Who Can You Trust? Protecting Your Organization from Internal Fraud.
ERIC Educational Resources Information Center
Lukaszewski, Thomas E.
1997-01-01
Discusses how to protect a child care organization from employee fraud. Differentiates employee and management fraud and examines reasons fraud is committed. Suggests procedures for protecting an organization from fraud, including establishing an effective internal control system, paying attention to unusual employee behavior, reviewing expense…
48 CFR 949.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 949.106 Section 949.106 Federal Acquisition Regulations System DEPARTMENT OF ENERGY CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 949.106 Fraud or other criminal conduct. Any evidence...
48 CFR 1449.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 1449.106 Section 1449.106 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 1449.106 Fraud or other criminal conduct...
48 CFR 649.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 649.106 Section 649.106 Federal Acquisition Regulations System DEPARTMENT OF STATE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles. 649.106 Fraud or other criminal conduct. If the...
48 CFR 1349.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 1349.106 Section 1349.106 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 1349.106 Fraud or other criminal conduct. If the...
48 CFR 49.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 49.106 Section 49.106 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 49.106 Fraud or other criminal conduct. If...
76 FR 21373 - Privacy Act of 1974; Report of a New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... established by State law; (3) support litigation involving the Agency; (4) combat fraud, waste, and abuse in...
48 CFR 449.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 449.106 Section 449.106 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 449.106 Fraud or other criminal conduct. (a) If the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... management information system in accordance with the requirements of § 632.32. (c) Any person having..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal...
75 FR 30411 - Privacy Act of 1974; Report of a Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-01
... Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse... Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability... systems and data files necessary for compliance with Title XI, Part C of the Social Security Act because...
An Analysis of Internal Controls and Procurement Fraud Deterrence
2013-12-01
might keep the organization from achieving its objectives and analyze risks , including fraud risk , so as to decide how the risk should be managed ( COSO ...internal control to adequately manage the risk ( COSO , 2013). Risk management involves developing the effective internal control targeted at a...structure and management . While the risk of fraud cannot be eliminated entirely, it can be greatly reduced with an appropriate procurement fraud prevention
2011-09-15
programs and operations at high risk of being vulnerable to fraud, waste, and abuse.1 Despite several reform initiatives, DOD’s financial management...remains on GAO’s high- risk list today. Long- standing and pervasive weaknesses in DOD’s financial management and related business processes and systems...GAO has identified as being at high risk of waste, fraud, abuse, and mismanagement. The seven specific DOD high- risk areas are (1) approach to
Lock Up Those Lines: Protecting against Phone Fraud.
ERIC Educational Resources Information Center
Schleyer, Peggy E.; Hibner, Dale V.
1996-01-01
School business officials must be aware of potential liabilities associated with Centrex and Private Branch Exchange (PBX). This article describes these systems, presents guidelines for developing a telecommunications management plan, and discusses options to limit toll fraud exposure. PBX owners should implement manufacturers' recommended…
DeMuro, P R; Owens, J F
1994-01-01
This chapter discusses certain Medicare reimbursement and fraud and abuse considerations for management services organizations (MSOs), medical foundations, and integrated delivery systems. It stresses the necessity of a business plan, the sources of capitalization that might be used in creating an integrated delivery system, and their effect on Medicare reimbursement. It also discusses related party principles and considerations and the Medicare "incident to" regulations. Furthermore, it discusses the application of certain Medicare safe harbor regulations on MSOs' structures and services, and those of medical foundations and integrated delivery systems.
5 CFR 845.408 - Special processing for fraud claims.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Special processing for fraud claims. 845.408 Section 845.408 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES RETIREMENT SYSTEM-DEBT COLLECTION Agency Requests to OPM for Recovery of a Debt From the Civil Service...
Code of Federal Regulations, 2012 CFR
2012-04-01
..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal program management procedures sufficient to prevent fraud and program abuse, including subgrantee and...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal program management procedures sufficient to prevent fraud and program abuse, including subgrantee and...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
29 CFR 453.12 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...
DOT National Transportation Integrated Search
2014-03-01
The Commercial Skills Test Information Management System (CSTIMS) was developed as a Web-based, software-as-a-service system to prevent and deter fraud perpetrated by third-party commercial drivers license (CDL) examiners in the portion of the CDL...
NASA Astrophysics Data System (ADS)
Grijpink, Jan
2004-06-01
Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.
A holistic approach to food safety risks: Food fraud as an example.
Marvin, Hans J P; Bouzembrak, Yamine; Janssen, Esmée M; van der Fels-Klerx, H J; van Asselt, Esther D; Kleter, Gijs A
2016-11-01
Production of sufficient, safe and nutritious food is a global challenge faced by the actors operating in the food production chain. The performance of food-producing systems from farm to fork is directly and indirectly influenced by major changes in, for example, climate, demographics, and the economy. Many of these major trends will also drive the development of food safety risks and thus will have an effect on human health, local societies and economies. It is advocated that a holistic or system approach taking into account the influence of multiple "drivers" on food safety is followed to predict the increased likelihood of occurrence of safety incidents so as to be better prepared to prevent, mitigate and manage associated risks. The value of using a Bayesian Network (BN) modelling approach for this purpose is demonstrated in this paper using food fraud as an example. Possible links between food fraud cases retrieved from the RASFF (EU) and EMA (USA) databases and features of these cases provided by both the records themselves and additional data obtained from other sources are demonstrated. The BN model was developed from 1393 food fraud cases and 15 different data sources. With this model applied to these collected data on food fraud cases, the product categories that thus showed the highest probabilities of being fraudulent were "fish and seafood" (20.6%), "meat" (13.4%) and "fruits and vegetables" (10.4%). Features of the country of origin appeared to be important factors in identifying the possible hazards associated with a product. The model had a predictive accuracy of 91.5% for the fraud type and demonstrates how expert knowledge and data can be combined within a model to assist risk managers to better understand the factors and their interrelationships. Copyright © 2016 Elsevier Ltd. All rights reserved.
Credit card fraud detection using neural network and geolocation
NASA Astrophysics Data System (ADS)
Gulati, Aman; Dubey, Prakash; MdFuzail, C.; Norman, Jasmine; Mangayarkarasi, R.
2017-11-01
The most acknowledged payment mode is credit card for both disconnected and online mediums in today's day and age. It facilitates cashless shopping everywhere in the world. It is the most widespread and reasonable approach with regards to web based shopping, paying bills, what's more, performing other related errands. Thus danger of fraud exchanges utilizing credit card has likewise been expanding. In the Current Fraud Detection framework, false exchange is recognized after the transaction is completed. As opposed to the current system, the proposed system presents a methodology which facilitates the detection of fraudulent exchanges while they are being processed, this is achieved by means of Behaviour and Locational Analysis(Neural Logic) which considers a cardholder's way of managing money and spending pattern. A deviation from such a pattern will then lead to the system classifying it as suspicious transaction and will then be handled accordingly.
41 CFR 105-70.033 - Witnesses.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Witnesses. 105-70.033 Section 105-70.033 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 70-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL...
75 FR 52944 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... records. Upon the effective date of this notice, system OFHEO-07, ``Mortgage Fraud System'' published at 71 FR 6085 on February 6, 2006 will be deleted. The proposed system named ``Fraud Reporting System'' (FHFA-6) will maintain information of fraud or possible fraud involving the Federal National Mortgage...
48 CFR 849.106 - Fraud or other criminal conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 849.106 Fraud or other criminal conduct. (a... following: (i) The DSPE. (ii) The Director, Office of Construction and Facilities Management, in the case of contracting officers from the Office of Construction and Facilities Management. (3) Follow procedures as...
77 FR 62059 - Privacy Act of 1974, as Amended; Revisions to Existing Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... and forms, microfilm or microfiche, and in computer processable storage media such as personnel system... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... apply: The Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer...
Code of Federal Regulations, 2010 CFR
2010-10-01
... management and quality control to discourage waste, fraud and abuse; and to ensure that components, products, and services that are provided to the Department of Energy (DOE) satisfy the contractor's obligations... for effective management systems and internal controls within their areas of assigned responsibility...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...
Avoiding pharmacy fraud through automation and audit.
Tripodi, M
1998-12-01
Pharmacy data offer some of the most reliable and evaluative information in managed care today. As fraud constitutes up to 10% of our total health care expenditures, the author explains how monitoring the pharmacy network for fraud and abuse is an easy way of reclaiming some of these losses.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... INFORMATION: A. Background Contractor business systems and internal controls are the first line of defense against waste, fraud, and abuse. Weak control systems increase the risk of unallowable and unreasonable... Office of Management and Budget (OMB) as follows: (1) Accounting Systems--OMB Clearance 9000-0011; (2...
75 FR 81562 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-28
... System name: Supplementary Security Income (SSI)/Office of Personnel Management (OPM) Temporary Matching... the Social Security Administration (SSA) was still part of the Department, and when OIG was tasked... Fraud Detection File, HHS/OS/OIG. Purpose: This system of records was established to facilitate the...
Playing the Ponies: A $5 Million Embezzlement Case
ERIC Educational Resources Information Center
Howe, Martha A.; Malgwi, Charles A.
2006-01-01
Fraud is a pervasive problem, and educating future business leaders, managers, and auditors about fraud is one way to attack the problem. This instructional fraud case chronicles the actual details surrounding a major embezzlement at a regional high school (RHS) that culminated in long federal and state prison sentences for the school's treasurer.…
Pharmacy waste, fraud, and abuse in health care reform.
Carpenter, Laura A; Edgar, Zachary; Dang, Christopher
2011-01-01
To describe the new Medicare and Medicaid waste, fraud, and abuse provisions of the Affordable Care Act (H. R. 3590) and Health Care and Education Affordability Reconciliation Act of 2010 (H. R. 4872), the preexisting law modified by H. R. 3590 and H. R. 4872, and applicable existing and proposed regulations. Waste, fraud, and abuse are substantial threats to the efficiency of the health care system. To combat these activities, the Department of Health and Human Services and Centers for Medicare & Medicaid Services promulgate and enforce guidelines governing the proper assessment and billing for Medicare and Medicaid services. These guidelines have a number of provisions that can catch even well-intentioned providers off guard, resulting in substantial fines. H. R. 3590 and H. R. 4872 augment preexisting waste, fraud, and abuse laws and regulations. This article reviews the new waste, fraud, and abuse laws and regulations to apprise pharmacists of the substantial changes affecting their practice. H. R. 3590 and H. R. 4872 modify screening requirements for providers; modify liability and penalties for the antikickback statute, federal False Claims Act, remuneration, and Stark Law; and create or extend auditing and management programs. Properly navigating these changes will be important in keeping pharmacies in compliance.
77 FR 16839 - Privacy Act of 1974; Notice of New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-22
.... Cheryl M. Paige, Director, Office of Information Management. SYSTEM NAME: GSA/OGC-1 (Office of General... interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or... 1974; Notice of New System of Records AGENCY: General Services Administration. ACTION: Notice. SUMMARY...
2011-04-30
fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase
NPS Government Purchase Card Program: An Analysis of Internal Controls
2014-03-01
approving official APC agency program coordinator CCPMD Consolidated Card Program Management Division CH cardholder COSO Committee of Sponsoring...correct, and minimize fraud, waste, and abuse” (DPAP, 2011, p. 2-2). To minimize risks , the management and internal controls should have support from...three interrelated subjects: enterprise risk management (ERM), internal control, and fraud deterrence” (para. 6). The 23 five components of an
41 CFR 105-55.003 - Antitrust, fraud, tax, interagency claims, and claims over $100,000 excluded.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) This part does not apply to tax debts. (c) This part does not apply to claims between GSA and other... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Antitrust, fraud, tax... § 105-55.003 Antitrust, fraud, tax, interagency claims, and claims over $100,000 excluded. (a) The...
Fraud and abuse. Building an effective corporate compliance program.
Matusicky, C F
1998-04-01
In 1997, General Health System (GHS), a not-for-profit integrated delivery system headquartered in Baton Rouge, Louisiana, developed a formal corporate compliance program. A newly appointed corporate compliance officer worked with key GHS managers and employees to assess the organization's current fraud and abuse prevention practices and recommend changes to meet new regulatory and organizational requirements. Then a structure for implementing these changes was developed, with staff training at its core. The program required a significant initial outlay of financial and human resources. The benefits to the organization, however, including a greater ability to respond quickly and effectively to possible compliance problems and better organizational communications, were worth the investment.
Reinstein, A; Dery, R J
1999-10-01
The American Institute of Certified Public Accountants' Statement on Auditing Standards (SAS) No. 82, Consideration of Fraud in a Financial Statement Audit, requires independent auditors to obtain reasonable assurance that financial statements are free of material mis-statements caused by error or fraud. SAS No. 82 provides guidance for independent auditors to use to help detect and document risk factors related to potential fraud. But while SAS No. 82 suggests how auditors should assess the potential for fraud, it does not expand their detection responsibility. Accordingly, financial managers should discuss thoroughly with auditors the scope and focus of an audit as a means to further their compliance efforts.
Reducing Homeland Insecurities: Ending Abuse of the Asylum and Credible Fear Program
2015-03-01
Operations FDNS Fraud Detection and National Security FEMA Federal Emergency Management Agency FY Fiscal Year GAO Government Accounting...file applications. A 2002 Government Accounting Office (GAO) study on benefit fraud found that fraud was pervasive and routinely used in furtherance... Government Accountability Office, 2002), http://www.gao.gov/assets/240/233515.pdf. 7 Mark Motivans, Immigration Offenders in the Federal Justice
76 FR 7239 - Proposed Privacy Act Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-09
... property interests, identity theft or fraud, or harm to the security or integrity of this system or other... notice of a proposed system of records entitled, ``Treasury/DO .225 --TARP Fraud Investigation...: Supervisory Fraud Specialist, Office of Financial Stability, 1500 Pennsylvania Avenue, NW., Washington, DC...
Monitoring of the Quality of the Defense Contract Audit Agency FY 2010 Audits
2013-03-07
performed by regional audit managers include reviewing high risk assignments and reports prior to their issuance, performing post-issuance reviews, or...brainstorming procedure requires the audit team ( managers , supervisors, and auditors) to discuss the risk of fraud for that engagement and to discuss the risk ...auditors to make inquiries of contractor management of management’s knowledge of fraud risks during its annual planning meeting with major contractors
How Program Managers Can Use Whistleblowing to Reduce Fraud Within Government Organizations
2014-09-01
Gates, Dean Graduate School of Business and Public Policy iv THIS PAGE INTENTIONALLY LEFT BLANK v HOW PROGRAM MANAGERS CAN USE WHISTLEBLOWING TO...16 Figure 4. Fraud Witnessed within the Government and Private Business (after Harned, 2007...contained, and it continues to spread. The $3.7 trillion statistic above was estimated using data that was actually detected and reported. If every
Managing Counterparty Risk in an Unstable Financial System
ERIC Educational Resources Information Center
Belmont, David
2012-01-01
The recent flow of headlines excoriating bankers and financiers for malfeasance, fraud, and collusion has been almost biblical in proportion. Counterparties that appeared creditworthy based on financial statements and ratings have revealed that they are impaired either due to computer errors, control failures, malfeasance, or potential regulatory…
48 CFR 3032.006 - Reduction or suspension of contract payments upon finding of fraud.
Code of Federal Regulations, 2010 CFR
2010-10-01
... contract payments upon finding of fraud. 3032.006 Section 3032.006 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL CONTRACTING... finding of fraud. ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chandola, Varun; Schryver, Jack C; Sukumar, Sreenivas R
We discuss the problem of fraud detection in healthcare in this chapter. Given the recent scrutiny of the ineciencies in the US healthcare system, identifying fraud has been on the forefront of the eorts towards reducing the healthcare costs. In this chapter we will focus on understanding the issue of healthcare fraud in detail, and review methods that have been proposed in the literature to combat this issue using data driven approach.
5 CFR 831.1808 - Special processing for fraud claims.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Special processing for fraud claims. 831.1808 Section 831.1808 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) RETIREMENT Agency Requests to OPM for Recovery of a Debt from the Civil Service Retirement and Disability Fund § 831.1808...
Bungener, Martine; Hadchouel, Michelle
2012-09-01
Fraud is only a part of misconduct in research. Very few French research Institutions have a scientific integrity office, and their prevention. The Institut national de la santé et de la recherche médicale (Inserm) has created a "Scientific Integrity delegation". Scientific Integrity is an international concern. Scientific Integrity is closely linked to organisation, management and evaluation of all research activities. Copyright © 2012 Elsevier Masson SAS. All rights reserved.
Spink, John; Moyer, Douglas C; Park, Hyeonho; Wu, Yongning; Fersht, Victor; Shao, Bing; Hong, Miao; Paek, Seung Yeop; Edelev, Dmitry
2015-12-15
This paper introduces the topic of Food Fraud with translations to Russian, Korean, and Chinese. The concepts provide a system-wide focus leading to prevention. The goal is not to detect Food Fraud but to adjust entire food supply chains to reduce fraud opportunities. Food Fraud is a recently defined area of Food Protection between Food Safety (such as Salmonella or pesticide residue), and Food Defense (malicious intent to harm such as terrorism). Food Fraud is intentional with no intent to harm but only for economic gain. As with improving Food Safety and Food Defense, preventing Food Fraud is good for society and the economy. Society benefits through fewer public health threats from unauthorized acts. Society also benefits from increased consumer satisfaction and harmony. Food Security is increased through the production of more, higher-value products for consumers, commerce, and exporting. Food Fraud can reduce economic output because sickened citizens cannot work and it also reduces consumer confidence leading to less commerce. Copyright © 2014 Elsevier Ltd. All rights reserved.
From Spin to Swindle: Identifying Falsification in Financial Text.
Minhas, Saliha; Hussain, Amir
Despite legislative attempts to curtail financial statement fraud, it continues unabated. This study makes a renewed attempt to aid in detecting this misconduct using linguistic analysis with data mining on narrative sections of annual reports/10-K form. Different from the features used in similar research, this paper extracts three distinct sets of features from a newly constructed corpus of narratives (408 annual reports/10-K, 6.5 million words) from fraud and non-fraud firms. Separately each of these three sets of features is put through a suite of classification algorithms, to determine classifier performance in this binary fraud/non-fraud discrimination task. From the results produced, there is a clear indication that the language deployed by management engaged in wilful falsification of firm performance is discernibly different from truth-tellers. For the first time, this new interdisciplinary research extracts features for readability at a much deeper level, attempts to draw out collocations using n -grams and measures tone using appropriate financial dictionaries. This linguistic analysis with machine learning-driven data mining approach to fraud detection could be used by auditors in assessing financial reporting of firms and early detection of possible misdemeanours.
Secure authentication protocol for Internet applications over CATV network
NASA Astrophysics Data System (ADS)
Chin, Le-Pond
1998-02-01
An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.
ERIC Educational Resources Information Center
Office of Inspector General (ED), Washington, DC.
This report from the Office of Inspector General (OIG) identifies systemic weaknesses in the operations and programs of the U.S. Department of Education (ED). The office provides accurate financial information to make informed decisions, manage for results, and ensure operation integrity. Vigorous fraud investigations are continuing. Audits reveal…
Maisonneuve, Hervé
2012-09-01
Research integrity is not negotiable, but we regularly observe research misconduct, and journals are victims or guilty. Journals do not have the objective to assess research integrity: that's the Institutions' roles. Journals discover research misconduct when articles are reviewed (an editor or a reviewer detect signals), or after the article's publication when a reader or a whistleblower call the journal. The editors and reviewers' research misconduct are less described and not publicized in the medias. The peer-review system is criticised. If authors were fair-play, and reviews well done, the journals should not publish articles containing false data. The opponents to the peer-review system propose no alternatives to replace it. The anonymous peer reviews are questioned: it has never been proved that quality of anonymous reading was better than quality of open reading. The Open Access facilitated the creation of many journals. Some journals are excellent and got an impact factor; most journals have a poor quality and don't follow the publications ethics standards. When errors and fraud are identified, journals can publish 3 statements: erratum for errors, expression of concern for errors or fraud when evidence is not established, and retraction when evidence is obvious. Copyright © 2012 Elsevier Masson SAS. All rights reserved.
48 CFR 252.203-7004 - Display of fraud hotline poster(s).
Code of Federal Regulations, 2012 CFR
2012-10-01
... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (SEP 2011) (a) Definition...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-16
... General Fraud Hotline Posters AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to require contractors to display the DoD fraud hotline poster in common work....203-14, Display of Hotline Poster(s). Government Accountability Office (GAO) Report GAO-09-591...
48 CFR 252.203-7004 - Display of fraud hotline poster(s).
Code of Federal Regulations, 2011 CFR
2011-10-01
... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (Sep 2011) (a) Definition...
48 CFR 252.203-7004 - Display of fraud hotline poster(s).
Code of Federal Regulations, 2013 CFR
2013-10-01
... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (DEC 2012) (a) Definition...
48 CFR 252.203-7004 - Display of fraud hotline poster(s).
Code of Federal Regulations, 2014 CFR
2014-10-01
... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (DEC 2012) (a) Definition...
A Review of Financial Accounting Fraud Detection based on Data Mining Techniques
NASA Astrophysics Data System (ADS)
Sharma, Anuj; Kumar Panigrahi, Prabin
2012-02-01
With an upsurge in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection (FAFD) has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of specialized procedures to detect financial accounting fraud, collective known as forensic accounting. Data mining techniques are providing great aid in financial accounting fraud detection, since dealing with the large data volumes and complexities of financial data are big challenges for forensic accounting. This paper presents a comprehensive review of the literature on the application of data mining techniques for the detection of financial accounting fraud and proposes a framework for data mining techniques based accounting fraud detection. The systematic and comprehensive literature review of the data mining techniques applicable to financial accounting fraud detection may provide a foundation to future research in this field. The findings of this review show that data mining techniques like logistic models, neural networks, Bayesian belief network, and decision trees have been applied most extensively to provide primary solutions to the problems inherent in the detection and classification of fraudulent data.
Data Analytics in Procurement Fraud Prevention
2014-05-30
Certified Fraud Examiners CAC common access card COR contracting officer’s representative CPAR Contractor Performance Assessment Reporting System DCAA...using analytics to predict patterns occurring in known credit card fraud investigations to prevent future schemes before they happen. The goal of...or iTunes . 4. Distributional Analytics Distributional analytics are used to detect anomalies within data. Through the use of distributional
Medicare, Medicaid fraud a billion-dollar art form in the US
Korcok, M
1997-01-01
Medicare and Medicaid fraud costs billions of dollars each year in the US. Investigators have shown that fraud is found in all segments of the health care system. Even though the Canadian system has stricter regulations and tighter controls, can regulators here afford to be complacent about believing that such abuse would not happen here? One province has established an antifraud unit to monitor its health insurance scheme; it already has 1 prosecution under its belt. PMID:9141996
78 FR 73923 - Privacy Act of 1974, as Amended; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... data sources, as well as access to analytical services designed to detect fraud and systemic improper... systemic fraud, waste, and abuse within Federal programs; (d) Disclosure to (1) a Federal agency, its... prosecuting violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license...
ERIC Educational Resources Information Center
Calbom, Linda M.
This report to Congressional Requesters is concerned with internal control problems found in the U.S. Department of Education. Significant internal control weaknesses in the U.S. Department of Education's payment processes and poor physical control over its computer assets made the department vulnerable to (and in some cases resulted in) fraud,…
Rashidian, Arash; Joudaki, Hossein; Vian, Taryn
2012-01-01
Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. The interventions to combat health care fraud can be categorized as the interventions for 'prevention' and 'detection' of fraud, and 'response' to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975-2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan) were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care.
Rashidian, Arash; Joudaki, Hossein; Vian, Taryn
2012-01-01
Background Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. Methods The interventions to combat health care fraud can be categorized as the interventions for ‘prevention’ and ‘detection’ of fraud, and ‘response’ to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975–2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. Findings The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan) were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. Discussion Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care. PMID:22936981
Avoiding fraud risks associated with EHRs.
Helton, Jeffrey R
2010-07-01
Fraud associated with electronic health records (EHRs) generally falls into two categories: inappropriate billing by healthcare providers and inappropriate access by a system's users. A provider's EHR system requires controls to be of any significant help in detecting such fraudulent activity, or in gathering transactional evidence should such activity be identified. To protect against potential EHR-related healthcare fraud, providers should follow the recommendations established in 2007 by RTI International for the Office of the National Coordinator for Health Information Technology of the U.S. Department of Health and Human Services.
A System Like No Other: Fraud and Misconduct by New York City School Custodians.
ERIC Educational Resources Information Center
Flamm, Suzan R.; And Others
Findings of a study that investigated cases of fraud and misconduct in the New York City school custodial system are presented in this document. Custodial services are provided through a "quasi-independent" contractor, or an "indirect system." Although custodians are public employees, they have great independence and lack…
Fraud at the Global Fund? A viewpoint.
Brown, Jonathan C; Griekspoor, Wilfred
2013-01-01
The Global Fund to Fight AIDS, Tuberculosis and Malaria has contributed to remarkable health improvements in the three diseases since its creation in 2002. However, media reports about "astonishing losses" and fraud in Fund programs in 2011 caused several donors to suspend funding. The Fund's annual round of new financing was canceled, and a substantial reform program is being implemented. Two former senior managers of the Fund contend that fraud was never a major problem; rather than imposing harsh new controls on recipient countries that might impede health outcomes, the Fund should maintain the core elements of its innovative model and make selective rather than sweeping changes in its operations. Copyright © 2012 John Wiley & Sons, Ltd.
ERIC Educational Resources Information Center
Bandaranayake, Bandara
2014-01-01
This case describes the implementation of a fraud and corruption control policy initiative within the Victorian Department of Education and Early Childhood Development (the Department) in Australia. The policy initiative was administered and carried out by a small team of fraud control officials, including the author of this article, in the…
NASA Astrophysics Data System (ADS)
Gavrishchaka, Valeriy V.; Kovbasinskaya, Maria; Monina, Maria
2008-11-01
Novelty detection is a very desirable additional feature of any practical classification or forecasting system. Novelty and rare patterns detection is the main objective in such applications as fault/abnormality discovery in complex technical and biological systems, fraud detection and risk management in financial and insurance industry. Although many interdisciplinary approaches for rare event modeling and novelty detection have been proposed, significant data incompleteness due to the nature of the problem makes it difficult to find a universal solution. Even more challenging and much less formalized problem is novelty detection in complex strategies and models where practical performance criteria are usually multi-objective and the best state-of-the-art solution is often not known due to the complexity of the task and/or proprietary nature of the application area. For example, it is much more difficult to detect a series of small insider trading or other illegal transactions mixed with valid operations and distributed over long time period according to a well-designed strategy than a single, large fraudulent transaction. Recently proposed boosting-based optimization was shown to be an effective generic tool for the discovery of stable multi-component strategies/models from the existing parsimonious base strategies/models in financial and other applications. Here we outline how the same framework can be used for novelty and fraud detection in complex strategies and models.
Using the OIG model compliance programs to fight fraud.
Lovitky, Jeffrey A; Ahern, Jack
2002-03-01
Many healthcare organizations already have implemented compliance programs for their facilities. However, in light of recent fines and continued scrutiny of such programs by the HHS Office of Inspector General (OIG), healthcare organizations should consider reviewing their current programs against the OIG's relevant model compliance program. Although healthcare organizations are not required to adhere strictly to OIG's model programs, they would benefit from ensuring that their programs meet all the OIG's requirements. The common, minimum elements suggested by the OIG model programs include development and distribution of written compliance policies, the designation of a chief compliance officer to manage the program, the development of a corrective action and enforcement system, and the use of audits to monitor compliance. Using these models as guides, healthcare organizations should be better able to avoid the possibility of fraud and abuse within their organizations.
ERIC Educational Resources Information Center
Humpherys, Sean LaMarc
2010-01-01
Given the increasing problem of fraud, crime, and national security threats, assessing credibility is a recurring research topic in Information Systems and in other disciplines. Decision support systems can help. But the success of the system depends on reliable cues that can distinguish deceptive/truthful behavior and on a proven classification…
2009-06-01
suggest various explanations of the nature of fraud. The most significant , from their perspectives, are psychological and sociological explanations. 2...performing managerial functions. To improve the economic management of the military unit, managerial control offers significant advantages. A...models. First, over the last decades, federal agencies have been the subject of significant internal control discussions and legislation. The “Office
Security systems engineering overview
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less
Secure Database Management Study.
1978-12-01
covers cases Involving indus- trial economics (e.g., Industrial spies) and commercial finances (e.g., fraud). Priv¢j--Protection of date about people...California, Berke - lay [STONM76aI. * The approach to protection taken in INGRE (STOM74| has attracted a lot of Interest* Queries, in a high level query...Material Command Support Activity (NMCSA), and another DoD agency, Cullinane Corporation developed a prototype version of the IDS database system on a
Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy.
Dal Pozzolo, Andrea; Boracchi, Giacomo; Caelen, Olivier; Alippi, Cesare; Bontempi, Gianluca
2017-09-14
Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers' habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heineke, J M
1979-10-01
Three data sets were used to estimate joint and conditional probability distributions between various variables of interest in bank fraud and embezzlement (BF and E) cases of $10,000 dollars or more, computer-related crime cases of various types, and cases of insider theft from drug manufacturers and distributors. This report describes in tabular form the information contained in the three rather extensive data sets from industries facing insider threats which, in one or more dimensions, are analogous to insider threats potentially confronting managers in the nuclear industry. The data in Tables 1 through 29 were computed from the 313 cases ofmore » bank fraud and embezzlement (BF and E) representing losses of $10,000 or more reported to the Federal Deposit Insurance Corporation (FDIC) for the period 1977 to 1978. The data in Tables 30 through 64 were computed from the 461 cases of computer-related crime obtained from SRI International for the period 1958 to 1978. These incidents include inventory manipulations designed to hide errors, phony entries used to cover embezzlements, schemes used to penetrate a system and surreptitiously bring about a system crash, and sabotage. The data in Tables 65 through 67 were computed from data reported by the Drug Enforcement Agency (DEA) for the period 1973 to 1978. These data, though limited, provided several interesting insights into the insider-threat problem.« less
Perspective: Innocence and due diligence: managing unfounded allegations of scientific misconduct.
Goldenring, James R
2010-03-01
While the incidence of fraud in science is well documented, issues related to the establishment of innocence in cases of fallacious allegations remain unaddressed. In this article, the author uses his own experience to examine issues that arise when investigators are falsely accused of scientific fraud. Investigators must understand the processes in place to protect themselves against false accusations. The present system takes a position of guilty until proven innocent, a concept that is antithetical to American principles of jurisprudence. Yet this stance is acceptable as a requirement for membership in the scientific community, more reflective of the rules within a guild organization. The necessity for proof of innocence by members of the scientific community carries obligations that transcend normal legal assumptions. Scientists must safeguard their reputations by organizing and maintaining all original image files and data relevant to publications and grant proposals. Investigators must be able to provide clear documentation rapidly whenever concerns are raised during the review process. Moreover, peer-reviewed journals must be diligent not only in the identification of fraud but also in providing rapid due process for adjudication of allegations. The success of the scientific guild rules of conduct lies in the practice of due diligence by both scientists and journal editors in questions of scientific misconduct.
A prescription fraud detection model.
Aral, Karca Duru; Güvenir, Halil Altay; Sabuncuoğlu, Ihsan; Akar, Ahmet Ruchan
2012-04-01
Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center medical prescription database. Conventionally, prescription fraud detection is conducted on random samples by human experts. However, the samples might be misleading and manual detection is costly. We propose a novel distance based on data-mining approach for assessing the fraudulent risk of prescriptions regarding cross-features. Final tests have been conducted on adult cardiac surgery database. The results obtained from experiments reveal that the proposed model works considerably well with a true positive rate of 77.4% and a false positive rate of 6% for the fraudulent medical prescriptions. The proposed model has the potential advantages including on-line risk prediction for prescription fraud, off-line analysis of high-risk prescriptions by human experts, and self-learning ability by regular updates of the integrative data sets. We conclude that incorporating such a system in health authorities, social security agencies and insurance companies would improve efficiency of internal review to ensure compliance with the law, and radically decrease human-expert auditing costs. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
1985-07-30
This final rule provides the additional requirements to the conditions and procedures for initial approval and reapproval of Medicaid Management Information Systems (MMIS) that were added by section 1903(r) of the Social Security Act (as amended by section 901 of the Mental Health Systems Act of 1980, Pub. L. 96-398). These provisions are intended to improve States' MMIS, ensure efficient system operations, and make the procedures for detection of fraud, waste, and abuse more effective. In addition, this final rule specifies the procedures we follow in reducing the level of Federal financial participation in State administrative expenditures if a State fails to meet the conditions for initial operation, initial approval, or reapproval of an MMIS.
The evaluation of trustworthiness to identify health insurance fraud in dentistry.
Wang, Shu-Li; Pai, Hao-Ting; Wu, Mei-Fang; Wu, Fan; Li, Chen-Lin
2017-01-01
According to the investigations of the U.S. Government Accountability Office (GAO), health insurance fraud has caused an enormous pecuniary loss in the U.S. In Taiwan, in dentistry the problem is getting worse if dentists (authorized entities) file fraudulent claims. Several methods have been developed to solve health insurance fraud; however, these methods are like a rule-based mechanism. Without exploring the behavior patterns, these methods are time-consuming and ineffective; in addition, they are inadequate for managing the fraudulent dentists. Based on social network theory, we develop an evaluation approach to solve the problem of cross-dentist fraud. The trustworthiness score of a dentist is calculated based upon the amount and type of dental operations performed on the same patient and the same tooth by that dentist and other dentists. The simulation provides the following evidence. (1) This specific type of fraud can be identified effectively using our evaluation approach. (2) A retrospective study for the claims is also performed. (3) The proposed method is effective in identifying the fraudulent dentists. We provide a new direction for investigating the genuineness of claims data. If the insurer can detect fraudulent dentists using the traditional method and the proposed method simultaneously, the detection will be more transparent and ultimately reduce the losses caused by fraudulent claims. Copyright © 2016 Elsevier B.V. All rights reserved.
12 CFR 235.4 - Fraud-prevention adjustment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 4 2012-01-01 2012-01-01 false Fraud-prevention adjustment. 235.4 Section 235.4 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE... in paragraph (b) of this section must certify such compliance to its payment card networks on an...
Meier, B D; Homann, D
2010-07-01
The article summarises the results of a study on the activities of the German public health insurance companies to fight fraudulent behaviour in the system. The study is based on the analysis of 140 activity reports of the years 2004 and 2005 which the companies had to deliver to the Federal Social Insurance Authority as well as on the results of an additional survey. The article deals with the number of cases, the phenomenology of the delinquent acts, the referral of the suspicious cases to the law enforcement agencies, and the cooperation with other insurance companies. Finally, the article presents some considerations on an improved prevention of fraud in the public health care system. Copyright Georg Thieme Verlag KG Stuttgart . New York.
Crime and Crime Management in Nigeria Tertiary Institutions
ERIC Educational Resources Information Center
Adebanjo, Margaret Adewunmi
2014-01-01
This paper examines crime and its management in Nigerian tertiary institutions. Tertiary institutions today have become arenas for crime activities such as rape, cultism, murder, theft, internet fraud, drug abuse, and examination malpractices. This paper delves into what crime is, and its causes; and the positions of the law on crime management.…
Suspension and Debarment Program
EPA's management authority includes an effective administrative tool to address waste, fraud, abuse, poor performance, environmental noncompliance or other misconduct...the authority to suspend and or debar individuals and entities.
78 FR 32257 - Privacy Act of 1974; Report of a New Routine Use for Selected CMS Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-29
... systems of records to assist in preventing and detecting fraud, waste and abuse. The new routine use will... for the purpose of preventing and detecting fraud, waste and abuse, pursuant to section 1128C(a)(2) of the Social Security Act (``the Act''). At section 1128C(c) of the Act, a health plan is defined as a...
FraudBuster: Reducing Fraud in an Auto Insurance Market.
Nagrecha, Saurabh; Johnson, Reid A; Chawla, Nitesh V
2018-03-01
Nonstandard insurers suffer from a peculiar variant of fraud wherein an overwhelming majority of claims have the semblance of fraud. We show that state-of-the-art fraud detection performs poorly when deployed at underwriting. Our proposed framework "FraudBuster" represents a new paradigm in predicting segments of fraud at underwriting in an interpretable and regulation compliant manner. We show that the most actionable and generalizable profile of fraud is represented by market segments with high confidence of fraud and high loss ratio. We show how these segments can be reported in terms of their constituent policy traits, expected loss ratios, support, and confidence of fraud. Overall, our predictive models successfully identify fraud with an area under the precision-recall curve of 0.63 and an f-1 score of 0.769.
1983-03-03
This proposal adds to regulations new conditions and procedures for initial approval and for reapproval of Medicaid Management Information Systems (MMIS) to update the regulations to reflect additional requirements added by section 901 of the Mental Health Systems Act of 1980 (Pub. L. 96-398). The proposal specifies procedures for reducing the level of Federal financial participation in a State's administrative expenditures when a State fails to meet the conditions for initial operation, initial approval or reapproval of an MMIS. It also proposes procedures with respect to waivers of the conditions of approval and reapproval and to appeals of adverse decisions. These provisions are intended to improve States' MMIS, and to ensure efficient system operations, and to detect cases of fraud, waste, and abuse effectively.
Defining the public health threat of food fraud.
Spink, John; Moyer, Douglas C
2011-01-01
Food fraud, including the more defined subcategory of economically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless of the cause of the food risk, adulteration of food is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration of food with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that-economically motivated-but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number of potential contaminants. The authors developed the core concepts reported here following comprehensive research of articles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud-it focuses specifically on the public health threat-and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications of the crime triangle and the chemistry of the crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research. Food fraud, including the more defined subcategory of economically motivated adulteration, is a food protection threat that has not been defined or holistically addressed. The terrorist attacks of September 11, 2001, led to the development of food defense as an autonomous area of study and a new food protection discipline. As economically motivated adulteration grows in scope, scale, and awareness, it is conceivable that food fraud will achieve the same status as an autonomous concept, between food safety and food defense. This research establishes a starting point for defining food fraud and identifying the public health risks. © 2011 Institute of Food Technologists®
Some evidentiary considerations for physician billing.
Rooks, Franklin J
2011-01-01
In a criminal prosecution for medical billing fraud alleging up-coding and overbilling, the government's evidence may encompass the practice's entire billings and draw inferences from them. In addition, fraud may be demonstrated through statistical analysis comparing a physician's billings relative to other providers of the same specialty. The Federal Rules of Evidence govern the admissibility of evidence during a trial, to provide fairness for both the prosecution and the defense. Physicians and practice managers should be well versed in the billing requirements and particularly careful when CPT codes are expressed in terms of "required times" as opposed to "typical times."
34 CFR 682.405 - Loan rehabilitation agreement.
Code of Federal Regulations, 2011 CFR
2011-07-01
... to, a crime involving fraud in obtaining title IV, HEA program assistance, so that the loan may be... economic education materials, including debt management information, to any borrower who has rehabilitated...
34 CFR 682.405 - Loan rehabilitation agreement.
Code of Federal Regulations, 2012 CFR
2012-07-01
... to, a crime involving fraud in obtaining title IV, HEA program assistance, so that the loan may be... economic education materials, including debt management information, to any borrower who has rehabilitated...
34 CFR 682.405 - Loan rehabilitation agreement.
Code of Federal Regulations, 2013 CFR
2013-07-01
... to, a crime involving fraud in obtaining title IV, HEA program assistance, so that the loan may be... economic education materials, including debt management information, to any borrower who has rehabilitated...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... card request. The comment period is being extended to provide additional time for interested parties to... times more likely to be flagged as potential trafficking by FNS' fraud detection system. Trafficking is... many first-time users do not understand how to use the card and a grace period in the beginning would...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
..., Procedures for Handling of Discrimination Complaints Under Section 806 of the Corporate and Criminal Fraud... Systems Security Act of 2007, Enacted as Section 1413 of the Implementing Recommendations of the 9/11... Complaints Under Section 806 of the Corporate and Criminal Fraud Accountability Act of 2002, Title VIII of...
A Secure and Privacy-Preserving Targeted Ad-System
NASA Astrophysics Data System (ADS)
Androulaki, Elli; Bellovin, Steven M.
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.
Document fraud deterrent strategies: four case studies
NASA Astrophysics Data System (ADS)
Mercer, John W.
1998-04-01
This paper discusses the approaches taken to deter fraud committed against four documents: the machine-readable passport; the machine-readable visa; the Consular Report of Birth Abroad; and the Border Crossing Card. General approaches are discussed first, with an emphasis on the reasons for the document, the conditions of its use and the information systems required for it to function. A cost model of counterfeit deterrence is introduced. Specific approaches to each of the four documents are then discussed, in light of the issuance circumstances and criteria, the intent of the issuing authority, the applicable international standards and the level of protection and fraud resistance appropriate for the document.
Expanding physician education in health care fraud and program integrity.
Agrawal, Shantanu; Tarzy, Bruce; Hunt, Lauren; Taitsman, Julie; Budetti, Peter
2013-08-01
Program integrity (PI) spans the entire spectrum of improper payments from fraud to abuse, errors, and waste in the health care system. Few physicians will perpetrate fraud or abuse during their careers, but nearly all will contribute to the remaining spectrum of improper payments, making preventive education in this area vital. Despite the enormous impact that PI issues have on government-sponsored and private insurance programs, physicians receive little formal education in this area. Physicians' lack of awareness of PI issues not only makes them more likely to submit inappropriate claims, generate orders that other providers and suppliers will use to submit inappropriate claims, and document improperly in the medical record but also more likely to become victims of fraud schemes themselves.In this article, the authors provide an overview of the current state of PI issues in general, and fraud in particular, as well as a description of the state of formal education for practicing physicians, residents, and fellows. Building on the lessons from pilot programs conducted by the Centers for Medicare and Medicaid Services and partner organizations, the authors then propose a model PI education curriculum to be implemented nationwide for physicians at all levels. They recommend that various stakeholder organizations take part in the development and implementation process to ensure that all perspectives are included. Educating physicians is an essential step in establishing a broader culture of compliance and improved integrity in the health care system, extending beyond Medicare and Medicaid.
Automated Coding Software: Development and Use to Enhance Anti-Fraud Activities*
Garvin, Jennifer H.; Watzlaf, Valerie; Moeini, Sohrab
2006-01-01
This descriptive research project identified characteristics of automated coding systems that have the potential to detect improper coding and to minimize improper or fraudulent coding practices in the setting of automated coding used with the electronic health record (EHR). Recommendations were also developed for software developers and users of coding products to maximize anti-fraud practices. PMID:17238546
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-11
... Posters (DFARS Case 2010-D026) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to require contractors to display the DoD fraud hotline poster in common work... providing a DFARS clause to use in lieu of the FAR clause 52.203-14, Display of Hotline Poster(s). GAO...
Scientific Misconduct and the Myth of Self-Correction in Science.
Stroebe, Wolfgang; Postmes, Tom; Spears, Russell
2012-11-01
The recent Stapel fraud case came as a shattering blow to the scientific community of psychologists and damaged both their image in the media and their collective self-esteem. The field responded with suggestions of how fraud could be prevented. However, the Stapel fraud is only one among many cases. Before basing recommendations on one case, it would be informative to study other cases to assess how these frauds were discovered. The authors analyze a convenience sample of fraud cases to see whether (social) psychology is more susceptible to fraud than other disciplines. They also evaluate whether the peer review process and replications work well in practice to detect fraud. There is no evidence that psychology is more vulnerable to fraud than the biomedical sciences, and most frauds are detected through information from whistleblowers with inside information. On the basis of this analysis, the authors suggest a number of strategies that might reduce the risk of scientific fraud. © The Author(s) 2012.
Understanding the types of fraud in claims to South African medical schemes.
Legotlo, T G; Mutezo, A
2018-03-28
Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-11
... Special Fraud Alert on Telemarketing by Durable Medical Equipment Suppliers AGENCY: Office of Inspector... Special Fraud Alert. Specifically, the Updated Special Fraud Alert addressed the statutory provision...) 205-0007. SUPPLEMENTARY INFORMATION: In our publication of the OIG Updated Special Fraud Alert on...
Fighting Domestic and International Fraud in the Admissions and Registrar's Offices
ERIC Educational Resources Information Center
Koenig, Ann M.; Devlin, Edward
2012-01-01
The education sector is no stranger to fraud, unfortunately. This article provides best practice guidance in recognizing and dealing with fraud, with emphasis on domestic and international academic credential fraud. It includes practical approaches to academic document review and verification. Success in fighting fraud requires becoming informed,…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The Bureau of Land Management is responsible for the leasing of oil and gas mineral rights on over 300 million acres of public lands. Under the Mineral Leasing Act of 1920, lands with known oil and gas deposits are leased competitively. However, much more federal land is leased through a noncompetitive lottery system, which generates substantial receipts for the federal Treasury - about $250 million in filing fees for the 5-year period 1980-1984. The lottery system has been criticized since its 1959 inception for encouraging fraud, misleading the public, and generating insufficient revenues. On October 12, 1983, the program wasmore » suspended for 10 months because of recognized weaknesses in the system. This report highlights major issues surrounding the lottery program.« less
Manchikanti, Laxmaiah; Singh, Vijay; Boswell, Mark V
2010-01-01
The health care industry in general and care of chronic pain in particular are described as recession-proof. However, a perfect storm with a confluence of many factors and events -none of which alone is particularly devastating - is brewing and may create a catastrophic force, even in a small specialty such as interventional pain management. Multiple challenges related to interventional pain management in the current decade will include individual and group physicians, office practices, ambulatory surgery centers (ASCs), and hospital outpatient departments (HOPD). Rising health care costs are discussed on a daily basis in the United States. The critics have claimed that health outcomes are the same as or worse than those in other countries, but others have presented the evidence that the United States has the best health care system. All agree it is essential to reduce costs. Numerous factors contribute to increasing health care costs. They include administrative costs, waste, abuse, and fraud. It has been claimed the U.S. health care system wastes up to $800 billion a year. Of this, fraud accounts for approximately $200 billion a year, involving fraudulent Medicare claims, kickbacks for referrals for unnecessary services, and other scams. Administrative inefficiency and redundant paperwork accounts for 18% of health care waste, whereas medical mistakes account for $50 billion to $100 billion in unnecessary spending each year, or 11% of the total. Further, American physicians spend nearly 8 hours per week on paperwork and employ 1.66 clerical workers per doctor, more than any other country. It has been illustrated that it takes $60,000 to $88,000 per physician per year, equal to one-third of a family practitioner's gross income, and $23 to $31 billion each year in total to interact with health insurance plans. The studies have illustrated that an average physician spends $68,274 per year communicating with insurance companies and performing other non-medical functions. For an office-based practice, the overall total in the United States is $38.7 billion, or $85,276 per physician. In the United States there are 2 types of physician payment systems: private health care and Medicare. Medicare has moved away from the Medicare Economic Index (MEI) and introduced the sustainable growth rate (SGR) formula which has led to cuts in physician payments on a yearly basis. In 2010 and beyond into the new decade, interventional pain management will see significant changes in how we practice medicine. There is focus on avoiding waste, abuse, fraud, and also cutting costs. Evidence-based medicine (EBM) and comparative effectiveness research (CER) have been introduced as cost-cutting and rationing measures, however, with biased approaches. This manuscript will analyze various issues related to interventional pain management with a critical analysis of physician payments, office facility payments, and ASC payments by various payor groups.
Transformation of fraud activities in procurement system in Indonesia
NASA Astrophysics Data System (ADS)
Setiani, N.; Huda, S. N.; Pulungan, R.; Winarko, E.
2017-03-01
E-procurement has been applied in Indonesia since 2008 through the adoption of Electronic Procurement System (SPSE). The purpose of the use of SPSE in the procurement process is to improve the efficiency of goods or services procurement. In the bidding process, intensive communication and data exchange between providers and organizers are urgently needed. Through SPSE, the frequency of face to face meetings between providers and the committee can be reduced. This is expected to minimize potential fraud behaviors in the goods or services procurement conducted through the tender process. There exists a transformation of activities in the procurement through SPSE from the tender process that was previously done manually. In this paper, we analyze this transformation between manual procurement process and SPSE-based procurement process. The result of the analysis is exploited for investigating the possibility of fraud behavior transformations in every phase of e-procurement activities.
An Informational Analysis and Communications Squadron Survey of Cyberspace Mission Assurance
2010-06-01
such things as fraud, 11 business ethics, financial reporting, internal controls, and enterprise risk management . COSO is an organization...recognized world-wide and is highly respected. In 1992, COSO published a framework for risk management . It reopened the framework for modification to...The enterprise risk management facet of the COSO framework is pertinent to the cyber mission assurance discussion. COSO recognized the importance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1982-06-01
The US General Accounting Office and executive agency Inspectors General have reported losses of millions of dollars in government funds resulting from fraud, waste and error. The Administration and the Congress have initiated determined efforts to eliminate such losses from government programs and activities. Primary emphasis in this effort is on the strengthening of accounting and administrative controls. Accordingly, the Office of Management and Budget (OMB) issued Circular No. A-123, Internal Control Systems, on October 28, 1981. The campaign to improve internal controls was endorsed by the Secretary of Energy in a memorandum to Heads of Departmental Components, dated Marchmore » 13, 1981, Subject: Internal Control as a Deterrent to Fraud, Waste and Error. A vulnerability assessment is a review of the susceptibility of a program or function to unauthorized use of resources, errors in reports and information, and illegal or unethical acts. It is based on considerations of the environment in which the program or function is carried out, the inherent riskiness of the program or function, and a preliminary evaluation as to whether adequate safeguards exist and are functioning.« less
Data Analytics in Procurement Fraud Prevention
2014-06-01
access card COR contracting officer’s representative CPAR Contractor Performance Assessment Reporting System DCAA Defense Contract Audit Agency DOD...of this can be seen in a company using analytics to predict patterns occurring in known credit card fraud investigations to prevent future schemes...a website such as Amazon or iTunes . 10 4. Distributional Analytics Distributional analytics are used to detect anomalies within data. Through the
7 CFR 276.3 - Negligence or fraud.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 4 2010-01-01 2010-01-01 false Negligence or fraud. 276.3 Section 276.3 Agriculture... Negligence or fraud. (a) General. If FNS determines that there has been negligence or fraud on the part of..., pay to FNS a sum equal to the amount of coupons issued as a result of such negligence or fraud. (b...
Using Data Mining to Detect Health Care Fraud and Abuse: A Review of Literature
Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad
2015-01-01
Inappropriate payments by insurance organizations or third party payers occur because of errors, abuse and fraud. The scale of this problem is large enough to make it a priority issue for health systems. Traditional methods of detecting health care fraud and abuse are time-consuming and inefficient. Combining automated methods and statistical knowledge lead to the emergence of a new interdisciplinary branch of science that is named Knowledge Discovery from Databases (KDD). Data mining is a core of the KDD process. Data mining can help third-party payers such as health insurance organizations to extract useful information from thousands of claims and identify a smaller subset of the claims or claimants for further assessment. We reviewed studies that performed data mining techniques for detecting health care fraud and abuse, using supervised and unsupervised data mining approaches. Most available studies have focused on algorithmic data mining without an emphasis on or application to fraud detection efforts in the context of health service provision or health insurance policy. More studies are needed to connect sound and evidence-based diagnosis and treatment approaches toward fraudulent or abusive behaviors. Ultimately, based on available studies, we recommend seven general steps to data mining of health care claims. PMID:25560347
2014-07-17
Auditing Health Care Organizations _________ 35 Special Fraud Risk Considerations When Auditing Government Contracts ______________ 36 iv │ DODIG-2014...Auditor Fraud Risk Assessment Special Considerations Special Fraud Risk Considerations When Auditing Health Care Organizations...Learning Opportunities 0 Government Relations (Public Policy and Strategic Relations) Government Relations 0 Health Care Affairs Health Care Affairs 0 Human
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Discovery. 185.122 Section 185.122 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PROGRAM FRAUD CIVIL REMEDIES..., answers, records, accounts, papers, and other data and documentary evidence. Nothing contained herein...
Code of Federal Regulations, 2011 CFR
2011-07-01
... LITIGATION Remedies in Procurement Fraud and Corruption § 516.58 Policies. (a) Procurement fraud and... administrative remedies in significant cases of fraud or corruption relating to Army procurement. (d) The key... of fraud or corruption involving procurement. (g) Coordination on the status and disposition of cases...
78 FR 22270 - Special Fraud Alert: Physician-Owned Entities
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-15
...] Special Fraud Alert: Physician-Owned Entities AGENCY: Office of Inspector General (OIG), HHS. ACTION... Physician-Owned Entities. Specifically, the Special Fraud Alert addressed physician-owned entities that... publication of the Special Fraud Alert on Physician-Owned Entities, an inadvertent error appeared in the DATES...
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Multi-stage methodology to detect health insurance claim fraud.
Johnson, Marina Evrim; Nagarur, Nagen
2016-09-01
Healthcare costs in the US, as well as in other countries, increase rapidly due to demographic, economic, social, and legal changes. This increase in healthcare costs impacts both government and private health insurance systems. Fraudulent behaviors of healthcare providers and patients have become a serious burden to insurance systems by bringing unnecessary costs. Insurance companies thus develop methods to identify fraud. This paper proposes a new multistage methodology for insurance companies to detect fraud committed by providers and patients. The first three stages aim at detecting abnormalities among providers, services, and claim amounts. Stage four then integrates the information obtained in the previous three stages into an overall risk measure. Subsequently, a decision tree based method in stage five computes risk threshold values. The final decision stating whether the claim is fraudulent is made by comparing the risk value obtained in stage four with the risk threshold value from stage five. The research methodology performs well on real-world insurance data.
Is Psychological Vulnerability Related to the Experience of Fraud in Older Adults?
LICHTENBERG, PETER A.; STICKNEY, LAURIE; PAULSON, DANIEL
2013-01-01
Financial exploitation, and particularly thefts and scams, are increasing at an alarming rate. In this study we (a) determined the national prevalence of older adults who report having been a victim of fraud, (b) created a population-based model for the prediction of fraud, and (c) examined how fraud is experienced by the most psychologically vulnerable older adults. The older adults studied were 4,400 participants in a Health and Retirement Study substudy, the 2008 Leave Behind Questionnaire. The prevalence of fraud across the previous 5 years was 4.5%. Among measures collected in 2002, age, education, and depression were significant predictors of fraud. Financial satisfaction and social-needs fulfillment were measured in 2008 and were significantly related to fraud above and beyond the 2002 predictors. Using depression and social-needs fulfillment to determine the most psychologically vulnerable older adults, we found that fraud prevalence was three times higher (14%) among those with the highest depression and the lowest social-needs fulfillment than among the rest of the sample (4.1%; χ2 = 20.49; p < .001). Clinical gerontologists and other professionals in the field need to be aware of their psychologically vulnerable clients heightened exposure to financial fraud. PMID:23997404
Security risks in nuclear waste management: Exceptionalism, opaqueness and vulnerability.
Vander Beken, Tom; Dorn, Nicholas; Van Daele, Stijn
2010-01-01
This paper analyses some potential security risks, concerning terrorism or more mundane forms of crime, such as fraud, in management of nuclear waste using a PEST scan (of political, economic, social and technical issues) and some insights of criminologists on crime prevention. Nuclear waste arises as spent fuel from ongoing energy generation or other nuclear operations, operational contamination or emissions, and decommissioning of obsolescent facilities. In international and EU political contexts, nuclear waste management is a sensitive issue, regulated specifically as part of the nuclear industry as well as in terms of hazardous waste policies. The industry involves state, commercial and mixed public-private bodies. The social and cultural dimensions--risk, uncertainty, and future generations--resonate more deeply here than in any other aspect of waste management. The paper argues that certain tendencies in regulation of the industry, claimed to be justified on security grounds, are decreasing transparency and veracity of reporting, opening up invisible spaces for management frauds, and in doing allowing a culture of impunity in which more serious criminal or terrorist risks could arise. What is needed is analysis of this 'exceptional' industry in terms of the normal cannons of risk assessment - a task that this paper begins. Copyright 2009 Elsevier Ltd. All rights reserved.
Whistleblowing in the pharmaceutical industry in the United States, England, Canada, and Australia.
Boumil, Sylvester James; Nariani, Ashiyana; Boumil, Marcia M; Berman, Harris A
2010-04-01
Fraud and abuse in the spending of public monies plague governments around the world. In the United States the False Claims Act encourages whistleblowing by private individuals to expose evidence of fraud. They are rewarded for their efforts with monetary compensation and protection from retaliation. Such is not the case in Canada, England, and Australia. Although some recent legislation has increased the protections afforded to whistleblowers, they are still likely to be viewed more as disloyal employees than courageous public servants, and there is little incentive to risk their jobs and reputation. Qui tam laws provide a police force of thousands in the effort to reduce rampant fraud, waste, and abuse, and would be an asset in any health-care system where pubic health policy requires conservation of resources.
Teaching Aids in Consumer Economics, 1970-71.
ERIC Educational Resources Information Center
New York State Council on Economic Education, Albany.
The document consists of 12 consumer education units for grade 12: Consumer Purchasing; Purchasing Food, Clothing, Furniture, and Appliances; Purchasing and Maintaining an Automobile; Housing; Consumer Credit; Money Management; Fraud, Quackery, and Deception; Banking and Savings; Investments; Life Insurance; Security Programs (Social Security,…
Civil Division - Alaska Department of Law
Attorney General Opinions Executive Branch Ethics Criminal Justice Alaska Medicaid Fraud Control Anchorage department and other agencies on the management, retention, communication, and disclosure of information matters. In addition, the legislative liaison coordinates responses to media requests. Natural Resources
77 FR 46258 - Debit Card Interchange Fees and Routing
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-03
... the types of fraud, methods used to commit fraud, and available fraud-prevention methods. An issuer... 920(a)(5) requires the Board to consider (1) the nature, type, and occurrence of fraud in electronic..., merchant trade associations, a card-payment processor, technology companies, a member of Congress...
42 CFR 455.23 - Suspension of payments in cases of fraud.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 4 2011-10-01 2011-10-01 false Suspension of payments in cases of fraud. 455.23... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.23 Suspension of payments in cases of fraud. (a) Basis for...
Consumer Frauds and Deceptions: A Learning Module.
ERIC Educational Resources Information Center
Waddell, Fred E.; And Others
This manual is designed to assist helping professionals responsible for developing consumer education programs for older adults on the topic of consumer fraud and deception. In a modular presentation format, the materials address the following areas of concern: (1) types of frauds and deceptions such as money schemes, mail order fraud,…
78 FR 29055 - State Medicaid Fraud Control Units; Data Mining
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
...] State Medicaid Fraud Control Units; Data Mining AGENCY: Office of Inspector General (OIG), HHS. ACTION... Fraud Control Units (MFCU) from using Federal matching funds to identify fraud through screening and... Control Number (OCN) 0990-0162. Table 2 indicates the paperwork burden associated with the requirements of...
The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules
2013-12-16
payloads and instead began distributing Bitcoin miners and click fraud modules.3 From a technical perspective, the primary click fraud malware used in...this era operated in the indiscriminate “auto-clicking” fashion we describe in Section 5. Alongside the click fraud and Bitcoin payloads, ZeroAccess
32 CFR 516.67 - Overseas cases of fraud or corruption.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Overseas cases of fraud or corruption. 516.67... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas cases of fraud or corruption. (a) Commanders of overseas major commands will establish procedures...
Fraud prevention in paying portal
NASA Astrophysics Data System (ADS)
Sandhu, P. S.; Senthilkumar, N. C.
2017-11-01
The purpose of presenting this paper is to give the idea to prevent the fraud in finance paying portals as fraud is increasing on daily basis and mostly in financial sector. So through this paper we are trying to prevent the fraud. This paper will give you the working algorithm through which you can able to prevent the fraud. Algorithm will work according to the spending amount of the user, which means that use will get categories into one of the low, medium, high or very high category.
Science as a Matter of Honour: How Accused Scientists Deal with Scientific Fraud in Japan.
Pellegrini, Pablo A
2017-06-26
Practices related to research misconduct seem to have been multiplied in recent years. Many cases of scientific fraud have been exposed publicly, and journals and academic institutions have deployed different measures worldwide in this regard. However, the influence of specific social and cultural environments on scientific fraud may vary from society to society. This article analyzes how scientists in Japan deal with accusations of scientific fraud. For such a purpose, a series of scientific fraud cases that took place in Japan has been reconstructed through diverse sources. Thus, by analyzing those cases, the social basis of scientific fraud and the most relevant aspects of Japanese cultural values and traditions, as well as the concept of honour which is deeply involved in the way Japanese scientists react when they are accused of and publicly exposed in scientific fraud situations is examined.
Spink, John; Fortin, Neal D; Moyer, Douglas C; Miao, Hong; Wu, Yongning
2016-01-01
This paper addresses the role of governments, industry, academics, and non-governmental organizations in Food Fraud prevention. Before providing strategic concepts for governments and authorities, definitions of Food Fraud are reviewed and discussed. Next there is a review of Food Fraud activities by the Global Food Safety Initiative (GFSI), the Elliott Review in the United Kingdom, the European Commission resolution on Food Fraud, and the US Food Safety Modernization Act including the Preventative Controls Rule. Two key concepts for governments or a company are: (1) formally, and specifically, mention food fraud as a food issue and (2) create an enterprise-wide Food Fraud prevention plan. The research includes a case study of the implementation of the concepts by a state or provincial agency. This analysis provides a foundation to review the role of science and technology in detection, deterrence and then contributing to prevention.
ERIC Educational Resources Information Center
Jarmon, Gloria L.; Engel, Gary T.
This document discusses the Department of Education's (DOE) fiscal year 1999 financial audit results; the relationship between the audit findings and the potential for waste, fraud, and abuse; and the results of the General Accounting Office's (GAO) review of the DOE's grantback account. The DOE's financial activity is important to the federal…
NASA Astrophysics Data System (ADS)
Laleh, Naeimeh; Azgomi, Mohammad Abdollahi
Credit card and personal loan applications have increased significantly. Application fraud is present when the application forms contain plausible and synthetic identity information or real stolen identity information. The monetary cost of application fraud is often estimated to be in the billions of dollars [1].
42 CFR 1001.201 - Conviction relating to program or health care fraud.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 5 2010-10-01 2010-10-01 false Conviction relating to program or health care fraud... Permissive Exclusions § 1001.201 Conviction relating to program or health care fraud. (a) Circumstance for... misdemeanor relating to fraud, theft, embezzlement, breach of fiduciary responsibility, or other financial...
42 CFR 1001.201 - Conviction relating to program or health care fraud.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 5 2011-10-01 2011-10-01 false Conviction relating to program or health care fraud... Permissive Exclusions § 1001.201 Conviction relating to program or health care fraud. (a) Circumstance for... misdemeanor relating to fraud, theft, embezzlement, breach of fiduciary responsibility, or other financial...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-14
... Inspector General Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical... Register notice sets forth the recently issued OIG Updated Special Fraud Alert addressing telemarketing by durable medical equipment (DME) suppliers. For the most part, OIG Special Fraud Alerts address national...
76 FR 81904 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... Special Fraud Alerts. DATES: To assure consideration, public comments must be delivered to the address... and Special Fraud Alerts. Please assist us by referencing the file code OIG-120-N. Inspection of...
Fraud Prevention and Employee Rationalization in New York State Public Schools
ERIC Educational Resources Information Center
Slezak, Kathleen
2013-01-01
Prompted by frequent media reports of school fraud and a lack of relevant K-12 literature, this research study was designed to investigate current fraud prevention practices in public school districts in New York State. Using a "fraud triangle" model, an analysis of existing legislation and professional practice guidelines reveals that…
A Social Marketing Campaign in Denver: Reducing the Risk of Elder Fraud
ERIC Educational Resources Information Center
McKenna, Judy; Miller, Jacque; Curtis, Lisa
2004-01-01
Acknowledging the pain and loss senior citizens experience due to fraud, the Denver District Attorney's Office launched a campaign--"Clergy Against Senior Exploitation (CASE)"--to reduce fraud perpetrated on older persons. The thrust of this project was preventing fraud by educating older adults through their religious affiliations in…
12 CFR 1806.303 - Fraud, waste and abuse.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Fraud, waste and abuse. 1806.303 Section 1806... BANK ENTERPRISE AWARD PROGRAM Terms and Conditions of Assistance § 1806.303 Fraud, waste and abuse. Any person who becomes aware of the existence or apparent existence of fraud, waste, or abuse of assistance...
Code of Federal Regulations, 2010 CFR
2010-10-01
... convicted of fraud or other defense-contract-related felonies. 252.203-7001 Section 252.203-7001 Federal... convicted of fraud or other defense-contract-related felonies. As prescribed in 203.570-3, use the following clause: Prohibition on Persons Convicted of Fraud or Other Defense-Contract-Related Felonies (DEC 2008...
78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...
77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-28
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...
van der Geest, Victor R.; Weisburd, David; Blokland, Arjan A. J.
2016-01-01
This study describes the criminal careers of offenders convicted of fraud, distinguishing different career dimensions such as intermittency, versatility and specialization. Results indicate that most fraud offenders are versatile in the sense that they also have significant criminal records for other serious offending (that is, not fraud). At the same time they are also specialized in fraud. When we examine developmental trajectories of serious offending and next explore patterns of fraud for the groups identified, we find that offenders in our sample represent a heterogeneous group and that the classic divide between typical financial (for example, white-collar) offenders and common criminals does not apply to the majority of our sample. PMID:28989326
Code of Federal Regulations, 2011 CFR
2011-01-01
... 5 Administrative Personnel 1 2011-01-01 2011-01-01 false Sanctions. 185.131 Section 185.131 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PROGRAM FRAUD CIVIL REMEDIES... admission, the ALJ may (1) Draw an inference in favor of the requesting party with regard to the information...
Retractions in the scientific literature: is the incidence of research fraud increasing?
Steen, R Grant
2011-04-01
Scientific papers are retracted for many reasons including fraud (data fabrication or falsification) or error (plagiarism, scientific mistake, ethical problems). Growing attention to fraud in the lay press suggests that the incidence of fraud is increasing. The reasons for retracting 742 English language research papers retracted from the PubMed database between 2000 and 2010 were evaluated. Reasons for retraction were initially dichotomised as fraud or error and then analysed to determine specific reasons for retraction. Error was more common than fraud (73.5% of papers were retracted for error (or an undisclosed reason) vs 26.6% retracted for fraud). Eight reasons for retraction were identified; the most common reason was scientific mistake in 234 papers (31.5%), but 134 papers (18.1%) were retracted for ambiguous reasons. Fabrication (including data plagiarism) was more common than text plagiarism. Total papers retracted per year have increased sharply over the decade (r=0.96; p<0.001), as have retractions specifically for fraud (r=0.89; p<0.001). Journals now reach farther back in time to retract, both for fraud (r=0.87; p<0.001) and for scientific mistakes (r=0.95; p<0.001). Journals often fail to alert the naïve reader; 31.8% of retracted papers were not noted as retracted in any way. Levels of misconduct appear to be higher than in the past. This may reflect either a real increase in the incidence of fraud or a greater effort on the part of journals to police the literature. However, research bias is rarely cited as a reason for retraction.
Stochik, A M; Zatravkin, S N; Stochik, A A
2013-01-01
The present report considers the history of becoming of concept of medical police in second half of XVIII century. This concept became one of the most important instruments of public management in Austria, France, Prussia and Russia. Two directions of activity of public authorities in the area of implementation of medical police are discussed i.e. control of frauds and development of public systems of training of medical manpower and charity provision to socially unprotected groups of population. The historiographical data is presented concerning the development of public systems of training of medical manpower, reform of university medical education, implementation of hospital reform.
Financial viability, medical technology, and hospital closures.
Prince, T R; Sullivan, J A
2000-01-01
Informed investments in medical technology and information systems are associated with the financial viability of community hospitals. Financially distressed facilities are 3 to 4 years behind proactive hospitals in supporting high-speed data, voice, and image transmissions to physicians in various locations. Impact of the Balanced Budget Act of 1997, fraud and abuse activities, Y2K issues, and lack of information systems support for physicians will result in 800 hospital closures and mergers of distressed hospitals over the next 60 months. These findings are based on the application of an eight-step framework for classifying information systems in health care entities. This framework is validated by survey instruments, site visits, interviews with senior management in 44 health care entities containing 576 hospitals, and judgments on the financial status of the health care entities.
Control of fraud and abuse in Medicare and Medicaid.
Pies, H E
1977-01-01
This Comment explores issues concerning the control of fraud and abuse in health programs financed with public funds, specifically the Medicare and Medicaid programs. It summarizes the nature, scope, and possible causes of what some regard as a fraud and abuse "crisis," and points out the difficulties and obstacles facing those who attempt to develop legislative and executive action aimed at controlling fraud and abuse. Recent federal initiatives in fraud and abuse control are examined, and a brief summary of key provisions of H.R. 3 (the Medicare-Medicaid Anti-fraud and Abuse Amendments, which may prove to be a landmark piece of legislation in this area) is provided. The author emphasizes that more effective control of fraud and abuse is necessary if further expansion of government financing of health programs, including national health insurance, is to occur in the near future. At the same time, caution must be taken not to neglect the appropriate use of other mechanisms necessary for reducing the costs of medical care and improving its quality. In addition, it is likely that efforts to stem fraud and abuse will raise important medicolegal and public policy issues that will require careful interdisciplinary consideration.
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
Seeja, K. R.; Zareapoor, Masoumeh
2014-01-01
This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers. PMID:25302317
FraudMiner: a novel credit card fraud detection model based on frequent itemset mining.
Seeja, K R; Zareapoor, Masoumeh
2014-01-01
This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.
Health fraud involves selling drugs, devices, foods, or cosmetics that have not been proven effective. Keep in ... you from getting the treatment you really need. Health fraud scams can be found everywhere, promising help ...
[Communication of scientific fraud].
Zeitoun, Jean-David; Rouquette, Sébastien
2012-09-01
There is for a scientific journal several levels of communication depending of the degree of suspicion or certainty of a case of error or fraud. The task is increasingly difficult for journal editors as disclosed cases of fraud are more common and scientific communication on this topic is growing. Biomedical fraud is fairly little reported by the mainstream press and causes of this low interest are not currently well understood. The difficulty of processing this type of news for journalists appears to be one possible reason. The potentially numerous and significant consequences of fraud on health professionals are poorly documented. Though it is likely to cause a feeling of distrust and create controversy, the impact of fraud on the general public is poorly studied and appears multifactorial. Copyright © 2012 Elsevier Masson SAS. All rights reserved.
Analysis of Contracting Processes, Internal Controls, and Procurement Fraud Schemes
2013-06-01
Government Accountability Office (GAO) has kept DoD Contract Management on its High Risk Series list since 1992 (GAO, 2009). In addition, the GAO also...adopted from the Committee of Sponsoring Organizations of the Treadway Commission ( COSO ) (1992). There are five components: control environment, risk ...2001). 2. Risk Assessment Risk assessment is the identification, analysis, and management of risk faced by an organization. It entails identifying
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection
NASA Astrophysics Data System (ADS)
Flegel, Ulrich; Kerschbaum, Florian; Miseldine, Philip; Monakova, Ganna; Wacker, Richard; Leymann, Frank
One company by itself cannot detect all instances of fraud or insider attacks. An example is the simple case of buyer fraud: a fraudulent buyer colludes with a supplier creating fake orders for supplies that are never delivered. They circumvent internal controls in place to prevent this kind of fraud, such as a goods receipt, e.g., by ordering services instead of goods. Based on the evidence collected at one company, it is often extremely difficult to detect such fraud, but if companies collaborate and correlate their evidence, they could detect that the ordered services have never actually been provided.
MacKelvie, C F; Sanborn, A B
1989-04-01
The 1977 Fraud and Abuse Amendments, which prohibit business relationships that increase Medicare utilization, have created uncertainty among healthcare providers as to which commercial arrangements are legal and which are not. In response to this uncertainty, Congress enacted the Medicare and Medicaid Patient and Program Protection Act of 1987, which required the Department of Health and Human Services to develop regulations that would specify allowable practices. The regulations proposed Jan. 23, 1989, specify "safe harbors" from criminal and civil penalties in the following areas: sales of physician practices, rental agreements, investments by providers, and personal services and management contracts. In addition, the Fraud and Abuse Amendments exempted referrals arising out of a bona fide employment relationship, properly disclosed discounts, and group purchasing arrangements. The proposed regulations attempt to clarify these exemptions. Unfortunately, the proposals do little to calm a healthcare industry that is jumpy about which transactions are permitted and which are not. This is partly because the Internal Revenue Service, Health and Human Services, and the Department of Justice often issue conflicting pronouncements regarding prohibited business transactions by tax-exempt providers.
A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus
NASA Astrophysics Data System (ADS)
Blackwell, Clive
We illustrate the design of an intelligent agent to aid a merchant to limit fraudulent payment card purchases over the Internet. This is important because increasing fraud may limit the rise of e-commerce, and difficult because of the uncertainty in identifying and authenticating people remotely. The agent can advise the merchant what actions to take to reduce risk without complete knowledge of the circumstances. It can also negotiate flexibly to conclude transactions successfully that would otherwise be rejected. We use the Event Calculus to model the transaction system including the participants and their actions. The idea has applications in other distributed systems where incomplete knowledge of a system may be exploited by adversaries to their advantage.
Code of Federal Regulations, 2010 CFR
2010-07-01
... executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in connection... an executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in.... 559, fraud, bribery, or criminal collusion in connection with the disposal of personal property, the...
75 FR 12559 - Statement of Organization, Functions and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-16
... National, State and local professional organizations to promote quality assurance efforts and deter fraud... publishes State Board compliance reports; (3) conducts audits to ensure validity of data in the banks; (4) develops programs of research on trends in data, quality assurance, risk management, medical liability and...
Report #13-P-0299, June 21, 2013. Our review of the EPA’s Region 4 Office of Environmental Justice found that management had controls in place to protect against bias, fraud, and preselection of EJ Small Grants recipients during FYs 2010, 2011 and 2012.
5 CFR 185.133 - Determining the amount of penalties and assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Determining the amount of penalties and assessments. 185.133 Section 185.133 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PROGRAM FRAUD CIVIL REMEDIES § 185.133 Determining the amount of penalties and assessments. (a) In...
5 CFR 185.133 - Determining the amount of penalties and assessments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 5 Administrative Personnel 1 2012-01-01 2012-01-01 false Determining the amount of penalties and assessments. 185.133 Section 185.133 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PROGRAM FRAUD CIVIL REMEDIES § 185.133 Determining the amount of penalties and assessments. (a) In...
2014-08-01
IMPC. These threats may include natural and man-made disasters, damage, theft, fraud, and terrorism. Natural disasters such as hurricanes, earthquakes ...controls for mail sanctity include surveillance cameras, metal detectors , and X-ray screening to detect dangerous goods. (See IMT:SG2.SP1 and
41 CFR 105-70.021 - Discovery.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Discovery. 105-70.021...-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT OF 1986 § 105-70.021 Discovery. (a) The following types of discovery are authorized: (1) Requests for production of documents for inspection and copying; (2) Requests...
41 CFR 105-70.021 - Discovery.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Discovery. 105-70.021...-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT OF 1986 § 105-70.021 Discovery. (a) The following types of discovery are authorized: (1) Requests for production of documents for inspection and copying; (2) Requests...
41 CFR 105-70.021 - Discovery.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Discovery. 105-70.021...-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT OF 1986 § 105-70.021 Discovery. (a) The following types of discovery are authorized: (1) Requests for production of documents for inspection and copying; (2) Requests...
41 CFR 105-70.021 - Discovery.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Discovery. 105-70.021...-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT OF 1986 § 105-70.021 Discovery. (a) The following types of discovery are authorized: (1) Requests for production of documents for inspection and copying; (2) Requests...
Semiannual Report to Congress, No. 49. April 1, 2004-September 30, 2004
ERIC Educational Resources Information Center
US Department of Education, 2004
2004-01-01
This report highlights significant work of the U.S. Department of Education's Office of Inspector General for the 6-month period ending September 30, 2004. Sections include: Activities and Accomplishments; Elimination of Fraud and Error in Student Aid Programs; Budget and Performance Integration; Financial Management; Expanded Electronic…
A La Buena: Living Better. Bilingual Adult Proficiency Level Materials for Everyday Living.
ERIC Educational Resources Information Center
Smith, Philip D., Jr.; And Others
These bilingual English/Spanish Adult Proficiency Materials comprise three adult education courses in these areas: consumer education, health, and nutrition. Part 1, Consumer Education, covers these topics: money management, credit, frauds, consumer complaints, housing, utility bills, saving energy, banking, insurance (car, health, life), buying a…
2013-03-01
international organized crime , illegal immigration, financial institution fraud and money laundering. Policymakers increasingly view domestic law...approach to crime control, focusing upon the identification, analysis and management of persisting and developing problems or risks (de Lint, 2006
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Section 96.33 Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Section 96.33 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Section 96.33 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Section 96.33 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
45 CFR 96.33 - Referral of cases to the Inspector General.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Section 96.33 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Financial Management § 96.33 Referral of cases to the Inspector General. State or tribal officials who have information indicating the commission or potential commission of fraud or other offenses against the United...
Online Safety: Fraud, Security, Phishing, Vishing
... Theft Online Safety Privacy Report Scams and Frauds Online Safety Be aware of these scams when you' ... Security and Safety Internet Fraud Phishing and Vishing Online Security and Safety The internet makes many everyday ...
Corporate integrity agreements: making the best of a tough situation.
Ramsey, Robert B
2002-03-01
Healthcare providers increasingly are entering into corporate integrity agreements as part of settlements with the Federal government in fraud-and-abuse cases. Providers pursue these settlements to avoid the costs of defending themselves against fraud charges. However, the costs relating to the long-term compliance activity mandated in the settlement's corporate integrity agreement also can be substantial. These costs include significant staff resources that must be devoted to compliance efforts demanded by the agreement and the required engagement of consultants to monitor the organization's compliance. Healthcare financial managers should be familiar with the elements of a typical corporate integrity agreement and understand strategies for negotiating such an agreement. Effective negotiations can help minimize the organization's costs of compliance with the agreement and facilitate its ongoing implementation of the agreement.
Deterring Online Advertising Fraud through Optimal Payment in Arrears
NASA Astrophysics Data System (ADS)
Edelman, Benjamin
Online advertisers face substantial difficulty in selecting and supervising small advertising partners: Fraud can be well-hidden, and limited reputation systems reduce accountability. But partners are not paid until after their work is complete, and advertisers can extend this delay both to improve detection of improper partner practices and to punish partners who turn out to be rule-breakers. I capture these relationships in a screening model with delayed payments and probabilistic delayed observation of agents’ types. I derive conditions in which an advertising principal can set its payment delay to deter rogue agents and to attract solely or primarily good-type agents. Through the savings from excluding rogue agents, the principal can increase its profits while offering increased payments to good-type agents. I estimate that a leading affiliate network could have invoked an optimal payment delay to eliminate 71% of fraud without decreasing profit.
32 CFR 516.68 - Program Fraud Civil Remedies Act (PFCRA).
Code of Federal Regulations, 2010 CFR
2010-07-01
... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.68 Program Fraud Civil Remedies Act (PFCRA). (a) PFCRA was enacted on 21 October 1986 (Public Law 99-509) and...
Factsheets: Indicators of Fraud, Waste and Abuse
Factsheets: Indicators of Fraud, Waste and Abuse - You can tell if fraud, waste and abuse are occurring by looking for indicators. These are clues that may warrant further review of a specific area or activity.
ERIC Educational Resources Information Center
Jarmon, Gloria L.
This report provides a fiscal analysis of the Department of Education's 1999 financial audit results. It focuses on the relationship between the audit findings and the potential for waste, fraud, and abuse, and examines the status of an ongoing study of the Department's grantback account. It describes the ongoing accounting problems that have…
Contracting for Navy Husbanding Services: An Analysis of the Fat Leonard Case
2017-12-01
management and internal control frameworks. This research analyzes each alleged act of fraud in the Fat Leonard case and aligns the act with the contract...management phase in which the alleged act occurred and with the internal control component that most contributed to and allowed the alleged act to be...contract administration phases. Furthermore, the findings indicate that the internal control deficiencies were in the control environment and
Proposal for an IT Security Standard for Preventing Tax Fraud in Cash Registers
NASA Astrophysics Data System (ADS)
Neuhaus, Mathias; Wolff, Jörg; Zisky, Norbert
This paper describes a technology solution for preventing tax fraud in electronic cash registers (ECR) and point of sale (POS) systems. The solution is based on electronic signatures, and as a result, any alterations to protected data will be detected. The signed transaction data can be stored on various electronic memory devices. Technical provisions enable the estimation of transaction volumes, even after tampering or loss of data. In this way the solution presented here differs significantly from other fiscal solutions where a pattern of approvals for ECRs and permanent technical supervision of the market is necessary. This paper is focused on the architecture, the protocols and the usability of the proposed system.
Avoiding Service Station Fraud.
ERIC Educational Resources Information Center
Burton, Grace M.; Burton, John R.
1982-01-01
High school students are warned against service station fraud. A problem-solving section is designed to help students calculate consumer costs for various fraudulent transactions. Several ways of reducing fraud or of lessening the chances of problems are noted. (MP)
2011-12-01
Study of Army Contracting Officer Corruption in Operations Iraqi and Enduring Freedom Utilizing Occupational Fraud Theory By: Amanda H...Operations Iraqi and Enduring Freedom Utilizing Occupational Fraud Theory 6. AUTHOR(S) Amanda H. Flint 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION...CCOs) during Operations Iraqi Freedom and Enduring Freedom (OIF/OEF) by applying occupational fraud theory, specifically the classic sociological
78 FR 78512 - Privacy Act of 1974, as Amended; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... Purpose(s): The purpose of this system of records is to establish a manual and electronic database that..., identity theft or fraud, or harm to the security or integrity of this system or other systems or programs...
Pickett, Justin T; Roche, Sean Patrick
2018-02-01
Data fraud and selective reporting both present serious threats to the credibility of science. However, there remains considerable disagreement among scientists about how best to sanction data fraud, and about the ethicality of selective reporting. The public is arguably the largest stakeholder in the reproducibility of science; research is primarily paid for with public funds, and flawed science threatens the public's welfare. Members of the public are able to make meaningful judgments about the morality of different behaviors using moral intuitions. Legal scholars emphasize that to maintain legitimacy, social control policies must be developed with some consideration given to the public's moral intuitions. Although there is a large literature on popular attitudes toward science, there is no existing evidence about public opinion on data fraud or selective reporting. We conducted two studies-a survey experiment with a nationwide convenience sample (N = 821), and a follow-up survey with a representative sample of US adults (N = 964)-to explore community members' judgments about the morality of data fraud and selective reporting in science. The findings show that community members make a moral distinction between data fraud and selective reporting, but overwhelmingly judge both behaviors to be immoral and deserving of punishment. Community members believe that scientists who commit data fraud or selective reporting should be fired and banned from receiving funding. For data fraud, most Americans support criminal penalties. Results from an ordered logistic regression analysis reveal few demographic and no significant partisan differences in punitiveness toward data fraud.
5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.
Code of Federal Regulations, 2010 CFR
2010-01-01
... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...
5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.
Code of Federal Regulations, 2011 CFR
2011-01-01
... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...
Corruption and internal fraud in the Turkish construction industry.
Gunduz, Murat; Önder, Oytun
2013-06-01
The purpose of this paper is to develop an understanding about the internal fraud and corruption problem in the Turkish construction industry. The reasons behind the internal fraud and corruption problem as well as the types of prevention methods were investigated; and as a result various recommendations were made. To this end, a risk awareness questionnaire was used to understand the behavioral patterns of the construction industry, and to clarify possible proactive and reactive measures against internal fraud and corruption. The type of fraud experienced by Turkish construction companies was also surveyed in the questionnaire. The questionnaire was sent to 89 firms; and depending on the collected data, certain recommendations for construction industry professionals were provided.
[Scientific fraud. A disease we find among ourselves].
Guimarães, S
1998-01-01
Scientific fraud is not a problem exclusive to countries with high scientific development. Fraud does not necessarily mean invention of results, usurpation of ideas, manifest plagiarism or any other kind of serious scientific misconduct. Although more rare in countries where scientific production is more modest, pungent cases of scientific fraud also exist. However, less notorious cases of scientific misconduct are frequent and must be avoided. Examples of these less notorious sins are presented. The seriousness of scientific fraud is not only due to the fact that it may involve public funds, which could have been put to more useful purposes but, above all, because it violates scientific ethics and frustrates the final aim of science, the discovery of truth.
Fraud and plagiarisim in school and career.
Agud, J L
2014-10-01
Between 0% and 94% of university students acknowledge having committed academic fraud. Its forms are varied: cheating on examinations, submitting someone else's work, plagiarism, false citations, false reporting on experiments, tests or findings in the medical history and physical examination, unfair behavior toward fellow students, and many others. The consequences of academic fraud include learning corruption, useless efforts by students and faculty, incorrect performance evaluations and unfair selection for jobs. Since this can be a prelude to future fraud as doctors or researches, the prevalence, risk factors, motivations, clinical appearances, detection and prevention of the disease of academic fraud are here reviewed. Copyright © 2014 Elsevier España, S.L.U. All rights reserved.
Fraud and fiduciary liability.
Hodge, Brian Ray
2003-12-01
All employee benefit plans are potential targets of fraudulent schemes. Smaller plans are targeted by unscrupulous brokers and promoters selling fraudulent policies; plans large enough to be self-insured face greater risks of fraud by providers and participants misrepresenting claims. Plan trustees, administrators and consultants should be alert to the many ways fraudulent schemes manifest themselves and to the legal remedies available; establish investigative programs to detect and discourage fraud; and promote education and plan incentives for participants to report fraud.
Financial fraud and health: the case of Spain.
Zunzunegui, Maria Victoria; Belanger, Emmanuelle; Benmarhnia, Tarik; Gobbo, Milena; Otero, Angel; Béland, François; Zunzunegui, Fernando; Ribera-Casado, Jose Manuel
To examine whether financial fraud is associated with poor health sleeping problems and poor quality of life. Pilot study (n=188) conducted in 2015-2016 in Madrid and León (Spain) by recruiting subjects affected by two types of fraud (preferred shares and foreign currency mortgages) using venue-based sampling. Information on the monetary value of each case of fraud; the dates when subjects became aware of being swindled, lodged legal claim and received financial compensation were collected. Inter-group comparisons of the prevalence of poor physical and mental health, sleep and quality of life were carried according to type of fraud and the 2011-2012 National Health Survey. In this conventional sample, victims of financial fraud had poorer health, more mental health and sleeping problems, and poorer quality of life than comparable populations of a similar age. Those who had received financial compensation for preferred share losses had better health and quality of life than those who had not been compensated and those who had taken out foreign currency mortgages. The results suggest that financial fraud is detrimental to health. Further research should examine the mechanisms through which financial fraud impacts health. If our results are confirmed psychological and medical care should be provided, in addition to financial compensation. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Witnesses. 185.134 Section 185.134 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PROGRAM FRAUD CIVIL REMEDIES § 185.134 Witnesses. (a) Except as provided in paragraph (b) of this section, testimony at the hearing shall be given orally by witnesses under...
75 FR 50801 - Reverse Mortgage Products: Guidance for Managing Compliance and Reputation Risks
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-17
... stronger standards, particularly with respect to policies designed to avoid conflicts of interest. A... related to data collection on the volume of reverse mortgages, anti-fraud provisions, test design for the...' policies and procedures will be designed to ensure that brokers with whom they do business as agents also...
41 CFR 109-38.202-50 - Security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Security. 109-38.202-50....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area with restricted access to prevent possible fraud or misuse. Tags which are damaged or unusable will be...
Semi-Annual Report to Congress: April 1, 1980-September 30, 1980.
ERIC Educational Resources Information Center
Office of Inspector General (ED), Washington, DC.
EStablished in 1980 to help improve management effectiveness, the U.S. Department of Education's Office of Inspector General (OIG) is responsible for audit, investigative, fraud detection and prevention, and some security services for the Department. In this document--its first semi-annual report--the OIG first describes its organizational…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-17
... the Federal eRulemaking Portal. Follow the instructions online for submitting comments. Facsimile: If... online at http://www.regulations.gov . For further information on submitting comments see the ``Public... Complaints Under Section 806 of the Corporate and Criminal Fraud Accountability Act of 2002 (Title VIII of...
A Convergence of Corporate and Academic Governance
ERIC Educational Resources Information Center
Gee, Gordon
2006-01-01
One of the particular gifts in history for the present generation, is the increasingly large opportunity afforded to universities and corporations to be mutually supportive, not exploitative, of one another. As the federal Sarbanes-Oxley Act of 2002 has imposed new challenges on management of all stripes, this anti-corporate-fraud law also has…
Raising suspicions with the Food and Drug Administration: detecting misconduct.
Hamrell, Michael R
2010-12-01
The clinical Bioresearch Monitoring (BIMO) oversight program of the US Food and Drug Administration (FDA) assesses the quality and integrity of data submitted to the FDA for new product approvals and human subjects protection during clinical studies. A comprehensive program of on-site inspections and data verification, the BIMO program routinely performs random inspections to verify studies submitted to the FDA to support a marketing application. On occasion the FDA will conduct a directed inspection of a specific site or study to look for problems that may have previously been identified. The inspection of a clinical study sometimes uncovers evidence of research fraud or misconduct and it must be decided how to deal with the investigator and the suspect data. The prevention of [or] decreasing the incidence of fraud and misconduct through monitoring by the sponsor is one way to manage compliance issues and can help prevent misconduct. A training program is another way to manage compliance issues in clinical research. While training does not guarantee quality, it does help to ensure that all individuals involved understand the rules and the consequences of research misconduct.
Report #18-P-0181, May 15, 2018. After uncovering VW's emissions fraud, the EPA's light-duty vehicle compliance program added controls to effectively detect and prevent noncompliance—a precursor to potential fraud.
49 CFR 1540.103 - Fraud and intentional falsification of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Responsibilities of Passengers and Other Individuals and Persons § 1540.103 Fraud... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...
42 CFR 455.17 - Reporting requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.17 Reporting requirements. The agency must report the following fraud or abuse... complaints of fraud and abuse made to the agency that warrant preliminary investigation. (b) For each case of...
77 FR 32111 - Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
... or fraud, or harm to the security or integrity of this system or other systems or programs (whether... to comment. FCC/MB-2 System Name: Broadcast Station Public Inspection Files. Security Classification: The FCC's Security Operations Center (SOC) has not assigned a security classification to this system...
Implementing US-style anti-fraud laws in the Australian pharmaceutical and health care industries.
Faunce, Thomas A; Urbas, Gregor; Skillen, Lesley
2011-05-02
This article critically analyses the prospects for introducing United States anti-fraud (or anti-false claims) laws in the Australian health care setting. Australian governments spend billions of dollars each year on medicines and health care. A recent report estimates that the money lost to corporate fraud in Australia is growing at an annual rate of 7%, but that only a third of the losses are currently being detected. In the US, qui tam provisions - the component of anti-fraud or anti-false claims laws involving payments to whistleblowers - have been particularly successful in providing critical evidence allowing public prosecutors to recover damages for fraud and false claims made by corporations in relation to federal and state health care programs. The US continues to strengthen such anti-fraud measures and to successfully apply them to a widening range of areas involving large public investment. Australia still suffers from the absence of any comprehensive scheme that not only allows treble damages recovery for fraud on the public purse, but crucially supports such actions by providing financial encouragement for whistleblowing corporate insiders to expose evidence of fraud. Potential areas of application could include direct and indirect government expenditure on health care service provision, pharmaceuticals, medical devices, defence, carbon emissions compensation and tobacco-related illness. The creation in Australia of an equivalent to US anti-false claims legislation should be a policy priority, particularly in a period of financial stringency.
ERIC Educational Resources Information Center
Dessoff, Alan
2009-01-01
It's no surprise that school districts are as vulnerable to fraud as the private sector or any other segment of government. Crimes in districts include collusion with outside vendors who provide kickbacks to employees, misuse of district-issued credit cards, embezzlement of district funds, and theft of district property. "Fraud happens…
Fraud Education for Accounting Students.
ERIC Educational Resources Information Center
Peterson, Bonita K.
2003-01-01
Reports that limited fraud education takes place in accounting due to a crowded curriculum and misunderstanding of the extent of fraud. Suggests ways to develop content on the topic and provides a list of teaching materials (textbooks, workbooks, trade books, case materials, videos, and reference materials). (Contains 16 references.) (SK)
ERIC Educational Resources Information Center
Sauter, David M.
1998-01-01
It is surprisingly easy for today's students to change grades, falsify documents, or create bogus diplomas. Explores the extent of the problem and offers ideas on ways in which colleges can protect themselves and society from the consequences of educational fraud. Addresses staff training, distribution of information regarding fraud, and improving…
49 CFR 1522.3 - Fraud and intentional falsification of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS General § 1522.3 Fraud and intentional falsification...
76 FR 5212 - Employment and Training Administration
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... Collection for Internal Fraud and Overpayment Detection and Recovery Activities (OMB Control No. 1205-0187... of data on a revised form ETA 9000 that provides information about Internal Fraud and Overpayment...: I. Background The ETA 9000 is the only data source available on: (1) Instances of internal fraud...
When Good Money Goes Bad: True Stories of Contract Fraud at EPA
In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to contract fraud.
7 CFR 226.25 - Other provisions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... result of funds received under the Act. (e) Fraud penalty. Whoever embezzles, willfully misapplies, steals, or obtains by fraud any funds, assets, or property that are the subject of a grant or other form..., assets, or property have been embezzled, willfully misapplied, stolen, or obtained by fraud shall, if...
7 CFR 226.25 - Other provisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... result of funds received under the Act. (e) Fraud penalty. Whoever embezzles, willfully misapplies, steals, or obtains by fraud any funds, assets, or property that are the subject of a grant or other form..., assets, or property have been embezzled, willfully misapplied, stolen, or obtained by fraud shall, if...
7 CFR 225.18 - Miscellaneous administrative provisions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... receive approval from FNSRO. (g) Fraud penalty. Whoever embezzles, willfully misapplies, steals, or obtains by fraud any funds, assets, or property that are the subject of a grant or other form of... property have been embezzled, willfully misapplied, stolen or obtained by fraud shall, if such funds...
7 CFR 1580.504 - Fraud and recovery of overpayments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Fraud and recovery of overpayments. 1580.504 Section 1580.504 Agriculture Regulations of the Department of Agriculture (Continued) FOREIGN AGRICULTURAL SERVICE, DEPARTMENT OF AGRICULTURE TRADE ADJUSTMENT ASSISTANCE FOR FARMERS § 1580.504 Fraud and recovery...
32 CFR 516.62 - PFD and HQ USACIDC coordination.
Code of Federal Regulations, 2011 CFR
2011-07-01
... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.62 PFD and HQ... procurement fraud or corruption investigations being conducted by USACIDC and possible remedies. These... affected by a significant investigation of fraud or corruption that relates to DOD procurement activities...
When Good Money Goes Bad: True Stories of Grant Fraud at EPA
In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to grant fraud.
The company you keep: spreading effects of financial fraud on investor trust.
Bernet, Patrick Michael; Getzen, Thomas E
2007-01-01
Investor trust is valuable to health care organizations. Without it, they may face higher capital costs. This study explores recent cases of fraud and the appearance of impropriety by health care organizations, focusing on the manners in which trust was violated, the systems that allowed those violations, and the effects on financial markets. Increases in the incidence and scale of such transgressions may be harbingers of worse times ahead. This article examines how recent events have affected the cost of capital, and what health care organizations can do to avoid being judged by the company they keep.
78 FR 66709 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-06
...: Online Forms. SECURITY CLASSIFICATION: None. SYSTEM LOCATION: Federal Housing Finance Agency, 400 Seventh... or fraud, or harm to the security or integrity of this system or other systems or programs (whether... ``Photographic, Video, Voice, and Similar Files.'' The proposed new system, ``Online Forms'' (FHFA-22), will...
42 CFR 457.915 - Fraud detection and investigation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... and abuse cases. (2) Methods for investigating fraud and abuse cases that— (i) Do not infringe on legal rights of persons involved; and (ii) Afford due process of law. (b) State program integrity unit... implement procedures for referring suspected fraud and abuse cases to the State program integrity unit (if...
32 CFR 516.60 - Procurement fraud and irregularities programs at MACOMs.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Procurement fraud and irregularities programs at MACOMs. 516.60 Section 516.60 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption...
20 CFR 356.2 - Program Fraud Civil Remedies Act of 1986.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Program Fraud Civil Remedies Act of 1986. 356.2 Section 356.2 Employees' Benefits RAILROAD RETIREMENT BOARD ADMINISTRATIVE REMEDIES FOR FRAUDULENT CLAIMS OR STATEMENTS CIVIL MONETARY PENALTY INFLATION ADJUSTMENT § 356.2 Program Fraud Civil Remedies Act...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 1 2013-10-01 2013-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 1 2012-10-01 2012-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare Department of Health and Human Services REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
45 CFR 152.27 - Fraud, waste, and abuse.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...
42 CFR 455.21 - Cooperation with State Medicaid fraud control units.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 4 2010-10-01 2010-10-01 false Cooperation with State Medicaid fraud control units. 455.21 Section 455.21 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud...
17 CFR 32.9 - Fraud in connection with commodity option transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 32.9 Section 32.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.9 Fraud in connection with commodity...
17 CFR 33.10 - Fraud in connection with commodity option transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 33.10 Section 33.10 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF DOMESTIC EXCHANGE-TRADED COMMODITY OPTION TRANSACTIONS § 33.10 Fraud in...
49 CFR 1570.5 - Fraud and intentional falsification of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY GENERAL RULES § 1570.5 Fraud and intentional falsification of records. No person may make, cause to be...
Transcript Fraud and Handling Fraudulent Documents
ERIC Educational Resources Information Center
Ezell, Allen
2005-01-01
Transcript fraud is a common problem for colleges and universities, businesses, employers, governmental licensing boards, and other agencies, with some experiencing it more so than others. The only difference between a large and small institution is the volume of degree and transcript fraud it experiences. This article discusses the types and…
Consumer Fraud: An Empirical Perspective. Summary.
ERIC Educational Resources Information Center
Schubert, Jane G.; And Others
The American Institutes for Research (AIR) and the National Consumer Law Center (NCLC) studied consumer fraud and assessed possible intervention. Phase I produced an AIR description of the nature, scope, and characteristics of consumer fraud and an NCLC compilation of the laws and regulations which control it. In Phase II AIR developed…
32 CFR 516.60 - Procurement fraud and irregularities programs at MACOMs.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Procurement fraud and irregularities programs at MACOMs. 516.60 Section 516.60 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption...
Detecting Health Fraud in the Field of Learning Disabilities.
ERIC Educational Resources Information Center
Worrall, Russell S.
1990-01-01
This article discusses health fraud in special education. Psychopathology of health fraud, standards by which pseudoscience and quackery are defined, and the complexities of learning disorders are considered. A scale to determine whether an alternative therapy is reasonable is presented. Several popular therapies are used as examples. (Author/PB)
12 CFR 1805.812 - Fraud, waste and abuse.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Fraud, waste and abuse. 1805.812 Section 1805.812 Banks and Banking COMMUNITY DEVELOPMENT FINANCIAL INSTITUTIONS FUND, DEPARTMENT OF THE TREASURY..., waste and abuse. Any person who becomes aware of the existence or apparent existence of fraud, waste or...
Risk Factors: Colleges Look to Manage Threats Ranging from Fraud to Data Breaches
ERIC Educational Resources Information Center
Wills, Lisa M.
2011-01-01
When an individual hears the term risk, he/she usually thinks of the financial institutions whose mismanagement of risk was instrumental in causing the 2008 financial crash. But all organizations, including colleges and universities, face various types and levels of risk, which threaten to harm the institutions and their ability to fulfill their…
ERIC Educational Resources Information Center
Office of Inspector General (ED), Washington, DC.
The United States Department of Education (ED), Office of Inspector General (OIG), describes in its semiannual report its provisions for audit, investigation, fraud detection and prevention, as well as other activities. The first section reviews management improvement and preventive activities including recommended changes to legislation and…
41 CFR 102-38.290 - What types of payment may we accept?
Code of Federal Regulations, 2011 CFR
2011-01-01
... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What types of payment... PROPERTY Completion of Sale Payments § 102-38.290 What types of payment may we accept? You must adopt a payment policy that protects the Government against fraud. Acceptable payments include, but are not...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... description of the applicant's organizational structure, and the names of its executives, officers, members of.... Title: Structure and Practices of the Video Relay Service Program, Second Report and Order and Order, CG... prevent fraud and abuse, and ensure quality service, in the provision of Internet-based forms of...
41 CFR 105-70.036 - Post-hearing briefs.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Administration 70-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT OF 1986 § 105-70.036 Post-hearing briefs. The ALJ may require the parties to file post-hearing briefs. In any event, any party may file a post... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Post-hearing briefs. 105...
41 CFR 105-70.036 - Post-hearing briefs.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Administration 70-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT OF 1986 § 105-70.036 Post-hearing briefs. The ALJ may require the parties to file post-hearing briefs. In any event, any party may file a post... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Post-hearing briefs. 105...
41 CFR 105-70.036 - Post-hearing briefs.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administration 70-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT OF 1986 § 105-70.036 Post-hearing briefs. The ALJ may require the parties to file post-hearing briefs. In any event, any party may file a post... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Post-hearing briefs. 105...
41 CFR 105-70.036 - Post-hearing briefs.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Administration 70-IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT OF 1986 § 105-70.036 Post-hearing briefs. The ALJ may require the parties to file post-hearing briefs. In any event, any party may file a post... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Post-hearing briefs. 105...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
...), via fax at 202-395-5167 or via Internet at [email protected] and to Judith B. Herman, Federal Communications Commission, via the Internet at [email protected] . To submit your PRA... waste, fraud and abuse of the Universal Service Fund (USF or Fund). Among other things, the Lifeline...
Will Commodity Properties Affect Seller's Creditworthy: Evidence in C2C E-commerce Market in China
NASA Astrophysics Data System (ADS)
Peng, Hui; Ling, Min
This paper finds out that the credit rating level shows significant difference among different sub-commodity markets in E-commerce, which provides room for sellers to get higher credit rating by entering businesses with higher average credit level before fraud. In order to study the influence of commodity properties on credit rating, this paper analyzes how commodity properties affect average crediting rating through the degree of information asymmetry, returns and costs of fraud, credibility perception and fraud tolerance. Empirical study shows that Delivery, average trading volume, average price and complaint possibility have decisive impacts on credit performance; brand market share, the degree of standardization and the degree of imitation also have a relatively less significant effect on credit rating. Finally, this paper suggests that important commodity properties should be introduced to modify reputation system, for preventing credit rating arbitrage behavior where sellers move into low-rating commodity after being assigned high credit rating.
Crisis management can leave residual effects.
Margolis, G L; DeMuro, P R
1991-10-01
A healthcare organization that once suffered from poor financial performance may fail to correct recovery methods that can cause lingering legal and accounting problems. A crisis management style is prone to creating problems with an organization's debt structure, Medicare and Medicaid payment, tax issues, labor relations, licensing and accreditation, compliance with fraud and abuse rules, and accounting for charity care. After stabilizing a worrisome financial situation, a healthcare organization should conduct an internal audit to ensure that its legal and accounting practices remain above board.
Computer Security: The Human Element.
ERIC Educational Resources Information Center
Guynes, Carl S.; Vanacek, Michael T.
1981-01-01
The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)
Identification des objets et detection de leur alignement en utilisant la technologie RFID
NASA Astrophysics Data System (ADS)
Rahma, Zayoud
De nos jours, les vehicules motorises sont essentiels dans notre vie quotidienne, d'ou la necessite de leur approvisionnement en carburant. L'approvisionnement en carburant peut entrainer certains inconvenients, tels que: les files d'attente, la disponibilite non-continuelle du carburant et les fraudes. Les problemes d'attente et de disponibilite non-continuelle du carburant peuvent etre facilement resolus en allant a une autre station d'essence aux alentours si disponibles. Par contre le probleme de fraudes est plus difficile a resoudre. De ce fait, decoule notre solution qui consiste a developper un systeme intelligent pour la gestion d'approvisionnement en carburant afin de remedier a ce probleme de fraudes. Pour des raisons de surete, il faut eviter les risques d'etincelles dans l'environnement du carburant. En particulier, il convient de ne pas utiliser un systeme utilisant 1'electricite proche de la pompe, du tuyau ou du reservoir du carburant du vehicule. Nous avons choisi la technologie RFID (Radio Frequency IDentification) et avons opte pour l'utilisation des etiquettes passives, etant donne que les etiquettes semi-passives ou actives contiennent une batterie electrique et sont nettement plus cheres. Un vehicule motorise sera identifie avec une etiquette RFID passive collee au-dessus du goulot de son reservoir. Deux autres etiquettes RFID seront placees sur le pistolet de sorte que le flux du carburant ne sera autorise que lorsque les trois etiquettes sont alignees. Notre travail etait a la demande d'une entreprise petroliere ayant une chaine internationale de stations de carburant. Le travail consiste en la conception, par la recherche, du systeme requis et s'articule sur l'optimisation de la topologie des antennes et des etiquettes de sorte que le systeme juge qu'il y a alignement lorsque le bec du pistolet est fonce dans le goulot du reservoir, et par consequent autorise le versement du carburant. Dans tous les autres cas, le systeme doit juger qu'il n'y a pas alignement et par consequent le flux du carburant n'est pas autorise. Mots cles: RFID, identification, localisation, alignement, fraudes, station-service.
Elder Fraud and Financial Exploitation: Application of Routine Activity Theory.
DeLiema, Marguerite
2017-03-10
Elder financial exploitation, committed by individuals in positions of trust, and elder fraud, committed by predatory strangers, are two forms of financial victimization that target vulnerable older adults. This study analyzes differences between fraud and financial exploitation victims and tests routine activity theory as a contextual model for victimization. Routine activity theory predicts that criminal opportunities arise when a motivated offender and suitable target meet in the absence of capable guardians. Fifty-three financial exploitation and fraud cases were sampled from an elder abuse forensic center. Data include law enforcement and caseworker investigation reports, victim medical records, perpetrator demographic information, and forensic assessments of victim health and cognitive functioning. Fraud and financial exploitation victims performed poorly on tests of cognitive functioning and financial decision making administered by a forensic neuropsychologist following the allegations. Based on retrospective record review, there were few significant differences in physical health and cognitive functioning at the time victims' assets were taken, although their social contexts were different. Significantly more fraud victims were childless compared with financial exploitation victims. Fraud perpetrators took advantage of elders when they had no trustworthy friends or relatives to safeguard their assets. Findings support an adapted routine activity theory as a contextual model for financial victimization. Fraud most often occurred when a vulnerable elder was solicited by a financial predator in the absence of capable guardians. Prevention efforts should focus on reducing social isolation to enhance protection. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
32 CFR 516.67 - Overseas cases of fraud or corruption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Overseas cases of fraud or corruption. 516.67 Section 516.67 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas...
13 CFR 142.8 - What happens if program fraud is suspected?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What happens if program fraud is suspected? 142.8 Section 142.8 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION PROGRAM FRAUD... demanded in the false claim or statement; (5) Any exculpatory or mitigating circumstances that may relate...
Reducing Fraudulent Financial Reporting: An Expanded Role for Business Education in the 1990s.
ERIC Educational Resources Information Center
Urbancic, Frank R.
1988-01-01
The author reports findings of the National Commission on Fraudulent Financial Reporting concerning the role of business education in reducing fraud in financial reporting. Issues covered include teaching financial regulations, developing skills needed to detect fraud, teaching ethical values, and preparing faculty to teach about financial fraud.…
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 3 2010-10-01 2010-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
Code of Federal Regulations, 2010 CFR
2010-01-01
... does not apply to tax debts. (c) Part 1015 does not apply to claims between Federal agencies. Federal... 10 Energy 4 2010-01-01 2010-01-01 false Antitrust, fraud, tax, interagency, transportation account... General § 1015.103 Antitrust, fraud, tax, interagency, transportation account audit, acquisition contract...
20 CFR 410.699a - Penalties for fraud.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Penalties for fraud. 410.699a Section 410.699a Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969... Review, Finality of Decisions, and Representation of Parties § 410.699a Penalties for fraud. The penalty...
25 CFR 700.541 - Fraud or false statement in a Government matter.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 2 2010-04-01 2010-04-01 false Fraud or false statement in a Government matter. 700.541... RELOCATION PROCEDURES Employee Responsibility and Conduct § 700.541 Fraud or false statement in a Government..., applications for employment, personnel security forms, requests for travel reimbursement, client certification...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 2 2010-10-01 2010-10-01 false Fraud. 235.110 Section 235.110 Public Welfare... PROGRAMS § 235.110 Fraud. State plan requirements: A State plan under title I, IV-A, X, XIV, or XVI of the Social Security Act must provide: (a) That the State agency will establish and maintain: (1) Methods and...
42 CFR 1007.3 - Scope and purpose.
Code of Federal Regulations, 2010 CFR
2010-10-01
... STATE MEDICAID FRAUD CONTROL UNITS § 1007.3 Scope and purpose. This part implements sections 1903(a)(6), 1903(b)(3), and 1903(q) of the Social Security Act, as amended by the Medicare-Medicaid Anti-Fraud and... costs of establishing and operating a State Medicaid fraud control unit, as defined by the statute, for...
7 CFR 762.103 - Full faith and credit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.103 Full faith and credit. (a) Fraud and... States. The Agency may contest the guarantee only in cases of fraud or misrepresentation by a lender or holder, in which: (1) The lender or holder had actual knowledge of the fraud or misrepresentation at the...
Special Fraud Alert for Schools, Lenders, and Guarantee Agencies.
ERIC Educational Resources Information Center
Department of Education, Washington, DC.
Guidelines to prevent fraud and abuse in the government's student aid programs are presented for schools, lenders, and guarantee agencies. Student aid fraud is defined as intentional wrongful obtaining of student financial assistance (SFA) benefits through deceptive means. It is noted that falsification of eligibility is the most common form of…
42 CFR 1001.951 - Fraud and kickbacks and other prohibited activities.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 5 2010-10-01 2010-10-01 false Fraud and kickbacks and other prohibited activities... Permissive Exclusions § 1001.951 Fraud and kickbacks and other prohibited activities. (a) Circumstance for..., or (B) Imposition of a civil money penalty against others; or (iii) Alternative sources of the type...
26 CFR 301.6110-1 - Public inspection of written determinations and background file documents.
Code of Federal Regulations, 2011 CFR
2011-04-01
... section, relating to technical advice memoranda involving civil fraud and criminal investigations, and... section 6110(d)(3) and (f)(4). (2) Technical advice memoranda involving civil fraud and criminal... § 301.6110-2(f) involving any matter that is the subject of a civil fraud or criminal investigation, a...
42 CFR 1001.951 - Fraud and kickbacks and other prohibited activities.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 5 2011-10-01 2011-10-01 false Fraud and kickbacks and other prohibited activities... Permissive Exclusions § 1001.951 Fraud and kickbacks and other prohibited activities. (a) Circumstance for..., or (B) Imposition of a civil money penalty against others; or (iii) Alternative sources of the type...
45 CFR 149.41 - Consequences of Non-Compliance, Fraud, or Similar Fault.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Consequences of Non-Compliance, Fraud, or Similar Fault. 149.41 Section 149.41 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS... Eligible Employment-Based Plans § 149.41 Consequences of Non-Compliance, Fraud, or Similar Fault. Upon...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 3 2011-10-01 2011-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 3 2014-10-01 2014-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 3 2012-10-01 2012-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
45 CFR 681.5 - What happens if program fraud is suspected?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 3 2013-10-01 2013-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-08
...-fraud provisions, as well as exempt these security-based swaps from Exchange Act registration... interest involving security-based swaps.\\31\\ We have also proposed anti-fraud and anti-manipulation rules... Against Fraud, Manipulation, and Deception in Connection with Security-Based Swaps, Release No. 34-63236...
32 CFR 516.68 - Program Fraud Civil Remedies Act (PFCRA).
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Program Fraud Civil Remedies Act (PFCRA). 516.68 Section 516.68 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.68 Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-18
... business systems and internal controls are the first line of defense against waste, fraud, and abuse. Weak control systems increase the risk of unallowable and unreasonable costs on Government contracts. To...'s accounting system rather than the adequacy of the contractor's control environment and overall...
Employee theft and fraud: bigger than ever and getting worse.
2001-02-01
Fraud examiners and investigators say that employee theft is out of control, citing recent U.S. Chamber of Commerce figures that employees steal approximately $400 billion from businesses each year and an Ernst & Young survey showing that nearly 90% of organizations countrywide experienced some type of fraud in the 12 months prior to the survey. An additional undetermined amount is being reported lost because of external fraud committed by customers, vendors, and others having contact with a company or institution. Fraud experts interviewed for this report note that all sectors are targets--including retailers, hospitals and healthcare, the hotel industry, schools, and college campuses. In this report, we'll present the how's and whys of this development and also describe what one medical center is doing to stop thefts of medical equipment and computers.
NASA Astrophysics Data System (ADS)
Wilkinson, Timothy; Clarkson, John; White, Peter C.; Meakin, Nicholas; McDonald, Ken
2013-05-01
Governments often tax fuel products to generate revenues to support and stimulate their economies. They also subsidize the cost of essential fuel products. Fuel taxation and subsidization practices are both subject to fraud. Oil marketing companies also suffer from fuel fraud with loss of legitimate sales and additional quality and liability issues. The use of an advanced marking system to identify and control fraud has been shown to be effective in controlling illegal activity. DeCipher has developed surface enhanced Raman scattering (SERS) spectroscopy as its lead technology for measuring markers in fuel to identify and control malpractice. SERS has many advantages that make it highly suitable for this purpose. The SERS instruments are portable and can be used to monitor fuel at any point in the supply chain. SERS shows high specificity for the marker, with no false positives. Multiple markers can also be detected in a single SERS analysis allowing, for example, specific regional monitoring of fuel. The SERS analysis from fuel is also quick, clear and decisive, with a measurement time of less than 5 minutes. We will present results highlighting our development of the use of a highly stable silver colloid as a SERS substrate to measure the markers at ppb levels. Preliminary results from the use of a solid state SERS substrate to measure fuel markers will also be presented.
Report on inspection of compliance with DOE Order 2030.4B at the Savannah River Site
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1997-03-01
The purpose of this inspection was to evaluate contractor compliance at the Savannah River Site (SRS) with Department of Energy (DOE) Order 2030.4B, {open_quotes}Reporting Fraud, Waste, And Abuse To The Office Of Inspector General.{close_quotes} The specific objective was to determine if the SRS management and operating (M&O) contractors were complying with the requirements in Paragraph 6.c. of DOE Order 2030.4B. These requirements are: (1) annual notification to employees of their duty to report allegations of fraud, waste, abuse, corruption, or mismanagement; (2) display and publish the DOE Office of Inspector General (OIG) Hotline telephone number in common areas of buildings;more » (3) display and publish the DOE OIG Hotline number in telephone books and newsletters; and (4) notify the OIG cases referred to other law enforcement entities.« less
George, Stephen L; Buyse, Marc
2015-01-01
Highly publicized cases of fabrication or falsification of data in clinical trials have occurred in recent years and it is likely that there are additional undetected or unreported cases. We review the available evidence on the incidence of data fraud in clinical trials, describe several prominent cases, present information on motivation and contributing factors and discuss cost-effective ways of early detection of data fraud as part of routine central statistical monitoring of data quality. Adoption of these clinical trial monitoring procedures can identify potential data fraud not detected by conventional on-site monitoring and can improve overall data quality. PMID:25729561
The effects of loneliness on telemarketing fraud vulnerability among older adults.
Alves, Linda M; Wilson, Steve R
2008-01-01
Older adults are disproportionately affected by telemarketing fraud, especially those who are socially isolated. Twenty-eight older adult telemarketing fraud victims completed a questionnaire assessing loneliness and other variables related to telemarketing fraud vulnerability. Victims tended to be male, divorced/separated, and college-educated, between ages of 60 and 70. Age and marital status were significantly associated with loneliness. This study is an important first step for additional research in this area and may enhance the prevention and intervention efforts of social service providers who work with older adults who may be most vulnerable.
Blood recipient unable to recover damages based on fraud.
1995-05-05
A court ruled that [name removed] is unable to sue for fraud after acquiring HIV through a blood transfusion in 1982. [Name removed], who sued the hospital, her cardiologist, and two physicians, claimed she did not learn she had received a blood transfusion until after she was diagnosed with AIDS. She tested positive for HIV antibodies in March 1992 and was diagnosed with AIDS. The Supreme Court said a cause of action for actual fraud must be filed within six years from the date of the fraudulent act or two years from the date the plaintiff discovered the fraud.
The Role of Cognition, Personality, and Trust in Fraud Victimization in Older Adults
Judges, Rebecca A.; Gallant, Sara N.; Yang, Lixia; Lee, Kang
2017-01-01
Older adults are more at risk to become a victim of consumer fraud than any other type of crime (Carcach et al., 2001) but the research on the psychological profiles of senior fraud victims is lacking. To bridge this significant gap, we surveyed 151 (120 female, 111 Caucasian) community-dwelling older adults in Southern Ontario between 60 and 90 years of age about their experiences with fraud. Participants had not been diagnosed with cognitive impairment or a neurological disorder by their doctor and looked after their own finances. We assessed their self-reported cognitive abilities using the MASQ, personality on the 60-item HEXACO Personality Inventory, and trust tendencies using a scale from the World Values Survey. There were no demographic differences between victims and non-victims. We found that victims exhibit lower levels of cognitive ability, lower honesty-humility, and lower conscientiousness than non-victims. Victims and non-victims did not differ in reported levels of interpersonal trust. Subsequent regression analyses showed that cognition is an important component in victimization over and above other social factors. The present findings suggest that fraud prevention programs should focus on improving adults’ overall cognitive functioning. Further investigation is needed to understand how age-related cognitive changes affect vulnerability to fraud and which cognitive processes are most important for preventing fraud victimization. PMID:28450847
Quality monitored distributed voting system
Skogmo, David
1997-01-01
A quality monitoring system can detect certain system faults and fraud attempts in a distributed voting system. The system uses decoy voters to cast predetermined check ballots. Absent check ballots can indicate system faults. Altered check ballots can indicate attempts at counterfeiting votes. The system can also cast check ballots at predetermined times to provide another check on the distributed voting system.
48 CFR 203.070 - Reporting of violations and suspected violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL..., Coordination of Remedies for Fraud and Corruption Related to Procurement Activities: (a) Certificate of...
13 CFR 142.2 - What kind of conduct will result in program fraud enforcement?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What kind of conduct will result in program fraud enforcement? 142.2 Section 142.2 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES ACT REGULATIONS Overview and Definitions § 142.2 What kind of conduct...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Antitrust, fraud, exception in the account of an accountable official, and interagency claims excluded. 30.3 Section 30.3 Public Welfare DEPARTMENT OF HEALTH... antitrust violations or fraud. (1) The standards in this part relating to compromise, suspension, and...
31 CFR 900.3 - Antitrust, fraud, and tax and interagency claims excluded.
Code of Federal Regulations, 2010 CFR
2010-07-01
... apply to tax debts. (c) Parts 900-904 of this chapter do not apply to claims between Federal agencies... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Antitrust, fraud, and tax and...) SCOPE OF STANDARDS § 900.3 Antitrust, fraud, and tax and interagency claims excluded. (a) The standards...
17 CFR 240.15c1-2 - Fraud and misrepresentation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Fraud and misrepresentation. 240.15c1-2 Section 240.15c1-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Securities Exchange Act of 1934 Rules Relating to Over-The-Counter Markets § 240.15c1-2 Fraud and...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with the clearing of transactions on a derivatives clearing organization. 39.7 Section 39.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.7 Fraud in connection...
43 CFR 20.510 - Fraud or false statements in a Government matter.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Fraud or false statements in a Government matter. 20.510 Section 20.510 Public Lands: Interior Office of the Secretary of the Interior EMPLOYEE RESPONSIBILITIES AND CONDUCT Other Employee Conduct Provisions § 20.510 Fraud or false statements in a Government...
43 CFR 20.510 - Fraud or false statements in a Government matter.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Fraud or false statements in a Government matter. 20.510 Section 20.510 Public Lands: Interior Office of the Secretary of the Interior EMPLOYEE RESPONSIBILITIES AND CONDUCT Other Employee Conduct Provisions § 20.510 Fraud or false statements in a Government...
Criminal Intent with Property: A Study of Real Estate Fraud Prediction and Detection
ERIC Educational Resources Information Center
Blackman, David H.
2013-01-01
The large number of real estate transactions across the United States, combined with closing process complexity, creates extremely large data sets that conceal anomalies indicative of fraud. The quantitative amount of damage due to fraud is immeasurable to the lives of individuals who are victims, not to mention the financial impact to…
Prince, Anya E R
2016-01-01
Many genetic counselors recommend that individuals secure desired insurance policies, such as life insurance, prior to undergoing predictive genetic testing. It has been argued, however, that this practice is "tantamount to fraud" and that failure to disclose genetic test results, or conspiring to secure a policy before testing, opens an individual up to legal recourse. This debate traps affected individuals in a Catch-22. If they apply for life insurance and disclose a genetic test result, they may be denied. If they apply without disclosing the information, they may have committed fraud. The consequences of life insurance fraud are significant: If fraud is found on an application, a life insurer can rescind the policy, in some cases even after the individual has passed away. Such a rescission could leave family members or beneficiaries without the benefits of the life insurance policy payment after the individual's death and place them in in economic difficulty. Although it is clear that lying in response to a direct question about genetic testing would be tantamount to fraud, few, if any, life insurance applications currently include broad questions about genetic testing. This paper investigates whether non-disclosure of unasked for genetic information constitutes fraud and explores varying types of insurance questions that could conceivably be interpreted as seeking genetic information. Life insurance applicants generally have no duty to disclose unasked for information, including genetic information, on an application. However, given the complexities of genetic information, individuals may be exposed to fraud and rescission of their life insurance policy despite honest attempts to truthfully and completely answer all application questions.
Field experiment estimate of electoral fraud in Russian parliamentary elections
Enikolopov, Ruben; Korovkin, Vasily; Petrova, Maria; Sonin, Konstantin; Zakharov, Alexei
2013-01-01
Electoral fraud is a widespread phenomenon, especially outside the developed world. Despite abundant qualitative and anecdotal evidence on its existence from around the world, there is very limited quantitative evidence on the extent of electoral fraud. We exploit random assignment of independent observers to 156 of 3,164 polling stations in the city of Moscow to estimate the effect of electoral fraud on the outcome of the Russian parliamentary elections held on December 4, 2011. We estimate the actual share of votes for the incumbent United Russia party to be at least 11 percentage points lower than the official count (36% instead of 47%). Our results suggest that the extent of the fraud was sufficient to have had a substantial impact on the outcome of the elections; they also confirm that the presence of observers is an important factor in ensuring the integrity of the procedure. PMID:23267093
ERIC Educational Resources Information Center
Baier, Eric; Dupraz, Laure
2007-01-01
How have university institutions generally tackled the fight against scientific fraud? We intend to throw light on the very process of public disclosure of scientific fraud, as it has transformed in the last 30 years within the framework of scientific research institutions. By focusing our analysis on the "denunciation process", we intend to refer…
38 CFR 1.902 - Antitrust, fraud, and tax and interagency claims.
Code of Federal Regulations, 2010 CFR
2010-07-01
....900 through 1.953 do not apply to tax debts. (c) Sections 1.900 through 1.953 do not apply to claims... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Antitrust, fraud, and tax... Collection Effort, and Referral of Civil Claims for Money Or Property § 1.902 Antitrust, fraud, and tax and...
Training for Success: A Comparison of Anti-Fraud Knowledge Competencies
2014-12-01
fraud, money laundering , and tax fraud. The section on punishing offenders contains two competencies: criminal prosecutions and the civil justice...investigations (Kittay, 2011). Money laundering investigations focus on the various methods individuals use to conceal proceeds earned from criminal ...Chartered Accowltants Cet·tified Anti - Money CAMS The Association of Cettified Laundering Specialist Anti - Money Latmdering Specialists Certified
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in or in connection with... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.1 Fraud in or in connection with transactions in foreign currency subject to the...
ERIC Educational Resources Information Center
Reinert, Gregory J.
2010-01-01
Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay's reported negative feedback rate of less than 1%. The…
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Accounting and Financial Management Div.
At the request of Senator William Roth, Jr., the General Accounting Office (GAO) reviewed Medicare and Medicaid fraud investigations that agency inspectors general referred to the Department of Justice for prosecution to identify characteristics of alleged fraud against the government and to determine actions taken against those caught defrauding…
Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge Assessment
2015-04-30
ååì~ä=^Åèìáëáíáçå= oÉëÉ~êÅÜ=póãéçëáìã= qÜìêëÇ~ó=pÉëëáçåë= sçäìãÉ=ff= = Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge...DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge...capable processes, and effective internal controls result in the DoD having a higher level of vulnerability for procurement fraud (Rendon & Rendon, in
Kerr, Joseph
2015-01-01
Dentists have much invested in their practices. They need to protect their practices from fraud and noncompliance. The author provides practical suggestions for how to significantly reduce the risk of fraud and theft in the practice without disrupting day-to-day operations. By adhering to nonintrusive policy and procedure changes, dental practice owners can reduce inherent risks of fraud and theft, while increasing financial and human resource knowledge regarding their practice. Practice owners with the appropriate policies and procedures benefit from significantly lower risk of loss from fraud and theft. Furthermore, they have a better understanding of their practice's finances and human resources. Copyright © 2015 American Dental Association. Published by Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Petronijević, R. B.; Velebit, B.; Baltić, T.
2017-09-01
Intentional modification of food or substitution of food ingredients with the aim of gaining profit is food fraud or economically motivated adulteration (EMA). EMA appeared in the food supply chain, and following the global expansion of the food market, has become a world-scale problem for the global economy. Food frauds have involved oils, milk and meat products, infant formula, honey, juices, spices, etc. New legislation was enacted in the last decade in order to fight EMA. Effective analytical methods for food fraud detection are few and still in development. The majority of the methods in common use today for EMA detection are time consuming and inappropriate for use on the production line or out of the laboratory. The next step in the evolution of analytical techniques to combat food fraud is development of fast, accurate methods applicable using portable or handheld devices. Spectrophotometric and spectroscopic methods combined with chemometric analysis, and perhaps in combination with other rapid physico-chemical techniques, could be the answer. This review discusses some analytical techniques based on spectrophotometry and spectroscopy, which are used to reveal food fraud and EMA.
Burnes, David; Henderson, Charles R; Sheppard, Christine; Zhao, Rebecca; Pillemer, Karl; Lachs, Mark S
2017-08-01
The financial exploitation of older adults was recently recognized by the Centers for Disease Control and Prevention as a serious public health problem. Knowledge of the prevalence of elder financial exploitation is mostly limited to the category of financial abuse, which occurs in relationships involving an expectation of trust. Little is known about the other major category of elder financial exploitation-elder financial fraud and scams, which is perpetrated by strangers. A valid estimate of elder financial fraud-scam prevalence is necessary as a foundation for research and prevention efforts. To estimate the prevalence of elder financial fraud-scam victimization in the United States based on a systematic review and meta-analysis. Multiple investigators independently screened titles and abstracts and reviewed relevant full-text records from PubMed, Medline, PsycINFO, Criminal Justice Abstracts, Social Work Abstracts, and AgeLine databases. To maximize the validity and generalizability of prevalence estimation, we restricted eligibility to general population-based studies (English speaking, 1990 onward) using state- or national-level probability sampling and collecting data directly from older adults. Information on elder financial fraud-scam prevalence and study-level characteristics was extracted independently by 2 investigators. Meta-analysis of elder financial fraud-scam prevalence used generalized mixed models with individual studies as levels of a random classification factor. We included 12 studies involving a total of 41 711 individuals in the meta-analysis. Overall pooled elder financial fraud-scam prevalence (up to 5-year period) across studies was 5.6% (95% confidence interval [CI] = 4.0%, 7.8%), with a 1-year period prevalence of 5.4% (95% CI = 3.2%, 7.6%). Studies using a series of questions describing specific fraud-scam events to measure victimization found a significantly higher prevalence (7.1%; 95% CI = 4.8%, 9.4%) than studies using a single, general-question self-report assessment approach (3.6%; 95% CI = 1.8%, 5.4%). Elder financial fraud and scams is a common problem, affecting approximately 1 of every 18 cognitively intact, community-dwelling older adults each year; it requires further attention from researchers, clinicians, and policymakers. Elder financial fraud-scam prevalence findings in this study likely underestimate the true population prevalence. We provide methodological recommendations to limit older adult participation and reporting bias in future population-based research. Public Health Implications. Elder financial exploitation victimization is associated with mortality, hospitalization, and poor physical and mental health. Health care professionals working with older adults likely routinely encounter patients who are fraud-scam victims. Validation of instruments to screen for elder financial fraud and scams in clinical settings is an important area of future research. Without effective primary prevention strategies, the absolute scope of this problem will escalate with the growing population of older adults.
Quality monitored distributed voting system
Skogmo, D.
1997-03-18
A quality monitoring system can detect certain system faults and fraud attempts in a distributed voting system. The system uses decoy voters to cast predetermined check ballots. Absent check ballots can indicate system faults. Altered check ballots can indicate attempts at counterfeiting votes. The system can also cast check ballots at predetermined times to provide another check on the distributed voting system. 6 figs.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-11
... property interests, identity theft or fraud, or harm to the security or integrity of this system, then the... System (IDIS). System Location: Online at http://www.hud.gov/offices/cpd/systems/idis/idis.cfm... Information (PII) is not being released. If the Department suspects or has confirmed that the security or...
ERIC Educational Resources Information Center
Ten Napel, Karmen
2013-01-01
Available data indicate that colleges and universities have experienced an unexpected rise in occupational fraud over the past two decades. In order to mitigate the risk of fraud, these institutions must be proactive and have strong internal controls and policies. The purpose of this study was to examine the current controls in place at Midwest…
Fortin-Rittberger, Jessica; Harfst, Philipp; Dingler, Sarah C.
2017-01-01
ABSTRACT Previous research has shown that voters’ perception of electoral fairness has an impact on their attitudes and behaviors. However, less research has attempted to link objective measurements of electoral integrity on voters’ attitudes about the democratic process. Drawing on data from the Comparative Study of Electoral Systems and the Quality of Elections Data, we investigate whether cross-national differences in electoral integrity have significant influences on citizens’ level of satisfaction with democracy. We hypothesize that higher levels of observed electoral fraud will have a negative impact on evaluations of the democratic process, and that this effect will be mediated by a respondent’s status as a winner or loser of an election. The article’s main finding is that high levels of electoral fraud are indeed linked to less satisfaction with democracy. However, we show that winning only matters in elections that are conducted in an impartial way. The moment elections start to display the telltale signs of manipulation and malpractice, winning and losing no longer have different effects on voter’s levels of satisfaction with democracy. PMID:28824703
Fortin-Rittberger, Jessica; Harfst, Philipp; Dingler, Sarah C
2017-07-03
Previous research has shown that voters' perception of electoral fairness has an impact on their attitudes and behaviors. However, less research has attempted to link objective measurements of electoral integrity on voters' attitudes about the democratic process. Drawing on data from the Comparative Study of Electoral Systems and the Quality of Elections Data, we investigate whether cross-national differences in electoral integrity have significant influences on citizens' level of satisfaction with democracy. We hypothesize that higher levels of observed electoral fraud will have a negative impact on evaluations of the democratic process, and that this effect will be mediated by a respondent's status as a winner or loser of an election. The article's main finding is that high levels of electoral fraud are indeed linked to less satisfaction with democracy. However, we show that winning only matters in elections that are conducted in an impartial way. The moment elections start to display the telltale signs of manipulation and malpractice, winning and losing no longer have different effects on voter's levels of satisfaction with democracy.
Neural fraud detection in credit card operations.
Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S
1997-01-01
This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.
Misconduct accounts for the majority of retracted scientific publications
Fang, Ferric C.; Steen, R. Grant; Casadevall, Arturo
2012-01-01
A detailed review of all 2,047 biomedical and life-science research articles indexed by PubMed as retracted on May 3, 2012 revealed that only 21.3% of retractions were attributable to error. In contrast, 67.4% of retractions were attributable to misconduct, including fraud or suspected fraud (43.4%), duplicate publication (14.2%), and plagiarism (9.8%). Incomplete, uninformative or misleading retraction announcements have led to a previous underestimation of the role of fraud in the ongoing retraction epidemic. The percentage of scientific articles retracted because of fraud has increased ∼10-fold since 1975. Retractions exhibit distinctive temporal and geographic patterns that may reveal underlying causes. PMID:23027971
ERIC Educational Resources Information Center
McAllum, Kirstie
2016-01-01
Millennial students often exhibit symptoms of imposter syndrome or a deep-seated insecurity that one is not sufficiently capable of carrying out the task at hand, often masking their anxiety of being exposed as intellectual frauds through what Pedler (2011) calls "over-compensating" or "fronting it out" (p. 90). Millennial…
TRICARE; TRICARE sanction authority for third-party billing agents. Final rule.
2013-02-26
This final rule will provide the Director, TRICARE Management Activity (TMA), or designee, with the authority to sanction third-party billing agents by invoking the administrative remedy of exclusion or suspension from the TRICARE program. Such sanctions may be invoked in situations involving fraud or abuse on the part of third-party billing agents that prepare or submit claims presented to TRICARE for payment.
75 FR 29548 - Privacy Act of 1974; Notice of New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... maintained behind a firewall certified by the National Computer Security Association. RETENTION AND DISPOSAL... agencies, entities when (1) the Agency suspects or has confirmed that the security or confidentiality of..., identity theft or fraud, or harm to the security or integrity or this system or other systems or programs...
76 FR 20986 - Privacy Act of 1974; Notice of New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... but are not limited to: name, social security number, addresses, phone numbers, e- mail address, birth... persons when (1) the Agency suspects or has confirmed that the security or confidentiality of information... or fraud, or harm to the security or integrity of this system or other systems or programs (whether...
76 FR 24085 - Privacy Act of 1974, as Amended; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-29
... property interests, identity theft or fraud, or harm to the security or integrity of this system or other... system also simplifies the FOIA/PA request process by allowing requesters to submit requests online. This... allows for online submissions by a requester. The language under ``Safeguards'' has been updated to...
Everstine, Karen; Abt, Eileen; McColl, Diane; Popping, Bert; Morrison-Rowe, Sara; Lane, Richard W; Scimeca, Joseph; Winter, Carl; Ebert, Andrew; Moore, Jeffrey C; Chin, Henry B
2018-01-01
Food fraud, the intentional misrepresentation of the true identity of a food product or ingredient for economic gain, is a threat to consumer confidence and public health and has received increased attention from both regulators and the food industry. Following updates to food safety certification standards and publication of new U.S. regulatory requirements, we undertook a project to (i) develop a scheme to classify food fraud-related adulterants based on their potential health hazard and (ii) apply this scheme to the adulterants in a database of 2,970 food fraud records. The classification scheme was developed by a panel of experts in food safety and toxicology from the food industry, academia, and the U.S. Food and Drug Administration. Categories and subcategories were created through an iterative process of proposal, review, and validation using a subset of substances known to be associated with the fraudulent adulteration of foods. Once developed, the scheme was applied to the adulterants in the database. The resulting scheme included three broad categories: 1, potentially hazardous adulterants; 2, adulterants that are unlikely to be hazardous; and 3, unclassifiable adulterants. Categories 1 and 2 consisted of seven subcategories intended to further define the range of hazard potential for adulterants. Application of the scheme to the 1,294 adulterants in the database resulted in 45% of adulterants classified in category 1 (potentially hazardous). Twenty-seven percent of the 1,294 adulterants had a history of causing consumer illness or death, were associated with safety-related regulatory action, or were classified as allergens. These results reinforce the importance of including a consideration of food fraud-related adulterants in food safety systems. This classification scheme supports food fraud mitigation efforts and hazard identification as required in the U.S. Food Safety Modernization Act Preventive Controls Rules.
Family medical leave--management strategies.
Morris, Judy A; Strasser, Patricia B
2004-12-01
Employers are recognizing the impact of lost productivity on total benefit costs. In a recent report based on 2002 benefit data, lost productivity represented 71% of the full cost of health/absence benefits (Integrated Benefits Institute, 2004). Occupational health nurse managers can develop FMLA leave management policies and programs to assure that leave is provided when appropriate, to help curb FMLA abuse and fraud, and to assist employers in defending adverse employment actions based on attendance. A review of employer policies and FMLA implementation also assesses compliance with the Act and provides the basis for appropriate responses in the case of legal actions and employee complaints to the U.S. Department of Labor.
Doctors aren't immune to theft and fraud
Marcus, Gary
1995-01-01
A chartered accountant says the problem of fraud within medical practices is far from rare, even though prevention is relatively simple. Gary Marcus provides advice to physicians about ways to spot fraud within their practices and things they can do to prevent it. No matter how small your practice or how long you have had the same employees, says Marcus, given the right circumstances anyone might steal from you. Imagesp940-a PMID:7697586
Joint Contingency Contracting: Improving Through Ethics
2009-05-04
sound ethical decisions. In order to avoid fraud, bribery , contractor kickbacks, or even any perception of activity that may not be in line with...avoid fraud, bribery , contractor kickbacks, or even any perception of activity that may not be in line with the proper use of U.S. Government funds, it...Efforts and Investments, released 11 Mar 2007. 1 INTRODUCTION Hardly a week goes by without a breaking news story dealing with fraud, bribery
76 FR 1507 - Departmental Offices; Privacy Act of 1974, as Amended
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-10
... governmental, Tribal, self-regulatory or professional organizations if that organization has jurisdiction over... or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether...
32 CFR 516.4 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... other attorneys designated by the Chief will represent DA in all procurement fraud and corruption... procurement fraud and corruption. (o) Chief, Environmental Law Division, USALSA. The Chief, Environmental Law...
CHIPS. Volume 29, Issue 1, January - March 2011
2011-03-01
services, like electricity, heating or cable television. Bank/Finance Fraud: • They may create counterfeit checks using their victim’s name or...consolidating disparate, stove- piped networks into a single, modern, cost-effective enterprise network with a high level of service that meets...Holland, NGEN program manager. “If NMCI is not the most secure network in the world, it is certainly close. There is no shortfall flexibility
Forensic Information Warfare Requirement Study
2002-06-01
technologies that are taking place now and in the near future that will adversely impact the current technologies and require additional sophistication...WetStone Technologies, Inc. moderated a panel at the Economic Crime Investigation Institute’s Ninth Annual Conference (Fraud Management in the Twenty-First...second, to ascertain the legal impact of these tools. Their report was delivered to AFRL and provides an in-depth look into these areas. 8 Computer
76 FR 59733 - Privacy Act of 1974, as Amended; Notice To Amend an Existing System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-27
... name, alias, address, date of birth, social security number, blood degree, enrollment/BIA number, date... suspected or confirmed compromise there is a risk of harm to economic or property interest, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs whether...
Securing insurance protection against fraud and abuse liability.
Callison, S
1999-07-01
Healthcare organizations concerned about corporate compliance need to review securing appropriate insurance coverage as part of their corporate compliance program. Provider organizations often mistakenly expect that their directors and officers liability (D&O), malpractice, or standard errors and omissions (E&O) insurance policies will cover the cost of Medicare fraud and abuse fines. The insurance industry has developed a specific billing E&O insurance product to cover providers that run afoul of government fraud and abuse statutes.
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2014 CFR
2014-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2012 CFR
2012-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2011 CFR
2011-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2013 CFR
2013-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
National Health Care Anti-Fraud Association
... a Glance Pre-Conference Programs Conference Sessions Registration Hotel & Travel Information Conference Tracks Credit Opportunities Anti-Fraud Expo Sponsors Programs Budget Adequately for 2018 Trainings NETS Webinars Launch Webinar ...
Study on supply chain management in tourism e-commerce
NASA Astrophysics Data System (ADS)
Hu, Yaodong; Wu, Shuyan; Ma, Haiyan
2009-07-01
On-line customer research has been conducted for European and American markets by marketers and academics. Whilst e-Commerce and tourism develop rapidly in China, and the fraud information in E-commerce market makes the conditions of information asymmetry becoming more seriously, understanding of Chinese internet travelers is required. This paper reviews current research on supply chain management (SCM) within the context of tourism. SCM in the manufacturing industry has attracted widespread research interest over the past two decades, whereas studies of SCM in the tourism e-commerce are very limited. The potential benefit of considering not only individual enterprises but also the tourism value chain becomes evident. This paper presents the model e-market structure and process analysis of tourism e-commerce, and also sets up tourism supply chain and tourism e-commerce system to probe how to apply tourism ecommerce to promote the sustainable development of tourism. The paper also identifies key research questions in TSCM worthy of future theoretical and empirical exploration.
32 CFR 516.63 - Coordination with DOJ.
Code of Federal Regulations, 2011 CFR
2011-07-01
... PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.63 Coordination with DOJ... significant fraud and corruption cases to accomplish the following: (1) Monitor criminal prosecutions. (2...
... of Seized Property Submit a Complaint Report Waste, Fraud, Abuse or Misconduct Find a Form Register, Apply ... Preparer Sentenced to Prison For Tax and Bankruptcy Fraud Thursday, November 16, 2017 Assistant Attorney General Makan ...
27 CFR 19.561 - Losses in general.
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate TTB officer finds that the theft occurred without connivance, collusion, fraud or negligence on..., collusion, fraud, or negligence on the part of the proprietor, owner, consignor, consignee, bailee, or...
What Is It All For? A Conversation With Jonathan Kozol
ERIC Educational Resources Information Center
Journal of Current Social Issues, 1976
1976-01-01
The main complaint with the current educational system in the U.S. is that public schools are classic examples of consumer fraud in the most literal sense--false labels, half empty packages, and dangerous contents. (Author/AM)
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC.
The Government Accounting Office (GAO) conducted an examination of patterns and causes of fraud in Comprehensive Employment and Training Act (CETA) programs to determine how implementation of Job Training Partnership Act (JTPA) programs might be made less vulnerable to exploitation. GAO's investigation found that fraud and abuse in CETA programs…
Using support vector machines to detect medical fraud and abuse.
Francis, Charles; Pepper, Noah; Strong, Homer
2011-01-01
This paper examines the architecture and efficacy of Quash, an automated medical bill processing system capable of bill routing and abuse detection. Quash is designed to be used in conjunction with human auditors and a standard bill review software platform to provide a complete cost containment solution for medical claims. The primary contribution of Quash is to provide a real world speed up for medical fraud detection experts in their work. There will be a discussion of implementation details and preliminary experimental results. In this paper we are entirely focused on medical data and billing patterns that occur within the United States, though these results should be applicable to any financial transaction environment in which structured coding data can be mined.
WNP-2, securities fraud investigation are fired up
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1984-03-01
Washington's WNP-2 nuclear plant faces a securities fraud investigation just as it is ready to start operating on schedule. The investigation's outcome and WNP-2's performance will determine whether WNP-1 and WNP-3 will be financed. Angry bondholders who did not receive interest on their investments in January prompted Congressional hearings, at which it was learned that institutional buyers had pulled out of the Washington Public Power Supply System project and unloaded the bonds on thousands of unsuspecting individuals for whom tax-free municipal bonds are inappropriate. Securities Exchange Commission investigators will focus on the initial offering and disclosure by the issuer tomore » determine if the Wall Street unloading was legal. (DCK)« less
Food fraud and the perceived integrity of European food imports into China.
Kendall, H; Naughton, P; Kuznesof, S; Raley, M; Dean, M; Clark, B; Stolz, H; Home, R; Chan, M Y; Zhong, Q; Brereton, P; Frewer, L J
2018-01-01
Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase "authentic" European products using structural equation modelling. Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed 'risk-relieving' strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Targeted communication of authenticity assurance measures, including; regulations; enforcement; product testing; and actions taken by industry may improve Chinese consumer trust in the domestic food supply chain and reduce consumer concerns regarding the food safety risks associated with food fraud. To support product differentiation and retain prestige, European food manufactures operating within the Chinese market should recognise regional disparities in consumer risk perceptions regarding food fraud and the importance of personal risk mitigation strategies adopted by Chinese consumers to support the identification of authentic products.
Food fraud and the perceived integrity of European food imports into China
Raley, M.; Dean, M.; Clark, B.; Stolz, H.; Home, R.; Chan, M. Y.; Zhong, Q.; Brereton, P.; Frewer, L. J.
2018-01-01
Background/Aims Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. Methods A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase “authentic” European products using structural equation modelling. Results Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed ‘risk-relieving’ strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Conclusions Targeted communication of authenticity assurance measures, including; regulations; enforcement; product testing; and actions taken by industry may improve Chinese consumer trust in the domestic food supply chain and reduce consumer concerns regarding the food safety risks associated with food fraud. To support product differentiation and retain prestige, European food manufactures operating within the Chinese market should recognise regional disparities in consumer risk perceptions regarding food fraud and the importance of personal risk mitigation strategies adopted by Chinese consumers to support the identification of authentic products. PMID:29791434
76 FR 45763 - Privacy Act of 1974, as Amended
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-01
... the suspected or confirmed compromise, there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs..., minimize, or remedy such harm; (2) Another Federal or state agency to: (a) Permit a decision as to access...
System for Delivering Student Aid Is Flawed, Many Agree, But What's the Solution?
ERIC Educational Resources Information Center
Burd, Stephen
1997-01-01
Public officials and student aid experts agree that the federal program delivery system is outdated, inefficient, and vulnerable to fraud, but they disagree on how bad the situation is and whether the Education Department has the structure necessary to fix it. A 1995 project to integrate all federal grant and loan programs into one system has not…
76 FR 42469 - Conditions of Guarantee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-19
... be liable for payments made by USDA to any holder in the event of ``material fraud, negligence or misrepresentation by the lender or the lender's participation in or condoning of such material fraud, negligence or...
76 FR 42593 - Conditions of Guarantee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-19
... be liable for payments made by USDA to any holder in the event of ``material fraud, negligence or misrepresentation by the lender or the lender's participation in or condoning of such material fraud, negligence or...
Podcast: Scientific Integrity and Lab Fraud
Nov 25, 2015. Dr. Bruce Woods, a chemist in the Electronic Crimes Division within the OIG’s Office of Investigations discusses his recent webinar for the Association of Public Health Laboratories on lab fraud.
Vuckovic-Dekic, L; Gavrilovic, D; Kezic, I; Bogdanovic, G; Brkic, S
2011-01-01
To assess the knowledge of basic principles of responsible conduct of research and attitude toward the violations of good scientific practice among graduate biomedical students. A total of 361 subjects entered the study. The study group consisted mainly of graduate students of Medicine (85%), and other biomedical sciences (15%). Most participants were on PhD training or on postdoctoral training. A specially designed anonymous voluntary multiple-choice questionnaire was distributed to them. The questionnaire consisted of 43 questions divided in 7 parts, each aimed to assess the participants' previous knowledge and attitudes toward ethical principles of science and the main types of scientific fraud, falsification, fabrication of data, plagiarism, and false authorship. Although they considered themselves as insufficiently educated on science ethics, almost all participants recognized all types of scientific fraud, qualified these issues as highly unethical, and expressed strong negative attitude toward them. Despite that, only about half of the participants thought that superiors-violators of high ethical standards of science deserve severe punishment, and even fewer declared that they would whistle blow. These percentages were much greater in cases when the students had personally been plagiarized. Our participants recognized all types of scientific fraud as violation of ethical standards of science, expressed strong negative attitude against fraud, and believed that they would never commit fraud, thus indicating their own high moral sense. However, the unwillingness to whistle blow and to punish adequately the violators might be characterized as opportunistic behavior.
ERIC Educational Resources Information Center
Gambler, Rebecca
2012-01-01
As of January 2012, more than 850,000 active foreign students were in the United States enrolled at over 10,000 U.S. schools. ICE, within DHS, is responsible for managing SEVP and certifying schools to accept foreign students. GAO was asked to review ICE's fraud prevention and detection procedures for SEVP. This report examines the extent to which…
ERIC Educational Resources Information Center
Calbom, Linda
This testimony summarizes a report generated by the U.S. General Accounting Office concerned with internal control problems found in the U.S. Department of Education. Significant internal control weaknesses in the U.S. Department of Education's payment processes and poor physical control over its computer assets made the department vulnerable to…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1987-01-01
The Economic Opportunity Research Institute (EORI) sponsored a national Roundtable on ''Prevention of Fraud and Abuse in Low Income Weatherization Programs'' in Washington, DC on March 23-24, 1987. Funding for the Roundtable and these Proceedings was provided jointly by the US Departments of Health and Human Services/Office of Family Assistance and Energy through Grant FG01-85CE63438. The purpose of the Roundtable was two-fold: (1) to share successful and possible replicable state and local measures to prevent fraud and abuse in low income conservation programs; and (2) to identify any areas in these programs where the potential for fraud and abuse maymore » exist and examine methods to curb such potential. A Task Force representing eight states and including both state and local low income conservation program operators was chosen by EORI and the HHS Office of Family Assistance. The Agencies represented had developed successful preventive approaches to curbing fraud and abuse. Additional participants in the Roundtable included representatives from the US Department of Energy, Weatherization Assistance Program Office and the HHS Office of Energy Assistance, along with other state and local program operators.« less
Improving Fraud and Abuse Detection in General Physician Claims: A Data Mining Study
Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad
2016-01-01
Background: We aimed to identify the indicators of healthcare fraud and abuse in general physicians’ drug prescription claims, and to identify a subset of general physicians that were more likely to have committed fraud and abuse. Methods: We applied data mining approach to a major health insurance organization dataset of private sector general physicians’ prescription claims. It involved 5 steps: clarifying the nature of the problem and objectives, data preparation, indicator identification and selection, cluster analysis to identify suspect physicians, and discriminant analysis to assess the validity of the clustering approach. Results: Thirteen indicators were developed in total. Over half of the general physicians (54%) were ‘suspects’ of conducting abusive behavior. The results also identified 2% of physicians as suspects of fraud. Discriminant analysis suggested that the indicators demonstrated adequate performance in the detection of physicians who were suspect of perpetrating fraud (98%) and abuse (85%) in a new sample of data. Conclusion: Our data mining approach will help health insurance organizations in low-and middle-income countries (LMICs) in streamlining auditing approaches towards the suspect groups rather than routine auditing of all physicians. PMID:26927587
Improving Fraud and Abuse Detection in General Physician Claims: A Data Mining Study.
Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad
2015-11-10
We aimed to identify the indicators of healthcare fraud and abuse in general physicians' drug prescription claims, and to identify a subset of general physicians that were more likely to have committed fraud and abuse. We applied data mining approach to a major health insurance organization dataset of private sector general physicians' prescription claims. It involved 5 steps: clarifying the nature of the problem and objectives, data preparation, indicator identification and selection, cluster analysis to identify suspect physicians, and discriminant analysis to assess the validity of the clustering approach. Thirteen indicators were developed in total. Over half of the general physicians (54%) were 'suspects' of conducting abusive behavior. The results also identified 2% of physicians as suspects of fraud. Discriminant analysis suggested that the indicators demonstrated adequate performance in the detection of physicians who were suspect of perpetrating fraud (98%) and abuse (85%) in a new sample of data. Our data mining approach will help health insurance organizations in low-and middle-income countries (LMICs) in streamlining auditing approaches towards the suspect groups rather than routine auditing of all physicians. © 2016 by Kerman University of Medical Sciences.
20 CFR 641.450 - Are there responsibility conditions that alone will disqualify an applicant?
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Additionally, significant fraud or criminal activity will typically include coordinated patterns or behaviors... a case-by-case basis regardless of what party identifies the alleged fraud or criminal activity. ...
GAO audit not apt to find pervasive fraud in CARE Act.
1999-12-24
After hearing a series of news reports suggesting financial improprieties in programs run by Ryan White CARE Act recipients, a General Accounting Office (GAO) review of the program was made. A preliminary GAO report found only a few cases of fraud in the administration of funding stemming from the CARE Act, but that the potential for fraud is very real because of the lack of safeguards. These findings are considered important since the House Commerce Committee is expected to conduct oversight hearings into further authorization of the CARE Act early in 2000.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Program § 96.84 Miscellaneous. (a) Rights and responsibilities of territories. Except as otherwise provided, a territory eligible for funds shall have the same rights and responsibilities as a State. (b..., fraud, and abuse. Grantees must establish appropriate systems and procedures to prevent, detect, and...
Line-scan macro-scale Raman chemical imaging for authentication of powdered foods and ingredients
USDA-ARS?s Scientific Manuscript database
Adulteration and fraud for powdered foods and ingredients are rising food safety risks that threaten consumers’ health. In this study, a newly developed line-scan macro-scale Raman imaging system using a 5 W 785 nm line laser as excitation source was used to authenticate the food powders. The system...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heineke, J.M.
1978-12-20
This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)
Pharmacy Benefit Management Companies: Do They Create Value in the US Healthcare System?
Lyles, Alan
2017-05-01
Pharmacy benefit management companies (PBMs) perform functions in the US market-based healthcare system that may be performed by public agencies or quasi-public institutions in other nations. By aggregating lives covered under their many individual contracts with payers, PBMs have formidable negotiating power. They influence pharmaceutical insurance coverage, design the terms of coverage in a plan's drug benefit, and create competition among providers for inclusion in a plan's network. PBMs have, through intermediation, the potential to secure lower drug prices and to improve rational prescribing. Whether these potential outcomes are realized within the relevant budget is a function of the healthcare system and the interaction of benefit design and clinical processes-not just individually vetted components. Efficiencies and values achieved in price discounts and cost sharing can be nullified if there is irrational prescribing (over-utilization, under-utilization and mis-utilization), variable patient adherence to medication regimens, ineffective formulary processes, or fraud, waste and abuse. Rising prescription drug costs and the increasing prevalence of 'high deductible health plans', which require much greater patient out-of-pocket costs, is creating a crisis for PBM efforts towards an affordable pharmacy benefit. Since PBM rebate and incentive contracts are opaque to the public, whether they add value by restraining higher drug prices or benefit from them is debatable.
The jurisprudential nature of fraud in biomedical publishing.
Candlish, John
2008-06-01
When instances of fraud in biomedical publishing come to light there is widespread indignation, not least because the consequences seem usually only to be internal enquiries and professional displeasure. A number of bodies have been constituted to improve publishing ethics and but these are largely advisory. Potentially though, actions in the tort of deceit and negligence, possibly misfeasance in a public office, and loss of chance could be brought against those responsible. These aspects are examined in the context of English law. In addition the new Fraud Act (2006) appears to be wide enough in scope to cover publishing fraud as a criminal offence. Any organisation such as a drug company financing clinical trials which produce spurious results could face serious losses and might well look to remedies in contract as well as in tort. A theoretical scenario centered on a drug trial is presented in order to explore these issues.
Corporate compliance: critical to organizational success.
Cantone, L
1999-01-01
Operation Restore Trust (ORT) has focused increased governmental attention on health care fraud and abuse activities, making it more costly to be noncompliant, and thus has led to significant behavioral changes within the health care industry. Initially five states (California, Florida, Illinois, New York, & Texas) were included in the 1997 ORT pilot program. This has been expanded to include Arizona, Colorado, Georgia, Louisiana, Massachusetts, Missouri, New Jersey, Ohio, Pennsylvania, Tennessee, Virginia, and Washington. The author presents a road map for developing of a compliance program that includes suggested strategies for staff training in anticipation of heightened scrutiny of compliance standards and procedures. Effective Corporate Compliance Programs (CCPs) should include policies and procedures and monitoring systems that can provide reasonable assurance that fraud, abuse, and systematic billing errors are detected in a timely manner.
Black, Connor; Chevallier, Olivier P; Haughey, Simon A; Balog, Julia; Stead, Sara; Pringle, Steven D; Riina, Maria V; Martucci, Francesca; Acutis, Pier L; Morris, Mike; Nikolopoulos, Dimitrios S; Takats, Zoltan; Elliott, Christopher T
2017-01-01
Fish fraud detection is mainly carried out using a genomic profiling approach requiring long and complex sample preparations and assay running times. Rapid evaporative ionisation mass spectrometry (REIMS) can circumvent these issues without sacrificing a loss in the quality of results. To demonstrate that REIMS can be used as a fast profiling technique capable of achieving accurate species identification without the need for any sample preparation. Additionally, we wanted to demonstrate that other aspects of fish fraud other than speciation are detectable using REIMS. 478 samples of five different white fish species were subjected to REIMS analysis using an electrosurgical knife. Each sample was cut 8-12 times with each one lasting 3-5 s and chemometric models were generated based on the mass range m/z 600-950 of each sample. The identification of 99 validation samples provided a 98.99% correct classification in which species identification was obtained near-instantaneously (≈ 2 s) unlike any other form of food fraud analysis. Significant time comparisons between REIMS and polymerase chain reaction (PCR) were observed when analysing 6 mislabelled samples demonstrating how REIMS can be used as a complimentary technique to detect fish fraud. Additionally, we have demonstrated that the catch method of fish products is capable of detection using REIMS, a concept never previously reported. REIMS has been proven to be an innovative technique to help aid the detection of fish fraud and has the potential to be utilised by fisheries to conduct their own quality control (QC) checks for fast accurate results.
42 CFR 455.14 - Preliminary investigation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.14 Preliminary investigation. If the agency receives a complaint of Medicaid fraud...
Quality Control Review of the Defense Contract Management Agency Internal Review Audit Function
2013-04-18
DMI-2011-001, “Audit of DCMA Telework Program,” November 29, 2011, we identified issues with independence. For the Audit of DCMA Telework Program...and Audit of DCMA Telework Program, we identified issues with audit planning. Specifically, we found that both audits did not include documentation...of fraud risks had been performed during audit planning. For the audit of the DCMA Telework Program, steps were added to the audit program to
Student Financial Aid Handbook, 2000-2001. Volume 1: Student Eligibility.
ERIC Educational Resources Information Center
Department of Education, Washington, DC. Student Financial Assistance.
This handbook helps financial aid administrators determine students' eligibility for aid from the U.S. Department of Education's Student Financial Assistance (SFA) programs. An introduction describes information sources, conflicting information, fraud case referral, status change, electronic requirements, the application system, and recent…
75 FR 35853 - Privacy Act of 1974: Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-23
..., investment advisers, investment companies, self-regulatory organizations, clearing agencies, nationally... securities laws and with rules of self-regulatory organizations and clearing agencies. Records may also... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or...
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Compensation, and Dependency and Indemnity Compensation Forfeiture § 3.901 Fraud. (a) Definition. An act... death benefit payable. (2) Amount of compensation payable but for the forfeiture. No benefits are... affidavit, declaration, certificate, statement, voucher, or paper, concerning any claim for benefits under...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... company. \\5\\ 15 U.S.C. 77a. Significant regulatory concerns, including accounting fraud allegations, have... listed company) is not engaged in undetected accounting fraud or subject to other concealed and...
Poster: Report Fraud Waste and Abuse to the EPA OIG Hotline
The EPA OIG hotline receives complaints of fraud, waste, and abuse in EPA and U.S. Chemical Safety Board programs and operations including mismanagement or violations of law, rules, or regulations by EPA employees or program participants.
Fraud and Australian Academics.
ERIC Educational Resources Information Center
Martin, Brian
1989-01-01
A series of highly publicized cases of alleged fraud in the Australian academic community are described. Each case reveals an apparent failure of peer review. The right to pursue investigations and make comments that may offend powerful figures within the scholarly community is precarious. (MLW)
Pre-Service Teachers Attitudes Towards a Career in Special Education in the United Arab Emirate
ERIC Educational Resources Information Center
Naggar Gaad, Eman El.
2004-01-01
The reasons for moving from paper coupons to delivering food stamps electronically include potential reduction in the cost of administering the system and in fraud, theft and abuse of the system. Furthermore, the use of EBT is believed o reduce social stigma and embarrassment felt by recipients when using paper coupon. Therefore, using survey data…
The Error Prone Model and the Basic Grants Validation Selection System. Draft Final Report.
ERIC Educational Resources Information Center
System Development Corp., Falls Church, VA.
An evaluation of existing and proposed mechanisms to ensure data accuracy for the Pell Grant program is reported, and recommendations for efficient detection of fraud and error in the program are offered. One study objective was to examine the existing system of pre-established criteria (PEC), which are validation criteria that select students on…
Hoffbauer, J; Serneels, F; Vanbelle, G
1990-01-01
Two inquiries were set up to analyse the attitude to and the use of the direct payment system. This system implies a direct payment of the dentist by the social assurance organisations. Because of the potential fraud, this system is very controversial. Both users and non-users suggested better controls simplified administration and a legal obligation to demand the franchise part of the fees.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-05
... would be for an IPO. \\3\\ 15 U.S.C. 77a. Significant regulatory concerns, including accounting fraud... accounting fraud or subject to other concealed and undisclosed legal or regulatory problems. For purposes of...
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND SOUNDNESS MORTGAGE FRAUD REPORTING § 1731.2 Definitions. For purposes of this part— (a) Director... Association or the Federal Home Loan Mortgage Corporation. (c) Mortgage fraud means a material misstatement... mortgage, including a mortgage associated with a mortgage-backed security or similar financial instrument...
An Analysis of Fraud on the Internet.
ERIC Educational Resources Information Center
Baker, C. Richard
1999-01-01
Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)
Code of Federal Regulations, 2011 CFR
2011-07-01
... IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.2 Definitions. For purposes of this part: Adjudicatory proceeding means an administrative judicial-type proceeding, before the Office of the Chief... law by an Administrative Law Judge or the Chief Administrative Hearing Officer; Document fraud cases...
Code of Federal Regulations, 2010 CFR
2010-07-01
... IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.2 Definitions. For purposes of this part: Adjudicatory proceeding means an administrative judicial-type proceeding, before the Office of the Chief... law by an Administrative Law Judge or the Chief Administrative Hearing Officer; Document fraud cases...
Odometer Fraud: Traffic Safety Tips
DOT National Transportation Integrated Search
1996-01-01
This fact sheet, NHTSA Facts: Summer 1996, focuses on odometer fraud, which is a major problem for consumers. Some late model used cars have odometers that have been turned back. Any vehicle that has been driven a high number of miles but is only a f...
28 CFR 25.51 - Purpose and authority.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., protect states and individual and commercial consumers from fraud, reduce the use of stolen vehicles for illicit purposes including fundraising for criminal enterprises, and provide consumer protection from... System (NMVTIS) in accordance with title 49 U.S.C. 30502. The purpose of NMVTIS is to assist in efforts...
12 CFR 235.4 - Fraud-prevention adjustment.
Code of Federal Regulations, 2014 CFR
2014-01-01
....4 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE... own experience or information; (B) Information provided to the issuer by its payment card networks... adjustment, an issuer must annually notify its payment card networks that it complies with the standards in...
12 CFR 235.4 - Fraud-prevention adjustment.
Code of Federal Regulations, 2013 CFR
2013-01-01
....4 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE... own experience or information; (B) Information provided to the issuer by its payment card networks... adjustment, an issuer must annually notify its payment card networks that it complies with the standards in...
1988-09-01
defense programs lost far more to inefficient procedures than to fraud and dishonesty * (President’s Commission, l986c:15). Based on the Commission...recommendations from current studies, lessons learned from a successful program, and DOD expert opinions to develop an acquisition management strategy that...established for the alternative(s) selected in the preceding phase. 5. In the concept demonstration/validation phase the technical risk and economic
2008-01-01
34’Sa’tanrrlCl-I’o • ;S0.t..rUt 1\\1ar ,,’ FrankJ’ield" !I; E’ort Antoa"io ~*I~$~’ ’~t:.;:;: "::f;i’I’,":; . ’.. ......... [ilu’c’ 7" IOt ;.s:uc/i’ CaL"es...dissemination), Crime Management Unit, Fraud Squad, Forensic Laboratory, Bureau of Special Investigation, Canine Division, Protective Services, and the National
Equal Potential: A Collective Fraud.
ERIC Educational Resources Information Center
Gottfredson, Linda S.
2000-01-01
Critiques the College Board's report, "Reaching the Top," asserting that it illustrates collective fraud in the social sciences, which sustains an egalitarian fiction that intelligence is clustered equally across all human populations. Suggests that while the report omits certain popular falsehoods, it also omits crucial truths about…
20 CFR 627.500 - Scope and purpose.
Code of Federal Regulations, 2010 CFR
2010-04-01
... contained in this subpart shall be deemed to prejudice the separate exercise of other legal rights in...) Complaints and reports of criminal fraud, waste, and abuse. Information and complaints involving criminal fraud, waste, abuse or other criminal activity shall be reported through the Department's Incident...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Under the Program Fraud Civil Remedies Act of 1986 § 1.302 Definitions. (a) Agency means a constituent organizational unit of the USDA. (b) Agency Fraud Claims Officer—(AFCO) means an officer or employee of an agency...) Statement means any representation, certification, affirmation, document, record, or accounting or...
17 CFR 48.8 - Conditions of registration.
Code of Federal Regulations, 2013 CFR
2013-04-01
...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...
17 CFR 48.8 - Conditions of registration.
Code of Federal Regulations, 2014 CFR
2014-04-01
...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...
17 CFR 48.8 - Conditions of registration.
Code of Federal Regulations, 2012 CFR
2012-04-01
...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...
Looking at Debit and Credit Card Fraud
ERIC Educational Resources Information Center
Porkess, Roger; Mason, Stephen
2012-01-01
This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)
8 CFR 270.2 - Enforcement procedures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS PENALTIES FOR DOCUMENT FRAUD § 270.2 Enforcement procedures. (a) Procedures for the filing of complaints. Any person or entity... charges for document fraud committed by refugees at the time of entry. The Service shall not issue a...
42 CFR 455.1 - Basis and scope.
Code of Federal Regulations, 2010 CFR
2010-10-01
... for a State fraud detection and investigation program, and for disclosure of information on ownership... Security Act, Subpart A provides State plan requirements for the identification, investigation, and referral of suspected fraud and abuse cases. In addition, the subpart requires that the State— (1) Report...
76 FR 80901 - Agency Information Collection Activities Under OMB Review
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-27
... monitoring legal proceedings involving the responsibilities imposed on contract markets and their officials... avoid fraud and misrepresentations. In addition, the Commission's rules impose obligations on contract markets that are designed to avoid manipulation and fraud. In order to ensure compliance with these rules...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2010 CFR
2010-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2012 CFR
2012-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2014 CFR
2014-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2011 CFR
2011-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
20 CFR 625.14 - Overpayments; disqualification for fraud.
Code of Federal Regulations, 2013 CFR
2013-04-01
... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...
An appraisal of the performance of the economic and financial crimes commission in Nigeria.
Sowunmi, Fatai Abiola; Adesola, Muniru Adekunle; Salako, Mudashiru Abiodun
2010-12-01
This article examines how an anti-graft body, the Economic and Financial Crime Commission (EFCC), has fared in reducing the incidence of corruption in Nigeria, in particular, bank fraud, Internet scam, and bad governance. It first discusses the corruption situation in Nigeria by highlighting public office holders who have been associated with corruption charges. A Likert-type scale is used in designing the questionnaire for data collection. Descriptive and chi-square analyses are used, and results reveal that the performance of the EFCC has been affected by government interference (p < .05). However, although the anti-graft body has not been able to reduce the incidence of bank fraud (p > .05), bad governance and advance fee fraud have recorded appreciable reduction (p < .05). Areas of success as well as challenges that need to be addressed are identified. Specifically, it is recommended that the bill that established EFCC should be amended to reduce government interference and improve its manpower development, especially in the areas of fraud and Internet scam detection.
An inequality for detecting financial fraud, derived from the Markowitz Optimal Portfolio Theory
NASA Astrophysics Data System (ADS)
Bard, Gregory V.
2016-12-01
The Markowitz Optimal Portfolio Theory, published in 1952, is well-known, and was often taught because it blends Lagrange Multipliers, matrices, statistics, and mathematical finance. However, the theory faded from prominence in American investing, as Business departments at US universities shifted from techniques based on mathematics, finance, and statistics, to focus instead on leadership, public speaking, interpersonal skills, advertising, etc… The author proposes a new application of Markowitz's Theory: the detection of a fairly broad category of financial fraud (called "Ponzi schemes" in American newspapers) by looking at a particular inequality derived from the Markowitz Optimal Portfolio Theory, relating volatility and expected rate of return. For example, one recent Ponzi scheme was that of Bernard Madoff, uncovered in December 2008, which comprised fraud totaling 64,800,000,000 US dollars [23]. The objective is to compare investments with the "efficient frontier" as predicted by Markowitz's theory. Violations of the inequality should be impossible in theory; therefore, in practice, violations might indicate fraud.
Multifunctional encoding system for assessment of movable cultural heritage
NASA Astrophysics Data System (ADS)
Tornari, V.; Bernikola, E.; Osten, W.; Groves, R. M.; Marc, G.; Hustinx, G. M.; Kouloumpi, E.; Hackney, S.
2007-07-01
This is an introductory paper of a recent EC project dealing with research in cultural heritage and aiming to communicate new fields of application for optical metrology techniques. The project is in its initial state and more conclusive information is expected to be available at the time of the perspective conference. Nowadays safety, ethical, economical and security issues as well as the increase demand for loaning of art objects for exhibitions in transit, are forcing the Conservation Community to undertake strong initiatives and actions against various types of mistreatment, damage or fraud, during transportation of movable Cultural Heritage. Therefore the interest directs to the development of innovative methodologies and instrumentation to respond to critical aspects of increased importance in cultural heritage preservation, among which of prior consideration are: to secure proper treatment, assess probable damage, fight fraud actions in transportation.
Hembroff, Guy
2016-01-01
Healthcare systems globally continue to face challenges surrounding patient identification. Consequences of misidentification include incomplete and inaccurate electronic patient health records potentially jeopardizing patients' safety, a significant amount of cases of medical fraud because of inadequate identification mechanisms, and difficulties affiliated with the value of remote health self-management application data being aggregated accurately into the user's Electronic Health Record (EHR). We introduce a new technique of user identification in healthcare capable of establishing a global identifier. Our research has developed algorithms capable of establishing a Unique Health Identifier (UHID) based on the user's fingerprint biometric, with the utilization of facial-recognition as a secondary validation step before health records can be accessed. Biometric captures are completed using standard smartphones and Web cameras in a touchless method. We present a series of experiments to demonstrate the formation of an accurate, consistent, and scalable UHID. We hope our solution will aid in the reduction of complexities associated with user misidentification in healthcare resulting in lowering costs, enhancing population health monitoring, and improving patient-safety.
Defense Contracts: DOD’s Requests for Information from Contractors to Assess Prices
2015-08-01
manuals $4,000,000 Commercial Goodyear tires $3,290,902 Commercial Multiband manpack radio systems and operator training $1,742,712...by Phone Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.
Neural network applications in telecommunications
NASA Technical Reports Server (NTRS)
Alspector, Joshua
1994-01-01
Neural network capabilities include automatic and organized handling of complex information, quick adaptation to continuously changing environments, nonlinear modeling, and parallel implementation. This viewgraph presentation presents Bellcore work on applications, learning chip computational function, learning system block diagram, neural network equalization, broadband access control, calling-card fraud detection, software reliability prediction, and conclusions.
78 FR 47322 - Privacy Act of 1974; Report of an Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-05
... reports for all health care practitioners (e.g., physicians, dentists, nurses, optometrists, pharmacists... appropriate decisions in the delivery of health care. 6. To state Medicaid Fraud Control Units that request... Information on Physicians and other Health Care Practitioners (NPDB), 09-15-0054, to include information...
28 CFR 16.89 - Exemption of Civil Division Systems-limited access.
Code of Federal Regulations, 2010 CFR
2010-07-01
... prosecution of grand jury, civil fraud, and other law enforcement matters, disclosure could compromise matters... affirmative enforcement actions based upon alleged violations of regulations or of civil or criminal laws... civil law enforcement purposes is exempted for the reasons set forth from the following subsections: (1...
28 CFR 16.89 - Exemption of Civil Division Systems-limited access.
Code of Federal Regulations, 2014 CFR
2014-07-01
... prosecution of grand jury, civil fraud, and other law enforcement matters, disclosure could compromise matters... affirmative enforcement actions based upon alleged violations of regulations or of civil or criminal laws... civil law enforcement purposes is exempted for the reasons set forth from the following subsections: (1...
28 CFR 16.89 - Exemption of Civil Division Systems-limited access.
Code of Federal Regulations, 2013 CFR
2013-07-01
... prosecution of grand jury, civil fraud, and other law enforcement matters, disclosure could compromise matters... affirmative enforcement actions based upon alleged violations of regulations or of civil or criminal laws... civil law enforcement purposes is exempted for the reasons set forth from the following subsections: (1...
28 CFR 16.89 - Exemption of Civil Division Systems-limited access.
Code of Federal Regulations, 2011 CFR
2011-07-01
... prosecution of grand jury, civil fraud, and other law enforcement matters, disclosure could compromise matters... affirmative enforcement actions based upon alleged violations of regulations or of civil or criminal laws... civil law enforcement purposes is exempted for the reasons set forth from the following subsections: (1...
28 CFR 16.89 - Exemption of Civil Division Systems-limited access.
Code of Federal Regulations, 2012 CFR
2012-07-01
... prosecution of grand jury, civil fraud, and other law enforcement matters, disclosure could compromise matters... affirmative enforcement actions based upon alleged violations of regulations or of civil or criminal laws... civil law enforcement purposes is exempted for the reasons set forth from the following subsections: (1...
48 CFR 3.807 - Civil penalties.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Civil penalties. 3.807... Federal Transactions 3.807 Civil penalties. Agencies shall impose and collect civil penalties pursuant to the provisions of the Program Fraud and Civil Remedies Act, 31 U.S.C. 3803 (except subsection (c...
48 CFR 3.807 - Civil penalties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Civil penalties. 3.807... Federal Transactions 3.807 Civil penalties. Agencies shall impose and collect civil penalties pursuant to the provisions of the Program Fraud and Civil Remedies Act, 31 U.S.C. 3803 (except subsection (c...
48 CFR 3.807 - Civil penalties.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Civil penalties. 3.807... Federal Transactions 3.807 Civil penalties. Agencies shall impose and collect civil penalties pursuant to the provisions of the Program Fraud and Civil Remedies Act, 31 U.S.C. 3803 (except subsection (c...
48 CFR 3.807 - Civil penalties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Civil penalties. 3.807... Federal Transactions 3.807 Civil penalties. Agencies shall impose and collect civil penalties pursuant to the provisions of the Program Fraud and Civil Remedies Act, 31 U.S.C. 3803 (except subsection (c...
48 CFR 3.807 - Civil penalties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Civil penalties. 3.807... Federal Transactions 3.807 Civil penalties. Agencies shall impose and collect civil penalties pursuant to the provisions of the Program Fraud and Civil Remedies Act, 31 U.S.C. 3803 (except subsection (c...
41 CFR 105-53.131 - Office of Inspector General.
Code of Federal Regulations, 2010 CFR
2010-07-01
... functions and established an Office of Inspector General in 11 major domestic departments and agencies... United States Attorneys on all matters relating to the detection and prevention of fraud and abuse. The Inspector General reports semiannually to the Congress through the Administrator concerning fraud, abuses...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Policies. 516.58 Section 516.58 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.58 Policies. (a) Procurement fraud and...
7 CFR 1773.9 - Disclosure of fraud, illegal acts, and other noncompliance.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., the auditor must design the audit to provide reasonable assurance of detecting fraud that is material... UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE (CONTINUED) POLICY ON AUDITS OF RUS BORROWERS RUS Audit... statements, auditors should apply audit procedures specifically directed to ascertaining whether an illegal...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-31
... DEPARTMENT OF AGRICULTURE Food and Nutrition Service 7 CFR Parts 271 and 274 RIN 0584-AE26 Supplemental Nutrition Assistance Program: Trafficking Controls and Fraud Investigations AGENCY: Food and Nutrition Service, USDA. ACTION: Final rule, Interim final rule; notice of approval of Information...
Academic Misconduct in Teaching Portfolios
ERIC Educational Resources Information Center
Erikson, Martin G.; Erlandson, Peter; Erikson, Malgorzata
2015-01-01
Within academia, clear and standardised communication is vital. From this point of departure, we discuss the trustworthiness of teaching portfolios when used in assessment. Here, misconduct and fraud are discussed in terms of fabrication, falsification, and plagiarism, following the literature on research fraud. We argue that the portfolio's…
12 CFR 1731.3 - Unsafe and unsound conduct.
Code of Federal Regulations, 2010 CFR
2010-01-01
... DEVELOPMENT SAFETY AND SOUNDNESS MORTGAGE FRAUD REPORTING § 1731.3 Unsafe and unsound conduct. An Enterprise may not require the repurchase of or may not decline to purchase a mortgage, mortgage backed security, or similar financial instrument because of possible mortgage fraud without promptly reporting to the...
16 CFR 660.4 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... direct disputes relating to whether there is or has been identity theft or fraud against the consumer... direct disputes relating to the type of account, principal balance, scheduled payment amount on an... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
12 CFR 222.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... fraud against the consumer, whether there is individual or joint liability on an account, or whether the... the furnisher, such as direct disputes relating to the type of account, principal balance, scheduled... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
12 CFR 334.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... furnisher, such as direct disputes relating to whether there is or has been identity theft or fraud against... furnisher, such as direct disputes relating to the type of account, principal balance, scheduled payment... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
42 CFR 1007.5 - Basic requirement.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 5 2010-10-01 2010-10-01 false Basic requirement. 1007.5 Section 1007.5 Public... STATE MEDICAID FRAUD CONTROL UNITS § 1007.5 Basic requirement. A State Medicaid fraud control unit must... requirements of §§ 1007.7 through 1007.13 of this part. ...
7 CFR 4279.72 - Conditions of guarantee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... unenforceable by the lender to the extent any loss is occasioned by the violation of usury laws, negligent... participates or condones. In the event of material fraud, negligence or misrepresentation by the lender or the lender's participation in or condoning of such material fraud, negligence or misrepresentation, the...
Internet Fraud: Information for Teachers and Students
ERIC Educational Resources Information Center
Nkotagu, Gabriel Hudson
2011-01-01
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
An Ontology for Insider Threat Indicators Development and Applications
2014-11-01
An Ontology for Insider Threat Indicators Development and Applications Daniel L. Costa , Matthew L. Collins, Samuel J. Perl, Michael J. Albrethsen...services, commit fraud against an organization, steal intellectual property, or conduct national security espionage, sabotaging systems and data, as...engineering plans from the victim organization’s computer systems to his new employer. The insider accessed a web server with an administrator account
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 2 2013-01-01 2013-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Welfare Department of Health and Human Services GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L... for imposing civil penalties and assessments against persons who make, submit, or present, or cause to...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L... for imposing civil penalties and assessments against persons who make, submit, or present, or cause to...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L... for imposing civil penalties and assessments against persons who make, submit, or present, or cause to...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L... for imposing civil penalties and assessments against persons who make, submit, or present, or cause to...
28 CFR 104.71 - Procedures to prevent and detect fraud.
Code of Federal Regulations, 2010 CFR
2010-07-01
.... 104.71 Section 104.71 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) SEPTEMBER 11TH VICTIM... prevent and detect fraud. (a) Review of claims. For the purpose of detecting and preventing the payment of...; and (3) Ensure the quality control of claims review procedures. (b) Quality control. The Special...
The Maintenance of High Ethical Standards in the Conduct of Research.
ERIC Educational Resources Information Center
Journal of Medical Education, 1982
1982-01-01
A statement adopted by the Executive Council of the Association of American Medical Colleges addresses the issues of accountability, investigation, and discipline in cases of research fraud and misconduct. Guidelines are given for institutions to develop policy and procedures for detecting and responding to alleged fraud. (MSE)
To Cheat or Not to Cheat: Rationalizing Academic Impropriety
ERIC Educational Resources Information Center
MacGregor, Jason; Stuebs, Martin
2012-01-01
Academic cheating and fraud are becoming more prevalent. The Internet removes barriers and opens access to information and increases the opportunities for academic fraud. The incentives to succeed academically also are increasing as higher education continues to grow in importance. A student's rationalization is the last, critical piece needed to…
42 CFR 455.23 - Withholding of payments in cases of fraud or willful misrepresentation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... willful misrepresentation. 455.23 Section 455.23 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.23 Withholding of payments in cases of...
29 CFR 2580.412-9 - Meaning of fraud or dishonesty.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false Meaning of fraud or dishonesty. 2580.412-9 Section 2580.412-9 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...
7 CFR 3565.502 - Incontestability.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Securities § 3565.502 Incontestability. In the case of loans that back Ginnie Mae securities or loans that... incontestable except that the guarantee may not be enforced by a lender who commits fraud or misrepresentation or by a lender who had knowledge of the fraud or misrepresentation at the time such a lender acquired...
20 CFR 416.1488 - Conditions for reopening.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 416.1488 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... case; or (c) At any time if it was obtained by fraud or similar fault. In determining whether a determination or decision was obtained by fraud or similar fault, we will take into account any physical, mental...
Educators' Degrees Earned on Internet Raise Fraud Issues
ERIC Educational Resources Information Center
Trotter, Andrew
2004-01-01
This article discusses how the degrees earned by a dozen educators on the Internet have raised fraud issues. Small firms known as "credential evaluators" help states and school districts detect educators who present phony or flimsy academic credentials from overseas institutions--a safeguard that is becoming more important with the…
12 CFR 41.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... relating to whether there is or has been identity theft or fraud against the consumer, whether there is... relating to the type of account, principal balance, scheduled payment amount on an account, or the amount... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
29 CFR 100.603 - Debts that are covered.
Code of Federal Regulations, 2010 CFR
2010-07-01
... proceedings. (Regulations concerning the collection of these types of debts are found in 29 CFR Part 102, Subparts U and V.); (2) A debt involving criminal actions of fraud, the presentation of a false claim, or... fraud, false claims, misrepresentation, or which violate antitrust laws will be promptly referred to the...
12 CFR 717.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., such as direct disputes relating to whether there is or has been identity theft or fraud against the... as direct disputes relating to the type of account, principal balance, scheduled payment amount on an... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
29 CFR 100.603 - Debts that are covered.
Code of Federal Regulations, 2011 CFR
2011-07-01
... proceedings. (Regulations concerning the collection of these types of debts are found in 29 CFR Part 102, Subparts U and V.); (2) A debt involving criminal actions of fraud, the presentation of a false claim, or... fraud, false claims, misrepresentation, or which violate antitrust laws will be promptly referred to the...
12 CFR 571.43 - Direct disputes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... relating to whether there is or has been identity theft or fraud against the consumer, whether there is... relating to the type of account, principal balance, scheduled payment amount on an account, or the amount... relationship with the consumer); (v) Information related to fraud alerts or active duty alerts; or (vi...
Avoiding Consumer Frauds and Misrepresentations. A Learning Module.
ERIC Educational Resources Information Center
Garman, E. Thomas; Monroe, Sarah D.
Focusing on avoiding consumer frauds and misrepresentations, this document is one in a series of three consumer education modules developed to educate individual adult consumers in important areas of consumer affairs. An introductory section provides an overview of the module contents, suggested approaches for using the module, and suggestions for…
7 CFR 1980.469 - Loan servicing.
Code of Federal Regulations, 2014 CFR
2014-01-01
... necessary investigations to help establish the fraud. 5. In order to decide whether to file suit, the... the lender or holder? How much did the scheme cost the Government? What is the difference in money... fraud precludes the Government from just suing to recover the money wrongfully or mistakenly paid by its...
7 CFR 1980.469 - Loan servicing.
Code of Federal Regulations, 2012 CFR
2012-01-01
... necessary investigations to help establish the fraud. 5. In order to decide whether to file suit, the... the lender or holder? How much did the scheme cost the Government? What is the difference in money... fraud precludes the Government from just suing to recover the money wrongfully or mistakenly paid by its...
7 CFR 1980.469 - Loan servicing.
Code of Federal Regulations, 2013 CFR
2013-01-01
... necessary investigations to help establish the fraud. 5. In order to decide whether to file suit, the... the lender or holder? How much did the scheme cost the Government? What is the difference in money... fraud precludes the Government from just suing to recover the money wrongfully or mistakenly paid by its...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 277.3 Section 277.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT § 277.3 Policy. It is DoD policy to redress fraud in DoD...
ERIC Educational Resources Information Center
Wheeler, David L.
1987-01-01
University administrators are expected by federal agencies to detect, investigate, and judge scientific fraud and misconduct on their campuses. Both National Science Foundation and National Institutes of Health place primary responsibility on universities for spotting cases of scientific misconduct. (MLW)
22 CFR 34.18 - Waivers of indebtedness.
Code of Federal Regulations, 2010 CFR
2010-04-01
... there exists in connection with the claim an indication of fraud, misrepresentation, fault, or lack of... known through the exercise of due diligence that an error existed but failed to take corrective action... payment. (iv) If the deciding official finds no indication of fraud, misrepresentation, fault, or lack of...
75 FR 20925 - Petition for Approval of Alternate Odometer Disclosure Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-22
... the online instructions for accessing the dockets. FOR FURTHER INFORMATION CONTACT: Andrew DiMarsico... provisions to limit odometer fraud and assure that the purchaser of a motor vehicle knows the true mileage of... statements did not necessarily deter odometer fraud employing altered documents, discarded titles, and title...
76 FR 14637 - State Medicaid Fraud Control Units; Data Mining
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
...] State Medicaid Fraud Control Units; Data Mining AGENCY: Office of Inspector General (OIG), HHS. ACTION... and analyzing State Medicaid claims data, known as data mining. To support and modernize MFCU efforts... (FFP) in the costs of defined data mining activities under specified conditions. In addition, we...
Romano, Michael
2003-03-24
HealthSouth and its chief executive Richard Scrushy, left, find themselves coping with a public relations nightmare after federal officials last week charged the rehabilitation giant with "massive accounting fraud" and a systematic betrayal of tens of thousands of investors.
[Beautification of data: Minimal fraud, incompetence or mixture of both].
Seror, Raphaèle; Ravaud, Philippe
2012-09-01
The beautification of data is the process of reporting results of a research in a way that does not correspond to reality, in order to present them in a more favorable or attractive way. The border between errors due to methodological ignorance, embellishment of reality and fraud is sometimes difficult to determine. It is the intentional nature and the repetition of these "arrangements" that are the real switch to deliberate fraud. The emergence of regulatory procedures, such as clinical trial registries, "reporting guidelines", improvement of "peer review" and data sharing, are some of the measures used to fight against and improve transparency of clinical research. Copyright © 2012. Published by Elsevier Masson SAS.
Hormones and ethics: Understanding the biological basis of unethical conduct.
Lee, Jooa Julia; Gino, Francesca; Jin, Ellie Shuo; Rice, Leslie K; Josephs, Robert A
2015-10-01
Globally, fraud has been rising sharply over the last decade, with current estimates placing financial losses at greater than $3.7 trillion annually. Unfortunately, fraud prevention has been stymied by lack of a clear and comprehensive understanding of its underlying causes and mechanisms. In this paper, we focus on an important but neglected topic--the biological antecedents and consequences of unethical conduct--using salivary collection of hormones (testosterone and cortisol). We hypothesized that preperformance cortisol levels would interact with preperformance levels of testosterone to regulate cheating behavior in 2 studies. Further, based on the previously untested cheating-as-stress-reduction hypothesis, we predicted a dose-response relationship between cheating and reductions in cortisol and negative affect. Taken together, this research marks the first foray into the possibility that endocrine-system activity plays an important role in the regulation of unethical behavior. (c) 2015 APA, all rights reserved).
Reduce Fraud Risk in Your District with Stronger Internal Controls
ERIC Educational Resources Information Center
Okrzesik, Daryl J.; Nuehring, Bert G.
2011-01-01
Internal accounts offer schools a faster, more convenient way to handle the income and expenses that result from student fees, school clubs and organizations, field trips, fund-raising, and similar activities. But this convenience also incurs the added risk of fraud. Fortunately, there are proven ways to strengthen internal controls and reduce…
42 CFR 455.21 - Cooperation with State Medicaid fraud control units.
Code of Federal Regulations, 2014 CFR
2014-10-01
... subchapter. In using this information, the unit must protect the privacy rights of beneficiaries; and (3) On... 42 Public Health 4 2014-10-01 2014-10-01 false Cooperation with State Medicaid fraud control units. 455.21 Section 455.21 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND...
78 FR 46585 - Agency Information Collection Activities; Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... will add to this knowledge. \\1\\ The Commission has conducted three surveys designed to estimate the prevalence of consumer fraud among U.S. adults. The most recent survey was conducted between November 2011... the problem of fraud, the surveys included questions designed to help address questions of whether...
45 CFR 79.1 - Basis and purpose.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Basis and purpose. 79.1 Section 79.1 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L...
42 CFR 401.601 - Basis and scope.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the General Accounting Office for the compromise of claims, or the suspension or termination of...) Affect any rights that CMS may have under common law as a creditor. (f) Fraud. The regulations in this subpart do not apply to claims in which there is an indication of fraud, the presentation of a false claim...
Code of Federal Regulations, 2010 CFR
2010-01-01
...; (m) the Federal Housing Finance Agency; (n) the Office of Thrift Supervision; (o) the Office of the... outreach with representatives of financial institutions, corporate entities, nonprofit organizations, State... Corporate Fraud Task Force created by Executive Order 13271 of July 9, 2002. Executive Order 13271 is hereby...
Code of Federal Regulations, 2010 CFR
2010-10-01
... accountable official, and interagency claims excluded. 30.3 Section 30.3 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CLAIMS COLLECTION General Provisions § 30.3 Antitrust, fraud, exception in the account of an accountable official, and interagency claims excluded. (a) Claims involving...
Store Security. Credit Card Fraud.
ERIC Educational Resources Information Center
Brockway, Jerry
The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…
31 CFR 306.105 - Requests for suspension of transactions in registered securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... assignment was affected by fraud, the transaction for which the security was received will be suspended. The... notifies the Bureau that the assignment was affected by fraud or that the security had been lost or stolen... transactions in registered securities. 306.105 Section 306.105 Money and Finance: Treasury Regulations Relating...
75 FR 66101 - Agency Information Collection Request. 30-Day Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-27
... Medicaid Fraud Control Units' Reports--OMB No. 0990-0162-Extension--Office of Inspector General (OIG... collection of information to specifically comply with the requirements in Title 19 of the Social Security Act... Inspector General (OIG) by the fifty established State Medicaid Fraud Control Units (Units). OIG uses the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-12
... title IV Federal Student Aid programs; regulations designed to prevent fraud; State authorization for... Against Women Reauthorization Act of 2013 to the campus safety and security reporting requirements in the... regulations designed to prevent fraud and otherwise ensure proper use of title IV Federal Student Aid program...
78 FR 14556 - Cheng Yi Liang: Debarment Order
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-06
.... 1001 and securities fraud, a Federal felony offense under 15 U.S.C. 78j(b) and 78ff. FDA's finding that debarment is appropriate is based on the felony conviction for securities fraud referenced herein for... execution of trades on national securities exchanges, resulting in total profits and losses avoided of $3...
6 CFR 13.1 - Basis, purpose, scope and effect.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Basis, purpose, scope and effect. 13.1 Section 13.1 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL... Security on or after October 12, 2005. (2) Program fraud cases initiated by any component of the Department...
78 FR 63980 - Agency Information Collection Activities; Proposed Collection; Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... Title: State Medicaid Fraud Control Units' Reports. OMB No.: 0990-0162. Abstract: Office of Inspector... collection of information to comply with the requirements in Title 19 of the Social Security Act at 1903(q... certification/recertification of State Medicaid Fraud Control Units (MFCU). The collection is required by the...
26 CFR 1.7519-2T - Required payments-procedures and administration (temporary).
Code of Federal Regulations, 2010 CFR
2010-04-01
... payment under section 7519 for an applicable election year, the partnership or S corporation should type... termination of the section 444 election. (d) Negligence and fraud penalties made applicable. For purposes of section 6653, relating to additions to tax for negligence and fraud, any payment required by this section...
76 FR 82028 - Request for Information for the 2012 Trafficking in Persons Report
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... equally and adequately to victims of labor and sex trafficking? Men, women, and children? Citizen and... therefore not seeking, information on prostitution, human smuggling, visa fraud, or child abuse, unless such... any act of sex trafficking involving force, fraud, coercion, or in which the victim of sex trafficking...
Code of Federal Regulations, 2011 CFR
2011-04-01
... clearing of transactions on a derivatives clearing organization. 39.7 Section 39.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.7 Fraud in connection with the clearing of transactions on a derivatives clearing organization. It shall be unlawful for any...
Code of Federal Regulations, 2012 CFR
2012-04-01
... certification regulations. (b) Possible fraud or willful misrepresentation. (1) If the Department learns an... these cases, or if the Department learns an employer, attorney, or agent is under investigation by the...) Criminal indictment or information. If the Department learns that an employer, attorney, or agent is named...
Code of Federal Regulations, 2011 CFR
2011-04-01
... certification regulations. (b) Possible fraud or willful misrepresentation. (1) If the Department learns an... these cases, or if the Department learns an employer, attorney, or agent is under investigation by the...) Criminal indictment or information. If the Department learns that an employer, attorney, or agent is named...
Code of Federal Regulations, 2013 CFR
2013-04-01
... certification regulations. (b) Possible fraud or willful misrepresentation. (1) If the Department learns an... these cases, or if the Department learns an employer, attorney, or agent is under investigation by the...) Criminal indictment or information. If the Department learns that an employer, attorney, or agent is named...
Code of Federal Regulations, 2014 CFR
2014-04-01
... certification regulations. (b) Possible fraud or willful misrepresentation. (1) If the Department learns an... these cases, or if the Department learns an employer, attorney, or agent is under investigation by the...) Criminal indictment or information. If the Department learns that an employer, attorney, or agent is named...
13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...
13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...
13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...
13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...
13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...
76 FR 14119 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-15
... embarrassment or harm to the reputations of the record subjects, harm to economic or property interests, identity theft or fraud, or harm to the programs (whether maintained by VA or another agency or entity... respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. This routine...
77 FR 5860 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
..., 2011); Education Jobs Fund, Public Law 111-226, 124 Stat. 2389, Sec. 101 (2010). Accordingly, the Board... fraud, waste, and abuse. Public Law 111-5, Sec. Sec. 1521, 1523(a)(1). The Education Jobs Fund required... contains information relevant to the retention of an employee or retention of a security clearance. That...
32 CFR 1701.31 - General routine uses.
Code of Federal Regulations, 2011 CFR
2011-07-01
... harm to individuals (e.g., identity theft or fraud), or harm to the security or integrity of the... “national security” positions within the Federal government), a record that on its face or in conjunction... is likely to affect the ODNI. (e) A record from a system of records maintained by the ODNI may be...
ERIC Educational Resources Information Center
Zekeri, Andrew A.
2004-01-01
The reasons for moving from paper coupons to delivering food stamps electronically include potential reduction in the cost of administering the system and in fraud, theft and abuse of the system. Furthermore, the use of EBT is believed o reduce social stigma and embarrassment felt by recipients when using paper coupon. Therefore, using survey data…
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2005
ERIC Educational Resources Information Center
US Department of Education, 2005
2005-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
13 CFR 101.301 - Who should receive information or allegations of waste, fraud, and abuse?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Who should receive information or allegations of waste, fraud, and abuse? 101.301 Section 101.301 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION ADMINISTRATION Inspector General § 101.301 Who should receive information or allegations of waste...
13 CFR 101.301 - Who should receive information or allegations of waste, fraud, and abuse?
Code of Federal Regulations, 2011 CFR
2011-01-01
... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Who should receive information or allegations of waste, fraud, and abuse? 101.301 Section 101.301 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION ADMINISTRATION Inspector General § 101.301 Who should receive information or allegations of waste...
40 CFR 403.12 - Reporting requirements for POTW's and industrial users.
Code of Federal Regulations, 2013 CFR
2013-07-01
...)], I certify that, to the best of my knowledge and belief, there has been no increase in the level of...) Provisions Governing Fraud and False Statements: The reports and other documents required to be submitted or... fraud and false statements; (2) The provisions of sections 309(c)(4) of the Act, as amended, governing...
20 CFR Appendix C to Part 617 - Standard for Fraud and Overpayment Detection
Code of Federal Regulations, 2012 CFR
2012-04-01
... cases to test the effectiveness of the agency's procedures for the prevention of payments which are not... might, for example: (a) Investigate information on suspected benefit fraud received from any agency... records are comonly made either by post-audit or by industry surveys. The so-called “post-audit” is a...