exploitation-elder financial fraud and scams, which is perpetrated by strangers. A valid estimate of elder financial fraud-scam prevalence is necessary as a foundation for research and prevention efforts. To estimate the prevalence of elder financial fraud-scam victimization in the United States based on a systematic review and meta-analysis. Multiple investigators independently screened titles and abstracts and reviewed relevant full-text records from PubMed, Medline, PsycINFO, Criminal Justice Abstracts, Social Work Abstracts, and AgeLine databases. To maximize the validity and generalizability of prevalence estimation, we restricted eligibility to general population-based studies (English speaking, 1990 onward) using state- or national-level probability sampling and collecting data directly from older adults. Information on elder financial fraud-scam prevalence and study-level characteristics was extracted independently by 2 investigators. Meta-analysis of elder financial fraud-scam prevalence used generalized mixed models with individual studies as levels of a random classification factor. We included 12 studies involving a total of 41 711 individuals in the meta-analysis. Overall pooled elder financial fraud-scam prevalence (up to 5-year period) across studies was 5.6% (95% confidence interval [CI] = 4.0%, 7.8%), with a 1-year period prevalence of 5.4% (95% CI = 3.2%, 7.6%). Studies using a series of questions describing specific fraud-scam events to measure victimization found a significantly higher prevalence (7.1%; 95% CI = 4.8%, 9.4%) than studies using a single, general-question self-report assessment approach (3.6%; 95% CI = 1.8%, 5.4%). Elder financial fraud and scams is a common problem, affecting approximately 1 of every 18 cognitively intact, community-dwelling older adults each year; it requires further attention from researchers, clinicians, and policymakers. Elder financial fraud-scam prevalence findings in this study likely underestimate the true population prevalence. We provide methodological recommendations to limit older adult participation and reporting bias in future population-based research. Public Health Implications. Elder financial exploitation victimization is associated with mortality, hospitalization, and poor physical and mental health. Health care professionals working with older adults likely routinely encounter patients who are fraud-scam victims. Validation of instruments to screen for elder financial fraud and scams in clinical settings is an important area of future research. Without effective primary prevention strategies, the absolute scope of this problem will escalate with the growing population of older adults.
Reinstein, A; Dery, R J
1999-10-01
The American Institute of Certified Public Accountants' Statement on Auditing Standards (SAS) No. 82, Consideration of Fraud in a Financial Statement Audit, requires independent auditors to obtain reasonable assurance that financial statements are free of material mis-statements caused by error or fraud. SAS No. 82 provides guidance for independent auditors to use to help detect and document risk factors related to potential fraud. But while SAS No. 82 suggests how auditors should assess the potential for fraud, it does not expand their detection responsibility. Accordingly, financial managers should discuss thoroughly with auditors the scope and focus of an audit as a means to further their compliance efforts.
Is Psychological Vulnerability Related to the Experience of Fraud in Older Adults?
LICHTENBERG, PETER A.; STICKNEY, LAURIE; PAULSON, DANIEL
2013-01-01
Financial exploitation, and particularly thefts and scams, are increasing at an alarming rate. In this study we (a) determined the national prevalence of older adults who report having been a victim of fraud, (b) created a population-based model for the prediction of fraud, and (c) examined how fraud is experienced by the most psychologically vulnerable older adults. The older adults studied were 4,400 participants in a Health and Retirement Study substudy, the 2008 Leave Behind Questionnaire. The prevalence of fraud across the previous 5 years was 4.5%. Among measures collected in 2002, age, education, and depression were significant predictors of fraud. Financial satisfaction and social-needs fulfillment were measured in 2008 and were significantly related to fraud above and beyond the 2002 predictors. Using depression and social-needs fulfillment to determine the most psychologically vulnerable older adults, we found that fraud prevalence was three times higher (14%) among those with the highest depression and the lowest social-needs fulfillment than among the rest of the sample (4.1%; χ2 = 20.49; p < .001). Clinical gerontologists and other professionals in the field need to be aware of their psychologically vulnerable clients heightened exposure to financial fraud. PMID:23997404
From Spin to Swindle: Identifying Falsification in Financial Text.
Minhas, Saliha; Hussain, Amir
Despite legislative attempts to curtail financial statement fraud, it continues unabated. This study makes a renewed attempt to aid in detecting this misconduct using linguistic analysis with data mining on narrative sections of annual reports/10-K form. Different from the features used in similar research, this paper extracts three distinct sets of features from a newly constructed corpus of narratives (408 annual reports/10-K, 6.5 million words) from fraud and non-fraud firms. Separately each of these three sets of features is put through a suite of classification algorithms, to determine classifier performance in this binary fraud/non-fraud discrimination task. From the results produced, there is a clear indication that the language deployed by management engaged in wilful falsification of firm performance is discernibly different from truth-tellers. For the first time, this new interdisciplinary research extracts features for readability at a much deeper level, attempts to draw out collocations using n -grams and measures tone using appropriate financial dictionaries. This linguistic analysis with machine learning-driven data mining approach to fraud detection could be used by auditors in assessing financial reporting of firms and early detection of possible misdemeanours.
42 CFR 1001.201 - Conviction relating to program or health care fraud.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 5 2010-10-01 2010-10-01 false Conviction relating to program or health care fraud... Permissive Exclusions § 1001.201 Conviction relating to program or health care fraud. (a) Circumstance for... misdemeanor relating to fraud, theft, embezzlement, breach of fiduciary responsibility, or other financial...
42 CFR 1001.201 - Conviction relating to program or health care fraud.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 5 2011-10-01 2011-10-01 false Conviction relating to program or health care fraud... Permissive Exclusions § 1001.201 Conviction relating to program or health care fraud. (a) Circumstance for... misdemeanor relating to fraud, theft, embezzlement, breach of fiduciary responsibility, or other financial...
2011-09-15
programs and operations at high risk of being vulnerable to fraud, waste, and abuse.1 Despite several reform initiatives, DOD’s financial management...remains on GAO’s high- risk list today. Long- standing and pervasive weaknesses in DOD’s financial management and related business processes and systems...GAO has identified as being at high risk of waste, fraud, abuse, and mismanagement. The seven specific DOD high- risk areas are (1) approach to
Code of Federal Regulations, 2010 CFR
2010-01-01
...; (m) the Federal Housing Finance Agency; (n) the Office of Thrift Supervision; (o) the Office of the... outreach with representatives of financial institutions, corporate entities, nonprofit organizations, State... Corporate Fraud Task Force created by Executive Order 13271 of July 9, 2002. Executive Order 13271 is hereby...
76 FR 7239 - Proposed Privacy Act Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-09
... property interests, identity theft or fraud, or harm to the security or integrity of this system or other... notice of a proposed system of records entitled, ``Treasury/DO .225 --TARP Fraud Investigation...: Supervisory Fraud Specialist, Office of Financial Stability, 1500 Pennsylvania Avenue, NW., Washington, DC...
ERIC Educational Resources Information Center
Mills, Whitney L.; Roush, Robert E.; Moye, Jennifer; Kunik, Mark E.; Wilson, Nancy L.; Taffet, George E.; Naik, Aanand D.
2012-01-01
Due to age-related factors and illnesses, older adults may become vulnerable to elder investment fraud and financial exploitation (EIFFE). The authors describe the development and preliminary evaluation of an educational program to raise awareness and assist clinicians in identifying older adults at risk. Participants (n = 127) gave high ratings…
Fraud prevention in paying portal
NASA Astrophysics Data System (ADS)
Sandhu, P. S.; Senthilkumar, N. C.
2017-11-01
The purpose of presenting this paper is to give the idea to prevent the fraud in finance paying portals as fraud is increasing on daily basis and mostly in financial sector. So through this paper we are trying to prevent the fraud. This paper will give you the working algorithm through which you can able to prevent the fraud. Algorithm will work according to the spending amount of the user, which means that use will get categories into one of the low, medium, high or very high category.
12 CFR 1805.812 - Fraud, waste and abuse.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Fraud, waste and abuse. 1805.812 Section 1805.812 Banks and Banking COMMUNITY DEVELOPMENT FINANCIAL INSTITUTIONS FUND, DEPARTMENT OF THE TREASURY..., waste and abuse. Any person who becomes aware of the existence or apparent existence of fraud, waste or...
Special Fraud Alert for Schools, Lenders, and Guarantee Agencies.
ERIC Educational Resources Information Center
Department of Education, Washington, DC.
Guidelines to prevent fraud and abuse in the government's student aid programs are presented for schools, lenders, and guarantee agencies. Student aid fraud is defined as intentional wrongful obtaining of student financial assistance (SFA) benefits through deceptive means. It is noted that falsification of eligibility is the most common form of…
Criminal Intent with Property: A Study of Real Estate Fraud Prediction and Detection
ERIC Educational Resources Information Center
Blackman, David H.
2013-01-01
The large number of real estate transactions across the United States, combined with closing process complexity, creates extremely large data sets that conceal anomalies indicative of fraud. The quantitative amount of damage due to fraud is immeasurable to the lives of individuals who are victims, not to mention the financial impact to…
Implementing US-style anti-fraud laws in the Australian pharmaceutical and health care industries.
Faunce, Thomas A; Urbas, Gregor; Skillen, Lesley
2011-05-02
This article critically analyses the prospects for introducing United States anti-fraud (or anti-false claims) laws in the Australian health care setting. Australian governments spend billions of dollars each year on medicines and health care. A recent report estimates that the money lost to corporate fraud in Australia is growing at an annual rate of 7%, but that only a third of the losses are currently being detected. In the US, qui tam provisions - the component of anti-fraud or anti-false claims laws involving payments to whistleblowers - have been particularly successful in providing critical evidence allowing public prosecutors to recover damages for fraud and false claims made by corporations in relation to federal and state health care programs. The US continues to strengthen such anti-fraud measures and to successfully apply them to a widening range of areas involving large public investment. Australia still suffers from the absence of any comprehensive scheme that not only allows treble damages recovery for fraud on the public purse, but crucially supports such actions by providing financial encouragement for whistleblowing corporate insiders to expose evidence of fraud. Potential areas of application could include direct and indirect government expenditure on health care service provision, pharmaceuticals, medical devices, defence, carbon emissions compensation and tobacco-related illness. The creation in Australia of an equivalent to US anti-false claims legislation should be a policy priority, particularly in a period of financial stringency.
ERIC Educational Resources Information Center
Calbom, Linda
This testimony summarizes a report generated by the U.S. General Accounting Office concerned with internal control problems found in the U.S. Department of Education. Significant internal control weaknesses in the U.S. Department of Education's payment processes and poor physical control over its computer assets made the department vulnerable to…
van der Geest, Victor R.; Weisburd, David; Blokland, Arjan A. J.
2016-01-01
This study describes the criminal careers of offenders convicted of fraud, distinguishing different career dimensions such as intermittency, versatility and specialization. Results indicate that most fraud offenders are versatile in the sense that they also have significant criminal records for other serious offending (that is, not fraud). At the same time they are also specialized in fraud. When we examine developmental trajectories of serious offending and next explore patterns of fraud for the groups identified, we find that offenders in our sample represent a heterogeneous group and that the classic divide between typical financial (for example, white-collar) offenders and common criminals does not apply to the majority of our sample. PMID:28989326
Becker, Cinda
2006-01-02
Trouble revisited National Century Financial Enterprises last month, when the Securities and Exchange Commission sued four former execs for the accounting fraud that caused the financial firm's collapse in 2002. The investigation worries some, but others, like Kathy Patrick, left, an attorney representing former NCFE investors, says there is "legitimate business to be done in the purchase of healthcare receivables."
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND SOUNDNESS MORTGAGE FRAUD REPORTING § 1731.2 Definitions. For purposes of this part— (a) Director... Association or the Federal Home Loan Mortgage Corporation. (c) Mortgage fraud means a material misstatement... mortgage, including a mortgage associated with a mortgage-backed security or similar financial instrument...
An appraisal of the performance of the economic and financial crimes commission in Nigeria.
Sowunmi, Fatai Abiola; Adesola, Muniru Adekunle; Salako, Mudashiru Abiodun
2010-12-01
This article examines how an anti-graft body, the Economic and Financial Crime Commission (EFCC), has fared in reducing the incidence of corruption in Nigeria, in particular, bank fraud, Internet scam, and bad governance. It first discusses the corruption situation in Nigeria by highlighting public office holders who have been associated with corruption charges. A Likert-type scale is used in designing the questionnaire for data collection. Descriptive and chi-square analyses are used, and results reveal that the performance of the EFCC has been affected by government interference (p < .05). However, although the anti-graft body has not been able to reduce the incidence of bank fraud (p > .05), bad governance and advance fee fraud have recorded appreciable reduction (p < .05). Areas of success as well as challenges that need to be addressed are identified. Specifically, it is recommended that the bill that established EFCC should be amended to reduce government interference and improve its manpower development, especially in the areas of fraud and Internet scam detection.
An inequality for detecting financial fraud, derived from the Markowitz Optimal Portfolio Theory
NASA Astrophysics Data System (ADS)
Bard, Gregory V.
2016-12-01
The Markowitz Optimal Portfolio Theory, published in 1952, is well-known, and was often taught because it blends Lagrange Multipliers, matrices, statistics, and mathematical finance. However, the theory faded from prominence in American investing, as Business departments at US universities shifted from techniques based on mathematics, finance, and statistics, to focus instead on leadership, public speaking, interpersonal skills, advertising, etc… The author proposes a new application of Markowitz's Theory: the detection of a fairly broad category of financial fraud (called "Ponzi schemes" in American newspapers) by looking at a particular inequality derived from the Markowitz Optimal Portfolio Theory, relating volatility and expected rate of return. For example, one recent Ponzi scheme was that of Bernard Madoff, uncovered in December 2008, which comprised fraud totaling 64,800,000,000 US dollars [23]. The objective is to compare investments with the "efficient frontier" as predicted by Markowitz's theory. Violations of the inequality should be impossible in theory; therefore, in practice, violations might indicate fraud.
12 CFR 1731.3 - Unsafe and unsound conduct.
Code of Federal Regulations, 2010 CFR
2010-01-01
... DEVELOPMENT SAFETY AND SOUNDNESS MORTGAGE FRAUD REPORTING § 1731.3 Unsafe and unsound conduct. An Enterprise may not require the repurchase of or may not decline to purchase a mortgage, mortgage backed security, or similar financial instrument because of possible mortgage fraud without promptly reporting to the...
Kerr, Joseph
2015-01-01
Dentists have much invested in their practices. They need to protect their practices from fraud and noncompliance. The author provides practical suggestions for how to significantly reduce the risk of fraud and theft in the practice without disrupting day-to-day operations. By adhering to nonintrusive policy and procedure changes, dental practice owners can reduce inherent risks of fraud and theft, while increasing financial and human resource knowledge regarding their practice. Practice owners with the appropriate policies and procedures benefit from significantly lower risk of loss from fraud and theft. Furthermore, they have a better understanding of their practice's finances and human resources. Copyright © 2015 American Dental Association. Published by Elsevier Inc. All rights reserved.
Richman, Vincent; Richman, Alex
2012-06-01
Reports of research fraud have raised concerns about research integrity similar to concerns raised about financial accounting fraud. We propose a departure from self-regulation in that researchers adopt the financial accounting approach in establishing trust through an external validation process, in addition to the reporting entities and the regulatory agencies. The general conceptual framework for reviewing financial reports, utilizes external auditors who are certified and objective in using established standards to provide an opinion on the financial reports. These standards have become both broader in scope and increasingly specific as to what information is reported and the methodologies to be employed. We believe that the financial reporting overhaul encompassed in the US Sarbanes-Oxley Act of 2002, which aims at preventing accounting fraud, can be applied to scientific research in 4 ways. First, Sarbanes-Oxley requires corporations to have a complete set of internal accounting controls. Research organizations should use appropriate sampling techniques and audit research projects for conformity with the initial research protocols. Second, corporations are required to have the chief financial officer certify the accuracy of their financial statements. In a similar way, each research organization should have their vice-president of research (or equivalent) certify the research integrity of their research activities. In contrast, the primary responsibility of the existing Research Integrity Officers is to handle allegations of research misconduct, an after-the-fact activity. Third, generally accepted auditing standards specify the appropriate procedures for external review of a corporation's financial statements. For similar reasons, the research review process would also require corresponding external auditing standards. Finally, these new requirements would be implemented in stages, with the largest 14 research organizations that receive 25% of the total National Institutes of Health funding, adopting these research oversight enhancements first.
Student Financial Aid Handbook, 2000-2001. Volume 1: Student Eligibility.
ERIC Educational Resources Information Center
Department of Education, Washington, DC. Student Financial Assistance.
This handbook helps financial aid administrators determine students' eligibility for aid from the U.S. Department of Education's Student Financial Assistance (SFA) programs. An introduction describes information sources, conflicting information, fraud case referral, status change, electronic requirements, the application system, and recent…
76 FR 21373 - Privacy Act of 1974; Report of a New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... established by State law; (3) support litigation involving the Agency; (4) combat fraud, waste, and abuse in...
Financial Scandals and Student Loans
ERIC Educational Resources Information Center
Eisenberg, Meyer; Franke, Ann H.
2007-01-01
The investigations of student-loan programs around the country echo previous scandals in the financial world involving stock offerings and mutual funds. The relationships between lenders and financial-aid officers seem to raise the same questions about impropriety, conflict of interest, and possible fraud. Indeed, lessons from Wall Street can…
The company you keep: spreading effects of financial fraud on investor trust.
Bernet, Patrick Michael; Getzen, Thomas E
2007-01-01
Investor trust is valuable to health care organizations. Without it, they may face higher capital costs. This study explores recent cases of fraud and the appearance of impropriety by health care organizations, focusing on the manners in which trust was violated, the systems that allowed those violations, and the effects on financial markets. Increases in the incidence and scale of such transgressions may be harbingers of worse times ahead. This article examines how recent events have affected the cost of capital, and what health care organizations can do to avoid being judged by the company they keep.
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2005
ERIC Educational Resources Information Center
US Department of Education, 2005
2005-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2006
ERIC Educational Resources Information Center
US Department of Education, 2006
2006-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2007
ERIC Educational Resources Information Center
US Department of Education, 2007
2007-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. 2008
ERIC Educational Resources Information Center
US Department of Education, 2008
2008-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress
ERIC Educational Resources Information Center
US Department of Education, 2004
2004-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
GAO audit not apt to find pervasive fraud in CARE Act.
1999-12-24
After hearing a series of news reports suggesting financial improprieties in programs run by Ryan White CARE Act recipients, a General Accounting Office (GAO) review of the program was made. A preliminary GAO report found only a few cases of fraud in the administration of funding stemming from the CARE Act, but that the potential for fraud is very real because of the lack of safeguards. These findings are considered important since the House Commerce Committee is expected to conduct oversight hearings into further authorization of the CARE Act early in 2000.
75 FR 4255 - Reporting of Fraudulent Financial Instruments
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-27
... other words, if a decision to purchase or sell would have been different had the regulated entity... FHFA upon discovery that it has purchased or sold a fraudulent loan or financial instrument, or suspects a possible fraud relating to the purchase or sale of any loan or financial instrument. The final...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-06
... public disclosure. Sensitive personal information such as account numbers or Social Security numbers... in person and online? 4. What programs, policies, accommodations, or benefits do financial service... protections and fraud protections. 5. What unique assistance, if any, is currently offered by financial...
2011-04-30
fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase
College Scholarship Fraud Prevention Act of 2000: Second Annual Report to Congress. May 2003
ERIC Educational Resources Information Center
US Department of Education, 2003
2003-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
ERIC Educational Resources Information Center
Jarmon, Gloria L.; Engel, Gary T.
This document discusses the Department of Education's (DOE) fiscal year 1999 financial audit results; the relationship between the audit findings and the potential for waste, fraud, and abuse; and the results of the General Accounting Office's (GAO) review of the DOE's grantback account. The DOE's financial activity is important to the federal…
Wayward Prescriptions: Costs of Fraud in Payor Plans
Kaye, Thomas
2008-01-01
The cost of prescription drugs and medical devices has increased dramatically over the past several years. This increase has exceeded the annual average inflation index, making medical products desired sources of ill-gotten financial gains through diversion, theft, fraud, and deceit. With databases often being compromised, personal health information, personal identification, and therapy history are all available to be used by thieves through deception and misrepresentation, and are being traded on clandestine websites. With increasing values of medical services, wanted efforts continue to emerge in profiteering schemes, using illicit deals for financial gains by exploiting what was once perceived as sacred areas of medical care. Estimates of healthcare resource costs in dollars, lives, and products exceed $200 billion. Select examples of fraud in our medical services are presented that expose plan members to the risks of loss and theft that can compromise the privacy of their health records. The author outlines prevention steps for payors to guard against such practices. PMID:25126240
Financial Fraud and Child Abuse
ERIC Educational Resources Information Center
Little, Allison Dare
2014-01-01
A modern form of abuse of children by parents and foster parents is to use the identity of children in their care for their own financial benefit, such as accessing their unused social security numbers to secure credit. This article reviews examples and implications of this identity theft.
ERIC Educational Resources Information Center
Goel, Sunita
2009-01-01
High profile cases of fraudulent financial reporting such as those that occurred at Enron and WorldCom have shaken public confidence in the U.S. financial reporting process and have raised serious concerns about the roles of auditors, regulators, and analysts in financial reporting. In order to address these concerns and restore public confidence,…
Basics of Saving and Investing: A Teaching Guide. Financial Literacy Two Thousand and One.
ERIC Educational Resources Information Center
Eastern Michigan Univ., Ypsilanti. National Inst. for Consumer Education.
This teaching guide contains learning objectives that focus on the following: how to design a personal financial plan; how financial markets work; how to select among various saving and investment options; how to find out and use investment information; and how to recognize and protect oneself against investment fraud. The guide can be the…
12 CFR 225.200 - Conditions to Board's section 20 orders.
Code of Federal Regulations, 2010 CFR
2010-01-01
... directors or the chief executive officer of an affiliated section 20 subsidiary. (ii) Directors, officers or... financial reporting, anti-fraud and financial responsibility rules applicable to broker-dealers. In addition...) Directors, officers or employees of a bank or thrift subsidiary of a bank holding company, or a bank or...
78 FR 63007 - Suspended Counterparty Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... which they are doing or have done business has committed fraud or other financial misconduct during the... may be issued if FHFA determines that the covered misconduct is of a type that would be likely to... financial misconduct within a specified time period. FHFA reviews the reports submitted by the regulated...
When Lying Feels the Right Thing to Do.
Van Der Zee, Sophie; Anderson, Ross; Poppe, Ronald
2016-01-01
Fraud is a pervasive and challenging problem that costs society large amounts of money. By no means all fraud is committed by 'professional criminals': much is done by ordinary people who indulge in small-scale opportunistic deception. In this paper, we set out to investigate when people behave dishonestly, for example by committing fraud, in an online context. We conducted three studies to investigate how the rejection of one's efforts, operationalized in different ways, affected the amount of cheating and information falsification. Study 1 demonstrated that people behave more dishonestly when rejected. Studies 2 and 3 were conducted in order to disentangle the confounding factors of the nature of the rejection and the financial rewards that are usually associated with dishonest behavior. It was demonstrated that rejection in general, rather than the nature of a rejection, caused people to behave more dishonestly. When a rejection was based on subjective grounds, dishonest behavior increased with approximately 10%, but this difference was not statistically significant. We subsequently measured whether dishonesty was driven by the financial loss associated with rejection, or emotional factors such as a desire for revenge. We found that rejected participants were just as dishonest when their cheating did not led to financial gain. However, they felt stronger emotions when there was no money involved. This seems to suggest that upon rejection, emotional involvement, especially a reduction in happiness, drives dishonest behavior more strongly than a rational cost-benefit analysis. These results indicate that rejection causes people to behave more dishonestly, specifically in online settings. Firms wishing to deter customers and employees from committing fraud may therefore benefit from transparency and clear policy guidelines, discouraging people to submit claims that are likely to be rejected.
When Lying Feels the Right Thing to Do
Van Der Zee, Sophie; Anderson, Ross; Poppe, Ronald
2016-01-01
Fraud is a pervasive and challenging problem that costs society large amounts of money. By no means all fraud is committed by ‘professional criminals’: much is done by ordinary people who indulge in small-scale opportunistic deception. In this paper, we set out to investigate when people behave dishonestly, for example by committing fraud, in an online context. We conducted three studies to investigate how the rejection of one’s efforts, operationalized in different ways, affected the amount of cheating and information falsification. Study 1 demonstrated that people behave more dishonestly when rejected. Studies 2 and 3 were conducted in order to disentangle the confounding factors of the nature of the rejection and the financial rewards that are usually associated with dishonest behavior. It was demonstrated that rejection in general, rather than the nature of a rejection, caused people to behave more dishonestly. When a rejection was based on subjective grounds, dishonest behavior increased with approximately 10%, but this difference was not statistically significant. We subsequently measured whether dishonesty was driven by the financial loss associated with rejection, or emotional factors such as a desire for revenge. We found that rejected participants were just as dishonest when their cheating did not led to financial gain. However, they felt stronger emotions when there was no money involved. This seems to suggest that upon rejection, emotional involvement, especially a reduction in happiness, drives dishonest behavior more strongly than a rational cost-benefit analysis. These results indicate that rejection causes people to behave more dishonestly, specifically in online settings. Firms wishing to deter customers and employees from committing fraud may therefore benefit from transparency and clear policy guidelines, discouraging people to submit claims that are likely to be rejected. PMID:27313549
Understanding the Financial Knowledge Gap: A New Dimension of Inequality in Later Life.
Khan, Mohammad Nuruzzaman; Rothwell, David W; Cherney, Katrina; Sussman, Tamara
2017-01-01
To understand individuals' financial behaviors, it is important to understand the financial knowledge gap - the distance between one's objective and subjective financial knowledge. Overestimating one's financial knowledge can lead to risky financial behaviors. To date, limited empirical work has examined how financial knowledge gap varies across age groups. We analyze the size and nature of the financial knowledge gap and its variation across age groups. Using nationally representative data, we find robust evidence that older adults overestimate their financial knowledge. Social workers can assess the financial knowledge gap and educate their clients to protect from financial fraud, exploitation, and abuse.
A Secure and Privacy-Preserving Targeted Ad-System
NASA Astrophysics Data System (ADS)
Androulaki, Elli; Bellovin, Steven M.
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-15
... accounting fraud allegations that have arisen with respect to Reverse Merger companies. In its filing, the... information about the Reverse Merger transaction, including audited financial statements, with the Commission... containing audited financial statements for a full fiscal year commencing on a date after the date of filing...
Risk Factors: Colleges Look to Manage Threats Ranging from Fraud to Data Breaches
ERIC Educational Resources Information Center
Wills, Lisa M.
2011-01-01
When an individual hears the term risk, he/she usually thinks of the financial institutions whose mismanagement of risk was instrumental in causing the 2008 financial crash. But all organizations, including colleges and universities, face various types and levels of risk, which threaten to harm the institutions and their ability to fulfill their…
Cheating in Online Courses for Financial Aid Fraud in the U.S.
ERIC Educational Resources Information Center
Owen, Robert S.
2016-01-01
This manuscript reviews issues that differentiate traditional academic cheating from course misconduct that is motivated by a desire to defraud financial aid services in the U.S. Past research on college student cheating has assumed that cheaters are driven by an incentive to obtain undeserved grades in college in order to ultimately obtain a…
ERIC Educational Resources Information Center
Jarmon, Gloria L.
This report provides a fiscal analysis of the Department of Education's 1999 financial audit results. It focuses on the relationship between the audit findings and the potential for waste, fraud, and abuse, and examines the status of an ongoing study of the Department's grantback account. It describes the ongoing accounting problems that have…
34 CFR 682.405 - Loan rehabilitation agreement.
Code of Federal Regulations, 2014 CFR
2014-07-01
... to, a crime involving fraud in obtaining title IV, HEA program assistance, so that the loan may be... loan rehabilitation. (c) A guaranty agency must make available financial and economic education...
Maintaining Agency Direction on Financial Fraud Act
Rep. Posey, Bill [R-FL-15
2011-07-20
House - 08/22/2011 Referred to the Subcommittee on Capital Markets and Government Sponsored Enterprises. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
75 FR 30411 - Privacy Act of 1974; Report of a Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-01
... Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse... Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability... systems and data files necessary for compliance with Title XI, Part C of the Social Security Act because...
Maintaining Agency Direction on Financial Fraud Act
Sen. Barrasso, John [R-WY
2011-07-20
Senate - 07/20/2011 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Maintaining Agency Direction on Financial Fraud Act
Sen. Barrasso, John [R-WY
2010-02-24
Senate - 02/24/2010 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Combating healthcare corruption and fraud with improved global health governance.
Mackey, Tim K; Liang, Bryan A
2012-10-22
Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of "global health corruption" and development of a treaty protocol to combat this crucial issue.
Energy entrepreneurs who bilked the public
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, E.
1982-11-01
The rush to invest in domestic energy development was accompanied by fraud, which has cost victims financial loss and diverted needed capital from legitimate projects. Government policies and tax incentives encouraged greedy entrepreneurs to perpetrate energy-related frauds. The three major areas targeted for abuse were tax shelters, deferred delivery contracts, and securities in companies promoting energy-related products. The courts have been lenient in the conviction and punishment of unlawful promoters, while victims who risk losing tax deductions are often reluctant to cooperate. Several case histories illustrate the activities of con artists and the rewards available to the unscrupulous. (DCK)
Employee theft and fraud: bigger than ever and getting worse.
2001-02-01
Fraud examiners and investigators say that employee theft is out of control, citing recent U.S. Chamber of Commerce figures that employees steal approximately $400 billion from businesses each year and an Ernst & Young survey showing that nearly 90% of organizations countrywide experienced some type of fraud in the 12 months prior to the survey. An additional undetermined amount is being reported lost because of external fraud committed by customers, vendors, and others having contact with a company or institution. Fraud experts interviewed for this report note that all sectors are targets--including retailers, hospitals and healthcare, the hotel industry, schools, and college campuses. In this report, we'll present the how's and whys of this development and also describe what one medical center is doing to stop thefts of medical equipment and computers.
ERIC Educational Resources Information Center
Congress of the U. S., Washington, DC. House Committee on Government Operations.
Three hearings held before the U.S. House of Representatives on student financial assistance programs were concerned with the manner in which the Office of Education's assistance programs were being administered, the extent and nature of fraud, waste and abuse, and the progress of the Department of Health, Education, and Welfare's (HEW) corrective…
ERIC Educational Resources Information Center
Snyder, Herbert
1999-01-01
Explains the principles and mechanics of double-entry bookkeeping as a part of the accounting cycle to produce a functioning set of accounting records. Suggests that libraries need to have accurate and timely information about their spending to gain financial control and protect against fraud and abuse. (LRW)
NASA Astrophysics Data System (ADS)
Gavrishchaka, Valeriy V.; Kovbasinskaya, Maria; Monina, Maria
2008-11-01
Novelty detection is a very desirable additional feature of any practical classification or forecasting system. Novelty and rare patterns detection is the main objective in such applications as fault/abnormality discovery in complex technical and biological systems, fraud detection and risk management in financial and insurance industry. Although many interdisciplinary approaches for rare event modeling and novelty detection have been proposed, significant data incompleteness due to the nature of the problem makes it difficult to find a universal solution. Even more challenging and much less formalized problem is novelty detection in complex strategies and models where practical performance criteria are usually multi-objective and the best state-of-the-art solution is often not known due to the complexity of the task and/or proprietary nature of the application area. For example, it is much more difficult to detect a series of small insider trading or other illegal transactions mixed with valid operations and distributed over long time period according to a well-designed strategy than a single, large fraudulent transaction. Recently proposed boosting-based optimization was shown to be an effective generic tool for the discovery of stable multi-component strategies/models from the existing parsimonious base strategies/models in financial and other applications. Here we outline how the same framework can be used for novelty and fraud detection in complex strategies and models.
Combating healthcare corruption and fraud with improved global health governance
2012-01-01
Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of “global health corruption” and development of a treaty protocol to combat this crucial issue. PMID:23088820
Computer Security: The Human Element.
ERIC Educational Resources Information Center
Guynes, Carl S.; Vanacek, Michael T.
1981-01-01
The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)
12 CFR 555.210 - What precautions must I take?
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Implement security measures designed to ensure secure operations. Such measures must be adequate to: (1) Prevent unauthorized access to your records and your customers' records; (2) Prevent financial fraud through the use of electronic means or facilities; and (3) Comply with applicable security devices...
Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy.
Dal Pozzolo, Andrea; Boracchi, Giacomo; Caelen, Olivier; Alippi, Cesare; Bontempi, Gianluca
2017-09-14
Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers' habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.
Security systems engineering overview
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less
Crisis management can leave residual effects.
Margolis, G L; DeMuro, P R
1991-10-01
A healthcare organization that once suffered from poor financial performance may fail to correct recovery methods that can cause lingering legal and accounting problems. A crisis management style is prone to creating problems with an organization's debt structure, Medicare and Medicaid payment, tax issues, labor relations, licensing and accreditation, compliance with fraud and abuse rules, and accounting for charity care. After stabilizing a worrisome financial situation, a healthcare organization should conduct an internal audit to ensure that its legal and accounting practices remain above board.
State and Local Consumer Publications. A Bibliography.
ERIC Educational Resources Information Center
Office of Consumer Affairs, Washington, DC.
This bibliography, designed primarily for state and local consumer offices, includes 650 publications on a wide range of consumer affairs subjects. Topics include advertising, appliance purchase and repair, automobiles, how and where to complain, contracts, credit and banking, fraud, door-to-door sales, energy and utilities, financial planning and…
20 CFR 632.116 - Conflict of interest.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Conflict of interest. 632.116 Section 632.116... EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.116 Conflict of interest. (a) No... contractor shall avoid personal and organizational conflict of interest in awarding financial assistance and...
ERIC Educational Resources Information Center
Pember, Mary Annette
2007-01-01
For American Indian scholars, securing a job in higher education can sometimes be as simple as checking a box. Most of the country's colleges and universities do not require proof of tribal enrollment from faculty or staff who identify themselves as American Indians. Students looking to receive financial aid, however, must submit proof that they…
Semiannual Report to Congress, No. 49. April 1, 2004-September 30, 2004
ERIC Educational Resources Information Center
US Department of Education, 2004
2004-01-01
This report highlights significant work of the U.S. Department of Education's Office of Inspector General for the 6-month period ending September 30, 2004. Sections include: Activities and Accomplishments; Elimination of Fraud and Error in Student Aid Programs; Budget and Performance Integration; Financial Management; Expanded Electronic…
2013-03-01
international organized crime , illegal immigration, financial institution fraud and money laundering. Policymakers increasingly view domestic law...approach to crime control, focusing upon the identification, analysis and management of persisting and developing problems or risks (de Lint, 2006
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Section 96.33 Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Section 96.33 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Section 96.33 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Section 96.33 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Section 96.33 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
Fraud and abuse. Building an effective corporate compliance program.
Matusicky, C F
1998-04-01
In 1997, General Health System (GHS), a not-for-profit integrated delivery system headquartered in Baton Rouge, Louisiana, developed a formal corporate compliance program. A newly appointed corporate compliance officer worked with key GHS managers and employees to assess the organization's current fraud and abuse prevention practices and recommend changes to meet new regulatory and organizational requirements. Then a structure for implementing these changes was developed, with staff training at its core. The program required a significant initial outlay of financial and human resources. The benefits to the organization, however, including a greater ability to respond quickly and effectively to possible compliance problems and better organizational communications, were worth the investment.
Code of Federal Regulations, 2010 CFR
2010-04-01
... SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Additions to the Tax... definition of “underpayment” of income taxes imposed under subtitle A is set forth in § 1.6664-2. Ordering rules for computing the total amount of accuracy-related and fraud penalties imposed with respect to a...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
... Proposed Rule Change 1. Purpose (a) Background In light of well publicized securities frauds that resulted... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64954; File No. SR-FINRA-2010-036] Self...-Case Referrals July 25, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934...
State Student Incentive Grant Program: Issues in Partnership.
ERIC Educational Resources Information Center
Lee, John; And Others
Some of the issues concerning the evolving relationship between state and federal agencies in the field of student financial aid are examined, with attention to the State Student Incentive Grant Program (SSIG). After tracing the history of the SSIG, the following issues are considered: SSIG portability; state control of fraud, abuse, and error;…
76 FR 20731 - RINO International Corporation; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-13
..., because the company has failed to disclose that: (i) The outside law firm and forensic accountants hired by the audit committee to investigate allegations of financial fraud at the company resigned on or...; (ii) the chairman of its audit committee resigned on March 31, 2011; and (iii) the company's remaining...
Code of Federal Regulations, 2011 CFR
2011-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...
Code of Federal Regulations, 2012 CFR
2012-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...
Code of Federal Regulations, 2013 CFR
2013-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...
Code of Federal Regulations, 2014 CFR
2014-04-01
... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Identity Theft Detection, Prevention, and Mitigation B Appendix B to Part 162 Commodity and Securities... Detection, Prevention, and Mitigation Section 162.30 requires each financial institution or creditor that...
Code of Federal Regulations, 2014 CFR
2014-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...
Using support vector machines to detect medical fraud and abuse.
Francis, Charles; Pepper, Noah; Strong, Homer
2011-01-01
This paper examines the architecture and efficacy of Quash, an automated medical bill processing system capable of bill routing and abuse detection. Quash is designed to be used in conjunction with human auditors and a standard bill review software platform to provide a complete cost containment solution for medical claims. The primary contribution of Quash is to provide a real world speed up for medical fraud detection experts in their work. There will be a discussion of implementation details and preliminary experimental results. In this paper we are entirely focused on medical data and billing patterns that occur within the United States, though these results should be applicable to any financial transaction environment in which structured coding data can be mined.
Pattern analysis of fraud case in Taiwan, China and Indonesia
NASA Astrophysics Data System (ADS)
Kusumo, A. H.; Chi, C.-F.; Dewi, R. S.
2017-11-01
The current study analyzed 125 successful fraud cases happened in Taiwan, China, and Indonesia from 2008 to 2012 published in the English online newspapers. Each of the case report was coded in terms of scam principle, information media (information exchange between fraudsters and victim), money media (media used by fraudsters to obtain unauthorized financial benefit) and other additional information which was judged to be relevant. The Chi-square Automatic Interaction Detector (CHAID) was applied to the coded data of information, scam principle and money media to find a subset of predictors that might derive meaningful classifications. A series of flow diagrams was constructed based on CHAID result to illustrate the flow of information (scam) travelling from information media to money media.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-21
...-SARs database will include or exclude ISE-SARs filed pursuant to the BSA and Anti-Money Laundering... enforcement officials in the areas of cybersecurity, fraud, and money laundering. The financial services... Initiative System of Records'' from one or more provisions of the Privacy Act because of criminal, civil, and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-23
... securities frauds that resulted in harm to investors, FINRA has reviewed its rule on arbitrator referrals and... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62930; File No. SR-FINRA-2010-036] Self... September 17, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and...
ERIC Educational Resources Information Center
Office of Inspector General (ED), Washington, DC.
This report from the Office of Inspector General (OIG) identifies systemic weaknesses in the operations and programs of the U.S. Department of Education (ED). The office provides accurate financial information to make informed decisions, manage for results, and ensure operation integrity. Vigorous fraud investigations are continuing. Audits reveal…
Streamlining the Acquisition Process: A DCAA Field-Grade Perspective
2014-03-01
Initial Capabilities Document IFRS International Financial Reporting Standards IPT Integrated Product Team IRR Independent Reference Review...the responsibilities, programmed focus, strategic plan and recent events impacting the organization. B. DEFENSE CONTRACT AUDIT AGENCY 1. DCAA...material misstatements, whether caused by error or fraud. The type of audit requested by the contracting officer will directly impact both the
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-08
..., nonoccurrence, or the extent of the occurrence of an event or contingency associated with a potential financial....'' \\14\\ \\10\\ Exchange Act Section 3(a)(9) defines ``person'' as ``a natural person, company, government.... Commenters are requested to provide empirical data or economic studies to support their views and arguments...
Code of Federal Regulations, 2012 CFR
2012-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...
Code of Federal Regulations, 2013 CFR
2013-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...
Code of Federal Regulations, 2013 CFR
2013-01-01
... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...
Code of Federal Regulations, 2013 CFR
2013-01-01
... the financial institution or creditor should take steps to ensure that the activity of the service... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation Appendix to Subpart C of Part 391 Banks and Banking FEDERAL DEPOSIT...
Code of Federal Regulations, 2011 CFR
2011-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...
Code of Federal Regulations, 2014 CFR
2014-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...
Code of Federal Regulations, 2014 CFR
2014-04-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Identity Theft Detection, Prevention, and Mitigation A Appendix A to Subpart C of Part 248 Commodity and...
Code of Federal Regulations, 2013 CFR
2013-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...
Code of Federal Regulations, 2014 CFR
2014-01-01
... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...
Code of Federal Regulations, 2014 CFR
2014-01-01
... the financial institution or creditor should take steps to ensure that the activity of the service... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation Appendix to Subpart C of Part 391 Banks and Banking FEDERAL DEPOSIT...
Code of Federal Regulations, 2011 CFR
2011-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...
Code of Federal Regulations, 2012 CFR
2012-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...
Code of Federal Regulations, 2014 CFR
2014-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...
Code of Federal Regulations, 2012 CFR
2012-01-01
... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heineke, J M
1979-10-01
Three data sets were used to estimate joint and conditional probability distributions between various variables of interest in bank fraud and embezzlement (BF and E) cases of $10,000 dollars or more, computer-related crime cases of various types, and cases of insider theft from drug manufacturers and distributors. This report describes in tabular form the information contained in the three rather extensive data sets from industries facing insider threats which, in one or more dimensions, are analogous to insider threats potentially confronting managers in the nuclear industry. The data in Tables 1 through 29 were computed from the 313 cases ofmore » bank fraud and embezzlement (BF and E) representing losses of $10,000 or more reported to the Federal Deposit Insurance Corporation (FDIC) for the period 1977 to 1978. The data in Tables 30 through 64 were computed from the 461 cases of computer-related crime obtained from SRI International for the period 1958 to 1978. These incidents include inventory manipulations designed to hide errors, phony entries used to cover embezzlements, schemes used to penetrate a system and surreptitiously bring about a system crash, and sabotage. The data in Tables 65 through 67 were computed from data reported by the Drug Enforcement Agency (DEA) for the period 1973 to 1978. These data, though limited, provided several interesting insights into the insider-threat problem.« less
Financial viability, medical technology, and hospital closures.
Prince, T R; Sullivan, J A
2000-01-01
Informed investments in medical technology and information systems are associated with the financial viability of community hospitals. Financially distressed facilities are 3 to 4 years behind proactive hospitals in supporting high-speed data, voice, and image transmissions to physicians in various locations. Impact of the Balanced Budget Act of 1997, fraud and abuse activities, Y2K issues, and lack of information systems support for physicians will result in 800 hospital closures and mergers of distressed hospitals over the next 60 months. These findings are based on the application of an eight-step framework for classifying information systems in health care entities. This framework is validated by survey instruments, site visits, interviews with senior management in 44 health care entities containing 576 hospitals, and judgments on the financial status of the health care entities.
28 CFR 68.8 - Time computations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Time computations. 68.8 Section 68.8... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.8 Time computations. (a) Generally. In computing any period of time under these rules or in an order issued hereunder, the time...
28 CFR 68.8 - Time computations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Time computations. 68.8 Section 68.8... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.8 Time computations. (a) Generally. In computing any period of time under these rules or in an order issued hereunder, the time...
28 CFR 68.8 - Time computations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Time computations. 68.8 Section 68.8... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.8 Time computations. (a) Generally. In computing any period of time under these rules or in an order issued hereunder, the time...
28 CFR 68.8 - Time computations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Time computations. 68.8 Section 68.8... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.8 Time computations. (a) Generally. In computing any period of time under these rules or in an order issued hereunder, the time...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
...: Computer Matching Program AGENCY: Treasury Inspector General for Tax Administration, Treasury. ACTION... Internal Revenue Service (IRS) concerning the conduct of TIGTA's computer matching program. DATES... INFORMATION: TIGTA's computer matching program assists in the detection and deterrence of fraud, waste, and...
Corporate integrity agreements: making the best of a tough situation.
Ramsey, Robert B
2002-03-01
Healthcare providers increasingly are entering into corporate integrity agreements as part of settlements with the Federal government in fraud-and-abuse cases. Providers pursue these settlements to avoid the costs of defending themselves against fraud charges. However, the costs relating to the long-term compliance activity mandated in the settlement's corporate integrity agreement also can be substantial. These costs include significant staff resources that must be devoted to compliance efforts demanded by the agreement and the required engagement of consultants to monitor the organization's compliance. Healthcare financial managers should be familiar with the elements of a typical corporate integrity agreement and understand strategies for negotiating such an agreement. Effective negotiations can help minimize the organization's costs of compliance with the agreement and facilitate its ongoing implementation of the agreement.
45 CFR 79.27 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Computation of time. 79.27 Section 79.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.27 Computation of time. (a) In computing any period of time under this part or in an order issued...
6 CFR 13.27 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Computation of time. 13.27 Section 13.27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.27 Computation of time. (a) In computing any period of time under this part or in an order issued...
A geographical analysis of trafficking on a popular darknet market.
Broséus, Julian; Rhumorbarbe, Damien; Morelato, Marie; Staehli, Ludovic; Rossy, Quentin
2017-08-01
Cryptomarkets are online marketplaces, located on the darknet, that facilitate the trading of a variety of illegal goods, mostly drugs. While the literature essentially focus on drugs, various other goods and products related to financial or identity fraud, firearms, counterfeit goods, as well as doping products are also offered on these marketplaces. Through the analysis of relevant data collected on a popular marketplace in 2014-2015, Evolution, this research provides an analysis of the structure of trafficking (types and proportions of products, number of vendors and shipping countries). It also aims at highlighting geographical patterns in the trafficking of these products (e.g. trafficking flows, specialisation of vendors and assessment of their role in the distribution chain). The analysis of the flow of goods between countries emphasises the role of specific countries in the international and domestic trafficking, potentially informing law enforcement agencies to target domestic mails or international posts from specific countries. The research also highlights the large proportion of licit and illicit drug listings and vendors on Evolution, followed by various fraud issues (in particular, financial fraud), the sharing of knowledge (tutorials) and finally goods, currencies and precious metals (principally luxury goods). Looking at the shipping country, there seems to be a clear division between digital and physical products, with more specific information for physical goods. This reveals that the spatial analysis of trafficking is particularly meaningful in the case of physical products (such as illicit drugs) and to a lesser extent for digital products. Finally, the geographical analysis reveals that spatial patterns on Evolution tend to reflect the structure of the traditional illicit market. However, regarding illicit drugs, country-specificity has been observed and are presented in this article. Copyright © 2017 Elsevier B.V. All rights reserved.
An Informational Analysis and Communications Squadron Survey of Cyberspace Mission Assurance
2010-06-01
such things as fraud, 11 business ethics, financial reporting, internal controls, and enterprise risk management . COSO is an organization...recognized world-wide and is highly respected. In 1992, COSO published a framework for risk management . It reopened the framework for modification to...The enterprise risk management facet of the COSO framework is pertinent to the cyber mission assurance discussion. COSO recognized the importance
College Scholarship Fraud Prevention Act of 2000: First Annual Report to Congress. May 2002
ERIC Educational Resources Information Center
US Department of Education, 2002
2002-01-01
Every year, millions of high school graduates enter college. The cost of a four-year college education has risen over 600 percent since 1969. Students and their families seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5,…
A Layered Social and Operational Network Analysis
2007-03-01
organizations, networks and individuals” (OPOTUS, 2006: 5). These transnational threats, which compromise the security of the US , consist of...The focus of criminal groups is money ; the trafficking of 2-7 drugs or people, the money laundering , and the corruption are a means to generate...assassination is used (National Defense University, 1999:250). 2-8 Economic and industrial espionage, bank fraud, financial market manipulation, and
Defense Industrial Personnel Security Clearance Review Program
1992-01-02
or on closed accounts. 5. Indication of deceit or deception in obtaining credit or bank accounts, misappropriation of funds, income tax evasion ...income tax evasion , expense account fraud, filing deceptive loan statements, and other intentional financial breaches of trust; (3) inability or...information; or any U.S. citizen nominated by the Red Cross or United Service Organizations for assignment with the Military Services overseas. The
77 FR 62059 - Privacy Act of 1974, as Amended; Revisions to Existing Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... and forms, microfilm or microfiche, and in computer processable storage media such as personnel system... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... apply: The Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer...
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector
2012-07-01
CWB research is the Five Factor Model ( FFM ), which includes dimensions of openness to experience, extraversion, conscientiousness, agreeableness...and emotional stability. After reviewing the literature on the FFM dimensions and CWBs, Salga- do found 44 studies conducted between 1990 and 1999 that...examine the relationships between the FFM dimensions and deviant behaviors (17), absenteeism (13), work-related accidents (9), and turnover (5
Hormones and ethics: Understanding the biological basis of unethical conduct.
Lee, Jooa Julia; Gino, Francesca; Jin, Ellie Shuo; Rice, Leslie K; Josephs, Robert A
2015-10-01
Globally, fraud has been rising sharply over the last decade, with current estimates placing financial losses at greater than $3.7 trillion annually. Unfortunately, fraud prevention has been stymied by lack of a clear and comprehensive understanding of its underlying causes and mechanisms. In this paper, we focus on an important but neglected topic--the biological antecedents and consequences of unethical conduct--using salivary collection of hormones (testosterone and cortisol). We hypothesized that preperformance cortisol levels would interact with preperformance levels of testosterone to regulate cheating behavior in 2 studies. Further, based on the previously untested cheating-as-stress-reduction hypothesis, we predicted a dose-response relationship between cheating and reductions in cortisol and negative affect. Taken together, this research marks the first foray into the possibility that endocrine-system activity plays an important role in the regulation of unethical behavior. (c) 2015 APA, all rights reserved).
Detecting, preventing, and responding to "fraudsters" in internet research: ethics and tradeoffs.
Teitcher, Jennifer E F; Bockting, Walter O; Bauermeister, José A; Hoefer, Chris J; Miner, Michael H; Klitzman, Robert L
2015-01-01
Internet-based health research is increasing, and often offers financial incentives but fraudulent behavior by participants can result. Specifically, eligible or ineligible individuals may enter the study multiple times and receive undeserved financial compensation. We review past experiences and approaches to this problem and propose several new strategies. Researchers can detect and prevent Internet research fraud in four broad ways: (1) through the questionnaire/instrument (e.g., including certain questions in survey; and software for administering survey); (2) through participants' non-questionnaire data and seeking external validation (e.g., checking data for same email addresses, usernames, passwords, and/or fake addresses or phone numbers; (3) through computer information, (e.g., IP addresses and cookies), and 4) through study design (e.g., avoid lump sum compensation and interviewing participants). These approaches each have pros and cons, and raise ethical, legal, and logistical questions, given that ethical tensions can emerge between preserving the integrity of research vs. protecting the privacy and confidentiality of study respondents. While past discussions concerning the ethics of online research have tended to focus on the participants' ability to trust the researchers, needs now arise to examine researchers' abilities to trust the participants. This analysis has several critical implications for future practice, policy, and research. © 2015 American Society of Law, Medicine & Ethics, Inc.
Criminality in Greece during the years of financial crisis: 2008-2014.
Tsouvelas, G; Konstantakopoulos, G; Vakirtzis, A; Giotakos, O; Papaslanis, T; Kontaxakis, V
2018-01-01
The link between poverty, unemployment and economic downturns and increases in crime rates has long been the subject of social science study. However, the relationships between these phenomena has not been studied sufficiently and through time in most European countries that suffered, or, like Greece, are still suffering the recent financial crisis. We examined if the recent financial crisis in Greece has coincided with an increase in crime, analyzing crime rates since the start of the financial crisis and over an extensive time period (7 years). Crime statistics were taken from the Greek Police. Repeated measures analyses of variance were performed to reveal potential differences in criminality for the years 2008, 2010, 2012 and 2014. There was a significant increase in global criminality rate per 100,000 residents (Wilks' Lambda=0.32, F (3,11)=7.93, p=0.004). There was a significant increase in illegal gun possession (Wilks' Lambda=0.16, F (3,11)=18.68, p=0.001), fraud (Wilks' Lambda=0.10, F (3,11)=32.35, p=0.001), extortion (Wilks' Lambda=0.38, F (3,11)=4.45, p=0.040), and beggary (Wilks' Lambda=0.33, F (3,11)=6.22, p=0.014). A reversed U shape was found for homicides, thefts and robberies, with rates peaking in 2010 and 2012 before dropping off in 2014. Narcotics and sexual exploitation crime rates remained unchanged. Surprisingly, the incidence of rape decreased (Wilks' Lambda=0.42, F (3,11)=5.14, p=0.018). Our results are in agreement with the results of previous broader studies as well as with criminological theories according to which in times of economic stress an increase in both property crimes and violent crimes is expected. As predicted, an increase in financial crime was observed (e.g. fraud and extortions) as well as petty crime related to financial hardship like beggary. Concerns regarding the escalation of white-collar crimes in times of economic downturns that have been raised in the literature warrant further investigation.
The Classroom, Board Room, Chat Room, and Court Room: School Computers at the Crossroads.
ERIC Educational Resources Information Center
Stewart, Michael
2000-01-01
In schools' efforts to maximize technology's benefits, ethical considerations have often taken a back seat. Computer misuse is growing exponentially and assuming many forms: unauthorized data access, hacking, piracy, information theft, fraud, virus creation, harassment, defamation, and discrimination. Integrated-learning activities will help…
Encryption and the loss of patient data.
Miller, Amalia R; Tucker, Catherine E
2011-01-01
Fast-paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment.
Medical identity theft: an emerging problem for informatics.
Gillette, William; Patrick, Timothy B
2007-10-11
This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.
Piotrowski, Julie
2003-11-10
Wake-up call for the industry or an isolated case of corporate chicanery? Healthcare experts are divided on the import of Richard Scrushy's indictment on 85 counts last week in connection with the financial scandal at HealthSouth Corp. The indictment alleges the company founder relied on electronic and telephone surveillance, threats and intimidation to control his accomplices.
Scientific fraud in 20 falsified anesthesia papers : detection using financial auditing methods.
Hein, J; Zobrist, R; Konrad, C; Schuepfer, G
2012-06-01
Data from natural sources show counter-intuitive distribution patterns for the leading digits to the left of the decimal point and the digit 1 is observed more frequently than all other numbers. This pattern, which was first described by Newcomb and later confirmed by Benford, is used in financial and tax auditing to detect fraud. Deviations from the pattern indicate possible falsifications. Anesthesiology journals are affected not only by ghostwriting and plagiarism but also by counterfeiting. In the present study 20 publications in anesthesiology known to be falsified by an author were investigated for irregularities with respect to Benford's law using the χ(2)-test and the Z-test. In the 20 retracted publications an average first-digit frequency of 243.1 (standard deviation SD ± 118.2, range: 30-592) and an average second-digit frequency of 132.3 (SD ± 72.2, range: 15-383) were found. The observed distribution of the first and second digits to the left of the decimal point differed significantly (p< 0.01) from the expected distribution described by Benford. Only the observed absolute frequencies for digits 3, 4 and 5 did not differ significantly from the expected values. In an analysis of each paper 17 out of 20 studies differed significantly from the expected value for the first digit and 18 out of 20 studies varied significantly from the expected value of the second digit. Only one paper did not vary significantly from expected values for the digits to the left of the decimal. For comparison, a meta-analysis using complex mathematical procedures was chosen as a control. The analysis showed a first-digit distribution consistent with the Benford distribution. Thus, the method used in the present study seems to be sensitive for detecting fraud. Additional statements of specificity cannot yet be made as this requires further analysis of data that is definitely not falsified. Future studies exploring conformity might help prevent falsified studies from being published.
Mantone, Joseph
2005-01-31
With the trial of Richard Scrushy, left, finally under way in Alabama, it isn't just the former HealthSouth executive being scrutinized. It's the first courtroom test for the Sarbanes-Oxley Act of 2002, which holds CEOs accountable for false financial statements. Scrushy's defense attorneys have already begun laying the groundwork to blame underlings for the 2.64 billion dollar accounting fraud.
Jaklevic, Mary Chris
2003-09-01
Healthcare lenders National Century Financial Enterprises and DVI have fallen on hard times. One NCFE official pleaded guilty to fraud and DVI filed for bankruptcy last week. However, many say DVI's collapse won't reverberate through the industry like the fall of NCFE did. The president of Cypress Partners, Joseph Paul, left, says DVI's bankruptcy won't affect profitable, well-run companies.
2012-04-25
problem that continues to cost billions of dollars in losses at a time when the United States Military and Federal Government can least afford it. It...to look like. The federal budget has become the leading issue affecting every Government Agency. The military’s budget is decreasing by more than...discuss the cost savings measures and initiatives currently being debated in Washington, and offer, for debate, several new recommendations that have
Data Hemorrhages in the Health-Care Sector
NASA Astrophysics Data System (ADS)
Johnson, M. Eric
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.
Food Safety, Food Fraud, and Food Defense: A Fast Evolving Literature.
Manning, Louise; Soon, Jan Mei
2016-04-01
Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. Successful models of food crime are dependent on how well the crime has been executed and at what point, or even if, detection actually occurs. The aim of this paper is to undertake a literature review and critique the often contradictory definitions that can be found in the literature in order to compare and contrast existing food crime risk assessment tools and their application. Food safety, food defense, and food fraud risk assessments consider different criteria in order to determine the degree of situational risk for each criteria and the measures that need to be implemented to mitigate that risk. Further research is required to support the development of global countermeasures, that are of value in reducing overall risk even when the potential hazards may be largely unknown, and specific countermeasures that can act against unique risks. © 2016 Institute of Food Technologists®
Faunce, Thomas; Urbas, Gregor; Skillen, Lesley; Smith, Marc
2010-12-01
The Australian Federal Government expends increasingly large amounts of money on pharmaceuticals and medical devices. It is likely, given government experience in other jurisdictions, that a significant proportion of this expenditure is paid as a result of fraudulent claims presented by corporations. In the United States, legislation such as the False Claims Act 1986 (US), the Fraud Enforcement and Recovery Act 2009 (US), the Stark (Physician Self-Referral) Statute 1995 (US), the Anti-Kickback Statute 1972 (US), the Food, Drug and Cosmetic Act 1938 (US), the Social Security Act 1965 (US), and the Patient Protection and Affordable Care Act 2010 (US) has created systematic processes allowing the United States Federal Government to recover billions of dollars in fraudulently made claims in the health and procurement areas. The crucial component involves the creation of financial incentives for information about fraud to be revealed from within the corporate sector to the appropriate state officials. This article explores the opportunities for creating a similar system in Australia in the health care setting.
1995-06-28
Secondary Reports Dilution Unit, Audit Planning and Technical Support Directorate, at (703) 604-8937 (DSN 664-8937) or FAX (703) 604-8932. Suggestions...for Future Audits To suggest ideas for or to request future audits , contact the Planning and Coordination Branch, Audit Planning and Technical...Defense OAIG-AUD (ATTN: APTS Audit Suggestions) 400 Army Navy Drive (Room 801) Arlington, Virginia 22202-2884 DoD Hotline To report fraud, waste
More than meets the eye: digital fraud in dentistry.
Rao, S A; Singh, N; Kumar, R; Thomas, A M
2010-01-01
Digital photographs play a substantial role in the presentation and validation of clinical cases for documentation and research purposes in esthetically oriented professions such as dentistry. The introduction of sophisticated cameras and "easy to use" computer software readily available on today's market has enabled digital fraud to emerge as a common and widely used practice. Hence, it is essential that both dentists and editorial circles are aware and cautious with regard to the possibility of digital fraud. A set of 10 routine "pre-" and "post" treatment dental procedure photographs were taken and randomly manipulated using standard desktop software. A team of 10 dental professionals were selected and each one of them was individually requested to review and evaluate the authenticity of the photographs. An assessment of expert opinion revealed an overall sensitivity of 60% and a sensitivity of 15% in correctly identifying a manipulated photograph, which is considered low. Furthermore, there was poor interobserver agreement. Advanced technology that is easily available has resulted in adept digital fraud that is difficult to detect. There is a need for awareness among both dental practitioners and the editorial circle regarding misrepresentation due to image manipulation. It is therefore necessary to follow a skeptical approach in the assessment of digitalized photos used in research and as a part of clinical dentistry.
FraudBuster: Reducing Fraud in an Auto Insurance Market.
Nagrecha, Saurabh; Johnson, Reid A; Chawla, Nitesh V
2018-03-01
Nonstandard insurers suffer from a peculiar variant of fraud wherein an overwhelming majority of claims have the semblance of fraud. We show that state-of-the-art fraud detection performs poorly when deployed at underwriting. Our proposed framework "FraudBuster" represents a new paradigm in predicting segments of fraud at underwriting in an interpretable and regulation compliant manner. We show that the most actionable and generalizable profile of fraud is represented by market segments with high confidence of fraud and high loss ratio. We show how these segments can be reported in terms of their constituent policy traits, expected loss ratios, support, and confidence of fraud. Overall, our predictive models successfully identify fraud with an area under the precision-recall curve of 0.63 and an f-1 score of 0.769.
Multi-stage methodology to detect health insurance claim fraud.
Johnson, Marina Evrim; Nagarur, Nagen
2016-09-01
Healthcare costs in the US, as well as in other countries, increase rapidly due to demographic, economic, social, and legal changes. This increase in healthcare costs impacts both government and private health insurance systems. Fraudulent behaviors of healthcare providers and patients have become a serious burden to insurance systems by bringing unnecessary costs. Insurance companies thus develop methods to identify fraud. This paper proposes a new multistage methodology for insurance companies to detect fraud committed by providers and patients. The first three stages aim at detecting abnormalities among providers, services, and claim amounts. Stage four then integrates the information obtained in the previous three stages into an overall risk measure. Subsequently, a decision tree based method in stage five computes risk threshold values. The final decision stating whether the claim is fraudulent is made by comparing the risk value obtained in stage four with the risk threshold value from stage five. The research methodology performs well on real-world insurance data.
ERIC Educational Resources Information Center
Hauptman, Robert
2001-01-01
Considers problems that have arisen with the vast quantities of information available as a result of the popularity of computers. Topics include inequity; capitalism, commodification, and privatization; hacking, privacy, and fraud; censorship; monitoring and surveillance; cyberethics; and integrity in an age of electronic communication. (LRW)
Management of mutual health organizations in Ghana.
Baltussen, R; Bruce, E; Rhodes, G; Narh-Bana, S A; Agyepong, I
2006-05-01
Mutual Health Organizations (MHO) emerged in Ghana in the mid-1990s. The organizational structure and financial management of private and public MHO hold important lessons for the development of national health insurance in Ghana, but there is little evidence to date on their features. This paper aims at filling this data gap, and at making recommendations to Ghanaian authorities on how to stimulate the success of MHO. Survey among 45 private and public MHO in Ghana in 2004-2005, asking questions on their structure, financial management and financial position. Private MHO had more autonomy in setting premiums and benefit packages, and had higher community participation in meetings than public MHO. MHO in general had few measures in place to control moral hazard and reduce adverse selection, but more measures to control fraud and prevent cost escalation. The vast majority of schemes were managed by formally trained and paid staff. The financial results varied considerably. Ghanaian authorities regulate the newly established public MHO, but may do good by leaving them a certain level of autonomy in decision-making and secure community participation. The financial management of MHO is suboptimal, which indicates the need for technical assistance.
1985-07-30
This final rule provides the additional requirements to the conditions and procedures for initial approval and reapproval of Medicaid Management Information Systems (MMIS) that were added by section 1903(r) of the Social Security Act (as amended by section 901 of the Mental Health Systems Act of 1980, Pub. L. 96-398). These provisions are intended to improve States' MMIS, ensure efficient system operations, and make the procedures for detection of fraud, waste, and abuse more effective. In addition, this final rule specifies the procedures we follow in reducing the level of Federal financial participation in State administrative expenditures if a State fails to meet the conditions for initial operation, initial approval, or reapproval of an MMIS.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-28
...The NCUA intends to submit the following information collection to the Office of Management and Budget (OMB) for review and clearance under the Paperwork Reduction Act of 1995. This information collection relates to NCUA rules and regulations, which require a federal credit union (FCU) to monitor its eligibility to qualify for a higher fidelity coverage deductible and to notify the NCUA if its financial condition changes resulting in the loss of that eligibility for the higher deductible. This information collection notice is published to obtain comments from the public. This requirement enables NCUA to monitor the FCU's financial condition for safety and soundness purposes and helps to assure that FCUs are properly and adequately protected against potential losses due to insider abuse such as fraud and embezzlement.
Scientific Misconduct and the Myth of Self-Correction in Science.
Stroebe, Wolfgang; Postmes, Tom; Spears, Russell
2012-11-01
The recent Stapel fraud case came as a shattering blow to the scientific community of psychologists and damaged both their image in the media and their collective self-esteem. The field responded with suggestions of how fraud could be prevented. However, the Stapel fraud is only one among many cases. Before basing recommendations on one case, it would be informative to study other cases to assess how these frauds were discovered. The authors analyze a convenience sample of fraud cases to see whether (social) psychology is more susceptible to fraud than other disciplines. They also evaluate whether the peer review process and replications work well in practice to detect fraud. There is no evidence that psychology is more vulnerable to fraud than the biomedical sciences, and most frauds are detected through information from whistleblowers with inside information. On the basis of this analysis, the authors suggest a number of strategies that might reduce the risk of scientific fraud. © The Author(s) 2012.
Who Can You Trust? Protecting Your Organization from Internal Fraud.
ERIC Educational Resources Information Center
Lukaszewski, Thomas E.
1997-01-01
Discusses how to protect a child care organization from employee fraud. Differentiates employee and management fraud and examines reasons fraud is committed. Suggests procedures for protecting an organization from fraud, including establishing an effective internal control system, paying attention to unusual employee behavior, reviewing expense…
Understanding pharmaceutical research manipulation in the context of accounting manipulation.
Brown, Abigail
2013-01-01
The problem of the manipulation of data that arises when there is both opportunity and incentive to mislead is better accepted and studied - though by no means solved - in financial accounting than in medicine. This article analyzes pharmaceutical company manipulation of medical research as part of a broader problem of corporate manipulation of data in the creation of accounting profits. The article explores how our understanding of accounting fraud and misinformation helps us understand the risk of similar information manipulation in the medical sciences. This understanding provides a framework for considering how best to improve the quality of medical research and analysis in light of the current system of medical information production. I offer three possible responses: (1) use of the Dodd-Frank whistleblower provisions to encourage reporting of medical research fraud; (2) a two-step academic journal review process for clinical trials; and (3) publicly subsidized trial-failure insurance. These would improve the release of negative information about drugs, thereby increasing the reliability of positive information. © 2013 American Society of Law, Medicine & Ethics, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-11
... Special Fraud Alert on Telemarketing by Durable Medical Equipment Suppliers AGENCY: Office of Inspector... Special Fraud Alert. Specifically, the Updated Special Fraud Alert addressed the statutory provision...) 205-0007. SUPPLEMENTARY INFORMATION: In our publication of the OIG Updated Special Fraud Alert on...
Fighting Domestic and International Fraud in the Admissions and Registrar's Offices
ERIC Educational Resources Information Center
Koenig, Ann M.; Devlin, Edward
2012-01-01
The education sector is no stranger to fraud, unfortunately. This article provides best practice guidance in recognizing and dealing with fraud, with emphasis on domestic and international academic credential fraud. It includes practical approaches to academic document review and verification. Success in fighting fraud requires becoming informed,…
Declining financial capacity in patients with mild Alzheimer disease: a one-year longitudinal study.
Martin, Roy; Griffith, H Randall; Belue, Katherine; Harrell, Lindy; Zamrini, Edward; Anderson, Britt; Bartolucci, Alfred; Marson, Daniel
2008-03-01
The objective of this study was to investigate change over time in financial abilities in patients with mild Alzheimer disease (AD). The authors conducted a prospective 1-year longitudinal study at a large southern U.S. metropolitan-area medical school university. Participants included healthy older adults (N=63) and patients with mild AD (N=55). The authors conducted a standardized performance measure of financial capacity. Performance was assessed on 18 financial tasks, nine domains of financial activity, and overall financial capacity. Capacity outcomes classifications (capable, marginally capable, or incapable) for domains and overall performance were made using cut scores referenced to comparison group performance. At baseline, patients with mild AD performed significantly below healthy older adults on 16 of 18 tasks, on all nine domains, and on overall financial capacity. At one-year follow up, comparison group performance was stable on all variables. In contrast, patients with mild AD showed substantial declines in overall financial capacity, on eight of nine domains, and on 12 of 18 tasks. Similarly, the proportion of the mild AD group classified as marginally capable and incapable increased substantially over one year for the two overall scores and for five financial domains. Financial capacity is already substantially impaired in patients with mild AD at baseline and undergoes rapid additional decline over one year. Relative to the comparison group, overall financial capacity performance in the AD group declined 10%, from approximately 80% of the comparison group performance at baseline to 70% at follow up. Financial skills showed differential rates of decline on both simple and complex tasks. Of clinical and public policy interest was the declining judgment of patients with mild AD regarding simple fraud schemes. The study supports the importance of prompt financial supervision and planning for patients newly diagnosed with AD.
1983-03-03
This proposal adds to regulations new conditions and procedures for initial approval and for reapproval of Medicaid Management Information Systems (MMIS) to update the regulations to reflect additional requirements added by section 901 of the Mental Health Systems Act of 1980 (Pub. L. 96-398). The proposal specifies procedures for reducing the level of Federal financial participation in a State's administrative expenditures when a State fails to meet the conditions for initial operation, initial approval or reapproval of an MMIS. It also proposes procedures with respect to waivers of the conditions of approval and reapproval and to appeals of adverse decisions. These provisions are intended to improve States' MMIS, and to ensure efficient system operations, and to detect cases of fraud, waste, and abuse effectively.
7 CFR 276.3 - Negligence or fraud.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 4 2010-01-01 2010-01-01 false Negligence or fraud. 276.3 Section 276.3 Agriculture... Negligence or fraud. (a) General. If FNS determines that there has been negligence or fraud on the part of..., pay to FNS a sum equal to the amount of coupons issued as a result of such negligence or fraud. (b...
42 CFR 456.712 - Annual report.
Code of Federal Regulations, 2013 CFR
2013-10-01
... program. (2) A description of how pharmacies performing prospective DUR without computers are expected to...) A description of the steps taken by the State Agency to monitor compliance by pharmacies with the... entities such as the Medicaid Fraud Control Unit and State Board of Pharmacy. The annual report also must...
42 CFR 456.712 - Annual report.
Code of Federal Regulations, 2014 CFR
2014-10-01
... program. (2) A description of how pharmacies performing prospective DUR without computers are expected to...) A description of the steps taken by the State Agency to monitor compliance by pharmacies with the... entities such as the Medicaid Fraud Control Unit and State Board of Pharmacy. The annual report also must...
42 CFR 456.712 - Annual report.
Code of Federal Regulations, 2010 CFR
2010-10-01
... program. (2) A description of how pharmacies performing prospective DUR without computers are expected to...) A description of the steps taken by the State Agency to monitor compliance by pharmacies with the... entities such as the Medicaid Fraud Control Unit and State Board of Pharmacy. The annual report also must...
42 CFR 456.712 - Annual report.
Code of Federal Regulations, 2011 CFR
2011-10-01
... program. (2) A description of how pharmacies performing prospective DUR without computers are expected to...) A description of the steps taken by the State Agency to monitor compliance by pharmacies with the... entities such as the Medicaid Fraud Control Unit and State Board of Pharmacy. The annual report also must...
42 CFR 456.712 - Annual report.
Code of Federal Regulations, 2012 CFR
2012-10-01
... program. (2) A description of how pharmacies performing prospective DUR without computers are expected to...) A description of the steps taken by the State Agency to monitor compliance by pharmacies with the... entities such as the Medicaid Fraud Control Unit and State Board of Pharmacy. The annual report also must...
Neural network applications in telecommunications
NASA Technical Reports Server (NTRS)
Alspector, Joshua
1994-01-01
Neural network capabilities include automatic and organized handling of complex information, quick adaptation to continuously changing environments, nonlinear modeling, and parallel implementation. This viewgraph presentation presents Bellcore work on applications, learning chip computational function, learning system block diagram, neural network equalization, broadband access control, calling-card fraud detection, software reliability prediction, and conclusions.
Rashidian, Arash; Joudaki, Hossein; Vian, Taryn
2012-01-01
Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. The interventions to combat health care fraud can be categorized as the interventions for 'prevention' and 'detection' of fraud, and 'response' to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975-2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan) were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care.
Rashidian, Arash; Joudaki, Hossein; Vian, Taryn
2012-01-01
Background Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. Methods The interventions to combat health care fraud can be categorized as the interventions for ‘prevention’ and ‘detection’ of fraud, and ‘response’ to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975–2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. Findings The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan) were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. Discussion Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care. PMID:22936981
2014-07-17
Auditing Health Care Organizations _________ 35 Special Fraud Risk Considerations When Auditing Government Contracts ______________ 36 iv │ DODIG-2014...Auditor Fraud Risk Assessment Special Considerations Special Fraud Risk Considerations When Auditing Health Care Organizations...Learning Opportunities 0 Government Relations (Public Policy and Strategic Relations) Government Relations 0 Health Care Affairs Health Care Affairs 0 Human
NASA Astrophysics Data System (ADS)
McFall, Steve
1994-03-01
With the increase in business automation and the widespread availability and low cost of computer systems, law enforcement agencies have seen a corresponding increase in criminal acts involving computers. The examination of computer evidence is a new field of forensic science with numerous opportunities for research and development. Research is needed to develop new software utilities to examine computer storage media, expert systems capable of finding criminal activity in large amounts of data, and to find methods of recovering data from chemically and physically damaged computer storage media. In addition, defeating encryption and password protection of computer files is also a topic requiring more research and development.
Home health, long-term care, and other compliance activities.
Anderson, T D; Sadoff, J W
1999-04-01
The Federal government continues to crack down on fraud and abuse in the healthcare industry with such initiatives and tools as Operation Restore Trust and intermediate tax sanctions. Home health and long-term care organizations are the latest entities under study by the Office of Inspector General, and the result of these studies likely will be more antifraud and abuse measures being taken against these entities. All healthcare organizations should pay particular attention to their tax risk exposure. Healthcare organizations that put effective compliance programs in place should be able to reduce the overall risk of challenges to their financial practices.
Rethinking Visual Analytics for Streaming Data Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crouser, R. Jordan; Franklin, Lyndsey; Cook, Kris
In the age of data science, the use of interactive information visualization techniques has become increasingly ubiquitous. From online scientific journals to the New York Times graphics desk, the utility of interactive visualization for both storytelling and analysis has become ever more apparent. As these techniques have become more readily accessible, the appeal of combining interactive visualization with computational analysis continues to grow. Arising out of a need for scalable, human-driven analysis, primary objective of visual analytics systems is to capitalize on the complementary strengths of human and machine analysis, using interactive visualization as a medium for communication between themore » two. These systems leverage developments from the fields of information visualization, computer graphics, machine learning, and human-computer interaction to support insight generation in areas where purely computational analyses fall short. Over the past decade, visual analytics systems have generated remarkable advances in many historically challenging analytical contexts. These include areas such as modeling political systems [Crouser et al. 2012], detecting financial fraud [Chang et al. 2008], and cybersecurity [Harrison et al. 2012]. In each of these contexts, domain expertise and human intuition is a necessary component of the analysis. This intuition is essential to building trust in the analytical products, as well as supporting the translation of evidence into actionable insight. In addition, each of these examples also highlights the need for scalable analysis. In each case, it is infeasible for a human analyst to manually assess the raw information unaided, and the communication overhead to divide the task between a large number of analysts makes simple parallelism intractable. Regardless of the domain, visual analytics tools strive to optimize the allocation of human analytical resources, and to streamline the sensemaking process on data that is massive, complex, incomplete, and uncertain in scenarios requiring human judgment.« less
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Differential Power Analysis as a digital forensic tool.
Souvignet, T; Frinken, J
2013-07-10
Electronic payment fraud is considered a serious international crime by Europol. An important part of this fraud comes from payment card data skimming. This type of fraud consists of an illegal acquisition of payment card details when a user is withdrawing cash at an automated teller machine (ATM) or paying at a point of sale (POS). Modern skimming devices, also known as skimmers, use secure crypto-algorithms (e.g. Advanced Encryption Standard (AES)) to protect skimmed data stored within their memory. In order to provide digital evidence in criminal cases involving skimmers, law enforcement agencies (LEAs) must retrieve the plaintext skimmed data, generally without having knowledge of the secret key. This article proposes an alternative to the current solution at the Bundeskriminalamt (BKA) to reveal the secret key. The proposed solution is non-invasive, based on Power Analysis Attack (PAA). This article first describes the structure and the behaviour of an AES skimmer, followed by the proposal of the full operational PAA process, from power measurements to attack computation. Finally, it presents results obtained in several cases, explaining the latest improvements and providing some ideas for further developments. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Code of Federal Regulations, 2011 CFR
2011-07-01
... LITIGATION Remedies in Procurement Fraud and Corruption § 516.58 Policies. (a) Procurement fraud and... administrative remedies in significant cases of fraud or corruption relating to Army procurement. (d) The key... of fraud or corruption involving procurement. (g) Coordination on the status and disposition of cases...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-19
...The NCUA intends to submit the following information collection to the Office of Management and Budget (OMB) for review and clearance under the Paperwork Reduction Act of 1995 (Pub. L. 104-13, 44 U.S.C. Chapter 35). This information collection relates to 12 CFR part 713 which requires a federal credit union (FCU) to monitor its eligibility to qualify for a higher fidelity coverage deductible and to notify the NCUA if its financial condition changes resulting in the loss of that eligibility for the higher deductible. This information collection notice is published to obtain comments from the public. This requirement enables NCUA to monitor the FCU's financial condition for safety and soundness purposes and helps to assure that FCUs are properly and adequately protected against potential losses due to insider abuse such as fraud and embezzlement.
Business culture and dishonesty in the banking industry.
Cohn, Alain; Fehr, Ernst; Maréchal, Michel André
2014-12-04
Trust in others' honesty is a key component of the long-term performance of firms, industries, and even whole countries. However, in recent years, numerous scandals involving fraud have undermined confidence in the financial industry. Contemporary commentators have attributed these scandals to the financial sector's business culture, but no scientific evidence supports this claim. Here we show that employees of a large, international bank behave, on average, honestly in a control condition. However, when their professional identity as bank employees is rendered salient, a significant proportion of them become dishonest. This effect is specific to bank employees because control experiments with employees from other industries and with students show that they do not become more dishonest when their professional identity or bank-related items are rendered salient. Our results thus suggest that the prevailing business culture in the banking industry weakens and undermines the honesty norm, implying that measures to re-establish an honest culture are very important.
Neuroeconomic measures of social decision-making across the lifespan.
Zhu, Lusha; Walsh, Daniel; Hsu, Ming
2012-01-01
Social and decision-making deficits are often the first symptoms of a striking number of neurodegenerative disorders associated with aging. These includes not only disorders that directly impact dopamine and basal ganglia, such as Parkinson's disorder, but also degeneration in which multiple neural pathways are affected over the course of normal aging. The impact of such deficits can be dramatic, as in cases of financial fraud, which disproportionately affect the elderly. Unlike memory and motor impairments, however, which are readily recognized as symptoms of more serious underlying neurological conditions, social and decision-making deficits often do not elicit comparable concern in the elderly. Furthermore, few behavioral measures exist to quantify these deficits, due in part to our limited knowledge of the core cognitive components or their neurobiological substrates. Here we probe age-related differences in decision-making using a game theory paradigm previously shown to dissociate contributions of basal ganglia and prefrontal regions to behavior. Combined with computational modeling, we provide evidence that age-related changes in elderly participants are driven primarily by an over-reliance in trial-and-error reinforcement learning that does not take into account the strategic context, which may underlie cognitive deficits that contribute to social vulnerability in elderly individuals.
Creation of security engineering programs by the Southwest Surety Institute
NASA Astrophysics Data System (ADS)
Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn
1998-12-01
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
78 FR 22270 - Special Fraud Alert: Physician-Owned Entities
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-15
...] Special Fraud Alert: Physician-Owned Entities AGENCY: Office of Inspector General (OIG), HHS. ACTION... Physician-Owned Entities. Specifically, the Special Fraud Alert addressed physician-owned entities that... publication of the Special Fraud Alert on Physician-Owned Entities, an inadvertent error appeared in the DATES...
Business knowledge in surgeons.
Satiani, Bhagwan
2004-07-01
Surgeons and residents in training receive little, if any, formal education in the economic side of clinical practice during medical school or residency. As medical professionals face shrinking reimbursement, loss of control over health care decisions, and limited resources, surgical specialties must reevaluate the need to teach their members business survival skills. Before designing business related-teaching modules, educators must know the exact gaps in knowledge that exist among surgeons. This article reports a survey of 133 surgeons in the Midwest who were asked to rate their knowledge base in 11 business topics relevant to the practice of medicine. The survey showed that the average surgeon perceives himself or herself to be poorly equipped to understand basic financial accounting principles, financial markets, economics of health care, tools for evaluating purchases, marketing, budgets, antitrust and fraud and abuse regulations, and risk and return on investments. Armed with this data, teaching faculty, health care systems, and medical specialty societies should design business education seminars to better position surgical specialists and trainees to communicate with insurers, hospital administrators, health care organizations, and their own personal financial advisors.
Spink, John; Moyer, Douglas C; Park, Hyeonho; Wu, Yongning; Fersht, Victor; Shao, Bing; Hong, Miao; Paek, Seung Yeop; Edelev, Dmitry
2015-12-15
This paper introduces the topic of Food Fraud with translations to Russian, Korean, and Chinese. The concepts provide a system-wide focus leading to prevention. The goal is not to detect Food Fraud but to adjust entire food supply chains to reduce fraud opportunities. Food Fraud is a recently defined area of Food Protection between Food Safety (such as Salmonella or pesticide residue), and Food Defense (malicious intent to harm such as terrorism). Food Fraud is intentional with no intent to harm but only for economic gain. As with improving Food Safety and Food Defense, preventing Food Fraud is good for society and the economy. Society benefits through fewer public health threats from unauthorized acts. Society also benefits from increased consumer satisfaction and harmony. Food Security is increased through the production of more, higher-value products for consumers, commerce, and exporting. Food Fraud can reduce economic output because sickened citizens cannot work and it also reduces consumer confidence leading to less commerce. Copyright © 2014 Elsevier Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-10
... terminal, telephone, computer, or magnetic tape, for the purpose of ordering, instructing, or authorizing a... Disadvantages of EFT According to the 2010 AFP Electronic Payments: Report of Survey Results, produced by the... checks; Fraud control: The above-cited AFP survey found that 90 percent of organizations that experienced...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
75 FR 29548 - Privacy Act of 1974; Notice of New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... maintained behind a firewall certified by the National Computer Security Association. RETENTION AND DISPOSAL... agencies, entities when (1) the Agency suspects or has confirmed that the security or confidentiality of..., identity theft or fraud, or harm to the security or integrity or this system or other systems or programs...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
77 FR 46258 - Debit Card Interchange Fees and Routing
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-03
... the types of fraud, methods used to commit fraud, and available fraud-prevention methods. An issuer... 920(a)(5) requires the Board to consider (1) the nature, type, and occurrence of fraud in electronic..., merchant trade associations, a card-payment processor, technology companies, a member of Congress...
75 FR 52944 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... records. Upon the effective date of this notice, system OFHEO-07, ``Mortgage Fraud System'' published at 71 FR 6085 on February 6, 2006 will be deleted. The proposed system named ``Fraud Reporting System'' (FHFA-6) will maintain information of fraud or possible fraud involving the Federal National Mortgage...
42 CFR 455.23 - Suspension of payments in cases of fraud.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 4 2011-10-01 2011-10-01 false Suspension of payments in cases of fraud. 455.23... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.23 Suspension of payments in cases of fraud. (a) Basis for...
Consumer Frauds and Deceptions: A Learning Module.
ERIC Educational Resources Information Center
Waddell, Fred E.; And Others
This manual is designed to assist helping professionals responsible for developing consumer education programs for older adults on the topic of consumer fraud and deception. In a modular presentation format, the materials address the following areas of concern: (1) types of frauds and deceptions such as money schemes, mail order fraud,…
78 FR 29055 - State Medicaid Fraud Control Units; Data Mining
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
...] State Medicaid Fraud Control Units; Data Mining AGENCY: Office of Inspector General (OIG), HHS. ACTION... Fraud Control Units (MFCU) from using Federal matching funds to identify fraud through screening and... Control Number (OCN) 0990-0162. Table 2 indicates the paperwork burden associated with the requirements of...
The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules
2013-12-16
payloads and instead began distributing Bitcoin miners and click fraud modules.3 From a technical perspective, the primary click fraud malware used in...this era operated in the indiscriminate “auto-clicking” fashion we describe in Section 5. Alongside the click fraud and Bitcoin payloads, ZeroAccess
32 CFR 516.67 - Overseas cases of fraud or corruption.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Overseas cases of fraud or corruption. 516.67... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas cases of fraud or corruption. (a) Commanders of overseas major commands will establish procedures...
Testing the impact of local alcohol licencing policies on reported crime rates in England
De Vocht, F; Heron, J; Campbell, R; Egan, M; Mooney, J D; Angus, C; Brennan, A; Hickman, M
2017-01-01
Background Excessive alcohol use contributes to public nuisance, antisocial behaviour, and domestic, interpersonal and sexual violence. We test whether licencing policies aimed at restricting its spatial and/or temporal availability, including cumulative impact zones, are associated with reductions in alcohol-related crime. Methods Reported crimes at English lower tier local authority (LTLA) level were used to calculate the rates of reported crimes including alcohol-attributable rates of sexual offences and violence against a person, and public order offences. Financial fraud was included as a control crime not directly associated with alcohol abuse. Each area was classified as to its cumulative licensing policy intensity for 2009–2015 and categorised as ‘passive’, low, medium or high. Crime rates adjusted for area deprivation, outlet density, alcohol-related hospital admissions and population size at baseline were analysed using hierarchical (log-rate) growth modelling. Results 284 of 326 LTLAs could be linked and had complete data. From 2009 to 2013 alcohol-related violent and sexual crimes and public order offences rates declined faster in areas with more ‘intense’ policies (about 1.2, 0.10 and 1.7 per 1000 people compared with 0.6, 0.01 and 1.0 per 1000 people in ‘passive’ areas, respectively). Post-2013, the recorded rates increased again. No trends were observed for financial fraud. Conclusions Local areas in England with more intense alcohol licensing policies had a stronger decline in rates of violent crimes, sexual crimes and public order offences in the period up to 2013 of the order of 4–6% greater compared with areas where these policies were not in place, but not thereafter. PMID:27514936
André, Jean-Marie; Azzedine, Fabienne
2016-01-01
In France in 2012, of the total population of 65.2 million, 8.7 % were migrants. After being the third principal host country, France is now the 6th highest host country in the OECD. Since the 1980's numerous Acts have been passed by parliament on immigration issues. In 2000 the Universal Health Cover (Couverture Maladie Universelle) was created as health coverage for all residents of France. At the same time the State Medical Assistance (Aide Médicale de l'Etat) was created as health protection for undocumented migrants. Since the creation of this scheme, it has been the object of many political debates which call it into question, on account of its cost, perceived fraud, and the legitimacy of a social protection for undocumented migrants. Recently, access to State Medical Assistance has been made difficult by introducing conditions of residence and financial contributions. After a reports' analysis on institutional, associative, research studies and European recommendations, we note that all reports converge on the necessity of health protection for undocumented migrants. The major reasons are humanitarian, respect of European and International conventions, for public health, and financial. Moreover, fraud allegations have proved to be unfounded. Finally, State Medical Assistance is underused: in 2014 data from Médecins du Monde shows that only 10.2 % of undocumented migrant patients in their health facilities have access to this scheme. We conclude that the political debate concerning the State Medical Assistance should be about its under-utilisation, its improvement, its merger with the Universal Health Cover, and not its elimination. Moreover, the current debates regarding this scheme stigmatize this population, which is already precarious, making it more difficult for migrants to access healthcare, and generally, weaken national social cohesion.
Science as a Matter of Honour: How Accused Scientists Deal with Scientific Fraud in Japan.
Pellegrini, Pablo A
2017-06-26
Practices related to research misconduct seem to have been multiplied in recent years. Many cases of scientific fraud have been exposed publicly, and journals and academic institutions have deployed different measures worldwide in this regard. However, the influence of specific social and cultural environments on scientific fraud may vary from society to society. This article analyzes how scientists in Japan deal with accusations of scientific fraud. For such a purpose, a series of scientific fraud cases that took place in Japan has been reconstructed through diverse sources. Thus, by analyzing those cases, the social basis of scientific fraud and the most relevant aspects of Japanese cultural values and traditions, as well as the concept of honour which is deeply involved in the way Japanese scientists react when they are accused of and publicly exposed in scientific fraud situations is examined.
Spink, John; Fortin, Neal D; Moyer, Douglas C; Miao, Hong; Wu, Yongning
2016-01-01
This paper addresses the role of governments, industry, academics, and non-governmental organizations in Food Fraud prevention. Before providing strategic concepts for governments and authorities, definitions of Food Fraud are reviewed and discussed. Next there is a review of Food Fraud activities by the Global Food Safety Initiative (GFSI), the Elliott Review in the United Kingdom, the European Commission resolution on Food Fraud, and the US Food Safety Modernization Act including the Preventative Controls Rule. Two key concepts for governments or a company are: (1) formally, and specifically, mention food fraud as a food issue and (2) create an enterprise-wide Food Fraud prevention plan. The research includes a case study of the implementation of the concepts by a state or provincial agency. This analysis provides a foundation to review the role of science and technology in detection, deterrence and then contributing to prevention.
NASA Astrophysics Data System (ADS)
Laleh, Naeimeh; Azgomi, Mohammad Abdollahi
Credit card and personal loan applications have increased significantly. Application fraud is present when the application forms contain plausible and synthetic identity information or real stolen identity information. The monetary cost of application fraud is often estimated to be in the billions of dollars [1].
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-14
... Inspector General Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical... Register notice sets forth the recently issued OIG Updated Special Fraud Alert addressing telemarketing by durable medical equipment (DME) suppliers. For the most part, OIG Special Fraud Alerts address national...
76 FR 81904 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... Special Fraud Alerts. DATES: To assure consideration, public comments must be delivered to the address... and Special Fraud Alerts. Please assist us by referencing the file code OIG-120-N. Inspection of...
Fraud Prevention and Employee Rationalization in New York State Public Schools
ERIC Educational Resources Information Center
Slezak, Kathleen
2013-01-01
Prompted by frequent media reports of school fraud and a lack of relevant K-12 literature, this research study was designed to investigate current fraud prevention practices in public school districts in New York State. Using a "fraud triangle" model, an analysis of existing legislation and professional practice guidelines reveals that…
A Social Marketing Campaign in Denver: Reducing the Risk of Elder Fraud
ERIC Educational Resources Information Center
McKenna, Judy; Miller, Jacque; Curtis, Lisa
2004-01-01
Acknowledging the pain and loss senior citizens experience due to fraud, the Denver District Attorney's Office launched a campaign--"Clergy Against Senior Exploitation (CASE)"--to reduce fraud perpetrated on older persons. The thrust of this project was preventing fraud by educating older adults through their religious affiliations in…
12 CFR 1806.303 - Fraud, waste and abuse.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Fraud, waste and abuse. 1806.303 Section 1806... BANK ENTERPRISE AWARD PROGRAM Terms and Conditions of Assistance § 1806.303 Fraud, waste and abuse. Any person who becomes aware of the existence or apparent existence of fraud, waste, or abuse of assistance...
Code of Federal Regulations, 2010 CFR
2010-10-01
... convicted of fraud or other defense-contract-related felonies. 252.203-7001 Section 252.203-7001 Federal... convicted of fraud or other defense-contract-related felonies. As prescribed in 203.570-3, use the following clause: Prohibition on Persons Convicted of Fraud or Other Defense-Contract-Related Felonies (DEC 2008...
78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...
77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-28
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...
Ethical Use of Information Technologies in Education: Important Issues for America's Schools.
ERIC Educational Resources Information Center
Sivin, Jay P.; Bialo, Ellen R.
In response to the rapid growth of computer crime and such illegitimate practices as piracy and fraud, the National Institute of Justice and the Office for Educational Research and Improvement have formed a partnership to promote school programs on the ethical uses of new technologies. This report, the first of the partnership, is designed to…
Retractions in the scientific literature: is the incidence of research fraud increasing?
Steen, R Grant
2011-04-01
Scientific papers are retracted for many reasons including fraud (data fabrication or falsification) or error (plagiarism, scientific mistake, ethical problems). Growing attention to fraud in the lay press suggests that the incidence of fraud is increasing. The reasons for retracting 742 English language research papers retracted from the PubMed database between 2000 and 2010 were evaluated. Reasons for retraction were initially dichotomised as fraud or error and then analysed to determine specific reasons for retraction. Error was more common than fraud (73.5% of papers were retracted for error (or an undisclosed reason) vs 26.6% retracted for fraud). Eight reasons for retraction were identified; the most common reason was scientific mistake in 234 papers (31.5%), but 134 papers (18.1%) were retracted for ambiguous reasons. Fabrication (including data plagiarism) was more common than text plagiarism. Total papers retracted per year have increased sharply over the decade (r=0.96; p<0.001), as have retractions specifically for fraud (r=0.89; p<0.001). Journals now reach farther back in time to retract, both for fraud (r=0.87; p<0.001) and for scientific mistakes (r=0.95; p<0.001). Journals often fail to alert the naïve reader; 31.8% of retracted papers were not noted as retracted in any way. Levels of misconduct appear to be higher than in the past. This may reflect either a real increase in the incidence of fraud or a greater effort on the part of journals to police the literature. However, research bias is rarely cited as a reason for retraction.
Control of fraud and abuse in Medicare and Medicaid.
Pies, H E
1977-01-01
This Comment explores issues concerning the control of fraud and abuse in health programs financed with public funds, specifically the Medicare and Medicaid programs. It summarizes the nature, scope, and possible causes of what some regard as a fraud and abuse "crisis," and points out the difficulties and obstacles facing those who attempt to develop legislative and executive action aimed at controlling fraud and abuse. Recent federal initiatives in fraud and abuse control are examined, and a brief summary of key provisions of H.R. 3 (the Medicare-Medicaid Anti-fraud and Abuse Amendments, which may prove to be a landmark piece of legislation in this area) is provided. The author emphasizes that more effective control of fraud and abuse is necessary if further expansion of government financing of health programs, including national health insurance, is to occur in the near future. At the same time, caution must be taken not to neglect the appropriate use of other mechanisms necessary for reducing the costs of medical care and improving its quality. In addition, it is likely that efforts to stem fraud and abuse will raise important medicolegal and public policy issues that will require careful interdisciplinary consideration.
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
Seeja, K. R.; Zareapoor, Masoumeh
2014-01-01
This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers. PMID:25302317
FraudMiner: a novel credit card fraud detection model based on frequent itemset mining.
Seeja, K R; Zareapoor, Masoumeh
2014-01-01
This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.
Health fraud involves selling drugs, devices, foods, or cosmetics that have not been proven effective. Keep in ... you from getting the treatment you really need. Health fraud scams can be found everywhere, promising help ...
[Communication of scientific fraud].
Zeitoun, Jean-David; Rouquette, Sébastien
2012-09-01
There is for a scientific journal several levels of communication depending of the degree of suspicion or certainty of a case of error or fraud. The task is increasingly difficult for journal editors as disclosed cases of fraud are more common and scientific communication on this topic is growing. Biomedical fraud is fairly little reported by the mainstream press and causes of this low interest are not currently well understood. The difficulty of processing this type of news for journalists appears to be one possible reason. The potentially numerous and significant consequences of fraud on health professionals are poorly documented. Though it is likely to cause a feeling of distrust and create controversy, the impact of fraud on the general public is poorly studied and appears multifactorial. Copyright © 2012 Elsevier Masson SAS. All rights reserved.
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection
NASA Astrophysics Data System (ADS)
Flegel, Ulrich; Kerschbaum, Florian; Miseldine, Philip; Monakova, Ganna; Wacker, Richard; Leymann, Frank
One company by itself cannot detect all instances of fraud or insider attacks. An example is the simple case of buyer fraud: a fraudulent buyer colludes with a supplier creating fake orders for supplies that are never delivered. They circumvent internal controls in place to prevent this kind of fraud, such as a goods receipt, e.g., by ordering services instead of goods. Based on the evidence collected at one company, it is often extremely difficult to detect such fraud, but if companies collaborate and correlate their evidence, they could detect that the ordered services have never actually been provided.
Code of Federal Regulations, 2010 CFR
2010-07-01
... executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in connection... an executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in.... 559, fraud, bribery, or criminal collusion in connection with the disposal of personal property, the...
Online Safety: Fraud, Security, Phishing, Vishing
... Theft Online Safety Privacy Report Scams and Frauds Online Safety Be aware of these scams when you' ... Security and Safety Internet Fraud Phishing and Vishing Online Security and Safety The internet makes many everyday ...
Security & Privacy Policy - Naval Oceanography Portal
Notice: This is a U.S. Government Web Site 1. This is a World Wide Web site for official information information on this Web site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Information Act (FOIA) | External Link Disclaimer This is an official U.S. Navy web site. Security &
ERIC Educational Resources Information Center
Mbaziira, Alex Vincent
2017-01-01
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
An Analysis of Internal Controls and Procurement Fraud Deterrence
2013-12-01
might keep the organization from achieving its objectives and analyze risks , including fraud risk , so as to decide how the risk should be managed ( COSO ...internal control to adequately manage the risk ( COSO , 2013). Risk management involves developing the effective internal control targeted at a...structure and management . While the risk of fraud cannot be eliminated entirely, it can be greatly reduced with an appropriate procurement fraud prevention
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chandola, Varun; Schryver, Jack C; Sukumar, Sreenivas R
We discuss the problem of fraud detection in healthcare in this chapter. Given the recent scrutiny of the ineciencies in the US healthcare system, identifying fraud has been on the forefront of the eorts towards reducing the healthcare costs. In this chapter we will focus on understanding the issue of healthcare fraud in detail, and review methods that have been proposed in the literature to combat this issue using data driven approach.
32 CFR 516.68 - Program Fraud Civil Remedies Act (PFCRA).
Code of Federal Regulations, 2010 CFR
2010-07-01
... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.68 Program Fraud Civil Remedies Act (PFCRA). (a) PFCRA was enacted on 21 October 1986 (Public Law 99-509) and...
Factsheets: Indicators of Fraud, Waste and Abuse
Factsheets: Indicators of Fraud, Waste and Abuse - You can tell if fraud, waste and abuse are occurring by looking for indicators. These are clues that may warrant further review of a specific area or activity.
48 CFR 3032.006 - Reduction or suspension of contract payments upon finding of fraud.
Code of Federal Regulations, 2010 CFR
2010-10-01
... contract payments upon finding of fraud. 3032.006 Section 3032.006 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL CONTRACTING... finding of fraud. ...
Avoiding Service Station Fraud.
ERIC Educational Resources Information Center
Burton, Grace M.; Burton, John R.
1982-01-01
High school students are warned against service station fraud. A problem-solving section is designed to help students calculate consumer costs for various fraudulent transactions. Several ways of reducing fraud or of lessening the chances of problems are noted. (MP)
2011-12-01
Study of Army Contracting Officer Corruption in Operations Iraqi and Enduring Freedom Utilizing Occupational Fraud Theory By: Amanda H...Operations Iraqi and Enduring Freedom Utilizing Occupational Fraud Theory 6. AUTHOR(S) Amanda H. Flint 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION...CCOs) during Operations Iraqi Freedom and Enduring Freedom (OIF/OEF) by applying occupational fraud theory, specifically the classic sociological
Tricks of the Trade: Motivating Sales Agents to Con Older Adults.
DeLiema, Marguerite; Yon, Yongjie; Wilber, Kathleen H
2016-04-01
Financial fraud is estimated to cost consumers approximately $50 billion annually. To examine how new hires are trained to engage in fraud, this study analyzed a sales training transcript from Alliance for Mature Americans (Alliance). In 1996, Alliance was charged with using deception and misrepresentation to sell more than $200 million worth of living trusts and annuities to 10,000 older adults in California. Transcribed recordings from a 2-day Alliance sales training seminar were analyzed using NVivo10, coded inductively, and examined to identify emergent themes. Predominant themes were as follows: (a) indoctrination using incentives and neutralization techniques and (b) training on persuasion tactics targeted at older adults. Findings suggest that sales training focuses on establishing the company's legitimacy, normalizing unethical sales practices, and refining trainees' knowledge about how to influence older consumers. Predatory and fraudulent businesses peddling ill-suited products threaten the economic security of older Americans. Improved insights into sales manipulation strategies can guide the development of protective policies including educational approaches to help older adults detect scams and resist purchasing fraudulent products. © The Author 2014. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Pickett, Justin T; Roche, Sean Patrick
2018-02-01
Data fraud and selective reporting both present serious threats to the credibility of science. However, there remains considerable disagreement among scientists about how best to sanction data fraud, and about the ethicality of selective reporting. The public is arguably the largest stakeholder in the reproducibility of science; research is primarily paid for with public funds, and flawed science threatens the public's welfare. Members of the public are able to make meaningful judgments about the morality of different behaviors using moral intuitions. Legal scholars emphasize that to maintain legitimacy, social control policies must be developed with some consideration given to the public's moral intuitions. Although there is a large literature on popular attitudes toward science, there is no existing evidence about public opinion on data fraud or selective reporting. We conducted two studies-a survey experiment with a nationwide convenience sample (N = 821), and a follow-up survey with a representative sample of US adults (N = 964)-to explore community members' judgments about the morality of data fraud and selective reporting in science. The findings show that community members make a moral distinction between data fraud and selective reporting, but overwhelmingly judge both behaviors to be immoral and deserving of punishment. Community members believe that scientists who commit data fraud or selective reporting should be fired and banned from receiving funding. For data fraud, most Americans support criminal penalties. Results from an ordered logistic regression analysis reveal few demographic and no significant partisan differences in punitiveness toward data fraud.
5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.
Code of Federal Regulations, 2010 CFR
2010-01-01
... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...
5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.
Code of Federal Regulations, 2011 CFR
2011-01-01
... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...
Corruption and internal fraud in the Turkish construction industry.
Gunduz, Murat; Önder, Oytun
2013-06-01
The purpose of this paper is to develop an understanding about the internal fraud and corruption problem in the Turkish construction industry. The reasons behind the internal fraud and corruption problem as well as the types of prevention methods were investigated; and as a result various recommendations were made. To this end, a risk awareness questionnaire was used to understand the behavioral patterns of the construction industry, and to clarify possible proactive and reactive measures against internal fraud and corruption. The type of fraud experienced by Turkish construction companies was also surveyed in the questionnaire. The questionnaire was sent to 89 firms; and depending on the collected data, certain recommendations for construction industry professionals were provided.
[Scientific fraud. A disease we find among ourselves].
Guimarães, S
1998-01-01
Scientific fraud is not a problem exclusive to countries with high scientific development. Fraud does not necessarily mean invention of results, usurpation of ideas, manifest plagiarism or any other kind of serious scientific misconduct. Although more rare in countries where scientific production is more modest, pungent cases of scientific fraud also exist. However, less notorious cases of scientific misconduct are frequent and must be avoided. Examples of these less notorious sins are presented. The seriousness of scientific fraud is not only due to the fact that it may involve public funds, which could have been put to more useful purposes but, above all, because it violates scientific ethics and frustrates the final aim of science, the discovery of truth.
Fraud and plagiarisim in school and career.
Agud, J L
2014-10-01
Between 0% and 94% of university students acknowledge having committed academic fraud. Its forms are varied: cheating on examinations, submitting someone else's work, plagiarism, false citations, false reporting on experiments, tests or findings in the medical history and physical examination, unfair behavior toward fellow students, and many others. The consequences of academic fraud include learning corruption, useless efforts by students and faculty, incorrect performance evaluations and unfair selection for jobs. Since this can be a prelude to future fraud as doctors or researches, the prevalence, risk factors, motivations, clinical appearances, detection and prevention of the disease of academic fraud are here reviewed. Copyright © 2014 Elsevier España, S.L.U. All rights reserved.
Fraud and fiduciary liability.
Hodge, Brian Ray
2003-12-01
All employee benefit plans are potential targets of fraudulent schemes. Smaller plans are targeted by unscrupulous brokers and promoters selling fraudulent policies; plans large enough to be self-insured face greater risks of fraud by providers and participants misrepresenting claims. Plan trustees, administrators and consultants should be alert to the many ways fraudulent schemes manifest themselves and to the legal remedies available; establish investigative programs to detect and discourage fraud; and promote education and plan incentives for participants to report fraud.
Report #18-P-0181, May 15, 2018. After uncovering VW's emissions fraud, the EPA's light-duty vehicle compliance program added controls to effectively detect and prevent noncompliance—a precursor to potential fraud.
2012-04-06
Estonia 6 : 98% of Estonian‟s territory was covered with Internet access: fixed line, broadband, WiMax, WiFi , and CDMA21 mobile wireless Internet...The hacked homepage displayed a prominent image of Bashar al-Assad, the President of Syria, with a text proclaiming “Syrian Electronic Army Were...update and harmonize their criminal laws against hacking , infringements on copyrights, computer facilitated fraud, child pornography, and other illicit
An Ontology for Insider Threat Indicators Development and Applications
2014-11-01
An Ontology for Insider Threat Indicators Development and Applications Daniel L. Costa , Matthew L. Collins, Samuel J. Perl, Michael J. Albrethsen...services, commit fraud against an organization, steal intellectual property, or conduct national security espionage, sabotaging systems and data, as...engineering plans from the victim organization’s computer systems to his new employer. The insider accessed a web server with an administrator account
Data science for assessing possible tax income manipulation: The case of Italy
NASA Astrophysics Data System (ADS)
Ausloos, Marcel; Cerqueti, Roy; Mir, Tariq A.
2017-11-01
This paper explores a real-world fundamental theme under a data science perspective. It specifically discusses whether fraud or manipulation can be observed in and from municipality income tax size distributions, through their aggregation from citizen fiscal reports. The study case pertains to official data obtained from the Italian Ministry of Economics and Finance over the period 2007-2011. All Italian (20) regions are considered. The considered data science approach concretizes in the adoption of the Benford first digit law as quantitative tool. Marked disparities are found, - for several regions, leading to unexpected "conclusions". The most eye browsing regions are not the expected ones according to classical imagination about Italy financial shadow matters.
77 FR 2778 - Sentencing Guidelines for United States Courts
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-19
...Pursuant to section 994(a), (o), and (p) of title 28, United States Code, the United States Sentencing Commission is considering promulgating certain amendments to the sentencing guidelines, policy statements, and commentary. This notice sets forth the proposed amendments and, for each proposed amendment, a synopsis of the issues addressed by that amendment. This notice also sets forth a number of issues for comment, some of which are set forth together with the proposed amendments; some of which are set forth independent of any proposed amendment; and one of which (regarding retroactive application of proposed amendments) is set forth in the SUPPLEMENTARY INFORMATION portion of this notice. The proposed amendments and issues for comment in this notice are as follows: (1) A proposed amendment on fraud and related offenses, including (A) An issue for comment in response to the issue of harm to the public and financial markets, as raised by each of two directives to the Commission in section 1079A of the Dodd-Frank Wall Street Reform and Consumer Protection Act, Public Law 111-203; (B) a proposed change to Sec. 2B1.4 (Insider Trading) to implement the directive in section 1079A(a)(1) of that Act, and related issues for comment on insider trading, securities fraud, and similar offenses; (C) proposed changes to Sec. 2B1.1 (Theft, Property Destruction, and Fraud) regarding mortgage fraud offenses to implement the directive in section 1079A(a)(2) of that Act, and a related issue for comment on mortgage fraud and financial institution fraud; and (D) issues for comment on the impact of the loss table in Sec. 2B1.1(b)(1) and the victims table in Sec. 2B1.1(b)(2) in cases involving relatively large loss amounts; (2) a proposed amendment on offenses involving controlled substances and chemical precursors, including (A) an issue for comment on offenses involving N-Benzylpiperazine (BZP); and (B) a proposed change to Sec. 2D1.11 (Unlawfully Distributing, Importing, Exporting or Possessing a Listed Chemical; Attempt or Conspiracy) that would create a guidelines ``safety valve'' provision for offenses involving chemical precursors that would be analogous to the provision in Sec. 2D1.1 (Unlawful Manufacturing, Importing, Exporting, or Trafficking (Including Possession with Intent to Commit These Offenses); Attempt or Conspiracy); (3) a proposed amendment on human rights offenses, including (A) a proposed guideline applicable to human rights offenses; (B) proposed changes to Sec. 2L2.1 (Trafficking in a Document Relating to Naturalization, Citizenship, or Legal Resident Status, or a United States Passport; False Statement in Respect to the Citizenship or Immigration Status of Another; Fraudulent Marriage to Assist Alien to Evade Immigration Law) and Sec. 2L2.2 (Fraudulently Acquiring Documents Relating to Naturalization, Citizenship, or Legal Resident Status for Own Use; False Personation or Fraudulent Marriage by Alien to Evade Immigration Law; Fraudulently Acquiring or Improperly Using a United States Passport) to address cases in which the offense of conviction is for immigration or naturalization fraud but the defendant had committed a serious human rights offense; and (C) related issues for comment on human rights offenses; (4) a proposed amendment to Sec. 2L1.2 (Unlawfully Entering or Remaining in the United States) to respond to a circuit conflict over application of the term ``sentence imposed'' in that guideline when the defendant's original ``sentence imposed'' was lengthened after the defendant was deported; (5) a proposed amendment presenting options for specifying the types of documents that may be considered in determining whether a particular prior conviction fits within a particular category of crimes for purposes of specific guideline provisions, and related issues for comment; (6) a proposed amendment to Sec. 4A1.2 (Definitions and Instructions for Computing Criminal History) to respond to an application issue regarding when a defendant's prior sentence for driving while intoxicated or driving under the influence (and similar offenses by whatever name they are known) is counted toward the defendant's criminal history score; (7) a proposed amendment to Sec. 4B1.2 (Definitions of Terms Used in Section 4B1.1) to respond to differences among the circuits on when, if at all, burglary of a non- dwelling qualifies as a crime of violence for purposes of the guidelines, and related issues for comment; (8) a proposed amendment to Sec. 5G1.2 (Sentencing on Multiple Counts of Conviction) to respond to an application issue regarding the applicable guideline range in a case in which the defendant is sentenced on multiple counts of conviction, at least one of which involves a mandatory minimum sentence that is greater than the minimum of the otherwise applicable guideline range; (9) a proposed amendment to Sec. 5K2.19 (Post-Sentencing Rehabilitative Efforts) to respond to Pepper v. United States, 131 S.Ct. 1229 (2011), which held, among other things, that a defendant's post-sentencing rehabilitative efforts may be considered when the defendant is resentenced after appeal; and (10) a proposed amendment in response to miscellaneous issues arising from legislation recently enacted, including (A) proposed changes to Sec. 2P1.2 (Providing or Possessing Contraband in Prison) to respond to the Cell Phone Contraband Act of 2010, Public Law 111-225, and (B) proposed changes to Appendix A (Statutory Index) to address certain criminal provisions in the Prevent All Cigarette Trafficking Act of 2009, Public Law 111-154, the Indian Arts and Crafts Amendments Act of 2010, Public Law 111-211, the Animal Crush Video Prohibition Act of 2010, Public Law 111-294, and certain other statutes, and a related issue for comment.
49 CFR 1540.103 - Fraud and intentional falsification of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Responsibilities of Passengers and Other Individuals and Persons § 1540.103 Fraud... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...
42 CFR 455.17 - Reporting requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.17 Reporting requirements. The agency must report the following fraud or abuse... complaints of fraud and abuse made to the agency that warrant preliminary investigation. (b) For each case of...
ERIC Educational Resources Information Center
Dessoff, Alan
2009-01-01
It's no surprise that school districts are as vulnerable to fraud as the private sector or any other segment of government. Crimes in districts include collusion with outside vendors who provide kickbacks to employees, misuse of district-issued credit cards, embezzlement of district funds, and theft of district property. "Fraud happens…
Fraud Education for Accounting Students.
ERIC Educational Resources Information Center
Peterson, Bonita K.
2003-01-01
Reports that limited fraud education takes place in accounting due to a crowded curriculum and misunderstanding of the extent of fraud. Suggests ways to develop content on the topic and provides a list of teaching materials (textbooks, workbooks, trade books, case materials, videos, and reference materials). (Contains 16 references.) (SK)
ERIC Educational Resources Information Center
Sauter, David M.
1998-01-01
It is surprisingly easy for today's students to change grades, falsify documents, or create bogus diplomas. Explores the extent of the problem and offers ideas on ways in which colleges can protect themselves and society from the consequences of educational fraud. Addresses staff training, distribution of information regarding fraud, and improving…
49 CFR 1522.3 - Fraud and intentional falsification of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS General § 1522.3 Fraud and intentional falsification...
76 FR 5212 - Employment and Training Administration
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... Collection for Internal Fraud and Overpayment Detection and Recovery Activities (OMB Control No. 1205-0187... of data on a revised form ETA 9000 that provides information about Internal Fraud and Overpayment...: I. Background The ETA 9000 is the only data source available on: (1) Instances of internal fraud...
When Good Money Goes Bad: True Stories of Contract Fraud at EPA
In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to contract fraud.
7 CFR 226.25 - Other provisions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... result of funds received under the Act. (e) Fraud penalty. Whoever embezzles, willfully misapplies, steals, or obtains by fraud any funds, assets, or property that are the subject of a grant or other form..., assets, or property have been embezzled, willfully misapplied, stolen, or obtained by fraud shall, if...
7 CFR 226.25 - Other provisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... result of funds received under the Act. (e) Fraud penalty. Whoever embezzles, willfully misapplies, steals, or obtains by fraud any funds, assets, or property that are the subject of a grant or other form..., assets, or property have been embezzled, willfully misapplied, stolen, or obtained by fraud shall, if...
7 CFR 225.18 - Miscellaneous administrative provisions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... receive approval from FNSRO. (g) Fraud penalty. Whoever embezzles, willfully misapplies, steals, or obtains by fraud any funds, assets, or property that are the subject of a grant or other form of... property have been embezzled, willfully misapplied, stolen or obtained by fraud shall, if such funds...
48 CFR 949.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 949.106 Section 949.106 Federal Acquisition Regulations System DEPARTMENT OF ENERGY CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 949.106 Fraud or other criminal conduct. Any evidence...
48 CFR 1449.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 1449.106 Section 1449.106 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 1449.106 Fraud or other criminal conduct...
48 CFR 649.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 649.106 Section 649.106 Federal Acquisition Regulations System DEPARTMENT OF STATE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles. 649.106 Fraud or other criminal conduct. If the...
48 CFR 1349.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 1349.106 Section 1349.106 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 1349.106 Fraud or other criminal conduct. If the...
48 CFR 49.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 49.106 Section 49.106 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 49.106 Fraud or other criminal conduct. If...
7 CFR 1580.504 - Fraud and recovery of overpayments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Fraud and recovery of overpayments. 1580.504 Section 1580.504 Agriculture Regulations of the Department of Agriculture (Continued) FOREIGN AGRICULTURAL SERVICE, DEPARTMENT OF AGRICULTURE TRADE ADJUSTMENT ASSISTANCE FOR FARMERS § 1580.504 Fraud and recovery...
32 CFR 516.62 - PFD and HQ USACIDC coordination.
Code of Federal Regulations, 2011 CFR
2011-07-01
... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.62 PFD and HQ... procurement fraud or corruption investigations being conducted by USACIDC and possible remedies. These... affected by a significant investigation of fraud or corruption that relates to DOD procurement activities...
When Good Money Goes Bad: True Stories of Grant Fraud at EPA
In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to grant fraud.
42 CFR 457.915 - Fraud detection and investigation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... and abuse cases. (2) Methods for investigating fraud and abuse cases that— (i) Do not infringe on legal rights of persons involved; and (ii) Afford due process of law. (b) State program integrity unit... implement procedures for referring suspected fraud and abuse cases to the State program integrity unit (if...
32 CFR 516.60 - Procurement fraud and irregularities programs at MACOMs.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Procurement fraud and irregularities programs at MACOMs. 516.60 Section 516.60 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption...
20 CFR 356.2 - Program Fraud Civil Remedies Act of 1986.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Program Fraud Civil Remedies Act of 1986. 356.2 Section 356.2 Employees' Benefits RAILROAD RETIREMENT BOARD ADMINISTRATIVE REMEDIES FOR FRAUDULENT CLAIMS OR STATEMENTS CIVIL MONETARY PENALTY INFLATION ADJUSTMENT § 356.2 Program Fraud Civil Remedies Act...
Code of Federal Regulations, 2012 CFR
2012-04-01
..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal program management procedures sufficient to prevent fraud and program abuse, including subgrantee and...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal program management procedures sufficient to prevent fraud and program abuse, including subgrantee and...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 1 2013-10-01 2013-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 1 2012-10-01 2012-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare Department of Health and Human Services REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
Avoiding pharmacy fraud through automation and audit.
Tripodi, M
1998-12-01
Pharmacy data offer some of the most reliable and evaluative information in managed care today. As fraud constitutes up to 10% of our total health care expenditures, the author explains how monitoring the pharmacy network for fraud and abuse is an easy way of reclaiming some of these losses.
42 CFR 455.21 - Cooperation with State Medicaid fraud control units.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 4 2010-10-01 2010-10-01 false Cooperation with State Medicaid fraud control units. 455.21 Section 455.21 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud...
17 CFR 32.9 - Fraud in connection with commodity option transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 32.9 Section 32.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.9 Fraud in connection with commodity...
17 CFR 33.10 - Fraud in connection with commodity option transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 33.10 Section 33.10 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF DOMESTIC EXCHANGE-TRADED COMMODITY OPTION TRANSACTIONS § 33.10 Fraud in...
49 CFR 1570.5 - Fraud and intentional falsification of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY GENERAL RULES § 1570.5 Fraud and intentional falsification of records. No person may make, cause to be...
Transcript Fraud and Handling Fraudulent Documents
ERIC Educational Resources Information Center
Ezell, Allen
2005-01-01
Transcript fraud is a common problem for colleges and universities, businesses, employers, governmental licensing boards, and other agencies, with some experiencing it more so than others. The only difference between a large and small institution is the volume of degree and transcript fraud it experiences. This article discusses the types and…
48 CFR 449.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 449.106 Section 449.106 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 449.106 Fraud or other criminal conduct. (a) If the...
Consumer Fraud: An Empirical Perspective. Summary.
ERIC Educational Resources Information Center
Schubert, Jane G.; And Others
The American Institutes for Research (AIR) and the National Consumer Law Center (NCLC) studied consumer fraud and assessed possible intervention. Phase I produced an AIR description of the nature, scope, and characteristics of consumer fraud and an NCLC compilation of the laws and regulations which control it. In Phase II AIR developed…
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
32 CFR 516.60 - Procurement fraud and irregularities programs at MACOMs.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Procurement fraud and irregularities programs at MACOMs. 516.60 Section 516.60 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption...
Detecting Health Fraud in the Field of Learning Disabilities.
ERIC Educational Resources Information Center
Worrall, Russell S.
1990-01-01
This article discusses health fraud in special education. Psychopathology of health fraud, standards by which pseudoscience and quackery are defined, and the complexities of learning disorders are considered. A scale to determine whether an alternative therapy is reasonable is presented. Several popular therapies are used as examples. (Author/PB)
Cacciatore, G G
1996-11-01
Arbor Drugs, Inc., advertised that its computer could detect dangerous drug interactions. A pharmacist failed to warn a patient accordingly and the patient suffered a stroke as a result of an interaction between tranylcypromine and a decongestant. The Michigan Court of Appeals held that this failure to warn was actionable under the theories of negligence and fraud as well as under the Michigan Consumer Protection Act. The court's basic message is that pharmacies may be held legally responsible for preventing harm when they represent themselves as being capable of doing so.
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
2005-06-01
as a computer fraud case investigated by the Secret Service. Each case was analyzed from a behavioral and a technical perspective to identify...insider threat and address the issue from an approach that draws on human resources, corporate security, and information security perspectives. The ... Secret Service National Threat Assessment Center and the CERT Coordination Center of Carnegie Mellon University’s Software Engineering Institute joined
Forensic Information Warfare Requirement Study
2002-06-01
technologies that are taking place now and in the near future that will adversely impact the current technologies and require additional sophistication...WetStone Technologies, Inc. moderated a panel at the Economic Crime Investigation Institute’s Ninth Annual Conference (Fraud Management in the Twenty-First...second, to ascertain the legal impact of these tools. Their report was delivered to AFRL and provides an in-depth look into these areas. 8 Computer
Defining the public health threat of food fraud.
Spink, John; Moyer, Douglas C
2011-01-01
Food fraud, including the more defined subcategory of economically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless of the cause of the food risk, adulteration of food is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration of food with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that-economically motivated-but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number of potential contaminants. The authors developed the core concepts reported here following comprehensive research of articles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud-it focuses specifically on the public health threat-and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications of the crime triangle and the chemistry of the crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research. Food fraud, including the more defined subcategory of economically motivated adulteration, is a food protection threat that has not been defined or holistically addressed. The terrorist attacks of September 11, 2001, led to the development of food defense as an autonomous area of study and a new food protection discipline. As economically motivated adulteration grows in scope, scale, and awareness, it is conceivable that food fraud will achieve the same status as an autonomous concept, between food safety and food defense. This research establishes a starting point for defining food fraud and identifying the public health risks. © 2011 Institute of Food Technologists®
32 CFR 516.67 - Overseas cases of fraud or corruption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Overseas cases of fraud or corruption. 516.67 Section 516.67 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas...
Playing the Ponies: A $5 Million Embezzlement Case
ERIC Educational Resources Information Center
Howe, Martha A.; Malgwi, Charles A.
2006-01-01
Fraud is a pervasive problem, and educating future business leaders, managers, and auditors about fraud is one way to attack the problem. This instructional fraud case chronicles the actual details surrounding a major embezzlement at a regional high school (RHS) that culminated in long federal and state prison sentences for the school's treasurer.…
13 CFR 142.8 - What happens if program fraud is suspected?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What happens if program fraud is suspected? 142.8 Section 142.8 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION PROGRAM FRAUD... demanded in the false claim or statement; (5) Any exculpatory or mitigating circumstances that may relate...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 3 2010-10-01 2010-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
Code of Federal Regulations, 2010 CFR
2010-01-01
... does not apply to tax debts. (c) Part 1015 does not apply to claims between Federal agencies. Federal... 10 Energy 4 2010-01-01 2010-01-01 false Antitrust, fraud, tax, interagency, transportation account... General § 1015.103 Antitrust, fraud, tax, interagency, transportation account audit, acquisition contract...
48 CFR 252.203-7004 - Display of fraud hotline poster(s).
Code of Federal Regulations, 2012 CFR
2012-10-01
... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (SEP 2011) (a) Definition...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-16
... General Fraud Hotline Posters AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to require contractors to display the DoD fraud hotline poster in common work....203-14, Display of Hotline Poster(s). Government Accountability Office (GAO) Report GAO-09-591...
48 CFR 252.203-7004 - Display of fraud hotline poster(s).
Code of Federal Regulations, 2011 CFR
2011-10-01
... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (Sep 2011) (a) Definition...
48 CFR 252.203-7004 - Display of fraud hotline poster(s).
Code of Federal Regulations, 2013 CFR
2013-10-01
... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (DEC 2012) (a) Definition...
48 CFR 252.203-7004 - Display of fraud hotline poster(s).
Code of Federal Regulations, 2014 CFR
2014-10-01
... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (DEC 2012) (a) Definition...
20 CFR 410.699a - Penalties for fraud.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Penalties for fraud. 410.699a Section 410.699a Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969... Review, Finality of Decisions, and Representation of Parties § 410.699a Penalties for fraud. The penalty...
25 CFR 700.541 - Fraud or false statement in a Government matter.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 2 2010-04-01 2010-04-01 false Fraud or false statement in a Government matter. 700.541... RELOCATION PROCEDURES Employee Responsibility and Conduct § 700.541 Fraud or false statement in a Government..., applications for employment, personnel security forms, requests for travel reimbursement, client certification...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 2 2010-10-01 2010-10-01 false Fraud. 235.110 Section 235.110 Public Welfare... PROGRAMS § 235.110 Fraud. State plan requirements: A State plan under title I, IV-A, X, XIV, or XVI of the Social Security Act must provide: (a) That the State agency will establish and maintain: (1) Methods and...
42 CFR 1007.3 - Scope and purpose.
Code of Federal Regulations, 2010 CFR
2010-10-01
... STATE MEDICAID FRAUD CONTROL UNITS § 1007.3 Scope and purpose. This part implements sections 1903(a)(6), 1903(b)(3), and 1903(q) of the Social Security Act, as amended by the Medicare-Medicaid Anti-Fraud and... costs of establishing and operating a State Medicaid fraud control unit, as defined by the statute, for...
7 CFR 762.103 - Full faith and credit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.103 Full faith and credit. (a) Fraud and... States. The Agency may contest the guarantee only in cases of fraud or misrepresentation by a lender or holder, in which: (1) The lender or holder had actual knowledge of the fraud or misrepresentation at the...
42 CFR 1001.951 - Fraud and kickbacks and other prohibited activities.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 5 2010-10-01 2010-10-01 false Fraud and kickbacks and other prohibited activities... Permissive Exclusions § 1001.951 Fraud and kickbacks and other prohibited activities. (a) Circumstance for..., or (B) Imposition of a civil money penalty against others; or (iii) Alternative sources of the type...
26 CFR 301.6110-1 - Public inspection of written determinations and background file documents.
Code of Federal Regulations, 2011 CFR
2011-04-01
... section, relating to technical advice memoranda involving civil fraud and criminal investigations, and... section 6110(d)(3) and (f)(4). (2) Technical advice memoranda involving civil fraud and criminal... § 301.6110-2(f) involving any matter that is the subject of a civil fraud or criminal investigation, a...
42 CFR 1001.951 - Fraud and kickbacks and other prohibited activities.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 5 2011-10-01 2011-10-01 false Fraud and kickbacks and other prohibited activities... Permissive Exclusions § 1001.951 Fraud and kickbacks and other prohibited activities. (a) Circumstance for..., or (B) Imposition of a civil money penalty against others; or (iii) Alternative sources of the type...
45 CFR 149.41 - Consequences of Non-Compliance, Fraud, or Similar Fault.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Consequences of Non-Compliance, Fraud, or Similar Fault. 149.41 Section 149.41 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS... Eligible Employment-Based Plans § 149.41 Consequences of Non-Compliance, Fraud, or Similar Fault. Upon...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 3 2011-10-01 2011-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 3 2014-10-01 2014-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 3 2012-10-01 2012-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 3 2013-10-01 2013-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-08
...-fraud provisions, as well as exempt these security-based swaps from Exchange Act registration... interest involving security-based swaps.\\31\\ We have also proposed anti-fraud and anti-manipulation rules... Against Fraud, Manipulation, and Deception in Connection with Security-Based Swaps, Release No. 34-63236...
32 CFR 516.68 - Program Fraud Civil Remedies Act (PFCRA).
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Program Fraud Civil Remedies Act (PFCRA). 516.68 Section 516.68 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.68 Program...
George, Stephen L; Buyse, Marc
2015-01-01
Highly publicized cases of fabrication or falsification of data in clinical trials have occurred in recent years and it is likely that there are additional undetected or unreported cases. We review the available evidence on the incidence of data fraud in clinical trials, describe several prominent cases, present information on motivation and contributing factors and discuss cost-effective ways of early detection of data fraud as part of routine central statistical monitoring of data quality. Adoption of these clinical trial monitoring procedures can identify potential data fraud not detected by conventional on-site monitoring and can improve overall data quality. PMID:25729561
The effects of loneliness on telemarketing fraud vulnerability among older adults.
Alves, Linda M; Wilson, Steve R
2008-01-01
Older adults are disproportionately affected by telemarketing fraud, especially those who are socially isolated. Twenty-eight older adult telemarketing fraud victims completed a questionnaire assessing loneliness and other variables related to telemarketing fraud vulnerability. Victims tended to be male, divorced/separated, and college-educated, between ages of 60 and 70. Age and marital status were significantly associated with loneliness. This study is an important first step for additional research in this area and may enhance the prevention and intervention efforts of social service providers who work with older adults who may be most vulnerable.
Blood recipient unable to recover damages based on fraud.
1995-05-05
A court ruled that [name removed] is unable to sue for fraud after acquiring HIV through a blood transfusion in 1982. [Name removed], who sued the hospital, her cardiologist, and two physicians, claimed she did not learn she had received a blood transfusion until after she was diagnosed with AIDS. She tested positive for HIV antibodies in March 1992 and was diagnosed with AIDS. The Supreme Court said a cause of action for actual fraud must be filed within six years from the date of the fraudulent act or two years from the date the plaintiff discovered the fraud.
Computer-aided auditing of prescription drug claims.
Iyengar, Vijay S; Hermiz, Keith B; Natarajan, Ramesh
2014-09-01
We describe a methodology for identifying and ranking candidate audit targets from a database of prescription drug claims. The relevant audit targets may include various entities such as prescribers, patients and pharmacies, who exhibit certain statistical behavior indicative of potential fraud and abuse over the prescription claims during a specified period of interest. Our overall approach is consistent with related work in statistical methods for detection of fraud and abuse, but has a relative emphasis on three specific aspects: first, based on the assessment of domain experts, certain focus areas are selected and data elements pertinent to the audit analysis in each focus area are identified; second, specialized statistical models are developed to characterize the normalized baseline behavior in each focus area; and third, statistical hypothesis testing is used to identify entities that diverge significantly from their expected behavior according to the relevant baseline model. The application of this overall methodology to a prescription claims database from a large health plan is considered in detail.
Code of Federal Regulations, 2010 CFR
2010-04-01
... financial reporting and monthly computation by futures commission merchants and introducing brokers. 1.18... UNDER THE COMMODITY EXCHANGE ACT Minimum Financial and Related Reporting Requirements § 1.18 Records for and relating to financial reporting and monthly computation by futures commission merchants and...
Code of Federal Regulations, 2011 CFR
2011-04-01
... financial reporting and monthly computation by futures commission merchants and introducing brokers. 1.18... UNDER THE COMMODITY EXCHANGE ACT Minimum Financial and Related Reporting Requirements § 1.18 Records for and relating to financial reporting and monthly computation by futures commission merchants and...
The Role of Cognition, Personality, and Trust in Fraud Victimization in Older Adults
Judges, Rebecca A.; Gallant, Sara N.; Yang, Lixia; Lee, Kang
2017-01-01
Older adults are more at risk to become a victim of consumer fraud than any other type of crime (Carcach et al., 2001) but the research on the psychological profiles of senior fraud victims is lacking. To bridge this significant gap, we surveyed 151 (120 female, 111 Caucasian) community-dwelling older adults in Southern Ontario between 60 and 90 years of age about their experiences with fraud. Participants had not been diagnosed with cognitive impairment or a neurological disorder by their doctor and looked after their own finances. We assessed their self-reported cognitive abilities using the MASQ, personality on the 60-item HEXACO Personality Inventory, and trust tendencies using a scale from the World Values Survey. There were no demographic differences between victims and non-victims. We found that victims exhibit lower levels of cognitive ability, lower honesty-humility, and lower conscientiousness than non-victims. Victims and non-victims did not differ in reported levels of interpersonal trust. Subsequent regression analyses showed that cognition is an important component in victimization over and above other social factors. The present findings suggest that fraud prevention programs should focus on improving adults’ overall cognitive functioning. Further investigation is needed to understand how age-related cognitive changes affect vulnerability to fraud and which cognitive processes are most important for preventing fraud victimization. PMID:28450847
13 CFR 142.2 - What kind of conduct will result in program fraud enforcement?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What kind of conduct will result in program fraud enforcement? 142.2 Section 142.2 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES ACT REGULATIONS Overview and Definitions § 142.2 What kind of conduct...
Data Analytics in Procurement Fraud Prevention
2014-05-30
Certified Fraud Examiners CAC common access card COR contracting officer’s representative CPAR Contractor Performance Assessment Reporting System DCAA...using analytics to predict patterns occurring in known credit card fraud investigations to prevent future schemes before they happen. The goal of...or iTunes . 4. Distributional Analytics Distributional analytics are used to detect anomalies within data. Through the use of distributional
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Antitrust, fraud, exception in the account of an accountable official, and interagency claims excluded. 30.3 Section 30.3 Public Welfare DEPARTMENT OF HEALTH... antitrust violations or fraud. (1) The standards in this part relating to compromise, suspension, and...
31 CFR 900.3 - Antitrust, fraud, and tax and interagency claims excluded.
Code of Federal Regulations, 2010 CFR
2010-07-01
... apply to tax debts. (c) Parts 900-904 of this chapter do not apply to claims between Federal agencies... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Antitrust, fraud, and tax and...) SCOPE OF STANDARDS § 900.3 Antitrust, fraud, and tax and interagency claims excluded. (a) The standards...
17 CFR 240.15c1-2 - Fraud and misrepresentation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Fraud and misrepresentation. 240.15c1-2 Section 240.15c1-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Securities Exchange Act of 1934 Rules Relating to Over-The-Counter Markets § 240.15c1-2 Fraud and...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with the clearing of transactions on a derivatives clearing organization. 39.7 Section 39.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.7 Fraud in connection...
43 CFR 20.510 - Fraud or false statements in a Government matter.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Fraud or false statements in a Government matter. 20.510 Section 20.510 Public Lands: Interior Office of the Secretary of the Interior EMPLOYEE RESPONSIBILITIES AND CONDUCT Other Employee Conduct Provisions § 20.510 Fraud or false statements in a Government...
43 CFR 20.510 - Fraud or false statements in a Government matter.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Fraud or false statements in a Government matter. 20.510 Section 20.510 Public Lands: Interior Office of the Secretary of the Interior EMPLOYEE RESPONSIBILITIES AND CONDUCT Other Employee Conduct Provisions § 20.510 Fraud or false statements in a Government...
Performance evaluation of wavelet-based face verification on a PDA recorded database
NASA Astrophysics Data System (ADS)
Sellahewa, Harin; Jassim, Sabah A.
2006-05-01
The rise of international terrorism and the rapid increase in fraud and identity theft has added urgency to the task of developing biometric-based person identification as a reliable alternative to conventional authentication methods. Human Identification based on face images is a tough challenge in comparison to identification based on fingerprints or Iris recognition. Yet, due to its unobtrusive nature, face recognition is the preferred method of identification for security related applications. The success of such systems will depend on the support of massive infrastructures. Current mobile communication devices (3G smart phones) and PDA's are equipped with a camera which can capture both still and streaming video clips and a touch sensitive display panel. Beside convenience, such devices provide an adequate secure infrastructure for sensitive & financial transactions, by protecting against fraud and repudiation while ensuring accountability. Biometric authentication systems for mobile devices would have obvious advantages in conflict scenarios when communication from beyond enemy lines is essential to save soldier and civilian life. In areas of conflict or disaster the luxury of fixed infrastructure is not available or destroyed. In this paper, we present a wavelet-based face verification scheme that have been specifically designed and implemented on a currently available PDA. We shall report on its performance on the benchmark audio-visual BANCA database and on a newly developed PDA recorded audio-visual database that take include indoor and outdoor recordings.
Prince, Anya E R
2016-01-01
Many genetic counselors recommend that individuals secure desired insurance policies, such as life insurance, prior to undergoing predictive genetic testing. It has been argued, however, that this practice is "tantamount to fraud" and that failure to disclose genetic test results, or conspiring to secure a policy before testing, opens an individual up to legal recourse. This debate traps affected individuals in a Catch-22. If they apply for life insurance and disclose a genetic test result, they may be denied. If they apply without disclosing the information, they may have committed fraud. The consequences of life insurance fraud are significant: If fraud is found on an application, a life insurer can rescind the policy, in some cases even after the individual has passed away. Such a rescission could leave family members or beneficiaries without the benefits of the life insurance policy payment after the individual's death and place them in in economic difficulty. Although it is clear that lying in response to a direct question about genetic testing would be tantamount to fraud, few, if any, life insurance applications currently include broad questions about genetic testing. This paper investigates whether non-disclosure of unasked for genetic information constitutes fraud and explores varying types of insurance questions that could conceivably be interpreted as seeking genetic information. Life insurance applicants generally have no duty to disclose unasked for information, including genetic information, on an application. However, given the complexities of genetic information, individuals may be exposed to fraud and rescission of their life insurance policy despite honest attempts to truthfully and completely answer all application questions.
Field experiment estimate of electoral fraud in Russian parliamentary elections
Enikolopov, Ruben; Korovkin, Vasily; Petrova, Maria; Sonin, Konstantin; Zakharov, Alexei
2013-01-01
Electoral fraud is a widespread phenomenon, especially outside the developed world. Despite abundant qualitative and anecdotal evidence on its existence from around the world, there is very limited quantitative evidence on the extent of electoral fraud. We exploit random assignment of independent observers to 156 of 3,164 polling stations in the city of Moscow to estimate the effect of electoral fraud on the outcome of the Russian parliamentary elections held on December 4, 2011. We estimate the actual share of votes for the incumbent United Russia party to be at least 11 percentage points lower than the official count (36% instead of 47%). Our results suggest that the extent of the fraud was sufficient to have had a substantial impact on the outcome of the elections; they also confirm that the presence of observers is an important factor in ensuring the integrity of the procedure. PMID:23267093
DRG benchmarking study establishes national coding norms.
Vaul, J H
1998-05-01
With the increase in fraud and abuse investigations, healthcare financial managers should examine their organization's medical record coding procedures. The Federal government and third-party payers are looking specifically for improper billing of outpatient services, unbundling of procedures to increase payment, assigning higher-paying DRG codes for inpatient claims, and other abuses. A recent benchmarking study of Medicare Provider Analysis and Review (MEDPAR) data has established national norms for hospital coding and case mix based on DRGs and has revealed the majority of atypical coding cases fall into six DRG pairs. Organizations with a greater percentage of atypical cases--those more likely to be scrutinized by Federal investigators--will want to conduct suitable review and be sure appropriate documentation exists to justify the coding.
Where are clinical trials going? Society and clinical trials.
Sleight, P
2004-02-01
Clinical trials now increasingly impinge on society at large. First there is growing emphasis from health organizations on the need for unbiased evidence about the effectiveness of promoted remedies. Second, as most novel treatments accrue increased costs to society, these need to be evaluated in terms of value for money. Third, there has been confusion and concern about the resolution of conflicting evidence, especially the role of advertising and commercial pressures from a powerful pharmaceutical industry motivated by profit. Fourth, there is concern about research fraud and the ethics of clinical trials. Fifth, there is increasing suspicion of political advice, which sometimes has sought to reassure an anxious public on the basis of complex and possibly inadequate scientific information. Some of these issues are addressed by truly independent and properly constituted data and safety monitoring committees, which are of particular importance when academic investigators or universities have a large financial conflict of interest. This is now more problematic with the current encouragement of investigator-led spin-off companies. These issues are best resolved by independent financial support (from government or other institutions) rather than relying on the commercial sponsor.
ERIC Educational Resources Information Center
Baier, Eric; Dupraz, Laure
2007-01-01
How have university institutions generally tackled the fight against scientific fraud? We intend to throw light on the very process of public disclosure of scientific fraud, as it has transformed in the last 30 years within the framework of scientific research institutions. By focusing our analysis on the "denunciation process", we intend to refer…
38 CFR 1.902 - Antitrust, fraud, and tax and interagency claims.
Code of Federal Regulations, 2010 CFR
2010-07-01
....900 through 1.953 do not apply to tax debts. (c) Sections 1.900 through 1.953 do not apply to claims... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Antitrust, fraud, and tax... Collection Effort, and Referral of Civil Claims for Money Or Property § 1.902 Antitrust, fraud, and tax and...
41 CFR 105-55.003 - Antitrust, fraud, tax, interagency claims, and claims over $100,000 excluded.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) This part does not apply to tax debts. (c) This part does not apply to claims between GSA and other... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Antitrust, fraud, tax... § 105-55.003 Antitrust, fraud, tax, interagency claims, and claims over $100,000 excluded. (a) The...
Training for Success: A Comparison of Anti-Fraud Knowledge Competencies
2014-12-01
fraud, money laundering , and tax fraud. The section on punishing offenders contains two competencies: criminal prosecutions and the civil justice...investigations (Kittay, 2011). Money laundering investigations focus on the various methods individuals use to conceal proceeds earned from criminal ...Chartered Accowltants Cet·tified Anti - Money CAMS The Association of Cettified Laundering Specialist Anti - Money Latmdering Specialists Certified
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in or in connection with... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.1 Fraud in or in connection with transactions in foreign currency subject to the...
ERIC Educational Resources Information Center
Reinert, Gregory J.
2010-01-01
Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay's reported negative feedback rate of less than 1%. The…
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Accounting and Financial Management Div.
At the request of Senator William Roth, Jr., the General Accounting Office (GAO) reviewed Medicare and Medicaid fraud investigations that agency inspectors general referred to the Department of Justice for prosecution to identify characteristics of alleged fraud against the government and to determine actions taken against those caught defrauding…
Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge Assessment
2015-04-30
ååì~ä=^Åèìáëáíáçå= oÉëÉ~êÅÜ=póãéçëáìã= qÜìêëÇ~ó=pÉëëáçåë= sçäìãÉ=ff= = Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge...DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge...capable processes, and effective internal controls result in the DoD having a higher level of vulnerability for procurement fraud (Rendon & Rendon, in
NASA Astrophysics Data System (ADS)
Petronijević, R. B.; Velebit, B.; Baltić, T.
2017-09-01
Intentional modification of food or substitution of food ingredients with the aim of gaining profit is food fraud or economically motivated adulteration (EMA). EMA appeared in the food supply chain, and following the global expansion of the food market, has become a world-scale problem for the global economy. Food frauds have involved oils, milk and meat products, infant formula, honey, juices, spices, etc. New legislation was enacted in the last decade in order to fight EMA. Effective analytical methods for food fraud detection are few and still in development. The majority of the methods in common use today for EMA detection are time consuming and inappropriate for use on the production line or out of the laboratory. The next step in the evolution of analytical techniques to combat food fraud is development of fast, accurate methods applicable using portable or handheld devices. Spectrophotometric and spectroscopic methods combined with chemometric analysis, and perhaps in combination with other rapid physico-chemical techniques, could be the answer. This review discusses some analytical techniques based on spectrophotometry and spectroscopy, which are used to reveal food fraud and EMA.
25 CFR 20.313 - How will the Bureau compute financial assistance payments?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false How will the Bureau compute financial assistance payments? 20.313 Section 20.313 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR HUMAN SERVICES... will the Bureau compute financial assistance payments? (a) The social services worker will compute...
ERIC Educational Resources Information Center
Ten Napel, Karmen
2013-01-01
Available data indicate that colleges and universities have experienced an unexpected rise in occupational fraud over the past two decades. In order to mitigate the risk of fraud, these institutions must be proactive and have strong internal controls and policies. The purpose of this study was to examine the current controls in place at Midwest…
Reducing Homeland Insecurities: Ending Abuse of the Asylum and Credible Fear Program
2015-03-01
Operations FDNS Fraud Detection and National Security FEMA Federal Emergency Management Agency FY Fiscal Year GAO Government Accounting...file applications. A 2002 Government Accounting Office (GAO) study on benefit fraud found that fraud was pervasive and routinely used in furtherance... Government Accountability Office, 2002), http://www.gao.gov/assets/240/233515.pdf. 7 Mark Motivans, Immigration Offenders in the Federal Justice
ERIC Educational Resources Information Center
Bandaranayake, Bandara
2014-01-01
This case describes the implementation of a fraud and corruption control policy initiative within the Victorian Department of Education and Early Childhood Development (the Department) in Australia. The policy initiative was administered and carried out by a small team of fraud control officials, including the author of this article, in the…
Misconduct accounts for the majority of retracted scientific publications
Fang, Ferric C.; Steen, R. Grant; Casadevall, Arturo
2012-01-01
A detailed review of all 2,047 biomedical and life-science research articles indexed by PubMed as retracted on May 3, 2012 revealed that only 21.3% of retractions were attributable to error. In contrast, 67.4% of retractions were attributable to misconduct, including fraud or suspected fraud (43.4%), duplicate publication (14.2%), and plagiarism (9.8%). Incomplete, uninformative or misleading retraction announcements have led to a previous underestimation of the role of fraud in the ongoing retraction epidemic. The percentage of scientific articles retracted because of fraud has increased ∼10-fold since 1975. Retractions exhibit distinctive temporal and geographic patterns that may reveal underlying causes. PMID:23027971
Utilizing Weak Indicators to Detect Anomalous Behaviors in Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Egid, Adin Ezra
We consider the use of a novel weak in- dicator alongside more commonly used weak indicators to help detect anomalous behavior in a large computer network. The data of the network which we are studying in this research paper concerns remote log-in information (Virtual Private Network, or VPN sessions) from the internal network of Los Alamos National Laboratory (LANL). The novel indicator we are utilizing is some- thing which, while novel in its application to data science/cyber security research, is a concept borrowed from the business world. The Her ndahl-Hirschman Index (HHI) is a computationally trivial index which provides amore » useful heuristic for regulatory agencies to ascertain the relative competitiveness of a particular industry. Using this index as a lagging indicator in the monthly format we have studied could help to detect anomalous behavior by a particular or small set of users on the network. Additionally, we study indicators related to the speed of movement of a user based on the physical location of their current and previous logins. This data can be ascertained from the IP addresses of the users, and is likely very similar to the fraud detection schemes regularly utilized by credit card networks to detect anomalous activity. In future work we would look to nd a way to combine these indicators for use as an internal fraud detection system.« less
Edwardson, S R; Pejsa, J
1993-01-01
A computer-based tutorial for teaching nursing financial management concepts was developed using the macro function of a commercially available spreadsheet program. The goals of the tutorial were to provide students with an experience with spreadsheets as a computer tool and to teach selected financial management concepts. Preliminary results show the tutorial was well received by students. Suggestions are made for overcoming the general lack of computer sophistication among students.
Computer loss experience and predictions
NASA Astrophysics Data System (ADS)
Parker, Donn B.
1996-03-01
The types of losses organizations must anticipate have become more difficult to predict because of the eclectic nature of computers and the data communications and the decrease in news media reporting of computer-related losses as they become commonplace. Total business crime is conjectured to be decreasing in frequency and increasing in loss per case as a result of increasing computer use. Computer crimes are probably increasing, however, as their share of the decreasing business crime rate grows. Ultimately all business crime will involve computers in some way, and we could see a decline of both together. The important information security measures in high-loss business crime generally concern controls over authorized people engaged in unauthorized activities. Such controls include authentication of users, analysis of detailed audit records, unannounced audits, segregation of development and production systems and duties, shielding the viewing of screens, and security awareness and motivation controls in high-value transaction areas. Computer crimes that involve highly publicized intriguing computer misuse methods, such as privacy violations, radio frequency emanations eavesdropping, and computer viruses, have been reported in waves that periodically have saturated the news media during the past 20 years. We must be able to anticipate such highly publicized crimes and reduce the impact and embarrassment they cause. On the basis of our most recent experience, I propose nine new types of computer crime to be aware of: computer larceny (theft and burglary of small computers), automated hacking (use of computer programs to intrude), electronic data interchange fraud (business transaction fraud), Trojan bomb extortion and sabotage (code security inserted into others' systems that can be triggered to cause damage), LANarchy (unknown equipment in use), desktop forgery (computerized forgery and counterfeiting of documents), information anarchy (indiscriminate use of crypto without control), Internet abuse (antisocial use of data communications), and international industrial espionage (governments stealing business secrets). A wide variety of safeguards are necessary to deal with these new crimes. The most powerful controls include (1) carefully controlled use of cryptography and digital signatures with good key management and overriding business and government decryption capability and (2) use of tokens such as smart cards to increase the strength of secret passwords for authentication of computer users. Jewelry-type security for small computers--including registration of serial numbers and security inventorying of equipment, software, and connectivity--will be necessary. Other safeguards include automatic monitoring of computer use and detection of unusual activities, segmentation and filtering of networks, special paper and ink for documents, and reduction of paper documents. Finally, international cooperation of governments to create trusted environments for business is essential.
Doctors aren't immune to theft and fraud
Marcus, Gary
1995-01-01
A chartered accountant says the problem of fraud within medical practices is far from rare, even though prevention is relatively simple. Gary Marcus provides advice to physicians about ways to spot fraud within their practices and things they can do to prevent it. No matter how small your practice or how long you have had the same employees, says Marcus, given the right circumstances anyone might steal from you. Imagesp940-a PMID:7697586
Joint Contingency Contracting: Improving Through Ethics
2009-05-04
sound ethical decisions. In order to avoid fraud, bribery , contractor kickbacks, or even any perception of activity that may not be in line with...avoid fraud, bribery , contractor kickbacks, or even any perception of activity that may not be in line with the proper use of U.S. Government funds, it...Efforts and Investments, released 11 Mar 2007. 1 INTRODUCTION Hardly a week goes by without a breaking news story dealing with fraud, bribery
Unhealthy marketing of pharmaceutical products: An international public health concern.
Mulinari, Shai
2016-05-01
I consider the current state of pharmaceutical marketing vis-à-vis ethical and legal standards and advocate measures to improve it. There is abundant evidence of unethical or illicit marketing. It fuels growing concerns about undue corporate influence over pharmaceutical research, education, and consumption. The most extensive evidence of industry transgressions comes from the United States (US), where whistle-blowers are encouraged by financial rewards to help uncover illicit marketing and fraud. Outside the US increasing evidence of transgressions exists. Recently I have observed a range of new measures to align pharmaceutical marketing practices with ethical and legal standards. In the interest of public health, I highlight the need for additional and more profound reforms to ensure that information about medicines supports quality and resource-efficient care.
32 CFR 516.4 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... other attorneys designated by the Chief will represent DA in all procurement fraud and corruption... procurement fraud and corruption. (o) Chief, Environmental Law Division, USALSA. The Chief, Environmental Law...
Special report on taxation. IRS issues stricter guidelines for audits of tax-exempt hospitals.
Solomon, J E
1992-07-01
The new audit guidelines serve as yet another reminder to tax-exempt hospitals that great care must be taken in structuring and documenting business arrangements with physicians and executives so as to withstand scrutiny by the IRS with regard to exempt status. Since increased census and utilization, and enhancement of the hospital's financial position, are no longer acceptable justifications for such activities as physician recruitment incentives (being suggestive of payment for referrals), it is important that hospitals make an effort to ensure that board minutes, recruitment policies, internal memoranda, and other documentation set forth the reasons--other than the benefits to the institution's bottom line--for having entered into such transactions. Hospitals must establish and document a community need for each physician recruited. Hospitals that actively recruit should be armed with studies evaluating recruiting needs in each clinical area, based on objective criteria, taking into consideration managed care contracting needs and the provision of services to the poor and needy. Finally, hospitals should re-examine all joint ventures and other business relationships with physicians to determine whether such arrangements resulted from arm's length negotiation, involve fair market value for goods and services, and conform, insofar as possible, with the Medicare fraud and abuse safe harbor regulations. Under GCM 39862 and the new guidelines, "aggressive" arrangements may not only create exposure under fraud and abuse laws, but could jeopardize the provider's tax-exempt status as well.
1988-09-01
defense programs lost far more to inefficient procedures than to fraud and dishonesty * (President’s Commission, l986c:15). Based on the Commission...recommendations from current studies, lessons learned from a successful program, and DOD expert opinions to develop an acquisition management strategy that...established for the alternative(s) selected in the preceding phase. 5. In the concept demonstration/validation phase the technical risk and economic
Securing insurance protection against fraud and abuse liability.
Callison, S
1999-07-01
Healthcare organizations concerned about corporate compliance need to review securing appropriate insurance coverage as part of their corporate compliance program. Provider organizations often mistakenly expect that their directors and officers liability (D&O), malpractice, or standard errors and omissions (E&O) insurance policies will cover the cost of Medicare fraud and abuse fines. The insurance industry has developed a specific billing E&O insurance product to cover providers that run afoul of government fraud and abuse statutes.
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2014 CFR
2014-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2012 CFR
2012-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2011 CFR
2011-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2013 CFR
2013-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
National Health Care Anti-Fraud Association
... a Glance Pre-Conference Programs Conference Sessions Registration Hotel & Travel Information Conference Tracks Credit Opportunities Anti-Fraud Expo Sponsors Programs Budget Adequately for 2018 Trainings NETS Webinars Launch Webinar ...
On the potential cost effectiveness of scientific audits.
Click, J L
1989-09-01
The rationale for the routine performance of scientific audits has been previously discussed, and it has been proposed that independent professionals audit scientific data just as certified public accountants in independent public accounting firms audit financial data (1-4). Scientific audits would typically require the examination of data in laboratory notebooks and other work sheets, upon which research publications are based. Examples of such audits have been publicized recently, although these represent audits which have been conducted relatively inefficiently, over periods of several years per audit, and which have only been conducted due to the persistence of whistleblowers suspecting scientific fraud (5, 6). A detailed report has also appeared on the results of an audit of the research activities of a particular individual, where the audit was limited solely to an examination of the research publications themselves for errors and discrepancies (7). It should be emphasized that the purpose of conducting scientific audits is not only to detect fabrication of experimental results but also to monitor presumably more prevalent, non-fraudulent, inappropriate practices, such as misrepresentation of data, inaccurate reporting, and departure from institutional guidelines for handling hazardous materials, working with human subjects, etc. Two concerns which have been raised concerning the performance of scientific audits relate to cost. What would they cost, and who would pay for them? These questions, however, may be turned around. What does it cost not to conduct such audits, and who pays for that? An assumption often made is that science is self-correcting, that sooner or later the truth will be revealed because of the need to replicate experiments of others for independent verification of novel findings (8). Testimony recently presented at a U.S. congressional hearing suggests that the self-correcting manner in which science advances represents a very slow and inefficient process for uncovering scientific fraud (5, 6, 9). Data from a survey of university scientists was also presented, indicating ". . . a reluctance to take prompt, corrective action not only when an investigator suspects another of misconduct but also should the investigator discover flaws in his or her own published reports-whether the flaws were the result of honest error or fraud"; (10). The uncritical acceptance by established scientists that the self-correcting process works compounds the problem. The Editor of Science has written that";. . . 99.9999 percent of reports are accurate and truthful. . ."; (8). If indeed only 0.0001% of published reports were inaccurate or untruthful, there would be little justification for scientific audits. However, congressional testimony from the National Institutes of Health (NIH) revealed that";. . . the NIH Director's office has handled an average of 15-20 allegations and reports of misconduct annually in its extramural programs, which supports the work of approximately 50,000 scientists"; (11). As I shall attempt to demonstrate, since NIH alone receives fraud-related complaints concerning the work of at least 0.03% of scientists it supports in other institutions, and since evidence indicates that the incidence of fraud is considerably greater than 0.03% (10, 12), the need to audit data is justifiable on the basis of being cost effective.
32 CFR 516.63 - Coordination with DOJ.
Code of Federal Regulations, 2011 CFR
2011-07-01
... PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.63 Coordination with DOJ... significant fraud and corruption cases to accomplish the following: (1) Monitor criminal prosecutions. (2...
... of Seized Property Submit a Complaint Report Waste, Fraud, Abuse or Misconduct Find a Form Register, Apply ... Preparer Sentenced to Prison For Tax and Bankruptcy Fraud Thursday, November 16, 2017 Assistant Attorney General Makan ...
27 CFR 19.561 - Losses in general.
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate TTB officer finds that the theft occurred without connivance, collusion, fraud or negligence on..., collusion, fraud, or negligence on the part of the proprietor, owner, consignor, consignee, bailee, or...
Medicare, Medicaid fraud a billion-dollar art form in the US
Korcok, M
1997-01-01
Medicare and Medicaid fraud costs billions of dollars each year in the US. Investigators have shown that fraud is found in all segments of the health care system. Even though the Canadian system has stricter regulations and tighter controls, can regulators here afford to be complacent about believing that such abuse would not happen here? One province has established an antifraud unit to monitor its health insurance scheme; it already has 1 prosecution under its belt. PMID:9141996
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC.
The Government Accounting Office (GAO) conducted an examination of patterns and causes of fraud in Comprehensive Employment and Training Act (CETA) programs to determine how implementation of Job Training Partnership Act (JTPA) programs might be made less vulnerable to exploitation. GAO's investigation found that fraud and abuse in CETA programs…
Food fraud and the perceived integrity of European food imports into China.
Kendall, H; Naughton, P; Kuznesof, S; Raley, M; Dean, M; Clark, B; Stolz, H; Home, R; Chan, M Y; Zhong, Q; Brereton, P; Frewer, L J
2018-01-01
Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase "authentic" European products using structural equation modelling. Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed 'risk-relieving' strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Targeted communication of authenticity assurance measures, including; regulations; enforcement; product testing; and actions taken by industry may improve Chinese consumer trust in the domestic food supply chain and reduce consumer concerns regarding the food safety risks associated with food fraud. To support product differentiation and retain prestige, European food manufactures operating within the Chinese market should recognise regional disparities in consumer risk perceptions regarding food fraud and the importance of personal risk mitigation strategies adopted by Chinese consumers to support the identification of authentic products.
Food fraud and the perceived integrity of European food imports into China
Raley, M.; Dean, M.; Clark, B.; Stolz, H.; Home, R.; Chan, M. Y.; Zhong, Q.; Brereton, P.; Frewer, L. J.
2018-01-01
Background/Aims Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. Methods A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase “authentic” European products using structural equation modelling. Results Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed ‘risk-relieving’ strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Conclusions Targeted communication of authenticity assurance measures, including; regulations; enforcement; product testing; and actions taken by industry may improve Chinese consumer trust in the domestic food supply chain and reduce consumer concerns regarding the food safety risks associated with food fraud. To support product differentiation and retain prestige, European food manufactures operating within the Chinese market should recognise regional disparities in consumer risk perceptions regarding food fraud and the importance of personal risk mitigation strategies adopted by Chinese consumers to support the identification of authentic products. PMID:29791434
2013-10-30
This final rule implements provisions of the Patient Protection and Affordable Care Act and the Health Care and Education Reconciliation Act of 2010 (collectively referred to as the Affordable Care Act). Specifically, this final rule outlines financial integrity and oversight standards with respect to Affordable Insurance Exchanges, qualified health plan (QHP) issuers in Federally-facilitated Exchanges (FFEs), and States with regard to the operation of risk adjustment and reinsurance programs. It also establishes additional standards for special enrollment periods, survey vendors that may conduct enrollee satisfaction surveys on behalf of QHP issuers, and issuer participation in an FFE, and makes certain amendments to definitions and standards related to the market reform rules. These standards, which include financial integrity provisions and protections against fraud and abuse, are consistent with Title I of the Affordable Care Act. This final rule also amends and adopts as final interim provisions set forth in the Amendments to the HHS Notice of Benefit and Payment Parameters for 2014 interim final rule, published in the Federal Register on March 11, 2013, related to risk corridors and cost-sharing reduction reconciliation.
Corporate compliance plans in health care organizations: a top-down perspective.
Forgione, D A
1998-01-01
Recently, at an all-day professional meeting that was targeted at about 100 junior-level health care financial professionals, we covered a whole spectrum of subjects. We covered topics ranging from the Hill-Burton Act to Medicare managed care organizations (MCOs) and capitation; the Stark rules on physician self-referral; the financial incentives within various payment systems for physicians, hospitals, and other providers; Medicare fraud and abuse rules; and the need for well-designed corporate compliance plans. After responding to a number of the participants' questions, I could not help but be reminded of the students every semester who ask me, "Will this be on the test?" In other words, if there are no real teeth in the subject, then they have too many other urgent priorities demanding their attention to give the issue serious consideration. Perhaps this highlights the need for taking corporate compliance planning seriously--starting at the top levels of the organization. It is well documented that leadership attitudes filter downward in any organization. If change for the better is going to take place in the area of corporate compliance, it needs to begin with each of us as individuals, from the top down.
Shareholder value and the performance of a large nursing home chain.
Kitchener, Martin; O'Meara, Janis; Brody, Ab; Lee, Hyang Yuol; Harrington, Charlene
2008-06-01
To analyze corporate governance arrangements and quality and financial performance outcomes among large multi-facility nursing home corporations (chains) that pursue stakeholder value (profit maximization) strategies. To establish a foundation of knowledge about the focal phenomenon and processes, we conducted an historical (1993-2005) case study of one of the largest chains (Sun Healthcare Inc.) that triangulated qualitative and quantitative data sources. Two main sets of information were compared: (1) corporate sources including Sun's Security Exchange Commission (SEC) Form 10-K annual reports, industry financial reports, and the business press; and (2) external sources including, legal documents, press reports, and publicly available California facility cost reports and quality data. Shareholder value was pursued at Sun through three inter-linked strategies: (1) rapid growth through debt-financed mergers; (2) labor cost constraint through low nurse staffing levels; and (3) a model of corporate governance that views sanctions for fraud and poor quality as a cost of business. Study findings and evidence from other large nursing home chains underscore calls from the Institute of Medicine and other bodies for extended oversight of the corporate governance and performance of large nursing home chains.
Shareholder Value and the Performance of a Large Nursing Home Chain
Kitchener, Martin; O'Meara, Janis; Brody, Ab; Lee, Hyang Yuol; Harrington, Charlene
2008-01-01
Objective To analyze corporate governance arrangements and quality and financial performance outcomes among large multi-facility nursing home corporations (chains) that pursue stakeholder value (profit maximization) strategies. Study Design To establish a foundation of knowledge about the focal phenomenon and processes, we conducted an historical (1993–2005) case study of one of the largest chains (Sun Helathcare Inc.) that triangulated qualitative and quantitative data sources. Data Sources Two main sets of information were compared: (1) corporate sources including Sun's Security Exchange Commission (SEC) Form 10-K annual reports, industry financial reports, and the business press; and (2) external sources including, legal documents, press reports, and publicly available California facility cost reports and quality data. Principal Findings Shareholder value was pursued at Sun through three inter-linked strategies: (1) rapid growth through debt-financed mergers; (2) labor cost constraint through low nurse staffing levels; and (3) a model of corporate governance that views sanctions for fraud and poor quality as a cost of business. Conclusions Study findings and evidence from other large nursing home chains underscore calls from the Institute of Medicine and other bodies for extended oversight of the corporate governance and performance of large nursing home chains. PMID:18454781
76 FR 42469 - Conditions of Guarantee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-19
... be liable for payments made by USDA to any holder in the event of ``material fraud, negligence or misrepresentation by the lender or the lender's participation in or condoning of such material fraud, negligence or...
76 FR 42593 - Conditions of Guarantee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-19
... be liable for payments made by USDA to any holder in the event of ``material fraud, negligence or misrepresentation by the lender or the lender's participation in or condoning of such material fraud, negligence or...
Podcast: Scientific Integrity and Lab Fraud
Nov 25, 2015. Dr. Bruce Woods, a chemist in the Electronic Crimes Division within the OIG’s Office of Investigations discusses his recent webinar for the Association of Public Health Laboratories on lab fraud.
Vuckovic-Dekic, L; Gavrilovic, D; Kezic, I; Bogdanovic, G; Brkic, S
2011-01-01
To assess the knowledge of basic principles of responsible conduct of research and attitude toward the violations of good scientific practice among graduate biomedical students. A total of 361 subjects entered the study. The study group consisted mainly of graduate students of Medicine (85%), and other biomedical sciences (15%). Most participants were on PhD training or on postdoctoral training. A specially designed anonymous voluntary multiple-choice questionnaire was distributed to them. The questionnaire consisted of 43 questions divided in 7 parts, each aimed to assess the participants' previous knowledge and attitudes toward ethical principles of science and the main types of scientific fraud, falsification, fabrication of data, plagiarism, and false authorship. Although they considered themselves as insufficiently educated on science ethics, almost all participants recognized all types of scientific fraud, qualified these issues as highly unethical, and expressed strong negative attitude toward them. Despite that, only about half of the participants thought that superiors-violators of high ethical standards of science deserve severe punishment, and even fewer declared that they would whistle blow. These percentages were much greater in cases when the students had personally been plagiarized. Our participants recognized all types of scientific fraud as violation of ethical standards of science, expressed strong negative attitude against fraud, and believed that they would never commit fraud, thus indicating their own high moral sense. However, the unwillingness to whistle blow and to punish adequately the violators might be characterized as opportunistic behavior.
NASA Astrophysics Data System (ADS)
Grijpink, Jan
2004-06-01
Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1987-01-01
The Economic Opportunity Research Institute (EORI) sponsored a national Roundtable on ''Prevention of Fraud and Abuse in Low Income Weatherization Programs'' in Washington, DC on March 23-24, 1987. Funding for the Roundtable and these Proceedings was provided jointly by the US Departments of Health and Human Services/Office of Family Assistance and Energy through Grant FG01-85CE63438. The purpose of the Roundtable was two-fold: (1) to share successful and possible replicable state and local measures to prevent fraud and abuse in low income conservation programs; and (2) to identify any areas in these programs where the potential for fraud and abuse maymore » exist and examine methods to curb such potential. A Task Force representing eight states and including both state and local low income conservation program operators was chosen by EORI and the HHS Office of Family Assistance. The Agencies represented had developed successful preventive approaches to curbing fraud and abuse. Additional participants in the Roundtable included representatives from the US Department of Energy, Weatherization Assistance Program Office and the HHS Office of Energy Assistance, along with other state and local program operators.« less
Improving Fraud and Abuse Detection in General Physician Claims: A Data Mining Study
Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad
2016-01-01
Background: We aimed to identify the indicators of healthcare fraud and abuse in general physicians’ drug prescription claims, and to identify a subset of general physicians that were more likely to have committed fraud and abuse. Methods: We applied data mining approach to a major health insurance organization dataset of private sector general physicians’ prescription claims. It involved 5 steps: clarifying the nature of the problem and objectives, data preparation, indicator identification and selection, cluster analysis to identify suspect physicians, and discriminant analysis to assess the validity of the clustering approach. Results: Thirteen indicators were developed in total. Over half of the general physicians (54%) were ‘suspects’ of conducting abusive behavior. The results also identified 2% of physicians as suspects of fraud. Discriminant analysis suggested that the indicators demonstrated adequate performance in the detection of physicians who were suspect of perpetrating fraud (98%) and abuse (85%) in a new sample of data. Conclusion: Our data mining approach will help health insurance organizations in low-and middle-income countries (LMICs) in streamlining auditing approaches towards the suspect groups rather than routine auditing of all physicians. PMID:26927587
Improving Fraud and Abuse Detection in General Physician Claims: A Data Mining Study.
Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad
2015-11-10
We aimed to identify the indicators of healthcare fraud and abuse in general physicians' drug prescription claims, and to identify a subset of general physicians that were more likely to have committed fraud and abuse. We applied data mining approach to a major health insurance organization dataset of private sector general physicians' prescription claims. It involved 5 steps: clarifying the nature of the problem and objectives, data preparation, indicator identification and selection, cluster analysis to identify suspect physicians, and discriminant analysis to assess the validity of the clustering approach. Thirteen indicators were developed in total. Over half of the general physicians (54%) were 'suspects' of conducting abusive behavior. The results also identified 2% of physicians as suspects of fraud. Discriminant analysis suggested that the indicators demonstrated adequate performance in the detection of physicians who were suspect of perpetrating fraud (98%) and abuse (85%) in a new sample of data. Our data mining approach will help health insurance organizations in low-and middle-income countries (LMICs) in streamlining auditing approaches towards the suspect groups rather than routine auditing of all physicians. © 2016 by Kerman University of Medical Sciences.
A prescription fraud detection model.
Aral, Karca Duru; Güvenir, Halil Altay; Sabuncuoğlu, Ihsan; Akar, Ahmet Ruchan
2012-04-01
Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center medical prescription database. Conventionally, prescription fraud detection is conducted on random samples by human experts. However, the samples might be misleading and manual detection is costly. We propose a novel distance based on data-mining approach for assessing the fraudulent risk of prescriptions regarding cross-features. Final tests have been conducted on adult cardiac surgery database. The results obtained from experiments reveal that the proposed model works considerably well with a true positive rate of 77.4% and a false positive rate of 6% for the fraudulent medical prescriptions. The proposed model has the potential advantages including on-line risk prediction for prescription fraud, off-line analysis of high-risk prescriptions by human experts, and self-learning ability by regular updates of the integrative data sets. We conclude that incorporating such a system in health authorities, social security agencies and insurance companies would improve efficiency of internal review to ensure compliance with the law, and radically decrease human-expert auditing costs. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Pharmacy waste, fraud, and abuse in health care reform.
Carpenter, Laura A; Edgar, Zachary; Dang, Christopher
2011-01-01
To describe the new Medicare and Medicaid waste, fraud, and abuse provisions of the Affordable Care Act (H. R. 3590) and Health Care and Education Affordability Reconciliation Act of 2010 (H. R. 4872), the preexisting law modified by H. R. 3590 and H. R. 4872, and applicable existing and proposed regulations. Waste, fraud, and abuse are substantial threats to the efficiency of the health care system. To combat these activities, the Department of Health and Human Services and Centers for Medicare & Medicaid Services promulgate and enforce guidelines governing the proper assessment and billing for Medicare and Medicaid services. These guidelines have a number of provisions that can catch even well-intentioned providers off guard, resulting in substantial fines. H. R. 3590 and H. R. 4872 augment preexisting waste, fraud, and abuse laws and regulations. This article reviews the new waste, fraud, and abuse laws and regulations to apprise pharmacists of the substantial changes affecting their practice. H. R. 3590 and H. R. 4872 modify screening requirements for providers; modify liability and penalties for the antikickback statute, federal False Claims Act, remuneration, and Stark Law; and create or extend auditing and management programs. Properly navigating these changes will be important in keeping pharmacies in compliance.
20 CFR 641.450 - Are there responsibility conditions that alone will disqualify an applicant?
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Additionally, significant fraud or criminal activity will typically include coordinated patterns or behaviors... a case-by-case basis regardless of what party identifies the alleged fraud or criminal activity. ...
Lewis, Trevor; Synowiec, Christina; Lagomarsino, Gina; Schweitzer, Julian
2012-05-01
To describe how information communication technology (ICT) is being used by programmes that seek to improve private sector health financing and delivery in low- and middle-income countries, including the main uses of the technology and the types of technologies being used. In-country partners in 16 countries directly searched systematically for innovative health programmes and compiled profiles in the Center for Health Market Innovations' database. These data were supplemented through literature reviews and with self-reported data supplied by the programmes themselves. In many low- and middle-income countries, ICT is being increasingly employed for different purposes in various health-related areas. Of ICT-enabled health programmes, 42% use it to extend geographic access to health care, 38% to improve data management and 31% to facilitate communication between patients and physicians outside the physician's office. Other purposes include improving diagnosis and treatment (17%), mitigating fraud and abuse (8%) and streamlining financial transactions (4%). The most common devices used in technology-enabled programmes are phones and computers; 71% and 39% of programmes use them, respectively, and the most common applications are voice (34%), software (32%) and text messages (31%). Donors are the primary funders of 47% of ICT-based health programmes. Various types of ICT are being employed by private organizations to address key health system challenges. For successful implementation, however, more sustainable sources of funding, greater support for the adoption of new technologies and better ways of evaluating impact are required.
Avoiding fraud risks associated with EHRs.
Helton, Jeffrey R
2010-07-01
Fraud associated with electronic health records (EHRs) generally falls into two categories: inappropriate billing by healthcare providers and inappropriate access by a system's users. A provider's EHR system requires controls to be of any significant help in detecting such fraudulent activity, or in gathering transactional evidence should such activity be identified. To protect against potential EHR-related healthcare fraud, providers should follow the recommendations established in 2007 by RTI International for the Office of the National Coordinator for Health Information Technology of the U.S. Department of Health and Human Services.
Research governance: where did it come from, what does it mean?
Shaw, Sara; Boynton, Petra M; Greenhalgh, Trisha
2005-11-01
For a variety of historical and social reasons, research has become increasingly formalized and regulated. This change has potential benefits (reduction in fraud and misconduct, protection of vulnerable groups, financial probity) but also disadvantages (increased paperwork, time delays, constraints on research freedom). The terms 'research' and 'governance' mean different things in different contexts. Even with explicit guidance, ambiguities must be resolved by human judgement. Variation in the nature and outcome of approval decisions is therefore a fact of life. The type of approval needed for a research study depends on the official remit of the approval body, the question to be addressed; the methods to be used; the context in which the work will take place; the level of analysis and interpretation; and the plans for how the findings will be presented and used.
Responding to a crisis: a stakeholder analysis of community health organizations.
Savage, Grant T; Dunkin, Jeri W; Ford, David M
2004-01-01
On May 11, 2001, the Bureau of Primary Health Care notified West Alabama Health Services, doing business as Family HealthCare of Alabama, that it was terminating $6 million in grants due to non-compliance and amid allegations of financial mismanagement and fraud. West Alabama Health Services, a not-for-profit organization, operated 19 community health centers that provided preventive and primary care services for 17 counties in Alabama. This disruption of health services engendered considerable stakeholder debate. Within this context, the authors examine how a small, newly established rural health center and a well-established, federally qualified community health center responded to this crisis. The authors use a stakeholder analysis framework to highlight how key relationships with stakeholders may change with the perceived credibility of the organizational leaders and the legitimacy of their actions.
Research governance: where did it come from, what does it mean?
Shaw, Sara; Boynton, Petra M; Greenhalgh, Trisha
2005-01-01
For a variety of historical and social reasons, research has become increasingly formalized and regulated. This change has potential benefits (reduction in fraud and misconduct, protection of vulnerable groups, financial probity) but also disadvantages (increased paperwork, time delays, constraints on research freedom). The terms ‘research’ and ‘governance’ mean different things in different contexts. Even with explicit guidance, ambiguities must be resolved by human judgement. Variation in the nature and outcome of approval decisions is therefore a fact of life. The type of approval needed for a research study depends on the official remit of the approval body, the question to be addressed; the methods to be used; the context in which the work will take place; the level of analysis and interpretation; and the plans for how the findings will be presented and used. PMID:16260798
The jurisprudential nature of fraud in biomedical publishing.
Candlish, John
2008-06-01
When instances of fraud in biomedical publishing come to light there is widespread indignation, not least because the consequences seem usually only to be internal enquiries and professional displeasure. A number of bodies have been constituted to improve publishing ethics and but these are largely advisory. Potentially though, actions in the tort of deceit and negligence, possibly misfeasance in a public office, and loss of chance could be brought against those responsible. These aspects are examined in the context of English law. In addition the new Fraud Act (2006) appears to be wide enough in scope to cover publishing fraud as a criminal offence. Any organisation such as a drug company financing clinical trials which produce spurious results could face serious losses and might well look to remedies in contract as well as in tort. A theoretical scenario centered on a drug trial is presented in order to explore these issues.
Black, Connor; Chevallier, Olivier P; Haughey, Simon A; Balog, Julia; Stead, Sara; Pringle, Steven D; Riina, Maria V; Martucci, Francesca; Acutis, Pier L; Morris, Mike; Nikolopoulos, Dimitrios S; Takats, Zoltan; Elliott, Christopher T
2017-01-01
Fish fraud detection is mainly carried out using a genomic profiling approach requiring long and complex sample preparations and assay running times. Rapid evaporative ionisation mass spectrometry (REIMS) can circumvent these issues without sacrificing a loss in the quality of results. To demonstrate that REIMS can be used as a fast profiling technique capable of achieving accurate species identification without the need for any sample preparation. Additionally, we wanted to demonstrate that other aspects of fish fraud other than speciation are detectable using REIMS. 478 samples of five different white fish species were subjected to REIMS analysis using an electrosurgical knife. Each sample was cut 8-12 times with each one lasting 3-5 s and chemometric models were generated based on the mass range m/z 600-950 of each sample. The identification of 99 validation samples provided a 98.99% correct classification in which species identification was obtained near-instantaneously (≈ 2 s) unlike any other form of food fraud analysis. Significant time comparisons between REIMS and polymerase chain reaction (PCR) were observed when analysing 6 mislabelled samples demonstrating how REIMS can be used as a complimentary technique to detect fish fraud. Additionally, we have demonstrated that the catch method of fish products is capable of detection using REIMS, a concept never previously reported. REIMS has been proven to be an innovative technique to help aid the detection of fish fraud and has the potential to be utilised by fisheries to conduct their own quality control (QC) checks for fast accurate results.
42 CFR 455.14 - Preliminary investigation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.14 Preliminary investigation. If the agency receives a complaint of Medicaid fraud...
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Compensation, and Dependency and Indemnity Compensation Forfeiture § 3.901 Fraud. (a) Definition. An act... death benefit payable. (2) Amount of compensation payable but for the forfeiture. No benefits are... affidavit, declaration, certificate, statement, voucher, or paper, concerning any claim for benefits under...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... company. \\5\\ 15 U.S.C. 77a. Significant regulatory concerns, including accounting fraud allegations, have... listed company) is not engaged in undetected accounting fraud or subject to other concealed and...
Poster: Report Fraud Waste and Abuse to the EPA OIG Hotline
The EPA OIG hotline receives complaints of fraud, waste, and abuse in EPA and U.S. Chemical Safety Board programs and operations including mismanagement or violations of law, rules, or regulations by EPA employees or program participants.
Fraud and Australian Academics.
ERIC Educational Resources Information Center
Martin, Brian
1989-01-01
A series of highly publicized cases of alleged fraud in the Australian academic community are described. Each case reveals an apparent failure of peer review. The right to pursue investigations and make comments that may offend powerful figures within the scholarly community is precarious. (MLW)
Using Data Mining to Detect Health Care Fraud and Abuse: A Review of Literature
Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad
2015-01-01
Inappropriate payments by insurance organizations or third party payers occur because of errors, abuse and fraud. The scale of this problem is large enough to make it a priority issue for health systems. Traditional methods of detecting health care fraud and abuse are time-consuming and inefficient. Combining automated methods and statistical knowledge lead to the emergence of a new interdisciplinary branch of science that is named Knowledge Discovery from Databases (KDD). Data mining is a core of the KDD process. Data mining can help third-party payers such as health insurance organizations to extract useful information from thousands of claims and identify a smaller subset of the claims or claimants for further assessment. We reviewed studies that performed data mining techniques for detecting health care fraud and abuse, using supervised and unsupervised data mining approaches. Most available studies have focused on algorithmic data mining without an emphasis on or application to fraud detection efforts in the context of health service provision or health insurance policy. More studies are needed to connect sound and evidence-based diagnosis and treatment approaches toward fraudulent or abusive behaviors. Ultimately, based on available studies, we recommend seven general steps to data mining of health care claims. PMID:25560347
Financial maturity of yellow birch
William B. Leak
1969-01-01
The methods used to compute financial maturity of yellow birch sawtimber are similar to those used for paper birch sawtimber, except for minor differences in detail. The procedure followed for yellow-birch veneer-log trees was also similar, except that local veneer grades and local veneer-log prices were used as the basis for the financial maturity computations.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-05
... would be for an IPO. \\3\\ 15 U.S.C. 77a. Significant regulatory concerns, including accounting fraud... accounting fraud or subject to other concealed and undisclosed legal or regulatory problems. For purposes of...
An Analysis of Fraud on the Internet.
ERIC Educational Resources Information Center
Baker, C. Richard
1999-01-01
Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)
Code of Federal Regulations, 2011 CFR
2011-07-01
... IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.2 Definitions. For purposes of this part: Adjudicatory proceeding means an administrative judicial-type proceeding, before the Office of the Chief... law by an Administrative Law Judge or the Chief Administrative Hearing Officer; Document fraud cases...
Code of Federal Regulations, 2010 CFR
2010-07-01
... IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.2 Definitions. For purposes of this part: Adjudicatory proceeding means an administrative judicial-type proceeding, before the Office of the Chief... law by an Administrative Law Judge or the Chief Administrative Hearing Officer; Document fraud cases...
Odometer Fraud: Traffic Safety Tips
DOT National Transportation Integrated Search
1996-01-01
This fact sheet, NHTSA Facts: Summer 1996, focuses on odometer fraud, which is a major problem for consumers. Some late model used cars have odometers that have been turned back. Any vehicle that has been driven a high number of miles but is only a f...
A holistic approach to food safety risks: Food fraud as an example.
Marvin, Hans J P; Bouzembrak, Yamine; Janssen, Esmée M; van der Fels-Klerx, H J; van Asselt, Esther D; Kleter, Gijs A
2016-11-01
Production of sufficient, safe and nutritious food is a global challenge faced by the actors operating in the food production chain. The performance of food-producing systems from farm to fork is directly and indirectly influenced by major changes in, for example, climate, demographics, and the economy. Many of these major trends will also drive the development of food safety risks and thus will have an effect on human health, local societies and economies. It is advocated that a holistic or system approach taking into account the influence of multiple "drivers" on food safety is followed to predict the increased likelihood of occurrence of safety incidents so as to be better prepared to prevent, mitigate and manage associated risks. The value of using a Bayesian Network (BN) modelling approach for this purpose is demonstrated in this paper using food fraud as an example. Possible links between food fraud cases retrieved from the RASFF (EU) and EMA (USA) databases and features of these cases provided by both the records themselves and additional data obtained from other sources are demonstrated. The BN model was developed from 1393 food fraud cases and 15 different data sources. With this model applied to these collected data on food fraud cases, the product categories that thus showed the highest probabilities of being fraudulent were "fish and seafood" (20.6%), "meat" (13.4%) and "fruits and vegetables" (10.4%). Features of the country of origin appeared to be important factors in identifying the possible hazards associated with a product. The model had a predictive accuracy of 91.5% for the fraud type and demonstrates how expert knowledge and data can be combined within a model to assist risk managers to better understand the factors and their interrelationships. Copyright © 2016 Elsevier Ltd. All rights reserved.
Equal Potential: A Collective Fraud.
ERIC Educational Resources Information Center
Gottfredson, Linda S.
2000-01-01
Critiques the College Board's report, "Reaching the Top," asserting that it illustrates collective fraud in the social sciences, which sustains an egalitarian fiction that intelligence is clustered equally across all human populations. Suggests that while the report omits certain popular falsehoods, it also omits crucial truths about…
20 CFR 627.500 - Scope and purpose.
Code of Federal Regulations, 2010 CFR
2010-04-01
... contained in this subpart shall be deemed to prejudice the separate exercise of other legal rights in...) Complaints and reports of criminal fraud, waste, and abuse. Information and complaints involving criminal fraud, waste, abuse or other criminal activity shall be reported through the Department's Incident...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Under the Program Fraud Civil Remedies Act of 1986 § 1.302 Definitions. (a) Agency means a constituent organizational unit of the USDA. (b) Agency Fraud Claims Officer—(AFCO) means an officer or employee of an agency...) Statement means any representation, certification, affirmation, document, record, or accounting or...
17 CFR 48.8 - Conditions of registration.
Code of Federal Regulations, 2013 CFR
2013-04-01
...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...
17 CFR 48.8 - Conditions of registration.
Code of Federal Regulations, 2014 CFR
2014-04-01
...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...
17 CFR 48.8 - Conditions of registration.
Code of Federal Regulations, 2012 CFR
2012-04-01
...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...
Looking at Debit and Credit Card Fraud
ERIC Educational Resources Information Center
Porkess, Roger; Mason, Stephen
2012-01-01
This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)
8 CFR 270.2 - Enforcement procedures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS PENALTIES FOR DOCUMENT FRAUD § 270.2 Enforcement procedures. (a) Procedures for the filing of complaints. Any person or entity... charges for document fraud committed by refugees at the time of entry. The Service shall not issue a...
Lock Up Those Lines: Protecting against Phone Fraud.
ERIC Educational Resources Information Center
Schleyer, Peggy E.; Hibner, Dale V.
1996-01-01
School business officials must be aware of potential liabilities associated with Centrex and Private Branch Exchange (PBX). This article describes these systems, presents guidelines for developing a telecommunications management plan, and discusses options to limit toll fraud exposure. PBX owners should implement manufacturers' recommended…
42 CFR 455.1 - Basis and scope.
Code of Federal Regulations, 2010 CFR
2010-10-01
... for a State fraud detection and investigation program, and for disclosure of information on ownership... Security Act, Subpart A provides State plan requirements for the identification, investigation, and referral of suspected fraud and abuse cases. In addition, the subpart requires that the State— (1) Report...
76 FR 80901 - Agency Information Collection Activities Under OMB Review
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-27
... monitoring legal proceedings involving the responsibilities imposed on contract markets and their officials... avoid fraud and misrepresentations. In addition, the Commission's rules impose obligations on contract markets that are designed to avoid manipulation and fraud. In order to ensure compliance with these rules...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2010 CFR
2010-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2012 CFR
2012-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2014 CFR
2014-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2011 CFR
2011-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2013 CFR
2013-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
In the mind of the market: theory of mind biases value computation during financial bubbles.
De Martino, Benedetto; O'Doherty, John P; Ray, Debajyoti; Bossaerts, Peter; Camerer, Colin
2013-09-18
The ability to infer intentions of other agents, called theory of mind (ToM), confers strong advantages for individuals in social situations. Here, we show that ToM can also be maladaptive when people interact with complex modern institutions like financial markets. We tested participants who were investing in an experimental bubble market, a situation in which the price of an asset is much higher than its underlying fundamental value. We describe a mechanism by which social signals computed in the dorsomedial prefrontal cortex affect value computations in ventromedial prefrontal cortex, thereby increasing an individual's propensity to 'ride' financial bubbles and lose money. These regions compute a financial metric that signals variations in order flow intensity, prompting inference about other traders' intentions. Our results suggest that incorporating inferences about the intentions of others when making value judgments in a complex financial market could lead to the formation of market bubbles. Copyright © 2013 The Authors. Published by Elsevier Inc. All rights reserved.
In the Mind of the Market: Theory of Mind Biases Value Computation during Financial Bubbles
De Martino, Benedetto; O’Doherty, John P.; Ray, Debajyoti; Bossaerts, Peter; Camerer, Colin
2013-01-01
Summary The ability to infer intentions of other agents, called theory of mind (ToM), confers strong advantages for individuals in social situations. Here, we show that ToM can also be maladaptive when people interact with complex modern institutions like financial markets. We tested participants who were investing in an experimental bubble market, a situation in which the price of an asset is much higher than its underlying fundamental value. We describe a mechanism by which social signals computed in the dorsomedial prefrontal cortex affect value computations in ventromedial prefrontal cortex, thereby increasing an individual’s propensity to ‘ride’ financial bubbles and lose money. These regions compute a financial metric that signals variations in order flow intensity, prompting inference about other traders’ intentions. Our results suggest that incorporating inferences about the intentions of others when making value judgments in a complex financial market could lead to the formation of market bubbles. PMID:24050407
Document fraud deterrent strategies: four case studies
NASA Astrophysics Data System (ADS)
Mercer, John W.
1998-04-01
This paper discusses the approaches taken to deter fraud committed against four documents: the machine-readable passport; the machine-readable visa; the Consular Report of Birth Abroad; and the Border Crossing Card. General approaches are discussed first, with an emphasis on the reasons for the document, the conditions of its use and the information systems required for it to function. A cost model of counterfeit deterrence is introduced. Specific approaches to each of the four documents are then discussed, in light of the issuance circumstances and criteria, the intent of the issuing authority, the applicable international standards and the level of protection and fraud resistance appropriate for the document.
41 CFR 105-53.131 - Office of Inspector General.
Code of Federal Regulations, 2010 CFR
2010-07-01
... functions and established an Office of Inspector General in 11 major domestic departments and agencies... United States Attorneys on all matters relating to the detection and prevention of fraud and abuse. The Inspector General reports semiannually to the Congress through the Administrator concerning fraud, abuses...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Policies. 516.58 Section 516.58 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.58 Policies. (a) Procurement fraud and...
7 CFR 1773.9 - Disclosure of fraud, illegal acts, and other noncompliance.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., the auditor must design the audit to provide reasonable assurance of detecting fraud that is material... UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE (CONTINUED) POLICY ON AUDITS OF RUS BORROWERS RUS Audit... statements, auditors should apply audit procedures specifically directed to ascertaining whether an illegal...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-31
... DEPARTMENT OF AGRICULTURE Food and Nutrition Service 7 CFR Parts 271 and 274 RIN 0584-AE26 Supplemental Nutrition Assistance Program: Trafficking Controls and Fraud Investigations AGENCY: Food and Nutrition Service, USDA. ACTION: Final rule, Interim final rule; notice of approval of Information...
Academic Misconduct in Teaching Portfolios
ERIC Educational Resources Information Center
Erikson, Martin G.; Erlandson, Peter; Erikson, Malgorzata
2015-01-01
Within academia, clear and standardised communication is vital. From this point of departure, we discuss the trustworthiness of teaching portfolios when used in assessment. Here, misconduct and fraud are discussed in terms of fabrication, falsification, and plagiarism, following the literature on research fraud. We argue that the portfolio's…
16 CFR 660.4 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... direct disputes relating to whether there is or has been identity theft or fraud against the consumer... direct disputes relating to the type of account, principal balance, scheduled payment amount on an... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
12 CFR 222.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... fraud against the consumer, whether there is individual or joint liability on an account, or whether the... the furnisher, such as direct disputes relating to the type of account, principal balance, scheduled... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
12 CFR 334.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... furnisher, such as direct disputes relating to whether there is or has been identity theft or fraud against... furnisher, such as direct disputes relating to the type of account, principal balance, scheduled payment... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
42 CFR 1007.5 - Basic requirement.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 5 2010-10-01 2010-10-01 false Basic requirement. 1007.5 Section 1007.5 Public... STATE MEDICAID FRAUD CONTROL UNITS § 1007.5 Basic requirement. A State Medicaid fraud control unit must... requirements of §§ 1007.7 through 1007.13 of this part. ...
48 CFR 849.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 849.106 Fraud or other criminal conduct. (a... following: (i) The DSPE. (ii) The Director, Office of Construction and Facilities Management, in the case of contracting officers from the Office of Construction and Facilities Management. (3) Follow procedures as...
7 CFR 4279.72 - Conditions of guarantee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... unenforceable by the lender to the extent any loss is occasioned by the violation of usury laws, negligent... participates or condones. In the event of material fraud, negligence or misrepresentation by the lender or the lender's participation in or condoning of such material fraud, negligence or misrepresentation, the...
Internet Fraud: Information for Teachers and Students
ERIC Educational Resources Information Center
Nkotagu, Gabriel Hudson
2011-01-01
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
The evaluation of trustworthiness to identify health insurance fraud in dentistry.
Wang, Shu-Li; Pai, Hao-Ting; Wu, Mei-Fang; Wu, Fan; Li, Chen-Lin
2017-01-01
According to the investigations of the U.S. Government Accountability Office (GAO), health insurance fraud has caused an enormous pecuniary loss in the U.S. In Taiwan, in dentistry the problem is getting worse if dentists (authorized entities) file fraudulent claims. Several methods have been developed to solve health insurance fraud; however, these methods are like a rule-based mechanism. Without exploring the behavior patterns, these methods are time-consuming and ineffective; in addition, they are inadequate for managing the fraudulent dentists. Based on social network theory, we develop an evaluation approach to solve the problem of cross-dentist fraud. The trustworthiness score of a dentist is calculated based upon the amount and type of dental operations performed on the same patient and the same tooth by that dentist and other dentists. The simulation provides the following evidence. (1) This specific type of fraud can be identified effectively using our evaluation approach. (2) A retrospective study for the claims is also performed. (3) The proposed method is effective in identifying the fraudulent dentists. We provide a new direction for investigating the genuineness of claims data. If the insurer can detect fraudulent dentists using the traditional method and the proposed method simultaneously, the detection will be more transparent and ultimately reduce the losses caused by fraudulent claims. Copyright © 2016 Elsevier B.V. All rights reserved.
A State of the Art Survey of Fraud Detection Technology
NASA Astrophysics Data System (ADS)
Flegel, Ulrich; Vayssière, Julien; Bitz, Gunter
With the introduction of IT to conductbusiness we accepted the loss of a human control step.For this reason, the introductionof newIT systemswas accompanied by the development of the authorization concept. But since, in reality, there is no such thing as 100 per cent security; auditors are commissioned to examine all transactions for misconduct. Since the data exists in digital form already, it makes sense to use computer-based processes to analyse it. Such processes allow the auditor to carry out extensive checks within an acceptable timeframe and with reasonable effort. Once the algorithm has been defined, it only takes sufficient computing power to evaluate larger quantities of data. This contribution presents the state of the art for IT-based data analysis processes that can be used to identify fraudulent activities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 2 2013-01-01 2013-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Welfare Department of Health and Human Services GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L... for imposing civil penalties and assessments against persons who make, submit, or present, or cause to...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L... for imposing civil penalties and assessments against persons who make, submit, or present, or cause to...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L... for imposing civil penalties and assessments against persons who make, submit, or present, or cause to...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L... for imposing civil penalties and assessments against persons who make, submit, or present, or cause to...
28 CFR 104.71 - Procedures to prevent and detect fraud.
Code of Federal Regulations, 2010 CFR
2010-07-01
.... 104.71 Section 104.71 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) SEPTEMBER 11TH VICTIM... prevent and detect fraud. (a) Review of claims. For the purpose of detecting and preventing the payment of...; and (3) Ensure the quality control of claims review procedures. (b) Quality control. The Special...
The Maintenance of High Ethical Standards in the Conduct of Research.
ERIC Educational Resources Information Center
Journal of Medical Education, 1982
1982-01-01
A statement adopted by the Executive Council of the Association of American Medical Colleges addresses the issues of accountability, investigation, and discipline in cases of research fraud and misconduct. Guidelines are given for institutions to develop policy and procedures for detecting and responding to alleged fraud. (MSE)
To Cheat or Not to Cheat: Rationalizing Academic Impropriety
ERIC Educational Resources Information Center
MacGregor, Jason; Stuebs, Martin
2012-01-01
Academic cheating and fraud are becoming more prevalent. The Internet removes barriers and opens access to information and increases the opportunities for academic fraud. The incentives to succeed academically also are increasing as higher education continues to grow in importance. A student's rationalization is the last, critical piece needed to…
42 CFR 455.23 - Withholding of payments in cases of fraud or willful misrepresentation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... willful misrepresentation. 455.23 Section 455.23 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.23 Withholding of payments in cases of...
29 CFR 2580.412-9 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false Meaning of fraud or dishonesty. 2580.412-9 Section 2580.412-9 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...
7 CFR 3565.502 - Incontestability.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Securities § 3565.502 Incontestability. In the case of loans that back Ginnie Mae securities or loans that... incontestable except that the guarantee may not be enforced by a lender who commits fraud or misrepresentation or by a lender who had knowledge of the fraud or misrepresentation at the time such a lender acquired...
20 CFR 416.1488 - Conditions for reopening.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 416.1488 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... case; or (c) At any time if it was obtained by fraud or similar fault. In determining whether a determination or decision was obtained by fraud or similar fault, we will take into account any physical, mental...
Educators' Degrees Earned on Internet Raise Fraud Issues
ERIC Educational Resources Information Center
Trotter, Andrew
2004-01-01
This article discusses how the degrees earned by a dozen educators on the Internet have raised fraud issues. Small firms known as "credential evaluators" help states and school districts detect educators who present phony or flimsy academic credentials from overseas institutions--a safeguard that is becoming more important with the…
12 CFR 41.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... relating to whether there is or has been identity theft or fraud against the consumer, whether there is... relating to the type of account, principal balance, scheduled payment amount on an account, or the amount... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
29 CFR 100.603 - Debts that are covered.
Code of Federal Regulations, 2010 CFR
2010-07-01
... proceedings. (Regulations concerning the collection of these types of debts are found in 29 CFR Part 102, Subparts U and V.); (2) A debt involving criminal actions of fraud, the presentation of a false claim, or... fraud, false claims, misrepresentation, or which violate antitrust laws will be promptly referred to the...
12 CFR 717.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., such as direct disputes relating to whether there is or has been identity theft or fraud against the... as direct disputes relating to the type of account, principal balance, scheduled payment amount on an... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
29 CFR 100.603 - Debts that are covered.
Code of Federal Regulations, 2011 CFR
2011-07-01
... proceedings. (Regulations concerning the collection of these types of debts are found in 29 CFR Part 102, Subparts U and V.); (2) A debt involving criminal actions of fraud, the presentation of a false claim, or... fraud, false claims, misrepresentation, or which violate antitrust laws will be promptly referred to the...
12 CFR 571.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... relating to whether there is or has been identity theft or fraud against the consumer, whether there is... relating to the type of account, principal balance, scheduled payment amount on an account, or the amount... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
Avoiding Consumer Frauds and Misrepresentations. A Learning Module.
ERIC Educational Resources Information Center
Garman, E. Thomas; Monroe, Sarah D.
Focusing on avoiding consumer frauds and misrepresentations, this document is one in a series of three consumer education modules developed to educate individual adult consumers in important areas of consumer affairs. An introductory section provides an overview of the module contents, suggested approaches for using the module, and suggestions for…
12 CFR 235.4 - Fraud-prevention adjustment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 4 2012-01-01 2012-01-01 false Fraud-prevention adjustment. 235.4 Section 235.4 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE... in paragraph (b) of this section must certify such compliance to its payment card networks on an...
7 CFR 1980.469 - Loan servicing.
Code of Federal Regulations, 2014 CFR
2014-01-01
... necessary investigations to help establish the fraud. 5. In order to decide whether to file suit, the... the lender or holder? How much did the scheme cost the Government? What is the difference in money... fraud precludes the Government from just suing to recover the money wrongfully or mistakenly paid by its...
7 CFR 1980.469 - Loan servicing.
Code of Federal Regulations, 2012 CFR
2012-01-01
... necessary investigations to help establish the fraud. 5. In order to decide whether to file suit, the... the lender or holder? How much did the scheme cost the Government? What is the difference in money... fraud precludes the Government from just suing to recover the money wrongfully or mistakenly paid by its...
7 CFR 1980.469 - Loan servicing.
Code of Federal Regulations, 2013 CFR
2013-01-01
... necessary investigations to help establish the fraud. 5. In order to decide whether to file suit, the... the lender or holder? How much did the scheme cost the Government? What is the difference in money... fraud precludes the Government from just suing to recover the money wrongfully or mistakenly paid by its...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 277.3 Section 277.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT § 277.3 Policy. It is DoD policy to redress fraud in DoD...
78 FR 73923 - Privacy Act of 1974, as Amended; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... data sources, as well as access to analytical services designed to detect fraud and systemic improper... systemic fraud, waste, and abuse within Federal programs; (d) Disclosure to (1) a Federal agency, its... prosecuting violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license...
ERIC Educational Resources Information Center
Wheeler, David L.
1987-01-01
University administrators are expected by federal agencies to detect, investigate, and judge scientific fraud and misconduct on their campuses. Both National Science Foundation and National Institutes of Health place primary responsibility on universities for spotting cases of scientific misconduct. (MLW)
22 CFR 34.18 - Waivers of indebtedness.
Code of Federal Regulations, 2010 CFR
2010-04-01
... there exists in connection with the claim an indication of fraud, misrepresentation, fault, or lack of... known through the exercise of due diligence that an error existed but failed to take corrective action... payment. (iv) If the deciding official finds no indication of fraud, misrepresentation, fault, or lack of...
75 FR 20925 - Petition for Approval of Alternate Odometer Disclosure Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-22
... the online instructions for accessing the dockets. FOR FURTHER INFORMATION CONTACT: Andrew DiMarsico... provisions to limit odometer fraud and assure that the purchaser of a motor vehicle knows the true mileage of... statements did not necessarily deter odometer fraud employing altered documents, discarded titles, and title...
76 FR 14637 - State Medicaid Fraud Control Units; Data Mining
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
...] State Medicaid Fraud Control Units; Data Mining AGENCY: Office of Inspector General (OIG), HHS. ACTION... and analyzing State Medicaid claims data, known as data mining. To support and modernize MFCU efforts... (FFP) in the costs of defined data mining activities under specified conditions. In addition, we...
Romano, Michael
2003-03-24
HealthSouth and its chief executive Richard Scrushy, left, find themselves coping with a public relations nightmare after federal officials last week charged the rehabilitation giant with "massive accounting fraud" and a systematic betrayal of tens of thousands of investors.
ERIC Educational Resources Information Center
Conlon, Michael P.; Mullins, Paul
2011-01-01
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Perceptions of per diems in the health sector: evidence and implications
Vian, Taryn; Miller, Candace; Themba, Zione; Bukuluki, Paul
2013-01-01
Per diems are used to pay work-related expenses and motivate employees, yet they also can distort incentives and may be abused. This study was designed to explore perceptions of per diems among 41 high-, mid- and low-level government officers and non-governmental organization (NGO) officials in Malawi and Uganda. Interviews explored attitudes about per diems, benefits and problems for organizations and individuals, and risks and patterns of abuse. The study found that per diems provide benefits such as encouraging training, increasing staff motivation and supplementing salary. Despite these advantages, respondents voiced many discontents about per diems, stating that they create conflict, contribute to a negative organizational culture where people expect to be paid for all activities, and lead to negative changes in work time allocation. Work practices are also manipulated in order to maximize financial gain by slowing work, scheduling unnecessary trainings, or exaggerating time needed for tasks. Officials may appropriate per diems meant for others or engage in various forms of fraud for personal financial gain. Abuse seemed more common in the government sector due to low pay and weaker controls. A striking finding was the distrust that lower-level workers felt toward their superiors: allowances were perceived to provide unfair financial advantages to already better-off and well-connected staff. To curb abuse of per diems, initiatives must reduce pressures and incentives to abuse, while controlling discretion and increasing transparency in policy implementation. Donors can play a role in reform by supporting development of policy analysis tools, design of control mechanisms and evaluation of reform strategies. PMID:22684639
Perceptions of per diems in the health sector: evidence and implications.
Vian, Taryn; Miller, Candace; Themba, Zione; Bukuluki, Paul
2013-05-01
Per diems are used to pay work-related expenses and motivate employees, yet they also can distort incentives and may be abused. This study was designed to explore perceptions of per diems among 41 high-, mid- and low-level government officers and non-governmental organization (NGO) officials in Malawi and Uganda. Interviews explored attitudes about per diems, benefits and problems for organizations and individuals, and risks and patterns of abuse. The study found that per diems provide benefits such as encouraging training, increasing staff motivation and supplementing salary. Despite these advantages, respondents voiced many discontents about per diems, stating that they create conflict, contribute to a negative organizational culture where people expect to be paid for all activities, and lead to negative changes in work time allocation. Work practices are also manipulated in order to maximize financial gain by slowing work, scheduling unnecessary trainings, or exaggerating time needed for tasks. Officials may appropriate per diems meant for others or engage in various forms of fraud for personal financial gain. Abuse seemed more common in the government sector due to low pay and weaker controls. A striking finding was the distrust that lower-level workers felt toward their superiors: allowances were perceived to provide unfair financial advantages to already better-off and well-connected staff. To curb abuse of per diems, initiatives must reduce pressures and incentives to abuse, while controlling discretion and increasing transparency in policy implementation. Donors can play a role in reform by supporting development of policy analysis tools, design of control mechanisms and evaluation of reform strategies.
[Beautification of data: Minimal fraud, incompetence or mixture of both].
Seror, Raphaèle; Ravaud, Philippe
2012-09-01
The beautification of data is the process of reporting results of a research in a way that does not correspond to reality, in order to present them in a more favorable or attractive way. The border between errors due to methodological ignorance, embellishment of reality and fraud is sometimes difficult to determine. It is the intentional nature and the repetition of these "arrangements" that are the real switch to deliberate fraud. The emergence of regulatory procedures, such as clinical trial registries, "reporting guidelines", improvement of "peer review" and data sharing, are some of the measures used to fight against and improve transparency of clinical research. Copyright © 2012. Published by Elsevier Masson SAS.
Fraud at the Global Fund? A viewpoint.
Brown, Jonathan C; Griekspoor, Wilfred
2013-01-01
The Global Fund to Fight AIDS, Tuberculosis and Malaria has contributed to remarkable health improvements in the three diseases since its creation in 2002. However, media reports about "astonishing losses" and fraud in Fund programs in 2011 caused several donors to suspend funding. The Fund's annual round of new financing was canceled, and a substantial reform program is being implemented. Two former senior managers of the Fund contend that fraud was never a major problem; rather than imposing harsh new controls on recipient countries that might impede health outcomes, the Fund should maintain the core elements of its innovative model and make selective rather than sweeping changes in its operations. Copyright © 2012 John Wiley & Sons, Ltd.
Turnover Among Air Force Nurses.
1987-03-01
Statistics. - The U. S. Air Force Institute of Technology, Civilian Institutions , Allied Health Branch, for their assistance and partial financial support...The University of Utah, Computer Center, for their financial support and use of computer equipment used in the statistical analysis. xiv The following...retain the nurses currently employed (Decker, et al., 19S2; Weisman, 1982). White (1980) concludes that nursina staff is a considerable [ financial
Reduce Fraud Risk in Your District with Stronger Internal Controls
ERIC Educational Resources Information Center
Okrzesik, Daryl J.; Nuehring, Bert G.
2011-01-01
Internal accounts offer schools a faster, more convenient way to handle the income and expenses that result from student fees, school clubs and organizations, field trips, fund-raising, and similar activities. But this convenience also incurs the added risk of fraud. Fortunately, there are proven ways to strengthen internal controls and reduce…
42 CFR 455.21 - Cooperation with State Medicaid fraud control units.
Code of Federal Regulations, 2014 CFR
2014-10-01
... subchapter. In using this information, the unit must protect the privacy rights of beneficiaries; and (3) On... 42 Public Health 4 2014-10-01 2014-10-01 false Cooperation with State Medicaid fraud control units. 455.21 Section 455.21 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND...
78 FR 46585 - Agency Information Collection Activities; Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... will add to this knowledge. \\1\\ The Commission has conducted three surveys designed to estimate the prevalence of consumer fraud among U.S. adults. The most recent survey was conducted between November 2011... the problem of fraud, the surveys included questions designed to help address questions of whether...
Code of Federal Regulations, 2010 CFR
2010-04-01
... management information system in accordance with the requirements of § 632.32. (c) Any person having..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal...
5 CFR 831.1808 - Special processing for fraud claims.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Special processing for fraud claims. 831.1808 Section 831.1808 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) RETIREMENT Agency Requests to OPM for Recovery of a Debt from the Civil Service Retirement and Disability Fund § 831.1808...
5 CFR 845.408 - Special processing for fraud claims.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Special processing for fraud claims. 845.408 Section 845.408 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES RETIREMENT SYSTEM-DEBT COLLECTION Agency Requests to OPM for Recovery of a Debt From the Civil Service...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Basis and purpose. 79.1 Section 79.1 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L...
42 CFR 401.601 - Basis and scope.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the General Accounting Office for the compromise of claims, or the suspension or termination of...) Affect any rights that CMS may have under common law as a creditor. (f) Fraud. The regulations in this subpart do not apply to claims in which there is an indication of fraud, the presentation of a false claim...
Code of Federal Regulations, 2010 CFR
2010-10-01
... accountable official, and interagency claims excluded. 30.3 Section 30.3 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CLAIMS COLLECTION General Provisions § 30.3 Antitrust, fraud, exception in the account of an accountable official, and interagency claims excluded. (a) Claims involving...
Store Security. Credit Card Fraud.
ERIC Educational Resources Information Center
Brockway, Jerry
The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…
31 CFR 306.105 - Requests for suspension of transactions in registered securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... assignment was affected by fraud, the transaction for which the security was received will be suspended. The... notifies the Bureau that the assignment was affected by fraud or that the security had been lost or stolen... transactions in registered securities. 306.105 Section 306.105 Money and Finance: Treasury Regulations Relating...
75 FR 66101 - Agency Information Collection Request. 30-Day Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-27
... Medicaid Fraud Control Units' Reports--OMB No. 0990-0162-Extension--Office of Inspector General (OIG... collection of information to specifically comply with the requirements in Title 19 of the Social Security Act... Inspector General (OIG) by the fifty established State Medicaid Fraud Control Units (Units). OIG uses the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-12
... title IV Federal Student Aid programs; regulations designed to prevent fraud; State authorization for... Against Women Reauthorization Act of 2013 to the campus safety and security reporting requirements in the... regulations designed to prevent fraud and otherwise ensure proper use of title IV Federal Student Aid program...
78 FR 14556 - Cheng Yi Liang: Debarment Order
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-06
.... 1001 and securities fraud, a Federal felony offense under 15 U.S.C. 78j(b) and 78ff. FDA's finding that debarment is appropriate is based on the felony conviction for securities fraud referenced herein for... execution of trades on national securities exchanges, resulting in total profits and losses avoided of $3...
6 CFR 13.1 - Basis, purpose, scope and effect.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Basis, purpose, scope and effect. 13.1 Section 13.1 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL... Security on or after October 12, 2005. (2) Program fraud cases initiated by any component of the Department...
78 FR 63980 - Agency Information Collection Activities; Proposed Collection; Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... Title: State Medicaid Fraud Control Units' Reports. OMB No.: 0990-0162. Abstract: Office of Inspector... collection of information to comply with the requirements in Title 19 of the Social Security Act at 1903(q... certification/recertification of State Medicaid Fraud Control Units (MFCU). The collection is required by the...
26 CFR 1.7519-2T - Required payments-procedures and administration (temporary).
Code of Federal Regulations, 2010 CFR
2010-04-01
... payment under section 7519 for an applicable election year, the partnership or S corporation should type... termination of the section 444 election. (d) Negligence and fraud penalties made applicable. For purposes of section 6653, relating to additions to tax for negligence and fraud, any payment required by this section...
A System Like No Other: Fraud and Misconduct by New York City School Custodians.
ERIC Educational Resources Information Center
Flamm, Suzan R.; And Others
Findings of a study that investigated cases of fraud and misconduct in the New York City school custodial system are presented in this document. Custodial services are provided through a "quasi-independent" contractor, or an "indirect system." Although custodians are public employees, they have great independence and lack…
76 FR 82028 - Request for Information for the 2012 Trafficking in Persons Report
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... equally and adequately to victims of labor and sex trafficking? Men, women, and children? Citizen and... therefore not seeking, information on prostitution, human smuggling, visa fraud, or child abuse, unless such... any act of sex trafficking involving force, fraud, coercion, or in which the victim of sex trafficking...