Sample records for waste fraud abuse

  1. 12 CFR 1806.303 - Fraud, waste and abuse.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Fraud, waste and abuse. 1806.303 Section 1806... BANK ENTERPRISE AWARD PROGRAM Terms and Conditions of Assistance § 1806.303 Fraud, waste and abuse. Any person who becomes aware of the existence or apparent existence of fraud, waste, or abuse of assistance...

  2. Factsheets: Indicators of Fraud, Waste and Abuse

    EPA Pesticide Factsheets

    Factsheets: Indicators of Fraud, Waste and Abuse - You can tell if fraud, waste and abuse are occurring by looking for indicators. These are clues that may warrant further review of a specific area or activity.

  3. 12 CFR 1805.812 - Fraud, waste and abuse.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Fraud, waste and abuse. 1805.812 Section 1805.812 Banks and Banking COMMUNITY DEVELOPMENT FINANCIAL INSTITUTIONS FUND, DEPARTMENT OF THE TREASURY..., waste and abuse. Any person who becomes aware of the existence or apparent existence of fraud, waste or...

  4. 45 CFR 152.27 - Fraud, waste, and abuse.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...

  5. 45 CFR 152.27 - Fraud, waste, and abuse.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...

  6. 45 CFR 152.27 - Fraud, waste, and abuse.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...

  7. 45 CFR 152.27 - Fraud, waste, and abuse.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare Department of Health and Human Services REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...

  8. 45 CFR 152.27 - Fraud, waste, and abuse.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Fraud, waste, and abuse. 152.27 Section 152.27 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS PRE-EXISTING CONDITION INSURANCE PLAN PROGRAM Oversight § 152.27 Fraud, waste, and abuse. (a) Procedures. The...

  9. Pharmacy waste, fraud, and abuse in health care reform.

    PubMed

    Carpenter, Laura A; Edgar, Zachary; Dang, Christopher

    2011-01-01

    To describe the new Medicare and Medicaid waste, fraud, and abuse provisions of the Affordable Care Act (H. R. 3590) and Health Care and Education Affordability Reconciliation Act of 2010 (H. R. 4872), the preexisting law modified by H. R. 3590 and H. R. 4872, and applicable existing and proposed regulations. Waste, fraud, and abuse are substantial threats to the efficiency of the health care system. To combat these activities, the Department of Health and Human Services and Centers for Medicare & Medicaid Services promulgate and enforce guidelines governing the proper assessment and billing for Medicare and Medicaid services. These guidelines have a number of provisions that can catch even well-intentioned providers off guard, resulting in substantial fines. H. R. 3590 and H. R. 4872 augment preexisting waste, fraud, and abuse laws and regulations. This article reviews the new waste, fraud, and abuse laws and regulations to apprise pharmacists of the substantial changes affecting their practice. H. R. 3590 and H. R. 4872 modify screening requirements for providers; modify liability and penalties for the antikickback statute, federal False Claims Act, remuneration, and Stark Law; and create or extend auditing and management programs. Properly navigating these changes will be important in keeping pharmacies in compliance.

  10. 5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...

  11. 5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...

  12. Poster: Report Fraud Waste and Abuse to the EPA OIG Hotline

    EPA Pesticide Factsheets

    The EPA OIG hotline receives complaints of fraud, waste, and abuse in EPA and U.S. Chemical Safety Board programs and operations including mismanagement or violations of law, rules, or regulations by EPA employees or program participants.

  13. 18 CFR 3c.3 - Reporting fraud, waste, abuse, and corruption and cooperation with official inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., abuse, and corruption and cooperation with official inquiries. 3c.3 Section 3c.3 Conservation of Power... OF CONDUCT § 3c.3 Reporting fraud, waste, abuse, and corruption and cooperation with official..., abuse, and corruption in Commission programs, including on the part of Commission employees, contractors...

  14. 18 CFR 3c.3 - Reporting fraud, waste, abuse, and corruption and cooperation with official inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., abuse, and corruption and cooperation with official inquiries. 3c.3 Section 3c.3 Conservation of Power... OF CONDUCT § 3c.3 Reporting fraud, waste, abuse, and corruption and cooperation with official..., abuse, and corruption in Commission programs, including on the part of Commission employees, contractors...

  15. 13 CFR 101.301 - Who should receive information or allegations of waste, fraud, and abuse?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Who should receive information or allegations of waste, fraud, and abuse? 101.301 Section 101.301 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION ADMINISTRATION Inspector General § 101.301 Who should receive information or allegations of waste...

  16. 13 CFR 101.301 - Who should receive information or allegations of waste, fraud, and abuse?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Who should receive information or allegations of waste, fraud, and abuse? 101.301 Section 101.301 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION ADMINISTRATION Inspector General § 101.301 Who should receive information or allegations of waste...

  17. 42 CFR 495.368 - Combating fraud and abuse.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...

  18. 42 CFR 495.368 - Combating fraud and abuse.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...

  19. 42 CFR 495.368 - Combating fraud and abuse.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...

  20. 42 CFR 495.368 - Combating fraud and abuse.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...

  1. The Liability of Colleges and Universities for Fraud, Waste, and Abuse in Federally Funded Grants and Projects.

    ERIC Educational Resources Information Center

    Gordon, Steven D.

    1996-01-01

    The federal government's war on fraud, waste, and abuse in expenditure of federal funds has reached college campuses. Institutions that fail to heed this development are vulnerable to harsh sanctions. They must tighten accounting practices and recognize their liability for fraudulent practices of faculty and students. Internal investigations and…

  2. Control of fraud and abuse in Medicare and Medicaid.

    PubMed

    Pies, H E

    1977-01-01

    This Comment explores issues concerning the control of fraud and abuse in health programs financed with public funds, specifically the Medicare and Medicaid programs. It summarizes the nature, scope, and possible causes of what some regard as a fraud and abuse "crisis," and points out the difficulties and obstacles facing those who attempt to develop legislative and executive action aimed at controlling fraud and abuse. Recent federal initiatives in fraud and abuse control are examined, and a brief summary of key provisions of H.R. 3 (the Medicare-Medicaid Anti-fraud and Abuse Amendments, which may prove to be a landmark piece of legislation in this area) is provided. The author emphasizes that more effective control of fraud and abuse is necessary if further expansion of government financing of health programs, including national health insurance, is to occur in the near future. At the same time, caution must be taken not to neglect the appropriate use of other mechanisms necessary for reducing the costs of medical care and improving its quality. In addition, it is likely that efforts to stem fraud and abuse will raise important medicolegal and public policy issues that will require careful interdisciplinary consideration.

  3. Securing insurance protection against fraud and abuse liability.

    PubMed

    Callison, S

    1999-07-01

    Healthcare organizations concerned about corporate compliance need to review securing appropriate insurance coverage as part of their corporate compliance program. Provider organizations often mistakenly expect that their directors and officers liability (D&O), malpractice, or standard errors and omissions (E&O) insurance policies will cover the cost of Medicare fraud and abuse fines. The insurance industry has developed a specific billing E&O insurance product to cover providers that run afoul of government fraud and abuse statutes.

  4. Improving Fraud and Abuse Detection in General Physician Claims: A Data Mining Study

    PubMed Central

    Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad

    2016-01-01

    Background: We aimed to identify the indicators of healthcare fraud and abuse in general physicians’ drug prescription claims, and to identify a subset of general physicians that were more likely to have committed fraud and abuse. Methods: We applied data mining approach to a major health insurance organization dataset of private sector general physicians’ prescription claims. It involved 5 steps: clarifying the nature of the problem and objectives, data preparation, indicator identification and selection, cluster analysis to identify suspect physicians, and discriminant analysis to assess the validity of the clustering approach. Results: Thirteen indicators were developed in total. Over half of the general physicians (54%) were ‘suspects’ of conducting abusive behavior. The results also identified 2% of physicians as suspects of fraud. Discriminant analysis suggested that the indicators demonstrated adequate performance in the detection of physicians who were suspect of perpetrating fraud (98%) and abuse (85%) in a new sample of data. Conclusion: Our data mining approach will help health insurance organizations in low-and middle-income countries (LMICs) in streamlining auditing approaches towards the suspect groups rather than routine auditing of all physicians. PMID:26927587

  5. Improving Fraud and Abuse Detection in General Physician Claims: A Data Mining Study.

    PubMed

    Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad

    2015-11-10

    We aimed to identify the indicators of healthcare fraud and abuse in general physicians' drug prescription claims, and to identify a subset of general physicians that were more likely to have committed fraud and abuse. We applied data mining approach to a major health insurance organization dataset of private sector general physicians' prescription claims. It involved 5 steps: clarifying the nature of the problem and objectives, data preparation, indicator identification and selection, cluster analysis to identify suspect physicians, and discriminant analysis to assess the validity of the clustering approach. Thirteen indicators were developed in total. Over half of the general physicians (54%) were 'suspects' of conducting abusive behavior. The results also identified 2% of physicians as suspects of fraud. Discriminant analysis suggested that the indicators demonstrated adequate performance in the detection of physicians who were suspect of perpetrating fraud (98%) and abuse (85%) in a new sample of data. Our data mining approach will help health insurance organizations in low-and middle-income countries (LMICs) in streamlining auditing approaches towards the suspect groups rather than routine auditing of all physicians. © 2016 by Kerman University of Medical Sciences.

  6. Using Data Mining to Detect Health Care Fraud and Abuse: A Review of Literature

    PubMed Central

    Joudaki, Hossein; Rashidian, Arash; Minaei-Bidgoli, Behrouz; Mahmoodi, Mahmood; Geraili, Bijan; Nasiri, Mahdi; Arab, Mohammad

    2015-01-01

    Inappropriate payments by insurance organizations or third party payers occur because of errors, abuse and fraud. The scale of this problem is large enough to make it a priority issue for health systems. Traditional methods of detecting health care fraud and abuse are time-consuming and inefficient. Combining automated methods and statistical knowledge lead to the emergence of a new interdisciplinary branch of science that is named Knowledge Discovery from Databases (KDD). Data mining is a core of the KDD process. Data mining can help third-party payers such as health insurance organizations to extract useful information from thousands of claims and identify a smaller subset of the claims or claimants for further assessment. We reviewed studies that performed data mining techniques for detecting health care fraud and abuse, using supervised and unsupervised data mining approaches. Most available studies have focused on algorithmic data mining without an emphasis on or application to fraud detection efforts in the context of health service provision or health insurance policy. More studies are needed to connect sound and evidence-based diagnosis and treatment approaches toward fraudulent or abusive behaviors. Ultimately, based on available studies, we recommend seven general steps to data mining of health care claims. PMID:25560347

  7. Report: EPA Office of Inspector General’s Report on Reducing Fraud, Waste, and Abuse in the Small Business Innovative Research Program, as Required by the National Defense Authorization Act for Fiscal Year 2012, Pub. L. 112-81 (2012)

    EPA Pesticide Factsheets

    September 28, 2012. The EPA OIG is required by Section 5143 of the NDA Act for Fiscal Year 201 2, Pub. L. No. 112-81 (2012), to report on reducing vulnerability to fraud, waste and abuse in the Small Business Innovative Research (SBIR) program.

  8. Preventing fraud and abuse in low income weatherization programs: The proceedings of the EORI (Economic Opportunity Research Institute) Roundtable

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1987-01-01

    The Economic Opportunity Research Institute (EORI) sponsored a national Roundtable on ''Prevention of Fraud and Abuse in Low Income Weatherization Programs'' in Washington, DC on March 23-24, 1987. Funding for the Roundtable and these Proceedings was provided jointly by the US Departments of Health and Human Services/Office of Family Assistance and Energy through Grant FG01-85CE63438. The purpose of the Roundtable was two-fold: (1) to share successful and possible replicable state and local measures to prevent fraud and abuse in low income conservation programs; and (2) to identify any areas in these programs where the potential for fraud and abuse maymore » exist and examine methods to curb such potential. A Task Force representing eight states and including both state and local low income conservation program operators was chosen by EORI and the HHS Office of Family Assistance. The Agencies represented had developed successful preventive approaches to curbing fraud and abuse. Additional participants in the Roundtable included representatives from the US Department of Energy, Weatherization Assistance Program Office and the HHS Office of Energy Assistance, along with other state and local program operators.« less

  9. No evidence of the effect of the interventions to combat health care fraud and abuse: a systematic review of literature.

    PubMed

    Rashidian, Arash; Joudaki, Hossein; Vian, Taryn

    2012-01-01

    Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. The interventions to combat health care fraud can be categorized as the interventions for 'prevention' and 'detection' of fraud, and 'response' to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975-2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan) were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care.

  10. No Evidence of the Effect of the Interventions to Combat Health Care Fraud and Abuse: A Systematic Review of Literature

    PubMed Central

    Rashidian, Arash; Joudaki, Hossein; Vian, Taryn

    2012-01-01

    Background Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. Methods The interventions to combat health care fraud can be categorized as the interventions for ‘prevention’ and ‘detection’ of fraud, and ‘response’ to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975–2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. Findings The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan) were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. Discussion Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care. PMID:22936981

  11. 42 CFR 457.915 - Fraud detection and investigation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and abuse cases. (2) Methods for investigating fraud and abuse cases that— (i) Do not infringe on legal rights of persons involved; and (ii) Afford due process of law. (b) State program integrity unit... implement procedures for referring suspected fraud and abuse cases to the State program integrity unit (if...

  12. Fraud and abuse. Building an effective corporate compliance program.

    PubMed

    Matusicky, C F

    1998-04-01

    In 1997, General Health System (GHS), a not-for-profit integrated delivery system headquartered in Baton Rouge, Louisiana, developed a formal corporate compliance program. A newly appointed corporate compliance officer worked with key GHS managers and employees to assess the organization's current fraud and abuse prevention practices and recommend changes to meet new regulatory and organizational requirements. Then a structure for implementing these changes was developed, with staff training at its core. The program required a significant initial outlay of financial and human resources. The benefits to the organization, however, including a greater ability to respond quickly and effectively to possible compliance problems and better organizational communications, were worth the investment.

  13. Expanding physician education in health care fraud and program integrity.

    PubMed

    Agrawal, Shantanu; Tarzy, Bruce; Hunt, Lauren; Taitsman, Julie; Budetti, Peter

    2013-08-01

    Program integrity (PI) spans the entire spectrum of improper payments from fraud to abuse, errors, and waste in the health care system. Few physicians will perpetrate fraud or abuse during their careers, but nearly all will contribute to the remaining spectrum of improper payments, making preventive education in this area vital. Despite the enormous impact that PI issues have on government-sponsored and private insurance programs, physicians receive little formal education in this area. Physicians' lack of awareness of PI issues not only makes them more likely to submit inappropriate claims, generate orders that other providers and suppliers will use to submit inappropriate claims, and document improperly in the medical record but also more likely to become victims of fraud schemes themselves.In this article, the authors provide an overview of the current state of PI issues in general, and fraud in particular, as well as a description of the state of formal education for practicing physicians, residents, and fellows. Building on the lessons from pilot programs conducted by the Centers for Medicare and Medicaid Services and partner organizations, the authors then propose a model PI education curriculum to be implemented nationwide for physicians at all levels. They recommend that various stakeholder organizations take part in the development and implementation process to ensure that all perspectives are included. Educating physicians is an essential step in establishing a broader culture of compliance and improved integrity in the health care system, extending beyond Medicare and Medicaid.

  14. Using support vector machines to detect medical fraud and abuse.

    PubMed

    Francis, Charles; Pepper, Noah; Strong, Homer

    2011-01-01

    This paper examines the architecture and efficacy of Quash, an automated medical bill processing system capable of bill routing and abuse detection. Quash is designed to be used in conjunction with human auditors and a standard bill review software platform to provide a complete cost containment solution for medical claims. The primary contribution of Quash is to provide a real world speed up for medical fraud detection experts in their work. There will be a discussion of implementation details and preliminary experimental results. In this paper we are entirely focused on medical data and billing patterns that occur within the United States, though these results should be applicable to any financial transaction environment in which structured coding data can be mined.

  15. 18 CFR 2.300 - Statement of policy concerning allegations of fraud, abuse, or similar grounds under section 601...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Statement of policy concerning allegations of fraud, abuse, or similar grounds under section 601(c) of the NGPA. 2.300 Section 2.300 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF...

  16. 18 CFR 2.300 - Statement of policy concerning allegations of fraud, abuse, or similar grounds under section 601...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Statement of policy concerning allegations of fraud, abuse, or similar grounds under section 601(c) of the NGPA. 2.300 Section 2.300 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF...

  17. 18 CFR 2.300 - Statement of policy concerning allegations of fraud, abuse, or similar grounds under section 601...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Statement of policy concerning allegations of fraud, abuse, or similar grounds under section 601(c) of the NGPA. 2.300 Section 2.300 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF...

  18. 18 CFR 2.300 - Statement of policy concerning allegations of fraud, abuse, or similar grounds under section 601...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Statement of policy concerning allegations of fraud, abuse, or similar grounds under section 601(c) of the NGPA. 2.300 Section 2.300 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF...

  19. Avoiding pharmacy fraud through automation and audit.

    PubMed

    Tripodi, M

    1998-12-01

    Pharmacy data offer some of the most reliable and evaluative information in managed care today. As fraud constitutes up to 10% of our total health care expenditures, the author explains how monitoring the pharmacy network for fraud and abuse is an easy way of reclaiming some of these losses.

  20. Mooring in safe harbors. Proposed rules set out what's legal, what's not under Medicare fraud and abuse laws.

    PubMed

    MacKelvie, C F; Sanborn, A B

    1989-04-01

    The 1977 Fraud and Abuse Amendments, which prohibit business relationships that increase Medicare utilization, have created uncertainty among healthcare providers as to which commercial arrangements are legal and which are not. In response to this uncertainty, Congress enacted the Medicare and Medicaid Patient and Program Protection Act of 1987, which required the Department of Health and Human Services to develop regulations that would specify allowable practices. The regulations proposed Jan. 23, 1989, specify "safe harbors" from criminal and civil penalties in the following areas: sales of physician practices, rental agreements, investments by providers, and personal services and management contracts. In addition, the Fraud and Abuse Amendments exempted referrals arising out of a bona fide employment relationship, properly disclosed discounts, and group purchasing arrangements. The proposed regulations attempt to clarify these exemptions. Unfortunately, the proposals do little to calm a healthcare industry that is jumpy about which transactions are permitted and which are not. This is partly because the Internal Revenue Service, Health and Human Services, and the Department of Justice often issue conflicting pronouncements regarding prohibited business transactions by tax-exempt providers.

  1. 20 CFR 632.125 - Responsibilities of Native American grantees, subgrantees and contractors for preventing fraud...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal program management procedures sufficient to prevent fraud and program abuse, including subgrantee and...

  2. 20 CFR 632.125 - Responsibilities of Native American grantees, subgrantees and contractors for preventing fraud...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal program management procedures sufficient to prevent fraud and program abuse, including subgrantee and...

  3. Special Fraud Alert for Schools, Lenders, and Guarantee Agencies.

    ERIC Educational Resources Information Center

    Department of Education, Washington, DC.

    Guidelines to prevent fraud and abuse in the government's student aid programs are presented for schools, lenders, and guarantee agencies. Student aid fraud is defined as intentional wrongful obtaining of student financial assistance (SFA) benefits through deceptive means. It is noted that falsification of eligibility is the most common form of…

  4. Special Medicare reimbursement and fraud and abuse considerations for management services organizations, medical foundations, and integrated delivery systems.

    PubMed

    DeMuro, P R; Owens, J F

    1994-01-01

    This chapter discusses certain Medicare reimbursement and fraud and abuse considerations for management services organizations (MSOs), medical foundations, and integrated delivery systems. It stresses the necessity of a business plan, the sources of capitalization that might be used in creating an integrated delivery system, and their effect on Medicare reimbursement. It also discusses related party principles and considerations and the Medicare "incident to" regulations. Furthermore, it discusses the application of certain Medicare safe harbor regulations on MSOs' structures and services, and those of medical foundations and integrated delivery systems.

  5. Abuses in Federal Student Aid Programs: Hearings Before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs. United States Senate, One Hundred First Congress, Second Session (February 20, 26, 1990).

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Governmental Affairs.

    This document presents oral testimony and prepared statements on the subject of federal student loan programs identified as particularly vulnerable to fraud, waste, and abuse. Opening statements by the four Senators (Nunn, Kohl, Roth, and Levin) stress the seriousness of increasing student loan defaults and abuses by proprietary, for profit, trade…

  6. Strong Internal Controls at Service Delivery Level Will Help Prevent CETA-Type Fraud and Abuse in Job Training Partnership Act Programs. Report to Senator Sam Nunn, Ranking Minority Member, Permanent Subcommittee on Investigations, Senate Committee on Governmental Affairs.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC.

    The Government Accounting Office (GAO) conducted an examination of patterns and causes of fraud in Comprehensive Employment and Training Act (CETA) programs to determine how implementation of Job Training Partnership Act (JTPA) programs might be made less vulnerable to exploitation. GAO's investigation found that fraud and abuse in CETA programs…

  7. 76 FR 21373 - Privacy Act of 1974; Report of a New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-15

    ... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... established by State law; (3) support litigation involving the Agency; (4) combat fraud, waste, and abuse in...

  8. 20 CFR 627.500 - Scope and purpose.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... contained in this subpart shall be deemed to prejudice the separate exercise of other legal rights in...) Complaints and reports of criminal fraud, waste, and abuse. Information and complaints involving criminal fraud, waste, abuse or other criminal activity shall be reported through the Department's Incident...

  9. Medicare, Medicaid fraud a billion-dollar art form in the US

    PubMed Central

    Korcok, M

    1997-01-01

    Medicare and Medicaid fraud costs billions of dollars each year in the US. Investigators have shown that fraud is found in all segments of the health care system. Even though the Canadian system has stricter regulations and tighter controls, can regulators here afford to be complacent about believing that such abuse would not happen here? One province has established an antifraud unit to monitor its health insurance scheme; it already has 1 prosecution under its belt. PMID:9141996

  10. FraudBuster: Reducing Fraud in an Auto Insurance Market.

    PubMed

    Nagrecha, Saurabh; Johnson, Reid A; Chawla, Nitesh V

    2018-03-01

    Nonstandard insurers suffer from a peculiar variant of fraud wherein an overwhelming majority of claims have the semblance of fraud. We show that state-of-the-art fraud detection performs poorly when deployed at underwriting. Our proposed framework "FraudBuster" represents a new paradigm in predicting segments of fraud at underwriting in an interpretable and regulation compliant manner. We show that the most actionable and generalizable profile of fraud is represented by market segments with high confidence of fraud and high loss ratio. We show how these segments can be reported in terms of their constituent policy traits, expected loss ratios, support, and confidence of fraud. Overall, our predictive models successfully identify fraud with an area under the precision-recall curve of 0.63 and an f-1 score of 0.769.

  11. Food Assistance: Efforts To Control Fraud and Abuse in the Child and Adult Care Food Program Should Be Strengthened. United States General Accounting Office Report to Congressional Committees.

    ERIC Educational Resources Information Center

    Robertson, Robert E.

    The Child and Adult Care Food Program provides over $1.5 billion in benefits annually to children and adults in day care. In order to address the longstanding problems of fraud and abuse present in the program, state agencies have been charged with the responsibility for implementing Food and Nutrition Service's (FNS) regulations to prevent and…

  12. 78 FR 32257 - Privacy Act of 1974; Report of a New Routine Use for Selected CMS Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-29

    ... systems of records to assist in preventing and detecting fraud, waste and abuse. The new routine use will... for the purpose of preventing and detecting fraud, waste and abuse, pursuant to section 1128C(a)(2) of the Social Security Act (``the Act''). At section 1128C(c) of the Act, a health plan is defined as a...

  13. Financial Fraud and Child Abuse

    ERIC Educational Resources Information Center

    Little, Allison Dare

    2014-01-01

    A modern form of abuse of children by parents and foster parents is to use the identity of children in their care for their own financial benefit, such as accessing their unused social security numbers to secure credit. This article reviews examples and implications of this identity theft.

  14. Healthcare Fraud and Abuse

    PubMed Central

    Rudman, William J; Eberhardt, John S; Pierce, William; Hart-Hester, Susan

    2009-01-01

    In Texas, a supplier of durable medical equipment was found guilty of five counts of healthcare fraud due to submission of false claims to Medicare. The court sentenced the supplier to 120 months of incarceration and restitution of $1.6 million.1 Raritan Bay Medical Center agreed to pay the government $7.5 million to settle allegations that it defrauded the Medicare program, purposely inflating charges for inpatient and outpatient care, artificially obtaining outlier payments from Medicare.2 AmeriGroup Illinois, Inc., fraudulently skewed enrollment into the Medicaid HMO program by refusing to register pregnant women and discouraging registration for individuals with preexisting conditions. Under the False Claims Act and the Illinois Whistleblower Reward and Protection Act, AmeriGroup paid $144 million in damages to Illinois and the U.S. government and $190 million in civil penalties.3 In Florida, a dermatologist was sentenced to 22 years in prison, paid $3.7 million in restitution, forfeited an addition $3.7 million, and paid a $25,000 fine for performing 3,086 medically unnecessary surgeries on 865 Medicare beneficiaries.4 In Florida, a physician was sentenced to 24 months incarceration, ordered to pay $727,000 in restitution for cash payments where the physician signed blank prescriptions and certificates for medical necessity for patients he never saw.5 The U.S. Department of Health and Human Services (HHS) Office of the Inspector General (OIG) found that providers in 8 out of 10 audited states received an estimated total of $27.3 million in Medicaid overpayments for services claimed after beneficiaries' deaths.6 PMID:20169019

  15. Elder Fraud and Financial Exploitation: Application of Routine Activity Theory.

    PubMed

    DeLiema, Marguerite

    2017-03-10

    Elder financial exploitation, committed by individuals in positions of trust, and elder fraud, committed by predatory strangers, are two forms of financial victimization that target vulnerable older adults. This study analyzes differences between fraud and financial exploitation victims and tests routine activity theory as a contextual model for victimization. Routine activity theory predicts that criminal opportunities arise when a motivated offender and suitable target meet in the absence of capable guardians. Fifty-three financial exploitation and fraud cases were sampled from an elder abuse forensic center. Data include law enforcement and caseworker investigation reports, victim medical records, perpetrator demographic information, and forensic assessments of victim health and cognitive functioning. Fraud and financial exploitation victims performed poorly on tests of cognitive functioning and financial decision making administered by a forensic neuropsychologist following the allegations. Based on retrospective record review, there were few significant differences in physical health and cognitive functioning at the time victims' assets were taken, although their social contexts were different. Significantly more fraud victims were childless compared with financial exploitation victims. Fraud perpetrators took advantage of elders when they had no trustworthy friends or relatives to safeguard their assets. Findings support an adapted routine activity theory as a contextual model for financial victimization. Fraud most often occurred when a vulnerable elder was solicited by a financial predator in the absence of capable guardians. Prevention efforts should focus on reducing social isolation to enhance protection. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. 42 CFR 457.232 - Refunding of Federal Share of CHIP overpayments to providers and referral of allegations of waste...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Refunding of Federal Share of CHIP overpayments to providers and referral of allegations of waste, fraud or abuse to the Office of Inspector General. 457.232 Section 457.232 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) STATE CHILDREN'S...

  17. DOD Financial Management: Ongoing Challenges in Implementing the Financial Improvement and Audit Readiness Plan

    DTIC Science & Technology

    2011-09-15

    programs and operations at high risk of being vulnerable to fraud, waste, and abuse.1 Despite several reform initiatives, DOD’s financial management...remains on GAO’s high- risk list today. Long- standing and pervasive weaknesses in DOD’s financial management and related business processes and systems...GAO has identified as being at high risk of waste, fraud, abuse, and mismanagement. The seven specific DOD high- risk areas are (1) approach to

  18. Eliminating waste in US health care.

    PubMed

    Berwick, Donald M; Hackbarth, Andrew D

    2012-04-11

    The need is urgent to bring US health care costs into a sustainable range for both public and private payers. Commonly, programs to contain costs use cuts, such as reductions in payment levels, benefit structures, and eligibility. A less harmful strategy would reduce waste, not value-added care. The opportunity is immense. In just 6 categories of waste--overtreatment, failures of care coordination, failures in execution of care processes, administrative complexity, pricing failures, and fraud and abuse--the sum of the lowest available estimates exceeds 20% of total health care expenditures. The actual total may be far greater. The savings potentially achievable from systematic, comprehensive, and cooperative pursuit of even a fractional reduction in waste are far higher than from more direct and blunter cuts in care and coverage. The potential economic dislocations, however, are severe and require mitigation through careful transition strategies.

  19. Department of Justice

    MedlinePlus

    ... of Seized Property Submit a Complaint Report Waste, Fraud, Abuse or Misconduct Find a Form Register, Apply ... Preparer Sentenced to Prison For Tax and Bankruptcy Fraud Thursday, November 16, 2017 Assistant Attorney General Makan ...

  20. Health Fraud

    MedlinePlus

    Health fraud involves selling drugs, devices, foods, or cosmetics that have not been proven effective. Keep in ... you from getting the treatment you really need. Health fraud scams can be found everywhere, promising help ...

  1. 20 CFR 632.125 - Responsibilities of Native American grantees, subgrantees and contractors for preventing fraud...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... management information system in accordance with the requirements of § 632.32. (c) Any person having..., subgrantees and contractors for preventing fraud and program abuse and for general program management. 632.125... and for general program management. (a) Each Native American grantee shall establish and use internal...

  2. [Communication of scientific fraud].

    PubMed

    Zeitoun, Jean-David; Rouquette, Sébastien

    2012-09-01

    There is for a scientific journal several levels of communication depending of the degree of suspicion or certainty of a case of error or fraud. The task is increasingly difficult for journal editors as disclosed cases of fraud are more common and scientific communication on this topic is growing. Biomedical fraud is fairly little reported by the mainstream press and causes of this low interest are not currently well understood. The difficulty of processing this type of news for journalists appears to be one possible reason. The potentially numerous and significant consequences of fraud on health professionals are poorly documented. Though it is likely to cause a feeling of distrust and create controversy, the impact of fraud on the general public is poorly studied and appears multifactorial. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  3. 78 FR 73923 - Privacy Act of 1974, as Amended; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... data sources, as well as access to analytical services designed to detect fraud and systemic improper... systemic fraud, waste, and abuse within Federal programs; (d) Disclosure to (1) a Federal agency, its... prosecuting violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license...

  4. Fraud Detection in Healthcare

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chandola, Varun; Schryver, Jack C; Sukumar, Sreenivas R

    We discuss the problem of fraud detection in healthcare in this chapter. Given the recent scrutiny of the ineciencies in the US healthcare system, identifying fraud has been on the forefront of the eorts towards reducing the healthcare costs. In this chapter we will focus on understanding the issue of healthcare fraud in detail, and review methods that have been proposed in the literature to combat this issue using data driven approach.

  5. Fraud prevention in paying portal

    NASA Astrophysics Data System (ADS)

    Sandhu, P. S.; Senthilkumar, N. C.

    2017-11-01

    The purpose of presenting this paper is to give the idea to prevent the fraud in finance paying portals as fraud is increasing on daily basis and mostly in financial sector. So through this paper we are trying to prevent the fraud. This paper will give you the working algorithm through which you can able to prevent the fraud. Algorithm will work according to the spending amount of the user, which means that use will get categories into one of the low, medium, high or very high category.

  6. Fraud and fiduciary liability.

    PubMed

    Hodge, Brian Ray

    2003-12-01

    All employee benefit plans are potential targets of fraudulent schemes. Smaller plans are targeted by unscrupulous brokers and promoters selling fraudulent policies; plans large enough to be self-insured face greater risks of fraud by providers and participants misrepresenting claims. Plan trustees, administrators and consultants should be alert to the many ways fraudulent schemes manifest themselves and to the legal remedies available; establish investigative programs to detect and discourage fraud; and promote education and plan incentives for participants to report fraud.

  7. FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining

    PubMed Central

    Seeja, K. R.; Zareapoor, Masoumeh

    2014-01-01

    This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers. PMID:25302317

  8. FraudMiner: a novel credit card fraud detection model based on frequent itemset mining.

    PubMed

    Seeja, K R; Zareapoor, Masoumeh

    2014-01-01

    This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.

  9. Avoiding Service Station Fraud.

    ERIC Educational Resources Information Center

    Burton, Grace M.; Burton, John R.

    1982-01-01

    High school students are warned against service station fraud. A problem-solving section is designed to help students calculate consumer costs for various fraudulent transactions. Several ways of reducing fraud or of lessening the chances of problems are noted. (MP)

  10. Prescription drug abuse: problem, policies, and implications.

    PubMed

    Phillips, Janice

    2013-01-01

    This article provides an overview on prescription drug abuse and highlights a number of related legislative bills introduced during the 112th Congress in response to this growing epidemic. Prescription drug abuse has emerged as the nation's fastest growing drug problem. Although prescription drugs have been used effectively and appropriately for decades, deaths from prescription pain medicine in particular have reached epidemic proportions. Bills related to prescription drug abuse introduced during the 112th Congress focus on strengthening provider and consumer education, tracking and monitoring prescription drug abuse, improving data collection on drug overdose fatalities, combating fraud and abuse in Medicare and Medicaid programs, reclassifying drugs to make them more difficult to prescribe and obtain, and enforcing stricter penalties for individuals who operate scam pain clinics and sell pain pills illegitimately. This article underscores the importance of a multifaceted approach to combating prescription drug abuse and concludes with implications for nursing. Copyright © 2013. Published by Mosby, Inc.

  11. 7 CFR 276.3 - Negligence or fraud.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Negligence or fraud. 276.3 Section 276.3 Agriculture... Negligence or fraud. (a) General. If FNS determines that there has been negligence or fraud on the part of..., pay to FNS a sum equal to the amount of coupons issued as a result of such negligence or fraud. (b...

  12. Defense Infrastructure: DOD Efforts Regarding Net Zero Goals

    DTIC Science & Technology

    2016-01-12

    and reducing, reusing, and recovering waste streams to add zero waste to landfills . House Report 114-102, accompanying a bill for the National...Testimony Order by Phone Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.

  13. Fighting Fraud in Schools

    ERIC Educational Resources Information Center

    Dessoff, Alan

    2009-01-01

    It's no surprise that school districts are as vulnerable to fraud as the private sector or any other segment of government. Crimes in districts include collusion with outside vendors who provide kickbacks to employees, misuse of district-issued credit cards, embezzlement of district funds, and theft of district property. "Fraud happens…

  14. Electronic Fraud on Campus.

    ERIC Educational Resources Information Center

    Sauter, David M.

    1998-01-01

    It is surprisingly easy for today's students to change grades, falsify documents, or create bogus diplomas. Explores the extent of the problem and offers ideas on ways in which colleges can protect themselves and society from the consequences of educational fraud. Addresses staff training, distribution of information regarding fraud, and improving…

  15. 77 FR 18825 - Notice of Intent To Provide Expansion and Capacity Building Funding to the Incumbent Senior...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-28

    ...), and the Department of Justice to expand strategies to eliminate waste, fraud, and abuse in these... resources to use in outreach and educational efforts; Expertise and experience in reaching targeted...

  16. Suspension and Debarment Program

    EPA Pesticide Factsheets

    EPA's management authority includes an effective administrative tool to address waste, fraud, abuse, poor performance, environmental noncompliance or other misconduct...the authority to suspend and or debar individuals and entities.

  17. 77 FR 25013 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-26

    ... Inspector General for Tax Administration (TIGTA) OMB Number: 1505-0217. Type of Review: Extension without... administration of internal revenue laws, including the prevention and detection of fraud, waste, and abuse...

  18. Approaches for Establishing Fraud Risk Assessment Programs and Conducting Fraud Audit Risk Assessments Within the Department of Defense

    DTIC Science & Technology

    2014-07-17

    Auditing Health Care Organizations _________ 35 Special Fraud Risk Considerations When Auditing Government Contracts ______________ 36 iv │ DODIG-2014...Auditor Fraud Risk Assessment Special Considerations Special Fraud Risk Considerations When Auditing Health Care Organizations...Learning Opportunities 0 Government Relations (Public Policy and Strategic Relations) Government Relations 0 Health Care Affairs Health Care Affairs 0 Human

  19. EPA OIG Hotline

    EPA Pesticide Factsheets

    The EPA OIG Hotline receives complaints of fraud, waste, and abuse in EPA programs and operations including mismanagement or violations of law, rules, or regulations by EPA employees or program participants.

  20. Combating fraud in health care: an essential component of any cost containment strategy.

    PubMed

    Morris, Lewis

    2009-01-01

    Federal health care programs, including Medicare and Medicaid, are under attack by dishonest people who lie to the government and exploit its programs to steal taxpayers' money. The full extent of health care fraud cannot be measured precisely. However, the Federal Bureau of Investigation (FBI) estimates that fraudulent billings to public and private health care programs are 3-10 percent of total health spending, or $75-$250 billion in fiscal year 2009. Successful efforts to stop such abuses, without unduly burdening legitimate providers, require aggressive, innovative, and sustained attention to protect taxpayers and beneficiaries.

  1. Data fraud in clinical trials

    PubMed Central

    George, Stephen L; Buyse, Marc

    2015-01-01

    Highly publicized cases of fabrication or falsification of data in clinical trials have occurred in recent years and it is likely that there are additional undetected or unreported cases. We review the available evidence on the incidence of data fraud in clinical trials, describe several prominent cases, present information on motivation and contributing factors and discuss cost-effective ways of early detection of data fraud as part of routine central statistical monitoring of data quality. Adoption of these clinical trial monitoring procedures can identify potential data fraud not detected by conventional on-site monitoring and can improve overall data quality. PMID:25729561

  2. 48 CFR 509.406-3 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., Reporting Waste, Fraud, Abuse, and Corruption. If, after investigation, the OIG believes a cause for... last known home and business addresses, zip codes, and DUNS Numbers. (3) A statement of facts. (4...

  3. Compassionate Allowances

    MedlinePlus

    ... Report Fraud, Waste or Abuse Site Map Other Government Websites: Benefits.gov Disability.gov MyMoney.gov Regulations.gov USA.gov Other Government Sites Follow: Twitter Facebook YouTube Blog More Social ...

  4. Benefits for People with Disabilities

    MedlinePlus

    ... Report Fraud, Waste or Abuse Site Map Other Government Websites: Benefits.gov Disability.gov MyMoney.gov Regulations.gov USA.gov Other Government Sites Follow: Twitter Facebook YouTube Blog More Social ...

  5. Consumer Frauds and Deceptions: A Learning Module.

    ERIC Educational Resources Information Center

    Waddell, Fred E.; And Others

    This manual is designed to assist helping professionals responsible for developing consumer education programs for older adults on the topic of consumer fraud and deception. In a modular presentation format, the materials address the following areas of concern: (1) types of frauds and deceptions such as money schemes, mail order fraud,…

  6. 75 FR 60422 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... November 1, 2010. Title and OMB Number: Trustee Report, DD Form 2826, OMB Number 0730-0012. Type of Request... fraud, waste and abuse of Government funds and member's benefits. Affected Public: Individuals or...

  7. Fraud Education for Accounting Students.

    ERIC Educational Resources Information Center

    Peterson, Bonita K.

    2003-01-01

    Reports that limited fraud education takes place in accounting due to a crowded curriculum and misunderstanding of the extent of fraud. Suggests ways to develop content on the topic and provides a list of teaching materials (textbooks, workbooks, trade books, case materials, videos, and reference materials). (Contains 16 references.) (SK)

  8. Online Safety: Fraud, Security, Phishing, Vishing

    MedlinePlus

    ... Theft Online Safety Privacy Report Scams and Frauds Online Safety Be aware of these scams when you' ... Security and Safety Internet Fraud Phishing and Vishing Online Security and Safety The internet makes many everyday ...

  9. 45 CFR 235.110 - Fraud.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Fraud. 235.110 Section 235.110 Public Welfare... PROGRAMS § 235.110 Fraud. State plan requirements: A State plan under title I, IV-A, X, XIV, or XVI of the Social Security Act must provide: (a) That the State agency will establish and maintain: (1) Methods and...

  10. Poster: Whistleblower Protection Ombudsman for the EPA OIG

    EPA Pesticide Factsheets

    The Whistleblower Protection Enhancement Act of 2012 Exit was signed into law on November 27, 2012. The Act strengthens protection for federal employees who blow the whistle on waste, fraud, and abuse in government operations.

  11. Whistleblowing in the pharmaceutical industry in the United States, England, Canada, and Australia.

    PubMed

    Boumil, Sylvester James; Nariani, Ashiyana; Boumil, Marcia M; Berman, Harris A

    2010-04-01

    Fraud and abuse in the spending of public monies plague governments around the world. In the United States the False Claims Act encourages whistleblowing by private individuals to expose evidence of fraud. They are rewarded for their efforts with monetary compensation and protection from retaliation. Such is not the case in Canada, England, and Australia. Although some recent legislation has increased the protections afforded to whistleblowers, they are still likely to be viewed more as disloyal employees than courageous public servants, and there is little incentive to risk their jobs and reputation. Qui tam laws provide a police force of thousands in the effort to reduce rampant fraud, waste, and abuse, and would be an asset in any health-care system where pubic health policy requires conservation of resources.

  12. Fraud and plagiarisim in school and career.

    PubMed

    Agud, J L

    2014-10-01

    Between 0% and 94% of university students acknowledge having committed academic fraud. Its forms are varied: cheating on examinations, submitting someone else's work, plagiarism, false citations, false reporting on experiments, tests or findings in the medical history and physical examination, unfair behavior toward fellow students, and many others. The consequences of academic fraud include learning corruption, useless efforts by students and faculty, incorrect performance evaluations and unfair selection for jobs. Since this can be a prelude to future fraud as doctors or researches, the prevalence, risk factors, motivations, clinical appearances, detection and prevention of the disease of academic fraud are here reviewed. Copyright © 2014 Elsevier España, S.L.U. All rights reserved.

  13. Who Can You Trust? Protecting Your Organization from Internal Fraud.

    ERIC Educational Resources Information Center

    Lukaszewski, Thomas E.

    1997-01-01

    Discusses how to protect a child care organization from employee fraud. Differentiates employee and management fraud and examines reasons fraud is committed. Suggests procedures for protecting an organization from fraud, including establishing an effective internal control system, paying attention to unusual employee behavior, reviewing expense…

  14. An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data

    NASA Astrophysics Data System (ADS)

    Laleh, Naeimeh; Azgomi, Mohammad Abdollahi

    Credit card and personal loan applications have increased significantly. Application fraud is present when the application forms contain plausible and synthetic identity information or real stolen identity information. The monetary cost of application fraud is often estimated to be in the billions of dollars [1].

  15. Annual Plan for the EPA and CSB - FY 2014

    EPA Pesticide Factsheets

    How the OIG will promote economy, efficiency and effectiveness, and prevent and detect fraud, waste and abuse, through independent oversight of the programs and operations of the EPA and the U.S. Chemical Safety and Hazard Investigation Board.

  16. Financial fraud and health: the case of Spain.

    PubMed

    Zunzunegui, Maria Victoria; Belanger, Emmanuelle; Benmarhnia, Tarik; Gobbo, Milena; Otero, Angel; Béland, François; Zunzunegui, Fernando; Ribera-Casado, Jose Manuel

    To examine whether financial fraud is associated with poor health sleeping problems and poor quality of life. Pilot study (n=188) conducted in 2015-2016 in Madrid and León (Spain) by recruiting subjects affected by two types of fraud (preferred shares and foreign currency mortgages) using venue-based sampling. Information on the monetary value of each case of fraud; the dates when subjects became aware of being swindled, lodged legal claim and received financial compensation were collected. Inter-group comparisons of the prevalence of poor physical and mental health, sleep and quality of life were carried according to type of fraud and the 2011-2012 National Health Survey. In this conventional sample, victims of financial fraud had poorer health, more mental health and sleeping problems, and poorer quality of life than comparable populations of a similar age. Those who had received financial compensation for preferred share losses had better health and quality of life than those who had not been compensated and those who had taken out foreign currency mortgages. The results suggest that financial fraud is detrimental to health. Further research should examine the mechanisms through which financial fraud impacts health. If our results are confirmed psychological and medical care should be provided, in addition to financial compensation. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  17. Report on inspection of compliance with DOE Order 2030.4B at the Savannah River Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-03-01

    The purpose of this inspection was to evaluate contractor compliance at the Savannah River Site (SRS) with Department of Energy (DOE) Order 2030.4B, {open_quotes}Reporting Fraud, Waste, And Abuse To The Office Of Inspector General.{close_quotes} The specific objective was to determine if the SRS management and operating (M&O) contractors were complying with the requirements in Paragraph 6.c. of DOE Order 2030.4B. These requirements are: (1) annual notification to employees of their duty to report allegations of fraud, waste, abuse, corruption, or mismanagement; (2) display and publish the DOE Office of Inspector General (OIG) Hotline telephone number in common areas of buildings;more » (3) display and publish the DOE OIG Hotline number in telephone books and newsletters; and (4) notify the OIG cases referred to other law enforcement entities.« less

  18. Transcript Fraud and Handling Fraudulent Documents

    ERIC Educational Resources Information Center

    Ezell, Allen

    2005-01-01

    Transcript fraud is a common problem for colleges and universities, businesses, employers, governmental licensing boards, and other agencies, with some experiencing it more so than others. The only difference between a large and small institution is the volume of degree and transcript fraud it experiences. This article discusses the types and…

  19. A prescription fraud detection model.

    PubMed

    Aral, Karca Duru; Güvenir, Halil Altay; Sabuncuoğlu, Ihsan; Akar, Ahmet Ruchan

    2012-04-01

    Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center medical prescription database. Conventionally, prescription fraud detection is conducted on random samples by human experts. However, the samples might be misleading and manual detection is costly. We propose a novel distance based on data-mining approach for assessing the fraudulent risk of prescriptions regarding cross-features. Final tests have been conducted on adult cardiac surgery database. The results obtained from experiments reveal that the proposed model works considerably well with a true positive rate of 77.4% and a false positive rate of 6% for the fraudulent medical prescriptions. The proposed model has the potential advantages including on-line risk prediction for prescription fraud, off-line analysis of high-risk prescriptions by human experts, and self-learning ability by regular updates of the integrative data sets. We conclude that incorporating such a system in health authorities, social security agencies and insurance companies would improve efficiency of internal review to ensure compliance with the law, and radically decrease human-expert auditing costs. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  20. Consumer Fraud: An Empirical Perspective. Summary.

    ERIC Educational Resources Information Center

    Schubert, Jane G.; And Others

    The American Institutes for Research (AIR) and the National Consumer Law Center (NCLC) studied consumer fraud and assessed possible intervention. Phase I produced an AIR description of the nature, scope, and characteristics of consumer fraud and an NCLC compilation of the laws and regulations which control it. In Phase II AIR developed…

  1. 78 FR 22270 - Special Fraud Alert: Physician-Owned Entities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-15

    ...] Special Fraud Alert: Physician-Owned Entities AGENCY: Office of Inspector General (OIG), HHS. ACTION... Physician-Owned Entities. Specifically, the Special Fraud Alert addressed physician-owned entities that... publication of the Special Fraud Alert on Physician-Owned Entities, an inadvertent error appeared in the DATES...

  2. Using the OIG model compliance programs to fight fraud.

    PubMed

    Lovitky, Jeffrey A; Ahern, Jack

    2002-03-01

    Many healthcare organizations already have implemented compliance programs for their facilities. However, in light of recent fines and continued scrutiny of such programs by the HHS Office of Inspector General (OIG), healthcare organizations should consider reviewing their current programs against the OIG's relevant model compliance program. Although healthcare organizations are not required to adhere strictly to OIG's model programs, they would benefit from ensuring that their programs meet all the OIG's requirements. The common, minimum elements suggested by the OIG model programs include development and distribution of written compliance policies, the designation of a chief compliance officer to manage the program, the development of a corrective action and enforcement system, and the use of audits to monitor compliance. Using these models as guides, healthcare organizations should be better able to avoid the possibility of fraud and abuse within their organizations.

  3. Prevalence of Financial Fraud and Scams Among Older Adults in the United States: A Systematic Review and Meta-Analysis.

    PubMed

    Burnes, David; Henderson, Charles R; Sheppard, Christine; Zhao, Rebecca; Pillemer, Karl; Lachs, Mark S

    2017-08-01

    The financial exploitation of older adults was recently recognized by the Centers for Disease Control and Prevention as a serious public health problem. Knowledge of the prevalence of elder financial exploitation is mostly limited to the category of financial abuse, which occurs in relationships involving an expectation of trust. Little is known about the other major category of elder financial exploitation-elder financial fraud and scams, which is perpetrated by strangers. A valid estimate of elder financial fraud-scam prevalence is necessary as a foundation for research and prevention efforts. To estimate the prevalence of elder financial fraud-scam victimization in the United States based on a systematic review and meta-analysis. Multiple investigators independently screened titles and abstracts and reviewed relevant full-text records from PubMed, Medline, PsycINFO, Criminal Justice Abstracts, Social Work Abstracts, and AgeLine databases. To maximize the validity and generalizability of prevalence estimation, we restricted eligibility to general population-based studies (English speaking, 1990 onward) using state- or national-level probability sampling and collecting data directly from older adults. Information on elder financial fraud-scam prevalence and study-level characteristics was extracted independently by 2 investigators. Meta-analysis of elder financial fraud-scam prevalence used generalized mixed models with individual studies as levels of a random classification factor. We included 12 studies involving a total of 41 711 individuals in the meta-analysis. Overall pooled elder financial fraud-scam prevalence (up to 5-year period) across studies was 5.6% (95% confidence interval [CI] = 4.0%, 7.8%), with a 1-year period prevalence of 5.4% (95% CI = 3.2%, 7.6%). Studies using a series of questions describing specific fraud-scam events to measure victimization found a significantly higher prevalence (7.1%; 95% CI = 4.8%, 9.4%) than studies

  4. [Scientific fraud. A disease we find among ourselves].

    PubMed

    Guimarães, S

    1998-01-01

    Scientific fraud is not a problem exclusive to countries with high scientific development. Fraud does not necessarily mean invention of results, usurpation of ideas, manifest plagiarism or any other kind of serious scientific misconduct. Although more rare in countries where scientific production is more modest, pungent cases of scientific fraud also exist. However, less notorious cases of scientific misconduct are frequent and must be avoided. Examples of these less notorious sins are presented. The seriousness of scientific fraud is not only due to the fact that it may involve public funds, which could have been put to more useful purposes but, above all, because it violates scientific ethics and frustrates the final aim of science, the discovery of truth.

  5. Fighting Domestic and International Fraud in the Admissions and Registrar's Offices

    ERIC Educational Resources Information Center

    Koenig, Ann M.; Devlin, Edward

    2012-01-01

    The education sector is no stranger to fraud, unfortunately. This article provides best practice guidance in recognizing and dealing with fraud, with emphasis on domestic and international academic credential fraud. It includes practical approaches to academic document review and verification. Success in fighting fraud requires becoming informed,…

  6. Combating healthcare corruption and fraud with improved global health governance.

    PubMed

    Mackey, Tim K; Liang, Bryan A

    2012-10-22

    Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of "global health corruption" and development of a treaty protocol to combat this crucial issue.

  7. Data Analytics in Procurement Fraud Prevention

    DTIC Science & Technology

    2014-05-30

    Certified Fraud Examiners CAC common access card COR contracting officer’s representative CPAR Contractor Performance Assessment Reporting System DCAA...using analytics to predict patterns occurring in known credit card fraud investigations to prevent future schemes before they happen. The goal of...or iTunes . 4. Distributional Analytics Distributional analytics are used to detect anomalies within data. Through the use of distributional

  8. 75 FR 38112 - Organization, Functions, and Delegations of Authority; Part G; Indian Health Service; Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-01

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Indian Health Service Organization, Functions, and... Ethics Staff (PIES) (GAL1) (1) Directs the fact-finding and resolution of allegations of impropriety such as mismanagement of resources, fraud, waste, and abuse, violations of the Standards of Ethical...

  9. Defining the public health threat of food fraud.

    PubMed

    Spink, John; Moyer, Douglas C

    2011-01-01

    Food fraud, including the more defined subcategory of economically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless of the cause of the food risk, adulteration of food is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration of food with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that-economically motivated-but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number of potential contaminants. The authors developed the core concepts reported here following comprehensive research of articles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud-it focuses specifically on the public health threat-and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications of the crime triangle and the chemistry of the crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research. Food fraud, including the more defined subcategory of economically motivated adulteration, is a food protection threat that has not been defined or holistically addressed. The terrorist attacks of September 11, 2001, led to the development of food defense as an autonomous area of

  10. Abuses in Federal Student Grant Programs: Proprietary School Abuses. Hearing before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs. United States Senate, One Hundred Fourth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Governmental Affairs.

    The purpose of this hearing was to probe a pattern of fraud and abuse in the Pell Grant Program for postsecondary students, focusing specifically on the IADE American Schools, a for-profit vocational school with campuses in the Los Angeles (California) area and serving primarily Hispanic students. In his opening remarks Senator Roth detailed a…

  11. 78 FR 29055 - State Medicaid Fraud Control Units; Data Mining

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ...] State Medicaid Fraud Control Units; Data Mining AGENCY: Office of Inspector General (OIG), HHS. ACTION... Fraud Control Units (MFCU) from using Federal matching funds to identify fraud through screening and... Control Number (OCN) 0990-0162. Table 2 indicates the paperwork burden associated with the requirements of...

  12. 48 CFR 970.0370-1 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... management and quality control to discourage waste, fraud and abuse; and to ensure that components, products, and services that are provided to the Department of Energy (DOE) satisfy the contractor's obligations... for effective management systems and internal controls within their areas of assigned responsibility...

  13. Telecommunications Technology: Federal Funding for Schools and Libraries. Report to the Chairman, Committee on Commerce, and the Chairman, Committee on Education and the Workforce, House of Representatives.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Health, Education, and Human Services Div.

    This document reports on federally created or facilitated programs for helping schools and libraries with their telecommunications and information technology efforts. Brief answers to specific questions on program characteristics, potential for duplication, coordination efforts, and available information on fraud, waste, and abuse are provided in…

  14. Defense Transportation: DOD Needs to Improve the Evaluation of Safety and Performance Information for Carriers Transporting Security-Sensitive Materials

    DTIC Science & Technology

    2015-12-01

    caught on fire in September 2014 near Crawfordville, Georgia. The tires and the trailer were burned off. See figure 11. There were no reported...Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.

  15. Defense Contracts: DOD’s Requests for Information from Contractors to Assess Prices

    DTIC Science & Technology

    2015-08-01

    manuals $4,000,000 Commercial Goodyear tires $3,290,902 Commercial Multiband manpack radio systems and operator training $1,742,712...by Phone Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.

  16. 76 FR 28855 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... business systems and internal controls are the first line of defense against waste, fraud, and abuse. Weak control systems increase the risk of unallowable and unreasonable costs on Government contracts. To...'s accounting system rather than the adequacy of the contractor's control environment and overall...

  17. 32 CFR 516.67 - Overseas cases of fraud or corruption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Overseas cases of fraud or corruption. 516.67... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas cases of fraud or corruption. (a) Commanders of overseas major commands will establish procedures...

  18. An Analysis of Internal Controls and Procurement Fraud Deterrence

    DTIC Science & Technology

    2013-12-01

    might keep the organization from achieving its objectives and analyze risks , including fraud risk , so as to decide how the risk should be managed ( COSO ...internal control to adequately manage the risk ( COSO , 2013). Risk management involves developing the effective internal control targeted at a...structure and management . While the risk of fraud cannot be eliminated entirely, it can be greatly reduced with an appropriate procurement fraud prevention

  19. Corruption and internal fraud in the Turkish construction industry.

    PubMed

    Gunduz, Murat; Önder, Oytun

    2013-06-01

    The purpose of this paper is to develop an understanding about the internal fraud and corruption problem in the Turkish construction industry. The reasons behind the internal fraud and corruption problem as well as the types of prevention methods were investigated; and as a result various recommendations were made. To this end, a risk awareness questionnaire was used to understand the behavioral patterns of the construction industry, and to clarify possible proactive and reactive measures against internal fraud and corruption. The type of fraud experienced by Turkish construction companies was also surveyed in the questionnaire. The questionnaire was sent to 89 firms; and depending on the collected data, certain recommendations for construction industry professionals were provided.

  20. Combating healthcare corruption and fraud with improved global health governance

    PubMed Central

    2012-01-01

    Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of “global health corruption” and development of a treaty protocol to combat this crucial issue. PMID:23088820

  1. 75 FR 2457 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-15

    ... INFORMATION: A. Background Contractor business systems and internal controls are the first line of defense against waste, fraud, and abuse. Weak control systems increase the risk of unallowable and unreasonable... Office of Management and Budget (OMB) as follows: (1) Accounting Systems--OMB Clearance 9000-0011; (2...

  2. 76 FR 30841 - Structure and Practices of the Video Relay Service Program; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-27

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket No. 10-51; FCC 11-54] Structure and Practices of the Video Relay Service Program; Correction AGENCY: Federal Communications Commission. ACTION... address fraud, waste, and abuse in the Video Relay Service (VRS) industry. DATES: Effective June 1, 2011...

  3. 77 FR 60630 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket No. 10-51; FCC 11-54] Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications Commission. ACTION: Correcting... address fraud, waste, and abuse in the Video Relay Service (VRS) industry. DATES: Effective October 4...

  4. Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection

    NASA Astrophysics Data System (ADS)

    Flegel, Ulrich; Kerschbaum, Florian; Miseldine, Philip; Monakova, Ganna; Wacker, Richard; Leymann, Frank

    One company by itself cannot detect all instances of fraud or insider attacks. An example is the simple case of buyer fraud: a fraudulent buyer colludes with a supplier creating fake orders for supplies that are never delivered. They circumvent internal controls in place to prevent this kind of fraud, such as a goods receipt, e.g., by ordering services instead of goods. Based on the evidence collected at one company, it is often extremely difficult to detect such fraud, but if companies collaborate and correlate their evidence, they could detect that the ordered services have never actually been provided.

  5. The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules

    DTIC Science & Technology

    2013-12-16

    payloads and instead began distributing Bitcoin miners and click fraud modules.3 From a technical perspective, the primary click fraud malware used in...this era operated in the indiscriminate “auto-clicking” fashion we describe in Section 5. Alongside the click fraud and Bitcoin payloads, ZeroAccess

  6. An Evaluation of the Effectiveness of Policy Communication in the Professional Development Centre's Training Programs.

    ERIC Educational Resources Information Center

    Rudasill, Susann E.

    In the face of rising juvenile violent crime rates and media talk of waste, abuse, fraud, and ineffectiveness within the Florida Department of Health and Rehabilitative Services (HRS), the state recommended the adoption of a family-focused approach in client intervention strategy. The Florida Atlantic University Professional Development Centre…

  7. [High Risk Federal Program Areas]: An Overview. High-Risk Series.

    ERIC Educational Resources Information Center

    Comptroller General of the U.S., Washington, DC.

    This report reviews the status of government agencies and operations that have been identified as at "high risk" for waste, fraud, abuse, and mismanagement; describes successful progress in some agencies; and looks at recent reform legislation. Six categories being targeted include accountability of defense programs, ensuring that all…

  8. 77 FR 18106 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-27

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket No. 10-51; FCC 11-54] Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications Commission. ACTION: Final rule... adopted by the FCC to prevent fraud, waste, and abuse in the Video Relay Service (VRS) industry. DATES...

  9. 77 FR 13319 - Information Collection Being Submitted to the Office of Management and Budget (OMB) for Emergency...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ...), via fax at 202-395-5167 or via Internet at [email protected] and to Judith B. Herman, Federal Communications Commission, via the Internet at [email protected] . To submit your PRA... waste, fraud and abuse of the Universal Service Fund (USF or Fund). Among other things, the Lifeline...

  10. A Review of Financial Accounting Fraud Detection based on Data Mining Techniques

    NASA Astrophysics Data System (ADS)

    Sharma, Anuj; Kumar Panigrahi, Prabin

    2012-02-01

    With an upsurge in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection (FAFD) has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of specialized procedures to detect financial accounting fraud, collective known as forensic accounting. Data mining techniques are providing great aid in financial accounting fraud detection, since dealing with the large data volumes and complexities of financial data are big challenges for forensic accounting. This paper presents a comprehensive review of the literature on the application of data mining techniques for the detection of financial accounting fraud and proposes a framework for data mining techniques based accounting fraud detection. The systematic and comprehensive literature review of the data mining techniques applicable to financial accounting fraud detection may provide a foundation to future research in this field. The findings of this review show that data mining techniques like logistic models, neural networks, Bayesian belief network, and decision trees have been applied most extensively to provide primary solutions to the problems inherent in the detection and classification of fraudulent data.

  11. 42 CFR 455.23 - Suspension of payments in cases of fraud.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Suspension of payments in cases of fraud. 455.23... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.23 Suspension of payments in cases of fraud. (a) Basis for...

  12. Fraud Prevention and Employee Rationalization in New York State Public Schools

    ERIC Educational Resources Information Center

    Slezak, Kathleen

    2013-01-01

    Prompted by frequent media reports of school fraud and a lack of relevant K-12 literature, this research study was designed to investigate current fraud prevention practices in public school districts in New York State. Using a "fraud triangle" model, an analysis of existing legislation and professional practice guidelines reveals that…

  13. 20 CFR 410.699a - Penalties for fraud.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Penalties for fraud. 410.699a Section 410.699a Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969... Review, Finality of Decisions, and Representation of Parties § 410.699a Penalties for fraud. The penalty...

  14. Is Psychological Vulnerability Related to the Experience of Fraud in Older Adults?

    PubMed Central

    LICHTENBERG, PETER A.; STICKNEY, LAURIE; PAULSON, DANIEL

    2013-01-01

    Financial exploitation, and particularly thefts and scams, are increasing at an alarming rate. In this study we (a) determined the national prevalence of older adults who report having been a victim of fraud, (b) created a population-based model for the prediction of fraud, and (c) examined how fraud is experienced by the most psychologically vulnerable older adults. The older adults studied were 4,400 participants in a Health and Retirement Study substudy, the 2008 Leave Behind Questionnaire. The prevalence of fraud across the previous 5 years was 4.5%. Among measures collected in 2002, age, education, and depression were significant predictors of fraud. Financial satisfaction and social-needs fulfillment were measured in 2008 and were significantly related to fraud above and beyond the 2002 predictors. Using depression and social-needs fulfillment to determine the most psychologically vulnerable older adults, we found that fraud prevalence was three times higher (14%) among those with the highest depression and the lowest social-needs fulfillment than among the rest of the sample (4.1%; χ2 = 20.49; p < .001). Clinical gerontologists and other professionals in the field need to be aware of their psychologically vulnerable clients heightened exposure to financial fraud. PMID:23997404

  15. Avoiding fraud risks associated with EHRs.

    PubMed

    Helton, Jeffrey R

    2010-07-01

    Fraud associated with electronic health records (EHRs) generally falls into two categories: inappropriate billing by healthcare providers and inappropriate access by a system's users. A provider's EHR system requires controls to be of any significant help in detecting such fraudulent activity, or in gathering transactional evidence should such activity be identified. To protect against potential EHR-related healthcare fraud, providers should follow the recommendations established in 2007 by RTI International for the Office of the National Coordinator for Health Information Technology of the U.S. Department of Health and Human Services.

  16. Yemen: DOD Should Improve Accuracy of Its Data on Congressional Clearance of Projects as It Reevaluates Counterterrorism Assistance

    DTIC Science & Technology

    2015-04-01

    Section 1206 project was grounded in October 2014 because it lacked spare tires , resulting in a loss of medium-lift capability for the Yemeni Air Force...Testimony Order by Phone Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.

  17. 42 CFR 424.570 - Moratoria on newly enrolling Medicare providers and suppliers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... for fraud, waste or abuse in the Medicare program: (A) A particular provider or supplier type. (B) Any... enrollment of new Medicare providers and suppliers of a particular type or the establishment of new practice locations of a particular type in a particular geographic area. (ii) CMS will announce the temporary...

  18. 75 FR 18043 - Combating Noncompliance With Recovery Act Reporting Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-08

    ... tracking recovery dollars and to elimination of waste, fraud, and abuse by recipients of hard-earned...) identify every prime recipient under an obligation to file a report on FederalReporting.gov arising from... that every such recipient has filed a report. Any prime recipient that has failed to report is not...

  19. Warfighter Support: Army Has Taken Steps to Improve Reset Process, but More Complete Reporting of Equipment and Future Cost Is Needed

    DTIC Science & Technology

    2012-05-01

    asphalt spreaders ), other semi-trucks and trailers, palletized loading systems, and heavy equipment transports. As table 3 shows, the actual reset...Copies of GAO Reports and Testimony Order by Phone Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.

  20. 77 FR 15026 - Privacy Act of 1974; Farm Records File (Automated) System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-14

    ... Mining Project, all program data collected and handled by either RMA or FSA will be treated with the full... data warehouse and data mining operation. RMA will use the information to search or ``mine'' existing... fraud, waste, and abuse. The data mining operation is authorized by the Agricultural Risk Protection Act...

  1. 10 CFR 1010.103 - Reporting wrongdoing.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Reporting wrongdoing. 1010.103 Section 1010.103 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) CONDUCT OF EMPLOYEES § 1010.103 Reporting wrongdoing. (a) Employees shall, in fulfilling the obligation of 5 CFR 2635.101(b)(11), report fraud, waste, abuse, and corruption...

  2. 48 CFR 1449.106 - Fraud or other criminal conduct.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 1449.106 Section 1449.106 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 1449.106 Fraud or other criminal conduct...

  3. 48 CFR 49.106 - Fraud or other criminal conduct.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 49.106 Section 49.106 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 49.106 Fraud or other criminal conduct. If...

  4. 7 CFR 1580.504 - Fraud and recovery of overpayments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Fraud and recovery of overpayments. 1580.504 Section 1580.504 Agriculture Regulations of the Department of Agriculture (Continued) FOREIGN AGRICULTURAL SERVICE, DEPARTMENT OF AGRICULTURE TRADE ADJUSTMENT ASSISTANCE FOR FARMERS § 1580.504 Fraud and recovery...

  5. Blood recipient unable to recover damages based on fraud.

    PubMed

    1995-05-05

    A court ruled that [name removed] is unable to sue for fraud after acquiring HIV through a blood transfusion in 1982. [Name removed], who sued the hospital, her cardiologist, and two physicians, claimed she did not learn she had received a blood transfusion until after she was diagnosed with AIDS. She tested positive for HIV antibodies in March 1992 and was diagnosed with AIDS. The Supreme Court said a cause of action for actual fraud must be filed within six years from the date of the fraudulent act or two years from the date the plaintiff discovered the fraud.

  6. 32 CFR 516.68 - Program Fraud Civil Remedies Act (PFCRA).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.68 Program Fraud Civil Remedies Act (PFCRA). (a) PFCRA was enacted on 21 October 1986 (Public Law 99-509) and...

  7. 77 FR 5860 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-06

    ..., 2011); Education Jobs Fund, Public Law 111-226, 124 Stat. 2389, Sec. 101 (2010). Accordingly, the Board... fraud, waste, and abuse. Public Law 111-5, Sec. Sec. 1521, 1523(a)(1). The Education Jobs Fund required... contains information relevant to the retention of an employee or retention of a security clearance. That...

  8. Financial Management: Education Faces Challenges in Achieving Financial Management Reform. Testimony before the Subcommittee on Oversight and Investigations, Committee on Education and the Workforce, House of Representatives.

    ERIC Educational Resources Information Center

    Jarmon, Gloria L.

    This report provides a fiscal analysis of the Department of Education's 1999 financial audit results. It focuses on the relationship between the audit findings and the potential for waste, fraud, and abuse, and examines the status of an ongoing study of the Department's grantback account. It describes the ongoing accounting problems that have…

  9. 39 CFR 230.1 - Establishment and authority.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsible for detecting and preventing fraud, waste, and abuse in the programs and operations of the Postal... Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION OFFICE OF INSPECTOR GENERAL... the Inspector General Act of 1978, as amended (5 U.S.C. App.3), and 39 U.S.C. 410, an independent...

  10. Financial Management: Education's Financial Management Problems Persist. Testimony before the Task Force on Education, Committee on the Budget, House of Representatives.

    ERIC Educational Resources Information Center

    Jarmon, Gloria L.; Engel, Gary T.

    This document discusses the Department of Education's (DOE) fiscal year 1999 financial audit results; the relationship between the audit findings and the potential for waste, fraud, and abuse; and the results of the General Accounting Office's (GAO) review of the DOE's grantback account. The DOE's financial activity is important to the federal…

  11. Guaranteed Student Loans: GAO High Risk Series.

    ERIC Educational Resources Information Center

    Comptroller General of the U.S., Washington, DC.

    As part of a larger program to identify and analyze federal programs at high risk for waste, fraud, abuse and mismanagement, this publication presents an evaluation of the Federal Family Education Loan Program (FFELP), formerly the Guaranteed Student Loan Program. The analysis argues that the program has not been successful in protecting the…

  12. Student Financial Assistance Programs. Hearings Before a Subcommittee of the Committee on Government Operations, House of Representatives, Ninety-Fifth Congress, Second Session. July 27; August 3; and October 5, 1978.

    ERIC Educational Resources Information Center

    Congress of the U. S., Washington, DC. House Committee on Government Operations.

    Three hearings held before the U.S. House of Representatives on student financial assistance programs were concerned with the manner in which the Office of Education's assistance programs were being administered, the extent and nature of fraud, waste and abuse, and the progress of the Department of Health, Education, and Welfare's (HEW) corrective…

  13. 76 FR 1472 - Agenda and Notice Meeting of the Recovery Independent Advisory Panel

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-10

    .... SUMMARY: In accordance with the American Recovery and Reinvestment Act of 2009, Public Law 111-5 (Recovery... notify the general public of their opportunity to attend the meeting. DATES: The RIAP meeting will be... dialogue, with input from the public, on issues relating to fraud, waste, and abuse of Recovery Act funds...

  14. 48 CFR 949.106 - Fraud or other criminal conduct.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 949.106 Section 949.106 Federal Acquisition Regulations System DEPARTMENT OF ENERGY CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 949.106 Fraud or other criminal conduct. Any evidence...

  15. 48 CFR 649.106 - Fraud or other criminal conduct.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 649.106 Section 649.106 Federal Acquisition Regulations System DEPARTMENT OF STATE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles. 649.106 Fraud or other criminal conduct. If the...

  16. 48 CFR 449.106 - Fraud or other criminal conduct.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 449.106 Section 449.106 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 449.106 Fraud or other criminal conduct. (a) If the...

  17. 48 CFR 1349.106 - Fraud or other criminal conduct.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Fraud or other criminal conduct. 1349.106 Section 1349.106 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 1349.106 Fraud or other criminal conduct. If the...

  18. 42 CFR 1001.201 - Conviction relating to program or health care fraud.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Conviction relating to program or health care fraud... Permissive Exclusions § 1001.201 Conviction relating to program or health care fraud. (a) Circumstance for... misdemeanor relating to fraud, theft, embezzlement, breach of fiduciary responsibility, or other financial...

  19. 42 CFR 1001.201 - Conviction relating to program or health care fraud.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 5 2011-10-01 2011-10-01 false Conviction relating to program or health care fraud... Permissive Exclusions § 1001.201 Conviction relating to program or health care fraud. (a) Circumstance for... misdemeanor relating to fraud, theft, embezzlement, breach of fiduciary responsibility, or other financial...

  20. A Social Marketing Campaign in Denver: Reducing the Risk of Elder Fraud

    ERIC Educational Resources Information Center

    McKenna, Judy; Miller, Jacque; Curtis, Lisa

    2004-01-01

    Acknowledging the pain and loss senior citizens experience due to fraud, the Denver District Attorney's Office launched a campaign--"Clergy Against Senior Exploitation (CASE)"--to reduce fraud perpetrated on older persons. The thrust of this project was preventing fraud by educating older adults through their religious affiliations in…

  1. 76 FR 81904 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... Special Fraud Alerts. DATES: To assure consideration, public comments must be delivered to the address... and Special Fraud Alerts. Please assist us by referencing the file code OIG-120-N. Inspection of...

  2. Employee theft and fraud: bigger than ever and getting worse.

    PubMed

    2001-02-01

    Fraud examiners and investigators say that employee theft is out of control, citing recent U.S. Chamber of Commerce figures that employees steal approximately $400 billion from businesses each year and an Ernst & Young survey showing that nearly 90% of organizations countrywide experienced some type of fraud in the 12 months prior to the survey. An additional undetermined amount is being reported lost because of external fraud committed by customers, vendors, and others having contact with a company or institution. Fraud experts interviewed for this report note that all sectors are targets--including retailers, hospitals and healthcare, the hotel industry, schools, and college campuses. In this report, we'll present the how's and whys of this development and also describe what one medical center is doing to stop thefts of medical equipment and computers.

  3. Retractions in the scientific literature: is the incidence of research fraud increasing?

    PubMed

    Steen, R Grant

    2011-04-01

    Scientific papers are retracted for many reasons including fraud (data fabrication or falsification) or error (plagiarism, scientific mistake, ethical problems). Growing attention to fraud in the lay press suggests that the incidence of fraud is increasing. The reasons for retracting 742 English language research papers retracted from the PubMed database between 2000 and 2010 were evaluated. Reasons for retraction were initially dichotomised as fraud or error and then analysed to determine specific reasons for retraction. Error was more common than fraud (73.5% of papers were retracted for error (or an undisclosed reason) vs 26.6% retracted for fraud). Eight reasons for retraction were identified; the most common reason was scientific mistake in 234 papers (31.5%), but 134 papers (18.1%) were retracted for ambiguous reasons. Fabrication (including data plagiarism) was more common than text plagiarism. Total papers retracted per year have increased sharply over the decade (r=0.96; p<0.001), as have retractions specifically for fraud (r=0.89; p<0.001). Journals now reach farther back in time to retract, both for fraud (r=0.87; p<0.001) and for scientific mistakes (r=0.95; p<0.001). Journals often fail to alert the naïve reader; 31.8% of retracted papers were not noted as retracted in any way. Levels of misconduct appear to be higher than in the past. This may reflect either a real increase in the incidence of fraud or a greater effort on the part of journals to police the literature. However, research bias is rarely cited as a reason for retraction.

  4. 29 CFR 453.12 - Meaning of fraud or dishonesty.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...

  5. 29 CFR 453.12 - Meaning of fraud or dishonesty.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...

  6. 29 CFR 453.12 - Meaning of fraud or dishonesty.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...

  7. 29 CFR 453.12 - Meaning of fraud or dishonesty.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...

  8. 29 CFR 453.12 - Meaning of fraud or dishonesty.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or...

  9. Detecting Health Fraud in the Field of Learning Disabilities.

    ERIC Educational Resources Information Center

    Worrall, Russell S.

    1990-01-01

    This article discusses health fraud in special education. Psychopathology of health fraud, standards by which pseudoscience and quackery are defined, and the complexities of learning disorders are considered. A scale to determine whether an alternative therapy is reasonable is presented. Several popular therapies are used as examples. (Author/PB)

  10. Fraud and Australian Academics.

    ERIC Educational Resources Information Center

    Martin, Brian

    1989-01-01

    A series of highly publicized cases of alleged fraud in the Australian academic community are described. Each case reveals an apparent failure of peer review. The right to pursue investigations and make comments that may offend powerful figures within the scholarly community is precarious. (MLW)

  11. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-27

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  12. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-28

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  13. Introducing Food Fraud including translation and interpretation to Russian, Korean, and Chinese languages.

    PubMed

    Spink, John; Moyer, Douglas C; Park, Hyeonho; Wu, Yongning; Fersht, Victor; Shao, Bing; Hong, Miao; Paek, Seung Yeop; Edelev, Dmitry

    2015-12-15

    This paper introduces the topic of Food Fraud with translations to Russian, Korean, and Chinese. The concepts provide a system-wide focus leading to prevention. The goal is not to detect Food Fraud but to adjust entire food supply chains to reduce fraud opportunities. Food Fraud is a recently defined area of Food Protection between Food Safety (such as Salmonella or pesticide residue), and Food Defense (malicious intent to harm such as terrorism). Food Fraud is intentional with no intent to harm but only for economic gain. As with improving Food Safety and Food Defense, preventing Food Fraud is good for society and the economy. Society benefits through fewer public health threats from unauthorized acts. Society also benefits from increased consumer satisfaction and harmony. Food Security is increased through the production of more, higher-value products for consumers, commerce, and exporting. Food Fraud can reduce economic output because sickened citizens cannot work and it also reduces consumer confidence leading to less commerce. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. 77 FR 23247 - Notice of Debarment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-18

    ... the schools and libraries universal service support mechanism (or ``E-Rate Program'') for a period of three years. The Bureau takes this action to protect the E-Rate Program from waste, fraud and abuse.... March 15, 2012 DA 12-409 VIA CERTIFIED MAIL RETURN RECEIPT REQUESTED AND E-MAIL Dr. Dennis L. Bruno, c/o...

  15. Early detection and prevention of domestic violence using the Women Abuse Screening Tool (WAST) in primary health care clinics in Malaysia.

    PubMed

    Yut-Lin, Wong; Othman, Sajaratulnisah

    2008-01-01

    Despite being an emergent major public health problem, little research has been done on domestic violence from the perspectives of early detection and prevention. Thus, this cross-sectional study was conducted to identify domestic violence among female adult patients attending health centers at the primary care level and to determine the relationship between social correlates of adult patients and domestic violence screening and subsequent help/health-seeking behavior if abused. Face-to-face interviews were conducted with 710 female adult patients from 8 health centers in Selangor who matched the inclusion criteria and consented to participate in the study, using a structured questionnaire that included adaptation of a validated 8-item Women Abuse Screening Tool (WAST). Statistical tests showed significant differences in ethnicity, income, and education between those screened positive and those screened negative for domestic violence. Of the participants, 92.4% reported that during consultations, doctors had never asked them whether they were abused by their husband/partner. Yet, 67.3% said they would voluntarily tell the doctor if they were abused by their husband/partner. The findings indicate that primary care has an important role in identifying domestic violence by applying the WAST screening tool, or an appropriate adaptation, with women patients during routine visits to the various health centers. Such assessment for abuse could be secondary prevention for the abused women, but more important, it will serve as primary prevention for nonabused women. This approach not only will complement the existing 1-stop crisis center policy by the Ministry of Health that copes with crisis intervention but also will spearhead efforts toward prevention of domestic violence in Malaysia.

  16. Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy.

    PubMed

    Dal Pozzolo, Andrea; Boracchi, Giacomo; Caelen, Olivier; Alippi, Cesare; Bontempi, Gianluca

    2017-09-14

    Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers' habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.

  17. 49 CFR 1540.103 - Fraud and intentional falsification of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Responsibilities of Passengers and Other Individuals and Persons § 1540.103 Fraud... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...

  18. Field experiment estimate of electoral fraud in Russian parliamentary elections

    PubMed Central

    Enikolopov, Ruben; Korovkin, Vasily; Petrova, Maria; Sonin, Konstantin; Zakharov, Alexei

    2013-01-01

    Electoral fraud is a widespread phenomenon, especially outside the developed world. Despite abundant qualitative and anecdotal evidence on its existence from around the world, there is very limited quantitative evidence on the extent of electoral fraud. We exploit random assignment of independent observers to 156 of 3,164 polling stations in the city of Moscow to estimate the effect of electoral fraud on the outcome of the Russian parliamentary elections held on December 4, 2011. We estimate the actual share of votes for the incumbent United Russia party to be at least 11 percentage points lower than the official count (36% instead of 47%). Our results suggest that the extent of the fraud was sufficient to have had a substantial impact on the outcome of the elections; they also confirm that the presence of observers is an important factor in ensuring the integrity of the procedure. PMID:23267093

  19. Doctors aren't immune to theft and fraud

    PubMed Central

    Marcus, Gary

    1995-01-01

    A chartered accountant says the problem of fraud within medical practices is far from rare, even though prevention is relatively simple. Gary Marcus provides advice to physicians about ways to spot fraud within their practices and things they can do to prevent it. No matter how small your practice or how long you have had the same employees, says Marcus, given the right circumstances anyone might steal from you. Imagesp940-a PMID:7697586

  20. 49 CFR 1522.3 - Fraud and intentional falsification of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS General § 1522.3 Fraud and intentional falsification...

  1. An Overview. High Risk Series.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC.

    This report provides an overview of efforts undertaken by the U.S. General Accounting Office (GAO) in 1990 to review and report on federal program areas its work identified as high risk because of vulnerabilities to waste, fraud, abuse, and mismanagement. It reviews the current status of efforts to address these concerns. The six categories of…

  2. Department of Education's Student Loan Programs: Are Tax Dollars at Risk? Hearing before the Subcommittee on Criminal Justice, Drug Policy, and Human Resources of the Committee on Government Reform. House of Representatives, One Hundred Sixth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Government Reform.

    This hearing was held to consider whether the student loan programs of the Department of Education place tax dollars at risk. In his opening remarks, Representative John L. Mica (Florida) pointed out that for nearly 10 years, the U.S. General Accounting Office has labeled these programs as a high risk for fraud, waste, abuse, and mismanagement. In…

  3. 49 CFR 1570.5 - Fraud and intentional falsification of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY GENERAL RULES § 1570.5 Fraud and intentional falsification of records. No person may make, cause to be...

  4. The jurisprudential nature of fraud in biomedical publishing.

    PubMed

    Candlish, John

    2008-06-01

    When instances of fraud in biomedical publishing come to light there is widespread indignation, not least because the consequences seem usually only to be internal enquiries and professional displeasure. A number of bodies have been constituted to improve publishing ethics and but these are largely advisory. Potentially though, actions in the tort of deceit and negligence, possibly misfeasance in a public office, and loss of chance could be brought against those responsible. These aspects are examined in the context of English law. In addition the new Fraud Act (2006) appears to be wide enough in scope to cover publishing fraud as a criminal offence. Any organisation such as a drug company financing clinical trials which produce spurious results could face serious losses and might well look to remedies in contract as well as in tort. A theoretical scenario centered on a drug trial is presented in order to explore these issues.

  5. 75 FR 26196 - Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical Equipment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ... Special Fraud Alert on Telemarketing by Durable Medical Equipment Suppliers AGENCY: Office of Inspector... Special Fraud Alert. Specifically, the Updated Special Fraud Alert addressed the statutory provision...) 205-0007. SUPPLEMENTARY INFORMATION: In our publication of the OIG Updated Special Fraud Alert on...

  6. Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge Assessment

    DTIC Science & Technology

    2015-04-30

    ååì~ä=^Åèìáëáíáçå= oÉëÉ~êÅÜ=póãéçëáìã= qÜìêëÇ~ó=pÉëëáçåë= sçäìãÉ=ff= = Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge...DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge...capable processes, and effective internal controls result in the DoD having a higher level of vulnerability for procurement fraud (Rendon & Rendon, in

  7. National Health Care Anti-Fraud Association

    MedlinePlus

    ... a Glance Pre-Conference Programs Conference Sessions Registration Hotel & Travel Information Conference Tracks Credit Opportunities Anti-Fraud Expo Sponsors Programs Budget Adequately for 2018 Trainings NETS Webinars Launch Webinar ...

  8. 32 CFR 516.67 - Overseas cases of fraud or corruption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Overseas cases of fraud or corruption. 516.67 Section 516.67 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas...

  9. 32 CFR 516.68 - Program Fraud Civil Remedies Act (PFCRA).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Program Fraud Civil Remedies Act (PFCRA). 516.68 Section 516.68 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.68 Program...

  10. 38 CFR 3.901 - Fraud.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Compensation, and Dependency and Indemnity Compensation Forfeiture § 3.901 Fraud. (a) Definition. An act... death benefit payable. (2) Amount of compensation payable but for the forfeiture. No benefits are... affidavit, declaration, certificate, statement, voucher, or paper, concerning any claim for benefits under...

  11. The effects of loneliness on telemarketing fraud vulnerability among older adults.

    PubMed

    Alves, Linda M; Wilson, Steve R

    2008-01-01

    Older adults are disproportionately affected by telemarketing fraud, especially those who are socially isolated. Twenty-eight older adult telemarketing fraud victims completed a questionnaire assessing loneliness and other variables related to telemarketing fraud vulnerability. Victims tended to be male, divorced/separated, and college-educated, between ages of 60 and 70. Age and marital status were significantly associated with loneliness. This study is an important first step for additional research in this area and may enhance the prevention and intervention efforts of social service providers who work with older adults who may be most vulnerable.

  12. 42 CFR 455.17 - Reporting requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.17 Reporting requirements. The agency must report the following fraud or abuse... complaints of fraud and abuse made to the agency that warrant preliminary investigation. (b) For each case of...

  13. 17 CFR 240.15c1-2 - Fraud and misrepresentation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Fraud and misrepresentation. 240.15c1-2 Section 240.15c1-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Securities Exchange Act of 1934 Rules Relating to Over-The-Counter Markets § 240.15c1-2 Fraud and...

  14. Document fraud deterrent strategies: four case studies

    NASA Astrophysics Data System (ADS)

    Mercer, John W.

    1998-04-01

    This paper discusses the approaches taken to deter fraud committed against four documents: the machine-readable passport; the machine-readable visa; the Consular Report of Birth Abroad; and the Border Crossing Card. General approaches are discussed first, with an emphasis on the reasons for the document, the conditions of its use and the information systems required for it to function. A cost model of counterfeit deterrence is introduced. Specific approaches to each of the four documents are then discussed, in light of the issuance circumstances and criteria, the intent of the issuing authority, the applicable international standards and the level of protection and fraud resistance appropriate for the document.

  15. Inspector General - Personal Staff - Joint Staff - The National Guard

    Science.gov Websites

    contacting the Office of The Inspector General The IG cannot action request with incomplete DA 1559s or AF Form 102s. In order to have an IG begin work on a matter, personnel must prepare a written IG Action General Action Request (DA 1559) Air Force - The Inspector General Personal and Fraud, Waste & Abuse

  16. Training for Success: A Comparison of Anti-Fraud Knowledge Competencies

    DTIC Science & Technology

    2014-12-01

    fraud, money laundering , and tax fraud. The section on punishing offenders contains two competencies: criminal prosecutions and the civil justice...investigations (Kittay, 2011). Money laundering investigations focus on the various methods individuals use to conceal proceeds earned from criminal ...Chartered Accowltants Cet·tified Anti - Money CAMS The Association of Cettified Laundering Specialist Anti - Money Latmdering Specialists Certified

  17. Equal Potential: A Collective Fraud.

    ERIC Educational Resources Information Center

    Gottfredson, Linda S.

    2000-01-01

    Critiques the College Board's report, "Reaching the Top," asserting that it illustrates collective fraud in the social sciences, which sustains an egalitarian fiction that intelligence is clustered equally across all human populations. Suggests that while the report omits certain popular falsehoods, it also omits crucial truths about…

  18. Odometer Fraud: Traffic Safety Tips

    DOT National Transportation Integrated Search

    1996-01-01

    This fact sheet, NHTSA Facts: Summer 1996, focuses on odometer fraud, which is a major problem for consumers. Some late model used cars have odometers that have been turned back. Any vehicle that has been driven a high number of miles but is only a f...

  19. Science as a Matter of Honour: How Accused Scientists Deal with Scientific Fraud in Japan.

    PubMed

    Pellegrini, Pablo A

    2017-06-26

    Practices related to research misconduct seem to have been multiplied in recent years. Many cases of scientific fraud have been exposed publicly, and journals and academic institutions have deployed different measures worldwide in this regard. However, the influence of specific social and cultural environments on scientific fraud may vary from society to society. This article analyzes how scientists in Japan deal with accusations of scientific fraud. For such a purpose, a series of scientific fraud cases that took place in Japan has been reconstructed through diverse sources. Thus, by analyzing those cases, the social basis of scientific fraud and the most relevant aspects of Japanese cultural values and traditions, as well as the concept of honour which is deeply involved in the way Japanese scientists react when they are accused of and publicly exposed in scientific fraud situations is examined.

  20. Podcast: Scientific Integrity and Lab Fraud

    EPA Pesticide Factsheets

    Nov 25, 2015. Dr. Bruce Woods, a chemist in the Electronic Crimes Division within the OIG’s Office of Investigations discusses his recent webinar for the Association of Public Health Laboratories on lab fraud.

  1. 32 CFR 516.60 - Procurement fraud and irregularities programs at MACOMs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Procurement fraud and irregularities programs at MACOMs. 516.60 Section 516.60 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption...

  2. 42 CFR 455.21 - Cooperation with State Medicaid fraud control units.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Cooperation with State Medicaid fraud control units. 455.21 Section 455.21 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud...

  3. 17 CFR 32.9 - Fraud in connection with commodity option transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 32.9 Section 32.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.9 Fraud in connection with commodity...

  4. 17 CFR 33.10 - Fraud in connection with commodity option transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 33.10 Section 33.10 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF DOMESTIC EXCHANGE-TRADED COMMODITY OPTION TRANSACTIONS § 33.10 Fraud in...

  5. 32 CFR 516.60 - Procurement fraud and irregularities programs at MACOMs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Procurement fraud and irregularities programs at MACOMs. 516.60 Section 516.60 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption...

  6. Perceptions of Elders' Substance Abuse and Resilience

    ERIC Educational Resources Information Center

    Kane, Michael N.; Green, Diane

    2009-01-01

    Human service students' (social work, criminal justice, public administration, psychology) were surveyed (N = 242). Their perceptions about older persons' resilience and recovery from substance abuse were investigated. Overall, respondents did not agree that treating older persons for a substance abuse problem was wasteful of resources or older…

  7. 20 CFR 356.2 - Program Fraud Civil Remedies Act of 1986.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Program Fraud Civil Remedies Act of 1986. 356.2 Section 356.2 Employees' Benefits RAILROAD RETIREMENT BOARD ADMINISTRATIVE REMEDIES FOR FRAUDULENT CLAIMS OR STATEMENTS CIVIL MONETARY PENALTY INFLATION ADJUSTMENT § 356.2 Program Fraud Civil Remedies Act...

  8. 45 CFR 681.5 - What happens if program fraud is suspected?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...

  9. 45 CFR 681.5 - What happens if program fraud is suspected?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...

  10. 45 CFR 681.5 - What happens if program fraud is suspected?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...

  11. 45 CFR 681.5 - What happens if program fraud is suspected?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...

  12. 45 CFR 681.5 - What happens if program fraud is suspected?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false What happens if program fraud is suspected? 681.5 Section 681.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... What happens if program fraud is suspected? (a) If the investigating official concludes that an action...

  13. Questionable, Objectionable or Criminal? Public Opinion on Data Fraud and Selective Reporting in Science.

    PubMed

    Pickett, Justin T; Roche, Sean Patrick

    2018-02-01

    Data fraud and selective reporting both present serious threats to the credibility of science. However, there remains considerable disagreement among scientists about how best to sanction data fraud, and about the ethicality of selective reporting. The public is arguably the largest stakeholder in the reproducibility of science; research is primarily paid for with public funds, and flawed science threatens the public's welfare. Members of the public are able to make meaningful judgments about the morality of different behaviors using moral intuitions. Legal scholars emphasize that to maintain legitimacy, social control policies must be developed with some consideration given to the public's moral intuitions. Although there is a large literature on popular attitudes toward science, there is no existing evidence about public opinion on data fraud or selective reporting. We conducted two studies-a survey experiment with a nationwide convenience sample (N = 821), and a follow-up survey with a representative sample of US adults (N = 964)-to explore community members' judgments about the morality of data fraud and selective reporting in science. The findings show that community members make a moral distinction between data fraud and selective reporting, but overwhelmingly judge both behaviors to be immoral and deserving of punishment. Community members believe that scientists who commit data fraud or selective reporting should be fired and banned from receiving funding. For data fraud, most Americans support criminal penalties. Results from an ordered logistic regression analysis reveal few demographic and no significant partisan differences in punitiveness toward data fraud.

  14. Recent developments in false claims enforcement: a minefield for health care providers.

    PubMed

    Whitaker, Glenn V; Walton, Victor A

    2007-01-01

    Actions under the False Claims Act represent potentially billions of dollars in damages returned to the state and federal governments each year for fraud recovery. Over the past several years, health care providers have been the target of about half of the FCA suits filed and have paid out an even greater percentage of the damages recovered. Because of the enumerable opportunities for fraud, waste, and abuse in the health care industry, it will likely continue to be a prominent target of FCA suits. Key provisions of the Deficit Reduction Act of 2005, effective on January 1, 2007, will only increase the reach of the FCA. Providers beware.

  15. Fraud at the Global Fund? A viewpoint.

    PubMed

    Brown, Jonathan C; Griekspoor, Wilfred

    2013-01-01

    The Global Fund to Fight AIDS, Tuberculosis and Malaria has contributed to remarkable health improvements in the three diseases since its creation in 2002. However, media reports about "astonishing losses" and fraud in Fund programs in 2011 caused several donors to suspend funding. The Fund's annual round of new financing was canceled, and a substantial reform program is being implemented. Two former senior managers of the Fund contend that fraud was never a major problem; rather than imposing harsh new controls on recipient countries that might impede health outcomes, the Fund should maintain the core elements of its innovative model and make selective rather than sweeping changes in its operations. Copyright © 2012 John Wiley & Sons, Ltd.

  16. 13 CFR 142.8 - What happens if program fraud is suspected?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What happens if program fraud is suspected? 142.8 Section 142.8 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION PROGRAM FRAUD... demanded in the false claim or statement; (5) Any exculpatory or mitigating circumstances that may relate...

  17. 48 CFR 252.203-7004 - Display of fraud hotline poster(s).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (SEP 2011) (a) Definition...

  18. 48 CFR 252.203-7004 - Display of fraud hotline poster(s).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (Sep 2011) (a) Definition...

  19. 48 CFR 252.203-7004 - Display of fraud hotline poster(s).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (DEC 2012) (a) Definition...

  20. 48 CFR 252.203-7004 - Display of fraud hotline poster(s).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... poster(s). 252.203-7004 Section 252.203-7004 Federal Acquisition Regulations System DEFENSE ACQUISITION... of Provisions And Clauses 252.203-7004 Display of fraud hotline poster(s). As prescribed in 203.1004(b)(2)(ii), use the following clause: Display of Fraud Hotline Poster(s) (DEC 2012) (a) Definition...

  1. 42 CFR 1001.951 - Fraud and kickbacks and other prohibited activities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Fraud and kickbacks and other prohibited activities... Permissive Exclusions § 1001.951 Fraud and kickbacks and other prohibited activities. (a) Circumstance for..., or (B) Imposition of a civil money penalty against others; or (iii) Alternative sources of the type...

  2. 42 CFR 1001.951 - Fraud and kickbacks and other prohibited activities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 5 2011-10-01 2011-10-01 false Fraud and kickbacks and other prohibited activities... Permissive Exclusions § 1001.951 Fraud and kickbacks and other prohibited activities. (a) Circumstance for..., or (B) Imposition of a civil money penalty against others; or (iii) Alternative sources of the type...

  3. Security risks in nuclear waste management: Exceptionalism, opaqueness and vulnerability.

    PubMed

    Vander Beken, Tom; Dorn, Nicholas; Van Daele, Stijn

    2010-01-01

    This paper analyses some potential security risks, concerning terrorism or more mundane forms of crime, such as fraud, in management of nuclear waste using a PEST scan (of political, economic, social and technical issues) and some insights of criminologists on crime prevention. Nuclear waste arises as spent fuel from ongoing energy generation or other nuclear operations, operational contamination or emissions, and decommissioning of obsolescent facilities. In international and EU political contexts, nuclear waste management is a sensitive issue, regulated specifically as part of the nuclear industry as well as in terms of hazardous waste policies. The industry involves state, commercial and mixed public-private bodies. The social and cultural dimensions--risk, uncertainty, and future generations--resonate more deeply here than in any other aspect of waste management. The paper argues that certain tendencies in regulation of the industry, claimed to be justified on security grounds, are decreasing transparency and veracity of reporting, opening up invisible spaces for management frauds, and in doing allowing a culture of impunity in which more serious criminal or terrorist risks could arise. What is needed is analysis of this 'exceptional' industry in terms of the normal cannons of risk assessment - a task that this paper begins. Copyright 2009 Elsevier Ltd. All rights reserved.

  4. When Good Money Goes Bad: True Stories of Contract Fraud at EPA

    EPA Pesticide Factsheets

    In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to contract fraud.

  5. When Good Money Goes Bad: True Stories of Grant Fraud at EPA

    EPA Pesticide Factsheets

    In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to grant fraud.

  6. Universal Service Fund: Background and Options for Reform

    DTIC Science & Technology

    2010-03-11

    pursues violators and initiates enforcement actions including notices of liability, suspensions , consent decrees, and debarments .46 The Department...series of measures to safeguard the USF to deter fraud, waste, and abuse. Included in the measures taken are those that extend the debarment rules...three years) and sanctions for criminal and civil violations beyond the Schools and Libraries Program to cover all four programs; tighten rules

  7. The Role of Cognition, Personality, and Trust in Fraud Victimization in Older Adults

    PubMed Central

    Judges, Rebecca A.; Gallant, Sara N.; Yang, Lixia; Lee, Kang

    2017-01-01

    Older adults are more at risk to become a victim of consumer fraud than any other type of crime (Carcach et al., 2001) but the research on the psychological profiles of senior fraud victims is lacking. To bridge this significant gap, we surveyed 151 (120 female, 111 Caucasian) community-dwelling older adults in Southern Ontario between 60 and 90 years of age about their experiences with fraud. Participants had not been diagnosed with cognitive impairment or a neurological disorder by their doctor and looked after their own finances. We assessed their self-reported cognitive abilities using the MASQ, personality on the 60-item HEXACO Personality Inventory, and trust tendencies using a scale from the World Values Survey. There were no demographic differences between victims and non-victims. We found that victims exhibit lower levels of cognitive ability, lower honesty-humility, and lower conscientiousness than non-victims. Victims and non-victims did not differ in reported levels of interpersonal trust. Subsequent regression analyses showed that cognition is an important component in victimization over and above other social factors. The present findings suggest that fraud prevention programs should focus on improving adults’ overall cognitive functioning. Further investigation is needed to understand how age-related cognitive changes affect vulnerability to fraud and which cognitive processes are most important for preventing fraud victimization. PMID:28450847

  8. Implementing US-style anti-fraud laws in the Australian pharmaceutical and health care industries.

    PubMed

    Faunce, Thomas A; Urbas, Gregor; Skillen, Lesley

    2011-05-02

    This article critically analyses the prospects for introducing United States anti-fraud (or anti-false claims) laws in the Australian health care setting. Australian governments spend billions of dollars each year on medicines and health care. A recent report estimates that the money lost to corporate fraud in Australia is growing at an annual rate of 7%, but that only a third of the losses are currently being detected. In the US, qui tam provisions - the component of anti-fraud or anti-false claims laws involving payments to whistleblowers - have been particularly successful in providing critical evidence allowing public prosecutors to recover damages for fraud and false claims made by corporations in relation to federal and state health care programs. The US continues to strengthen such anti-fraud measures and to successfully apply them to a widening range of areas involving large public investment. Australia still suffers from the absence of any comprehensive scheme that not only allows treble damages recovery for fraud on the public purse, but crucially supports such actions by providing financial encouragement for whistleblowing corporate insiders to expose evidence of fraud. Potential areas of application could include direct and indirect government expenditure on health care service provision, pharmaceuticals, medical devices, defence, carbon emissions compensation and tobacco-related illness. The creation in Australia of an equivalent to US anti-false claims legislation should be a policy priority, particularly in a period of financial stringency.

  9. 38 CFR 1.902 - Antitrust, fraud, and tax and interagency claims.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....900 through 1.953 do not apply to tax debts. (c) Sections 1.900 through 1.953 do not apply to claims... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Antitrust, fraud, and tax... Collection Effort, and Referral of Civil Claims for Money Or Property § 1.902 Antitrust, fraud, and tax and...

  10. Food Fraud Prevention: Policy, Strategy, and Decision-Making - Implementation Steps for a Government Agency or Industry.

    PubMed

    Spink, John; Fortin, Neal D; Moyer, Douglas C; Miao, Hong; Wu, Yongning

    2016-01-01

    This paper addresses the role of governments, industry, academics, and non-governmental organizations in Food Fraud prevention. Before providing strategic concepts for governments and authorities, definitions of Food Fraud are reviewed and discussed. Next there is a review of Food Fraud activities by the Global Food Safety Initiative (GFSI), the Elliott Review in the United Kingdom, the European Commission resolution on Food Fraud, and the US Food Safety Modernization Act including the Preventative Controls Rule. Two key concepts for governments or a company are: (1) formally, and specifically, mention food fraud as a food issue and (2) create an enterprise-wide Food Fraud prevention plan. The research includes a case study of the implementation of the concepts by a state or provincial agency. This analysis provides a foundation to review the role of science and technology in detection, deterrence and then contributing to prevention.

  11. Store Security. Credit Card Fraud.

    ERIC Educational Resources Information Center

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  12. 75 FR 2105 - Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical Equipment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-14

    ... Inspector General Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical... Register notice sets forth the recently issued OIG Updated Special Fraud Alert addressing telemarketing by durable medical equipment (DME) suppliers. For the most part, OIG Special Fraud Alerts address national...

  13. 25 CFR 700.541 - Fraud or false statement in a Government matter.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Fraud or false statement in a Government matter. 700.541... RELOCATION PROCEDURES Employee Responsibility and Conduct § 700.541 Fraud or false statement in a Government..., applications for employment, personnel security forms, requests for travel reimbursement, client certification...

  14. 45 CFR 149.41 - Consequences of Non-Compliance, Fraud, or Similar Fault.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Consequences of Non-Compliance, Fraud, or Similar Fault. 149.41 Section 149.41 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS... Eligible Employment-Based Plans § 149.41 Consequences of Non-Compliance, Fraud, or Similar Fault. Upon...

  15. Elder abuse awareness in Italy: analysis of reports to the Prosecutor Office of Bologna.

    PubMed

    Salsi, Giancarlo; Mazzotti, Maria Carla; Carosielli, Grazia; Ingravallo, Francesca; Pelotti, Susi

    2015-06-01

    In Italy, the prevalence of elder abuse is estimated from 10 to 12.7 %. Even if the elderly are not specifically protected by the Italian Penal Code, it contains several articles punishing crimes against disadvantaged groups in which elders may be included. Article 572 about mistreatment of family members or cohabitants, and article 643 about circumvention of incapable best fit elder abuse or neglect and financial fraud and exploitation, respectively. To evaluate the prevalence of reported elder abuse in Bologna and province (Italy) compared to available data on prevalence obtained by population-based surveys. Reports to the Prosecutor Office about articles 572 and 643 in the period from 2000 to 2013 were collected and analyzed according to victim's age at the report time. For article 572 a total of 3,713 reports were found. The prevalence of reports ranged from 0.005 to 0.024 % for victims older than 65 years. Concerning article 643 a total of 786 reports were detected, with a prevalence ranging from 0.007 to 0.016 % for victims older than 65 years. A large gap was found between reported crimes related to elder abuse and the estimated prevalence of elder abuse in Italy. Our results showed that in Italy efforts to improve strategic approach on elder abuse as well as research at various levels following the examples of other abusive situations are needed in both health and legal systems.

  16. 48 CFR 3032.006 - Reduction or suspension of contract payments upon finding of fraud.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... contract payments upon finding of fraud. 3032.006 Section 3032.006 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL CONTRACTING... finding of fraud. ...

  17. Forewarning reduces fraud susceptibility in vulnerable consumers

    PubMed Central

    Scheibe, Susanne; Notthoff, Nanna; Menkin, Josephine; Ross, Lee; Shadel, Doug; Deevy, Martha; Carstensen, Laura L.

    2014-01-01

    Telemarketing fraud is pervasive and older consumers are disproportionally targeted. Given laboratory research showing that forewarning can effectively counter influence appeals, we conducted a field experiment to test whether forewarning could protect people who had been victimized in the past. A research assistant with prior experience as a telemarketer pitched a mock scam two or four weeks after participants were warned about the same scam or an entirely different scam. Both warnings reduced unequivocal acceptance of the mock scam although outright refusals (as opposed to expressions of skepticism) were more frequent with the same scam warning than the different scam warning. The same scam warning, but not the different scam warning, lost effectiveness over time. Findings demonstrate that social psychological research can inform effective protection strategies against telemarketing fraud. PMID:25328263

  18. 43 CFR 20.510 - Fraud or false statements in a Government matter.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Fraud or false statements in a Government matter. 20.510 Section 20.510 Public Lands: Interior Office of the Secretary of the Interior EMPLOYEE RESPONSIBILITIES AND CONDUCT Other Employee Conduct Provisions § 20.510 Fraud or false statements in a Government...

  19. 43 CFR 20.510 - Fraud or false statements in a Government matter.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Fraud or false statements in a Government matter. 20.510 Section 20.510 Public Lands: Interior Office of the Secretary of the Interior EMPLOYEE RESPONSIBILITIES AND CONDUCT Other Employee Conduct Provisions § 20.510 Fraud or false statements in a Government...

  20. AICPA standard aids in detecting risk factors for fraud. American Institute of Certified Public Accountants.

    PubMed

    Reinstein, A; Dery, R J

    1999-10-01

    The American Institute of Certified Public Accountants' Statement on Auditing Standards (SAS) No. 82, Consideration of Fraud in a Financial Statement Audit, requires independent auditors to obtain reasonable assurance that financial statements are free of material mis-statements caused by error or fraud. SAS No. 82 provides guidance for independent auditors to use to help detect and document risk factors related to potential fraud. But while SAS No. 82 suggests how auditors should assess the potential for fraud, it does not expand their detection responsibility. Accordingly, financial managers should discuss thoroughly with auditors the scope and focus of an audit as a means to further their compliance efforts.

  1. Assessment of DoD Wounded Warrior Matters - Wounded Warrior Battalion - West Headquarters and Southern California Units

    DTIC Science & Technology

    2012-08-22

    urine drug tesL~ (UDTs). A BUM ED Publication wi ll follow the lnterim Guidance for sustainment. Two training programs have also been created to...line DEPARTMENT OF DEFENSE 800.424.9098 Fraud, Waste, Mismanagement, Abuse of Authority Suspected Threats to Homeland Security Unauthorized...determined how many Service members were required to be interviewed, then we applied a simple random sample approach to determine the Service members we

  2. Defense Contracting in Iraq: Issues and Options for Congress

    DTIC Science & Technology

    2008-05-06

    ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12 . DISTRIBUTION/AVAILABILITY STATEMENT Approved for public...contract calls for the three companies to compete for task orders; each company may be awarded up to $5 billion for troop support services per year , the...contracting. The Fiscal Year (FY) 2008 Defense Authorization Act (P.L. 110-181) contains provisions that address contract waste, fraud, abuse, and

  3. 31 CFR 900.3 - Antitrust, fraud, and tax and interagency claims excluded.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... apply to tax debts. (c) Parts 900-904 of this chapter do not apply to claims between Federal agencies... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Antitrust, fraud, and tax and...) SCOPE OF STANDARDS § 900.3 Antitrust, fraud, and tax and interagency claims excluded. (a) The standards...

  4. Food fraud and the perceived integrity of European food imports into China.

    PubMed

    Kendall, H; Naughton, P; Kuznesof, S; Raley, M; Dean, M; Clark, B; Stolz, H; Home, R; Chan, M Y; Zhong, Q; Brereton, P; Frewer, L J

    2018-01-01

    Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase "authentic" European products using structural equation modelling. Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed 'risk-relieving' strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Targeted communication of authenticity assurance measures, including; regulations; enforcement; product testing; and actions taken by

  5. Food fraud and the perceived integrity of European food imports into China

    PubMed Central

    Raley, M.; Dean, M.; Clark, B.; Stolz, H.; Home, R.; Chan, M. Y.; Zhong, Q.; Brereton, P.; Frewer, L. J.

    2018-01-01

    Background/Aims Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. Methods A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase “authentic” European products using structural equation modelling. Results Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed ‘risk-relieving’ strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Conclusions Targeted communication of authenticity assurance measures, including; regulations

  6. 48 CFR 252.203-7001 - Prohibition on persons convicted of fraud or other defense-contract-related felonies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... convicted of fraud or other defense-contract-related felonies. 252.203-7001 Section 252.203-7001 Federal... convicted of fraud or other defense-contract-related felonies. As prescribed in 203.570-3, use the following clause: Prohibition on Persons Convicted of Fraud or Other Defense-Contract-Related Felonies (DEC 2008...

  7. An Analysis of Fraud on the Internet.

    ERIC Educational Resources Information Center

    Baker, C. Richard

    1999-01-01

    Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)

  8. 41 CFR 105-53.131 - Office of Inspector General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... functions and established an Office of Inspector General in 11 major domestic departments and agencies... United States Attorneys on all matters relating to the detection and prevention of fraud and abuse. The Inspector General reports semiannually to the Congress through the Administrator concerning fraud, abuses...

  9. Criminal Intent with Property: A Study of Real Estate Fraud Prediction and Detection

    ERIC Educational Resources Information Center

    Blackman, David H.

    2013-01-01

    The large number of real estate transactions across the United States, combined with closing process complexity, creates extremely large data sets that conceal anomalies indicative of fraud. The quantitative amount of damage due to fraud is immeasurable to the lives of individuals who are victims, not to mention the financial impact to…

  10. Developmental trajectories of offenders convicted of fraud: A follow-up to age 50 in a Dutch conviction cohort

    PubMed Central

    van der Geest, Victor R.; Weisburd, David; Blokland, Arjan A. J.

    2016-01-01

    This study describes the criminal careers of offenders convicted of fraud, distinguishing different career dimensions such as intermittency, versatility and specialization. Results indicate that most fraud offenders are versatile in the sense that they also have significant criminal records for other serious offending (that is, not fraud). At the same time they are also specialized in fraud. When we examine developmental trajectories of serious offending and next explore patterns of fraud for the groups identified, we find that offenders in our sample represent a heterogeneous group and that the classic divide between typical financial (for example, white-collar) offenders and common criminals does not apply to the majority of our sample. PMID:28989326

  11. Security Clearances: Additional Mechanisms May Aid Federal Tax-Debt Detection

    DTIC Science & Technology

    2015-03-18

    it is requesting disclosure , and, as such, the agency may not obtain the complete tax -debt history of the individual nor would it be of use during...BagdoyanS@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement...Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.

  12. Debarment and suspension. [of contractors

    NASA Technical Reports Server (NTRS)

    Whelan, Thomas J.

    1987-01-01

    The changing Government attitude toward contractor debarment and suspension is examined, with emphasis on the fact that the Government is more alert to fraud, waste, and abuse. Consideration is given to causes of debarment or suspension, procedures and due process hearings, settlement agreements, compliance programs, and recent related legislation. It is concluded that the change in the Government contracting environment in recent years should be sufficient incentive for contractors to monitor their operations more closely.

  13. The evaluation of trustworthiness to identify health insurance fraud in dentistry.

    PubMed

    Wang, Shu-Li; Pai, Hao-Ting; Wu, Mei-Fang; Wu, Fan; Li, Chen-Lin

    2017-01-01

    According to the investigations of the U.S. Government Accountability Office (GAO), health insurance fraud has caused an enormous pecuniary loss in the U.S. In Taiwan, in dentistry the problem is getting worse if dentists (authorized entities) file fraudulent claims. Several methods have been developed to solve health insurance fraud; however, these methods are like a rule-based mechanism. Without exploring the behavior patterns, these methods are time-consuming and ineffective; in addition, they are inadequate for managing the fraudulent dentists. Based on social network theory, we develop an evaluation approach to solve the problem of cross-dentist fraud. The trustworthiness score of a dentist is calculated based upon the amount and type of dental operations performed on the same patient and the same tooth by that dentist and other dentists. The simulation provides the following evidence. (1) This specific type of fraud can be identified effectively using our evaluation approach. (2) A retrospective study for the claims is also performed. (3) The proposed method is effective in identifying the fraudulent dentists. We provide a new direction for investigating the genuineness of claims data. If the insurer can detect fraudulent dentists using the traditional method and the proposed method simultaneously, the detection will be more transparent and ultimately reduce the losses caused by fraudulent claims. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. 17 CFR 48.8 - Conditions of registration.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...

  15. 17 CFR 48.8 - Conditions of registration.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...

  16. 17 CFR 48.8 - Conditions of registration.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...; prohibit fraud, abuse, and market manipulation and other disruptions of the market; and provide that such... any market manipulation, abuse, fraud, deceit, or conversion or that results in suspension or... continue to satisfy the criteria for a regulated market or licensed exchange pursuant to the regulatory...

  17. Looking at Debit and Credit Card Fraud

    ERIC Educational Resources Information Center

    Porkess, Roger; Mason, Stephen

    2012-01-01

    This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)

  18. Administrative Subpoenas and National Security Letters in Criminal and Intelligence Investigations: A Sketch

    DTIC Science & Technology

    2005-04-15

    exclusive for use in a criminal investigation in cases involving health care fraud, child abuse , Secret Service protection, controlled substance cases...explicit prohibition on disclosure of the existence or specifics of a subpoena issued under this authority. Health Care, Child Abuse & Presidential...investigations. It is an amalgam is three relatively recent statutory provisions — one, the original, dealing with health care fraud; one with child abuse offenses

  19. 10 CFR 1015.103 - Antitrust, fraud, tax, interagency, transportation account audit, acquisition contract, and...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... does not apply to tax debts. (c) Part 1015 does not apply to claims between Federal agencies. Federal... 10 Energy 4 2010-01-01 2010-01-01 false Antitrust, fraud, tax, interagency, transportation account... General § 1015.103 Antitrust, fraud, tax, interagency, transportation account audit, acquisition contract...

  20. A decision support tool for identifying abuse of controlled substances by ForwardHealth Medicaid members.

    PubMed

    Mailloux, Allan T; Cummings, Stephen W; Mugdh, Mrinal

    2010-01-01

    enabled development and application of a decision tree for detecting recipient fraud and abuse of controlled substance medications. Using standard pharmacy claims data, the decision tree effectively replicates pharmacist manual review recommendations. The DST has automated extraction and evaluation of pharmacy claims data for creating recommendations for guiding pharmacists in the selection of profiles for manual review. The DST is now the primary method used by the Wisconsin Medicaid program to detect fraud and abuse of physician and pharmacy services committed by recipients.

  1. Internet Fraud: Information for Teachers and Students

    ERIC Educational Resources Information Center

    Nkotagu, Gabriel Hudson

    2011-01-01

    Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…

  2. Abuses in Federal Student Grant Programs. Hearings before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Third Congress, First Session (October 27-28, 1993).

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Governmental Affairs.

    It appears that many of the problems plaguing the Federal Student Aid Programs are also undermining the Pell Grant program, not so much from dishonesty on the part of students, but by dishonesty on the part of schools. This document presents testimony and prepared statements concerning the allegations of fraud, abuse, and mismanagement in the…

  3. 13 CFR 142.2 - What kind of conduct will result in program fraud enforcement?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What kind of conduct will result in program fraud enforcement? 142.2 Section 142.2 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES ACT REGULATIONS Overview and Definitions § 142.2 What kind of conduct...

  4. 12 CFR 235.4 - Fraud-prevention adjustment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 4 2012-01-01 2012-01-01 false Fraud-prevention adjustment. 235.4 Section 235.4 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE... in paragraph (b) of this section must certify such compliance to its payment card networks on an...

  5. Administrative Subpoenas in Criminal Investigations: A Sketch

    DTIC Science & Technology

    2006-03-17

    administrative subpoenas primarily or exclusive for use in a criminal investigation in cases involving health care fraud, child abuse , Secret Service...no explicit prohibition on disclosure of the existence or specifics of a subpoena issued under this authority. Health Care, Child Abuse , and...investigations. It is an amalgam of three relatively recent statutory provisions — one, the original, dealing with health care fraud; one with child abuse offenses

  6. GAO audit not apt to find pervasive fraud in CARE Act.

    PubMed

    1999-12-24

    After hearing a series of news reports suggesting financial improprieties in programs run by Ryan White CARE Act recipients, a General Accounting Office (GAO) review of the program was made. A preliminary GAO report found only a few cases of fraud in the administration of funding stemming from the CARE Act, but that the potential for fraud is very real because of the lack of safeguards. These findings are considered important since the House Commerce Committee is expected to conduct oversight hearings into further authorization of the CARE Act early in 2000.

  7. Data Analytics in Procurement Fraud Prevention

    DTIC Science & Technology

    2014-06-01

    access card COR contracting officer’s representative CPAR Contractor Performance Assessment Reporting System DCAA Defense Contract Audit Agency DOD...of this can be seen in a company using analytics to predict patterns occurring in known credit card fraud investigations to prevent future schemes...a website such as Amazon or iTunes . 10 4. Distributional Analytics Distributional analytics are used to detect anomalies within data. Through the

  8. A holistic approach to food safety risks: Food fraud as an example.

    PubMed

    Marvin, Hans J P; Bouzembrak, Yamine; Janssen, Esmée M; van der Fels-Klerx, H J; van Asselt, Esther D; Kleter, Gijs A

    2016-11-01

    Production of sufficient, safe and nutritious food is a global challenge faced by the actors operating in the food production chain. The performance of food-producing systems from farm to fork is directly and indirectly influenced by major changes in, for example, climate, demographics, and the economy. Many of these major trends will also drive the development of food safety risks and thus will have an effect on human health, local societies and economies. It is advocated that a holistic or system approach taking into account the influence of multiple "drivers" on food safety is followed to predict the increased likelihood of occurrence of safety incidents so as to be better prepared to prevent, mitigate and manage associated risks. The value of using a Bayesian Network (BN) modelling approach for this purpose is demonstrated in this paper using food fraud as an example. Possible links between food fraud cases retrieved from the RASFF (EU) and EMA (USA) databases and features of these cases provided by both the records themselves and additional data obtained from other sources are demonstrated. The BN model was developed from 1393 food fraud cases and 15 different data sources. With this model applied to these collected data on food fraud cases, the product categories that thus showed the highest probabilities of being fraudulent were "fish and seafood" (20.6%), "meat" (13.4%) and "fruits and vegetables" (10.4%). Features of the country of origin appeared to be important factors in identifying the possible hazards associated with a product. The model had a predictive accuracy of 91.5% for the fraud type and demonstrates how expert knowledge and data can be combined within a model to assist risk managers to better understand the factors and their interrelationships. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. 75 FR 30411 - Privacy Act of 1974; Report of a Modified or Altered System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-01

    ... Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse... Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability... systems and data files necessary for compliance with Title XI, Part C of the Social Security Act because...

  10. More than meets the eye: digital fraud in dentistry.

    PubMed

    Rao, S A; Singh, N; Kumar, R; Thomas, A M

    2010-01-01

    Digital photographs play a substantial role in the presentation and validation of clinical cases for documentation and research purposes in esthetically oriented professions such as dentistry. The introduction of sophisticated cameras and "easy to use" computer software readily available on today's market has enabled digital fraud to emerge as a common and widely used practice. Hence, it is essential that both dentists and editorial circles are aware and cautious with regard to the possibility of digital fraud. A set of 10 routine "pre-" and "post" treatment dental procedure photographs were taken and randomly manipulated using standard desktop software. A team of 10 dental professionals were selected and each one of them was individually requested to review and evaluate the authenticity of the photographs. An assessment of expert opinion revealed an overall sensitivity of 60% and a sensitivity of 15% in correctly identifying a manipulated photograph, which is considered low. Furthermore, there was poor interobserver agreement. Advanced technology that is easily available has resulted in adept digital fraud that is difficult to detect. There is a need for awareness among both dental practitioners and the editorial circle regarding misrepresentation due to image manipulation. It is therefore necessary to follow a skeptical approach in the assessment of digitalized photos used in research and as a part of clinical dentistry.

  11. Science ethics education part I. Perception and attitude toward scientific fraud among medical researchers.

    PubMed

    Vuckovic-Dekic, L; Gavrilovic, D; Kezic, I; Bogdanovic, G; Brkic, S

    2011-01-01

    To assess the knowledge of basic principles of responsible conduct of research and attitude toward the violations of good scientific practice among graduate biomedical students. A total of 361 subjects entered the study. The study group consisted mainly of graduate students of Medicine (85%), and other biomedical sciences (15%). Most participants were on PhD training or on postdoctoral training. A specially designed anonymous voluntary multiple-choice questionnaire was distributed to them. The questionnaire consisted of 43 questions divided in 7 parts, each aimed to assess the participants' previous knowledge and attitudes toward ethical principles of science and the main types of scientific fraud, falsification, fabrication of data, plagiarism, and false authorship. Although they considered themselves as insufficiently educated on science ethics, almost all participants recognized all types of scientific fraud, qualified these issues as highly unethical, and expressed strong negative attitude toward them. Despite that, only about half of the participants thought that superiors-violators of high ethical standards of science deserve severe punishment, and even fewer declared that they would whistle blow. These percentages were much greater in cases when the students had personally been plagiarized. Our participants recognized all types of scientific fraud as violation of ethical standards of science, expressed strong negative attitude against fraud, and believed that they would never commit fraud, thus indicating their own high moral sense. However, the unwillingness to whistle blow and to punish adequately the violators might be characterized as opportunistic behavior.

  12. Retractions in the scientific literature: do authors deliberately commit research fraud?

    PubMed

    Steen, R Grant

    2011-02-01

    Papers retracted for fraud (data fabrication or data falsification) may represent a deliberate effort to deceive, a motivation fundamentally different from papers retracted for error. It is hypothesised that fraudulent authors target journals with a high impact factor (IF), have other fraudulent publications, diffuse responsibility across many co-authors, delay retracting fraudulent papers and publish from countries with a weak research infrastructure. All 788 English language research papers retracted from the PubMed database between 2000 and 2010 were evaluated. Data pertinent to each retracted paper were abstracted from the paper and the reasons for retraction were derived from the retraction notice and dichotomised as fraud or error. Data for each retracted article were entered in an Excel spreadsheet for analysis. Journal IF was higher for fraudulent papers (p<0.001). Roughly 53% of fraudulent papers were written by a first author who had written other retracted papers ('repeat offender'), whereas only 18% of erroneous papers were written by a repeat offender (χ=88.40; p<0.0001). Fraudulent papers had more authors (p<0.001) and were retracted more slowly than erroneous papers (p<0.005). Surprisingly, there was significantly more fraud than error among retracted papers from the USA (χ(2)=8.71; p<0.05) compared with the rest of the world. This study reports evidence consistent with the 'deliberate fraud' hypothesis. The results suggest that papers retracted because of data fabrication or falsification represent a calculated effort to deceive. It is inferred that such behaviour is neither naïve, feckless nor inadvertent.

  13. Lock Up Those Lines: Protecting against Phone Fraud.

    ERIC Educational Resources Information Center

    Schleyer, Peggy E.; Hibner, Dale V.

    1996-01-01

    School business officials must be aware of potential liabilities associated with Centrex and Private Branch Exchange (PBX). This article describes these systems, presents guidelines for developing a telecommunications management plan, and discusses options to limit toll fraud exposure. PBX owners should implement manufacturers' recommended…

  14. 20 CFR 625.14 - Overpayments; disqualification for fraud.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...

  15. 20 CFR 625.14 - Overpayments; disqualification for fraud.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...

  16. 20 CFR 625.14 - Overpayments; disqualification for fraud.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...

  17. 20 CFR 625.14 - Overpayments; disqualification for fraud.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...

  18. 20 CFR 625.14 - Overpayments; disqualification for fraud.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... DISASTER UNEMPLOYMENT ASSISTANCE § 625.14 Overpayments; disqualification for fraud. (a) Finding and... unemployment compensation law administered by the State agency, or from any assistance or allowance payable to the individual with respect to unemployment under any other Federal law administered by the State...

  19. Report: EPA Did Not Identify Volkswagen Emissions Cheating; Enhanced Controls Now Provide Reasonable Assurance of Fraud Detection

    EPA Pesticide Factsheets

    Report #18-P-0181, May 15, 2018. After uncovering VW's emissions fraud, the EPA's light-duty vehicle compliance program added controls to effectively detect and prevent noncompliance—a precursor to potential fraud.

  20. [Beautification of data: Minimal fraud, incompetence or mixture of both].

    PubMed

    Seror, Raphaèle; Ravaud, Philippe

    2012-09-01

    The beautification of data is the process of reporting results of a research in a way that does not correspond to reality, in order to present them in a more favorable or attractive way. The border between errors due to methodological ignorance, embellishment of reality and fraud is sometimes difficult to determine. It is the intentional nature and the repetition of these "arrangements" that are the real switch to deliberate fraud. The emergence of regulatory procedures, such as clinical trial registries, "reporting guidelines", improvement of "peer review" and data sharing, are some of the measures used to fight against and improve transparency of clinical research. Copyright © 2012. Published by Elsevier Masson SAS.

  1. Waste and Abuse: Public School Roofing Projects.

    ERIC Educational Resources Information Center

    2000

    This report details the results of a comprehensive inquiry by New Jersey into one aspect of school construction, the repair and replacement of roof systems, which represents the single most expensive and integral component of a school's physical structure. The investigation began in late 1997 after confidential complaints suggested abuse in the…

  2. Wayward Prescriptions: Costs of Fraud in Payor Plans

    PubMed Central

    Kaye, Thomas

    2008-01-01

    The cost of prescription drugs and medical devices has increased dramatically over the past several years. This increase has exceeded the annual average inflation index, making medical products desired sources of ill-gotten financial gains through diversion, theft, fraud, and deceit. With databases often being compromised, personal health information, personal identification, and therapy history are all available to be used by thieves through deception and misrepresentation, and are being traded on clandestine websites. With increasing values of medical services, wanted efforts continue to emerge in profiteering schemes, using illicit deals for financial gains by exploiting what was once perceived as sacred areas of medical care. Estimates of healthcare resource costs in dollars, lives, and products exceed $200 billion. Select examples of fraud in our medical services are presented that expose plan members to the risks of loss and theft that can compromise the privacy of their health records. The author outlines prevention steps for payors to guard against such practices. PMID:25126240

  3. Individual and Institutional Liability of Researchers in the Case of Scientific Fraud: Values and Ethics

    ERIC Educational Resources Information Center

    Baier, Eric; Dupraz, Laure

    2007-01-01

    How have university institutions generally tackled the fight against scientific fraud? We intend to throw light on the very process of public disclosure of scientific fraud, as it has transformed in the last 30 years within the framework of scientific research institutions. By focusing our analysis on the "denunciation process", we intend to refer…

  4. 76 FR 57671 - Defense Federal Acquisition Regulation Supplement; Display of DoD Inspector General Fraud Hotline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-16

    ... General Fraud Hotline Posters AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to require contractors to display the DoD fraud hotline poster in common work....203-14, Display of Hotline Poster(s). Government Accountability Office (GAO) Report GAO-09-591...

  5. Educators' Degrees Earned on Internet Raise Fraud Issues

    ERIC Educational Resources Information Center

    Trotter, Andrew

    2004-01-01

    This article discusses how the degrees earned by a dozen educators on the Internet have raised fraud issues. Small firms known as "credential evaluators" help states and school districts detect educators who present phony or flimsy academic credentials from overseas institutions--a safeguard that is becoming more important with the…

  6. Avoiding Consumer Frauds and Misrepresentations. A Learning Module.

    ERIC Educational Resources Information Center

    Garman, E. Thomas; Monroe, Sarah D.

    Focusing on avoiding consumer frauds and misrepresentations, this document is one in a series of three consumer education modules developed to educate individual adult consumers in important areas of consumer affairs. An introductory section provides an overview of the module contents, suggested approaches for using the module, and suggestions for…

  7. The Road from Foolishness to Fraud

    NASA Astrophysics Data System (ADS)

    Park, R. L.

    2000-12-01

    Ancient beliefs in demons and magic still sweep across the modern landscape, but they are now dressed in the language and symbols of science. This is pseudoscience. At least in the beginning, its practitioners may believe it to be science, just as witches and faith healers may truly believe they can call forth supernatural powers. What may begin as honest error, however, has a way of evolving through almost imperceptible steps from self-delusion to fraud.

  8. The Road From Foolishness to Fraud

    NASA Astrophysics Data System (ADS)

    Park, Bob

    2000-03-01

    Ancient beliefs in demons and magic still sweep across the modern landscape, but they are now dressed in the language and symbols of science. This is pseudoscience. At least in the beginning, its practitioners may believe it to be science, just as witches and faith healers may truly believe they can call forth supernatural powers. What may begin as honest error, however, has a way of evolving through almost imperceptible steps from self-delusion to fraud.

  9. TANTAMOUNT TO FRAUD?: EXPLORING NON-DISCLOSURE OF GENETIC INFORMATION IN LIFE INSURANCE APPLICATIONS AS GROUNDS FOR POLICY RESCISSION.

    PubMed

    Prince, Anya E R

    2016-01-01

    Many genetic counselors recommend that individuals secure desired insurance policies, such as life insurance, prior to undergoing predictive genetic testing. It has been argued, however, that this practice is "tantamount to fraud" and that failure to disclose genetic test results, or conspiring to secure a policy before testing, opens an individual up to legal recourse. This debate traps affected individuals in a Catch-22. If they apply for life insurance and disclose a genetic test result, they may be denied. If they apply without disclosing the information, they may have committed fraud. The consequences of life insurance fraud are significant: If fraud is found on an application, a life insurer can rescind the policy, in some cases even after the individual has passed away. Such a rescission could leave family members or beneficiaries without the benefits of the life insurance policy payment after the individual's death and place them in in economic difficulty. Although it is clear that lying in response to a direct question about genetic testing would be tantamount to fraud, few, if any, life insurance applications currently include broad questions about genetic testing. This paper investigates whether non-disclosure of unasked for genetic information constitutes fraud and explores varying types of insurance questions that could conceivably be interpreted as seeking genetic information. Life insurance applicants generally have no duty to disclose unasked for information, including genetic information, on an application. However, given the complexities of genetic information, individuals may be exposed to fraud and rescission of their life insurance policy despite honest attempts to truthfully and completely answer all application questions.

  10. An inequality for detecting financial fraud, derived from the Markowitz Optimal Portfolio Theory

    NASA Astrophysics Data System (ADS)

    Bard, Gregory V.

    2016-12-01

    The Markowitz Optimal Portfolio Theory, published in 1952, is well-known, and was often taught because it blends Lagrange Multipliers, matrices, statistics, and mathematical finance. However, the theory faded from prominence in American investing, as Business departments at US universities shifted from techniques based on mathematics, finance, and statistics, to focus instead on leadership, public speaking, interpersonal skills, advertising, etc… The author proposes a new application of Markowitz's Theory: the detection of a fairly broad category of financial fraud (called "Ponzi schemes" in American newspapers) by looking at a particular inequality derived from the Markowitz Optimal Portfolio Theory, relating volatility and expected rate of return. For example, one recent Ponzi scheme was that of Bernard Madoff, uncovered in December 2008, which comprised fraud totaling 64,800,000,000 US dollars [23]. The objective is to compare investments with the "efficient frontier" as predicted by Markowitz's theory. Violations of the inequality should be impossible in theory; therefore, in practice, violations might indicate fraud.

  11. Understanding the types of fraud in claims to South African medical schemes.

    PubMed

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  12. Credit card fraud detection using neural network and geolocation

    NASA Astrophysics Data System (ADS)

    Gulati, Aman; Dubey, Prakash; MdFuzail, C.; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    The most acknowledged payment mode is credit card for both disconnected and online mediums in today's day and age. It facilitates cashless shopping everywhere in the world. It is the most widespread and reasonable approach with regards to web based shopping, paying bills, what's more, performing other related errands. Thus danger of fraud exchanges utilizing credit card has likewise been expanding. In the Current Fraud Detection framework, false exchange is recognized after the transaction is completed. As opposed to the current system, the proposed system presents a methodology which facilitates the detection of fraudulent exchanges while they are being processed, this is achieved by means of Behaviour and Locational Analysis(Neural Logic) which considers a cardholder's way of managing money and spending pattern. A deviation from such a pattern will then lead to the system classifying it as suspicious transaction and will then be handled accordingly.

  13. Deterring Online Advertising Fraud through Optimal Payment in Arrears

    NASA Astrophysics Data System (ADS)

    Edelman, Benjamin

    Online advertisers face substantial difficulty in selecting and supervising small advertising partners: Fraud can be well-hidden, and limited reputation systems reduce accountability. But partners are not paid until after their work is complete, and advertisers can extend this delay both to improve detection of improper partner practices and to punish partners who turn out to be rule-breakers. I capture these relationships in a screening model with delayed payments and probabilistic delayed observation of agents’ types. I derive conditions in which an advertising principal can set its payment delay to deter rogue agents and to attract solely or primarily good-type agents. Through the savings from excluding rogue agents, the principal can increase its profits while offering increased payments to good-type agents. I estimate that a leading affiliate network could have invoked an optimal payment delay to eliminate 71% of fraud without decreasing profit.

  14. Transformation of fraud activities in procurement system in Indonesia

    NASA Astrophysics Data System (ADS)

    Setiani, N.; Huda, S. N.; Pulungan, R.; Winarko, E.

    2017-03-01

    E-procurement has been applied in Indonesia since 2008 through the adoption of Electronic Procurement System (SPSE). The purpose of the use of SPSE in the procurement process is to improve the efficiency of goods or services procurement. In the bidding process, intensive communication and data exchange between providers and organizers are urgently needed. Through SPSE, the frequency of face to face meetings between providers and the committee can be reduced. This is expected to minimize potential fraud behaviors in the goods or services procurement conducted through the tender process. There exists a transformation of activities in the procurement through SPSE from the tender process that was previously done manually. In this paper, we analyze this transformation between manual procurement process and SPSE-based procurement process. The result of the analysis is exploited for investigating the possibility of fraud behavior transformations in every phase of e-procurement activities.

  15. Medicare, Medicaid, and Children's Health Insurance Programs: Announcement of the Extension of Temporary Moratoria on Enrollment of Part B Non-Emergency Ground Ambulance Suppliers and Home Health Agencies in Designated Geographic Locations. Extension of temporary moratoria.

    PubMed

    2017-07-28

    This document announces the extension of statewide temporary moratoria on the enrollment of new Medicare Part B non-emergency ground ambulance providers and suppliers and Medicare home health agencies, subunits, and branch locations in Florida, Illinois, Michigan, Texas, Pennsylvania, and New Jersey, as applicable, to prevent and combat fraud, waste, and abuse. This extension also applies to the enrollment of new non-emergency ground ambulance suppliers and home health agencies, subunits, and branch locations in Medicaid and the Children's Health Insurance Program in those states.

  16. Evaluation of the DoD Safety Program: DoD Guard & Reserve Safety Survey

    DTIC Science & Technology

    2008-12-12

    Alexandria,VA,22350-1500 8 . PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S... 8 -98) Prescribed by ANSI Std Z39-18 hot line D E PA R T M E N T O F D E F E N S E To report fraud, waste, mismanagement, and abuse of authority...Results 2007 Table 1 Percentile Scores, Percent Distribution of Responses, and Average Response Scores - 8 - sse oe LP oe sse SP LP SSA sse

  17. 41 CFR 105-55.003 - Antitrust, fraud, tax, interagency claims, and claims over $100,000 excluded.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) This part does not apply to tax debts. (c) This part does not apply to claims between GSA and other... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Antitrust, fraud, tax... § 105-55.003 Antitrust, fraud, tax, interagency claims, and claims over $100,000 excluded. (a) The...

  18. Shedding light on food fraud: spectrophotometric and spectroscopic methods as a tool against economically motivated adulteration of food

    NASA Astrophysics Data System (ADS)

    Petronijević, R. B.; Velebit, B.; Baltić, T.

    2017-09-01

    Intentional modification of food or substitution of food ingredients with the aim of gaining profit is food fraud or economically motivated adulteration (EMA). EMA appeared in the food supply chain, and following the global expansion of the food market, has become a world-scale problem for the global economy. Food frauds have involved oils, milk and meat products, infant formula, honey, juices, spices, etc. New legislation was enacted in the last decade in order to fight EMA. Effective analytical methods for food fraud detection are few and still in development. The majority of the methods in common use today for EMA detection are time consuming and inappropriate for use on the production line or out of the laboratory. The next step in the evolution of analytical techniques to combat food fraud is development of fast, accurate methods applicable using portable or handheld devices. Spectrophotometric and spectroscopic methods combined with chemometric analysis, and perhaps in combination with other rapid physico-chemical techniques, could be the answer. This review discusses some analytical techniques based on spectrophotometry and spectroscopy, which are used to reveal food fraud and EMA.

  19. 48 CFR 849.106 - Fraud or other criminal conduct.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACT MANAGEMENT TERMINATION OF CONTRACTS General Principles 849.106 Fraud or other criminal conduct. (a... following: (i) The DSPE. (ii) The Director, Office of Construction and Facilities Management, in the case of contracting officers from the Office of Construction and Facilities Management. (3) Follow procedures as...

  20. Multi-stage methodology to detect health insurance claim fraud.

    PubMed

    Johnson, Marina Evrim; Nagarur, Nagen

    2016-09-01

    Healthcare costs in the US, as well as in other countries, increase rapidly due to demographic, economic, social, and legal changes. This increase in healthcare costs impacts both government and private health insurance systems. Fraudulent behaviors of healthcare providers and patients have become a serious burden to insurance systems by bringing unnecessary costs. Insurance companies thus develop methods to identify fraud. This paper proposes a new multistage methodology for insurance companies to detect fraud committed by providers and patients. The first three stages aim at detecting abnormalities among providers, services, and claim amounts. Stage four then integrates the information obtained in the previous three stages into an overall risk measure. Subsequently, a decision tree based method in stage five computes risk threshold values. The final decision stating whether the claim is fraudulent is made by comparing the risk value obtained in stage four with the risk threshold value from stage five. The research methodology performs well on real-world insurance data.

  1. 17 CFR 39.7 - Fraud in connection with the clearing of transactions on a derivatives clearing organization.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with the clearing of transactions on a derivatives clearing organization. 39.7 Section 39.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.7 Fraud in connection...

  2. 45 CFR 30.3 - Antitrust, fraud, exception in the account of an accountable official, and interagency claims...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Antitrust, fraud, exception in the account of an accountable official, and interagency claims excluded. 30.3 Section 30.3 Public Welfare DEPARTMENT OF HEALTH... antitrust violations or fraud. (1) The standards in this part relating to compromise, suspension, and...

  3. 5 CFR 845.408 - Special processing for fraud claims.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Special processing for fraud claims. 845.408 Section 845.408 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES RETIREMENT SYSTEM-DEBT COLLECTION Agency Requests to OPM for Recovery of a Debt From the Civil Service...

  4. Fraud in a population-based study of headache: prevention, detection and correction

    PubMed Central

    2014-01-01

    Background In medicine, research misconduct is historically associated with laboratory or pharmaceutical research, but the vulnerability of epidemiological surveys should be recognized. As these surveys underpin health policy and allocation of limited resources, misreporting can have far-reaching implications. We report how fraud in a nationwide headache survey occurred and how it was discovered and rectified before it could cause harm. Methods The context was a door-to-door survey to estimate the prevalence and burden of headache disorders in Pakistan. Data were collected from all four provinces of Pakistan by non-medical interviewers and collated centrally. Measures to ensure data integrity were preventative, detective and corrective. We carefully selected and trained the interviewers, set rules of conduct and gave specific warnings regarding the consequences of falsification. We employed two-fold fraud detection methods: comparative data analysis, and face-to-face re-contact with randomly selected participants. When fabrication was detected, data shown to be unreliable were replaced by repeating the survey in new samples according to the original protocol. Results Comparative analysis of datasets from the regions revealed unfeasible prevalences and gender ratios in one (Multan). Data fabrication was suspected. During a surprise-visit to Multan, of a random sample of addresses selected for verification, all but one had been falsely reported. The data (from 840 cases) were discarded, and the survey repeated with new interviewers. The new sample of 800 cases was demographically and diagnostically consistent with other regions. Conclusion Fraud in community-based surveys is seldom reported, but no less likely to occur than in other fields of medical research. Measures should be put in place to prevent, detect and, where necessary, correct it. In this instance, had the data from Multan been pooled with those from other regions before analysis, a damaging fraud might

  5. A real time metabolomic profiling approach to detecting fish fraud using rapid evaporative ionisation mass spectrometry.

    PubMed

    Black, Connor; Chevallier, Olivier P; Haughey, Simon A; Balog, Julia; Stead, Sara; Pringle, Steven D; Riina, Maria V; Martucci, Francesca; Acutis, Pier L; Morris, Mike; Nikolopoulos, Dimitrios S; Takats, Zoltan; Elliott, Christopher T

    2017-01-01

    Fish fraud detection is mainly carried out using a genomic profiling approach requiring long and complex sample preparations and assay running times. Rapid evaporative ionisation mass spectrometry (REIMS) can circumvent these issues without sacrificing a loss in the quality of results. To demonstrate that REIMS can be used as a fast profiling technique capable of achieving accurate species identification without the need for any sample preparation. Additionally, we wanted to demonstrate that other aspects of fish fraud other than speciation are detectable using REIMS. 478 samples of five different white fish species were subjected to REIMS analysis using an electrosurgical knife. Each sample was cut 8-12 times with each one lasting 3-5 s and chemometric models were generated based on the mass range m/z 600-950 of each sample. The identification of 99 validation samples provided a 98.99% correct classification in which species identification was obtained near-instantaneously (≈ 2 s) unlike any other form of food fraud analysis. Significant time comparisons between REIMS and polymerase chain reaction (PCR) were observed when analysing 6 mislabelled samples demonstrating how REIMS can be used as a complimentary technique to detect fish fraud. Additionally, we have demonstrated that the catch method of fish products is capable of detection using REIMS, a concept never previously reported. REIMS has been proven to be an innovative technique to help aid the detection of fish fraud and has the potential to be utilised by fisheries to conduct their own quality control (QC) checks for fast accurate results.

  6. Research Misconduct: Policy and Practice at the NSF

    NASA Astrophysics Data System (ADS)

    Manka, Aaron

    2004-03-01

    Under NSF's Office of Inspector General mandate to prevent fraud, waste, abuse, or mismanagement involving NSF's proposals and awards, our office also investigates allegations of research misconduct. I will discuss our office's handling of such matters, focusing on the ethical and legal obligations of proposal submitters and awardees and the role of the scientific community. To illustrate some other points that are of interest to the physics community, I will also discuss some of our investigative activities relevant to: duplicate funding, the accuracy of information in proposals, and collaborations.

  7. 5 CFR 831.1808 - Special processing for fraud claims.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Special processing for fraud claims. 831.1808 Section 831.1808 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) RETIREMENT Agency Requests to OPM for Recovery of a Debt from the Civil Service Retirement and Disability Fund § 831.1808...

  8. Tribal Dispossession and the Ottawa Indian University Fraud.

    ERIC Educational Resources Information Center

    Unrau, William E.; Miner, H. Craig

    The Ottawa Treaty of 1862 provided that a 20,000-acre parcel of tribal land be used to endow a school for the benefit of the Ottawa Indians. This book is a case study of manipulation and fraud, whereby the Ottawas were promised a university, paid for most of it, and then lost it in the offices of bureaucrats. Thanks to investigations at several…

  9. Testing the woman abuse screening tool to identify intimate partner violence in Indonesia.

    PubMed

    Iskandar, Livia; Braun, Kathryn L; Katz, Alan R

    2015-04-01

    Intimate Partner Violence (IPV) is a global public health problem. IPV prevalence in Indonesia has been estimated to be less than 1%, based on reported cases. It is likely that IPV prevalence is underreported in Indonesia, as it is in many other countries. Screening for IPV has been found to increase IPV identification, but no screening tools are in use in Indonesia. The aim of this study was to test the translated Woman Abuse Screening Tool (WAST) for detecting IPV in Indonesia. The WAST was tested against a diagnostic interview by a trained psychologist on 240 women attending two Primary Health Centers in Jakarta. IPV prevalence and the reliability, sensitivity, and specificity of the WAST were estimated. Prevalence of IPV by diagnostic interview was 36.3%, much higher than published estimates. The most common forms of IPV identified were psychological (85%) and physical abuse (24%). Internal reliability of the WAST was high (α = .801). A WAST score of 13 (out of 24) is the recommended cutoff for identifying IPV, but only 17% of the Indonesian sample scored 13 or higher. Test sensitivity of the WAST with a cutoff score of 13 was only 41.9%, with a specificity of 96.8%. With a cutoff score of 10, the sensitivity improved to 84.9%, while the specificity decreased to 61.0%. Use of the WAST with a cutoff score of 10 provides good sensitivity and reasonable specificity and would provide a much-needed screening tool for use in Indonesia. Although a lower cutoff would yield a greater proportion of false positives, most of the true cases would be identified, increasing the possibility that women experiencing abuse would receive needed assistance. © The Author(s) 2014.

  10. Procurement Integrity in Contingency Operations: A Case Study of Army Contracting Officer Corruption in Operations Iraqi and Enduring Freedom Utilizing Occupational Fraud Theory

    DTIC Science & Technology

    2011-12-01

    Study of Army Contracting Officer Corruption in Operations Iraqi and Enduring Freedom Utilizing Occupational Fraud Theory By: Amanda H...Operations Iraqi and Enduring Freedom Utilizing Occupational Fraud Theory 6. AUTHOR(S) Amanda H. Flint 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION...CCOs) during Operations Iraqi Freedom and Enduring Freedom (OIF/OEF) by applying occupational fraud theory, specifically the classic sociological

  11. 41 CFR 102-38.50 - What must we do when an executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in connection... an executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in.... 559, fraud, bribery, or criminal collusion in connection with the disposal of personal property, the...

  12. 29 CFR 2580.412-9 - Meaning of fraud or dishonesty.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Meaning of fraud or dishonesty. 2580.412-9 Section 2580.412-9 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...

  13. 76 FR 14637 - State Medicaid Fraud Control Units; Data Mining

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ...] State Medicaid Fraud Control Units; Data Mining AGENCY: Office of Inspector General (OIG), HHS. ACTION... and analyzing State Medicaid claims data, known as data mining. To support and modernize MFCU efforts... (FFP) in the costs of defined data mining activities under specified conditions. In addition, we...

  14. 28 CFR 104.71 - Procedures to prevent and detect fraud.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... 104.71 Section 104.71 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) SEPTEMBER 11TH VICTIM... prevent and detect fraud. (a) Review of claims. For the purpose of detecting and preventing the payment of...; and (3) Ensure the quality control of claims review procedures. (b) Quality control. The Special...

  15. 17 CFR 1.1 - Fraud in or in connection with transactions in foreign currency subject to the Commodity Exchange...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in or in connection with... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.1 Fraud in or in connection with transactions in foreign currency subject to the...

  16. Health Care Fraud: Characteristics, Sanctions, and Prevention. Briefing Report to the Honorable William V. Roth, Jr., U.S. Senate.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Accounting and Financial Management Div.

    At the request of Senator William Roth, Jr., the General Accounting Office (GAO) reviewed Medicare and Medicaid fraud investigations that agency inspectors general referred to the Department of Justice for prosecution to identify characteristics of alleged fraud against the government and to determine actions taken against those caught defrauding…

  17. Fraud, misinformation and the open culture

    NASA Astrophysics Data System (ADS)

    Pointon, Tony

    2009-08-01

    Both Eugenie Samuel Reich's article on the Schön fraud (May pp24-29) and the letters you published in response (July p19) have treated the case as a matter affecting science. Yet it is much broader. False information is disseminated on a regular basis in the public media, less so in professional journals. Some people may be harmed by that misinformation; others may gain - for example by people spreading rumours that affect the stock market. It can happen with the auction of items based on false provenance. It can also happen by people claiming credit for something they have not done.

  18. Reduce Fraud Risk in Your District with Stronger Internal Controls

    ERIC Educational Resources Information Center

    Okrzesik, Daryl J.; Nuehring, Bert G.

    2011-01-01

    Internal accounts offer schools a faster, more convenient way to handle the income and expenses that result from student fees, school clubs and organizations, field trips, fund-raising, and similar activities. But this convenience also incurs the added risk of fraud. Fortunately, there are proven ways to strengthen internal controls and reduce…

  19. Risk Factors of Occupational Fraud: A Study of Member Institutions of the National Association of Independent Colleges and Universities

    ERIC Educational Resources Information Center

    Ten Napel, Karmen

    2013-01-01

    Available data indicate that colleges and universities have experienced an unexpected rise in occupational fraud over the past two decades. In order to mitigate the risk of fraud, these institutions must be proactive and have strong internal controls and policies. The purpose of this study was to examine the current controls in place at Midwest…

  20. 42 CFR 455.1 - Basis and scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... for a State fraud detection and investigation program, and for disclosure of information on ownership... Security Act, Subpart A provides State plan requirements for the identification, investigation, and referral of suspected fraud and abuse cases. In addition, the subpart requires that the State— (1) Report...

  1. Reducing Homeland Insecurities: Ending Abuse of the Asylum and Credible Fear Program

    DTIC Science & Technology

    2015-03-01

    Operations FDNS Fraud Detection and National Security FEMA Federal Emergency Management Agency FY Fiscal Year GAO Government Accounting...file applications. A 2002 Government Accounting Office (GAO) study on benefit fraud found that fraud was pervasive and routinely used in furtherance... Government Accountability Office, 2002), http://www.gao.gov/assets/240/233515.pdf. 7 Mark Motivans, Immigration Offenders in the Federal Justice

  2. The health fraud battle. Education is the best defense.

    PubMed

    Johnson, G C; Gottesman, R A

    1989-06-01

    Despite the regulatory and educational efforts of the Food and Drug Administration and other agencies and organizations, large numbers of American consumers continue to be fooled by unsubstantiated "miracle cure" claims made by manufacturers of fraudulent medical products. Physicians who are familiar with the language of health fraud advertising and product labels may be able to help patients avoid unnecessary expense, false hope, and physical and emotional harm.

  3. Topical review on the abuse and misuse potential of tramadol and tilidine in Germany.

    PubMed

    Radbruch, Lukas; Glaeske, Gerd; Grond, Stefan; Münchberg, Frank; Scherbaum, Norbert; Storz, Elisabeth; Tholen, Kathrin; Zagermann-Muncke, Petra; Zieglgänsberger, Walter; Hoffmann-Menzel, Helmut; Greve, Hendrik; Cremer-Schaeffer, Peter

    2013-01-01

    Tramadol and tilidine (in combination with naloxone) are used as weak opioid analgesics in Germany. Tramadol is not scheduled in the German Narcotic Drugs Act. Tilidine is scheduled, whereas Tilidine in fixed combinations with naloxone is exempt from some of the provisions of the Narcotic Drugs Act. Recent reports on misuse of both substances led to an evaluation of their potential for misuse, abuse, and dependency by the expert advisory committee established by the German Federal Government, resident at the Federal Institute for Drugs and Medical Devices. A subcommittee formulated key questions and identified available data sources for each of these questions. Additional information was solicited where necessary, including a survey among a panel of pharmacists, a survey in an addiction clinic, analysis of prescription patterns, and information from the boards of pharmacists of the federal states and the Federal Bureau of Criminal Investigation. Analgesic efficiency in the treatment of acute and chronic pain has been proven for both tramadol and tilidine/naloxone. For tramadol, high evidence has been confirmed in systematic reviews, and tramadol is listed in national and international guidelines on acute and chronic pain management. Animal and human studies found a low potential for misuse, abuse, and dependency for both substances. Information from 2 tramadol safety databases allowed calculation of the incidence of abuse or dependency as 0.21 and 0.12 cases per million defined daily dosages (DDDs), with lower incidences in recent years. For tilidine/naloxone, the incidence was calculated as 0.43 cases per million DDDs for oral solution and 0.18 for slow-release tablets. In an online survey among German pharmacies as well as in the reports from state pharmacy boards, fraud attempts were repeated more frequently with tilidine/naloxone than with tramadol in the last 2 years. The Federal Bureau of Criminal Investigations reported prescription fraud only with tilidine

  4. 42 CFR 455.21 - Cooperation with State Medicaid fraud control units.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... subchapter. In using this information, the unit must protect the privacy rights of beneficiaries; and (3) On... 42 Public Health 4 2014-10-01 2014-10-01 false Cooperation with State Medicaid fraud control units. 455.21 Section 455.21 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND...

  5. Getting Something for Nothing: Trump, Fraud, and the Tea Party

    ERIC Educational Resources Information Center

    Bordelon, David

    2017-01-01

    David Bordelon identifies himself as one of the majority of Americans who voted to keep Trump out of office. In this article he discusses his confusion by the Tea Party's fixation on welfare fraud, and inability to recognize it in President Trump's behavior. The author says that he can only hope that his confusion will be shared, and progress to…

  6. 7 CFR 1773.9 - Disclosure of fraud, illegal acts, and other noncompliance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., the auditor must design the audit to provide reasonable assurance of detecting fraud that is material... UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE (CONTINUED) POLICY ON AUDITS OF RUS BORROWERS RUS Audit... statements, auditors should apply audit procedures specifically directed to ascertaining whether an illegal...

  7. 78 FR 79567 - Supplemental Nutrition Assistance Program: Trafficking Controls and Fraud Investigations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-31

    ... DEPARTMENT OF AGRICULTURE Food and Nutrition Service 7 CFR Parts 271 and 274 RIN 0584-AE26 Supplemental Nutrition Assistance Program: Trafficking Controls and Fraud Investigations AGENCY: Food and Nutrition Service, USDA. ACTION: Final rule, Interim final rule; notice of approval of Information...

  8. Procurement Fraud: A Knowledge-Level Analysis of Contracting Personnel

    DTIC Science & Technology

    2014-12-01

    experience, or how many years the paliicipant has been in the contracting career field. The scores ranged from 56.8 percent for patt icipants with 11 to 20...23. Percentage ofResponses to Internal Control Perception Question c. Procurement Fraud Scheme The survey patt icipants were asked to which...survey patt icipants’ average scores on the knowledge questions held a negative con elation with their yeru·s of experience, with the exception of

  9. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    NASA Astrophysics Data System (ADS)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  10. 76 FR 82028 - Request for Information for the 2012 Trafficking in Persons Report

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... equally and adequately to victims of labor and sex trafficking? Men, women, and children? Citizen and... therefore not seeking, information on prostitution, human smuggling, visa fraud, or child abuse, unless such... any act of sex trafficking involving force, fraud, coercion, or in which the victim of sex trafficking...

  11. Elder abuse in Europe's "most elderly" city: an assessment of the phenomenon and an analysis of the data from the Penal Court of Genoa from 2010 to 2015.

    PubMed

    Molinelli, Andrea; Ventura, Francesco; Pinto, Sara Lo; Drommi, Martina; De Stefano, Francesco

    2017-12-01

    In Italy, 5% of the elderly are estimated to have suffered abuse. While the Penal Code refers to generic types of abuse, such as physical and psychological maltreatment, abandonment and financial fraud, it does not specifically protect the elderly as a category. To assess the frequency and modalities of elder abuse in Genoa and its Province, and to compare these data with those reported in the literature, in order to provide a picture of the current situation that can be used by the authorities to combat this phenomenon. We analysed the first-degree verdicts issued by the Court of Genoa regarding accusations of physical, psychological and moral abuse and maltreatment of elderly subjects (over 65 years) in the period 2010-2015. Only 85 of the 4028 court verdicts analysed involved elderly persons: 19 cases of domestic maltreatment, 3 of abuse of the means of correction or discipline, 18 of personal injury, 5 of abandonment and 40 of circumvention (deceiving someone, especially an elderly or mentally impaired person, to obtain a profit). A gap was observed between the number of crimes reported to the judicial authorities (tip of the iceberg) and the estimated prevalence of the phenomenon in the literature. There is a need both to create a network of protection for the elderly involving medical and judicial specialists and to train healthcare professionals to better recognise and report cases of maltreatment.

  12. Molecular assay to fraud identification of meat products.

    PubMed

    Doosti, Abbas; Ghasemi Dehkordi, Payam; Rahimi, Ebrahim

    2014-01-01

    Detection of species fraud in meat products is important for consumer protection and food industries. A molecular technique such as PCR method for detection of beef, sheep, pork, chicken, donkey, and horse meats in food products was established. The purpose of this study was to identification of fraud and adulteration in industrial meat products by PCR-RFLP assay in Iran. In present study, 224 meat products include 68 sausages, 48 frankfurters, 55 hamburgers, 33 hams and 20 cold cut meats were collected from different companies and food markets in Iran. Genomic DNA was extracted and PCR was performed for gene amplification of meat species using specific oligonucleotid primers. Raw meat samples are served as the positive control. For differentiation between donkey's and horse's meat, the mitochondrial DNA segment (cytochrome-b gene) was amplified and products were digested with AluI restriction enzyme. Results showed that 6 of 68 fermented sausages (8.82%), 4 of 48 frankfurters (8.33%), 4 of 55 hamburgers (7.27%), 2 of 33 hams (6.6%), and 1 of 20 cold cut meat (5%) were found to contain Haram (unlawful or prohibited) meat. These results indicate that 7.58% of the total samples were not containing Halal (lawful or permitted) meat and have another meat. These findings showed that molecular methods such as PCR and PCR-RFLP are potentially reliable techniques for detection of meat type in meat products for Halal authentication.

  13. Well-planned due diligence can protect buyers of healthcare entities.

    PubMed

    Doty, L W; Campbell, A T

    2000-10-01

    Conducting a thorough due diligence is essential for any buyer that plans to acquire a healthcare entity, including a hospital or a group practice, because it provides an opportunity for the buyer to uncover billing or other fraud-and-abuse problems within the selling organization. These problems can be significant, because the buyer can be held liable for undiscovered billing problems that result in investigation, prosecution, and penalties. It is important for the buyer to ascertain who bears the liability of fraud-and-abuse violations and attempt to protect itself from assuming such liability.

  14. College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress

    ERIC Educational Resources Information Center

    US Department of Education, 2004

    2004-01-01

    Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…

  15. 45 CFR 160.203 - General rule and exceptions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... law, as applicable, provides for the reporting of disease or injury, child abuse, birth, or death, or... § 160.204 that the provision of State law: (1) Is necessary: (i) To prevent fraud and abuse related to...

  16. 45 CFR 160.203 - General rule and exceptions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... law, as applicable, provides for the reporting of disease or injury, child abuse, birth, or death, or... § 160.204 that the provision of State law: (1) Is necessary: (i) To prevent fraud and abuse related to...

  17. 45 CFR 160.203 - General rule and exceptions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... law, as applicable, provides for the reporting of disease or injury, child abuse, birth, or death, or... § 160.204 that the provision of State law: (1) Is necessary: (i) To prevent fraud and abuse related to...

  18. 45 CFR 160.203 - General rule and exceptions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... law, as applicable, provides for the reporting of disease or injury, child abuse, birth, or death, or... § 160.204 that the provision of State law: (1) Is necessary: (i) To prevent fraud and abuse related to...

  19. 45 CFR 160.203 - General rule and exceptions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... law, as applicable, provides for the reporting of disease or injury, child abuse, birth, or death, or... § 160.204 that the provision of State law: (1) Is necessary: (i) To prevent fraud and abuse related to...

  20. Automated Coding Software: Development and Use to Enhance Anti-Fraud Activities*

    PubMed Central

    Garvin, Jennifer H.; Watzlaf, Valerie; Moeini, Sohrab

    2006-01-01

    This descriptive research project identified characteristics of automated coding systems that have the potential to detect improper coding and to minimize improper or fraudulent coding practices in the setting of automated coding used with the electronic health record (EHR). Recommendations were also developed for software developers and users of coding products to maximize anti-fraud practices. PMID:17238546

  1. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    PubMed

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed.

  2. Prior childhood sexual abuse in mothers of sexually abused children.

    PubMed

    Oates, R K; Tebbutt, J; Swanston, H; Lynch, D L; O'Toole, B I

    1998-11-01

    To see if mothers who were sexually abused in their own childhood are at increased risk of their children being sexually abused and to see if prior sexual abuse in mothers affects their parenting abilities. Sixty-seven mothers whose children had been sexually abused by others and 65 control mothers were asked about sexual abuse in their own childhood. The sexually abused children of mothers who had been sexually abused in their own childhood were compared with the sexually abused children of mothers who had not suffered child sexual abuse as children. Comparisons were made on self-esteem, depression and behavior in the children. Thirty-four percent of mothers of sexually abused children gave a history of sexual abuse in their own childhoods, compared with 12% of control mothers. Assessment of the sexually abused children for self-esteem, depression and behavior at the time of diagnosis, after 18 months and after 5 years showed no difference in any of these measures at any of the three time intervals between those whose mothers had suffered child sexual abuse and those whose mothers had not been abused. In this study, sexual abuse in a mother's own childhood was related to an increased risk of sexual abuse occurring in the next generation, although prior maternal sexual abuse did not effect outcome in children who were sexually abused.

  3. Psychiatric disorders, spouse abuse and child abuse.

    PubMed

    Bland, R C; Orn, H

    1986-01-01

    The results of 2000 standardized psychiatric diagnostic interviews of randomly selected adult household residents of Edmonton showed that having had any psychiatric diagnosis increased the risk for being involved in spouse and child abuse, particularly for those with alcohol abuse/dependence plus anti-social personality or depression. Altogether 56% of spouse abusers and 69% of child abusers had a lifetime psychiatric diagnosis.

  4. Elder abuse.

    PubMed

    Kurrle, Susan

    2004-10-01

    Elder abuse is a common and yet often unrecognised problem in our community. With up to 5% of the community dwelling older population being victims of abuse, the general practitioner has a pivotal role in identifying this abuse. This article provides an outline of the definition of elder abuse, describes the types of abuse seen and the reasons for occurrence of abuse. It summarises the role of the GP in the identification and management of abuse and provides guidance on intervention strategies. Case studies are used to illustrate the issues discussed. Elder abuse is defined as any pattern of behaviour which causes physical, psychological, financial or social harm to an older person. The role of the GP in identifying abuse is critical. The vast majority of older people visit their GP at least once a year, and the GP often has a long standing relationship with their patient and the patient's family. They are therefore ideally placed to identify elder abuse.

  5. Cognitive and Emotional Differences between Abusive and Non-Abusive Fathers

    ERIC Educational Resources Information Center

    Francis, Karen J.; Wolfe, David A.

    2008-01-01

    Objective: Abusive fathers perpetrate a substantial portion of child physical abuse. Despite this, little is known about how they differ from non-abusive fathers. This study compared a broad range of cognitive and affective factors between physically abusive and non-abusive fathers. Methods: Abusive (n = 24) and non-abusive (n = 25) fathers…

  6. 78 FR 65515 - Supplemental Nutrition Assistance Program: Trafficking Controls and Fraud Investigations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-01

    ... card request. The comment period is being extended to provide additional time for interested parties to... times more likely to be flagged as potential trafficking by FNS' fraud detection system. Trafficking is... many first-time users do not understand how to use the card and a grace period in the beginning would...

  7. Feathered Detectives: Real-Time GPS Tracking of Scavenging Gulls Pinpoints Illegal Waste Dumping.

    PubMed

    Navarro, Joan; Grémillet, David; Afán, Isabel; Ramírez, Francisco; Bouten, Willem; Forero, Manuela G

    2016-01-01

    Urban waste impacts human and environmental health, and waste management has become one of the major challenges of humanity. Concurrently with new directives due to manage this human by-product, illegal dumping has become one of the most lucrative activities of organized crime. Beyond economic fraud, illegal waste disposal strongly enhances uncontrolled dissemination of human pathogens, pollutants and invasive species. Here, we demonstrate the potential of novel real-time GPS tracking of scavenging species to detect environmental crime. Specifically, we were able to detect illegal activities at an officially closed dump, which was visited recurrently by 5 of 19 GPS-tracked yellow-legged gulls (Larus michahellis). In comparison with conventional land-based surveys, GPS tracking allows a much wider and cost-efficient spatiotemporal coverage, even of the most hazardous sites, while GPS data accessibility through the internet enables rapid intervention. Our results suggest that multi-species guilds of feathered detectives equipped with GPS and cameras could help fight illegal dumping at continental scales. We encourage further experimental studies, to infer waste detection thresholds in gulls and other scavenging species exploiting human waste dumps.

  8. Fraud and Corruption Control at Education System Level: A Case Study of the Victorian Department of Education and Early Childhood Development in Australia

    ERIC Educational Resources Information Center

    Bandaranayake, Bandara

    2014-01-01

    This case describes the implementation of a fraud and corruption control policy initiative within the Victorian Department of Education and Early Childhood Development (the Department) in Australia. The policy initiative was administered and carried out by a small team of fraud control officials, including the author of this article, in the…

  9. Generative adversarial network based telecom fraud detection at the receiving bank.

    PubMed

    Zheng, Yu-Jun; Zhou, Xiao-Han; Sheng, Wei-Guo; Xue, Yu; Chen, Sheng-Yong

    2018-06-01

    Recently telecom fraud has become a serious problem especially in developing countries such as China. At present, it can be very difficult to coordinate different agencies to prevent fraud completely. In this paper we study how to detect large transfers that are sent from victims deceived by fraudsters at the receiving bank. We propose a new generative adversarial network (GAN) based model to calculate for each large transfer a probability that it is fraudulent, such that the bank can take appropriate measures to prevent potential fraudsters to take the money if the probability exceeds a threshold. The inference model uses a deep denoising autoencoder to effectively learn the complex probabilistic relationship among the input features, and employs adversarial training that establishes a minimax game between a discriminator and a generator to accurately discriminate between positive samples and negative samples in the data distribution. We show that the model outperforms a set of well-known classification methods in experiments, and its applications in two commercial banks have reduced losses of about 10 million RMB in twelve weeks and significantly improved their business reputation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  10. College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. 2008

    ERIC Educational Resources Information Center

    US Department of Education, 2008

    2008-01-01

    Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…

  11. Ethics and fraud in science: a review of scientific misconduct and applications to craniofacial research.

    PubMed

    Eliades, Theodore; Athanasiou, Athanasios E; Papadopulos, Jannis S

    2005-01-01

    The purpose of this article is to review and discuss the occurrence of fraud in biomedical research and analyze the definition, origin, and various forms of scientific misconduct. Fraud in research most often involves reporting data for which no records of experiment or population are present; manipulating research materials, equipment, or procedures to arrive at the desirable result; adding, changing, or omitting results, which positively or negatively relate to the hypothesis that the research intends to test; and incorporating ideas, statements, procedures of others' work without permission and appropriate credit to the source. The etiologic factors contributing to this deviant behavior, and measures taken by relevant bodies to eliminate this phenomenon are discussed. Ethical and integrity aspects of craniofacial research are explored and a set of criteria to facilitate rigorous assessment of the integrity of clinical and basic research protocols is proposed. These include (1) an integrity-focused training of researchers to adhere to specific laboratory procedure and tactics which discourage fraud; (2) appointment of external reviewers to detect unusual and suspicious experimental process or data patterns; and (3) encouragement of multicenter trials. Although it is widely recognized that the sole determinant of scientific misconduct is the individual investigator's integrity, a number of precautions may effectively reduce the prevalence of this event, which may affect the status and trends of biomedical research in general.

  12. Development of surface enhanced Raman scattering (SERS) spectroscopy monitoring of fuel markers to prevent fraud

    NASA Astrophysics Data System (ADS)

    Wilkinson, Timothy; Clarkson, John; White, Peter C.; Meakin, Nicholas; McDonald, Ken

    2013-05-01

    Governments often tax fuel products to generate revenues to support and stimulate their economies. They also subsidize the cost of essential fuel products. Fuel taxation and subsidization practices are both subject to fraud. Oil marketing companies also suffer from fuel fraud with loss of legitimate sales and additional quality and liability issues. The use of an advanced marking system to identify and control fraud has been shown to be effective in controlling illegal activity. DeCipher has developed surface enhanced Raman scattering (SERS) spectroscopy as its lead technology for measuring markers in fuel to identify and control malpractice. SERS has many advantages that make it highly suitable for this purpose. The SERS instruments are portable and can be used to monitor fuel at any point in the supply chain. SERS shows high specificity for the marker, with no false positives. Multiple markers can also be detected in a single SERS analysis allowing, for example, specific regional monitoring of fuel. The SERS analysis from fuel is also quick, clear and decisive, with a measurement time of less than 5 minutes. We will present results highlighting our development of the use of a highly stable silver colloid as a SERS substrate to measure the markers at ppb levels. Preliminary results from the use of a solid state SERS substrate to measure fuel markers will also be presented.

  13. Estimating Community Drug Abuse by Wastewater Analysis

    PubMed Central

    Zuccato, Ettore; Chiabrando, Chiara; Castiglioni, Sara; Bagnati, Renzo; Fanelli, Roberto

    2008-01-01

    Background The social and medical problems of drug abuse are a matter of increasing global concern. To tackle drug abuse in changing scenarios, international drug agencies need fresh methods to monitor trends and patterns of illicit drug consumption. Objective We tested a sewage epidemiology approach, using levels of excreted drug residues in wastewater, to monitor collective use of the major drugs of abuse in near real time. Methods Selected drug target residues derived from use of cocaine, opiates, cannabis, and amphetamines were measured by mass spectrometry in wastewater collected at major sewage treatment plants in Milan (Italy), Lugano (Switzerland), and London (United Kingdom). The amounts of drug residues conveyed to the treatment plants, reflecting the amounts collectively excreted with urine, were used to estimate consumption of the active parent drugs. Results Reproducible and characteristic profiles of illicit drug use were obtained in the three cities, thus for the first time quickly revealing changes in local consumption (e.g., cocaine consumption rose significantly on weekends in Milan). Profiles of local drug consumption based on waste-water measurements are in line with national annual prevalence estimates. Conclusions Patterns and trends of drug abuse in local communities can be promptly monitored by this tool, a convenient new complement to more complex, lengthy survey methods. In principle, searching the sewage for excreted compounds relevant to public health issues appears to have the potential to become a convenient source of real-time epidemiologic information. PMID:18709161

  14. 13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...

  15. 13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...

  16. 13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...

  17. 13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...

  18. 13 CFR 120.197 - Notifying SBA's Office of Inspector General of suspected fraud.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Inspector General of suspected fraud. 120.197 Section 120.197 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Reporting § 120.197 Notifying SBA's Office... with a 7(a) or 504 loan. Send the notification to the Assistant Inspector General for Investigations...

  19. Data integrity, reliability and fraud in medical research.

    PubMed

    Baerlocher, Mark Otto; O'Brien, Jeremy; Newton, Marshall; Gautam, Tina; Noble, Jason

    2010-02-01

    Data reliability in original research requires collective trust from the academic community. Standards exist to ensure data integrity, but these safeguards are applied non-uniformly so errors or even fraud may still exist in the literature. To examine the prevalence and consequences of data errors, data reliability safeguards and fraudulent data among medical academics. Corresponding authors of every fourth primary research paper published in the Journal of the American Medical Association (2001-2003), Canadian Medical Association Journal (2001-2003), British Medical Journal (1998-2000), and Lancet (1998-2000) were surveyed electronically. Questions focused on each author's personal experience with data reliability, data errors and data interpretation. Sixty-five percent (127/195) of corresponding authors responded. Ninety-four percent of respondents accepted full responsibility for the integrity of the last manuscript on which they were listed as co-author; however, 21% had discovered incorrect data after publication in previous manuscripts they had co-authored. Fraudulent data was discovered by 4% of respondents in their previous work. Four percent also noted 'smudged' data. Eighty-seven percent of respondents used data reliability safeguards in their last published manuscript, typically data review by multiple authors or double data entry. Twenty-one percent were involved in a paper that was submitted despite disagreement about the interpretation of the results, although the disagreeing author commonly withdrew from authorship. Data reliability remains a difficult issue in medical literature. A significant proportion of respondents did not use data reliability safeguards. Research fraud does exist in academia; however, it was not reported to be highly prevalent. Copyright 2009 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  20. Child Abuse

    MedlinePlus

    ... puts a child at risk of harm. Child abuse can be physical, sexual or emotional. Neglect, or not providing for a child's needs, is also a form of abuse. Most abused children suffer greater emotional than physical damage. An abused child may become ...

  1. Criminals in the Citadel and Deceit all along the Watchtower: Irresponsibility, Fraud, and Complicity in the Search for Scientific Truth

    PubMed Central

    Tharyan, Prathap

    2012-01-01

    Scientific research aims to use reliable methods to produce generalizable new knowledge in order to understand the human condition and maximize human potential. The sanctity accorded to scientific research has been violated by numerous instances of research fraud, as well as deceptive and conflicted research that have seriously harmed people, subverted the evidence-base, wasted valuable resources, and undermined public trust. This deception by individuals has been fostered by the unrealistic expectations of society; facilitated by the complicity of institutions and organisations; and sanctioned by the inaction of supposed gate-keepers. Re-defining misconduct as occurring on a continuum from irresponsible to fraudulent is the first step in confronting this inconvenient truth. Implementing and evaluating multiple strategies targeting systems and individuals that promote the responsible conduct of research, rather than merely exposing serious instances of misconduct by individuals, is urgently required to restore faith in the aspirations, integrity, and results of scientific research. PMID:22654391

  2. Criminals in the Citadel and Deceit all along the Watchtower: Irresponsibility, Fraud, and Complicity in the Search for Scientific Truth.

    PubMed

    Tharyan, Prathap

    2012-01-01

    Scientific research aims to use reliable methods to produce generalizable new knowledge in order to understand the human condition and maximize human potential. The sanctity accorded to scientific research has been violated by numerous instances of research fraud, as well as deceptive and conflicted research that have seriously harmed people, subverted the evidence-base, wasted valuable resources, and undermined public trust. This deception by individuals has been fostered by the unrealistic expectations of society; facilitated by the complicity of institutions and organisations; and sanctioned by the inaction of supposed gate-keepers. Re-defining misconduct as occurring on a continuum from irresponsible to fraudulent is the first step in confronting this inconvenient truth. Implementing and evaluating multiple strategies targeting systems and individuals that promote the responsible conduct of research, rather than merely exposing serious instances of misconduct by individuals, is urgently required to restore faith in the aspirations, integrity, and results of scientific research.

  3. Substance abuse associated with elder abuse in the United States.

    PubMed

    Jogerst, Gerald J; Daly, Jeanette M; Galloway, Lara J; Zheng, Shimin; Xu, Yinghui

    2012-01-01

    Substance abuse by either victim or perpetrator has long been associated with violence and abuse. Sparse research is available regarding elder abuse and its association with substance abuse. The objective of this study was to evaluate the association of state-reported domestic elder abuse with regional levels of substance abuse. Census demographic and elder abuse data were sorted into substate regions to align with the substance use treatment-planning regions for 2269 US counties. From the 2269 US counties there were 229 substate regions in which there were 213,444 investigations of abuse. For the other Ns (reports and substantiations) there were fewer counties and regions. See first sentence of data analyses and first sentence of results. Elder abuse report rates ranged from .03 to .41% (80 regions), investigation rates .001 to .34% (229 regions), and substantiation rates 0 to .22% (184 regions). Elder abuse investigations and substantiations were associated with various forms of substance abuse. Higher investigation rates were significantly associated with a higher rate of any illicit drug use in the past month, a lower median household income, lower proportion of the population graduated high school, and higher population of Hispanics. Higher substantiation rates were significantly associated with higher rate of illicit drug use in the past month and higher population of Hispanics. It may be worthwhile for administrators of violence programs to pay particular attention to substance abuse among their clients and in their community's environment, especially if older persons are involved. Measures of documented elder abuse at the county level are minimal. To be able to associate substance abuse with elder abuse is a significant finding, realizing that the substance abuse can be by the victim or the perpetrator of elder abuse.

  4. 14 CFR 60.33 - Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...

  5. 14 CFR 60.33 - Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 2 2013-01-01 2013-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...

  6. 14 CFR 60.33 - Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...

  7. 14 CFR 60.33 - Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...

  8. 14 CFR 60.33 - Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false Applications, logbooks, reports, and records: Fraud, falsification, or incorrect statements. 60.33 Section 60.33 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRMEN FLIGHT SIMULATION TRAINING DEVICE...

  9. 42 CFR 455.23 - Withholding of payments in cases of fraud or willful misrepresentation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... willful misrepresentation. 455.23 Section 455.23 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS PROGRAM INTEGRITY: MEDICAID Medicaid Agency Fraud Detection and Investigation Program § 455.23 Withholding of payments in cases of...

  10. Screening for childhood physical and sexual abuse among outpatient substance abusers.

    PubMed

    Simpson, T L; Westerberg, V S; Little, L M; Trujillo, M

    1994-01-01

    Research demonstrates that substance-abusing individuals report substantially higher rates of childhood sexual and physical abuse than the general population. This study sought to test a method of identifying substance-abusing clients with histories of childhood sexual and/or physical abuse and to explore the differences between those reporting childhood abuse and those not. Files of substance abusing clients from two distinct time periods were examined for reports of childhood abuse. At Time 1 (n = 399) clients were not systematically asked about experiences of childhood abuse, and at Time 2 (n = 305) clients were routinely asked about this issue. Results indicate that significantly more male and female clients disclosed childhood abuse at Time 2. Additionally, male clients reporting childhood abuse appeared more distressed than those not reporting abuse; female clients reporting childhood abuse did not appear more distressed than their counterparts.

  11. 20 CFR Appendix C to Part 617 - Standard for Fraud and Overpayment Detection

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... cases to test the effectiveness of the agency's procedures for the prevention of payments which are not... might, for example: (a) Investigate information on suspected benefit fraud received from any agency... records are comonly made either by post-audit or by industry surveys. The so-called “post-audit” is a...

  12. 20 CFR Appendix C to Part 617 - Standard for Fraud and Overpayment Detection

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... cases to test the effectiveness of the agency's procedures for the prevention of payments which are not... might, for example: (a) Investigate information on suspected benefit fraud received from any agency... records are comonly made either by post-audit or by industry surveys. The so-called “post-audit” is a...

  13. Investigative Operations: Use of Covert Testing to Identify Security Vulnerabilities and Fraud, Waste, and Abuse

    DTIC Science & Technology

    2007-11-14

    including evaluations of controls over radioactive materials and security at America’s borders, airport security , sales of sensitive and surplus...officers. The details of this March 2006 report are classified; however, TSA has authorized this limited discussion. Airport Security Testing Sale of...of covert security vulnerability testing of numerous airports across the country. During these covert tests, our investigators passed through airport

  14. Education Department Auditor Doesn't See Loan Abuses Retiring with Him

    ERIC Educational Resources Information Center

    Basken, Paul

    2008-01-01

    As he begins retirement this month after 40 years of federal service, the Education Department's departing inspector general, John P. Higgins Jr., sees one area that stands out for its susceptibility to costly waste and abuse. That area, Higgins said in an interview as he finished packing up his office, is student lending. Unless Congress greatly…

  15. How Program Managers Can Use Whistleblowing to Reduce Fraud Within Government Organizations

    DTIC Science & Technology

    2014-09-01

    Gates, Dean Graduate School of Business and Public Policy iv THIS PAGE INTENTIONALLY LEFT BLANK v HOW PROGRAM MANAGERS CAN USE WHISTLEBLOWING TO...16  Figure 4.  Fraud Witnessed within the Government and Private Business (after Harned, 2007...contained, and it continues to spread. The $3.7 trillion statistic above was estimated using data that was actually detected and reported. If every

  16. Association of Drug Abuse and Child Abuse.

    ERIC Educational Resources Information Center

    Jaudes, Paula Kienberger; And Others

    1995-01-01

    Children born to mothers who used illicit drugs during pregnancy were assessed for subsequent abuse or neglect. Of the 513 children exposed inutero to drugs, 102 were substantiated as abused or neglected. Infants exposed inutero to drugs had a higher than expected risk of subsequent abuse compared to children in the general population. (Author/SW)

  17. The Genesis of Pedophilia: Testing the "Abuse-to-Abuser" Hypothesis.

    ERIC Educational Resources Information Center

    Fedoroff, J. Paul; Pinkus, Shari

    1996-01-01

    This study tested three versions of the "abuse-to-abuser" hypothesis by comparing men with personal histories of sexual abuse and men without sexual abuse histories. There was a statistically non-significant trend for assaulted offenders to be more likely as adults to commit genital assaults on children. Implications for the abuse-to-abuser…

  18. 20 CFR 656.31 - Labor certification applications involving fraud, willful misrepresentation, or violations of...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... certification regulations. (b) Possible fraud or willful misrepresentation. (1) If the Department learns an... these cases, or if the Department learns an employer, attorney, or agent is under investigation by the...) Criminal indictment or information. If the Department learns that an employer, attorney, or agent is named...

  19. 20 CFR 656.31 - Labor certification applications involving fraud, willful misrepresentation, or violations of...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... certification regulations. (b) Possible fraud or willful misrepresentation. (1) If the Department learns an... these cases, or if the Department learns an employer, attorney, or agent is under investigation by the...) Criminal indictment or information. If the Department learns that an employer, attorney, or agent is named...

  20. 20 CFR 656.31 - Labor certification applications involving fraud, willful misrepresentation, or violations of...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... certification regulations. (b) Possible fraud or willful misrepresentation. (1) If the Department learns an... these cases, or if the Department learns an employer, attorney, or agent is under investigation by the...) Criminal indictment or information. If the Department learns that an employer, attorney, or agent is named...

  1. 20 CFR 656.31 - Labor certification applications involving fraud, willful misrepresentation, or violations of...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... certification regulations. (b) Possible fraud or willful misrepresentation. (1) If the Department learns an... these cases, or if the Department learns an employer, attorney, or agent is under investigation by the...) Criminal indictment or information. If the Department learns that an employer, attorney, or agent is named...

  2. College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2005

    ERIC Educational Resources Information Center

    US Department of Education, 2005

    2005-01-01

    Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…

  3. College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2006

    ERIC Educational Resources Information Center

    US Department of Education, 2006

    2006-01-01

    Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…

  4. College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2007

    ERIC Educational Resources Information Center

    US Department of Education, 2007

    2007-01-01

    Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…

  5. Abuse Characteristics and Psychiatric Consequences Associated with Online Sexual Abuse.

    PubMed

    Say, Gökçe Nur; Babadağı, Zehra; Karabekiroğlu, Koray; Yüce, Murat; Akbaş, Seher

    2015-06-01

    The current study examined the rate and psychiatric correlates of sexual abuse involving the use of digital technologies by the offender in a wide sample of juvenile victims. Sociodemographic, abuse, and psychiatric characteristics of 662 sexually abused children and adolescents were evaluated. Of these, 93 reported that digital devices were used by the offender in several ways to facilitate the sexual abuse. The offender-victim relationship was initiated through the Internet in 39 victims. Involvement of digital technologies in sexual abuse was significantly associated with penetrative and recurrent form of sexual abuse commited by multiple offenders with coexisting violence. Additionally, victims of sexual abuse with a digital component were 4.21 times more likely to develop any psychopathology, 3.77 times more likely to have depression, and 2.14 times more likely to have post-traumatic stress disorder as a result of sexual abuse. These results indicated that the offender's use of digital technology may aid the initiation and facilitation of the sexual abuse of youths and may relate to more severe outcomes. This study revealed the importance of raising the awareness of professionals and the community about the potential risks associated with digital technologies and sexual abuse. Mental health professionals should consider this additional form of victimization, especially when dealing with sexual abuse victims.

  6. Feathered Detectives: Real-Time GPS Tracking of Scavenging Gulls Pinpoints Illegal Waste Dumping

    PubMed Central

    Grémillet, David; Afán, Isabel; Ramírez, Francisco; Bouten, Willem; Forero, Manuela G.

    2016-01-01

    Urban waste impacts human and environmental health, and waste management has become one of the major challenges of humanity. Concurrently with new directives due to manage this human by-product, illegal dumping has become one of the most lucrative activities of organized crime. Beyond economic fraud, illegal waste disposal strongly enhances uncontrolled dissemination of human pathogens, pollutants and invasive species. Here, we demonstrate the potential of novel real-time GPS tracking of scavenging species to detect environmental crime. Specifically, we were able to detect illegal activities at an officially closed dump, which was visited recurrently by 5 of 19 GPS-tracked yellow-legged gulls (Larus michahellis). In comparison with conventional land-based surveys, GPS tracking allows a much wider and cost-efficient spatiotemporal coverage, even of the most hazardous sites, while GPS data accessibility through the internet enables rapid intervention. Our results suggest that multi-species guilds of feathered detectives equipped with GPS and cameras could help fight illegal dumping at continental scales. We encourage further experimental studies, to infer waste detection thresholds in gulls and other scavenging species exploiting human waste dumps. PMID:27448048

  7. Medicaid program; Medicaid Management Information Systems; conditions of approval and reapproval and procedures for reduction of Federal financial participation--HCFA. Final rule.

    PubMed

    1985-07-30

    This final rule provides the additional requirements to the conditions and procedures for initial approval and reapproval of Medicaid Management Information Systems (MMIS) that were added by section 1903(r) of the Social Security Act (as amended by section 901 of the Mental Health Systems Act of 1980, Pub. L. 96-398). These provisions are intended to improve States' MMIS, ensure efficient system operations, and make the procedures for detection of fraud, waste, and abuse more effective. In addition, this final rule specifies the procedures we follow in reducing the level of Federal financial participation in State administrative expenditures if a State fails to meet the conditions for initial operation, initial approval, or reapproval of an MMIS.

  8. Prescription Drug Abuse

    MedlinePlus

    ... drug abuse. And it's illegal, just like taking street drugs. Why Do People Abuse Prescription Drugs? Some people abuse prescription drugs ... common risk of prescription drug abuse is addiction . People who abuse ... as if they were taking street drugs. That's one reason most doctors won't ...

  9. Elder Abuse

    MedlinePlus

    ... homes. The mistreatment may be Physical, sexual, or emotional abuse Neglect or abandonment Financial abuse - stealing of money or belongings Possible signs of elder abuse include unexplained bruises, burns, and injuries. There ...

  10. A System Like No Other: Fraud and Misconduct by New York City School Custodians.

    ERIC Educational Resources Information Center

    Flamm, Suzan R.; And Others

    Findings of a study that investigated cases of fraud and misconduct in the New York City school custodial system are presented in this document. Custodial services are provided through a "quasi-independent" contractor, or an "indirect system." Although custodians are public employees, they have great independence and lack…

  11. Cognitive and emotional differences between abusive and non-abusive fathers.

    PubMed

    Francis, Karen J; Wolfe, David A

    2008-12-01

    Abusive fathers perpetrate a substantial portion of child physical abuse. Despite this, little is known about how they differ from non-abusive fathers. This study compared a broad range of cognitive and affective factors between physically abusive and non-abusive fathers. Abusive (n=24) and non-abusive (n=25) fathers completed standard measures assessing their experience and expression of anger, mental health, parenting stress, and their empathy and perceptions of children's socio-emotional signals. Abusive fathers differed from comparisons on almost all constructs. They experienced more anger and were more likely to express that anger aggressively. They reported more mental health concerns (such as depression, hostility, and paranoid ideation), more stress in parenting, and significantly less empathy for their children. They were also more likely to perceive children's emotional expressions as depicting negative emotions, such as anger and disgust. Abusive fathers struggle with a myriad of difficulties that likely contribute to their problematic parenting. These difficulties are both inter- and intra-personal in nature. The findings suggest that abusive fathers require comprehensive assessment that includes mental health screening. Interventions should be selected carefully to target abusive fathers' high levels of negative affect and negative perceptions. Treatment strategies should address problems related to parenting style (e.g., managing stress and interpretation of children's socioemotional signals) as well as their personal adjustment (e.g., cognitive behavioral strategies for regulating affect and cognitive distortions).

  12. Types of abuse and risk factors associated with elder abuse.

    PubMed

    Simone, Lacher; Wettstein, Albert; Senn, Oliver; Rosemann, Thomas; Hasler, Susann

    2016-01-01

    Detecting elder abuse is challenging because it is a taboo, and many cases remain unreported. This study aimed to identify types of elder abuse and to investigate its associated risk factors. Retrospective analyses of 903 dossiers created at an Independent Complaints Authority for Old Age in the Canton of Zurich, Switzerland, from January 1, 2008 to October 31, 2012. Characteristics of victims and perpetrators, types of abuse, and associated risk factors related to the victim or the perpetrator were assessed. Bi- and multivariate analysis were used to identify abuse and neglect determinants. A total of 150 cases reflected at least one form of elder abuse or neglect; 104 cases were categorised as abuse with at least one type of abuse (overall 135 mentions), 46 cases were categorised as neglect (active or passive). Psychological abuse was the most reported form (47%), followed by financial (35%), physical (30%) and anticonstitutional abuse (18%). In 81% of the 150 cases at least two risk factors existed. In 13% no associated risk factor could be identified. Compared with neglect, elders with abuse were less likely to be a nursing home resident than living at home (odds ratio [OR] 0.02, 95% confidence interval [CI] 0.00-0.19). In addition, they were more likely to be cohabiting with their perpetrators (OR 18.01, 95% CI 4.43-73.19). For the majority of the reported elder abuse cases at least two associated risk factors could be identified. Knowledge about these red flags and a multifaceted strategy are needed to identify and prevent elder abuse.

  13. [Nutritional status in children victims of physical and sexual abuse].

    PubMed

    Martín-Martín, Verónica; Loredo-Abdalá, Arturo

    2010-01-01

    To assess and relate the nutritional status by type of abuse in a pediatric population diagnosed with physical abuse (PA) and sexual abuse (SA). It's a retrospective, cross-sectional, descriptive study of 178 clinical records of children aged less than 12 years, attended at the Clinic for the Integral Care of the Abused Child of the Instituto Nacional de Pediatría and the Universidad Nacional Autónoma de México (CAINM-INP-UNAM), during the period 1994 to 2005. The relationship of nutritional status with the type of abuse was analyzed in two age ranges (3 months to less than five years, and five to 11 years) and gender with Student t and chi-square tests. We identified that, in girls PA was associated with stunting (PA: 48% vs. SA: 12%, p < 0.005 and PA: 21% vs. SA: 0%, p < 0.002) and wasting (PA: 21% vs. SA: 0%, p < 0.01 and PA: 21% vs. SA: 0%, p < 0.002). Whereas in girls SA was associated with overweight and obesity in age range five to 11 years (PA: 0% vs. SA: 31%; p < 0.01). This study identified acute and chronic under nutrition in girls with PA, and overweight and obesity in girls with SA. These findings enrich the knowledge for the suspicion of maltreatment child syndrome during the search of the aetiology of the clinical expression studied.

  14. An Educational Program to Assist Clinicians in Identifying Elder Investment Fraud and Financial Exploitation

    ERIC Educational Resources Information Center

    Mills, Whitney L.; Roush, Robert E.; Moye, Jennifer; Kunik, Mark E.; Wilson, Nancy L.; Taffet, George E.; Naik, Aanand D.

    2012-01-01

    Due to age-related factors and illnesses, older adults may become vulnerable to elder investment fraud and financial exploitation (EIFFE). The authors describe the development and preliminary evaluation of an educational program to raise awareness and assist clinicians in identifying older adults at risk. Participants (n = 127) gave high ratings…

  15. Perceptions of Biometric Experts on Whether or Not Biometric Modalities Will Combat Identity Fraud

    ERIC Educational Resources Information Center

    Edo, Galaxy Samson

    2012-01-01

    Electronic-authentication methods, no matter how sophisticated they are in preventing fraud, must be able to identify people to a reasonable degree of certainty before any credentials are assured (Personix, 2006). User authentication is different from identity verification, and both are separate but vital steps in the process of securing…

  16. Adolescent Abuse.

    ERIC Educational Resources Information Center

    Foreman, Susan; Seligman, Linda

    1983-01-01

    Discusses legal and developmental aspects of adolescent abuse, as distinguished from child abuse. The role of the school counselor in identifying and counseling abused adolescents and their families is discussed and several forms of intervention and support services are described. (JAC)

  17. Drug Abuse

    MedlinePlus

    ... drugs, including opioids Drug abuse also plays a role in many major social problems, such as drugged driving, violence, stress, and child abuse. Drug abuse can lead to homelessness, crime, and missed work or problems with keeping a job. It harms ...

  18. Neural fraud detection in credit card operations.

    PubMed

    Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S

    1997-01-01

    This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.

  19. Psychiatric Disorders of Children Living with Drug-Abusing, Alcohol-Abusing, and Non-Substance-Abusing Fathers.

    ERIC Educational Resources Information Center

    Kelley, Michelle L.; Fals-Stewart, William

    2004-01-01

    Objective: The present study examined lifetime psychiatric disorders and current emotional and behavioral problems of 8- to 12-year-old children living with drug-abusing (DA) fathers compared to children living in demographically matched homes with alcohol-abusing (AA) or non-substance-abusing fathers. Method: Children's lifetime psychiatric…

  20. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    DTIC Science & Technology

    2017-03-01

    representative said that they felt they needed to provide their customers with some benefit and offered the services to give their customers peace of...satisfaction or reassurance. Some companies told us that they offered free identity theft services to give their customers peace of mind or provide...IDENTITY THEFT SERVICES Services Offer Some Benefits but Are Limited in Preventing Fraud Report to Congressional

  1. WNP-2, securities fraud investigation are fired up

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1984-03-01

    Washington's WNP-2 nuclear plant faces a securities fraud investigation just as it is ready to start operating on schedule. The investigation's outcome and WNP-2's performance will determine whether WNP-1 and WNP-3 will be financed. Angry bondholders who did not receive interest on their investments in January prompted Congressional hearings, at which it was learned that institutional buyers had pulled out of the Washington Public Power Supply System project and unloaded the bonds on thousands of unsuspecting individuals for whom tax-free municipal bonds are inappropriate. Securities Exchange Commission investigators will focus on the initial offering and disclosure by the issuer tomore » determine if the Wall Street unloading was legal. (DCK)« less

  2. Government Increases Reliance on Universities to Detect and Probe Fraud by Own Researchers; Critics Are Wary.

    ERIC Educational Resources Information Center

    Wheeler, David L.

    1987-01-01

    University administrators are expected by federal agencies to detect, investigate, and judge scientific fraud and misconduct on their campuses. Both National Science Foundation and National Institutes of Health place primary responsibility on universities for spotting cases of scientific misconduct. (MLW)

  3. Identifying Procurement Fraud in Defense Agencies: An Analysis of the Government Purchase Card Program

    DTIC Science & Technology

    2011-04-30

    fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase

  4. College Scholarship Fraud Prevention Act of 2000: Second Annual Report to Congress. May 2003

    ERIC Educational Resources Information Center

    US Department of Education, 2003

    2003-01-01

    Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…

  5. Sexual abuses.

    PubMed

    Abel, G G; Rouleau, J L

    1995-03-01

    The sexual abuses described in this article are occurring so frequently that they constitute a public health problem. Superficially they appear to be quite dissimilar because they involve individuals of different ages, different settings, and different power relationships. Basic to each of them, however, is an absence of consent by the victim and the misuse of power by the perpetrator in order to accomplish the abuse. We now have an adequate understanding of each of these abuses and it is now time to make a concerted effort to stop these abuses. This will require the combined efforts of the education of the public, improved identification of the abuses, treatment of the victims, and an appropriate criminal justice response combined with treatment of the perpetrator.

  6. Spouse Abuse, Child Abuse, and Substance Abuse Among Army Facilities: Co-Occurrence, Correlations and Service Delivery Issues

    DTIC Science & Technology

    2006-03-01

    refer spouse abuse or child abuse offenders with identified alcohol or other drug involvement to the on-base counseling center for a substance...abuse assessment. The military’s response to combat substance abuse involves a combination of education, prevention, random testing for illicit drug ...data from three Army sources: the Army Central Registry (ACR), the Drug and Alcohol Management Information System (DAMIS), and Army personnel data

  7. Interventional pain management at crossroads: the perfect storm brewing for a new decade of challenges.

    PubMed

    Manchikanti, Laxmaiah; Singh, Vijay; Boswell, Mark V

    2010-01-01

    The health care industry in general and care of chronic pain in particular are described as recession-proof. However, a perfect storm with a confluence of many factors and events -none of which alone is particularly devastating - is brewing and may create a catastrophic force, even in a small specialty such as interventional pain management. Multiple challenges related to interventional pain management in the current decade will include individual and group physicians, office practices, ambulatory surgery centers (ASCs), and hospital outpatient departments (HOPD). Rising health care costs are discussed on a daily basis in the United States. The critics have claimed that health outcomes are the same as or worse than those in other countries, but others have presented the evidence that the United States has the best health care system. All agree it is essential to reduce costs. Numerous factors contribute to increasing health care costs. They include administrative costs, waste, abuse, and fraud. It has been claimed the U.S. health care system wastes up to $800 billion a year. Of this, fraud accounts for approximately $200 billion a year, involving fraudulent Medicare claims, kickbacks for referrals for unnecessary services, and other scams. Administrative inefficiency and redundant paperwork accounts for 18% of health care waste, whereas medical mistakes account for $50 billion to $100 billion in unnecessary spending each year, or 11% of the total. Further, American physicians spend nearly 8 hours per week on paperwork and employ 1.66 clerical workers per doctor, more than any other country. It has been illustrated that it takes $60,000 to $88,000 per physician per year, equal to one-third of a family practitioner's gross income, and $23 to $31 billion each year in total to interact with health insurance plans. The studies have illustrated that an average physician spends $68,274 per year communicating with insurance companies and performing other non

  8. 7 CFR 3565.505 - Liability.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... GUARANTEED RURAL RENTAL HOUSING PROGRAM Agency Guaranteed Loans That Back Ginnie Mae Guaranteed Securities... limited to, negligence, fraud, abuse, misrepresentation or misuse of funds, property condition, or...

  9. Substance abuse as a symptom of childhood sexual abuse.

    PubMed

    Teusch, R

    2001-11-01

    The recovery process of a 37-year-old woman with adult onset posttraumatic stress disorder (PTSD) is presented. The patient had suffered childhood sexual abuse and had self-medicated for many years with drugs and alcohol to maintain the dissociation of memories of abuse and to facilitate interpersonal functioning. Upon onset of PTSD, the patient's substance abuse became a full-blown addiction that was highly resistant to treatment. It became evident that her substance abuse symbolically repeated her traumatization. In reexperiencing the affects associated with her earlier trauma (despair, denial, shame, and helplessness) as part of her substance abuse and in the transference, the patient was able to gain mastery over these affects and, subsequently, was able to achieve a stable recovery from both illnesses.

  10. Other Drugs of Abuse

    MedlinePlus

    ... People Abuse » Other Drugs of Abuse Other Drugs of Abuse Listen There are many other drugs of abuse, ... and Rehab Resources About the National Institute on Drug Abuse (NIDA) | About This Website Tools and Resources | Contact ...

  11. Self-Esteem and Attitudes toward Love in Abused and Non-Abused Women.

    ERIC Educational Resources Information Center

    Chambliss, Catherine; And Others

    This study sought to identify personality differences in abused versus non-abused women. Abused women (N=25) were from several centers for abused women and non-abused women (N=39) were students in evening psychology classes. All subjects completed Rubin's Love Scale, the abbreviated Dominance and Romanticism Scale, Rosenberg's Self-Esteem Scale,…

  12. Frauds, Hoaxes, Myths, and Chain Letters: or, What's This Doing in My E-Mail Box?

    ERIC Educational Resources Information Center

    Ebbinghouse, Carol

    1998-01-01

    Looks at the equivalent of junk mail on the Internet, including hoaxes, myths and urban legends, frauds, chain letters, and spam. Sidebars include "False Flaming of the FCC" (Barbara Quint) and a list of Web sites useful for determining the legitimacy of questionable mailings and for eliminating unwanted solicitations. (JAK)

  13. Fraud, Waste, and Abuse and Contingency Contracts: A Critical Assessment of DoD and Army Processes

    DTIC Science & Technology

    2011-12-16

    corporations included Kellogg, Brown and Root (KBR), Blackwater , Halliburton and others that quickly augmented military forces in the more lengthy conflicts...through the Assistant Secretary of Defense. It is made up of 32 members and chairmen from the Army, Air Force, Navy , as well as chairmen from the

  14. Financial Crisis; Department of Defense Spending: How to Control Fraud, Waste, and Abuse in the Military

    DTIC Science & Technology

    2012-04-25

    problem that continues to cost billions of dollars in losses at a time when the United States Military and Federal Government can least afford it. It...to look like. The federal budget has become the leading issue affecting every Government Agency. The military’s budget is decreasing by more than...discuss the cost savings measures and initiatives currently being debated in Washington, and offer, for debate, several new recommendations that have

  15. Hidden Abuse within the Home: Recognizing and Responding to Sibling Abuse

    ERIC Educational Resources Information Center

    Stutey, Diane; Clemens, Elysia V.

    2015-01-01

    Sibling abuse is a serious phenomenon in our society that often goes unaddressed. Victims of sibling abuse experience psychological effects similar to those of child abuse (Caspi, 2012; Wiehe, 2002). The purpose of this article is to provide school counselors with a definition of sibling abuse and a five-step model to recognize and respond. A…

  16. Medicare and Medicaid fraud and abuse regulations.

    PubMed

    Liang, F Z; Black, B L

    1991-11-01

    Specific business arrangements that are protected under legislation and regulations governing parties doing business with Medicare or Medicaid are discussed. Regulations implementing the Medicare and Medicaid Patient Protection Act of 1987 specify practices and activities that are not subject to criminal penalties under the antikickback provisions of the Social Security Act or to exclusion from Medicare or state health-care programs. As of July 29, 1991, all organized health-care settings that receive payments from either Medicare or state health-care programs must comply with these regulations. The final rule sets forth "safe harbors"--exceptions to prohibitions against (1) kickbacks, bribes, rebates, and other illegal activities involving remunerations for patient referrals and (2) inducements to purchase or lease goods paid for by Medicare or state health-care programs. The safe harbors comprise 11 broad categories--investment interests, space rental, equipment rental, personal services and management contracts, purchase of a medical practice, referral services, warranties, discounts, employees, group purchasing organizations, and waiver of deductibles and coinsurance. Implications for pharmacy are discussed. These regulations will affect the purchase of pharmaceuticals by institutional pharmacies. Each institution should review its current practices to determine whether they are within the safe harbors.

  17. Medicaid program; Medicaid Management Information Systems; conditions of approval and reapproval and procedures for reduction of federal financial participation--Health Care Financing Administration. Proposed rule.

    PubMed

    1983-03-03

    This proposal adds to regulations new conditions and procedures for initial approval and for reapproval of Medicaid Management Information Systems (MMIS) to update the regulations to reflect additional requirements added by section 901 of the Mental Health Systems Act of 1980 (Pub. L. 96-398). The proposal specifies procedures for reducing the level of Federal financial participation in a State's administrative expenditures when a State fails to meet the conditions for initial operation, initial approval or reapproval of an MMIS. It also proposes procedures with respect to waivers of the conditions of approval and reapproval and to appeals of adverse decisions. These provisions are intended to improve States' MMIS, and to ensure efficient system operations, and to detect cases of fraud, waste, and abuse effectively.

  18. 75 FR 37287 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-29

    ...The Recovery Accountability and Transparency Board (Board) amends its regulations implementing the Privacy Act of 1974 (Privacy Act), Public Law 93-579, 5 U.S.C. 552a. This final rule adds 4 CFR 200.17 to exempt certain systems of records from certain sections of the Privacy Act (5 U.S.C. 552a) pursuant to 5 U.S.C. 552a(j) and (k). These exemptions will help ensure that the Board may efficiently and effectively compile investigatory material to prevent and detect fraud, waste, and abuse and perform its other authorized duties and activities relating to oversight of funds awarded pursuant to the American Recovery and Reinvestment Act of 2009, Public Law 111-5 (Feb. 17, 2009) (Recovery Act).

  19. Identifying procurement Fraud In Defense Agencies: An Analysis Of The Government Purchase Card Program

    DTIC Science & Technology

    2011-04-18

    Treadway Commission ( Whittington & Pany, 2012). Furthermore, the Chief Finanical Officers Act (1990) noted that billions of dollars were being lost...The components of the internal control framework include the following ( Whittington & Pany, 2012): 1. The Control Environment, 2. Risk Assessment...approaches to fraud deterrence. Journal of Accountancy, 197(2), 72–76. Whittington , O. R., & Pany, K. (2012). Principles of auditing and other

  20. Abuse Is Abuse: The Influence of Type of Abuse, Victim Age, and Defendant Age on Juror Decision Making.

    PubMed

    Sheahan, Chelsea L; Pica, Emily; Pozzulo, Joanna D

    2017-09-01

    The purpose of the current study was to examine the role of victim age, defendant age, and type of abuse on mock juror decision making. Mock jurors ( N = 556) read a trial transcript in which a soccer coach was accused of sexual abuse or physical abuse against a player. The victim's age (child, adolescent, or young adult), the defendant's age (young, middle age, or older adult), and the type of abuse (sexual or physical) were varied. Mock jurors provided a dichotomous and continuous verdict and rated their perceptions of the victim and the defendant. Although no differences on mock jurors' dichotomous verdict were found due to victim age, defendant age, or type of abuse, mock jurors provided higher guilt ratings when the abuse was sexual and both the victim and defendant were described as young adults. Similarly, mock jurors rated the victim more positively when the victim was described as a young adult (vs. child) for both sexual and physical abuse cases, and rated the defendant more positively when the victim was described as a child compared with young adult in sexual abuse cases. These findings suggest that mock jurors were largely influenced by victim age, particularly when the victim was described as an adult compared with a child.

  1. The management of abuse: 2. Child abuse.

    PubMed

    Panesear, Jaspel; Sinha, Karen Juggins Sonia; Acharya, Preeti; Jafar, Hima; Bower, Elizabeth J; Harrison, Victoria E; Newton, J Tim

    2006-09-01

    The role of the GDP and the dental team in the recognition and management of child abuse is discussed. Information on the current legislation and protocols for referral are provided. This paper discusses child abuse and offers information and practical advice for the dental team.

  2. [Child psychiatric assessment and the debate regarding the abuse of abuse].

    PubMed

    Fegert, J M

    1995-03-01

    The current discussion on false allegations in sexual abuse cases has led to a polarization in the views expressed about the credibility of children. Some authors even speak of a "child sexual accuse syndrome" or of a "sexual abuse allegation in divorce" (SAID) syndrome. A phenomenological analysis of the multiple reasons for misinterpretations is presented. Instead of stressing the importance only of false positives in child sexual abuse questions, an attempt is made to describe reasons for false negatives. Based on a retrospective analysis of 50 consecutive child psychiatric experts in connection with court cases, there does not appear to be an increase in false accusations. Rather, only about one third of the cases even involved suspected sexual abuse. Sexual abuse allegations were much more frequent in girls than in boys. Of 20 abuse allegations we judge four to be false allegations. In only one of these cases, that of an adolescent girl who had been abused in childhood, was the false allegation intended.

  3. Alcohol abuse as a risk factor for and consequence of child abuse.

    PubMed

    Widom, C S; Hiller-Sturmhöfel, S

    2001-01-01

    The relationship between child abuse and the use or abuse of alcohol has two aspects. First, some findings have indicated that parental alcohol abuse may be associated with the physical or sexual abuse of children. Research findings in this area remain inconsistent, however. Second, the experience of being abused as a child may increase a person's risk for alcohol-related problems as an adult. This relationship has best been demonstrated in women who had been victims of childhood abuse. Several factors most likely contribute to or influence this relationship, including coping skills; antisocial behavior; and psychological problems, such as posttraumatic stress disorder.

  4. Child Sexual Abuse

    MedlinePlus

    Sexual abuse is one form of child abuse. It includes a wide range of actions between a child ... to children or pressuring them for sex is sexual abuse. Using a child for pornography is also sexual ...

  5. Child Sexual Abuse

    MedlinePlus

    ... No child is prepared to cope with repeated sexual stimulation. Even a two or three year old, who ... abuse. Some signs can only be detected on physical exam by a physician. Sexual abuse can also include noncontact abuse, such as ...

  6. Sexual maturation and control issues among sexually abused and non-abused anorexia patients.

    PubMed

    Walsh, J; Burns, F

    2000-09-01

    To assess the relative salience of the maintenance of control and the avoidance of sexual maturation as sources of motivation for maintaining pathological eating behaviours among sexually abused anorexic patients. A two-factor mixed experimental design was employed. Three independent groups (sexually abused anorexics (N = 12); non-abused anorexics (N = 9); non-anorexic/non-abused controls (N = 12)) constituted the between-subjects factor. Allocation to abuse/non-abuse group was dependent upon replies to a questionnaire-based measure of unwanted sexual experience. The within-subjects factor comprised three conditions in which words of various colours were presented to participants for colour-naming (Stroop, 1935). The conditions were represented by lists of neutral words, sexual maturation words, and control-related words. Two trials were carried out in each condition and mean response times were measured. Within-group analyses revealed that interference was greater from sexual maturation words than from control-related words among the sexually-abused anorexics, but of equal magnitude among non-abused counterparts. Between-groups analyses found that abused patients experienced marginally greater cognitive interference from sexual maturation words than the non-abused patients. Theoretically, support is offered for elaborated schematic models of cognitive processing. Clinically, treatment interventions may need to pay particular attention to issues of sexual maturation among sexually abused anorexic patients.

  7. The complexities of elder abuse.

    PubMed

    Roberto, Karen A

    2016-01-01

    Elder abuse is a growing societal concern, affecting at least 1 in 10 older Americans. Researchers and practitioners alike consistently assert that a dramatic discrepancy exists between the prevalence rates of elder abuse and the number of elder abuse cases reported. As a field of study, recognition and understanding of elder abuse is still emerging. Comparing findings of a small, but growing, body of literature on perceived and substantiated cases of elder abuse is challenging because there is no uniform term or agreed-upon definition used among state governments, researchers, health care and service providers, and advocates. This article summarizes current understanding of elder abuse, including what constitutes elder abuse, risk factors for elder abuse, perpetrators of elder abuse, and outcomes of elder abuse. Issues associated with the detection of elder abuse and intervention strategies for victims of abuse are addressed. In the final section, potential roles and contributions of psychologists for advancing elder abuse research, professional practice, and policy development are highlighted. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  8. Psychological abuse, substance abuse distress, dissatisfaction with friendships, and incident psychiatric problems.

    PubMed

    Sheikh, Mashhood Ahmed

    2018-05-01

    The aim of this study was to assess the mediating role of dissatisfaction with friendships in adulthood in the associations between psychological abuse in childhood, substance abuse distress in childhood, and incident psychiatric problems (IPPs) in adulthood over 13 years of follow-up. We used data collected from 1994 to 2008 within the framework of the Tromsø Study (N = 9502), a representative, longitudinal, prospective cohort study. Poisson regression analysis was used to assess the associations between psychological abuse, substance abuse distress, dissatisfaction with friendships in adulthood, and IPPs in adulthood. Indirect effects and proportion mediated (%) were assessed with the difference-in-coefficients method. Psychological abuse (relative risk [RR] = 1.66, 95% confidence interval [CI]: 1.45-1.89) and substance abuse distress in childhood (RR = 1.38, 95% CI: 1.18-1.62) were associated with an increased risk of dissatisfaction with friendships in adulthood. Dissatisfaction with friendships in adulthood was associated with an increased risk of IPPs in adulthood (RR = 1.71, 95% CI: 1.33-2.20). Moreover, dissatisfaction with friendships in adulthood mediated 9.31% (95% CI: 4.25-14.57) of the association between psychological abuse in childhood and IPPs in adulthood, and 9.17% (95% CI: 4.35-16.33) of the association between substance abuse distress in childhood and IPPs in adulthood. Dissatisfaction with friendships in adulthood mediates a minor proportion of the associations between psychological abuse, substance abuse distress, and IPPs in adulthood. Interventions aimed at decreasing dissatisfaction with friendships may dampen some of the effect of psychological abuse and substance abuse distress in childhood on IPPs in adulthood. Copyright © 2018 Elsevier Inc. All rights reserved.

  9. 45 CFR 30.3 - Antitrust, fraud, exception in the account of an accountable official, and interagency claims...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... accountable official, and interagency claims excluded. 30.3 Section 30.3 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CLAIMS COLLECTION General Provisions § 30.3 Antitrust, fraud, exception in the account of an accountable official, and interagency claims excluded. (a) Claims involving...

  10. Alienation and Domestic Abuse: How Abused Women Cope with Loneliness

    ERIC Educational Resources Information Center

    Arokach, Ami

    2006-01-01

    This study explored the manner in which abused women cope with loneliness. Eighty women, victims of domestic abuse, were compared to 84 women from the general population who have had no history of abusive relationships. A 34-item yes/no loneliness questionnaire was utilized in order to compare the "beneficial" ways of coping with loneliness in the…

  11. Alaska Department of Law

    Science.gov Websites

    Attorney General Opinions Executive Branch Ethics Criminal Justice Alaska Medicaid Fraud Control Anchorage Abuse Executive Branch Ethics Law Resources Public Safety Action Plan Federal Issues and Conflicts - PDF

  12. [Prevalence of sexual abuse in students and its relation with drug abuse].

    PubMed

    Ramos-Lira, L; Saldívar-Hernández, G; Medina-Mora, M E; Rojas-Guiot, E; Villatoro-Velázquez, J

    1998-01-01

    To determine the prevalence of sexual abuse among high school (secondary and preparatory) students, male and female, throughout Mexico, and its relationship with drug abuse. Data were obtained from the National Survey of Drug Use in Schools applied in November and December, 1991. A total of 61,779 students, 51.8% men and 47.1% women, with a mean age of 14.4 years completed the self-applied questionnaire. Sexual abuse was explored from the perspective of the abusers and of the victims. The prevalence of sexual abuse in adolescent victims was 4.3% and no statistically significant differences were found between sexes. The prevalence of sexual aggressors was 2.5%. Men coerced someone else in a higher proportion than women. Adolescent women experienced sexual abuse at a younger age than men and they also reported a higher percentage of intrafamily abuse. Men reported friends as the most frequent aggressors. Victims and aggressors of both sexes reported a significantly higher drug consumption than students without these antecedents. The differences in the experience of sexual abuse between men and women are described. In particular, the fact that sexual abuse in men mainly occurs outside the family sphere, while in women it is mainly within the family and at a younger age than in men. Additionally, the need for further research focusing on the consequences on mental health of infantile and adolescent sexual abuse and drug consumption is emphasized, considering the characteristics of each gender.

  13. Elder Abuse among African Americans

    ERIC Educational Resources Information Center

    Tauriac, Jesse J.; Scruggs, Natoschia

    2006-01-01

    Perceptions of extreme, moderate, and mild forms of elder abuse among African-American women (n=25) and men (n=10) were examined. African-American respondents emphasized physical abuse when giving examples of extremely abusive behavior. Along with physical abuse, verbal abuse was the most frequently identified form of abuse, and was significantly…

  14. Childhood sexual abuse and substance abuse treatment utilization among substance-dependent incarcerated women.

    PubMed

    Peltan, Jessica R; Cellucci, Tony

    2011-10-01

    Incarcerated women have high rates of substance abuse problems and trauma. A variety of variables may influence whether these women seek help or are referred for substance abuse problems. This study reports an exploratory project on service utilization among incarcerated substance-dependent women (N = 40) in southeastern Idaho. Using self-report and interview tools, most participants reported some substance abuse treatment history, although extent and types of treatment varied. Most of the women also reported some type of childhood abuse. Age, income, and consequences of alcohol and other drug use related positively to substance abuse treatment. However, severity of childhood sexual abuse and current trauma symptoms were negatively correlated with substance abuse treatment episodes. These women may use substances to cope with childhood trauma or may not perceive the substance abuse system as responsive to their co-occurring trauma symptoms. Copyright © 2011 Elsevier Inc. All rights reserved.

  15. 26 CFR 1.6664-1 - Accuracy-related and fraud penalties; definitions, effective date and special rules.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Additions to the Tax... definition of “underpayment” of income taxes imposed under subtitle A is set forth in § 1.6664-2. Ordering rules for computing the total amount of accuracy-related and fraud penalties imposed with respect to a...

  16. 17 CFR 39.7 - Fraud in connection with the clearing of transactions on a derivatives clearing organization.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... clearing of transactions on a derivatives clearing organization. 39.7 Section 39.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.7 Fraud in connection with the clearing of transactions on a derivatives clearing organization. It shall be unlawful for any...

  17. 3 CFR 13519 - Executive Order 13519 of November 17, 2009. Establishment of the Financial Fraud Enforcement Task...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...; (m) the Federal Housing Finance Agency; (n) the Office of Thrift Supervision; (o) the Office of the... outreach with representatives of financial institutions, corporate entities, nonprofit organizations, State... Corporate Fraud Task Force created by Executive Order 13271 of July 9, 2002. Executive Order 13271 is hereby...

  18. Exploring the controversy in child abuse pediatrics and false accusations of abuse.

    PubMed

    Gabaeff, Steven C

    2016-01-01

    There is a controversy in child abuse pediatrics between an established corps of child abuse pediatricians aligned with hospital colleagues and law enforcement, and a multi-specialty challenger group of doctors and other medical professionals working with public interest lawyers. The latter group questions the scientific validity of the core beliefs of child abuse pediatricians and believes that there are a substantial number of false accusations of abuse occurring. An unproven primary hypothesis, crafted around 1975 by a small group of pediatricians with an interest in child abuse, lies at the foundation of child abuse pediatrics. With no scientific study, it was hypothesized that subdural hemorrhage (SDH) and retinal hemorrhage (RH) were diagnostic of shaking abuse. That hypothesis became the so-called "shaken baby syndrome." Through the period 1975-1985, in a coordinated manner, these child abuse specialists coalesced under the American Academy of Pediatrics and began working with district attorneys and social workers, informing them of the ways in which their hypothesis could be applied to prosecutions of child abuse and life-altering social service interventions. In a legal context, using then-prevailing evidentiary rules which treated scientific expert testimony as valid if it was "generally accepted" in the field, they represented falsely that there was general acceptance of their hypothesis and therefore it was valid science. As the ability to convict based on this unproven prime hypothesis (SDH and RH equals abuse) increased, some defense attorneys were professionally compelled by their own doubts to reach out to experts from other fields with experience with SDH and RH, trauma, and biomechanics, for second opinions. Medical and legal challenges to the established thinking soon emerged, based on both old and new evidenced-based literature. As the intensity of the controversy increased, the probability of false accusation became more apparent and the need

  19. Elder physical abuse.

    PubMed

    Young, Lisa M

    2014-11-01

    Physical abuse of the elderly is a significant public health concern. The true prevalence of all types is unknown, and under-reporting is known to be significant. The geriatric population is projected to increase dramatically over the next 10 years, and the number of abused individuals is projected to increase also. It is critical that health care providers feel competent in addressing physical elder abuse. This article presents cases illustrating the variety of presenting symptoms that may be attributed to physical elder abuse. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Establishing "abuse-deterrence equivalence" for generic abuse-deterrent opioid formulations: A proposed development framework.

    PubMed

    Setnik, Beatrice; Cone, Edward J

    2016-01-01

    Abuse-deterrent formulations are one strategy for mitigating the epidemic of prescription opioid abuse. Regulatory guidance documents describe the requirements for developing abuse-deterrent formulations of novel drugs and formulations; however, they do not address "abuse-deterrence equivalence" for generic formulations. As generics may be produced with different excipients and formulations compared to reference drugs, differences in their properties may impact their abuse-deterrent features. Currently, it is unclear what specific studies are needed to support generic abuse-deterrence claims. This commentary outlines several recommendations on the in vitro and in vivo testing required, including the conditions for conducting a human abuse potential study.

  1. Measuring Economic Abuse in the Lives of Survivors: Revising the Scale of Economic Abuse.

    PubMed

    Postmus, Judy L; Plummer, Sara-Beth; Stylianou, Amanda M

    2016-05-01

    Recent attention has been given by researchers to understanding how abusers use economic abuse strategies. Unfortunately, limited measures are available to accurately understand the prevalence of economic abuse in the lives of survivors. Recently, researchers created the 28-item Scale of Economic Abuse (SEA) but further validation is needed. This article describes the psychometric evaluation of the SEA through confirmatory and exploratory factor analyses using data collected with 120 survivors of abuse. The findings provide evidence for the reliability and validity of the SEA-12 as a shorter instrument to measure economic abuse as a distinct form of abuse. © The Author(s) 2015.

  2. 76 FR 13327 - Defense Federal Acquisition Regulation Supplement; Display of DoD Inspector General Fraud Hotline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-11

    ... Posters (DFARS Case 2010-D026) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to require contractors to display the DoD fraud hotline poster in common work... providing a DFARS clause to use in lieu of the FAR clause 52.203-14, Display of Hotline Poster(s). GAO...

  3. Parent Abuse: A Review

    ERIC Educational Resources Information Center

    Kennair, Nicola; Mellor, David

    2007-01-01

    A recent focus of research and clinical practice has been on the issue of abuse of parents by their children (parent abuse). This paper reviews the literature on this phenomenon. While parent abuse falls under the umbrella of family violence, it appears to be qualitatively different from other forms of intra-family abuse. Research has primarily…

  4. 42 CFR 438.1 - Basis and scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... strategy; (v) Specifies certain prohibitions aimed at the prevention of fraud and abuse; (vi) Provides that... depending on the type of entity and on the authority under which the State contracts with the entity...

  5. 42 CFR 438.1 - Basis and scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... strategy; (v) Specifies certain prohibitions aimed at the prevention of fraud and abuse; (vi) Provides that... depending on the type of entity and on the authority under which the State contracts with the entity...

  6. Children and End-State Renal Disease (ERSD)

    MedlinePlus

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... last 3 years by working and paying Social Security taxes. You (or your spouse) are getting, or ...

  7. Science ethics education part II: changes in attitude toward scientific fraud among medical researchers after a short course in science ethics.

    PubMed

    Vuckovic-Dekic, L; Gavrilovic, D; Kezic, I; Bogdanovic, G; Brkic, S

    2012-01-01

    To determine the impact of the short science ethics courses on the knowledge of basic principles of responsible conduct of research (RCR), and on the attitude toward scientific fraud among young biomedical researchers. A total of 361 attendees of the course on science ethics answered a specially designed anonymous multiple- choice questionnaire before and after a one-day course in science ethics. The educational course consisted of 10 lectures: 1) Good scientific practice - basic principles; 2) Publication ethics; 3) Scientific fraud - fabrication, falsification, plagiarism; 4) Conflict of interests; 5) Underpublishing; 6) Mentorship; 7) Authorship; 8) Coauthorship; 9) False authorship; 10) Good scientific practice - ethical codex of science. In comparison to their answers before the course, a significantly higher (p<0.001) number of students qualified their knowledge of science ethics as sufficient after the course was completed. That the wrongdoers deserve severe punishment for all types of scientific fraud, including false authorship, thought significantly (p<0.001) more attendees than before the course, while notably fewer attendees (p<0.001) would give or accept undeserved authorship Even a short course in science ethics had a great impact on the attendees, enlarging their knowledge of responsible conduct of research and changing their previous, somewhat opportunistic, behavior regarding the reluctance to react publicly and punish the wrongdoers.

  8. The Abuse-Related Beliefs Questionnaire for Survivors of Childhood Sexual Abuse

    ERIC Educational Resources Information Center

    Ginzburg, Karni; Arnow, Bruce; Hart, Stacey; Gardner, William; Koopman, Cheryl; Classen, Catherine C.; Giese-Davis, Janine; Spiegel, David

    2006-01-01

    Objective: To evaluate the psychometric properties of a new measure, the Abuse-Related Beliefs Questionnaire (ARBQ), designed to assess abuse-related beliefs among adult survivors of childhood sexual abuse (CSA). Study 1 examined the structure of the scale, and Study 2 evaluated its reliability and validity. Method: One hundred and seventy female…

  9. [The management of errors and scientific fraud by biomedical journals: They cannot replace Institutions].

    PubMed

    Maisonneuve, Hervé

    2012-09-01

    Research integrity is not negotiable, but we regularly observe research misconduct, and journals are victims or guilty. Journals do not have the objective to assess research integrity: that's the Institutions' roles. Journals discover research misconduct when articles are reviewed (an editor or a reviewer detect signals), or after the article's publication when a reader or a whistleblower call the journal. The editors and reviewers' research misconduct are less described and not publicized in the medias. The peer-review system is criticised. If authors were fair-play, and reviews well done, the journals should not publish articles containing false data. The opponents to the peer-review system propose no alternatives to replace it. The anonymous peer reviews are questioned: it has never been proved that quality of anonymous reading was better than quality of open reading. The Open Access facilitated the creation of many journals. Some journals are excellent and got an impact factor; most journals have a poor quality and don't follow the publications ethics standards. When errors and fraud are identified, journals can publish 3 statements: erratum for errors, expression of concern for errors or fraud when evidence is not established, and retraction when evidence is obvious. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  10. Corporate compliance: critical to organizational success.

    PubMed

    Cantone, L

    1999-01-01

    Operation Restore Trust (ORT) has focused increased governmental attention on health care fraud and abuse activities, making it more costly to be noncompliant, and thus has led to significant behavioral changes within the health care industry. Initially five states (California, Florida, Illinois, New York, & Texas) were included in the 1997 ORT pilot program. This has been expanded to include Arizona, Colorado, Georgia, Louisiana, Massachusetts, Missouri, New Jersey, Ohio, Pennsylvania, Tennessee, Virginia, and Washington. The author presents a road map for developing of a compliance program that includes suggested strategies for staff training in anticipation of heightened scrutiny of compliance standards and procedures. Effective Corporate Compliance Programs (CCPs) should include policies and procedures and monitoring systems that can provide reasonable assurance that fraud, abuse, and systematic billing errors are detected in a timely manner.

  11. Neglected child with substance abuse leading to child abuse: a case report.

    PubMed

    Subramanian, E M G; Subhagya, B; Muthu, M S; Sivakumar, N

    2005-06-01

    Child abuse and neglect is any interaction or lack of interaction between a caregiver and a child resulting in nonaccidental harm to the child's physical and developmental state. Substance abuse is ingestion of any drug, which is capable of altering the mental functioning eventually leading to addiction. This paper presents a case report of a 12-year-old neglected girl with substance abuse for which she was physically abused by her mother.

  12. [Fraud in the health-care system from the perspective of the public health insurance companies. Empirical findings on the work of anti-fraud agencies].

    PubMed

    Meier, B D; Homann, D

    2010-07-01

    The article summarises the results of a study on the activities of the German public health insurance companies to fight fraudulent behaviour in the system. The study is based on the analysis of 140 activity reports of the years 2004 and 2005 which the companies had to deliver to the Federal Social Insurance Authority as well as on the results of an additional survey. The article deals with the number of cases, the phenomenology of the delinquent acts, the referral of the suspicious cases to the law enforcement agencies, and the cooperation with other insurance companies. Finally, the article presents some considerations on an improved prevention of fraud in the public health care system. Copyright Georg Thieme Verlag KG Stuttgart . New York.

  13. Medicare

    MedlinePlus

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... the U.S. Centers for Medicare & Medicaid Services. 7500 Security Boulevard, Baltimore, MD 21244 Sign Up / Change Plans ...

  14. A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases

    ERIC Educational Resources Information Center

    Humpherys, Sean LaMarc

    2010-01-01

    Given the increasing problem of fraud, crime, and national security threats, assessing credibility is a recurring research topic in Information Systems and in other disciplines. Decision support systems can help. But the success of the system depends on reliable cues that can distinguish deceptive/truthful behavior and on a proven classification…

  15. Wife Abuse and the Wife Abuser: Review and Recommendations.

    ERIC Educational Resources Information Center

    Carden, Ann D.

    1994-01-01

    Reviews clinical, theoretical, and empirical literature on wife abuse/abusers. Presents historical and contextual information, overview of domestic violence, prevalence data, and descriptions of evolution and current status of public and professional awareness and response. Proposes integrative model for understanding etiologic, dynamic, and…

  16. Firm's health going south. Federal authorities charge HealthSouth, leader Scrushy with 'massive accounting fraud,' systematic betrayal of investors.

    PubMed

    Romano, Michael

    2003-03-24

    HealthSouth and its chief executive Richard Scrushy, left, find themselves coping with a public relations nightmare after federal officials last week charged the rehabilitation giant with "massive accounting fraud" and a systematic betrayal of tens of thousands of investors.

  17. Fetal Abuse.

    ERIC Educational Resources Information Center

    Kent, Lindsey; And Others

    1997-01-01

    Five cases of fetal abuse by mothers suffering from depression are discussed. Four of the women had unplanned pregnancies and had considered termination of the pregnancy. Other factors associated with fetal abuse include pregnancy denial, pregnancy ambivalence, previous postpartum depression, and difficulties in relationships. Vigilance for…

  18. Dextromethorphan Abuse in Adolescence

    PubMed Central

    Bryner, Jodi K.; Wang, Uerica K.; Hui, Jenny W.; Bedodo, Merilin; MacDougall, Conan; Anderson, Ilene B.

    2008-01-01

    Objectives To analyze the trend of dextromethorphan abuse in California and to compare these findings with national trends. Design A 6-year retrospective review. Setting California Poison Control System (CPCS), American Association of Poison Control Centers (AAPCC), and Drug Abuse Warning Network (DAWN) databases from January 1, 1999, to December 31, 2004. Participants All dextromethorphan abuse cases reported to the CPCS, AAPCC, and DAWN. The main exposures of dextromethorphan abuse cases included date of exposure, age, acute vs long-term use, coingestants, product formulation, and clinical outcome. Main Outcome Measure The annual proportion of dextromethorphan abuse cases among all exposures reported to the CPCS, AAPCC, and DAWN databases. Results A total of 1382 CPCS cases were included in the study. A 10-fold increase in CPCS dextromethorphan abuse cases from 1999 (0.23 cases per 1000 calls) to 2004 (2.15 cases per 1000 calls) (odds ratio, 1.48; 95% confidence interval, 1.43–1.54) was identified. Of all CPCS dextromethorphan abuse cases, 74.5% were aged 9 to 17 years; the frequency of cases among this age group increased more than 15-fold during the study (from 0.11 to 1.68 cases per 1000 calls). Similar trends were seen in the AAPCC and DAWN databases. The highest frequency of dextromethorphan abuse occurred among adolescents aged 15 and 16 years. The most commonly abused product was Coricidin HBP Cough & Cold Tablets. Conclusions Our study revealed an increasing trend of dextromethorphan abuse cases reported to the CPCS that is paralleled nationally as reported to the AAPCC and DAWN. This increase was most evident in the adolescent population. PMID:17146018

  19. Abuse-deterrent formulations, an evolving technology against the abuse and misuse of opioid analgesics.

    PubMed

    Schaeffer, Tammi

    2012-12-01

    The increased use of opioid pain medication has been mirrored by the increased misuse and abuse of these drugs. As part of a multidisciplinary approach to this epidemic, pharmaceutical companies, with the encouragement of the Food and Drug Administration, have increased the development of abuse-deterrent formulations. While all have the goal of treating pain while mitigating misuse and abuse, there are different technologies utilized to impart the abuse-deterrent properties. The goal of this paper is to review the basis of abuse-deterrent formulations, the different types and approaches of some of the abuse-deterrent products, and their current regulatory status in the USA.

  20. Growing up with Parental Alcohol Abuse: Exposure to Childhood Abuse, Neglect, and Household Dysfunction.

    ERIC Educational Resources Information Center

    Dube, Shanta R.; Anda, Robert F.; Felitti, Vincent J.; Croft, Janet B.; Edwards, Valerie J.; Giles, Wayne H.

    2001-01-01

    A study involving 8,629 adults examined the association between parental alcohol abuse and child abuse, neglect, and other household dysfunction. Compared to households without alcohol abuse, the adjusted odds ratio for each category of adverse childhood experience was 2 to 13 times higher if parents abused alcohol. (Contains references.) (CR)

  1. Pattern analysis of fraud case in Taiwan, China and Indonesia

    NASA Astrophysics Data System (ADS)

    Kusumo, A. H.; Chi, C.-F.; Dewi, R. S.

    2017-11-01

    The current study analyzed 125 successful fraud cases happened in Taiwan, China, and Indonesia from 2008 to 2012 published in the English online newspapers. Each of the case report was coded in terms of scam principle, information media (information exchange between fraudsters and victim), money media (media used by fraudsters to obtain unauthorized financial benefit) and other additional information which was judged to be relevant. The Chi-square Automatic Interaction Detector (CHAID) was applied to the coded data of information, scam principle and money media to find a subset of predictors that might derive meaningful classifications. A series of flow diagrams was constructed based on CHAID result to illustrate the flow of information (scam) travelling from information media to money media.

  2. Inhalant Abuse and Dextromethorphan.

    PubMed

    Storck, Michael; Black, Laura; Liddell, Morgan

    2016-07-01

    Inhalant abuse is the intentional inhalation of a volatile substance for the purpose of achieving an altered mental state. As an important, yet underrecognized form of substance abuse, inhalant abuse crosses all demographic, ethnic, and socioeconomic boundaries, causing significant morbidity and mortality in school-aged and older children. This review presents current perspectives on epidemiology, detection, and clinical challenges of inhalant abuse and offers advice regarding the medical and mental health providers' roles in the prevention and management of this substance abuse problem. Also discussed is the misuse of a specific "over-the-counter" dissociative, dextromethorphan. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. Common Violations of the United States Code in Economic Crime Investigations. The Fraud, Waste and Abuse Monster.

    DTIC Science & Technology

    1983-11-15

    person- nel in understanding the elements of the offense and the evidence necessary to establish or negate probable cause. For the benefit of OCONUS...gift, favor, entertainment, hospitality, transportation, loan, or other tangible benefit for which less than fair market value is paid. c...influenced. He may even refuse the offer, yet the offense is complete. Nor need the thing of value personally benefit the public official. However, the

  4. The Association Between Childhood Abuse and Elder Abuse Among Chinese Adult Children in the United States.

    PubMed

    Dong, XinQi; Li, Ge; Simon, Melissa A

    2017-07-01

    The previous researchers have postulated that an abused child may abuse his or her abuser parent when the parent is getting old, also known as the intergenerational transmission of violence. However, few studies use data to support this model, and it has yet to be examined in the U.S. Chinese community. This study aims to examine the association between childhood abuse and elder abuse reported by Chinese adult children in the United States. Guided by a community-based participatory research approach, 548 Chinese adult children aged 21 years and older participated in this study. Childhood abuse was assessed by four-item Hurt-Insult-Threaten-Scream (HITS) scale. Elder abuse was assessed by a 10-item instrument derived from the Caregiver Abuse Screen (CASE). Logistic regression analysis was performed. Childhood abuse was associated with caregiver abuse screen results (odds ratio = 1.92, 95% confidence interval = 1.24-2.95). Being physically hurt (r = .13, p < .01), insulted (r = .15, p < .001), threatened (r = .12, p < .01), and screamed at (r = .18, p < .001) as a child were significantly correlated with caregiver abuse screen results. This study suggests that childhood abuse is associated with increased risk of elder abuse among Chinese adult children in the United States. Longitudinal research should be conducted to explore the mechanisms through which childhood abuse and its subtypes links with elder abuse. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Estimating Local Child Abuse.

    ERIC Educational Resources Information Center

    Ards, Sheila

    1989-01-01

    Three conceptual approaches to estimating local child abuse rates using the National Incidence Study of Child Abuse and Neglect data set are evaluated. All three approaches yield estimates of actual abuse cases that exceed the number of reported cases. (SLD)

  6. The company you keep: spreading effects of financial fraud on investor trust.

    PubMed

    Bernet, Patrick Michael; Getzen, Thomas E

    2007-01-01

    Investor trust is valuable to health care organizations. Without it, they may face higher capital costs. This study explores recent cases of fraud and the appearance of impropriety by health care organizations, focusing on the manners in which trust was violated, the systems that allowed those violations, and the effects on financial markets. Increases in the incidence and scale of such transgressions may be harbingers of worse times ahead. This article examines how recent events have affected the cost of capital, and what health care organizations can do to avoid being judged by the company they keep.

  7. Substance abuse and child maltreatment.

    PubMed

    Wells, Kathryn

    2009-04-01

    Pediatricians and other medical providers caring for children need to be aware of the dynamics in the significant relationship between substance abuse and child maltreatment. A caregiver's use and abuse of alcohol, marijuana, heroin, cocaine, methamphetamine, and other drugs place the child at risk in multiple ways. Members of the medical community need to understand these risks because the medical community plays a unique and important role in identifying and caring for these children. Substance abuse includes the abuse of legal drugs as well as the use of illegal drugs. The abuse of legal substances may be just as detrimental to parental functioning as abuse of illicit substances. Many substance abusers are also polysubstance users and the compounded effect of the abuse of multiple substances may be difficult to measure. Often other interrelated social features, such as untreated mental illness, trauma history, and domestic violence, affect these families.

  8. Child sexual abuse, attachment style, and depression: the role of the characteristics of abuse.

    PubMed

    Cantón-Cortés, David; Cortés, María Rosario; Cantón, José

    2015-02-01

    The aim of the current study was to examine the effects of secure, avoidant, and anxious attachment styles on depressive symptomatology in child sexual abuse (CSA) among young female adult victims. The role of attachment style was studied by considering possible interactive effects with the type of abuse, the relationship with the perpetrator, and the continuity of abuse. Participants were 168 female victims of CSA. Information about the abuse was obtained from a self-reported questionnaire. Attachment style was assessed with the Attachment Style Measure (ASM), and the Beck Depression Inventory (BDI) was used to assess depressive symptomatology. Secure and anxious attachment styles were correlated with low and high depression scores respectively. The effects of attachment style were stronger in cases where the abuse consisted of oral sex/penetration, a non-family member as perpetrator, and in isolated, compared with continued, abuse. These results confirm that characteristics of CSA (type of abuse, relationship with the perpetrator, and continuity of abuse) can affect the impact of attachment style on depressive symptomatology. © The Author(s) 2014.

  9. Domestic abuse awareness and recognition among primary healthcare professionals and abused women: a qualitative investigation.

    PubMed

    Bradbury-Jones, Caroline; Taylor, Julie; Kroll, Thilo; Duncan, Fiona

    2014-11-01

    To investigate the dynamics of domestic abuse awareness and recognition among primary healthcare professionals and abused women. Domestic abuse is a serious, public health issue that crosses geographical and demographic boundaries. Health professionals are well placed to recognise and respond to domestic abuse, but empirical evidence suggests that they are reluctant to broach the issue. Moreover, research has shown that women are reluctant to disclose abuse. A two-phase, qualitative study was conducted in Scotland. Twenty-nine primary health professionals (midwives, health visitors and general practitioners) participated in the first phase of the study, and 14 abused women took part in phase two. Data were collected in 2011. Semi-structured, individual interviews were conducted with the health professionals, and three focus groups were facilitated with the abused women. Data were analysed using a framework analysis approach. Differing levels of awareness of the nature and existence of abuse are held by abused women and primary healthcare professionals. Specifically, many women do not identify their experiences as abusive. A conceptual representation of domestic abuse - the "abused women, awareness, recognition and empowerment' framework - arising from the study - presents a new way of capturing the complexity of the disclosure process. Further research is necessary to test and empirically validate the framework, but it has potential pedagogical use for the training and education of health professionals and clinical use with abused women. The framework may be used in clinical practice by nurses and other health professionals to facilitate open discussion between professionals and women. In turn, this may empower women to make choices regarding disclosure and safety planning. © 2014 John Wiley & Sons Ltd.

  10. Abusive families and character formation.

    PubMed

    McCarthy, J B

    1990-06-01

    Family research studies confirm that abusive parents tend to be undifferentiated partners who compete with each other and with their children for attention and nurturance. More or less healthy parents make demands on children to counteract their own injured narcissism, but they do so largely without devaluation and the sadistic use of projective identification. Under sufficient stress abusive parents attack the child who fails to gratify their needs, thereby giving vent to longstanding frustrations and feelings of being threatened by the child's individuation and competency. The emotional atmosphere in such families facilitates ego deficits like those of the borderline personality as it molds the child's efforts to avoid anxiety. Devaluation, loss, and defenses against mourning partially account for depression and paranoid traits in abused youngsters. Early neglect and abuse exposes them to influential models who act out rage and primitive defenses. Some abused individuals project their rage and later become paranoid or antisocial, whereas others fragment or retain infantile defenses. The destructiveness of severe psychological abuse lies in the constriction of the experiencing self and healthy character development, together with the conditioning to repeat abusive relationships and to avoid intimacy. Achieving individuation under these circumstances entails overcoming the internalized abusive relationships and relinquishing the unconscious wish to be transformed from the abused into the abuser.

  11. Relationships between parental alcohol abuse and social support, peer substance abuse risk and social support, and substance abuse risk among South Korean adolescents.

    PubMed

    Park, Sookyung; Kim, Haeryun; Kim, Haesung

    2009-01-01

    This study examined the roles played by parental alcohol abuse and social support, peer substance abuse risk and social support, and substance abuse risk among adolescents in South Korea. Participants were adolescents between the ages of 15 and 22 years (mean, 18), residing in Seoul city and in surrounding Kyung-gi Province. Of 259 participants, 41.3% scored 2 or more on the POSIT scale, which suggested they met the problematic criteria for substance abuse risk. Logistic regression results suggested that the influence of social support on substance abuse risk among adolescents depended on the source of support--parents or peers. These findings need to be considered in the development of intervention programs for adolescents at risk for substance abuse.

  12. The Development of a Sexual Abuse Severity Score: Characteristics of Childhood Sexual Abuse Associated with Trauma Symptomatology, Somatization, and Alcohol Abuse

    ERIC Educational Resources Information Center

    Zink, Therese; Klesges, Lisa; Stevens, Susanna; Decker, Paul

    2009-01-01

    Childhood sexual abuse (CSA) is common and is associated with both mental and physical health problems in adulthood. Using data from an age- and sex-stratified population survey of 600 Olmsted County, Minnesota, residents, a Sexual Abuse Severity Score was developed. The abuse characteristics of 156 CSA respondents were associated with…

  13. Child-Visiting and Domestic Abuse.

    ERIC Educational Resources Information Center

    Shepard, Melanie

    1992-01-01

    Explains problems with child visiting in cases of domestic abuse. Data on domestic abuse, child care concerns, and child adjustment problems were collected from 25 mothers and 22 fathers at a child visiting program serving separated and abusive families. Psychological abuse of mothers correlated with child adjustment problems. (BB)

  14. Elder Abuse Awareness Project.

    ERIC Educational Resources Information Center

    Doyle, Kathleen; Morrow, Marilyn J.

    1985-01-01

    The Elder Abuse Awareness Project was undertaken: (1) to determine the incidence of abuse and neglect in seven Illinois counties; and (2) to develop, produce, and distribute educational materials on elder abuse for the service provider and for senior citizens. Results are presented and discussed. (MT)

  15. Mimics of child abuse: Can choking explain abusive head trauma?

    PubMed

    Edwards, George A

    2015-10-01

    Choking is one of the alternative explanations of abusive head trauma in children that have been offered in courtroom testimony and in the media. Most of these explanations - including choking - are not scientifically supported. This article highlights four points. (1) The origins of choking as an explanation for intracranial and retinal hemorrhages are speculative. (2) Choking has been used in high profile court testimony as an explanation for the death of a child thought to have been abused. (3) A case report that proposes choking as an alternative explanation for the death of a child diagnosed with abusive head trauma includes omissions and misrepresentations of facts. (4) There was a decision by the editor of the journal that published the case report that it was not necessary to include all the facts of the case; moreover, the editor indicated that facts are not required when presenting an alternative explanation. The use of scientifically unsupported alternative explanations for abusive head trauma based on inaccurate and biased information constitutes further victimization of the abused child and represents a travesty of justice. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  16. Child and Spouse Abuse Report

    DTIC Science & Technology

    1987-07-11

    child abuse . (c) SPouse (C) Military Child Care (4) Involvement n previous established case of spouse abuse (d) Sbl,ng (d) Other Child Care (5...program 16.j.(2) Referred to a drug rehabilitation program 4 16.j.(3) Previous involvement in child abuse 16.j.(4) Previous involvement in spouse abuse 16...investigation, whether "unsubstantiated," "suspected," or "substantiated." 8.a. Child Abuse /Neglect. The physical injury, sexual maltreatment, emotional

  17. Against the Odds: The Impact of Woman Abuse on Maternal Response to Disclosure of Child Sexual Abuse

    ERIC Educational Resources Information Center

    Alaggia, Ramona; Turton, Jennifer V.

    2005-01-01

    Although the co-occurrence of woman abuse and child sexual abuse is high little research exists exploring the impact of woman abuse on maternal response to child sexual abuse (CSA). Findings from two qualitative studies indicate the form of woman abuse to have differential impact on maternal response. Mothers who were abused in non-physical ways,…

  18. Abuse Characteristics and Individual Differences Related to Disclosing Childhood Sexual, Physical, and Emotional Abuse and Witnessed Domestic Violence.

    PubMed

    Bottoms, Bette L; Peter-Hagene, Liana C; Epstein, Michelle A; Wiley, Tisha R A; Reynolds, Carrie E; Rudnicki, Aaron G

    2016-04-01

    Many adult survivors of childhood abuse hide their victimization, avoiding disclosure that could identify perpetrators, end the abuse, and bring help to the victim. We surveyed 1,679 women undergraduates to understand disclosure of childhood sexual, physical, and emotional abuse, and, for the first time, witnessed domestic violence, which many consider to be emotionally abusive. A substantial minority of victims failed to ever disclose their sexual abuse (23%), physical abuse (34%), emotional abuse (20%), and witnessed domestic violence (29%). Overall, abuse-specific factors were better predictors of disclosure than individual-level characteristics. Disclosure of sexual abuse was related to experiencing more frequent abuse (by the same and by multiple perpetrators), being more worried about injury and more upset at the time of the abuse, and self-labeling as a victim of abuse. Disclosure of physical abuse was related to experiencing more frequent abuse (by the same and multiple perpetrators), being less emotionally close to the perpetrator, being older when the abuse ended, being more worried and upset, and self-labeling as a victim. Disclosure of emotional abuse was associated with being older when the abuse ended, and being more worried and upset. Disclosure was unrelated to victim demographic characteristics or defensive reactions (dissociative proneness, fantasy proneness, repressive coping style, and temporary forgetting), except that among physical and emotional abuse victims, repressors were less likely to disclose than non-repressors. Disclosure of witnessing domestic violence was not significantly related to any factors measured. © The Author(s) 2014.

  19. 26 CFR 1.547-5 - Deduction denied in case of fraud or wilful failure to file timely return.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... failure to file timely return. 1.547-5 Section 1.547-5 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.547-5 Deduction denied in case of fraud or wilful failure to file timely return. No deduction...

  20. 26 CFR 1.547-5 - Deduction denied in case of fraud or wilful failure to file timely return.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... failure to file timely return. 1.547-5 Section 1.547-5 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.547-5 Deduction denied in case of fraud or wilful failure to file timely return. No deduction...

  1. Comparison of early maladaptive schemas and parenting origins in patients with opioid abuse and non-abusers.

    PubMed

    Jalali, Mohammad Reza; Zargar, Mohammad; Salavati, Mojgan; Kakavand, Ali Reza

    2011-01-01

    The aim of this study was to examine the difference of early maladaptive schemas and parenting origins in opioid abusers and non-opioid abusers. The early maladaptive schemas and parenting origins were compared in 56 opioid abusers and 56 non-opioids abusers. Schemas were assessed by the Young Schema Questionnaire 3rd (short form); and parenting origins were assessed by the Young Parenting Inventory. Data were analyzed by multivariate analysis of variance (MANOVA). The analysis showed that the means for schemas between opioid abusers and non-opioid abusers were different. Chi square test showed that parenting origins were significantly associated with their related schemas. The early maladaptive schemas and parenting origins in opioid abusers were more than non-opioid abusers; and parenting origins were related to their Corresponding schemas.

  2. Estimating attractiveness for abuse of a not-yet-marketed "abuse-deterrent" prescription opioid formulation.

    PubMed

    Butler, Stephen F; Black, Ryan; Grimes Serrano, Jill M; Folensbee, Lesley; Chang, Alan; Katz, Nathaniel

    2010-01-01

    The present study builds on research to model abusers' perceptions of particular analgesics' attractiveness for abuse and extends these methods to derive an estimate of attractiveness for abuse of a not-yet-marketed abuse-deterrent formulation (ADF) of a prescription opioid (Remoxy), Pain Therapeutics, Inc., San Mateo, CA, and King Pharmaceuticals, Inc., Bristol, TN). In a previous study, the Opioid Attractiveness Technology Scaling (OATS) method identified, from a drug abuser's point of view, the particular features of a prescription opioid relevant to its attractiveness for recreational use. A second online sample rated the extent to which these features applied to particular products they had actually used/abused. These data were used to model the abusers' overall preference for prescription opioids they had used/abused. In the present study, this method was applied to a not-yet-marketed ADF using substance abuse counselors as proxies for prescription opioid abusers. Thirty-eight counselors were given materials describing the new ADF along with four known products. Thirty-two counselors demonstrated sufficient agreement with abusers' ratings of the overall attractiveness of these drugs. The overall model yielded a significant pseudo R(2) of 0.15 (P < 0.001), with increasing model fit based on preferred route of administration, from swallowing whole (pseudo R(2) = 0.06; P < 0.001) and best for those who preferred to inject (pseudo R(2) = 0.40; P < 0.001). Data from a cross-validation group of 16 counselors/proxies were used to calculate the OATS scores for the five rated drugs and revealed significant differences between the ADF and OxyContin (Purdue Pharma LP, Stamford, CT), Percocet (Endo Pharmaceuticals, Chadds Ford, PA), and Vicodin (Abbott Laboratories, Abbott Park, IL), but not Talwin NX (Sanofi-aventis, Bridgewater, NJ), which was identified in the prior study as a highly unattractive drug for recreational purposes. The OATS method shows promise for

  3. Criminal investigations and the Superfund program. Fact sheet (Final)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-09-01

    The fact sheet, directed toward any one who witnesses fraudulent activity in EPA programs, discusses areas in which fraud and abuse can occur and provides an understanding of the criminal investigation process that results from reports of suspicious activity.

  4. The Stark truth: what your physician clients should know about Stark Law and the Anti-Kickback Statute.

    PubMed

    Taormina, Melissa

    2013-01-01

    This article summarizes key features of Stark Law and the Anti-Kickback Statute, statutes used to fight health care fraud and abuse within Medicare and Medicaid, and explains how attorneys can help health care providers comply with these laws.

  5. Prescription Drug Abuse

    MedlinePlus

    ... what the doctor prescribed, it is called prescription drug abuse. It could be Taking a medicine that ... purpose, such as getting high Abusing some prescription drugs can lead to addiction. These include opioids, sedatives, ...

  6. 42 CFR 495.368 - Combating fraud and abuse.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... identified as an overpayment regardless of recoupment from such providers, within 60 days of discovery of the...

  7. Tooth Decay in Alcohol Abusers Compared to Alcohol and Drug Abusers

    PubMed Central

    Dasanayake, Ananda P.; Warnakulasuriya, Saman; Harris, Colin K.; Cooper, Derek J.; Peters, Timothy J.; Gelbier, Stanley

    2010-01-01

    Alcohol and drug abuse are detrimental to general and oral health. Though we know the effects of these harmful habits on oral mucosa, their independent and combined effect on the dental caries experience is unknown and worthy of investigation. We compared 363 “alcohol only” abusers to 300 “alcohol and drug” abusers to test the hypothesis that various components of their dental caries experience are significantly different due to plausible sociobiological explanations. After controlling for the potential confounders, we observe that the “alcohol and drug” group had a 38% higher risk of having decayed teeth compared to the “alcohol only” group (P < .05). As expected, those who belonged to a higher social class (OR = 1.98; 95%  CI = 1.43–2.75) and drank wine (OR = 1.85; 95%  CI = 1.16–2.96) had a higher risk of having more filled teeth. We conclude that the risk of tooth decay among “alcohol only” abusers is significantly lower compared to “alcohol and drug” abusers. PMID:20379366

  8. Elder Abuse in Japan

    ERIC Educational Resources Information Center

    Arai, Mizuho

    2006-01-01

    Perceptions of elder abuse were examined in Japanese women (n =100) and men (n =46). Japanese women and men both emphasized physical aggression, followed by neglect and blaming, when giving examples of extremely abusive behavior. Physical aggression was also the most frequently mentioned type of moderate elder abuse, followed by neglect, economic…

  9. Substance Abuse. Policy Statement.

    ERIC Educational Resources Information Center

    National Collaboration for Youth, Washington, DC.

    This paper presents the policy statement on substance abuse from the National Collaboration for Youth (NCY). The policy statement section lists programs and activities supported by the NCY. A section on background includes a statement of the issue of substance abuse. Areas examined in this section include alcohol abuse and drunk driving among…

  10. Child Abuse and Mandated Reporting

    ERIC Educational Resources Information Center

    Woika, Shirley; Bowersox, Carissa

    2013-01-01

    Teachers and teachers-in-training are mandated reporters; they are legally required to report any suspected child abuse or neglect. This article describes: (1) How to file a report; (2) How prevalent child abuse is; (3) What abuse is; (4) What it means to be a mandated reporter; (5) When the report should be made; and (6) What to do if abuse is…

  11. [Child abuse: an interdisciplinary management experience].

    PubMed

    Seldes, José Julio; Ziperovich, Valentina; Viota, Alejandra; Leiva, Fernanda

    2008-12-01

    Child abuse constitutes one of the most frequent forms of family violence. The following study tries to demonstrate the situation that arises in the city of Mercedes, Corrientes, Argentina, and to establish some associations about that matter. A series of 128 cases of abused children is presented, between 0 and 19 years old, attended from November 1998 to November 2002, in Moiru, Center of prevention, direction, attendance and qualification in social conducts of risk that works in Mercedes. 56% of physical abuse; 30% of sexual abuse; 10% of neglect; 3% of emotional abuse and 1% of syndrome of Münchaussen was detected, with a similar distribution by sexes in the total population. Demographic variables and certain associations in cases of physical abuse and sexual abuse are indicated. A significant association between mothers victims of domestic violence and physical abuse towards their children was demonstrated. 128 young boys and girls were seen in our center. It is considered that a significant population was treated where physical abuse and sexual abuse appears as most relevant.

  12. Elder Abuse Awareness Project.

    ERIC Educational Resources Information Center

    Morrow, Marilyn J.; Doyle, Kathleen

    The Elder Abuse Awareness Project was developed to determine the incidence of abuse and neglect of elderly people in several rural counties in central Illinois. A primary purpose of the study was to survey service providers as to their actual encounters with elder abuse and neglect. Each provider was asked about warning signs or cues that were…

  13. Understanding elder abuse in family practice

    PubMed Central

    Yaffe, Mark J.; Tazkarji, Bachir

    2012-01-01

    Abstract Objective To discuss what constitutes elder abuse, why family physicians should be aware of it, what signs and symptoms might suggest mistreatment of older adults, how the Elder Abuse Suspicion Index might help in identification of abuse, and what options exist for responding to suspicions of abuse. Sources of information MEDLINE, PsycINFO, and Social Work Abstracts were searched for publications in English or French, from 1970 to 2011, using the terms elder abuse, elder neglect, elder mistreatment, seniors, older adults, violence, identification, detection tools, and signs and symptoms. Relevant publications were reviewed. Main message Elder abuse is an important cause of morbidity and mortality in older adults. While family physicians are well placed to identify mistreatment of seniors, their actual rates of reporting abuse are lower than those in other professions. This might be improved by an understanding of the range of acts that constitute elder abuse and what signs and symptoms seen in the office might suggest abuse. Detection might be enhanced by use of a short validated tool, such as the Elder Abuse Suspicion Index. Conclusion Family physicians can play a larger role in identifying possible elder abuse. Once suspicion of abuse is raised, most communities have social service or law enforcement providers available to do additional assessments and interventions. PMID:23242889

  14. Development and application of a database of food ingredient fraud and economically motivated adulteration from 1980 to 2010.

    PubMed

    Moore, Jeffrey C; Spink, John; Lipp, Markus

    2012-04-01

    Food ingredient fraud and economically motivated adulteration are emerging risks, but a comprehensive compilation of information about known problematic ingredients and detection methods does not currently exist. The objectives of this research were to collect such information from publicly available articles in scholarly journals and general media, organize into a database, and review and analyze the data to identify trends. The results summarized are a database that will be published in the US Pharmacopeial Convention's Food Chemicals Codex, 8th edition, and includes 1305 records, including 1000 records with analytical methods collected from 677 references. Olive oil, milk, honey, and saffron were the most common targets for adulteration reported in scholarly journals, and potentially harmful issues identified include spices diluted with lead chromate and lead tetraoxide, substitution of Chinese star anise with toxic Japanese star anise, and melamine adulteration of high protein content foods. High-performance liquid chromatography and infrared spectroscopy were the most common analytical detection procedures, and chemometrics data analysis was used in a large number of reports. Future expansion of this database will include additional publically available articles published before 1980 and in other languages, as well as data outside the public domain. The authors recommend in-depth analyses of individual incidents. This report describes the development and application of a database of food ingredient fraud issues from publicly available references. The database provides baseline information and data useful to governments, agencies, and individual companies assessing the risks of specific products produced in specific regions as well as products distributed and sold in other regions. In addition, the report describes current analytical technologies for detecting food fraud and identifies trends and developments. © 2012 US Pharmacupia Journal of Food Science

  15. Abuse of prescription drugs.

    PubMed Central

    Wilford, B B

    1990-01-01

    An estimated 3% of the United States population deliberately misuse or abuse psychoactive medications, with severe consequences. According to the National Institute on Drug Abuse, more than half of patients who sought treatment or died of drug-related medical problems in 1989 were abusing prescription drugs. Physicians who contribute to this problem have been described by the American Medical Association as dishonest--willfully misprescribing for purposes of abuse, usually for profit; disabled by personal problems with drugs or alcohol; dated in their knowledge of current pharmacology or therapeutics; or deceived by various patient-initiated fraudulent approaches. Even physicians who do not meet any of these descriptions must guard against contributing to prescription drug abuse through injudicious prescribing, inadequate safeguarding of prescription forms or drug supplies, or acquiescing to the demands or ruses used to obtain drugs for other than medical purposes. PMID:2349801

  16. Being emotionally abused: a phenomenological study of adult women's experiences of emotionally abusive intimate partner relationships.

    PubMed

    Queen, Josie; Nurse, Army; Brackley, Margaret H; Williams, Gail B

    2009-04-01

    The purpose of this study was to explore and describe individual perceptions, meanings, and definitions of emotional abuse through the lived experience of women who identified themselves as being emotionally abused by an intimate partner (IP). To answer the research question, "What is it like to live the life of a woman who is emotionally abused by her intimate partner?" A descriptive, phenomenological research design was undertaken. Unstructured individual interviews with 15 emotionally abused adult women resulted in the discovery of seven essential themes: captivity, defining moments, disassociation from self, fixing, mindful manipulation, relentless terror, and taking a stand. A combination of a hermeneutic approach and Diekelmann's approach to data analysis was used to explore differences in perceptions and develop essential themes that portrayed the essence of a woman's lived experience of being emotionally abused by her IP. The data also demonstrated that (1) IP emotional abuse has no prerequisite for partner rage or obvious emotional manipulation, (2) the absence of caring and respectful partner behaviors was just as powerful in creating an emotionally abusive experience as openly abusive behaviors, and (3) being emotionally abused was a life journey, encompassing multiple culminations, secondary physical and mental health symptoms, and quality of life issues that extended well beyond the immediate abuse experience.

  17. Forensic and family psychiatry in abuse dwarfism: Munchausen's syndrome by proxy, atonement, and addiction to abuse.

    PubMed

    Money, J; Annecillo, C; Hutchison, J W

    1985-01-01

    The syndrome of abuse dwarfism is characterized by gross impairment of statural and intellectual growth and social maturation while the abused child remains in the domicile of abuse. The parents collude as child abusers, and are medical impostors regarding the symptoms of abuse. The syndrome as a whole is appropriately named Munchausen's syndrome by proxy. Though the mother typically initiates abuse, she cannot give a rational explanation for doing so. In her own history there is a sin that is expiated or atoned for symbolically by the sacrifice of the child--explainable in terms of the theory of opponent-process learning. In the two cases presented, the sin was the mother's own birth out of wedlock, in one case as a sequel to incest. The child's addiction to abuse is a challenge to the program of rehabilitation. With respect to parents at risk, the data of this paper are relevant to the prevention of a predisposition toward, or the actual implementation of child abuse, though a program of prevention needs still to be formulated. The sexological relevance of this paper is that the data demonstrate that the effects of sexual abuse may be transmitted to the next generation and manifested as child abuse which is not necessarily sexual in content.

  18. The costs of electoral fraud: establishing the link between electoral integrity, winning an election, and satisfaction with democracy

    PubMed Central

    Fortin-Rittberger, Jessica; Harfst, Philipp; Dingler, Sarah C.

    2017-01-01

    ABSTRACT Previous research has shown that voters’ perception of electoral fairness has an impact on their attitudes and behaviors. However, less research has attempted to link objective measurements of electoral integrity on voters’ attitudes about the democratic process. Drawing on data from the Comparative Study of Electoral Systems and the Quality of Elections Data, we investigate whether cross-national differences in electoral integrity have significant influences on citizens’ level of satisfaction with democracy. We hypothesize that higher levels of observed electoral fraud will have a negative impact on evaluations of the democratic process, and that this effect will be mediated by a respondent’s status as a winner or loser of an election. The article’s main finding is that high levels of electoral fraud are indeed linked to less satisfaction with democracy. However, we show that winning only matters in elections that are conducted in an impartial way. The moment elections start to display the telltale signs of manipulation and malpractice, winning and losing no longer have different effects on voter’s levels of satisfaction with democracy. PMID:28824703

  19. The costs of electoral fraud: establishing the link between electoral integrity, winning an election, and satisfaction with democracy.

    PubMed

    Fortin-Rittberger, Jessica; Harfst, Philipp; Dingler, Sarah C

    2017-07-03

    Previous research has shown that voters' perception of electoral fairness has an impact on their attitudes and behaviors. However, less research has attempted to link objective measurements of electoral integrity on voters' attitudes about the democratic process. Drawing on data from the Comparative Study of Electoral Systems and the Quality of Elections Data, we investigate whether cross-national differences in electoral integrity have significant influences on citizens' level of satisfaction with democracy. We hypothesize that higher levels of observed electoral fraud will have a negative impact on evaluations of the democratic process, and that this effect will be mediated by a respondent's status as a winner or loser of an election. The article's main finding is that high levels of electoral fraud are indeed linked to less satisfaction with democracy. However, we show that winning only matters in elections that are conducted in an impartial way. The moment elections start to display the telltale signs of manipulation and malpractice, winning and losing no longer have different effects on voter's levels of satisfaction with democracy.

  20. Effectiveness of a 95 SNP panel for the screening of breed label fraud in the Chinese meat market.

    PubMed

    Rogberg-Muñoz, A; Wei, S; Ripoli, M V; Guo, B L; Carino, M H; Lirón, J P; Prando, A J; Vaca, R J A; Peral-García, P; Wei, Y M; Giovambattista, G

    2016-01-01

    Breed assignment has proved to be useful to control meat trade and protect the value of special productions. Meat-related frauds have been detected in China; therefore, 95 SNPs selected from the ISAG core panel were evaluated to develop an automated and technologically updated tool to screen breed label fraud in the Chinese meat market. A total of 271 animals from four Chinese yellow cattle (CYC) populations, six Bos taurus breeds, two Bos indicus and one composite were used. The allocation test distinguished European, Japanese and Zebu breeds, and two Chinese genetic components. It correctly allocated Japanese Black, Zebu and British breeds in 100, 90 and 89% of samples, respectively. CYC evidenced the Zebu, Holstein and Limousin introgression. The test did not detect CYC components in any of the 25 samples from Argentinean butchers. The method could be useful to certify Angus, Hereford and Japanese Black meat, but a modification in the panel would be needed to differentiate other breeds. Copyright © 2015 Elsevier Ltd. All rights reserved.